Tuesday, 13 June 2017

Difference between Coder Programmer and a Developer


Maybe you have heard about these job titles in the past, but what exactly is the difference between them? Some people claim that it mostly depends on your education and on what you have achieved; in some way, this may be true, but some others claim that sometimes the company you are working for decides if you are a programmer, a developer or other, making it merely a job title. Let’s take a closer look to this.

 

 What is the exact difference Between a coder, a programmer, and a developer ?

 

1:  Coder :


A Coder is a person in charge of writing the code that makes most of our apps run properly. Those who are coders have the ability to create software that can be used not only in apps but also in video games, social media platforms, and many others. Coders sometimes cannot do all the phases required in the making of a software, like designing or testing, they mostly take part only in the phase of writing the base code. In some cases, there are people who may get offended If you call them a coder.

 

2:  Programmer :

 

A Programmer is a bit more specialized person. They are able to create computer software in any primary computer language, like Java,Python, Lisp, etc. Programmers are said to go beyond coders, they may specialize themselves in one area or may even write instructions for a wide variety of systems.
They also understand quite well algorithms. Programmers can be similar to Developers but the ones who implements are not the same as the ones who can design or do a well class structure within the software. They can take care of many details.

3: Developer :


A Developer can write and create a complete computer software out of nowhere taking care of the design and other features. They are key for the development of any software applications; they are also experts in at least one programming language. Some people consider them true professionals that can take care of all the generals. Developers can sometimes be more general when it comes to the development of a software, unlike Programmers.


Chance To Get $200,000 by Google , MUST READ..!!


If you are a hacker or a security researcher, that is probably going to be a good news for you. Google Will now Pay you Up to $200,000 if you Find any Bug in it’s Android OS. A few days ago, a malware called “Judy” hit over 36.5 million Android-based phones and caused a lot of damage. So, Google has decided to increase the bounty for finding a bug in Android OS to as much as $2,00,000.
According to cyber security firm Check Point, dozens of malicious apps were downloaded between 4.5 million to 18.5 million times from the Play Store. It was noted that the malicious code was present hidden in some apps since April 2016, undetected by Google. Google has now removed the infected apps from the PlayStore. “Judy” is one such case of how an open and free mobile operating system (OS) can be exploited by malicious app developers.
Tech companies such as Apple, Facebook, Microsoft, and Google have paid out millions of dollars in bug bounty programs over the past few years. Google started the bug bounty program for Android about two years ago in which the security researchers, who demonstrate an exploit, get a cash prize — the amount of which varies based on the severity of the hack. Since then the reward value has been increased from $50,000 to up to $200,000.
The increased reward applies to two bounties: one for vulnerabilities in TrustZone or Verified Boots, and the other for a remote Linux kernel exploit. Among them, TrustZone or Verified Boot is a matter of serious concern than the Linux exploit, as reported by Extreme Tech. TruztZone is chipset related technology, which ensures biometric data, DRM and boot settings are kept in a trusted secure environment. On the other Verified Boot is software related, to ensure the OS has not tampered with each time a device starts up. Google has increased the bounty for both TrustZone and Verified Boot from $50,000 to $200,000.

Monday, 12 June 2017

Three Simply Ways To Get Cash Rewards From Google


Google is built around data - and it probably knows a lot more about you than you think it goes. The good part about all this is that Google offers a lot of rewards to people who will volunteer data that it finds useful. This information isn't just used to advertise to you either - instead, sometimes Google wants data from users to build more detailed offerings that help all users.

But if you're in college and want to get a little extra cash to flaunt with your friends, there are limited options, and Google is definitely the most reputed company around in this field. So if you'd like to line up for some rewards, here are three different ways to get some cash out of Google.

1. Google Opinion Rewards

Google Opinion Rewards launched in India only last week, and it pays users in Google Play credits. Not so great if you're looking for extra talk-time to make calls, but if you've been eyeing a cool new Android game but don't want to put the cash down for it, then the opinion rewards program could be just what you need.


The Google Opinion Rewards Android app lets people answer a few survey questions, and rewards them with Google Play credits. This has been available in other countries for a while now, but now it's officially available in India as well. The surveys themselves are really short - sometimes just one or two questions - and there isn't always a survey that's available for you, but the questions themselves are pretty straightforward, so you'll get a little Google Play credit with almost zero effort.
Get Google Opinion Rewards on Google Play.

 2. Google Local Guides

Google Maps runs a program that it calls Local Guides. This allows you to contribute information to Google Maps on your phone - by answering questions, marking places, and adding photos and reviews of things around you - and all of this is quite cleverly gamified. But you don't just win virtual points for your efforts - as you level up, you earn more benefits, such as testing new products before anyone else, getting early access to features, and being invited to Google hosted events.


