Tuesday, 5 June 2018

How to protect your device from Hackers.


Malicious attackers can take over your device—whether it's a laptop computer, a desktop PC, a smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. This animation explains a few of the ways computers get taken over (or “pwned," “0wned,” etc.), and how you can protect yourself.

1. An email attachment that contains malware: You can get tricked into running a program by clicking on an email attachment that appears innocent, but is actually infected with malware. Malware can turn on your computer’s microphones and broadcast your conversations, record your screen, watch what you type on your keyboard, copy files, or even insert false records. Be very careful opening strange email attachments and double check with the person who sent it before you open it if you’re unsure.

2. A malicious weblink: It’s possible to infect a computer with malware remotely just by visiting a webpage (sometimes called a “drive-by download”). If a link prompts you to install software, don’t agree. And if your web browser or a search engine warns you a site may be malicious, hit the back button.

3. USB or Thunderbolt connector: Attackers can copy over a malicious program or otherwise take over your machine by plugging in a USB or Thunderbolt connector. The same goes for CDs and DVDs. Sometimes they will contain a program (autorun.exe) that runs automatically so your computer will be infected immediately if you insert the disc. So be careful what you put in or attach to your computer, and if you want it to stay secure, don't give strangers access to your device.

Remember, modern computers are designed to fend off these malware attacks. As long as we keep building them as such, you’ll have a chance to fight back against being 0wned. Find tips for detecting attacks on your computer in our guide on malware.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Wednesday, 23 May 2018

An Overview about End-to-End Encryption


In todays fast growing world, security of his/her datat is the first priority of every user. So today we are going to give a brief introduction on End-to-End Encryption. End-to-End Encryption is a way of encrypting and decrypting data using the concept of cryptography.      So as the name says End-to-End Encryption refers to encrypting and decrypting of data on both the ends.Suppose a data is going to travel on the internet from a mobile phone, so first it will gen:erate two key , first is Pubic key and second is Private key.    The private key always remains in the phone, but the public key remains at the server.When a data is requested from the server the public key gets activated for that particular mobile phone from which it is generated. The Public key encrypts the data that come from the server in that way that only private key of that particular phone can only decrypts it.
Getting little bit confused ...!!
Lets take an example to clarify...
Suppose there is a messaging app in your mobile phones that uses End-to-End Encryption for protecting your privacy. Now while opening the acoount or Signing Up that app generated two key, first Public Key that will move to the server of that messaging app and the second key that  will remain in that mobile phone only.        So now when someone sends you a message that message will get encrypted by the Public key in that way that only Private key of that account can decrypt it. Now the encrypted file that contains the message is sent through the server to the mobile phone where the private key is already remaining there for decrypting it. So thats it for my self...

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Tuesday, 22 May 2018

An Overview About Google Duplex



Some days before at Google I/O 2018 we have seen a new way of assisting life, which is going to book an appointment instead of you yourself do it, Yes that's True, Google is developing an efficient Artificial Intelligence for communicating with the shop owner or any other person who is going to take an appointment in a way normal person use to take.

What is Google Duplex ?

It's a new tool from Google that aims to use Artificial intelligence (AI) to "accomplish real-world tasks over the phone" according to Google's AI researchers and developers. For now, that means very specific tasks like making appointments, but the tech is being developed with an eye on expansion into other areas. Spending billions to create a cool way to make dinner reservations sounds like something Google would do but isn't a great use of time or money.Duplex is also more than we saw in a demo and if it ever leaves the lab will be a lot more than we see or hear on our end. There are huge banks of data and the computers to process it involved that aren't nearly as cool as the final result. But they are essential because making a computer talk and think, in real time, like a person is hard.

How does Google Duplex Work ?

From the user end, it's as simple as telling Assistant to do something. For now, as mentioned, that something is limited to making appointments so we would say, "Hey Google make me an appointment for an oil change at Joe's Garage for Tuesday morning," and (after it reminded us to say please) it would call up Joe's Garage and set things up, then add it to your calendar.
                     Duplex is using what's called a recurrent neural network. It's built using Google's Tensor-flow Extended technology. Google trained the network on all those anonymized voicemails and Google Voice conversations you agreed to let it listen to if you opted in with a mix of speech recognition software and the ability to consider the history of the conversation and details like the time of day and location of both parties.

