tag:blogger.com,1999:blog-82452367494429940512024-03-13T14:10:04.768+05:30Learn|Grow|EnvolveThis blog is meant mainly for educational/information purpose...<br>contents related to network and security will be shared here<br> NOTE:- owner of the blog will not be held responsible for any harm cause to you and your device or by you in the WWWshubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.comBlogger21125tag:blogger.com,1999:blog-8245236749442994051.post-28044098949173104332018-02-04T14:48:00.002+05:302019-07-30T13:05:32.687+05:30Brand Thing <h4 style="height: 0px;">
<br />It's a online store designed mainly for students with low and affordable rates and with high quality products.</h4>
<div>
<br /></div>
<div>
<br />
must go through the <a href="https://brandthing.wooplr.com/">store</a> its user friendly and has good user interface<br />
<br />
<h4>
some features of the store</h4>
* COD available</div>
<div>
* Return/exchange available<br />
* Customer care support<br />
* 24*7 online</div>
<div>
hope you will enjoy it <a href="https://brandthing.wooplr.com/">(click here to visit)</a></div>
<div>
<br /></div>
<div>
store link: <a href="https://brandthing.wooplr.com/">https://brandthing.wooplr.com/</a></div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-1385015787341862642017-12-19T17:08:00.002+05:302017-12-22T16:25:05.855+05:30BitCoin Mining<div class="MsoNormal">
Bitcoins act like cash, but they are mined like gold. So how
does someone get into the current bitcoin rush?<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
If properly done and willing to take the investment risk,
you could wind up with a few bitcoins of your own—which currently have an
average weekly price of $945 on the largest bitcoin exchange.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Here's how it's done.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<a name='more'></a><br />
<div class="MsoNormal">
How many bitcoins are there?<o:p></o:p></div>
<div class="MsoNormal">
When the algorithm was created under the pseudonym Satoshi
Nakamoto—which in Japanese is as common a name as Steve Smith—the individual(s)
set a finite limit on the number of bitcoins that will ever exist: 21 million.
Currently, more than 12 million are in circulation. That means that a little
less than 9 million bitcoins are waiting to be discovered.<o:p></o:p></div>
<div class="MsoNormal">
Since 2009, the number of bitcoins mined has skyrocketed.
That's the way the system was set up—easy to mine in the beginning, and harder
as we approach that 21 millionth bitcoin. At the current rate of creation, the
final bitcoin will be mined in the year 2140.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
What exactly is mining?<o:p></o:p></div>
<div class="MsoNormal">
There are three primary ways to obtain bitcoins: buying on
an exchange, accepting them for goods and services, and mining new ones.
"Mining" is lingo for the discovery of new bitcoins—just like finding
gold. In reality, it's simply the verification of bitcoin transactions. <o:p></o:p></div>
<div class="MsoNormal">
For example, Eric buys a TV from Nicole with a bitcoin. In
order to make sure his bitcoin is a genuine bitcoin, miners begin to verify the
transaction. <o:p></o:p></div>
<div class="MsoNormal">
It's not just one transaction individuals are trying to
verify; it's many. All the transactions are gathered into boxes with a virtual
padlock on them—called "block chains."<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Miners run software to find the key that will open that
padlock<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Once their computer finds it, the box pops open and the
transactions are verified. For finding that "needle in a haystack"
key, the miner gets a reward of 25 newly generated bitcoins.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
The current number of attempts it takes to find the correct
key is around 1,789,546,951.05, according to Blockchain.info—a top site for the
latest real-time bitcoin transactions. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Despite that many attempts, the 25-bitcoin reward is given
out about every 10 minutes. In 2017, the bitcoin reward for verifying
transactions will halve to 12.5 new bitcoins and will continue to do so every
four years. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
How do you mine on a budget?<o:p></o:p></div>
<div class="MsoNormal">
Bitcoin mining can be done by a computer novice—requiring
basic software and specialized hardware. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
The software required to mine is straightforward to use and
open source—meaning free to download and run.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
A prospective miner needs a bitcoin wallet—an encrypted
online bank account—to hold what is earned. The problem is, as in most bitcoin
scenarios, wallets are unregulated and prone to attacks. Late last year,
hackers staged a bitcoin heist in which they stole some $1.2 million worth of
the currency from the site Inputs.io. When bitcoins are lost or stolen they are
completely gone, just like cash. With no central bank backing your bitcoins,
there is no possible way to recoup your loses. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
The second piece of software needed is the mining software
itself—the most popular is called GUIMiner. When launched, the program begins
to mine on its own—looking for the magic combination that will open that
padlock to the block of transactions. The program keeps running and the faster
and more powerful a miner's PC is, the faster the miner will start generating
bitcoins.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
When mining began, regular off-the-shelf PCs were fast
enough to generate bitcoins. That's the way the system was set up—easier to mine
in the beginning, harder to mine as more bitcoins are generated. Over the last
few years, miners have had to move on to faster hardware in order to keep
generating new bitcoins. Today, application-specific integrated circuits (ASIC)
are being used. Programmer language aside, all this means is that the hardware
is designed for one specific task—in this case mining.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
New faster hardware is being created by various mining
start-ups at a rapid rate and the price tag for a full mining rig—capable of
discovering new bitcoins on its own—currently costs in the ballpark of $12,000.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
(Read more: How to make your email as stealth as Edward
Snowden)<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
There is a way around such a hefty investment: joining
mining pools. Pools are a collective group of bitcoin miners from around the
globe who literally pool their computer power together to mine. Popular sites
such as Slush's Pool allow small-time miners to receive percentages of bitcoins
when they add their computer power to the group.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
The faster your computer can mine and the more power it is
contributing to the pool, the larger percentage of bitcoins received. Bitcoins
can be broken down into eight decimal points. Like wallets, pool sites are
unregulated and the operator of the pool—who receives all the coins mined—is under
no legal obligation to give everyone their cut.<o:p></o:p></div>
<div class="MsoNormal">
Joining a pool means you can also use cheaper hardware. USB
ASIC miners—which plug into any standard USB port—cost as little as $20.
"For a few hundred dollars you could make a couple of dollars a day,"
according to Brice Colbert, a North Carolina-based miner of cryptocurrencies
and operator of the site cryptojunky.com. "You're not going to make a lot
of money off of it and with low-grade ASICs you could lose money depending on
the exchange rate." <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
The other way you could lose money when it comes to mining
is power consumption. Currently, profits outweigh money spent on the energy
needed to mine. Again, that could quickly change due to the volatile price of
bitcoin.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<br />
<div class="MsoNormal">
"It's time sensitive, like a yo-yo", said Jeff
Garzik, a Bitcoin developer for the payment processor BitPay. It's not mining
or investors that are causing the radical highs and lows in the currency's
value, it's the media, he said. "Bitcoin's price tends to follow media
cycles, not hardware or mining. The difficulty in mining is not the highest
correlation in bitcoin value.<o:p></o:p></div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-23760041988809222002017-12-09T14:25:00.000+05:302017-12-09T14:54:15.393+05:30Freeware To the readers I apologise that i was away for quite a long time and i am back now with something interesting freeware<br />
<div>
<span style="-webkit-text-size-adjust: 100%; font-size: 12pt;"><br /></span></div>
<div>
<span style="-webkit-text-size-adjust: 100%; font-size: 12pt;">It contains google drive link for many intrest things which include movies, novels, books, coding language lessons and mano more things grab it ASP. </span><br />
<div>
<div>
<br />
<a name='more'></a><br /><br />
<br /></div>
<div>
Google drive movies https://drive.google.com/drive/u/0/mobile/folders/0B6FjKMQKynZILTlwZHl4ajUwcFU</div>
<div>
<br /></div>
<div>
*Programming language collection on google drive* - https://drive.google.com/drive/folders/0ByWO0aO1eI_MN1BEd3VNRUZENkU</div>
<div>
<br /></div>
<div>
*Books*-</div>
<div>
https://drive.google.com/drive/folders/0B0hgUX3me1_RNi1KTXBzXzdXSzA</div>
<div>
<br /></div>
<div>
*Google drive hacking ebook collection*</div>
<div>
- https://drive.google.com/drive/folders/0B-JzQsKoJaANbTFGN0RWLWhONms</div>
<div>
<br /></div>
<div>
*Books for reading*</div>
<div>
- https://drive.google.com/drive/folders/0B09qtt10aqV1SGxRVXBWYmNIS2M</div>
<div>
<br /></div>
<div>
*Books (novels)* -</div>
<div>
https://drive.google.com/drive/folders/0B1v9Iy1jH3FXdlNDeUNHNEVsZlE</div>
<div>
<br /></div>
<div>
*Books* - </div>
<div>
https://drive.google.com/drive/folders/0B1Ef5shqGHDNRGEwd3BYb0N3Um8</div>
<div>
<br /></div>
<div>
*C programming tutorial* google drive - https://drive.google.com/drive/folders/0B1qoi1IlEKwaM2tSMFBmOGUyNzg</div>
<div>
<br /></div>
<div>
*Udemy course google drive link* - https://drive.google.com/drive/folders/0B1HQDi7EkA9XNlR3STF5SVJIVUk</div>
<div>
<br /></div>
<div>
*Programming books google drive* - https://drive.google.com/drive/folders/0B2iEK7PB5AR-b01obXBHWHVHQzg</div>
<div>
<br /></div>
<div>
*Linux books* - https://drive.google.com/drive/folders/0B1Wzf8eTK3LTYWtqOGlnQldTV2c</div>
<div>
<br /></div>
<div>
*4K wallpaper google drive* - https://drive.google.com/drive/folders/0Bx2Vez2N3qd7SGxkejRhQmdKQlk</div>
<div>
<br /></div>
<div>
https://drive.google.com/drive/folders/0B2VhgL11XGQoamJCNGprcUJ2Zms</div>
<div>
<br /></div>
<div>
*Books for reading* -</div>
<div>
https://drive.google.com/drive/folders/0B_qpgvDTe8kraTQ2QkM2S19tQWs</div>
<div>
<br /></div>
<div>
*Books*- </div>
<div>
https://drive.google.com/drive/folders/0B4PtWlBoZ1rVSncxbi1JVFY4anM</div>
<div>
<br /></div>
<div>
*Best collection google drive*-</div>
<div>
https://drive.google.com/drive/folders/0B3Qd1rlyIyR5bHo0dENpM1lSclk</div>
<div>
<br /></div>
<div>
*Banking exam preparation papers* - </div>
<div>
https://</div>
<div>
drive.google.com/drive/folders/0B079Cm0MfQeyS3R5cHVnb2RVUU0</div>
<div>
<br /></div>
<div>
*Learning awareness banking lecture*</div>
<div>
- https://drive.google.com/drive/folders/0B8CnCCd60bnzM3VSWFhKZ2Rzc2s</div>
<div>
<br /></div>
<div>
*Head first programming book collection*</div>
<div>
- https://drive.google.com/drive/folders/0B1W3DeV5S5BELXZRajkteW83WHM</div>
<div>
<br /></div>
<div>
*IBPS book collection for banking*</div>
<div>
- https://drive.google.com/drive/folders/0B4xFnW1qvXXgZnVkaUVEX2w4Zzg</div>
<div>
<br /></div>
<div>
*Reading material* - https://drive.google.com/drive/folders/0Bx_3I5qjqu3rSVBWMHpjLVRoREE</div>
<div>
<br /></div>
<div>
*300 medical books* - https://drive.google.com/drive/folders/0BzQUrkcZOjAiYmQ0NTBjZmMtMDJjMS00OWViLTk0NWEtYTFhYzE2ZTZmYzdk</div>
<div>
<br /></div>
<div>
*[Udemy] the complete digital marketing course* - https://drive.google.com/drive/folders/0B-M90IqpPfRHNXZ6SkdMQlZOUkk</div>
<div>
<br /></div>
<div>
*Arduino step by step* - https://drive.google.com/drive/folders/0B0TIoKgqQ9p5WC1pV2I0aHlKamc</div>
<div>
<br /></div>
<div>
*All type books* - </div>
<div>
https://drive.google.com/drive/folders/0B1dv5sqSPsPbfk1ZSXNud1pvWl9BV2Franh2ZFl0S0hweTBhT3QyNFUxWGgzQkFpOGUtd0k</div>
<div>
<br /></div>
<div>
*Mechanical engineering books* -</div>
<div>
https://drive.google.com/drive/folders/0B1k2RCDnejGvNFZWTWhJeDctWDQ</div>
<div>
<br /></div>
<div>
*Study books*</div>
<div>
- https://drive.google.com/drive/folders/0B6hG9OOiP0g2Zkh4M2x3WnVJNWs</div>
<div>
<br /></div>
<div>
*English*- </div>
<div>
https://drive.google.com/drive/folders/0B5xOSW6DBC5LfkVZWTJqYUZOblgyQnlhSlc2U1RJWUFyWjBnUXc0dHlrTHR5dEUySXNYc0E</div>
<div>
<br /></div>
<div>
*English grammer* - </div>
<div>
https://drive.google.com/drive/folders/0B1_NUA4_UggJYUIwc09LX1dfcDA</div>
<div>
<br /></div>
<div>
*GMAT, GRE, TOEFL, IELTS & LSAT*</div>
<div>
- https://drive.google.com/drive/folders/0B2jZERjUXCHhZnB5T0tpY2ZyRmc</div>
<div>
<br /></div>
<div>
*Html essential training -* https://drive.google.com/drive/folders/0B3LfaGUUk6tiT18xZDRBY1FCVXc</div>
<div>
<br /></div>
<div>
*Lynda courses*</div>
<div>
- https://drive.google.com/drive/folders/0B5eJ2fw2iba1UlZna0FUWXF4UFU</div>
<div>
<br /></div>
<div>
*Mathematics* -</div>
<div>
https://drive.google.com/drive/folders/0BzeyVSBfx9yaWUMtUXZNLU9kM0k</div>
<div>
<br /></div>
<div>
*Php development course*- https://drive.google.com/drive/folders/0ByWO0aO1eI_MV0lhX1dkUlQ3YUk</div>
<div>
<br /></div>
<div>
*Programming books*- https://drive.google.com/drive/folders/0B2iEK7PB5AR-b01obXBHWHVHQzg</div>
</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
Note: sone link may be dead, go to the comment section fir the same so that i can provide you with the live link .</div>
