Friday 20 April 2018

How to make your personal USB Mobile Charger.

Now the charging of your mobiles has been made easy with the help of USB outlets present in the Laptop and PC. For the charging of your mobile phone, this circuit provides you a regulated voltage of 4.7 volts. 5  volts of DC voltage and 100mA of current is being provided by the USB outlet which is well enough for the mobile phone charging slowly. We can use this circuit to charge the mobile while we are in journey also. So, we may treat it as Mobile Phone Travel The USB port of the mobile is used for the charging, as the USB port is the very helpful voltage source that can charge the mobile. Nowadays, there are two to four USB ports on the laptops that are available in the market. USB actually refers to Universal Serial Bus. It is one of the newest incarnations of method which is used to get information in as well as out from your computer. We are concerned at the fact that ±5 volts of power is being provided by the USB port to the external devices and can avail at the pin number1 while on pin number 4, it is 0V. Till 100 mA of current can get from the USB port which is more than sufficient that we required for this small application.

USB Mobile Charger Circuit Diagram:

USB Mobile Charger Circuit Diagram

USB Mobile Charger Circuit Diagram – ElectronicsHub.Org
Components used in this Circuit:
  • R1-470E
  • C1-100uF/25V
  • T1-BC547
  • Zener diode-4.7V/. 5W
  • Diode-1N4007
 Components Description:
  • Resistor: Flow of current in the circuit is being controlled by the resistor.
  • Capacitor: It is mainly  used to store the charges. It is of two types polarized and non-polarized, electrolytic capacitor is an example of polarized while ceramic and paper is non polarized.
  • Transistor: It used to enlarge the signal strength or to open or close the circuit.
  • Zener Diode: When the voltage achieves the breakdown point it starts working but in the reverse bias state.
  • Diode: It is a having two terminal named as anode and cathode. It allows the current to flow only in the forward direction while stopping the flow of current in the backward direction.

USB Mobile Charger Circuit Description:

USBThe large number of mobile batteries work on 3.6 volts 1000 to 1300mAh.These battery are combinations of three Lithium cells whose voltage rating is 1.2 volts for each. And for charging mobile quickly there is a need of 4.5 volts and current range of 300-500 mA.
If you want to increase the efficiency of your battery than it is good to charge it slowly. The circuit which is explained below work on 4.7 regulated voltage and provide sufficient amount of current for the slow charging of your mobile phones. The voltage at the output  is harmonized by the transistor named T1. While the output voltage is being controlled by the Zener diode ZD and the polarity of the output which is supply is protected by D1.
”A type” of USB plug should be connected with the front part of the circuit. To ease the polarity identification connects pin1 to the red color wire while the black color of the wire is connected with pin 4.Now connect the output of the circuit with the appropriate charger pin to attach it with your mobile phones. After all the parts of the circuit gather together, put the USB plug in the socket and from the circuit measure the output with the help of multimeter. If you got the correct output and if the polarity is connected in the right manner then attached your mobile phone with it.
Now a days you will get a multicharger easily available marker just purchase one and charge your moble easily when you are in train or bus as every now carries laptop or note pad with them.
Note: Extreme care is needed to be taken that polarity are connected in the right manner, if it attached in wrong style it will damage the battery of your mobile phone.
For constructing USB mobile charger, there is a need of USB cable and the cable must have minimum one male plug with a strip back of about 5cm having  external padding and safeguard from the “uncovered” end of the USB cable. In general the USB cables are made up of four cables of colors red, while along with black and green ( along with the protestors). As the wire of green and white are used to transfer the data, so there is no need of that wire hence these wires can be trimmed (there we should need to pay attention that the wires within their padding and are not exposed). Typically black color wire is negative one while the red color wire is positive one. 5V is the voltage that we get from the USB port. And more than 500mA current cannot be supplied to the device that is attached to the USB port. Attached the power line with the USB plug examine the right polarity.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Thursday 19 April 2018

How to clone a SIM card.

