We don't have the time to dig into all the different ways someone could measure time. Generally, we structure our lives around years, months, days, hours ... you know, the big ones. The easy ones. But time measurements can get as nitty gritty as you need them to. In Facebook's case, the company needed a unit of time that just wasn't there. So they invented an entirely new one.
Allow us to introduce you to the "flick," the new unit of time developed by a Facebook engineer. Chances are, you won't be measuring how long you've been on the treadmill or how long to cook your turkey in flicks. But for a select group, the new unit could become quite helpful. Initially created by Christopher Horvath in late 2016 and launched by Facebook Open Source in January 2018, the flick is equal to precisely one 705,600,000th of a second. It's just a tad longer than a nanosecond, but still shorter than a microsecond. Finally, right?
Like we said, understanding the flick probably won't impact your daily life. But here's a hint as to how this little sliver of a second could be helpful for some. Here are some numbers into which 1/705,600,000 divides evenly: 1/8, 1/16, 1/22.05, 1/24, 1/25, 1/30, 1/32, 1/44.1, 1/48, 1/50, 1/60, 1/90, 1/100, 1/120.
Still confused? All of these numbers are also frame rates or frequencies involved in displaying movies, music, and other media. Working any of those figures out into decimals yields a nasty, often neverending line of digits. The flick is here to clean it up. For example, 1/24th of a second is 29,400,000 flicks. If we were to try to measure that fraction of a second as a decimal, it would be 0.0416666666666666... Ew.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. Facebook Page:- https://www.facebook.com/theprogrammer.harshit/
Only a single character can crash your iPhone and block access to the Messaging app in iOS as well as popular apps like WhatsApp, Facebook Messenger, Outlook for iOS, and Gmail.
First spotted. by Italian Blog Mobile World, a potentially new severe bug affects not only iPhones but also a wide range of Apple devices, including iPads, Macs and even Watch OS devices running the latest versions of their operating software.
Like previous 'text bomb' bug, the new flaw can easily be exploited by anyone, requiring users to send only a single character from Telugu—a native Indian language spoken by about 70 million people in the country.
Once the recipient receives a simple message containing the symbol or typed that symbol into the text editor, the character immediately instigates crashes on iPhones, iPads, Macs, Apple Watches and Apple TVs running Apple's iOS Springboard.
Apps that receive the text bomb tries to load the character, but fails and refuses to function properly until the character is removed—which usually can be done by deleting the entire conversation.
The easiest way to delete the offending message is by asking someone else to send a message to the app that is crashing due to the text bomb. This would allow you to jump directly into the notification and delete the entire thread containing the character.
The character can disable third-party apps like iMessage, Slack, Facebook Messenger, WhatsApp, Gmail, and Outlook for iOS, as well as Safari and Messages for the macOS versions.
Telegram and Skype users appear to be unaffected by the text bomb bug.
Apple was made aware of the text bomb bug at least three days ago, and the company plans to address the issue in an iOS update soon before the release of iOS 11.3 this spring.
The public beta version of iOS 11.3 is unaffected.
Since so many apps are affected by the new text bomb, bad people can use the bug to target Apple users via email or messaging or to create mass chaos by spamming the character across an open social platform.
So thats it. Hope you guys like it. If yes then .. comment down below and do not forgot to like follow and share our social media platforms. Facebook Page:- https://www.facebook.com/theprogrammer.harshit/
A zero-day vulnerability has been
discovered in the desktop version for end-to-end encrypted Telegram
messaging app that was being exploited in the wild in order to spread
malware that mines cryptocurrencies such as Monero and ZCash.
The Telegram vulnerability was uncovered by security researcher Alexey
Firsh from Kaspersky Lab last October and affects only the Windows
client of Telegram messaging software.
The flaw has actively been exploited in the wild since at least March
2017 by attackers who tricked victims into downloading malicious
software onto their PCs that used their CPU power to mine
cryptocurrencies or serve as a backdoor for attackers to remotely
control the affected machine, according to a blogpost on Securelist.
Here's How Telegram Vulnerability Works
The vulnerability resides in the way Telegram Windows client handles the
RLO (right-to-left override) Unicode character (U+202E), which is used
for coding languages that are written from right to left, like Arabic or
Hebrew.
According to Kaspersky Lab, the malware creators used a hidden RLO
Unicode character in the file name that reversed the order of the
characters, thus renaming the file itself, and send it to Telegram
users. For example, when an attacker sends a
file named "photo_high_re*U+202E*gnp.js" in a message to a Telegram
user, the file's name rendered on the users' screen flipping the last
part.
Therefore, the Telegram user will see an incoming PNG image file (as
shown in the below image) instead of a JavaScript file, misleading into
downloading malicious files disguised as the image.
During
the analysis, Kaspersky researchers found several scenarios of zero-day
exploitation in the wild by threat actors. Primarily, the flaw was
actively exploited to deliver cryptocurrency mining malware, which uses
the victim's PC computing power to mine different types of
cryptocurrency including Monero, Zcash, Fantomcoin, and others.
