Showing posts with label KNOWLEDGE. Show all posts
Showing posts with label KNOWLEDGE. Show all posts

Friday, 3 July 2015

Amazing 15 Internet Facts You Need to Know

More than a billion people use the internet daily. You can almost do anything online from earning money to ordering food and much more. Did you know that there are many Interesting facts about the Internet that you must know. So let’s increase our knowledge by knowing some Amazing Internet Facts.

#1 World’s first website, Created by Tim Berners-Lee in 1991 and is still running.

first-website

#2 The first Youtube video was uploaded on April 23, 2005 and is called “Me at the Zoo” and features Jawed Karim, one of the founders, at the San Diego Zoo.

#3 YouTube’s copyright-checking software scans over 100 years of video every day.

youtube-copyright

#4 The First registered domain was symbolics.com

first-domain

#5 One in six marriages today occur because the couple met online.

marriage

#6 37% of WEB is Porn.

37percentage is

#7 There are more than 1 billion websites on Internet.

#8 Facebook has an estimated 1.2 Billion Active users, i.e about 17% of population in on facebook.

#9 Over 100,000 dot com domains are registered on the web daily.

domains

(Visit Techandfilmmaking.com for more.)

#10 Every day, 16% of the searches that occur are ones that Google has never seen before.

google

#11 First Ever Photo Uploaded On The Internet.

first-photo

#12 The Internet is growing by an exabyte of data every day. If that didn’t hit you as hard as expected let me put it this way, an exabyte equals 250 million DVDs.

#13 Sweden has the highest proportion of Internet users, i.e 75%.

#14 Only 4% of internet could be surfed using Simple browsers and is not indexed by Google. Other content is incl. in the Dark net and is not indexed in Google results.

deep_web

#15 Gangam Style is the most viewed video on youtube. It broke all the records ever made and its current view count is 2,363,287,905 views.


Saturday, 18 April 2015

USB Defense: Stop Data Walking Out The Door


usb-security-software
The bad news is that internal data breaches are on the rise. And one of the biggest culprits? USB devices.

In the past few years, there has been many organizations tracking down the loss of sensitive/confidential information due to the usage of USB drives and other mass storage media. Cyber-security breaches and data theft are making more and more IT leaders paranoid about security than ever before.
Why are USB devices dangerous?
  • USB devices can hold a lot of information. For example, a 128 GB USB flash drive can store 60,000 photos, 20,000 songs, 100+ videos, and more. Just imagine how many protected corporate files could fit on one drive. Also, the storage capacity of USB devices is only going to increase.
  • USB devices are super portable. Some USB storage devices are the size of a small coin. This makes them very difficult to visually detect when plugged into an open port.
  • USB devices are cheap and easy to find. If you’re in the market for a USB storage device, there are some online for under $1.00 USD. Or if you don’t want to purchase one, just go to an expo. Plenty of companies are handing out branded USB flash drives these days. In short, nearly everyone has a USB storage device of some kind.
  • Data doesn’t always delete from a USB drive. In one study, they found that 85% of secondhand USB devices had recoverable information including personal identity information and confidential corporate information easily.
  • USB devices can directly carry malware. Inserting a device and executing or copying files could expose your network to unexpected malware.
What can an internal data breach result in?
The loss or theft of sensitive information is not limited to the realm of emails and contacts, but it can also extend to more sensitive information such as:
  • Loss of copy-righted information
  • Intellectual property data
  • Deviation from compliance regulations
  • Access codes and secure login credentials
All these severely impact the victim organizations in terms of financial and reputation loss. The 2014 Cost of Data Breach Study by the Ponemon Institute showed that the average cost to an organization who fell victim to a data breach was $3.5 million dollars.
What can you do about USB devices in your organization?
Here are some tips to ensure you keep your data protected on your network, servers, and workstations.
  • Establish policies about portable devices and educate employees about your policies
  • Set up access rules so only authorized employees have USB access
  • Ensure to remove sensitive information access from employees once the purpose of using the information is fulfilled
  • Do not leave old or unattended data on end-user systems
  • Monitor the log activity of all your enterprise workstations and USB endpoints
How can log management technology help?
Continuous log monitoring of your IT infrastructure will help collect logs from all your workstation endpoints and trigger real-time alerts to notify you of USB activity on the network. With automated incident response available in log management tools, it’s easier to take preventative action and automatically disable USB connection in real time.
USB Detection and Prevention with SolarWinds® Log & Event Manager
Need more control over monitoring USB devices connected to your network? SolarWinds Log & Event Manager software delivers an affordable, easy-to-use solution for monitoring USB devices to ensure your secure data stays that way.

