Posts

Key Concept about Malware Analysis.

Image
The method by which malware analysis is performed typically falls under one of two types: Static malware analysis:  Static or Code Analysis is usually performed by dissecting the different resources of the binary file without executing it and studying each component. The binary file can also be disassembled (or reverse engineered) using a disassembler such as IDA. The machine code can sometimes be translated into assembly code which can be read and understood by humans: the malware analyst can then make sense of the assembly instructions and have an image of what the program is supposed to perform. Some modern malware is authored using evasive techniques to defeat this type of analysis, for example by embedding syntactic code errors that will confuse disassemblers but that will still function during actual execution. Dynamic malware analysis:  Dynamic or Behavioral analysis is performed by observing the behavior of the malware while it is actually running on a host ...

Concept of Serverless Computing

Image
Technology is changing at breakneck speed. New concepts are coming in and old concepts are transforming. As a result, there is a lot of shift in the way people work with these technological advancements. And there is one technology that every developer should look is serverless computing. It is a buzz now, all Information technology firms are looking to cram into their organizations. Because it offers plenty of advantages that clearly bring a new set of opportunities. Serverless will fundamentally change how we build a business around technology and how you code – Simon Wardley What is Serverless computing? Everyone thinks the term ‘Serverless’ means not having servers, but it is not like that. The serverless computing means that everyone can build and run application and services without thinking about servers and its implementation and management. So, it is clear that serverless computing has servers but users and developers are unaware of it. With this fascinating te...

What are Botnets ? How do they works.?

Image
Botnets have become one of the biggest threats to security systems today. Their growing popularity among cybercriminals comes from their ability to infiltrate almost any internet-connected device, from DVR players to corporate mainframes. Botnets are also becoming a larger part of cultural discussions around cyber security. Facebook’s  fake ad controversy  and the  Twitter bot fiasco  during the 2016 presidential election worry many politicians and citizens about the disruptive potential of botnets. Recently published  studies from MIT  have concluded that social media bots and automated accounts play a major role in spreading fake news. The use of botnets to mine cryptocurrencies like Bitcoin is a growing business for cyber criminals. It’s predicted the trend will continue, resulting in more computers infected with mining software and more digital wallets stolen. Aside from being tools for influencing elections and mining cryp...

Capacitive V/S Resistive Touchscreens .

Image
Around some years the craze of using a touchscreen smartphones and tablets had increased rapidly due to it many companies had started making many types of touchscreen for customers to use the smartphones easily. But sometimes people get confused on which screen should they opt for either the Capacitive one or the Resistive one today we are going to tell some key difference between both the screen and,  How those screen works.? Capacitive Although the capacitive screen had come in 1960s but, it boosts the market in 2007 with Apple iPhone. Now  most of the devices such as Apple's iPad, some of the Samsung Galaxy Series smartphones and Amazon Kidle Fire. The Capacitive screens are based on the principle of Capacitance, a measure of electric charge. How it Works  ....?                Capacitive Screen sense the tiny amount of electric charge on your skin that is produced when your finger interacts with the screen's elect...