Posts

What is ICANN i.e Internet Corporation Assigned Name and Numbers.

Image
To reach another person on the Internet you have to type an address into your computer - a name or a number. That address has to be unique so computers know where to find each other.  ICANN  coordinates these unique identifiers across the world. Without that coordination we wouldn't have one global Internet. ICANN  was formed in 1998. It is a not-for-profit partnership of people from all over the world dedicated to keeping the Internet secure, stable and interoperable. It promotes competition and develops policy on the Internet’s unique identifiers. ICANN  doesn’t control content on the Internet. It cannot stop spam and it doesn’t deal with access to the Internet. But through its coordination role of the Internet’s naming system, it does have an important impact on the expansion and evolution of the Internet. What is the domain name system? The domain name system, or  DNS , is a system designed to make the Internet accessible to human beings. The mai...

4 Best Linux Mini PC

Image
If you want a portable solution of    We your  Linux  Machine, Linux Mini PC is the best solution for you.Because these are easy to handle,need low power consumption,fit on a small space and can operate with Open-Source Operating System. Not all Linux Mini PC are created as same and it can be confusing to understand which one is right for you.No problem just go for the  Best Linux Mini PC  and find the right one for your needs. In this guide, I will show you some exclusive Linux Mini PC that actually fulfilled your portability needs.       Best Linux Mini PC Comparison CompuLab Mint Box Processor 1.00 GHZ (Quad-Core) RAM 4 GB Stroage 64 GB SSD Built-IN OS Linux Mint ASUS Chromebox Processor 1.4 GHZ (Dual-Core) RAM 2 GB Stroage 16 GB SSD Built-IN OS Google Chrome OS Azulle Quantum Byte Processor 1.33 GHZ (Quad-Core) RAM 2 GB Stroage 32 GB eMMC Built-IN OS Windows 8.1 Jide Remix Mini Processor 1.6 GH...

Key Concept about Malware Analysis.

Image
The method by which malware analysis is performed typically falls under one of two types: Static malware analysis:  Static or Code Analysis is usually performed by dissecting the different resources of the binary file without executing it and studying each component. The binary file can also be disassembled (or reverse engineered) using a disassembler such as IDA. The machine code can sometimes be translated into assembly code which can be read and understood by humans: the malware analyst can then make sense of the assembly instructions and have an image of what the program is supposed to perform. Some modern malware is authored using evasive techniques to defeat this type of analysis, for example by embedding syntactic code errors that will confuse disassemblers but that will still function during actual execution. Dynamic malware analysis:  Dynamic or Behavioral analysis is performed by observing the behavior of the malware while it is actually running on a host ...