While analyzing the servers of malicious actors, the researchers also
found archives containing a Telegram's local cache that had been stolen
from victims.
In another case, cybercriminals successfully exploited the vulnerability
to install a backdoor trojan that used the Telegram API as a command
and control protocol, allowing hackers to gain remote access to the
victim’s computer.
"After installation, it started to operate in a silent mode, which
allowed the threat actor to remain unnoticed in the network and execute
different commands including the further installation of spyware tools,"
the firm added.
Firsh believes the zero-day vulnerability was exploited only by Russian
cybercriminals, as "all the exploitation cases that [the researchers]
detected occurring in Russia," and a lot of artifacts pointed towards
Russian cybercriminals.
The best way to protect yourself from such attacks is not to download or open files from unknown or untrusted sources.
The security firm also recommended users to avoid sharing any sensitive
personal information in messaging apps and make sure to have a good
antivirus software from reliable company installed on your system
So thats it. Hope you guys like it. If yes then please .. comment down
below and do not forgot to like follow and share our social media
platforms.
Facebook Page:- https://www.facebook.com/theprogrammer.harshit/
Before Tuesday's test launch of SpaceX's Falcon Heavy rocket, not even the company's CEO Elon Musk knew what to expect.
"It's
either going to be an exciting success or an exciting failure," he
said. "One big boom! I'd say tune in, it's going to be worth your time."
Musk was right: There was a big boom when the Falcon Heavy's 27 engines fired and lifted SpaceX's largest rocket into space.
The booster rockets returned to Earth, landing at the same time like a
pair of synchronized divers at the Olympics. The payload, a Tesla Roadster, made it to Mars orbit and beyond.
The
launch felt part scientific breakthrough, part Silicon Valley product
launch. It was filled with wonder, disbelief and humor -- there's a car
traveling through space with a sign saying "Don't Panic!"
The Falcon
Heavy launch had a number of significant moments that were easy to miss.
So I gathered all the notable instances and SpaceX Easter eggs here
together.
This rocket is kind of a big deal
SpaceX has launched rockets
before, but the Falcon Heavy is the company's largest one to date.
Tuesday's launch was the first attempt at sending it with a payload into
space.
In a press conference post-launch, Elon Musk said, "Crazy
things can come true. I didn't really think this would work. When I see
the rocket liftoff, I see a thousand things that could not work. And
it's amazing when they do."
SpaceX has embraced the ups and downs
that come with pushing rocket technology forward. Last year, the company
posted this video, titled "How Not to Land an Orbital Rocket Booster,"
on its YouTube channel. It's basically a highlight reel of rocket
booster failures -- aka lots of explosions.
The Falcon's name
SpaceX's Falcon 9 and Falcon Heavy rockets are named after Han Solo's ride in Star Wars, the Millennium Falcon.
It's big
At
230 feet (70 meters) tall, the Falcon Heavy is without a doubt
impressive, but it's not the largest rocket ever. That distinction goes
to NASA's Saturn V rocket, which stood 330 feet (111 meters) tall.
Designed to be reusable
An
early goal for SpaceX was the development of a system of reusable
rockets. For decades one of the largest cost factors behind rockets was
that they had to be built anew for each launch. Musk compared it to if
airplanes had to be discarded after one flight.
SpaceX focused on
how to return its rockets to Earth and make a controlled landing. Last
year, SpaceX did just that when the company landed a Falcon 9 booster onto a drone ship floating in the Atlantic. The drone ship's name is "Of Course I Still Love You," in tribute to the late sci-fi author Iain M. Banks.
Including that first landing, SpaceX has landed 21 Falcon 9 boosters back on Earth.
Three rockets
Last
year's Falcon 9 had one booster rocket, while the Falcon Heavy has
three: two first-stage boosters (aka Falcon 9 rockets) and one core
booster. These three rockets give the Falcon Heavy 5 million pounds (2.3
million kg) of thrust, which allows it to carry 70 tons (63.5 metric
tonnes) of cargo into space.
One
of the best moments from the Falcon Heavy launch was when the two
first-stage boosters landed in sync back to Earth at a landing zone. It
seemed unreal. The third booster, the core booster, did not land
successfully and crashed at 300 mph (480 kph) into the landing drone
ship in the ocean.
It can carry whales
The Falcon Heavy
can carry a 140,700-pound (63,800-kg) payload into lower Earth orbit --
that's the equivalent of two humpback whales. For a trip to Mars, it can
carry 37,000 lbs (16,800 kg) -- about the weight of 31 grand pianos.
The rocket car
When
a new rocket is tested, the payload is usually a concrete block.
Typically, Musk thought that was boring and opted for a cherry-red Tesla Roadster with a dummy astronaut named Starman (after the David Bowie song) in the driver's seat.
"It
looks so ridiculous and impossible. You can tell it's real because it
looks so fake. We'd have way better CGI if it was fake," said Musk. "The
imagery of it is something that's going to get people excited about it
around the world."