Before I start this guide, I would like to make one thing clear SIM CLONING is illegal. This tutorial should be used for educational purposes only.
First off a little introduction about SIM CARD:
Our SIM cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer, these codes are related to our mobile numbers which the operators store in their vast database, it is based on these secret keys that enables the billing to be made to that customer.
SIM cloning extracting these two secret codes from the SIM and programme it into a new blank smart card (often known as wafer) since the operator authentication on SIM is based on these values, it enables us to fool the operators in thinking that it’s the original SIM, this authentication is a flaw with the GSM technology
Now which SIM cards can be cloned?
SIM cards are manufactured based on three algorithms COMP128v1, COMP128v2 and COMP128v3. It is important note currently only COMP128v1 version SIM cards can be cloned, since this is the only algorithm, which has been cracked, bear in mind that 70% of all the SIM cards we use are COMP128v1.
Cloning a card:
1. Buy a SIM card Reader.
2 Need a Blank SIM card or super SIM card
3. Download and install MagicSIM
4. Download and install USB SIM Card Reader Software3.0.1.5
6. Go in phone tools, select SIM card, then select unlock SIM, it will prompt for a code.
7 Call network provider, they will ask for your phone number, your account info, name and security code, then they will ask why you want to unlock your SIM card, just tell them you need to unlock your SIM to get it to work with your overseas phone or something.
8. Once they give you the SIM unlock code, enter it, and it will say SIM unlocked.
9. Remove the SIM from your phone, place it in the card reader, click read from card in magic SIM the application.
10. When it displays ‘connected’, select crack SIM in the toolbar. Click strong ki and select all of the other find options and then click start.
11. Once your ki is found and the crack is finished, click file, save as and save your cracked SIM info to a file.
12. IMPORTANT!!! You must click disconnect from the file menu or you will ruin your SIM card.
Once it says disconnected, remove the SIM. Put the SIM in your phone and see if it still works, it should. (If not, either you did not unlock your SIM, or you tried to copy it instead of crack and save.)
13. Insert blank 3g card USB SIM Card Reader Software3.0.1.5, not magic SIM at this point.
14. Click connect
15. It should say ‘No Info Found’ if it is truly blank.
16. Select write to SIM, it will prompt you to select a dat file, select the one you saved earlier. Now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code the network provider gave you, then click finish.
17. Your card is now cloned.
It should be noted that if you try to make two calls at the same time, one will connect; the other will say call failed, both phones will get the same messages, text and voice, and both will receive the same calls, but only one can talk at a time.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Friday 30 March 2018

What is Port Forwarding.? How does it works.?

Since an IP address can easily be traced by anyone, most people prefer using services, like VPN or proxies to hide or change their IP address. These services employ the Port forwarding feature to change the IP address of any device.
Port forwarding, also referred to as Port tunneling, is a behind-the-scenes process of intercepting data traffic heading for a computer’s IP combination and redirecting it to a different IP. Usually, a VPN or proxy program is used to cause the redirection, but it can also be done via hardware components such as a router, proxy server, or firewall.
This allows you to send requests to servers across the internet without other people knowing the original location or IP address of these requests, guaranteeing your privacy on the internet.

How does port forwarding work?

To send any request over the internet, packets of data are created and sent over the internet. These packets contain the details of your request, which also includes the destination of your computer or device.
Normally, a network router examines the header of an IP packet before sending it to any linked and appropriate interface. It, in turn, then sends the data to the destination that’s in the header.
But Port forwarding changes things a bit. In port forwarding, the intercepting application (your VPN client) reads the packet header, notes down the destination, and then rewrites the header information before sending it to another computer or server—one which is different from the computer/server you intended.
That secondary host destination may be a different server using a different IP address, a different port, or a completely different combination of the two. In case of a VPN or proxy, this secondary destination are usually the servers employed by the provider which mask or cover your original IP address.