</div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-79592779938480626332016-03-13T16:12:00.000+05:302016-03-15T01:08:42.005+05:30WHATsapp_The_Face By: yogi<span style="font-family: "courier new" , "courier" , monospace;">Tired of cutting your image from the top, bottom or from the sides because whatsapp don't allow big sized images to keep it as your display picture(DP)...<br />here is the solution for this... a self made software by a friend of mine "WHATsapp_The_Face" which will decrease the size of the original image without reducing/cutting the image and make it compatible, which can be set as your display picture easily...</span><br />
<span style="font-family: "courier new" , "courier" , monospace;"></span><br />
<a name='more'></a><span style="font-family: "courier new" , "courier" , monospace;"><br /></span>
<span style="font-family: "courier new" , "courier" , monospace;"><br /></span>
<span style="font-family: "courier new" , "courier" , monospace;">follow the steps to install the software</span><br />
<span style="font-family: "courier new" , "courier" , monospace;"><br /></span>
<span style="font-family: "courier new" , "courier" , monospace;">step 1: download the software <span style="font-size: x-small;"><a href="http://devzone.pe.hu/wtf/download.php">click here.</a></span></span><br />
<span style="font-family: "courier new" , "courier" , monospace;">step 2: install the software.</span><br />
<span style="font-family: "courier new" , "courier" , monospace;">step 3: select the image which you want to set as your DP.</span><br />
<span style="font-family: "courier new" , "courier" , monospace;">step 4: wait while image is processing.</span><br />
<span style="font-family: "courier new" , "courier" , monospace;">step 5: bow.. hear's the image, use this as your DP without any problem.</span><br />
<span style="font-family: "courier new" , "courier" , monospace;"><br /></span>
<span style="font-family: "courier new" , "courier" , monospace;">download software from <a href="http://devzone.pe.hu/wtf/download.php">here</a></span><br />
<span style="font-family: "courier new" , "courier" , monospace;"><br /></span>
<span style="font-family: "courier new" , "courier" , monospace;">NOTE: installation password: yogi</span><span style="font-family: "courier new" , "courier" , monospace;"> </span>shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-16779523886368178832016-01-21T11:01:00.001+05:302016-01-24T20:45:15.546+05:30Creating your own local server(by Xampp)<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
XAMPP stands for Cross-Platform (X), Apache (A), MySQL (M), PHP (P) and Perl (P). It is a simple, lightweight Apache distribution that makes it extremely easy for developers to create a local web server for testing purposes. Everything you need to set up a web server – server application (Apache), database (MySQL), and scripting language (PHP) – is included in a simple extractable file. XAMPP is also cross-platform, which means it works equally well on Linux, Mac and Windows. Since most actual web server deployments use the same components as XAMPP, it makes transitioning from a local test server to a live server is extremely easy as well. Web development using XAMPP is especially beginner friendly, as this popular PHP and MySQL for beginners course will teach you.<span id="more-17016" style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"></span><br />
<br />
<a name='more'></a><br /></div>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: 'Open Sans', sans-serif; font-size: 1.875rem; letter-spacing: 0.16px; line-height: 1.2; margin: 1.2em 0px 1rem; padding: 0px; vertical-align: baseline;">
What’s Included in XAMPP?</h2>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
XAMPP has four primary components. These are:</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">1. Apache:</strong> Apache is the actual web server application that processes and delivers web content to a computer. Apache is the most popular web server online, powering nearly 54% of all websites.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">2. MySQL:</strong> Every web application, howsoever simple or complicated, requires a database for storing collected data. MySQL, which is open source, is the world’s most popular database management system. It powers everything from hobbyist websites to professional platforms like WordPress. You can learn how to master PHP with this free MySQL database for beginners course.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">3. PHP:</strong> PHP stands for Hypertext Preprocessor. It is a server-side scripting language that powers some of the most popular websites in the world, including WordPress and Facebook. It is open source, relatively easy to learn, and works perfectly with MySQL, making it a popular choice for web developers.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">4. Perl</strong>: Perl is a high-level, dynamic programming language used extensively in network programming, system admin, etc. Although less popular for web development purposes, Perl has a lot of niche applications.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Different versions of XAMPP may have additional components such as phpMyAdmin, OpenSSL, etc. to create full-fledged web servers.</div>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: 'Open Sans', sans-serif; font-size: 1.875rem; letter-spacing: 0.16px; line-height: 1.2; margin: 1.2em 0px 1rem; padding: 0px; vertical-align: baseline;">
How to Install XAMPP?</h2>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
[<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Note</strong>: For the purpose of this XAMPP tutorial, we’ll assume that you’re using a Windows PC, although these instructions work equally well for Mac computers. Linux users, however, should refer to the official XAMPP Linux installation guide.]</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Head over to XAMPP for Windows homepage on ApacheFriends.org. Here, you will find multiple versions of XAMPP.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
In this tutorial, we will install <strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">XAMPP Windows 1.8.2</strong> which includes:</div>
<table border="0" cellpadding="0" cellspacing="0" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin: 0px; padding: 0px; vertical-align: baseline;"><tbody style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<b style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Component</b></div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<b style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Description</b></div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<b style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Version</b></div>
</td></tr>
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Apache</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Default web server application</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
2.4.4</div>
</td></tr>
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
MySQL</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Database management system</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
5.5.32</div>
</td></tr>
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
PHP</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Server-side, general purpose programming language</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
5.4.19</div>
</td></tr>
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
phpMyAdmin</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Admin tool for working with MySQL</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
4.0.4</div>
</td></tr>
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
OpenSSL</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
An open-source implementation of two popular security protocols – SSL and TSL</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
0.9.8</div>
</td></tr>
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
XAMPP Control Panel</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
A simple control panel for working with different XAMPP components</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
3.2.1</div>
</td></tr>
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Webalizer</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
An analytics tool that generates user logs and usage metrics.</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
2.23-04</div>
</td></tr>
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Mercury Mail Transport System</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
A simple, open-source mail server</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
4.62</div>
</td></tr>
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
FileZilla FTP Server</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
A FTP (File Transfer Protocol) server to make file transfers smoother</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
0.9.41</div>
</td></tr>
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Tomcat</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
A freeware Java servlet for serving Java applications</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
7.0.42</div>
</td></tr>
<tr style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;"><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Strawberry Perl</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
A popular distribution of Perl for Windows</div>
</td><td style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;" valign="top"><div align="center" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
5.16.3.1</div>
</td></tr>
</tbody></table>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Unless you are running a live web server, you won’t need anything beyond Apache, MySQL and PHP, although it is a good practice to install all other components as well.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
You also have the option of installing a smaller ‘XAMPP Portable Lite’ version, which only includes essential Apache, MySQL, PHP and phpMyAdmin components.</div>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: 'Open Sans', sans-serif; font-size: 1.5rem; letter-spacing: 0.16px; line-height: 1.2; margin: 1.2em 0px 1rem; padding: 0px; vertical-align: baseline;">
Downloading XAMPP</h3>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
XAMPP is available in three file formats:</div>
<ul style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; list-style: none; margin: 0px 0px 1.625rem; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; line-height: 1.625; list-style-type: disc; margin: 0px 0px 0px 2.5rem; padding: 0px; vertical-align: baseline;"><div dir="ltr" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
.EXE – Self-executable file; easiest to install.</div>
</li>
<li style="border: 0px; box-sizing: border-box; line-height: 1.625; list-style-type: disc; margin: 0px 0px 0px 2.5rem; padding: 0px; vertical-align: baseline;"><div dir="ltr" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
.7z – 7zip file. Favored by purists, although it requires working with more complicated .bat files to install.</div>
</li>
<li style="border: 0px; box-sizing: border-box; line-height: 1.625; list-style-type: disc; margin: 0px 0px 0px 2.5rem; padding: 0px; vertical-align: baseline;"><div dir="ltr" style="border: 0px; box-sizing: border-box; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
.ZIP – Compressed zip file. Like .7z, installing through .ZIP files is considerably more difficult than using .EXE</div>
</li>
</ul>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Since .EXE is the easiest to install, we will use this file format for this tutorial.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
You can download the XAMPP installer from Sourceforge here (102MB).</div>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: 'Open Sans', sans-serif; font-size: 1.5rem; letter-spacing: 0.16px; line-height: 1.2; margin: 1.2em 0px 1rem; padding: 0px; vertical-align: baseline;">
Installing XAMPP</h3>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Follow these steps for installing XAMPP:</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 1:</strong> Disable your anti-virus as it can cause some XAMPP components to behave erratically.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 2</strong>: Disable User Account Control (UAC). UAC limits write permissions to XAMPP’s default installation directory (c:/Program Files/xampp), forcing you to install in a separate directory. You can learn how to disable UAC here. (Optional)</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 3:</strong> Start the installation process by double-clicking on the XAMPP installer. Click ‘Next’ after the splash screen.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; letter-spacing: 0.16px; line-height: 29.7px; margin: 0px; padding: 0px; vertical-align: baseline;">Step 4</strong><span style="letter-spacing: 0.16px; line-height: 29.7px;">: Here, you can select the components you want to install. Choose the default selection and click ‘Next’.</span></div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; letter-spacing: 0.16px; line-height: 29.7px; margin: 0px; padding: 0px; vertical-align: baseline;">Step 5</strong><span style="letter-spacing: 0.16px; line-height: 29.7px;">: Choose the folder you want to install XAMPP in. This folder will hold all your web application files, so make sure to select a drive that has plenty of space.</span></div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 6:</strong> The next screen is a promo for BitNami, an app store for server software. Deselect the ‘Learn more about BitNami for XAMPP’ checkbox, unless you actually enjoy receiving promo mails!</div>
<div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 7:</strong> Setup is now ready to install XAMPP. Click Next and wait for the installer to unpack and install selected components. This may take a few minutes. You may be asked to approve Firewall access to certain components (such as Apache) during the installation process.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 8:</strong> Installation is now complete! Select the ‘Do you want to start the Control Panel now?’ checkbox to open the XAMPP control panel.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<br /></div>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: 'Open Sans', sans-serif; font-size: 1.875rem; letter-spacing: 0.16px; line-height: 1.2; margin: 1.2em 0px 1rem; padding: 0px; vertical-align: baseline;">
