Saturday 24 August 2019

eMMC vs SSD ?? What's the Difference. Check it Out.!! || tech talks group ||


If you're shopping for a new laptop, there are a lot of factors to think about. One of the most important aspects to consider is the kind of storage a laptop offers. Your average laptop (whether it's a 2-in-1, big and expensive, or budget-friendly and compact) will most likely sport either eMMC storage or SSD storage, but how are they different? Keep reading to learn more about eMMC hard drives vs. SSD hard drives.

What Is eMMC Storage and How Does It Work?

eMMC (embedded MultiMediaCard) storage is a form of internal storage made up of a controller and NAND flash memory, both of which are located in one integrated circuit. eMMC storage chips are usually embedded in a given device's motherboard. The controllers housed within eMMC chips have the ability to put data into storage, which, according to SearchStorage, allows the device's CPU to conserve its already limited speed and power for other computing tasks. In addition, eMMC's use of NAND flash memory also requires little to no power from the device to hold onto data.


Unsurprisingly, the fact eMMC chips are able to perform with little to no power drawn from their devices goes hand-in-hand with the fact that eMMC chips are generally found in PCs and mobile devices that have limited power, performance, and speed; especially when compared with more expensive, fully-featured laptops. In fact, you'll normally find eMMC chips in compact/budget laptops, Chromebooks, tablet PCs, 2-in-1s, and even smartphones and tablets.

WHEN SHOULD YOU BUY EMMC STORAGE?

If you're looking for something portable with a lower price point, a PC with eMMC storage may be worth considering. And, as Windows Central points out, PCs with eMMC storage may also be best for those who already own an external hard drive, have a cloud storage subscription, or can at least afford a cloud storage subscription. This is because PCs with eMMC storage tend to have smaller storage capacities available. So, if you need to store a lot of files and other data, you'll need to have an external storage option if you still plan to use an eMMC PC.


Another thing to consider is how you plan to use your laptop. Laptops featuring eMMC storage are generally best for those who plan to use them for web browsing and streaming media and not much else. They're not really built for labor-intensive tasks.

What Is SSD Storage and How Does It Work?

SSD (solid-state drive) storage is a type of internal storage that consists of a number of flash memory chips, a circuit board, and usually either a SATA or PCIe interface that moves data and provides an SSD with power.

Unlike more traditional hard drives, SSDs don't require moving parts like drive motors to read data. The lack of moving parts in SSDs means they don't need as much power to read data and can do so much faster than hard drives. And, like eMMC storage, SSDs use NAND flash memory, which enables SSDs to use less power when storing data.


SSDs are usually found in bigger, more fully-featured laptops or desktop computers. These computers also tend to be more expensive and have larger storage capacities than eMMC computers and mobile devices. The larger storage capacities are due to the fact that SSDs have larger sizes available.

WHEN SHOULD YOU BUY SSD STORAGE?

Customers who need a fully-featured laptop that can handle a wide variety of computing tasks (web browsing, watching movies, gaming, and productivity tasks) would probably be best served by a laptop that has SSD storage.

Due to the fact the SSDs often offer large storage capacities, SSDs are best for those who plan on storing large files (or just more data in general) on their PCs.

Also, price is an important factor when considering SSDs. While they're often worth the money (SSDs tend to be faster, perform better, and can store more than eMMC devices), they also tend to be more expensive. They're generally not considered "budget laptops," but if your budget can support the cost of an SSD laptop, it may be worth the purchase.

How They Compare: eMMC flash vs. SSD

When comparing eMMCs to SSDs, there are three primary things to look at.

PERFORMANCE (SPEED/DATA TRANSFER SPEED)

eMMC devices and PCs aren't super slow, but they're generally considered to be much slower than PCs outfitted with SSD storage.

Currently, eMMC storage can reach up to a transfer speed of 400 MB/s, whereas the best SSDs (including high-performance PCIe SSDs), which vary widely in their read/write speeds, can have read speeds ranging from about 500 MB/s to over 3,000 MB/s. The best SSDs can also have write speeds that vary from about 300 MB/s to over 3,000 MB/s.

CAPACITY (STORAGE)

eMMCs also lose to SSDs in the battle for storage capacity. eMMCs have a much more limited storage capacity, but it kind of makes sense considering what they're used for. eMMCs are generally intended for lightweight, mobile devices and ultra-portable PCs.

eMMC devices mostly offer the following storage sizes: 32GB, 64GB, 128GB, and 256GB. SSDs, since they're intended to be used with full-featured laptops and desktop computers, can offer up to 1TB of storage or more.