Download a free, fully-functional trial, and in less than an hour you can be monitoring your network for USB device activity.
SolarWinds Log & Event Manager:
  • Protects sensitive data with real-time notification when USB devices are detected
  • Automatically or Manually ejects USB devices
  • Creates whitelists of authorized USB devices
  • Monitors what files or processes are accessed on the drive
  • Leverages built-in reporting to audit USB usage over time
LEM lets you see what files or processes are accessed on USB devices. This information can be further correlated with network logs to identify potential malicious attacks coming from a USB device. You can then detach the drive right from the LEM console or configure automated actions to block the usage, including the ability to disable user accounts, quarantine workstations, and automatically eject USB devices.

You can even configure LEM to detach a USB device when systems are offline. Plus, LEM provides built-in reporting to audit USB usage over time.
With LEM’s USB defense, you can be confident your sensitive data doesn’t walk out the door.
source:hackernews

Lost Your Phone? Google Search 'Find My Phone' To Locate It

Google-Search-Find-My-Phone.png
How many of you have an issue to forget your mobile phones? I guess, most of us.

Sometimes in our homes, sometimes in our offices, sometimes in our cars and sometimes we even don’t remember the exact place where we left our phones. 

Now, Finding your phone is as simple as searching something on Google...

Instead of searching your phone everywhere, just ask Google where your phone is, and the search engine giant will answer you the exact place where you left your smartphone. 

Sound’s interesting!

Google unveiled a new feature on Wednesday that lets you search for your Android smartphone or tablet using the search engine on your desktop computer.

How does it work?
  • Log-in to the same Google account on your desktop computer’s browser that you use on your Android smartphone, but before that make sure you must have the latest version of the Google app installed on your smartphone.
  • Now type "Find my phone" into Google's search engine, and that’s it.
As soon as you press the enter button, Google will display a map that eventually shows you a location on the map that is accurate to a certain distance, as for example, the map showed me the location of my smartphone was accurate to 35 feet.

However, what if your phone is not visible to you?

Google also offers you a Ring button on the map in order to pinpoint your phone. 

You just need to click on Ring icon and the search engine giant will ring your smartphone at full volume for up to five minutes. Moreover, once you hand on it, simply press the power button to turn off the ringing.

Not Google alone…

...a similar feature known as Android Device Manager can also help you locate and ring your Android devices. Also in case your Android device has been stolen, this feature helps you to factory reset your device remotely and reset the password if the device is recovered or erase its data.

Apple also offers a similar tracking feature, known as Find My iPhone, that helps iOS users to track down their missing iPhone or iPad, remotely locate its exact location by ringing, lock it and erase its data.

Thursday, 9 April 2015

What is QR Codes & benefits of these QR Codes (with videos)


What is QR Codes & benefits of these QR Codes (with videos)
What is QR Codes & benefits of these QR Codes(with videos)
QR Code means Quick Response Code.Numbers , Websites & Texts can store in these Codes.After Bar Codes QR Codes are very popular in the market.
Have you ever seen the special type of Black Designs in the white block of any Magzine & Website? If your answer is yes then your are right here to know more about that designs. These All special Graphics are called QR Code.
This is a technique of digital world & better ability available in comparison to Bar Codes. The use of  this Black-White Graphics being done in websites recently.You can find any Big Brand & any Big Company with these QR Codes through your SmartPhones Also.
What is QR Codes & benefits of these QR Codes

**HOW TO PREPARE & READ QR CODE**

You can prepare QR Code free of cost & immediately & can save this in you computer in the form of PNG/JPEG Image File or PDF. For this purpose you have to go on—
  • www.beqrious.com
  • www.azonmedia.com
  • www.qrstuff.com
You can prepare your QR Code of Google Map Location,Websites, Facebook or Twitter page except your personal Information. Go on the given websites & fill the appropriate boxes, after this you can prepare your free of cost QR Code.
For read the QR Code a QR Code Scanner app is necessary to available in your SMART PHONE.Except this you can also scan QR Code with help of Google Goggles or Neo Reader app. It all works on Android,Windows Phone & IOS Device for free of cost.. If you have got Blackberry,then you can use QR Code Scanner pro. Internet Connection is necessary for serving this purpose.

*Use & Working of QR Codes*

  • 1. Reminder For Friends
Does your friends not understand your hand writing? If you want to get a special thing understand, then you can take the help from QR Codes. For this purpose, you have to prepare your own QR Code. After this take the print of it & through receive to your friends.
If your friend want to read this QR Code then he’ll first scan this with his Phone or Tablet & will read the message. He can also save QR Code like a image. It’s is very beneficial thing when you say something with QR Codes because only QR Code reader who ever with you want to share this,can only read this. Others can’t be interfere.
  • 2. Visiting/Business Card
You can put your all information’s in codes belongs to you,its possible because of QR Generation Websites & can also prepare Visiting Card(V-Card). If this type of code will print on your Visiting Card then anyone can scan your information & can save in his/her Phone.
  • 3. Secure Vi-Fi Network
If you go on www.qrstuff.com & generate the code, after scanning the code anyone can connect with Vi-Fi Network. For this purpose, you have to go on website, after this type & Enter the name, password & security type. If you do this one time after this when anyone will scan this generated QR Code then automatically he will able to connect with the Network.
  • 4. Code for Selling Purpose
If you want to sell your car,then you write the all information about your car & print this information. If a single person don’t have a enough time to read all your data, then you have prepare a QR Code for this purpose. If the single person scan this QR Code, then he can get any information related to your car. You can send your car photo link also in QR Code,which only open in Flicker or Picasa. Thus, the way Buyer can get all the information easily.5. QR Tatto
If you want to create the Tattoo about your personal information on your body, then it is also easily possible. For this purpose, you can find a skilled Tattoo Artist, who can recreate the working Qr Code on your Body.
In this QR Code the information about your personal website, name, Facebook a/c info & etc can be. But you have to take care about one or more things that Sharp Lines will available in Codes & it should be easily scannable with the help of Camera.
  • 6. Use in E-mail Signature
You can also use QR Codes in E-mail Signature. This code will copy the thing, which you want to tell through text. Its all depend on you that what information you provide Personal or Official. For this, First you have to create QR Code, after this image can upload on any image hosting website like www.imgur.com. Now you can take the direct link of image & can attach with your E-mail Signature.
  • 7. QR Codes on T-Shirts
You can generate the QR Codes through www.qrhacker.com. For working on this website, first you have to sign up. In this QR Code you can put any type of information.
You can also choose look & color for QR Codes,this is sounds good really.. You can pictured the picture in Background or Foreground of QR Codes. If you will prepare these all, then you can print this on T-Shirts & Key-Chains.

VIDEOS-

(1)*How to use QR codes on your iPhone*
(2)*How to scan QR codes on Smartphones*
(3)*How to use QR codes on your Android phone*
(4)*How to create and use ‘QR Codes’*(in easy way)
(5)*Add QR codes to your business card easily *

.
SO USE QR CODE IN YOUR DAILY LIFE.IT IS REALLY A GOOD, ADVANCED & TECH WORLD THING WHICH SHOULD BE USED.
Stay tuned for more updates…..!!

Tuesday, 31 March 2015

How to detect keylogger and remove it from your computer

Image result for detect keylogger

System Protecting Tricks

Steps to remove or detect keylogger from your computer
  1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
  2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
    winlogon.exe
    If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use LiutilitiesNeuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
    If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
  3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
  4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
    • Press Windows+R buttons, then type msconfig in the line and press Enter
    • Select Startup tab and disable all the unknown programs
    • Then restart your computer.
There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...


Saturday, 28 March 2015

Private Browsing: What is it and What it is not

Private BrowserMy Dad often use my laptop to check his emails. And yesterday he asked “Why do I always see your Gmail account logged in, whenever I open mine”. 
The answer is simple. Since its my personal computer, I don’t sign-out of my Google account. Off course I explain the reason and show him how to use private browser.
Now he checks his email in chrome’s incognito window. He don’t have to log me out every-time he opens Gmail and I don’t have to login back, once he’s done. A win win situation for both.
So we conclude two things, First my dad is not a tech savvy person (that’s understandable). Second, a little knowledge made life easier for both of us. And I am sure, it would do the same to you.
So What Exactly is Private Browser ?
It’s a feature found in most browser, whether if it’s mobile or desktop. ‘Private browser’ lets you browse internet, without storing your browsing history or cookies. Thus hiding your browsing history from other people using same computer.
Private Browser
But there is big misconception about private browser. People often think that it can make them anonymous. Which is not true. Only the people using your computer won’t see your browsing activity but rest of the internet can.
How Private browser works ?
Let say, last week you discover a funny cat video on YouTube. And now you want to show it to your friends. But the problem is, you don’t remember its name. No problem. You can still use the browser’s history to find that video. Right !
Now assume another situation. You are planning a surprise birthday party for your sibling. And you Google some party ideas and order some gifts online. But if your sibling use the same computer, (s)he can suspect your little secret. How ?
Either from the browser’s history you forgot to delete, or from the cookies that will attract targeted ads. So to avoid such problem we use private browser.
However there is fine line between when to use private browser and when not. But before we begin, let’s see how enable ‘private browsing mode’ in some popular browser. (click on the image to zoom it)
how to enable private browsing
When to Use Private Browser
Private browser doesn’t store your history, cookies, so use it when:
You are buying surprize gifts for someone
Private search that you want others to see
Avoid auto-fill history on public computer 
To login multiple Facebook or Google account in same browser
Want to see search results for people not login in their Google account
By default, extension don’t work in private browser. So use it, to test your webpage
Hotel and Airlines booking websites often raise the price for returning customer. They do that, by tracking your browser’s cookies. So when you suspect such activity, use private browser
When Not to Use Private Browser
Like I said, private browser don’t make you anonymous. It won’t change your IP address. Your ISP, your employer and your ISP still know who you are. Therefore never use it for ‘illegal searches’ that you don’t want them to see.
Moreover every bookmark you save or file you download, is save like in normal browsing, so don’t use it to download file that you don’t other to find out.
How to Browse Web Anonymously ?
There are many ways to hide your IP. For instance you can use proxy websites, install extension ZenMate, or even use program like TOR andUltraSurf to surf web anonymously. They are also helpful to get access to blocked websites in your colleges/office.

Bonus Tip
Use duckduckgo, a popular search engine when using private browser. It’s the only search engine that don’t track you. This won’t prevent your ISP or websites from tracking you. But at least Google won’t know what you search.

Tuesday, 24 March 2015

5 things you should know about 5G



5 things you should know about 5G
Add caption

To cope with the huge influx of connected devices that will be part of the Internet of Things (IoT), a new level of wireless internet connectivity will be required.
Fast forward to year 2020, i.e. five years from now, and hopefully the world of the future, filled with driver-less cars and pilot-less drones, is running smoothly and all of this will be built on one critical piece of technology - 5G.
At the moment, most of us are still getting to grips with 4G speeds on their smartphones. To start talking about 5G right now might seem a little presumptuous but the impact it could have on our lives could be as big as the transition from 2G to 3G.
Here are 10 things you should know about 5G to whet your appetite ahead of the launch early next decade.

5 things you should know about 5G

1. It's going to be ridiculously fast

5G speed
Think being able to download a full length movie to your smartphone in a second and you've got some idea of what the uplift in speed will be like come 2020. Samsung already set a mobile speed record of 7.5Gb/s in a 5G trial in October 2014 and most estimates expect the average speed of 5G networks to reach 10Gb/s and with transfer rates as high as a whopping 800Gb/s achievable down the line..
Forget 4K quality films, as by 2020 we will all be hankering for 8K films in 3D (16 times the pixel count of full HD) and the uplift in speed will make all this possible (at least in theory). It'll be that fast you might not even need that expensive fibre-optic connection. TheInternational Telecommunications Union (ITU) has already proposed a 100Mb/s-to-1Gb/s user experienced data rate for 5G with a 20Gb/s peak data rate and as an early indication those speeds are already way beyond what is already available.
Before we can even think about those speeds becoming a reality the ITU has a huge job on its hands to completely restructure all parts of the existing spectrum and harmonise them so that they support the rollout of 5G technology worldwide.
The move would mean that mobile internet access would not be restricted to one country for a user like it is today for 4G/LTE. Harmonisation, however, is often more about politics than it is about technology with countries often putting their pride before sense with the customer being often at the receiving end.
Hopefully, the times when your mobile signal would be faulty along international borders could soon be a thing of the past. It's an incredibly important step to take to ensure 5G speeds not only remain constant but also functional at all of the time.

2. The rise of the Internet of Things

Get ready to see sensors everywhere!
5G will be a much smarter way for devices to access the internet and the rollout has as much to do with the growth of IoT devices as it does anything else. Whilst 5G is ready to become the smartest network ever, the devices that connect to it will have to be too.
Everything from washing machines, smart meters, traffic cameras, driverless cars, smart roads and sensors attached to trees will be buzzing data to each other over the network at all times. Gartner's recent estimates of 25 billion connected "Things" by 2020 goes to show just how extensive the network will need to be to cope and it's hoped 5G will be that safety net to make things go smoothly.
All those many billions of "things" communicating with each other combined with the new 5G speeds means that those smart cities constantly talked about at tech events the world over will finally become a reality (or at least everybody in the tech industry is betting on that).
Glasgow is already rolling out a £24 million project to put sensors on streetlights and traffic lights that integrate with the existing CCTV network so that you know when bulbs need replacing amongst other things. This is just the start and when everything is communicating together successfully and in unison thanks to 5G, smart cities might finally flourish.

3. Huge increase in bandwidth capacity

New devices means new needs
All those new devices means that capacity will be one of the biggest needs for 5G to address and one estimate from the analyst community reckons that it has the potential to bring capacity that is 1,000 times higher than it is currently.
Other vendors put the capacity at somewhere between 100 and 1,000 times larger than the current state and combined with the new "things", it's the largest use case that has so far been put forward by companies attempting to justify why we need 5G.
Perhaps the most tantalising example of how 5G could transform our lives is in transportation. A future world where none of us need to even drive our own cars is finally on the way.
Collision detection, real-time navigation, remote traffic management and automatic breaking systems are just some of the innovations that will be made possible by the implementation of 5G networks. 5G is not critical for driverless cars but having it will help significantly .

4. "It won't break"

5G
One of the boldest predictions of any is that 5G will dispel all reliability issues and deliver a network that "doesn't break". A study released by Ericsson midway through 2014, includes "exceptionally high reliability" in a list of features that next generation networks will be able to support when they are eventually rolled out.
The latency of 5G is expected to be just a single millisecond (50 times faster than 4G) and the reliability factor is something that driverless cars and connected "things" will need for their usage to reach the heady figures mentioned earlier.
After all those points and the expectation of what 5G might end up becoming, we are still miles away from a harmonised set of rules that will influence the most important factor of them all - speed. We should get that later on this year when the ITU has concluded its studies and from there on, it'll be a mighty fast four and a half years until 5G starts to rollout.

5. Europe to "leapfrog" them all?

Will London be first?
UK consumers aren't expected to see it rollout until around 2020 at the very earliest with the price of the technology likely to be too high for anything to take place before later that decade. KT Telecom, however, has other ideas and the 2018 Winter Olympic Games in Pyeongchang could indeed see the first commercial rollout of the technology.
CEO Chang-Guy Hwang told a gathering at the Mobile World Congress 2015 that it would be the first commercial rollout of its kind and, even though Nokia Networks CEO Rajeev Suri dampened this by calling it a trial network, it's still a big step for the games that take place in under three years time.
Even though Korea looks like being the first country to see a trial of the technology, Europe could be at the front of the queue for any commercial roll out if Nokia Networks CEO, Rajeev Suri, is to be believed. "But, Korea could be first with 5G, followed by Japan and then the US. However, Europe could leapfrog all of these," he said at MWC 2015. Get excited UK!

thats all about 5G FOR now

Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
TRICKS AND TIPS CREATED BY SUSHIL UPADHYAY| Grants for single moms