Understanding XAMPP Control Panel</h2>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
The XAMPP control panel gives you complete control over all installed XAMPP components. You can use the CP to start/stop different modules, launch the Unix shell, open Windows explorer and see all operations running in the background.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Here is a quick overview of the Control Panel. For now, you only need to know how to start and stop an Apache server.</div>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: 'Open Sans', sans-serif; font-size: 1.875rem; letter-spacing: 0.16px; line-height: 1.2; margin: 1.2em 0px 1rem; padding: 0px; vertical-align: baseline;">
Testing Your XAMPP Installation</h2>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Follow these steps to test your XAMPP installation by launching the Apache web server and creating a simple PHP file.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 1:</strong> In the XAMPP control panel, click on ‘Start’ under ‘Actions’ for the Apache module. This instructs XAMPP to start the Apache webserver.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 2:</strong> Open your web browser and type in: http://localhost or 127.0.0.1</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 3:</strong> Select your language from the splash screen.</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 4:</strong> You should see the following screen. This means you’ve successfully installed XAMPP on your computer.</div>
</div>
<div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 5:</strong> We will now test whether XAMPP has installed PHP successfully. To do this, fire up Notepad and type the following into a new document:</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<?php</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
echo ‘Hello world’;</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
?></div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
Save this file as ‘test.php’ in c:\xampp\htdocs\ (or whichever directory you installed XAMPP in).</div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; vertical-align: baseline;">Step 6</strong>: Navigate to localhost/test.php. You should see the “Hello World” message:</div>
</div>
<div>
<span style="background-color: white; color: rgba(0 , 0 , 0 , 0.8); font-family: "lora" , "georgia" , serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px;">Congratulations! You have now successfully installed XAMPP</span></div>
<div dir="ltr" style="background-color: white; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.8); font-family: Lora, georgia, serif; font-size: 18px; letter-spacing: 0.16px; line-height: 29.7px; margin-bottom: 1.25rem; padding: 0px; vertical-align: baseline;">
<span style="letter-spacing: 0.16px; line-height: 29.7px;"><br /></span>
<span style="letter-spacing: 0.16px; line-height: 29.7px;">NOTE1:- for better performance and working of the server it is recommended that the server should not be installed in the drive which contains your operating system.</span><br />
<span style="letter-spacing: 0.16px; line-height: 29.7px;">eg: if you have oS installed in c: drive then choose another drive to install the server<br />NOTE2:- always open the control pannel of the server with administrator privilage.</span><br />
<span style="letter-spacing: 0.16px; line-height: 29.7px;"><br /></span></div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-76094746975184296362015-11-22T19:42:00.001+05:302015-11-22T19:42:36.493+05:30get IP in the network <span style="font-family: Courier New, Courier, monospace;">in order to get the ip address and all the device connected in the network just go for a software and scan the ip range </span><div>
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">get the software here and you are done<br /></span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">this is the software i prefer there are lot more software available in internet but this is simple,powerful and free too....</span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;">tip: by using this software you can easily get the access to all the files shared on the network... you can easily download it to your syatem and can hav access to it </span></div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-85605271407681002652015-11-22T19:31:00.002+05:302015-11-30T22:43:48.641+05:30getting MAC of remote deviceTo determine the MAC address of a remote device:<br>
its quit easy to get the MAC of a remote device in order to get the MAC of any remote device with the known ip address just follow a simple step and you are done<br>
<br>
<br>
<a name="more"></a><br>
<br>
<a href="http://learngrowenvolve.blogspot.com/2015/11/get-ip-in-network.html" target="_blank"><br></a>
<a href="http://learngrowenvolve.blogspot.com/2015/11/get-ip-in-network.html" target="_blank">HOW TO GET THE IP ADDRESS OF SYSTEM CONNECTED TO THE NETWORK</a><br>
<br>
Open the MS-DOS prompt (From the Run... command, type "CMD" and press Enter).<br>
Ping a remote device that you want to find the MAC address (for example: PING 192.168.0.1).<br>
Type "ARP -A", and press Enter.<br>
here you are DONE...!!! with itshubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-21568383208408368742015-11-01T12:37:00.000+05:302015-11-22T19:19:26.643+05:30About Linux<div id="content-header" style="background-color: white; color: #4d4d4d; font-family: Tahoma, Verdana, Arial, Helvetica, 'Bitstream Vera Sans', sans-serif; font-size: 12px; line-height: 17.196px;">
<h1 class="title" style="clear: both; font-weight: normal; line-height: 1.3em; margin: 0px;">
What is Linux</h1>
</div>
<div id="content-area" style="background-color: white; color: #4d4d4d; font-family: Tahoma, Verdana, Arial, Helvetica, 'Bitstream Vera Sans', sans-serif; font-size: 12px; line-height: 17.196px;">
<div class="node node-type-page" id="node-6724">
<div class="node-inner">
<div class="content">
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux is, in simplest terms, an operating system. It is the software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired functions. The operating system (OS) relays instructions from an application to, for instance, the computer's processor. The processor performs the instructed task, then sends the results back to the application via the operating system.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Explained in these terms, Linux is very similar to other operating systems, such as Windows and OS X.<br />
<br />
<a name='more'></a><br /></div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
But something sets Linux apart from these operating systems. The Linux operating system represented a $25 billion ecosystem in 2008. Since its inception in 1991, Linux has grown to become a force in computing, powering everything from the New York Stock Exchange to mobile phones to supercomputers to consumer devices.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
As an open operating system, Linux is developed collaboratively, meaning no one company is solely responsible for its development or ongoing support. Companies participating in the Linux economy share research and development costs with their partners and competitors. This spreading of development burden amongst individuals and companies has resulted in a large and efficient ecosystem and unheralded software innovation.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Over 1,000 developers, from at least 100 different companies, contribute to every kernel release. In the past two years alone, over 3,200 developers from 200 companies have contributed to the kernel--which is just one small piece of a Linux distribution.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
This article will explore the various components of the Linux operating system, how they are created and work together, the communities of Linux, and Linux's incredible impact on the IT ecosystem.</div>
<h2 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.667em; margin-top: 0.667em;">
Where is Linux?</h2>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
One of the most noted properties of Linux is where it can be used. Windows and OS X are predominantly found on personal computing devices such as desktop and laptop computers. Other operating systems, such as Symbian, are found on small devices such as phones and PDAs, while mainframes and supercomputers found in major academic and corporate labs use specialized operating systems such as AS/400 and the Cray OS.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux, which began its existence as a server OS and Has become useful as a desktop OS, can also be used on all of these devices. “From wristwatches to supercomputers,” is the popular description of Linux' capabilities.</div>
<h2 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.667em; margin-top: 0.667em;">
The Future of Linux</h2>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux is already successful on many different kinds of devices, but there are also many technological areas where Linux is moving towards, even as desktop and server development continues to grow faster than any other operating system today.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux is being installed on the system BIOS of laptop and notebook computers, which will enable users to turn their devices on in a matter of seconds, bringing up a streamlined Linux environment. This environment will have Internet connectivity tools such as a web browser and an e-mail client, allowing users to work on the Internet without having to boot all the way into their device's primary operating system--even if that operating system is Windows.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
At the same time, Linux is showing up on mobile Internet devices (MIDs). This includes embedded devices such as smartphones and PDAs, as well as netbook devices--small laptop-type machines that feature the core functionality of their larger counterparts in a smaller, more energy-efficient package.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
The growth of cloud computing is a natural fit for Linux, which already runs many of the Internet's web servers. Linux enables cloud services such as Amazon's A3 to work with superior capability to deliver online applications and information to users.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Related to Linux' growth in cloud computing is the well-known success of Linux on supercomputers, both in the high-performance computing (HPC) and high-availability (HA) areas, where academic research in physics and bioengineering, and firms in the financial and energy industries need reliable and scalable computing power to accomplish their goals.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Many of the popular Web 2.0 services on the Internet, such as Twitter, Linked In, YouTube, and Google all rely on Linux as their operating system. As new web services arrive in the future, Linux will increasingly be the platform that drives these new technologies.</div>
<h2 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.667em; margin-top: 0.667em;">
The Birth of Linux</h2>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
On August 25, 1991, a Finn computer science student named Linus Torvalds made the following announcement to the Usenet group comp.os.minux:</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
<i>"I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for 386(486) AT clones. This has been brewing since april, and is starting to get ready. I'd like any feedback on things people like/dislike in minix, as my OS resembles it somewhat (same physical layout of the file-system (due to practical reasons) (among other things)."</i></div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
The “Minix” Torvalds referred to is a variant of the UNIX operating system, used as a guideline for his the free operating system he wanted to run on the x86-based consumer PCs of the day. “gnu” refers to the set of GNU (GNU Is Not Unix) tools first put together by Richard Stallman in 1983. UNIX, the operating system that started it all, had its origins in the old Bell Labs back in the early 60s.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Torvalds built the core of the Linux operating system, known as the kernel. A kernel alone does not make an operating system, but Stallman's GNU tools were from a project to create an operating system as well--a project that was missing a kernel to make Stallman's operating system complete. Torvalds' matching of GNU tools with the Linux kernel marked the beginning of the Linux operating system as it is known today.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux is in many ways still only at the beginning of its potential, even though it has enjoyed tremendous success since Torvalds' first request for help in 1991.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux has gained strong popularity amongst UNIX developers, who like it for its portability to many platforms, its similarity to UNIX, and its free software license. Around the turn of the century, several commercial developers began to distribute Linux, including VA Linux, TurboLinux, Mandrakelinux, Red Hat, and SuSE GMbH. IBM's 2000 decision to invest $2 billion in Linux development and sales was a significant positive event to the growth of Linux.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Today, Linux is a multi-billion dollar industry, with companies and governments around the world taking advantage of the operating system's security and flexibility. Thousands of companies use Linux for day-to-day use, attracted by the lower licensing and support costs. Governments around the world are deploying Linux to save money and time, with some governments commissioning their own versions of Linux.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
The analyst group IDC has projected Linux will be a $49 billion business by 2011, and there are many indications in the market that this figure will be achieved.</div>
<h2 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.667em; margin-top: 0.667em;">