PRICE

eMMCs finally score a victory against SSDs when it comes to price. While eMMCs have their limitations, they're also cheaper. There are many eMMC budget laptops that are less than $500, and a good number of those are even less than $300.

You can get new SSD laptops from online retailers (with a minimum of 512GB in SSD storage) starting at around $500 - $600. There are certainly SSD laptops that cost much more than that, even reaching into the thousands, but the pricing often depends on the type of SSD involved, storage size, and other computing features included in the laptop.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Any Idea About When Will The Life of Windows 10 Will Get End .?



Microsoft will not be implementing the same end of life process for Windows 10 that it has for previous versions of Windows. There is no forthcoming Windows version to install. Instead, Windows 10 users will need to continue allowing Windows 10 to update itself indefinitely. Older versions of Windows 10 will reach end of service, but this will be largely irrelevant for users who keep Windows 10 updated.

What Does End of Life Mean?

Previous versions of Windows were subject to Microsoft’s software lifecycle. Microsoft states, “Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it's no longer supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade or make other changes to your software.”

Why Is Windows 10 Different?

Windows 10 was developed to be an as-a-service application, meaning the user doesn’t have to worry about installing new versions or updates. The process is similar to, say, the browser that you use, which gets updated periodically without any effort on your part. These updates include regular improvements meant to make Windows easier to use.

How Can I Make Sure I Have the Latest Update?

If you’ve been using Windows 10 for some time, it’s likely you’ve noticed major or minor updates every few weeks. But if you’re still not sure, you can force Windows 10 to update by using the following procedure:
  • Go to Windows Settings.
  • Click Update & Security. 
  • You will be taken to a Windows Update screen.
  • At the top of the screen, check your update status. If you’re up-to-date, you don’t need to do anything else.
  • If you’re not completely updated, click Check for updates and follow the instructions from there.
  • Once you’re all updated you can modify other update settings from the Windows Update screen. Just click the links under Update settings and make adjustments according to your preferences.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Wednesday 21 August 2019

Security Bugs and Vulnerability - The Vulnerability Landscape


Cyber security is an arms race between offensive and defensive capabilities, and unfortunately, we are losing this battle. As users, we want better technology doing cooler things enabling us to do more. But the more we have, the more we rely on it,  and the more complex these systems become.
Complexity is the enemy of security. In fact, complexity is a nemesis of security,
which is one of the main reasons why we’re losing this arms race.
I’m going to get you up to speed on security bugs and vulnerabilities and how they
affect your security. A security bug and a vulnerability are actually the same thing. So they’re synonyms for each other. So if I say security bug or vulnerability, it’s the same thing. And it’s an
error. It’s an error written into software that creates a potential for a threat agent,
such as a hacker, to exploit it. So an example might be the recent Heartbleed bug which you may have heard about because it was on mainstream news. This is a bug in something called Open
SSL which enables the decryption of internet traffic sent to vulnerable sites. So for example, maybe you have a online bank. If it was susceptible to the Heartbleed bug, and when you were sending your username and password, somebody may, if the bug was in that bank, able to decrypt and get access to your username and password. Security bugs will always exist as long as humans write software. That might not be forever, but humans are fallible, so as long as humans write software, there’s going to
be security bugs. And it’s no surprise really if you consider something like the Windows operating
system. It’s made up of millions and millions of lines of code. Humans are fallable, we
will make mistakes, there will be security bugs. On the left here, you can see a diagram that represents your computer, and on the right, we have a diagram that represents the internet. On each side we have things that you care about.  Security bugs can exist in your operating system, firmware, applications, things like Outlook, your media player, Adobe Acrobat. In a particular risk, they can exist in your browser and the extensions and add-ons within the browser.  So for example, there can be a security bug in your Internet Explorer. You visit a website which has special code on it. You won’t see that this code is one there, and this will install malware on your machine and take it over through that vulnerability.
And maybe the consequences are that they choose to encrypt all your files and hold them to ransom until you pay the money to decrypt it, and that’s known as Ransomware. Because you have things you care about online, we have to consider the security bugs that exist on internet sites and on the internet infrastructure. So maybe you use Dropbox and there is a bug that is discovered by Dr. Evil on Dropbox, which gives him access to your files. And because Dropbox stores encryption keys, so encryption isn’t going to save you, he will then have access to your files. There are two main types of bugs. Really, it’s best to draw a distinction between, and those are the Known and Unknown bugs. So if we start with the Known bugs, known bugs of vulnerabilities have patches, and if you patch your system, you are safe against that bug. And we’ll cover the best and easiest way to do patching of all the things that need patching as we go through. And then you have the Unknown bug, also can be referred to as zero-days. These are much harder to protect against as there is no patch. So we’ll cover later techniques to protect against these, and these are referred to in the security industry
as a compensating control. I’m going to bring up a spreadsheet to give you a little bit more of an insight intothe world of the cyber criminal. Your budding, entrepreneur hacker doesn’t even need to be particularly skilled these days. He can go purchase an already made exploit kit. If you look at this spreadsheet, here along the top, these are the various popular exploit kits that are available at the moment and to purchase. And down here are the
various vulnerabilities, what they affect down here. And, as a budding, hacking entrepreneur, we can look through here and see which particular vulnerability we might want to use. Okay, we might want to exploit Internet Explorer, so there you go, we can use this one. And here we can see that this one allows the remote attacker to execute arbitrary code by a crafted website that triggers access to a detailed object. That really means that if you click on a link or go anywhere with an Internet Explorer browser, is susceptible to this vulnerability, they can take over your machine. And if we’re not feeling like potentially buying an exploit kit, you can look online for the exploit. And we can see here this is the code to run the exploit. So I hope that gives you a better idea about what security bugs are and vulnerabilities. And later on, we’re going to be going through the ways to mitigate against the Known vulnerabilities and the Unknown vulnerabilities.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Tuesday 20 August 2019

