Posts

Showing posts from May, 2018

32bit vs 64bit. what is the difference between 32bit and 64bit?

Image
Friends if you are buying a pc or laptop so many people people confusing on one thing is bit(32bit vs 64bit). Firstly, what is bit? A bit is a smallest unit of data in a computer. A bit has a single binary valve , either 0 or 1. In a bit we have only two valves and two memory locations, if we have 2bit(2^2=4B) then they have four memory locations, if we have 3bit(2^3=8B) then they have 8 memory locations. Let we talk about 32bit(2^32=4,294,967,296B) if we convert into GB(gigabytes) we will get 4GB that means 32bit processor have capacity to store 4GB data only... Now we talk about 64bit(2^64=1.844674407370E19B) if we convert into EB(exabyte) we will get 16EB. This is huge memory compare to 4GB. >  32bit processor have capacity to store only 4GB ram memory. >  64bit processor have capacity to store upto 16EB ram memory.( We didn't have that much ram if we will get it in future) 32bit processor: Case(1) : If your processor is 32bit and ...

What is Secure Sockets Layer (SSL) and How it Works?

1.What is Secure Sockets Layer (SSL)? A.Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https. In simple words, a HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a “Secure communication”. 2.How Secure Sockets Layer Works? A.Before we understand the concept of SSL, let us first learn what a “Secure Communication” means. Suppose there exists two communicating parties: Say A (client) and B (server). Working of HTTP: When A sends a message to B, the message is sent as a plain text in an unencrypted manner. This is acceptable in normal situations where the messages exchanged are not confidential. But, imagine a situation where A sends a PASSWORD to B. I...

What is Doxing and How it is Done?

What is Doxing and How it is Done? In the modern world, Internet has become a wonderful place to gain knowledge, exchange ideas, share information, make new friends and whatnot.Even though, you can do all of this by remaining anonymous behind your monitor, your real life identity and personal details can still be at the risk of falling into the hands of strangers. This is where the term “doxing” comes into play! 1.What is Doxing? A.Doxing simply refers to the process of gathering or deducing other people’s information such as name, age, email, address, telephone number, photographs etc. using publicly available sources such as the Internet. In other words, doxing is the act of using the Internet to search for personal details about a person. 2. How Doing is done? Doxing is done by initially taking a piece of information (such as “name” or “email address”) and keeping it as a base to find out other possible details about the person. The term “doxing” is derived from the word “do...

what is megapixel? || Do more megapixels means better photo quality?

What is mega pixel? A. A single megapixel amounts to exactly one million pixels in an image. These pixels are placed at image sensor, vertically and horizontally. If you count pixels in image sensor, vertically and horizontally you will get one million pixels if your camera is one megapixel. The work of pixels is captureing details and it looks like small bots. Do more megapixels means better photo quality? A. No Reason : The number of megapixels is only one aspect relating to the quality of a camera or the actual quality of a picture it is capable to produceing. Factors such as camera sensor size,pixel size,optical quality of a lens, aperture and image processing. 1. Camera sensor size: The bigger the sensor size is better the quality of a picture. You can easily make this out by comparing pictures taken from DLSR/phone camera. If you compare both the pictures quality, picture taken in DSLR is better because camera sensor size is big. 2. Pixel size: Pixel size is...

History of computers

Image
Firstly  Tim Cranmer Abacus  invented an device and he named to that device is "ABACUS" in 1300AC. In this device we didn't have display and storage and this is used for the calculation purpose. Secondly mathematician  Blaise Pascal  invented an device and he named to that device is "CALCULATOR" in 1642. In this device we have display but no storage. This is also used for calculation purpose. Thirdly mathematician  Charles Babbage invented an device and he named to that device is "COMPUTER". In this device we have display and storage. Computer : It is an electronic device and it is a combination of hardware and software. There are five generations in computers. First generation computers: 1st generation computer was developed by John Presper Eckert and John W. Mauchly and was a general purpose computer. "Von Neumann" designed the Electronic Discrete Variable Automatic Computer (EDVAC) in 1945 with a memory to hold both...

How to prevent DNS hijacking?

How to Prevent DNS Hijacking? In most cases, attackers make use of malware programs such as a trojan horse to carry out DNS hijacking. These DNS hijacking trojans are often distributed as video and audio codecs, video downloaders, YouTube downloaders or as other free utilities. So, in order to stay protected, it is recommended to stay away from untrusted websites that offer free downloads. The DNSChanger trojan is an example of one such malware that hijacked the DNS settings of over 4 million computers to drive a profit of about 14 million USD through fraudulent advertising revenue. Also, it is necessary to change the default password of your router, so that it would not be possible for the attacker to modify your router settings using the default password that came with the factory setting.  Installing a good antivirus program and keeping it up-to-date can offer a great deal of protection to your computer against any such attacks. I have an  Tech  channel if you a...

Types of Facebook hacking and how to protect

Types of Facebook Hacking and How to Protect As you, all know that Facebook is the leading social network. It has billions of users. Facebook Hacking is increasing so protect your’s account. There are many ways one can hack Facebook Account. Today let discuss types of Facebook hacking and how to protect yourself from them. 1.Keylogging: Keylogging is the easiest way to hack a Facebook password. It sometimes can be so dangerous that even a person with a good knowledge of computers can fail to find it. In this type of attack, a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes that file on his pc, whatever he types will be mailed/uploaded to hacker’s server. How to Protect: Use a firewall. Execute the file only fro a trusted sender. Use online scanner such as  novirus.org Use good antivirus. 2.Phishing: Phishing is the most popular attack used for hacking Facebook accounts. It is actually creating fake web pages...

HDD vs SSD - Difference and comparison

If you are in the market to buy an external hard drive,you are hearing terms "SSD" and "HDD".so many people confusing to buy SSD or HDD. External hard drives are used to backup your important files,some files that are really large or to backup data that is so big it cannot be stored on your computer (or) laptop.so one would use a Hard Disk Drive for this purpose.              The most recent solid state drive serves a similar purpose,but this is completely different enabling many performance improvements over HDD.A SSD can speed up the performance of a computer significantly,often more than what a faster processor (or) RAM.SSD are the latest technology when it comes to data storage and work on the frame work of inter connected flash memory chips.HDDs work on older technology that uses moving disks and readers to store and retrieve data SSDs have several advantages over HDD drives. Here are few comparisons between SSDs and HDDs,that will help yo...

How to setup Two-step verification for your social media accounts?

Two-step verification means if anyone try to login to your account fram any device or browser,then they will need to provide a secondary code as verification, before they can proceed to login to your account. This means if they know your actual username and password,the unauthorised user will still need a second factor to access your account. Most of the major social media accounts currently offer it. Let's talk about how we should enable. How to enable it? 1. Facebook • Login to your account • Open settings and privacy menu bar • Select account settings and click on security and login • Scroll down to configure Two-step verification via SMS • Finally,you will receive confirmation mail 2. Twitter • Login to your account • Go to settings and privacy • Select account and click on security • And activate login verification and follow the instructions • Finally you will get a confirmation mail 3. WhatsApp • Open WhatsApp in your mobile • Go to settings a...

Why memory card shows"less space" than advertised?

Hi friends in this topic we will talk about "why memory cards shows less space than advertised?" So many of you  using memory cards with different sizes.but some of you have small doudts like(showing less space 8gb =7.8gb) If you ask this question to anyone soany people tell system reserved   but this is wrong answer. I will say the actual answer In English Kilo means one thousand (1000 1  = 1,000), a Mega is a million (1,000 2  = 1,000,000) , a Giga is a billion (1,000 3  = 1,000,000,000) and so on (Tera, Peta, Exa, Zetta & Toyya). This system is called the SI units system. In Computer, however, the numbers are a bit different: A Kilo means 1,024 1  = 1,024, a Mega is 1,024 2 = 1,048,576, a Giga is 1024 3  = 1,073,741,824 and so on. This is called the Binary units system. Memorycards manufactures choose to use the SI system to denote cards sizes. Our computers and card readers use the binary system for size calculatio...