The Code</h2>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux is also unique from other operating systems in that it has no single owner. Torvalds still manages the development of the Linux kernel, but commercial and private developers contribute other software to make the whole Linux operating system.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
In this section, the parts of the Linux operating system will be examined.</div>
<h3 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.769em; margin-top: 0.769em;">
The Kernel</h3>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
All operating systems have kernels, built around the architectural metaphor that there must be a central set of instructions to direct device hardware, surrounded by various modular layers of functionality. The Linux kernel is unique and flexible because it is also modular in nature.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
The kernel of the Window operating system (which few people outside of Microsoft are allowed to look at without paying for the privilege) is a solidly connected piece of code, unable to be easily broken up into pieces. It is difficult (if not impossible) to pare down the Windows kernel to fit on a phone.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
This modularity is significant to the success of Linux. The ability to scale down (or up) to meet the needs of a specific platform is a big advantage over other operating systems constrained to just a few possible platforms.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Modularity also effects stability and security as well. If one piece of the kernel code happens to fail, the rest of the kernel will not crash. Similarly, an illicit attack on one part of the kernel (or the rest of the operating system) might hamper that part of the code, but should not compromise the security of the whole device.</div>
<h3 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.769em; margin-top: 0.769em;">
The Operating System</h3>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Developers need special tools (like the compilers and command lines found in GNU) to write applications that can talk to the kernel. They also need tools and applications to make it easy for outside applications to access the kernel after the application is written and installed.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
This collective set of tools, combined with a kernel, is known as the operating system. It is generally the lowest layer of the computer's software that is accessible by the average user. General users get to the operating system when they access the command line.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux provides powerful tools with which to write their applications: developer environments, editors, and compilers are designed to take a developer's code and convert it to something that can access the kernel and get tasks done.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Like the kernel, the Linux operating system is also modular. Developers can pick and choose the operating tools to provide users and developers with a new flavor of Linux designed to meet specific tasks.</div>
<h3 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.769em; margin-top: 0.769em;">
The Environments</h3>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
The windows, menus, and dialog boxes most people think of as part of the operating system are actually separate layers, known as the windowing system and the desktop environment.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
These layers provide the human-oriented graphical user interface (GUI) that enables users to easily work with applications in the operating system and third-party applications to be installed on the operating system.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
In Linux, there a lot of choices for which windowing system and desktop environment can be used, something that Linux allows users to decide. This cannot be done in Windows and it's difficult to do in OS X.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Like the operating system and kernel, there are tools and code libraries available that let application developers to more readily work with these environments (e.g., gtk+ for GNOME, Qt for KDE).</div>
<h3 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.769em; margin-top: 0.769em;">
The Applications</h3>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Operating systems have two kinds of applications: those that are essential components of the operating system itself, and those that users will install later. Closed operating systems, like Windows and OS X, will not let users (or developers) pick and choose the essential component applications they can use. Windows developers must use Microsoft's compiler, windowing system, and so on.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux application developers have a larger set of choices to develop their application. This allows more flexibility to build an application, but it does mean a developer will need to decide which Linux components to use.</div>
<h3 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.769em; margin-top: 0.769em;">
The Distributions</h3>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
This is the highest layer of the Linux operating system: the container for all of the aforementioned layers. A distribution's makers have decided which kernel, operating system tools, environments, and applications to include and ship to users.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Distributions are maintained by private individuals and commercial entities. A distribution can be installed using a CD that contains distribution-specific software for initial system installation and configuration. For the users, most popular distributions offer mature application management systems that allow users to search, find, and install new applications with just a few clicks of the mouse.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
There are, at last count, over 350 distinct distributions of Linux.</div>
<h2 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.667em; margin-top: 0.667em;">
Licensing</h2>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Code is contributed to the Linux kernel under a number of licenses, but all code must be compatible with version 2 of the GNU General Public License (GPLv2), which is the license covering the kernel distribution as a whole. In practice, that means that all code contributions are covered either by GPLv2 (with, optionally, language allowing distribution under later versions of the GPL) or the three-clause BSD license. Any contributions which are not covered by a compatible license will not be accepted into the kernel.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Copyright assignments are not required (or requested) for code contributed to the kernel. All code merged into the mainline kernel retains its original ownership; as a result, the kernel now has thousands of owners.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
One implication of this ownership structure is that any attempt to change the licensing of the kernel is doomed to almost certain failure. There are few practical scenarios where the agreement of all copyright holders could be obtained (or their code removed from the kernel). So, in particular, there is no prospect of a migration to version 3 of the GPL in the foreseeable future.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
It is imperative that all code contributed to the kernel be legitimately free software. For that reason, code from anonymous (or pseudonymous) contributors will not be accepted. All contributors are required to "sign off" on their code, stating that the code can be distributed with the kernel under the GPL. Code which has not been licensed as free software by its owner, or which risks creating copyright-related problems for the kernel (such as code which derives from reverse-engineering efforts lacking proper safeguards) cannot be contributed.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Questions about copyright-related issues are common on Linux development mailing lists. Such questions will normally receive no shortage of answers, but one should bear in mind that the people answering those questions are not lawyers and cannot provide legal advice. If you have legal questions relating to Linux source code, there is no substitute for talking with a lawyer who understands this field. Relying on answers obtained on technical mailing lists is a risky affair.</div>
<h2 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.667em; margin-top: 0.667em;">
Community</h2>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux communities come in two basic forms: developer and user communities.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
One of the most compelling features of Linux is that it is accessible to developers; anybody with the requisite skills can improve Linux and influence the direction of its development. Proprietary products cannot offer this kind of openness, which is a characteristic of the free software process.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Developer communities can volunteer to maintain and support whole distributions, such as the Debian or Gentoo Projects. Novell and Red hat also support community-driven versions of their products, openSUSE and Fedora, respectively. The improvements to these community distros are then incorporated into the commercial server and desktop products from these companies.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
The Linux kernel itself is primarily supported by its developer community as well and is one of the largest and most active free software projects in existence. A typical three-month kernel development cycle can involve over 1000 developers working for more than 100 different companies (or for no company at all).</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
With the growth of Linux has come an increase in the number of developers (and companies) wishing to participate in its development. Hardware vendors want to ensure that Linux supports their products well, making those products attractive to Linux users. Embedded systems vendors, who use Linux as a component in an integrated product, want Linux to be as capable and well-suited to the task at hand as possible. Distributors and other software vendors who base their products on Linux have a clear interest in the capabilities, performance, and reliability of the Linux kernel.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Other developer communities focus on different applications and environments that run on Linux, such as Firefox, OpenOffice.org, GNOME, and KDE.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
End users, too, can make valuable contributions to the development of Linux. With online communities such as Linux.com, LinuxQuestions, and the many and varied communities hosted by distributions and applications, the Linux user base is an often vocal, usually positive advocate and guide for the Linux operating system.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
The Linux community is not just a presence online. Local groups known as Linux Users Groups (LUGs) often meet to discuss issues regarding the Linux operating system, and provide other local users with free demonstrations, training, technical support, and installfests.</div>
<h2 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.667em; margin-top: 0.667em;">
Development</h2>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux is an operating system that is comprised of many different development languages. A very large percentage of the distributions' code is written in either the C (52.86%) or C++ (25.56%) languages. All of the rest of the code falls into single-digit percentages, with Java, Perl, and Lisp rounding out the rest of the top 5 languages.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
The Linux kernel itself has an even more dominant C presence, with over 95 percent of the kernel's code written in that language. But other languages make up the kernel as well, making it more heterogenous than other operating systems.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
The kernel community has evolved its own distinct ways of operating which allow it to function smoothly (and produce a high-quality product) in an environment where thousands of lines of code are being changed every day. This means the Linux kernel development process differs greatly from proprietary development methods.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
The kernel's development process may come across as strange and intimidating to new developers, but there are good reasons and solid experience behind it. A developer who does not understand the kernel community's ways (or, worse, who tries to flout or circumvent them) will have a frustrating experience in store. The development community, while being helpful to those who are trying to learn, has little time for those who will not listen or who do not care about the development process.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
While many Linux developers still use text-based tools such as Emacs or Vim to develop their code, Eclipse, Anjuta, and Netbeans all provide more robust integrated development environments for Linux.</div>
<h2 style="font-size: 1.3em; line-height: 1.3em; margin-bottom: 0.667em; margin-top: 0.667em;">
The Business of Linux</h2>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
In 2008, IDC analyst Al Gillen cited a nearly 24 percent annual growth rate for the Linux industry, which puts a $21 billion 2007 technology at $49 billion in 2011. The companies involved in Linux include industry leaders such as IBM, Fujitsu, Hewlett-Packard, Oracle, Intel, Hitachi, NEC, and Novell. All have all invested time, talent, and resources to bettering Linux on their own and through the Linux Foundation.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
If Linux is free of cost, how does a Linux company generate revenue?</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
One example of how a Linux business works: while nearly all of a Linux distribution's code is available for free download, the time and cost involved in actually downloading all of that code and putting it together in a cohesive and functional manner is significantly high.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
