Posts

Why People are getting scared of using Artificial Intelligence.?

Image
When people see machines that respond like humans, or computers that perform feats of strategy and cognition mimicking human ingenuity, they sometimes joke about a future in which humanity will need to accept robot overlords. But buried in the joke is a seed of unease. Science-fiction writing and popular movies, from "2001: A Space Odyssey" (1968) to "Avengers: Age of Ultron" (2015), have speculated about artificial intelligence (AI) that exceeds the expectations of its creators and escapes their control, eventually outcompeting and enslaving humans or targeting them for extinction. Conflict between humans and AI is front and center in AMC's sci-fi series "Humans," which returned for its third season on Tuesday (June 5). In the new episodes, conscious synthetic humans face hostile people who treat them with suspicion, fear and hatred. Violence roils as Synths find themselves fighting for not only basic rights but their very survival, against th...

What is Encryption ?

Image
Encryption is the mathematical science of codes, ciphers, and secret messages. Throughout history, people have used encryption to send messages to each other that (hopefully) couldn't be read by anyone besides the intended recipient. Today, we have computers that are capable of performing encryption for us. Digital encryption technology has expanded beyond simple secret messages; today, encryption can be used for more elaborate purposes, for example to verify the author of messages or to browse the Web anonymously with Tor. Under some circumstances, encryption can be fairly automatic and simple. But there are ways encryption can go wrong, and the more you understand it, the safer you will be against such situations. Three Concepts to Understand in Encryption  Private and Public Keys One of the most important concepts to understand in encryption is a key. Common types of encryption include a private key, which is kept secret on your computer and lets you read messages...

Tips on how can you avoid Phishing Attacks .

Image
On your path to improving your digital security, you may encounter bad actors who attempt to undermine your security goals. We call these bad actors adversaries, or attackers. When an attacker sends an email or link that looks innocent, but is actually malicious it’s called phishing. A phishing attack usually comes in the form of a message meant to convince you to:     click on a link;     open a document;     install software on your device; or     enter your username and password into a website that’s made to look legitimate. Phishing attacks can trick you into giving up your passwords or trick you into installing malware on your device. Attackers can use malware to remotely control your device, steal information, or spy on you. This guide will help you to identify phishing attacks when you see them and outline some practical ways to help defend against them. Types of Phishing Attacks :- Phishing for Passwords (aka Credenti...

How to protect your device from Hackers.

Image
Malicious attackers can take over your device—whether it's a laptop computer, a desktop PC, a smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. This animation explains a few of the ways computers get taken over (or “pwned," “0wned,” etc.), and how you can protect yourself. 1. An email attachment that contains malware: You can get tricked into running a program by clicking on an email attachment that appears innocent, but is actually infected with malware. Malware can turn on your computer’s microphones and broadcast your conversations, record your screen, watch what you type on your keyboard, copy files, or even insert false records. Be very careful opening strange email attachments and double check with the person who sent it before you open it if you’re unsure. 2. A malicious weblink: It’s possible to infect a computer with malware remotely just by visiting a webpage (sometimes called a “drive-by download”). If a link prompt...

An Overview about End-to-End Encryption

Image
In todays fast growing world, security of his/her datat is the first priority of every user. So today we are going to give a brief introduction on End-to-End Encryption. End-to-End Encryption is a way of encrypting and decrypting data using the concept of cryptography.       So as the name says End-to-End Encryption refers to encrypting and decrypting of data on both the ends. Suppose a data is going to travel on the internet from a mobile phone, so first it will gen:erate two key , first is Pubic key and second is Private key.     The private key always remains in the phone, but the public key remains at the server.When a data is requested from the server the public key gets activated for that particular mobile phone from which it is generated.  The Public key encrypts the data that come from the server in that way that only private key of that particular phone can only decrypts it. Getting little bit confused ...!! Lets take an example to clari...

An Overview About Google Duplex

Image
Some days before at Google I/O 2018 we have seen a new way of assisting life, which is going to book an appointment instead of you yourself do it, Yes that's True, Google is developing an efficient Artificial Intelligence for communicating with the shop owner or any other person who is going to take an appointment in a way normal person use to take. What is Google Duplex ? It's a new tool from Google that aims to use Artificial intelligence (AI) to "accomplish real-world tasks over the phone" according to Google's AI researchers and developers. For now, that means very specific tasks like making appointments, but the tech is being developed with an eye on expansion into other areas. Spending billions to create a cool way to make dinner reservations sounds like something Google would do but isn't a great use of time or money.Duplex is also more than we saw in a demo and if it ever leaves the lab will be a lot more than we see or hear on our end. The...

Had you ever thinked, How does an IP Address is assigned to a device..?

Image
Every device connected to the internet is assigned an IP address when you connect. When you connect with your phone or computer or chosen device, your ISP assigns you an IP Address so you can browse, shop, and navigate the internet. Who created Internet Protocol (IP) addresses? Vint Cerf the “father of the internet” was one of the creators of IP addresses. He created it while working for the US Department of Defense's Advanced Research Projects Agency (DARPA). Code.org and Mr. Cerf explain the  creation of IP address . There are a few organizations involved in IP addresses. ICAAN  - The Internet Corporation for Names & Numbers - They’re the top level and they govern over IP - the internet protocol, and run the policies behind it. From there it flows down to IANA - Internet Assigned Numbers Authority.  IANA  is a department of ICAAN that co-ordinates and maintains the number systems that keep the internet running like IP addresses & DNS. Nex...