Spyware, Adware, Scareware, Pups & Browser Hijacking || tech talks group ||


Spyware have its main purpose is to gather information and send it back to the attacker, well, to
spy. The attackers don’t generally want to cause damage directly, but want to
compromise your privacy and anonymity based on some agenda they’ve got. Spyware
is intelligence gathering malware.

For example, a rootkit can also be a Trojan horse, someone could call spyware a
virus. The point is just to understand the variants that exist and the possible purpose
of the malware.

 Adware, which some people consider it to be a form of spyware. Is
undesirable software that forces advertisement on you. There are millions of different
variants of this. One of the most annoying and destructive form of adware is called
Cool Web Search. You may even have encountered it yourself, but there’s nothing
cool about it at all.

Know Your Enemy - The Current Threat and Vulnerability Landscape
It hijacks your default search engine, it displays ads in the browser, when you click
on links, it sometimes takes you to places that it wants you to go to instead of where
you want to actually go to, and it actively defends itself from being removed and
getting rid of it. So it’s particularly hard to shift. And there are many, many variants
of it that have affected millions of people.

When an adware or malware takes over your browser in this way, it’s known as
Browser Hijacking, and you might hear that term more throughout the course.
You should always pay particular attention when installing software because often,
a software install includes optional installs such as this browser hijacker that we’ve
just mentioned. So you can see here optional installs. And what you’ve got here is
installs that are going to be potential adware. So be very careful what you agree to
install.
Always opt for the custom installation and deselect anything that is not familiar,
especially optional software that you never wanted to download and install in the first
place. It goes without saying that you should not install software that you don’t trust.
Sometimes your device might come with adware preinstalled if you're particularly
unlucky. One of the worst cases was Lenovo preinstalling Superfish adware that not
only served you adverts based on what it knew about you from spying on you, it also
included a self-signed certificate allowing your browser TLS and SSL encryption to be
bypassed. So not very good of Lenovo there. In fact, I will never buy a Lenovo laptop
again because of that and all the rest of the things that Lenovo had done.

Scareware is a type of social engineering attack to trick a person into
believing in a threat that isn’t really real. So a common example is fake security
software claiming that you have malware infections or something like that. Often they
want you to pay something in order to fix the fake problem. These scams have been
extremely successful.
You can see here Personal Antivirus Software. It’s identifying all of these fake
vulnerabilities. And then it’s going to keep popping up, it’s going to keep causing
problems on your machine, and then people are fooled into paying for something to
remove the fake viruses.
And finally we have this catch all term. If it’s something that you might not have
wanted, these are called Potentially Unwanted Programs, or PUPs.
They’re called potentially unwanted because the antivirus companies and people
that attempt to remove these things aren’t quite sure whether you want them or not.
Most often, you don’t want them.
They’re annoying; the things that are bundled in with software. So again, they are
often bundled in with the software when you install, so you must make sure when
you install software, you go through the custom install and make sure you remove
any of these PUPs.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit