Posts

Virus VS Malware

Image
Difference Between Viruses and Malware These days many of us talk about like malware and spyware a lot more than the virus. Have you ever wondered what exactly are all these? Beginning with to understand what a virus is we will start with the original biological meaning of the word.                                                                                                         Biological viruses like the ones that can make you sick are parasitic. They in...

How does an Image Sensor Chips and Camera Works.

Image
All webcams work in broadly the same way: they use an image sensor chip to catch moving images and convert them into streams of digits that are uploaded over the Internet. The image sensor chip is the heart of a webcam—so how does that bit work? Let's take a webcam apart and find out. Take the outer case off a webcam and you'll find it's little more than a plastic lens mounted directly onto a tiny electronic circuit board underneath. The lens screws in and out to increase its focal length, controlling the focus of your cam:                                              Now take the lens off and you can see the image sensor (CCD or CMOS chip): it's the square thing in the middle of this circuit. Only the tiny, green-colored central part is light-sensiti...

Everything You must know About the BITCOINS.

Image
A few days ago, the world has seen the biggest Ransomware attack called WannaCry. The hackers encrypted all the information of victims and asked for Bitcoins to decrypt the data. You may wonder why hackers asked for Bitcoins instead of dollars or euro? What is Bitcoin and Bitcoin mining? What is the reason for asking Bitcoins? In this article, I am going to share everything you need to know about Bitcoins and how do they work. What is a Bitcoin? Bitcoin is the virtual banking currency of the internet also known as ‘cryptocurrency’. It is the world’s “first decentralized digital currency”. A mysterious person known as Satoshi Nakamoto launched bitcoin in 2009. His true identity is still unknown. It has existed for several years now and many people have questions about them such as Where do they come from? Are they legal? Where can you get them?. Bitcoins are digital coins, you can send over the internet. Compared to other choices, bitcoin have ...

Amazing Use of OTG Cable that you might don't Know.

Image
                                                    USB OTG or the OTG cable is also known as USB On-The-Go cable is the cable which allows USB devices to act as a host which further allows USB devices to be attached with them. The OTG cable is generally used extend the device’s functionality, which allows you to transfer the data from the smartphone to Pen Drive and vice versa. But, there are other interesting uses of the OTG cable which we will figure out in the article below. Connect a portable hard drive You can connect the external hard drive to your smartphone with the help of OTG cable. Once the external hard drive is connected, you can easily access all the files on your smartphone. Also, you can transfer the fi...

How does PING works.

Image
                                   How does internet ping work Ping is a type of network packet that is used to check if a machine that you want to connect to over the internet is available or not. A ping is a network packet termed an Internet Control Message Protocol (ICMP) packet. The process of a ping is done when a machine sends an ICMP echo request packet to another machine or interface over the internet. If the receiving machine is available and is enabled to reply back, it will respond with an echo reply packet. This not only shows us that the receiving machine is alive and working, it also helps us to identify a number of things such as total time taken, loss of packets, etc that are used to judge the reliability of the connection.  To run a ping from your Linux machine, you will need to open a terminal and write a command. The syntax of the command is  “ping ...

Sarahah...?? What it means...?? What it is..?

Image
                                                                                                              Are you aware of Sarahah? If not, then go on your social media platform and look for the Sarahah. If you go through your timelines, then you will see the various posts from your friends, where they post the good and bad messages on their timelines. So, if you are still wondering from where those posts are coming from, then we will help you ...

Maybe Our Future Is Unique Identifier Patches insted of TCP/IP.

Image
  You might be aware of the recent Ransomware attacks, where the complete data of few nations were on a stake. These attacks have got a new name “Cyberterrorism”. Nowadays, nothing is safe on the Internet; the hackers are playing with the entire data of the nation. So, the hackers have targeted the hospitals, individuals, and corporations. Now, you know about the present scenario of the Internet data. What If I tell that there is the solution from decades to avoid these types of scenarios. If we start using this, then we can get rid of ransomware attack, DDOS attacks, and nation state cyber attacks. At present, the Internet governance is sitting in the room and might be discussing the next generation internet plan. So, if they keep all your gadgets data online, then potentially the internet regime can destroy your entire world through online activities.                  ...