That's not all though - for example, on Friday, Google sent out a mail to all 'top' local guides, giving them a free month of Ola Select access, Ola's loyalty program that lets you book without surge pricing and gives you booking priority, lets you hire a Prime at Mini fares, and airport lounge access - that’s a benefit that’d otherwise cost you Rs. 539 per month.
The exact rewards keep changing and are fairly small, but Google Local Guides is a fun program that rewards points for small interactions and keeps you levelling up, which is enjoyable too.
Join Google Local Guides via the Web

3. Screenwise Media Panel

We've talked about this before, but Google's Screenwise Media Panel is a quick and easy way to earn some cash in the form of coupons from stores such as Myntra, Shopper's Stop, and Lifestyle. You don't have to do anything either - just install the app on your phone and you're done.


This lets Google track the sites you visit, the apps you use, and some other basic information on how you use them. You don't need to do anything extra for this - think of it as a Nielsen panel tracking your TV use.
The rewards vary, but you can earn up to Rs. 200 per month, just by keeping the app installed. You get Rs. 300 for signing up, and Rs. 100 for the first month, with an additional Rs. 10 increment each month up to Rs. 200 per month, as long as you keep the app installed. And you're getting your rewards for doing nothing at all.
Sign up for Screenwise Media Panel on the Web.
These are three easy ways to get some cash out of Google, though in each case, you do have to give up some information to the company.
 

Saturday, 10 June 2017

Japan police arrests a 14-year-old for creating ransomware

While the computers affected by the WannaCry ransonware around the world last month are still trying to return to normalcy, a 14 year-old teenager from Japan in the meanwhile was arrested on Monday for developing a malware similar to the WannaCry malware.
For those unfamiliar, WannaCry ransomware exploited a weakness in Microsoft’s Windows operating system and went on to infect more than 3,00,000 computers in 150 countries within 72 hours last month. The WannaCry ransomware cryptoworm encrypted data and demanded payment in virtual currency Bitcoin in exchange for a password to unlock data.
The 14-year-old boy, who is a secondary school student in Osaka Prefecture, is accused of creating a malware designed to infect and encrypt computers to financially exploit victims. The malware in question has been uploaded by the teenager on a foreign website that included instructions and procedures for the users to download, install and use it, according to sources quoted by the Kyodo news agency.

                                  The student living in the city of Takatsuki admitted to the allegations said that he wanted to test his ability as a programmer. He supposedly went on to learn and create the ransomware all by himself.
“I tested my skills, and I could make one,” he was quoted as saying to police.

He also said that he had participated in a computer skills class on how to assemble a personal computer while he was in elementary school, according to the sources. He collected all the necessary data from overseas websites to create the ransomware on his home computer in January, which took him about three days to complete it.
This ransomware, which has been downloaded more than 100 times, allowed a user to infect the victim’s computer, demanding in Japanese that a payment be made in digital currency. Apparently, the malicious malware created by the teenager has infected computers of about 100 users, who have been demanded a payoff, in the form of virtual currency. However, there have been no reports of financial exploitation.
The young boy, whose identity has not yet been revealed, also reportedly used social media to lure users into downloading the program for free.
The malware was discovered by the Kanagawa Prefectural Police during ‘cyber patrolling’ duties in January, who confiscated the teen’s computer during a house search in April, reports The Japan Times. The young boy revealed to the investigating authorities that he created the ransomware “out of curiosity” and because he wanted to “become famous.”

The users who downloaded the malware could also be charged with violating the law on “acquiring electromagnetic records by illegal command,” said the sources. This is the first arrest involving a ransomware-related crime in Japan, said police.

According to Trend Micro Inc., a major IT security provider, ransomware was found on more than 65,000 computers in Japan in 2016 alone, which is around 10 times more than the previous year.


For any queries contact comment us below...

How Does a GPS Works....??



 

The Global Positioning System (GPS) is a network of about 30 satellites orbiting the Earth at an altitude of 20,000 km. The system was originally developed by the US government for military navigation but now anyone with a GPS device, be it a SatNav, mobile phone or handheld GPS unit, can receive the radio signals that the satellites broadcast.
Wherever you are on the planet, at least four GPS satellites are ‘visible’ at any time. Each one transmits information about its position and the current time at regular intervals. These signals, travelling at the speed of light, are intercepted by your GPS receiver, which calculates how far away each satellite is based on how long it took for the messages to arrive.
Once it has information on how far away at least three satellites are, your GPS receiver can pinpoint your location using a process called trilateration.

 

Trilateration


Imagine you are standing somewhere on Earth with three satellites in the sky above you. If you know how far away you are from satellite A, then you know you must be located somewhere on the red circle. If you do the same for satellites B and C, you can work out your location by seeing where the three circles intersect. This is just what your GPS receiver does, although it uses overlapping spheres rather than circles.
The more satellites there are above the horizon the more accurately your GPS unit can determine where you are.

 

GPS and Relativity


GPS satellites have atomic clocks on board to keep accurate time. General and Special Relativity however predict that differences will appear between these clocks and an identical clock on Earth.
General Relativity predicts that time will appear to run slower under stronger gravitational pull – the clocks on board the satellites will therefore seem to run faster than a clock on Earth.
Furthermore, Special Relativity predicts that because the satellites’ clocks are moving relative to a clock on Earth, they will appear to run slower.
The whole GPS network has to make allowances for these effects –  proof that Relativity has a real impact.

Sunday, 14 May 2017

Teenagers Reaction towards Windows 95. MUST WATCH



 The majority of teenagers alive today weren’t alive in the 90s, meaning the oldest version of Windows they’re likely to be familiar with is Windows XP.

If that tidbit makes you feel old, you might not want to watch the latest React video from Fine Brothers Entertainment, in which a bunch of teenagers are exposed to the wonders of mid-90s computing and Windows 95 for the first time in their lives. They’re not impressed.

It starts with first impressions.
“The fact that the monitor is bigger than the actual computer itself says a lot” said Daniel, 17 years old, who is young enough to only have vague memories of monitors and TVs that aren’t flat.
“I’ve no clue what year this is from, but I feel like it was before the year I was born,” said Geneva, age 18, after seeing the mid-90s Dell. Her math checks out.

The design flaws we all got used to are evident right away. When asked to turn on the computer, everyone hit the big button on the monitor and waited, something we all probably remember doing at some  point. When the computer was turned on, the reactions kept coming.
“I don’t think I’ve ever heard a computer make these sounds before in my life,” said Morgan, age 19, making anyone who felt nostalgic upon hearing the floppy drive click instantly feel 10 years older.
Then the teens waited for the BIOS screen to go away.


“This is taking a while,” said Karan Brar, reminding the entire planet what life was like back in ancient times when computers took five minutes to start up and Pterodactylus savaged our cattle.
Things don’t get much better when the operating system’s boot screen is revealed.
“95, as in, like, 1995?” asked Alicia, age 16, who has no memories of the 90s but will be able to vote in just two years.
Then the operating system finally booted.
“Everything looks so dull and ancient,” said Brar.
“It seems more rough, the edges are more sharp, it’s a little more impersonal,” said Nora, age 18, who judging by that comment might have a future as a graphic designer.
But perhaps the hardest thing to understand for the teens was the lack of wireless connectivity.
“How do you get on the Internet if there’s no Wi-Fi?” asked Alicia, as though the question itself were nonsense.

 For any queries you can comment us below.

Friday, 12 May 2017

Some HP PCs are logging keystrokes by accident.



Privacy and security are hot topics lately given the amount of malware that is constantly circulating throughout the internet by criminals and even government agencies with the purpose of accessing our personal and business information. At the same time, information is sometimes gathered inadvertently that could nevertheless end up making its way to nefarious parties.
In many cases, issues arise where a function that is meant to make things easier for users ends up being poorly executed. One example of exactly that phenomena seems to have created by an audio driver that has shipped in a number of HP PCs.
Security firm Modezero discovered code in a Conexant audio driver that supports an HP feature that enables controlling audio hardware by using keyboard combinations that toggle features on and off. One example would be a hotkey for enabling and disabling the microphone.


This driver apparently intercepts and saves keyboard input in order to control the functionality. While it is meant to only grab onto the required key presses, it seems to grab all the key inputs and saves them to a file. Worse yet, the file is not encrypted, meaning it would be easy to access by malware in real time or after the fact.
modzero
Although the problem is somewhat mitigated by the fact that the file is overwritten after each start, the researchers note that it could exist in backup files and could thus be recovered well after the fact. You can check if your HP PC is affected by looking for the programs “C:\Windows\System32\MicTray64.exe” or “C:\Windows\System32\MicTray.exe” exist and renaming them if they do. If a “C:\Users\Public\MicTray.log” file exists, then that should be deleted.
We reached out to HP to get its take on the situation, and it provided the following response:
“HP is committed to the security of its customers and we are aware of an issue on select HP PCs. HP has no access to customer data as a result of this issue. We have identified a fix and will make it available to our customers.”
This is obviously a mistake on the part of the driver developers and, hopefully, HP will resolve the issue soon. We note that there is no evidence that any malware or other software has made use of the data that is collected by the driver and so there is no reason to panic at this point. Nevertheless, keep an eye out for an update from HP, which should then be implemented as soon as possible.

For any queries comment us Below...