To avoid the timesink and the learning curve required to accomplish such a task, users can simply pay a distribution maker for the convenience of not having to build a free Linux from scratch. Businesses and individual users benefit from the distributors' expertise in putting all of the free Linux code into an easy-to-use set of packages.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Another source of revenue for companies is ongoing commercial support for Linux. In fact, some distributions will allow users to download their software free of charge and build their entire revenue model on a services and support business plan.</div>
<div style="font-size: 1.08em; line-height: 1.53em; margin-bottom: 1em; margin-top: 1em;">
Linux is a platform that can generate revenue, all while still being free. Customers gain the knowledge that they are paying directly for support and convenience, and will always have a choice of which Linux systems will work for them best.</div>
</div>
</div>
</div>
</div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-54111743339940016272015-10-28T03:30:00.000+05:302015-10-28T03:30:03.177+05:30A Guide To Better Google Search Techniques<span style="font-family: 'Courier New', Courier, monospace;">The Internet is so full of information that it’s nearly impossible to check its limits. That’s why, search engines were developed to maintain a search-able database of the web’s content. People employ the use of search engines to look up for information on the web.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: 'Courier New', Courier, monospace;">In the midst of all search engines lies Google, the most popular and powerful search engine. </span><br />
<span style="font-family: 'Courier New', Courier, monospace;"><br /></span>
<span style="font-family: 'Courier New', Courier, monospace;"></span><br />
<a name='more'></a><br /><br />
<span style="font-family: 'Courier New', Courier, monospace;"><br /></span>
<span style="font-family: 'Courier New', Courier, monospace;">You type in the query, and the search engine provides you with the search results. In most cases you’re satisfied but sometimes, you’re not. This is where learning the proper techniques to type in your search query comes in handy and this is what we’ll explore in this article.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Why The Need To Learn Proper Search Techniques?</span><br />
<span style="font-family: Courier New, Courier, monospace;">Everyone including students, researchers, writers, etc. requires information, and they use search engines for that very reason. People spend most of their time continuously looking for the right information because they’re not aware of the proper search techniques. Learning and using good search techniques will help you in the following ways:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Better search results</span><br />
<span style="font-family: Courier New, Courier, monospace;">Saves your time</span><br />
<span style="font-family: Courier New, Courier, monospace;">Note: Search queries or examples are included inside [ ] for better readability. Please do not include [ ] in your search query.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">How To Use Google.Com</span><br />
<span style="font-family: Courier New, Courier, monospace;">Google is a smart and intelligent search engine with many exciting features. But not all the features are rolled out instantly for all versions. Google.com is always first to get feature updates, and then updates are provided in versions specific to different countries such as google.co.uk, google.co.in, or google.sh</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Google’s version for your country might not support all the search techniques described below. That’s why, it’s suggested to use google.com to avail maximum benefits of the search features and techniques.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Tip: Typing google.com automatically redirects you to its version for your country, but you can override this behavior by going to www.google.com/ncr</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Basic Search Techniques</span><br />
<h4>
<span style="font-family: Courier New, Courier, monospace; font-weight: normal;">1. Keep It Simple</span></h4>
<span style="font-family: Courier New, Courier, monospace;">Keep your search simple and web-friendly. Start by entering one or two words, and gradually adding relevant or important words, if you’re unsatisfied with the results. Less is more for a search engine; meaning the less words you query for, the more results the search engine provides as output.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For example:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Query: [who is the president of america]</span><br />
<span style="font-family: Courier New, Courier, monospace;">Better query: [president of america]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">2. Order Of Keywords</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Select the right keywords to make your search. Search results completely depend on the given keywords, and if keywords are chosen wisely, then results are more efficient.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Put yourself in the shoes of the author, and think of what words he/she would use to write/describe what you’re trying to find. If you’re looking for a phrase or quote, then keep the order of the words as accurate as possible to get the optimum search results.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For example:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Query: [itself divided house cannot stand]</span><br />
<span style="font-family: Courier New, Courier, monospace;">Better query: [A house divided against itself cannot stand] (part of a quote by Abraham Lincoln)</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">3. Skip Unnecessary Parts</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Google is smart enough to handle most of your typos, and other things that could just be ignored. That’s why you should skip those things in your query to save time.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">You should not worry about the following when writing a search query:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Spelling</span><br />
<span style="font-family: Courier New, Courier, monospace;">Cases (uppercase or lowercase)</span><br />
<span style="font-family: Courier New, Courier, monospace;">Punctuation (dot, question mark, exclamation mark, and more)</span><br />
<span style="font-family: Courier New, Courier, monospace;">Special characters (plus, minus, brackets, and more)</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">4. Social Search</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Google is really good at handling searches related to people and social networks. You can search for people and their social profiles using:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">+[profile-name]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">By adding a ‘+’ before a profile-name, you can search for Google+ profiles and pages.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For example: [+hongkiat]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">#[word]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Using the ‘#’ before a word enables you to search for hashtags in Google+, Twitter, and more social networks.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For example: [#privacy]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">@[person-name]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">You can search for social accounts associated with a person’s name by putting the ‘@’ sign before his/her name.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For example: [@hongkiat]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Intermediate Search Techniques</span><br />
<span style="font-family: Courier New, Courier, monospace;">Note: Zip codes work very well for the US, but for other countries, it’s better to write the country name followed by the zip code.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For example: [new delhi, india] and [india 110033] is the same.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">5. Get Sunrise And Sunset Times</span><br />
<span style="font-family: Courier New, Courier, monospace;">You can use Google to get sunrise and sunset times for many cities of the world. Type your search query in the format of [sunrise place-name] or [sunrise zip-code] to get the sunrise time for the specified location. For sunset times, just subtitute the words as per the following style of [sunset place-name] or [sunset zip-code].</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For example:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[sunrise chicago, usa] or [sunrise 60611]</span><br />
<span style="font-family: Courier New, Courier, monospace;">[sunset chicago, usa] or [sunset 60611]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Advanced Search Techniques</span><br />
<span style="font-family: Courier New, Courier, monospace;">Note: You can use the Google Advanced Search form for a more convenient search.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">6. Synonym Search</span><br />
<span style="font-family: Courier New, Courier, monospace;">You can use the synonym search feature to tell Google to even search for synonyms of a specified word in the search query. This is helpful for when you want to search for a word and all its similar words without having to spend time looking for them individually.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Using the tilde symbol (~) before a word tells Google to search for the words and its synonyms too. Type your search query in the format of [~synonymWord otherWords] to search for the word and its synonyms in a single search.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For example: [~sweet fruit]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">7. Search For Numbers In A Range</span><br />
<span style="font-family: Courier New, Courier, monospace;">You can tell Google to search within a range of numbers, such as dates, prices, and measurements. Using two periods (dots) between two numbers makes Google search within that number range and skip other results.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Using two periods after a number indicates a lower minimum (number..) while putting it before the number indicates a higher maximum (..number). Type your search query in the format of [firstNumber..secondNumber otherWords] to search between a specified lower and upper bounds.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For example:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[android phone $300..$500]</span><br />
<span style="font-family: Courier New, Courier, monospace;">[television 20..50 inches]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">8. Search Using File Types</span><br />
<span style="font-family: Courier New, Courier, monospace;">You can tell Google to search for a specified type of file for your query. Using filetype operators before a type of file tells Google to search only for specified file types and skip other files. Type your search query in the format of [filetype:type otherWords] to search for a specific file type.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For example: [filetype:pdf free photoshop books]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Complex Search Techniques</span><br />
<span style="font-family: Courier New, Courier, monospace;">You can also use more than one of these techniques in a single search query. You can combine the above methods to make a complex search query, which will provide efficient and focused results.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For example:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[site:gov filetype:pdf “death rate”]</span><br />
<span style="font-family: Courier New, Courier, monospace;">[site:hongkiat.com photoshop OR “adobe photoshop” tutorials]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-16695322979909829392015-10-27T14:04:00.004+05:302015-11-22T19:19:44.874+05:30Linux:Beginners guide<div id="content-header" style="background-color: white;">
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">What is Linux</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux is, in simplest terms, an operating system. It is the software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired functions. The operating system (OS) relays instructions from an application to, for instance, the computer's processor. The processor performs the instructed task, then sends the results back to the application via the operating system.</span></span></h1>
<div>