Essentially, an entire network of high-powered computers is crunching data in the cloud and talking through Assistant on your phone or other product that has Assistant on board.

Where can I learn more?

Google is surprisingly open about the tech it is using to create Duplex. You'll find relevant information at the following websites:
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Saturday, 19 May 2018

Had you ever thinked, How does an IP Address is assigned to a device..?


Every device connected to the internet is assigned an IP address when you connect. When you connect with your phone or computer or chosen device, your ISP assigns you an IP Address so you can browse, shop, and navigate the internet.

Who created Internet Protocol (IP) addresses?

Vint Cerf the “father of the internet” was one of the creators of IP addresses. He created it while working for the US Department of Defense's Advanced Research Projects Agency (DARPA).
Code.org and Mr. Cerf explain the creation of IP address.

There are a few organizations involved in IP addresses.

ICAAN - The Internet Corporation for Names & Numbers - They’re the top level and they govern over IP - the internet protocol, and run the policies behind it.
From there it flows down to IANA - Internet Assigned Numbers Authority. IANA is a department of ICAAN that co-ordinates and maintains the number systems that keep the internet running like IP addresses & DNS.
Next step is region specific organizations that hold onto the IP addresses that provide registration and management of them, North America for example is ARIN.
Once at ARIN, ISPs (Internet Service Providers) or organizations can contact them to register an IP address or a block of IP addresses which is where you come in.
How IP Addresses are assigned
You then purchase a connection from an ISP or head to your local Starbucks and connect to the internet - voila!
IPv4 addresses were distributed from ICANN through IANA and then through to your regional internet registry where your ISP or company can coordinate from there and you connect to it!

Some organizations govern their own block of IP addresses

Based on that the internet was originally used by the US Military it makes sense on these and with IPv6 there are whole blocks that are taken up by Google, Facebook and the like as the original IP spec and those IPv4 blocks were handed out in the 90s.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Saturday, 12 May 2018

How does a WiFi Work..?


Do you ever have that moment where you step back and think about how something you use every day actually works? More specifically have you ever wondered how the heck computers actually communicate wirelessly?
Well, that's exactly the question we're going to be tackling in today's podcast. >

What Is WiFi?

First, let's cover some of the basics. WiFi stands for Wireless Fidelity and is the same thing as saying WLAN which stands for "Wireless Local Area Network."
WiFi works off of the same principal as other wireless devices - it uses radio frequencies to send signals between devices. The radio frequencies are completely different say from walky talkies, car radios, cell phones, and weather radios. For example your car stereo receives frequencies in Kilohertz and Megahertz range (AM and FM stations), and WiFi transmits and receives data in the Gigahertz range.
To break it down even further, Hertz (Hz) is simply a unit of frequency. Let's say you're standing on a pier watching waves come in. As you look down at the waves you can see the crest of each wave roll on by. If you counted how many seconds between each wave crest this would be the frequency of the waves. So if the time between each crest was 1 second that would meant the wave frequency was 1 hertz or one cycle per second.
Comparing sea waves to Mhz and Ghz, these waves are moving at 1 million and 1 billion cycles per second in the air! And to receive the information found in these waves, your radio receiver needs to be set to receive waves of a certain frequency.
For WiFi this frequency happens to be 2.4Ghz and 5Ghz. These waves are very similar to the frequency found in your microwave! Your microwave uses 2.450Ghz to heat up food and your router uses 2.412 GHz to 2.472 GHz to transmit your data over WiFi. This is why some people with old or faulty microwaves experience a problem with their WiFi signal when they try to make popcorn.
Just to clear up a popular misconception: These microwaves are non-ionizing radiation. That means that they do not cause cancer. That’s right kids, microwaves will not make you radioactive and glow in the dark!

How Does WiFi Work?

