Posts

Setting Up Your Own Virtual Private Network

Image
VPN i.e  Virtual Private Ne twork   is  a network that helps you to creates a virtual tunnel between your computer and a server to exchange data. It is private because it is supposed to require a username and a password to be accessed and it is a network because it links more devices to one or more servers all over different locations. A VPN helps you surf the web anonymously for two reasons: the websites you visit, see the VPN server’s ip, not yours. VPN basically encrypts all the traffic before ISP (internet service provider) can intercept it. There are free versions and paid ones. But still the VPN provider can read your traffic. So you have to trust someone one way or another. What if you could set up your own VPN instead ? It would be totally free and totally (really ?) secure.  There are many ways to setup a private virtual private network . Some softwares are also available that provide you to create your own network some of them are mentione...

How does WannaCry, Petya and Other Ransomware spread so fast.

Image
For thousands of people, the first time they heard of “ransomware” was as they were turned away from hospitals in May 2017. The WannaCry outbreak had shut down computers in more than 80 NHS organisations in England alone, resulting in almost 20,000 cancelled appointments, 600 GP surgeries having to return to pen and paper, and five hospitals simply diverting ambulances, unable to handle any more emergency cases. But the outbreak wasn’t the birth of ransomware, a type of computer crime which sees computers or data hijacked and a fee demanded to give them back to their owners. Some of the earliest ransomware claimed to be a warning from the FBI demanding a “fine”, simply tricking users into paying up, or blackmailing them with accusations of trafficking in child abuse imagery. Their tactics didn’t work for long. Bank transfers were easily tracked, cash payments were difficult to pull off, and if any variant got successful, people would trade tips on how to defeat it rather ...

Top 10 Hottest Artificial Intelligence technologies till yet.

Image
Now in today's fast growing technologies where people want more outcome in less duration of time Artificial Intelligence is playing an important role. Now today I am going to tell you about some high tech advance technologies till yet in Artificial Intelligence. Natural Language Generation : Producing text from computer data. Currently used in customer service, report generation, and summarizing business intelligence insights. Sample vendors: Attivio, Automated Insights, Cambridge Semantics, Digital Reasoning, Lucidworks, Narrative Science, SAS, Yseop. Speech Recognition : Transcribe and transform human speech into format useful for computer applications. Currently used in interactive voice response systems and mobile applications. Sample vendors: NICE, Nuance Communications, OpenText, Verint Systems. Virtual Agents : “The current darling of the media,” says Forrester (I believe they refer to my evolving relationships with Alexa), from simple chatbots to advanced sys...

What is MD5 or Message Digest 5 Algorithm

Image
We are getting many requests  through emails, messages and on social media people are very much confused asking about how there passwords gets encrypted , and how does this encryption works, what are the algorithms used behind this encryption. So here i am going to tell you about one of the most widely used algorithm used for encryption known as MD5 or Message Digest Algorithm        Before we proceed to MD5 i want to tell you something about Cryptographic Hashing. Cryptographic Hashing MD5 stands for M essage D igest algorithm 5, and was invented by celebrated US cryptographer Professor Ronald Rivest in 1991 to replace the old MD4 standard. MD5 is simply the name for a type of cryptographic hashing function Ron came up with, way back in ’91. The idea behind cryptographic hashing is to take an arbitrary block of data and return a fixed-size “hash” value. It can be any data, of any size but the hash value will always be fixed.  Cryptograp...

Everything you Should Know About an IP-Addresses

Image
                                          You have heard of this term IP Address many times in day-to day life if you belong to IT sector, yes as soon as you heard about the term IP only one thing that stucks in your mind is the IP of a computer which you people might have seen. But what this IP actually is….?? IP address, or “internet protocol address”, is a unique identifying number given to every single computer on the Internet. Like a car license plate, an IP address is a special serial number used for identification. NOTE:- An IP Address is different from a MAC Address or an Domain Name address Any machine connected to the Internet has an IP address  Xbox games, cell phones, fax machines, and even soda pop dispensers have IP addresses. In every case, the IP ...

How Cloud Computing Works.

Image
                               Let’s say you’re an executive at a large corporation. Your particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs. Buying computers   for everyone isn’t enough — you also have to purchase software or   software licenses   to give employees the tools they require. Whenever you have a new hire, you have to buy more software or make sure your current software license allows another user. It’s so stressful that you find it difficult to go to   sleep   on your huge pile of money every night. Soon, there may be an alternative for executives like you. Instead of installing a suite of software for each computer, you’d only have to load one application. That application would allow worke...

What are Virtual Machines..?

Image
A virtual machine uses a combination of software and your existing computer to emulate additional computers, all within one physical device. Virtual machines provide the ability to emulate a separate operating system (the guest), and therefore a separate computer, from right within your existing OS (the host). This independent instance appears in its own window and is typically isolated as a completely standalone environment, although interactivity between guest and host is often permitted for tasks such as file transfers. Everyday Reasons For Using a Virtual Machine There are many reasons why you may want to run a VM, including developing or testing software on various platforms without actually utilizing a second device. Another purpose could be gaining access to applications that are native to an operating system different than your own. An example of this would be wanting to play a game exclusive to Windows when all you have is a Mac. EntSennheiser ...