Posts

Showing posts from April, 2018

Concept of Serverless Computing

Image
Technology is changing at breakneck speed. New concepts are coming in and old concepts are transforming. As a result, there is a lot of shift in the way people work with these technological advancements. And there is one technology that every developer should look is serverless computing. It is a buzz now, all Information technology firms are looking to cram into their organizations. Because it offers plenty of advantages that clearly bring a new set of opportunities. Serverless will fundamentally change how we build a business around technology and how you code – Simon Wardley What is Serverless computing? Everyone thinks the term ‘Serverless’ means not having servers, but it is not like that. The serverless computing means that everyone can build and run application and services without thinking about servers and its implementation and management. So, it is clear that serverless computing has servers but users and developers are unaware of it. With this fascinating te...

What are Botnets ? How do they works.?

Image
Botnets have become one of the biggest threats to security systems today. Their growing popularity among cybercriminals comes from their ability to infiltrate almost any internet-connected device, from DVR players to corporate mainframes. Botnets are also becoming a larger part of cultural discussions around cyber security. Facebook’s  fake ad controversy  and the  Twitter bot fiasco  during the 2016 presidential election worry many politicians and citizens about the disruptive potential of botnets. Recently published  studies from MIT  have concluded that social media bots and automated accounts play a major role in spreading fake news. The use of botnets to mine cryptocurrencies like Bitcoin is a growing business for cyber criminals. It’s predicted the trend will continue, resulting in more computers infected with mining software and more digital wallets stolen. Aside from being tools for influencing elections and mining cryp...

Capacitive V/S Resistive Touchscreens .

Image
Around some years the craze of using a touchscreen smartphones and tablets had increased rapidly due to it many companies had started making many types of touchscreen for customers to use the smartphones easily. But sometimes people get confused on which screen should they opt for either the Capacitive one or the Resistive one today we are going to tell some key difference between both the screen and,  How those screen works.? Capacitive Although the capacitive screen had come in 1960s but, it boosts the market in 2007 with Apple iPhone. Now  most of the devices such as Apple's iPad, some of the Samsung Galaxy Series smartphones and Amazon Kidle Fire. The Capacitive screens are based on the principle of Capacitance, a measure of electric charge. How it Works  ....?                Capacitive Screen sense the tiny amount of electric charge on your skin that is produced when your finger interacts with the screen's elect...

What is SEO, And 5 ways to increase the ranking of your site.

Image
SEO stands for "Search Engine Optimization " that means how to optimize your websites according to the results of search engines. For better understanding of how does and SEO works click on link to understand here in this post we will basically talk only about the 5 ways by which we can increase the SEO of a blog or a website. LINK   -->>     WHAT IS SEO...? Five Ways to Improve your Site's Ranking (SEO) Follow these suggestions, and watch your website rise the ranks to the top of search-engine results. 1. Publish Relevant Content Quality content is the number one driver of your search engine rankings and there is no substitute for great content. Quality content created specifically for your intended user increases site traffic, which improves your site’s authority and relevance. Identify a keyword phrase for each page. Think about how your reader might search for that specific page (with phrases like “mechanical engineering in Michigan,”...

Want to Know how can you hide your personal files into an Image in Linux.

Image
Now a days everyone has some of his personal stuffs that he didn't want to share with anyone neither with his parents nor with his friends or with anyone. So if you have want your personal files not come in any hand then best idea is to hide that file into an image rather than hiding it by using the traditional methods. So now i am going to tell you some steps by following which you can easily hide your personal files into an image. Step 1: Get an image in which you want to hide your file and the file at one place , Let us assume        that  you have placed it in your desktop. Step 2: Make a ZIP File at the same location where you have placed your image and the personal file. At the same location i had said so that it will be easy for you to manage. I assume that you have    choosen the desktop. Step 3: Open the terminal and move to that location you have kept the file. Step 4: Now type the following command.         ...

How to install nmap in Kali Linux and Windows.

Image
Nmap ("Network Mapper") is a free and open source ( license ) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer ( Zenmap ), a flexible data transfer, redirection, and debu...

Concept behind 3D Holographic Projection

Image
Three-dimensional holographic projection technology  is based on an illusionary technique called Peppers Ghost. It was first used in Victorian theatres across London in the 1860s.  3D holographic projection technology clearly has a big future ahead. Holographic projection is the new wave of technology that will change how we see things in the modern era. Three-dimensional holographic projection technology will have tremendous effects on all fields of life including business, education, science, art, and healthcare. To understand how a  3D holographic projector works we need to know what a hologram is. Holography is the method we use to record patterns of light. A  3D holoprojector  uses holographic technology to project large-scale, high-resolution images onto a variety of different surfaces, at different focal distances, from a relatively small-scale projection device.   The  working of holography  is divided into two phases:...

Everything you must know about RFID Technology.

Image
RFID is abbreviation of Radio Frequency Identification. RFID signifies to tiny electronic gadgets that comprise of a small chip and an antenna. This small chip is competent of accumulating approx 2000 bytes of data or information. RFID devices is used as a substitute of bar code or a magnetic strip which is noticed at the back of an ATM card or credit card, it gives a unique identification code to each item. And similar to the magnetic strip or bar code, RFID devices too have to be scanned to get the details (identifying information). A fundamental advantage of RFID gadgets above the other stated devices is that the RFID device is not required to be placed exactly near to the scanner or RFID code reader. As all of us are well aware of the difficulty which store billers face while scanning the bar codes and but obviously the credit cards & ATM cards need to be swiped all though a special card reader. In comparison to it, RFID device can function from few feet away (approx 20 fee...

Facebook confirms that it spies messenger data.

Image
Facebook revealed this week that it’s scanning users’ Messenger conversations – including text chats, pictures, and links – in an effort to ensure that people play by its rules. CEO Mark Zuckerberg first spilled the beans in  an interview with Vox’s Ezra Klein , in which he brought up an incident surrounding ethnic cleansing in Myanmar, and explained that the company’s systems “detect what’s going on” when people try to send sensational messages via Messenger, and Facebook “stops those message from going through.” The company  told Bloomberg  that it analyzes Messenger conversations the same way it does with public content on the social network, with a view to prevent abuse. Messages that are flagged for violating Facebook’s community standards are read by moderators, who can then block or take them down if needed. A spokeswoman said: For example, on Messenger, when you send a photo, our automated systems scan it using photo matching technology to detect kn...