A brand new spacesuit
The spacesuit Starman wears is actually one Space X revealed last summer. It looks sleek and futuristic with its gray and white color scheme and was tested to double vacuum pressure.
Tesla Roadster Easter eggs
The car itself had a handful of Easter eggs:
On the dashboard sits a tiny Roadster and spaceman
The
dashboard's screen displays "Don't Panic!" a reference to the cover of
the guide in the novel "The Hitchhiker's Guide to the Galaxy" by Douglas
Adams
"Made on Earth by humans" is printed on the car's circuit board
In the car is a disk with a digital copy of Isaac Asimov's Foundation series of sci-fi books
There's a plaque in the car engraved with the names of 6,000 SpaceX employees
So thats it. Hope you guys like it. If yes then please .. comment down
below and do not forgot to like follow and share our social media
platforms.
Facebook Page:- https://www.facebook.com/theprogrammer.harshit/
Proxy servers are servers that takes the request from normal machines and IP's and forward there request of the page that are requested by normal machine to the Internet and when the internet sends gives response the page that is requested by the proxy server that response is send back to the normal machines and IP's . there are varieties and types of Proxy Servers some of them are as follows:-
Transparent Proxy –
This type of proxy server identifies itself as a proxy server and also
makes the original IP address available through the http headers. These
are generally used for their ability to cache websites and do not
effectively provide any anonymity to those who use them. However, the
use of a transparent proxy will get you around simple IP bans. They are
transparent in the terms that your IP address is exposed, not
transparent in the terms that you do not know that you are using it
(your system is not specifically configured to use it.) This type of
proxy server does not hide your IP address.
* Anonymous Proxy –
This type of proxy server identifies itself as a proxy server, but does
not make the original IP address available. This type of proxy server is
detectable, but provides reasonable anonymity for most users. This type
of proxy server will hide your IP address.
* Distorting Proxy –
This type of proxy server identifies itself as a proxy server, but make
an incorrect original IP address available through the http headers.
This type of proxy server will hide your IP address.
* High Anonymity Proxy –
This type of proxy server does not identify itself as a proxy server
and does not make available the original IP address. This type of proxy
server will hide your IP address.
So thats it. Hope you guys like it. If yes then please .. comment down
below and do not forgot to like follow and share our social media
platforms.
Facebook Page:- https://www.facebook.com/theprogrammer.harshit/
Now a days Internet has become a comman term among people and in it Google is one of the most widely used searched engine. So now some people What really a Search Engine is..? So Search Engine is basically a program or tools by which we are able to search anything on the Internet. There are many types of search engines available like... Google search, Yahoo Search, Bing, Duck Duck Go etc.. in them the Google is mostly used.
So now the question arises How Does a Google Search Works..? When you search anything on Google let us suppose you typed 'techtalksgroup'.
Basically it works in many stages, the first stage includes of
Crawling . Crawling is a method of fetching a web page that contains the keyword that you types to search. For example i told you that if i search techtalksgroup on google it will find everywhere on the web where the word techtalksgroup is located and it will collect it all. Now the next stage is of managing the web page in particular order.
Indexing. Now under Indexing stage it will arrange the pages collected in a sequence like the most searched page will be indexed first and , the pages which exactly matches with the keyword will indexed first etc.. Now the third stage is of just serving the page what you typed.
Serving. Now serving comprises of showing the pages and links infront of you what you have searched for.. So there is basically an AI based algorithm know as Page rank. PageRank is the measure of the importance of a page based on the
incoming links from other pages. In simple terms, each link to a page on
your site from another site adds to your site's PageRank.
thats it guys...
---------------------------------------------
I use mCent Browser to surf the net and earn points for free recharge. Install from Google Play: https://browser.mcent.com/r/IcGhMDOtSMib5Deybu2xYQ
So thats it. Hope you guys like it. If yes then please .. comment down
below and do not forgot to like follow and share our social media
platforms.
Facebook Page:- https://www.facebook.com/theprogrammer.harshit/
Now a days most of the people use Internet and perform some critical activities thinking of that after deleting their history or clearing their Browsing data they will not get caught.
But that's not True. Some people use to say that After i am dead please delete my Browsers history. Sounds funny .. But yes it is funny . Most of the people are unaware that after deleting their browsers history and cookies their data is still traveling on the Internet . But how..?
Let me give you an example . Suppose you create your Profile on Facebook or search something on Google after creating profile you delete you account and after searching something on Google just delete your Internet history and cache and cookies but the data is only deleted from your side ..!!
Yes that's true .. the data you deleted is just deleted from your side and your data which is kept safely on the Internet used by some Government, marketing and advertisements company for their profits. Yes they sell your data . It is still illegal in some countries like in Europe but in US after during 2017 its legal. And also the ISP i.e internet service providers also has the record of what you are surfing . but it can easily tricked. if you use some methods to remain anonymous.
So thats it. Hope you guys like it. If yes then please .. comment down
below and do not forgot to like follow and share our social media
platforms.
Facebook Page:- https://www.facebook.com/theprogrammer.harshit/