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><a name='more'></a><br /></span></span></div>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Explained in these terms, Linux is very similar to other operating systems, such as Windows and OS X.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">But something sets Linux apart from these operating systems. The Linux operating system represented a $25 billion ecosystem in 2008. Since its inception in 1991, Linux has grown to become a force in computing, powering everything from the New York Stock Exchange to mobile phones to supercomputers to consumer devices.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">As an open operating system, Linux is developed collaboratively, meaning no one company is solely responsible for its development or ongoing support. Companies participating in the Linux economy share research and development costs with their partners and competitors. This spreading of development burden amongst individuals and companies has resulted in a large and efficient ecosystem and unheralded software innovation.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Over 1,000 developers, from at least 100 different companies, contribute to every kernel release. In the past two years alone, over 3,200 developers from 200 companies have contributed to the kernel--which is just one small piece of a Linux distribution.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">This article will explore the various components of the Linux operating system, how they are created and work together, the communities of Linux, and Linux's incredible impact on the IT ecosystem.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Where is Linux?</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">One of the most noted properties of Linux is where it can be used. Windows and OS X are predominantly found on personal computing devices such as desktop and laptop computers. Other operating systems, such as Symbian, are found on small devices such as phones and PDAs, while mainframes and supercomputers found in major academic and corporate labs use specialized operating systems such as AS/400 and the Cray OS.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux, which began its existence as a server OS and Has become useful as a desktop OS, can also be used on all of these devices. “From wristwatches to supercomputers,” is the popular description of Linux' capabilities.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Future of Linux</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux is already successful on many different kinds of devices, but there are also many technological areas where Linux is moving towards, even as desktop and server development continues to grow faster than any other operating system today.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux is being installed on the system BIOS of laptop and notebook computers, which will enable users to turn their devices on in a matter of seconds, bringing up a streamlined Linux environment. This environment will have Internet connectivity tools such as a web browser and an e-mail client, allowing users to work on the Internet without having to boot all the way into their device's primary operating system--even if that operating system is Windows.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">At the same time, Linux is showing up on mobile Internet devices (MIDs). This includes embedded devices such as smartphones and PDAs, as well as netbook devices--small laptop-type machines that feature the core functionality of their larger counterparts in a smaller, more energy-efficient package.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The growth of cloud computing is a natural fit for Linux, which already runs many of the Internet's web servers. Linux enables cloud services such as Amazon's A3 to work with superior capability to deliver online applications and information to users.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Related to Linux' growth in cloud computing is the well-known success of Linux on supercomputers, both in the high-performance computing (HPC) and high-availability (HA) areas, where academic research in physics and bioengineering, and firms in the financial and energy industries need reliable and scalable computing power to accomplish their goals.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Many of the popular Web 2.0 services on the Internet, such as Twitter, Linked In, YouTube, and Google all rely on Linux as their operating system. As new web services arrive in the future, Linux will increasingly be the platform that drives these new technologies.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Birth of Linux</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">On August 25, 1991, a Finn computer science student named Linus Torvalds made the following announcement to the Usenet group comp.os.minux:</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">"I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for 386(486) AT clones. This has been brewing since april, and is starting to get ready. I'd like any feedback on things people like/dislike in minix, as my OS resembles it somewhat (same physical layout of the file-system (due to practical reasons) (among other things)."</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The “Minix” Torvalds referred to is a variant of the UNIX operating system, used as a guideline for his the free operating system he wanted to run on the x86-based consumer PCs of the day. “gnu” refers to the set of GNU (GNU Is Not Unix) tools first put together by Richard Stallman in 1983. UNIX, the operating system that started it all, had its origins in the old Bell Labs back in the early 60s.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Torvalds built the core of the Linux operating system, known as the kernel. A kernel alone does not make an operating system, but Stallman's GNU tools were from a project to create an operating system as well--a project that was missing a kernel to make Stallman's operating system complete. Torvalds' matching of GNU tools with the Linux kernel marked the beginning of the Linux operating system as it is known today.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux is in many ways still only at the beginning of its potential, even though it has enjoyed tremendous success since Torvalds' first request for help in 1991.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux has gained strong popularity amongst UNIX developers, who like it for its portability to many platforms, its similarity to UNIX, and its free software license. Around the turn of the century, several commercial developers began to distribute Linux, including VA Linux, TurboLinux, Mandrakelinux, Red Hat, and SuSE GMbH. IBM's 2000 decision to invest $2 billion in Linux development and sales was a significant positive event to the growth of Linux.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Today, Linux is a multi-billion dollar industry, with companies and governments around the world taking advantage of the operating system's security and flexibility. Thousands of companies use Linux for day-to-day use, attracted by the lower licensing and support costs. Governments around the world are deploying Linux to save money and time, with some governments commissioning their own versions of Linux.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The analyst group IDC has projected Linux will be a $49 billion business by 2011, and there are many indications in the market that this figure will be achieved.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Code</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux is also unique from other operating systems in that it has no single owner. Torvalds still manages the development of the Linux kernel, but commercial and private developers contribute other software to make the whole Linux operating system.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">In this section, the parts of the Linux operating system will be examined.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Kernel</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">All operating systems have kernels, built around the architectural metaphor that there must be a central set of instructions to direct device hardware, surrounded by various modular layers of functionality. The Linux kernel is unique and flexible because it is also modular in nature.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The kernel of the Window operating system (which few people outside of Microsoft are allowed to look at without paying for the privilege) is a solidly connected piece of code, unable to be easily broken up into pieces. It is difficult (if not impossible) to pare down the Windows kernel to fit on a phone.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">This modularity is significant to the success of Linux. The ability to scale down (or up) to meet the needs of a specific platform is a big advantage over other operating systems constrained to just a few possible platforms.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Modularity also effects stability and security as well. If one piece of the kernel code happens to fail, the rest of the kernel will not crash. Similarly, an illicit attack on one part of the kernel (or the rest of the operating system) might hamper that part of the code, but should not compromise the security of the whole device.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Operating System</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Developers need special tools (like the compilers and command lines found in GNU) to write applications that can talk to the kernel. They also need tools and applications to make it easy for outside applications to access the kernel after the application is written and installed.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">This collective set of tools, combined with a kernel, is known as the operating system. It is generally the lowest layer of the computer's software that is accessible by the average user. General users get to the operating system when they access the command line.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux provides powerful tools with which to write their applications: developer environments, editors, and compilers are designed to take a developer's code and convert it to something that can access the kernel and get tasks done.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Like the kernel, the Linux operating system is also modular. Developers can pick and choose the operating tools to provide users and developers with a new flavor of Linux designed to meet specific tasks.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Environments</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The windows, menus, and dialog boxes most people think of as part of the operating system are actually separate layers, known as the windowing system and the desktop environment.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">These layers provide the human-oriented graphical user interface (GUI) that enables users to easily work with applications in the operating system and third-party applications to be installed on the operating system.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">In Linux, there a lot of choices for which windowing system and desktop environment can be used, something that Linux allows users to decide. This cannot be done in Windows and it's difficult to do in OS X.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Like the operating system and kernel, there are tools and code libraries available that let application developers to more readily work with these environments (e.g., gtk+ for GNOME, Qt for KDE).</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Applications</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Operating systems have two kinds of applications: those that are essential components of the operating system itself, and those that users will install later. Closed operating systems, like Windows and OS X, will not let users (or developers) pick and choose the essential component applications they can use. Windows developers must use Microsoft's compiler, windowing system, and so on.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux application developers have a larger set of choices to develop their application. This allows more flexibility to build an application, but it does mean a developer will need to decide which Linux components to use.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Distributions</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">This is the highest layer of the Linux operating system: the container for all of the aforementioned layers. A distribution's makers have decided which kernel, operating system tools, environments, and applications to include and ship to users.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Distributions are maintained by private individuals and commercial entities. A distribution can be installed using a CD that contains distribution-specific software for initial system installation and configuration. For the users, most popular distributions offer mature application management systems that allow users to search, find, and install new applications with just a few clicks of the mouse.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">There are, at last count, over 350 distinct distributions of Linux.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Licensing</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Code is contributed to the Linux kernel under a number of licenses, but all code must be compatible with version 2 of the GNU General Public License (GPLv2), which is the license covering the kernel distribution as a whole. In practice, that means that all code contributions are covered either by GPLv2 (with, optionally, language allowing distribution under later versions of the GPL) or the three-clause BSD license. Any contributions which are not covered by a compatible license will not be accepted into the kernel.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Copyright assignments are not required (or requested) for code contributed to the kernel. All code merged into the mainline kernel retains its original ownership; as a result, the kernel now has thousands of owners.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">One implication of this ownership structure is that any attempt to change the licensing of the kernel is doomed to almost certain failure. There are few practical scenarios where the agreement of all copyright holders could be obtained (or their code removed from the kernel). So, in particular, there is no prospect of a migration to version 3 of the GPL in the foreseeable future.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">It is imperative that all code contributed to the kernel be legitimately free software. For that reason, code from anonymous (or pseudonymous) contributors will not be accepted. All contributors are required to "sign off" on their code, stating that the code can be distributed with the kernel under the GPL. Code which has not been licensed as free software by its owner, or which risks creating copyright-related problems for the kernel (such as code which derives from reverse-engineering efforts lacking proper safeguards) cannot be contributed.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Questions about copyright-related issues are common on Linux development mailing lists. Such questions will normally receive no shortage of answers, but one should bear in mind that the people answering those questions are not lawyers and cannot provide legal advice. If you have legal questions relating to Linux source code, there is no substitute for talking with a lawyer who understands this field. Relying on answers obtained on technical mailing lists is a risky affair.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Community</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux communities come in two basic forms: developer and user communities.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">One of the most compelling features of Linux is that it is accessible to developers; anybody with the requisite skills can improve Linux and influence the direction of its development. Proprietary products cannot offer this kind of openness, which is a characteristic of the free software process.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Developer communities can volunteer to maintain and support whole distributions, such as the Debian or Gentoo Projects. Novell and Red hat also support community-driven versions of their products, openSUSE and Fedora, respectively. The improvements to these community distros are then incorporated into the commercial server and desktop products from these companies.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Linux kernel itself is primarily supported by its developer community as well and is one of the largest and most active free software projects in existence. A typical three-month kernel development cycle can involve over 1000 developers working for more than 100 different companies (or for no company at all).</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">With the growth of Linux has come an increase in the number of developers (and companies) wishing to participate in its development. Hardware vendors want to ensure that Linux supports their products well, making those products attractive to Linux users. Embedded systems vendors, who use Linux as a component in an integrated product, want Linux to be as capable and well-suited to the task at hand as possible. Distributors and other software vendors who base their products on Linux have a clear interest in the capabilities, performance, and reliability of the Linux kernel.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Other developer communities focus on different applications and environments that run on Linux, such as Firefox, OpenOffice.org, GNOME, and KDE.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">End users, too, can make valuable contributions to the development of Linux. With online communities such as Linux.com, LinuxQuestions, and the many and varied communities hosted by distributions and applications, the Linux user base is an often vocal, usually positive advocate and guide for the Linux operating system.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Linux community is not just a presence online. Local groups known as Linux Users Groups (LUGs) often meet to discuss issues regarding the Linux operating system, and provide other local users with free demonstrations, training, technical support, and installfests.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Development</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux is an operating system that is comprised of many different development languages. A very large percentage of the distributions' code is written in either the C (52.86%) or C++ (25.56%) languages. All of the rest of the code falls into single-digit percentages, with Java, Perl, and Lisp rounding out the rest of the top 5 languages.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Linux kernel itself has an even more dominant C presence, with over 95 percent of the kernel's code written in that language. But other languages make up the kernel as well, making it more heterogenous than other operating systems.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The kernel community has evolved its own distinct ways of operating which allow it to function smoothly (and produce a high-quality product) in an environment where thousands of lines of code are being changed every day. This means the Linux kernel development process differs greatly from proprietary development methods.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The kernel's development process may come across as strange and intimidating to new developers, but there are good reasons and solid experience behind it. A developer who does not understand the kernel community's ways (or, worse, who tries to flout or circumvent them) will have a frustrating experience in store. The development community, while being helpful to those who are trying to learn, has little time for those who will not listen or who do not care about the development process.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">While many Linux developers still use text-based tools such as Emacs or Vim to develop their code, Eclipse, Anjuta, and Netbeans all provide more robust integrated development environments for Linux.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">The Business of Linux</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;"><br /></span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">In 2008, IDC analyst Al Gillen cited a nearly 24 percent annual growth rate for the Linux industry, which puts a $21 billion 2007 technology at $49 billion in 2011. The companies involved in Linux include industry leaders such as IBM, Fujitsu, Hewlett-Packard, Oracle, Intel, Hitachi, NEC, and Novell. All have all invested time, talent, and resources to bettering Linux on their own and through the Linux Foundation.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">If Linux is free of cost, how does a Linux company generate revenue?</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">One example of how a Linux business works: while nearly all of a Linux distribution's code is available for free download, the time and cost involved in actually downloading all of that code and putting it together in a cohesive and functional manner is significantly high.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">To avoid the timesink and the learning curve required to accomplish such a task, users can simply pay a distribution maker for the convenience of not having to build a free Linux from scratch. Businesses and individual users benefit from the distributors' expertise in putting all of the free Linux code into an easy-to-use set of packages.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Another source of revenue for companies is ongoing commercial support for Linux. In fact, some distributions will allow users to download their software free of charge and build their entire revenue model on a services and support business plan.</span></span></h1>
<h1 class="title" style="clear: both; margin: 0px;">
<span style="color: #4d4d4d; font-family: "courier new" , "courier" , monospace; font-size: small;"><span style="font-weight: normal; line-height: 31.2px;">Linux is a platform that can generate revenue, all while still being free. Customers gain the knowledge that they are paying directly for support and convenience, and will always have a choice of which Linux systems will work for them best.</span></span></h1>
</div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-88467370591336311762015-10-26T20:25:00.004+05:302015-10-26T20:25:52.094+05:30How To Turn Wikipedia Pages Into Ebooks<div>
<span style="font-family: Courier New, Courier, monospace;">If you are like me, you probably love binge-reading Wikipedia, everyone’s favorite web encyclopedia. It contains a huge database of content on almost any topic under the Sun, and in a variety of languages. If you are preparing for a trip, you’d probably save some of these reading materials to read later, offline, but what if you could turn it into an ebook?</span></div>
<div>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">There is in fact a way to create an ebook from inside Wikipedia. You can create or arrange the</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />
<a name='more'></a><span style="font-family: Courier New, Courier, monospace;"><br /></span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"> chapters then turn it into an ebook in EPUB form or PDF form, free of charge. Alternatively you can request Wikipedia to send you a printed version, or get it printed out yourself.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">You can also do this with Readlists and even compile a book of your tweets with Twournal.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<h4>
<span style="font-family: Courier New, Courier, monospace;">1. Collecting Articles</span></h4>
<span style="font-family: Courier New, Courier, monospace;">First, locate the Print/Export link on the left sidebar of the Wikipedia page. Click on the Create a book link.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Wikipedia will redirect you to the Book Creator as shown below. The next step is collecting pages you want to put into your book. Click on the Start book creator green button.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Once you enable the book creator, the Book creator box will show up in every Wikipedia page you visit.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">To add the pages of your choice from Wikipedia, on the page with the content you want to save, simply click on Add this page to your book.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">After adding the page, you should see under Show book (1 page).</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Add all the pages of your choice for your book. Once you are done with adding all the pages then it is time to to arrange the pages as per your requirement.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Click on the Show book option to see your collected pages. You will arrive at the Manage your book section. Here you can:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">see all the pages you have included in your book</span><br />
<span style="font-family: Courier New, Courier, monospace;">assign a title to the book</span><br />
<span style="font-family: Courier New, Courier, monospace;">rearrange the order of the pages in chapters</span><br />
<span style="font-family: Courier New, Courier, monospace;">order the book as a printed book</span><br />
<span style="font-family: Courier New, Courier, monospace;">download it in a format of your choice</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<h4>
<span style="font-family: Courier New, Courier, monospace;">2. Managing Your Book Content</span></h4>
<span style="font-family: Courier New, Courier, monospace;">You can change the Title and Subtitle of your book, choose the paper size the book should be published in (A4 or Letter size) and rearrange the contents of your book. You can manually drag the pages into order, or choose to list the chapters in alphabetical order. If you like, you can also add Chapters, then assign pages under the chapter for better categorization. If you need a table of contents, just tick the Include a table of contents option.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<h4>
<span style="font-family: Courier New, Courier, monospace;">3. Output Your Book</span></h4>
<span style="font-family: Courier New, Courier, monospace;">There are two ways to publish your book: in a printed physical book or an ebook.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<h4>
<span style="font-family: Courier New, Courier, monospace;">3.1 Printed On Paper</span></h4>
<span style="font-family: Courier New, Courier, monospace;">To print this as a physical book, Wikipedia gives you the option to print this via PediaPress.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">You can still make changes to the Title and Subtitles at this point and you can also preview the contents of the book via the Click to preview! link.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Once you have chosen the final look of your cover, you can choose where to deliver the book to, if you want it in hardcover or if you want it in color. Each preference will carry some extra costs and remember that the final cost you see does not include shipping costs yet.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Read Also: Beginner’s Guide To Publishing Your Own Ebook</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<h4>
<span style="font-family: Courier New, Courier, monospace;">3.2 Getting The EBook Copy</span></h4>
<span style="font-family: Courier New, Courier, monospace;">If you are on a budget, you can always choose to have the pages in ebook form. There are five formats you can generate the ebook in. Choose the format you want and follow the instructions that ensue.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">For instance for PDF, the ebook will be generated in PDF and you will have to manually save the book to your desktop to read offline. If your selected format is ePUB, then you will need a reader app or viewer app to open the book or use this tip to read ePUB books on Firefox and Chrome.</span></div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-80769392417247665412015-10-26T20:21:00.001+05:302015-10-26T20:22:31.998+05:30 NGFW<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">There are a lot of changes going on within the enterprise, including
many shifts related to how applications are used and transported. While this
change is an advantage from a usability perspective, it can also quickly become
a nightmare to the information security staff.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">To deal with these changes, vendors in the enterprise firewall market
have created a new generation of firewall devices dubbed the <b>Next
Generation Firewall</b> or <b>NGFW</b>. These devices differ from
traditional firewalls in a number of different areas. Let's take a look at
these differences and how they affect the security of an enterprise
network. </span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;"></span></span></div>
<a name='more'></a><span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />
<div class="MsoNormal" style="background: white; margin: 27pt 0in 9pt;">
<b><span lang="EN-IN" style="color: #333333; font-size: 15pt;"><span style="font-family: Courier New, Courier, monospace;">What is a
Traditional Firewall?<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">What exactly is a traditional firewall? For the purposes of this article
