Posts

How to make your personal USB Mobile Charger.

Image
Now the charging of your mobiles has been made easy with the help of USB outlets present in the Laptop and PC. For the charging of your mobile phone, this circuit provides you a regulated voltage of 4.7 volts. 5  volts of DC voltage and 100mA of current is being provided by the USB outlet which is well enough for the mobile phone charging slowly. We can use this circuit to charge the mobile while we are in journey also. So, we may treat it as  Mobile Phone Travel  The USB port of the mobile is used for the charging, as the USB port is the very helpful voltage source that can charge the mobile. Nowadays, there are two to four USB ports on the laptops that are available in the market. USB actually refers to Universal Serial Bus. It is one of the newest incarnations of method which is used to get information in as well as out from your computer. We are concerned at the fact that ±5 volts of power is being provided by the USB port to the external devices and can avail at t...

How to clone a SIM card.

Image
Before I start this guide, I would like to make one thing clear SIM CLONING is illegal. This tutorial should be used for educational purposes only. First off a little introduction about SIM CARD: Our SIM cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer, these codes are related to our mobile numbers which the operators store in their vast database, it is based on these secret keys that enables the billing to be made to that customer. SIM cloning extracting these two secret codes from the SIM and programme it into a new blank smart card (often known as wafer) since the operator authentication on SIM is based on these values, it enables us to fool the operators in thinking that it’s the original SIM, this authentication is a flaw with the GSM technology Now which SIM cards can be cloned? SIM cards are manufactured based on three algorithms COMP128v1, COMP128v2 and COMP12...

What is Port Forwarding.? How does it works.?

Image
Since an IP address can easily be traced by anyone, most people prefer using services, like VPN or proxies to hide or change their IP address. These services employ the Port forwarding feature to change the IP address of any device. Port forwarding, also referred to as Port tunneling, is a behind-the-scenes process of intercepting data traffic heading for a computer’s IP combination and redirecting it to a different IP. Usually, a VPN or proxy program is used to cause the redirection, but it can also be done via hardware components such as a router, proxy server, or firewall. This allows you to send requests to servers across the internet without other people knowing the original location or IP address of these requests, guaranteeing your privacy on the internet. How does port forwarding work? To send any request over the internet, packets of data are created and sent over the internet. These packets contain the details of your request, which also includes the dest...

Machine Learning VS Artificial Intelligence

Image
Now a days Artificial Intelligence and Machine Learning has become comman in day to day life. People usually get confused between Artificial Intelligence and Machine Learning  now today i am going to tell your briefly about Artificial Intelligence and Machine Learning. AI and machine learning are often used interchangeably, especially in the realm of big data. But these aren’t the same thing, and it is important to understand how these can be applied differently.   Artificial intelligence is a broader concept than machine learning, which addresses the use of computers to mimic the cognitive functions of humans. When machines carry out tasks based on algorithms in an “intelligent” manner,  that  is AI. Machine learning is a subset of AI and focuses on the ability of machines to receive a set of data and learn for themselves, changing algorithms as they learn more about the information they are processing.  Training computers to think like hum...

Difference between HTML and HTTP

Image
Many folks get confused between these two terms which are associated with the Web. Are they really same? First thing first. HTML is a Language while HTTP is a Protocol. Doesn’t make much sense..? it’s okay! We’ll discuss it in more detail. HTML ( H yper t ext  M arkup  L anguage) is a language for marking the normal text so that it gets converted into hypertext. Again, not so clear. Basically, HTML tags (e.g. “<head>”, “<body>” etc.) are used to  tag  or  mark  normal text so that it becomes hypertext and several hypertext pages can be interlinked with each other resulting in the Web. Please note that the HTML tags are used to help render web pages as well in the Browser. On the contrary, HTTP ( H yper t ext  T ransfer  P rotocol) is a protocol for transferring the hypertext pages from Web Server to Web Browser. For exchanging web pages between Server and Browser, an HTTP session is setup using protocol methods (e.g. G...

What are APIs..? How do they work..?

Image
What is an API? What exactly is an API? We hear about  how valuable APIs  are all the time; our founder, Ross Mason, often says that they will have a  significant impact  on business. However, what is the definition of an API? API stands for Application Programming Interface. An API is a software intermediary that allows two applications to talk to each other.  In other words, an API is the messenger that delivers your request to the provider that you’re requesting it from and then delivers the response back to you. An API defines functionalities that are  independent of their respective implementations , which allows those implementations and definitions to vary without compromising each other. Therefore, a good API makes it easier to develop a program by providing the building blocks. How do APIs work? Imagine a waiter in a restaurant.  You, the customer, are sitting at the table with a menu of choices to order from, an...

Ping V/s Traceroute

Image
In computer networks, data is sent in small blocks known as packets. Each packet is transmitted individually and may also follow different route to reach the destination. Once all these packets of the original message reach the destination, they are re-assembled to form the original message. But, sometimes, it may happen that the web server is down, network congestion or some other technical glitch is there, that may prevent the message from reaching the destination. To diagnose such congestions and network failures, we use two common programs namely Ping and Traceroute. Ping  – It is a utility that helps one to check if a particular IP address is accessible or not. Ping works by sending a packet to the specified address and waits for the reply. It also measures round trip time and reports errors. Ping is also used in checking if the computers on a local network are active. For this, the user has to go in command prompt and type : ping 127.0.0.1, and if the address is a...