Posts

Showing posts from March, 2018

What is Port Forwarding.? How does it works.?

Image
Since an IP address can easily be traced by anyone, most people prefer using services, like VPN or proxies to hide or change their IP address. These services employ the Port forwarding feature to change the IP address of any device. Port forwarding, also referred to as Port tunneling, is a behind-the-scenes process of intercepting data traffic heading for a computer’s IP combination and redirecting it to a different IP. Usually, a VPN or proxy program is used to cause the redirection, but it can also be done via hardware components such as a router, proxy server, or firewall. This allows you to send requests to servers across the internet without other people knowing the original location or IP address of these requests, guaranteeing your privacy on the internet. How does port forwarding work? To send any request over the internet, packets of data are created and sent over the internet. These packets contain the details of your request, which also includes the dest...

Machine Learning VS Artificial Intelligence

Image
Now a days Artificial Intelligence and Machine Learning has become comman in day to day life. People usually get confused between Artificial Intelligence and Machine Learning  now today i am going to tell your briefly about Artificial Intelligence and Machine Learning. AI and machine learning are often used interchangeably, especially in the realm of big data. But these aren’t the same thing, and it is important to understand how these can be applied differently.   Artificial intelligence is a broader concept than machine learning, which addresses the use of computers to mimic the cognitive functions of humans. When machines carry out tasks based on algorithms in an “intelligent” manner,  that  is AI. Machine learning is a subset of AI and focuses on the ability of machines to receive a set of data and learn for themselves, changing algorithms as they learn more about the information they are processing.  Training computers to think like hum...

Difference between HTML and HTTP

Image
Many folks get confused between these two terms which are associated with the Web. Are they really same? First thing first. HTML is a Language while HTTP is a Protocol. Doesn’t make much sense..? it’s okay! We’ll discuss it in more detail. HTML ( H yper t ext  M arkup  L anguage) is a language for marking the normal text so that it gets converted into hypertext. Again, not so clear. Basically, HTML tags (e.g. “<head>”, “<body>” etc.) are used to  tag  or  mark  normal text so that it becomes hypertext and several hypertext pages can be interlinked with each other resulting in the Web. Please note that the HTML tags are used to help render web pages as well in the Browser. On the contrary, HTTP ( H yper t ext  T ransfer  P rotocol) is a protocol for transferring the hypertext pages from Web Server to Web Browser. For exchanging web pages between Server and Browser, an HTTP session is setup using protocol methods (e.g. G...

What are APIs..? How do they work..?

Image
What is an API? What exactly is an API? We hear about  how valuable APIs  are all the time; our founder, Ross Mason, often says that they will have a  significant impact  on business. However, what is the definition of an API? API stands for Application Programming Interface. An API is a software intermediary that allows two applications to talk to each other.  In other words, an API is the messenger that delivers your request to the provider that you’re requesting it from and then delivers the response back to you. An API defines functionalities that are  independent of their respective implementations , which allows those implementations and definitions to vary without compromising each other. Therefore, a good API makes it easier to develop a program by providing the building blocks. How do APIs work? Imagine a waiter in a restaurant.  You, the customer, are sitting at the table with a menu of choices to order from, an...

Ping V/s Traceroute

Image
In computer networks, data is sent in small blocks known as packets. Each packet is transmitted individually and may also follow different route to reach the destination. Once all these packets of the original message reach the destination, they are re-assembled to form the original message. But, sometimes, it may happen that the web server is down, network congestion or some other technical glitch is there, that may prevent the message from reaching the destination. To diagnose such congestions and network failures, we use two common programs namely Ping and Traceroute. Ping  – It is a utility that helps one to check if a particular IP address is accessible or not. Ping works by sending a packet to the specified address and waits for the reply. It also measures round trip time and reports errors. Ping is also used in checking if the computers on a local network are active. For this, the user has to go in command prompt and type : ping 127.0.0.1, and if the address is a...

Tips to protect small companies from Cyber attack.

Image
Are you the owner of a small company? If the answer is yes and you think no cyber attack will ever affect you, think again. In fact, there’s a higher risk of getting into trouble with hackers than if you were a big business, or even a medium-sized one. According to recent reports, more than 40% of cyber attacks are aimed at companies who employ under 500 people. A more worrisome study says that one in five small businesses are targeted by hackers. More often than not, these companies have to close down because their security plans are nonexistent or there’s too few of them to actually ensure complete protection. Cybersecurity is the most important way to make sure your business isn’t put in danger by malware attacks. Especially when the people behind them show no signs of backing down. Thus, putting strong security measures in place is, like we said, essential if you don’t want to lose your life’s work and your clients’ trust. After all, the latter expect their sensitive data to be...