A look at port forwarding

The following example will help in explaining how the port forwarding feature works.
In the following example, IP Address 101.0.0.1 sends a request to 101.0.0.3 on Port 90. An intermediary host—101.0.0.2—intercepts the packets, rewrites the packet headers and sends them on to IP Address 101.0.0.4 on Port 9090:
101.0.0.1–>101.0.0.2–>101.0.0.4
Makes a request toActually sends to
101.0.0.3:90101.0.0.4:9090
The host, 101.0.0.4, responds to this request, sending it to 101.0.0.2. Then 101.0.0.2 rewrites the packet—indicating that the response is from 101.0.0.3—and sends it to 101.0.0.1:
101.0.0.4–>101.0.0.2–>101.0.0.1
Sends its response toForwards the response to
101.0.0.2:9090101.0.0.1:90
As far as 101.0.0.1 is concerned, it has sent a request to 101.0.0.3 on Port 90 and has received a response back from 101.0.0.3 on Port 90. But this isn’t what actually happened. The traffic never really touched 101.0.0.3. But, because of the way the packets were rewritten, 101.0.0.1 sees that it has gotten a response from 101.0.0.3.
The perceived destination is always from the perspective of the requesting computer. As you can see in the diagram: despite 101.0.0.4 becoming the real-time destination for traffic from 101.0.0.1, the destination for all traffic (as far as the requesting host knows) is 101.0.0.3.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Machine Learning VS Artificial Intelligence


Now a days Artificial Intelligence and Machine Learning has become comman in day to day life. People usually get confused between Artificial Intelligence and Machine Learning  now today i am going to tell your briefly about Artificial Intelligence and Machine Learning.

AI and machine learning are often used interchangeably, especially in the realm of big data. But these aren’t the same thing, and it is important to understand how these can be applied differently.  
Artificial intelligence is a broader concept than machine learning, which addresses the use of computers to mimic the cognitive functions of humans. When machines carry out tasks based on algorithms in an “intelligent” manner, that is AI. Machine learning is a subset of AI and focuses on the ability of machines to receive a set of data and learn for themselves, changing algorithms as they learn more about the information they are processing. 
Training computers to think like humans is achieved partly through the use of neural networks. Neural networks are a series of algorithms modeled after the human brain. Just as the brain can recognize patterns and help us categorize and classify information, neural networks do the same for computers. The brain is constantly trying to make sense of the information it is processing, and to do this, it labels and assigns items to categories. When we encounter something new, we try to compare it to a known item to help us understand and make sense of it. Neural networks do the same for computers. 
Benefits of neural networks:
  • Extract meaning from complicated data
  • Detect trends and identify patterns too complex for humans to notice
  • Learn by example
  • Speed advantages
Deep learning goes yet another level deeper and can be considered a subset of machine learning. The concept of deep learning is sometimes just referred to as "deep neural networks," referring to the many layers involved. A neural network may only have a single layer of data, while a deep neural network has two or more. The layers can be seen as a nested hierarchy of related concepts or decision trees. The answer to one question leads to a set of deeper related questions.
Deep learning networks need to see large quantities of items in order to be trained. Instead of being programmed with the edges that define items, the systems learn from exposure to millions of data points. An early example of this is the Google Brain learning to recognize cats after being shown over ten million images. Deep learning networks do not need to be programmed with the criteria that define items; they are able to identify edges through being exposed to large amounts of data.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Saturday 17 March 2018

Difference between HTML and HTTP

Many folks get confused between these two terms which are associated with the Web. Are they really same? First thing first. HTML is a Language while HTTP is a Protocol. Doesn’t make much sense..? it’s okay! We’ll discuss it in more detail.
HTML (Hypertext Markup Language) is a language for marking the normal text so that it gets converted into hypertext. Again, not so clear. Basically, HTML tags (e.g. “<head>”, “<body>” etc.) are used to tag or mark normal text so that it becomes hypertext and several hypertext pages can be interlinked with each other resulting in the Web. Please note that the HTML tags are used to help render web pages as well in the Browser. On the contrary, HTTP (Hypertext Transfer Protocol) is a protocol for transferring the hypertext pages from Web Server to Web Browser. For exchanging web pages between Server and Browser, an HTTP session is setup using protocol methods (e.g. GET, POST etc.). This would be explained in another post.
To understand this difference between HTML and HTTP, we can think of an analogy. Think of HTML as C language and HTTP as FTP. Now one can write C programs in C language and then one can transfer these C programs from Server to Clients using FTP (i.e. File transfer protocol). Same way, web pages (which are mostly HTML pages) are written in HTML and these web pages are exchanged between Server and Clients using HTTP. Since HTML is a language and HTTP is a protocol, they are two different things though related. In fact, it’s possible to exchange HTML web pages without HTTP (e.g. using FTP to transfer HTML pages).