I mentioned before that WiFi uses both 2.4Ghz and 5Ghz frequencies. Generally older devices only have 2.4Ghz because that was the standard before 5Ghz came out.  
But whether you are in the 2.4Ghz range or the 5Ghz range, there will be a set of channels your router will communicate on. These channels are a slightly different frequency from one another and they allow multiple routers to communicate in the same area without causing a lot of traffic. Just picture yourself driving on the freeway - if there was only one lane, it would cause a traffic jam; but with multiple lanes traffic flows smoothly.
You've probably noticed that you don’t have to worry about setting channels or anything when connecting to WiFi. That's because this is usually set up automatically when you connect your router. Your computer and router will work out the details between them.
Just for your reference, 2.4Ghz has around 12 channels and 5Ghz has around 30 channels. I say around because the number of channels is dictated by the country you are in.
So now we know that radio waves can fly through the air and pass through a lot of things on their way to your router and wireless device. These waves are also high in frequency, which allows them to carry a lot more data than most other radio frequencies. This high speed and high capacity is what allows you to watch Netflix on your smartphone and laptop while being several rooms away from your router.
But the real magic of WiFi has to do with the processing that happens on the end of your WiFi chip. Each device's WiFi chip converts 0’s and 1’s into radio waves to be sent out unto their destination, while at the same time converting a steady stream of 0’s and 1’s into data that your device can interpret as email, web pages, or anything else that you do on the web.
Let’s take a look at a standard wireless router that has a transfer speed of 54mbps (that’s megabits per second). As I’ve mentioned before, a bit consists of a 1 or a 0. At any given point while you’re using a wireless device, your wireless chip is transferring and receiving 54 million 1’s or 0’s in a single second. That would be about 13,000 pieces of paper, if printed out.
Needless to say it’s pretty impressive.
These 1’s and 0’s are the same signals that your wireless device would send if it were directly connected to your network with a wire. At this point your router considers your device to be exactly like any other device on the network. All of the communication is the same, your router just has to decide whether or not to send the signal over a wire or wirelessly using its radio.
So to sum it all up, when you use your laptop, all of your internet traffic is converted into 1’s and 0’s which is then sent to your device’s wireless chip. From there your wireless chip converts the 1’s and 0’s to into a radio frequency. Your router receives the signal and converts it back to 1’s and 0’s and then into the traffic from your device.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

An Overview of GDPR Law for Data Protection

The General Data Protection Regulation (GDPR) standardizes data protection law across all 28 EU countries and imposes strict new rules on controlling and processing personally identifiable information (PII). It also extends the protection of personal data and data protection rights by giving control back to EU residents. GDPR replaces the 1995 EU Data Protection Directive, and goes into force on May 25, 2018. It also supersedes the 1998 UK Data Protection Act.
There are many essential items in the regulation, including increased fines, breach notifications, opt-in consent and responsibility for data transfer outside the EU. As a result, the impact to businesses is huge and will permanently change the way customer data is collected, stored, and used.
GDPR applies to all organizations holding and processing EU resident’s personal data, regardless of geographic location. Many organisations outside the EU are unaware that the EU GDPR regulation applies to them as well. If an organization offers goods or services to, or monitors the behavior of EU residents, it must meet GDPR compliance requirements.


Fines for noncompliance are large. They can be as high as €20 million or 4% of a company’s total global revenue, whichever is larger. This is the maximum fine that can be imposed for the most serious violations, e.g. not having sufficient customer consent to process data or violating core Privacy by Design concepts. However, there is a tiered approach to fines, e.g. a company can be fined 2% for not having their records in order, not notifying the supervising authority and data subject about a breach, or not conducting an impact assessment. It is important to note that these rules apply to both controllers and processors.
Egnyte helps customers achieve GDPR compliance by placing industry-leading content collaboration and data governance at the core of their strategy. Our SaaS solution shows exactly where data resides across a network, identifies personal/private and sensitive data, and reports that information quickly and efficiently as required.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Wednesday, 9 May 2018

A Programmers Vs Programming.


To normal people, programmers may look mysterious. Kind of like an alien species who is addicted to being hunched over a computer screen. Gathered from books and most importantly, movies, society has gotten some wrongful conventions over what programming is and what a “true programmer” should look like. With the world being as stereotypical as it is, people get a general image of what a group of people should look like. Most, if not all the stereotypes, are incorrect:

1. Programming is difficult

Wrong! Nothing is difficult when you are determined to know it. And as cliché as this may sound, it is the truth. People normally think programming is difficult owing to the rumors they hear. Truth is, once you start from the basics, it gets easier. At first sight, the numerous terms, languages, and whatnots may seem strange and threaten to give you a headache. Don’t hurry through it. Work according to your pace, start from beginner level and progress slowly. Programming languages are so called because they are like languages, say French for example. You don’t begin learning French by having fluent conversations. You may first learn salutations, basic expressions, conjugation, etc. With the more time you spend learning and speaking it, you gain fluency. Same goes for programming languages. Each one has its rules of operation. If you understand them, it gets better. It’s easier to try to master one programming language or concept before moving over to the next.  With enough learning, you could begin “speaking” the language.

2. Programming is for smart people

Being smart is necessary for computer programming, as it is in every other aspect of life. But people get the concept of smartness wrong. No, you don’t need to have an IQ of 140+ to write a program. The previous point already established that programming is NOT difficult. Keep it in mind that one does not need to be a genius like Einstein to succeed as a programmer.

3. All programmers are nerds

Hollywood has led people to believe that programmers necessarily have to wear big thick-framed glasses, lack a fashion sense and spend all their time learning/writing code. Well, the last point is true, in most cases. Still, a lot of stereotypes should be abandoned. No, not all programmers wear glasses. Yes, some programmers know their fabrics and can pull off a red-carpet-worthy look when a need arises. Just because your program doesn’t mean you shouldn’t look attractive from time to time.Admittedly, there are perks of being an introverted programmer. But not everyone fits this profile. Not all programmers spend their day locked up in a room with nothing but their laptops and a cup of coffee as companions. Not all of them are shy, quiet creatures. They can be talkative. They can be outgoing. They can be extroverts who party like no other. The level of social interaction varies depending on the person.

4. All programmers are male

Gender inequality aside, this is false. Female programmers are like the white-horned rhino of the animal kingdom. Yes, they are rare. But they are alive. In the male-dominated field of computer programming, women are “endangered species”. They may be, but they’re not dying out. In fact, their population increases by the day. Look around! Female programmers will do their job well, and look sexy while doing it. You’ll be surprised to know that the first ever programmer to write a code was Ada Lovelace, a female. You can read more about her in our list of Five Women Who Changed Modern Technology and Science.

5. All programmers are single

Just no. Come on, they are humans too. Strange humans, but still humans. As such, they have feelings. And although they generally find it harder to display these feelings to someone and translate it into a relationship, they do try. And those that succeed enjoy beautiful relationships.
Male programmers tend to look for female programmers to share their lives. Admit it, it sounds cute to have that perfect person to spend time and write code together with (#RelationshipGoals).  But there will always be exceptions. There are no rules in the complex dating world. In some cases, opposites will attract.Programmers value their time, which is spent on coding tasks. If they can sacrifice coding to spend time with you, it means you are important. There’s no time to play around with your feelings. They can be romantic too, especially when it comes to digital communications. When the relationship gets too stressful to handle, they could write a program or bot to handle the texting, calling and sending daily romantic emails to them. Their partner will never even know the difference.

6. Programming is all about coding

Haha! Two minutes of silence for anyone out there who believes this. You think writing a thousand lines of code makes your job complete? Wrong! There’s always more to be done. Always room for improvement. And writing code is the easy part. Debugging is trickier. Your compiler will give you an error and warning messages. You’ll try to fix that and get more errors and warnings. You will probably cry a few times and maybe give up on programming. Don’t.
Just when you have successfully compiled your program, free of any bugs, you will think you are done. But then, you have a documentation to write!
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/