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Friday 16 March 2018

What are APIs..? How do they work..?

What is an API?

API stands for Application Programming Interface. An API is a software intermediary that allows two applications to talk to each other.  In other words, an API is the messenger that delivers your request to the provider that you’re requesting it from and then delivers the response back to you.
An API defines functionalities that are independent of their respective implementations, which allows those implementations and definitions to vary without compromising each other. Therefore, a good API makes it easier to develop a program by providing the building blocks.

How do APIs work?


Imagine a waiter in a restaurant.  You, the customer, are sitting at the table with a menu of choices to order from, and the kitchen is the provider who will fulfill your order.
You need a link to communicate your order to the kitchen and then to deliver your food back to your table. It can’t be the chef because she’s cooking in the kitchen. You need something to connect the customer who’s ordering food and the chef who prepares it.  That’s where the waiter — or the API —  enters the picture.
api server chef example
The waiter takes your order, delivers it to the kitchen, telling the kitchen what to do. It then delivers the response, in this case, the food, back to you. Moreover, if it’s designed correctly, hopefully, your order won’t crash!

A real example of an API

How are APIs used in the real world? Here’s a very common scenario – booking a flight.
When you search for lights online, you have a menu of options to choose from. You choose a departure city and date, a return city and date, cabin class, and other variables like your meal, your seat, or baggage requests.
airline demo
To book your flight, you need to interact with the airline’s website to access the airline’s database to see if any seats are available on those dates, and what the cost might be based on the date, flight time, route popularity, etc.
You need access to that information from the airline’s database, whether you’re interacting with it from the website or an online travel service that aggregates information from multiple airlines. Alternatively, you might be accessing the information from a mobile phone. In any case, you need to get the information, and so the application must interact with the airline’s API, giving it access to the airline’s data.
The API is the interface that, like your helpful waiter, runs and delivers the data from the application you’re using to the airline’s systems over the Internet. It also then takes the airline’s response to your request and delivers right back to the travel application you’re using. Moreover, through each step of the process, it facilitates the interaction between the application and the airline’s systems – from seat selection to payment and booking.
APIs do the same for all interactions between applications, data, and devices. They allow the transmission of data from system to system, creating connectivity. APIs provide a standard way of accessing any application data, or device, whether it’s accessing cloud applications like Salesforce, or shopping from your mobile phone.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Thursday 15 March 2018

Ping V/s Traceroute

In computer networks, data is sent in small blocks known as packets. Each packet is transmitted individually and may also follow different route to reach the destination. Once all these packets of the original message reach the destination, they are re-assembled to form the original message. But, sometimes, it may happen that the web server is down, network congestion or some other technical glitch is there, that may prevent the message from reaching the destination. To diagnose such congestions and network failures, we use two common programs namely Ping and Traceroute.
Ping – It is a utility that helps one to check if a particular IP address is accessible or not. Ping works by sending a packet to the specified address and waits for the reply. It also measures round trip time and reports errors.
Ping is also used in checking if the computers on a local network are active. For this, the user has to go in command prompt and type : ping 127.0.0.1, and if the address is active, the ping would return a message like this :

The IP address 127.0.0.1 is the address of the local host and would receive a ping reply even if the sender is not connected to internet.
Traceroute – It is utility  that traces a packet from your computer to the host, and will also show the number of steps (hops) required to reach there, along with the time by each step. Traceroute works by sending the packets of data with low survival time (Time to Live – TTL) which specifies how many steps (hops) can the packet survive before it is returned. When a packet can’t reach the final destination and expires at an intermediate step, that node returns the packet and identifies itself. So, by increasing the TTL gradually, Traceroute is able to identify the intermediate hosts. If any of the hops come back with  “Request timed out”, it denotes network congestion and a reason for slow loading Web pages and dropped connections.
The main difference between Ping and Traceroute is that Ping is a quick and easy utility to tell if the specified server is reachable and how long will it take to send and receive data from the server whereas Traceroute finds the exact route taken to reach the server and time taken by each step (hop).

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/