and the general consensus of the InfoSec community, a traditional firewall, as
it is currently defined, includes a device that is able to control the traffic
that is allowed to enter or exit a point within the network. It can typically
do this either using a stateless method or a stateful method depending on the
type of protocol being run on it. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">Traffic that is monitored using no state simply checks over each packet
individually and is not able to discern a traffic "flow." Traffic
that is monitored using state is able to track (to a certain level) a traffic
flow using the monitored protocol and is able to keep track of where that flow
is within its lifetime (is it just starting? is it actively being used? is it
closing itself down?).<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">Obviously, a firewall that is able to track state is going to be more
effective than one that does not. Many traditional firewalls are however
limited to only using layers 2 through 4 and can only track traffic based on
this information. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">Other common features of a traditional firewall include support for
Network Address Translation (NAT), Port Address Translation (PAT), and Virtual
Private Network (VPN) termination, as well as being able to provide a high
level of availability and performance. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; margin: 27pt 0in 9pt;">
<b><span lang="EN-IN" style="color: #333333; font-size: 15pt;"><span style="font-family: Courier New, Courier, monospace;">What is a Next
Generation Firewall (NGFW)?<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">The term NGFW can be used by any vendor and the specifics of each
vendor's offering can be slightly different from one another. Generally, there
are a couple of features that are included within a NGFW offering:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: 9.0pt; margin-left: 18.75pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Courier New, Courier, monospace;"><span lang="EN-IN" style="color: #333333; font-size: 10pt;">·<span style="font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;">Application Awareness,<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: 9.0pt; margin-left: 18.75pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Courier New, Courier, monospace;"><span lang="EN-IN" style="color: #333333; font-size: 10pt;">·<span style="font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;">Stateful Inspection,<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: 9.0pt; margin-left: 18.75pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Courier New, Courier, monospace;"><span lang="EN-IN" style="color: #333333; font-size: 10pt;">·<span style="font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;">Integrated Intrusion Protection
System (IPS),<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: 9.0pt; margin-left: 18.75pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Courier New, Courier, monospace;"><span lang="EN-IN" style="color: #333333; font-size: 10pt;">·<span style="font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;">Identity Awareness (User and Group
Control),<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: 9.0pt; margin-left: 18.75pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Courier New, Courier, monospace;"><span lang="EN-IN" style="color: #333333; font-size: 10pt;">·<span style="font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;">Bridged and Routed Modes,<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: 9.0pt; margin-left: 18.75pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Courier New, Courier, monospace;"><span lang="EN-IN" style="color: #333333; font-size: 10pt;">·<span style="font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;">And the ability to utilize external
intelligence sources. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">Let's examine these NGFW features in more detail.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: 9.0pt; margin-left: 18.75pt; margin-right: 0in; margin-top: 0in; mso-list: l2 level1 lfo2; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Courier New, Courier, monospace;"><span lang="EN-IN" style="color: #333333; font-size: 10pt;">·<span style="font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><b><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;">Application Awareness</span></b><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">The biggest difference between a traditional firewall and a NGFW is the
fact that these newer devices are application aware. Traditional firewalls rely
on common application ports to determine the applications that were running and
the types of attacks to monitor for. In an NGFW device, it is not assumed that
a specific application is running on a specific port. The firewall itself must
be able to monitor the traffic from layers 2 through 7 and make a determination
as to what type of traffic is being sent and received. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">The most common example is the current use of HTTP, port 80.
Traditionally this port is used for only HTTP traffic, but this is no longer
the case and a large number of different applications use this port to
transport traffic between an end-device and a central server. There are a
number of different ways that common ports can be used for these different
types of traffic with one of the most common ones being tunneling. With
tunneling, traffic is tunneled within the traditional HTTP data field and is
de-encapsulated at the destination. From a traditional firewall's perspective,
this looks like simple HTTP web traffic, but to a NGFW its true purpose is
found at the firewall before it is able to reach the destination. If it is
something that is allowed by the NGFW's policy, then the firewall will be
allowed to pass traffic. If it isn't, then the firewall will block the
traffic. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: 9.0pt; margin-left: 18.75pt; margin-right: 0in; margin-top: 0in; mso-list: l4 level1 lfo3; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Courier New, Courier, monospace;"><span lang="EN-IN" style="color: #333333; font-size: 10pt;">·<span style="font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><b><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;">Identity Awareness</span></b><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">Another big difference between a traditional firewall and a NGFW is that
the latter is expected to have the ability to track the identity of the local
traffic device and user, typically using existing enterprise authentication
systems (i.e. Active Directory, LDAP). This way the InfoSec staff will be able
to not only control the types of traffic that are allowed to enter and exit the
network, but also what a specific user is allowed to send and receive. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: 9.0pt; margin-left: 18.75pt; margin-right: 0in; margin-top: 0in; mso-list: l1 level1 lfo4; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Courier New, Courier, monospace;"><span lang="EN-IN" style="color: #333333; font-size: 10pt;">·<span style="font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><b><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;">Stateful Inspection</span></b><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">While the general definition of stateful inspection does not differ from
traditional firewalls, a NGFW must be able to not only track the state of
traffic based on layers 2 through 4, but from layer 2 through 7 as well. This
difference allows a lot more control and provides the InfoSec
engineer/administrator the ability to have very granular policies. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: 9.0pt; margin-left: 18.75pt; margin-right: 0in; margin-top: 0in; mso-list: l5 level1 lfo5; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Courier New, Courier, monospace;"><span lang="EN-IN" style="color: #333333; font-size: 10pt;">·<span style="font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><b><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;">Integrated IPS</span></b><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">An Intrusion Protection System (IPS) is responsible for detecting
attacks based on a number of different techniques including the use of threat signatures,
known exploit attacks, anomalous activity and traffic behavioral
analysis. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">In an environment where a traditional firewall is deployed, it is common
to see an Intrusion Detection System (IDS) or IPS deployed as well. Commonly,
this was done with a separate appliance or an appliance that is logically
separate within a single appliance. With a NGFW, the IPS or IDS appliance
should be fully integrated. The IPS functionality itself is the same as it was
with a separate appliance; the main difference is in the performance and
accessibility of the information from all layers of the traffic. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: 9.0pt; margin-left: 18.75pt; margin-right: 0in; margin-top: 0in; mso-list: l3 level1 lfo6; tab-stops: list .5in; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: Courier New, Courier, monospace;"><span lang="EN-IN" style="color: #333333; font-size: 10pt;">·<span style="font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><b><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;">Bridged and Routed Modes</span></b><span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: 20.4pt; margin-bottom: .25in;">
<span lang="EN-IN" style="color: #333333; font-size: 10.5pt;"><span style="font-family: Courier New, Courier, monospace;">While not a completely new feature, the ability of a NGFW to be used in
either a bridged mode or routed mode is an important one. Many traditional
firewalls are deployed in today's networks, and the majority of them are not
yet NGFWs. To ease this transition, a NGFW must be able to be placed in a
bridged mode (also referred to as transparent mode) where the device itself is
not shown as part of the routed path. When the time is right for each specific
enterprise, the NGFW can then be transitioned into completely replacing a
traditional firewall by being converted in order to use a routed mode. <o:p></o:p></span></span></div>
<br />
<div class="MsoNormal">
<br /></div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-77696298789950219402015-10-26T20:17:00.001+05:302015-10-26T20:17:35.823+05:30Spice Up Your Google Search Background [On Chrome]<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">The trend these days is that if you want the answer to something, you don’t ask a grown up, you ask Google. I’m sure for most of you the Google search page is your start page, especially if your favorite browser is Chrome. Notice that the background of the Google search page is a blank sheet of nothingness, well, apart from the search bar of course.</span><br />
<br />
<a name='more'></a><span style="font-family: Courier New, Courier, monospace;"><br /></span><br />
<span style="font-family: Courier New, Courier, monospace;">customize google page</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">How about we spice things up a little by adding a background or your own picture? With this Custom Google Background extension, you can customize the Google search page background to something of your liking (but only on the Chrome browser).</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Recommended Reading: How To Find Your Previous Google Search Queries</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Getting Started</span><br />
<span style="font-family: Courier New, Courier, monospace;">First, add Custom Google Background extension to browser. It will ask for permission to access your data and browsing activity.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">add extension on chrome</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Next, you will be forwarded to the Settings page. Choose the image you want to use for Google search background from your hardisk or from a URL.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">You can upload more than one image and even leave it on random mode so your background will always change as you reload the page.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">select images</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Not only that, with this extension you can personalize the Google search page. Choose to hide certain elements from the search page such as the Google logo, the "Lucky" button, the footer and much more. You also can adjust the position of your image.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">personalized google page</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Bored with the current image? Just click on "change background image" at the bottom left side of the page, and it will redirect you to the Settings page and you can make your changes there.</span><br />
<div>
<br /></div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-73847999147805953002015-10-24T12:17:00.002+05:302015-10-26T19:49:55.027+05:30Top 15 Hacking Tool For Hackers 2015<br />
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">Before you proceed to the list of top 15 hacking tools you should know the circumstances of using this tools, we quite sure that people</span><span style="background-color: white; font-family: Courier New, Courier, monospace;">around the world are using need to publish or being infamous themselves in front of their respectives but the word hacking also consider the terms of illegal which means without the prior permission of the representative doing so may face you law enforcement.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">Below this 15 tools will basically determine your basic knowledge of what kind of the tool is it and what this tools usually does!</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
</div>
<a name='more'></a><h4>
<strong style="line-height: 21.6px;"><span style="background-color: white; font-family: Courier New, Courier, monospace;">List Of Best 15 Hacking Tools</span></strong></h4>
<div>
<strong style="line-height: 21.6px;"><span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></strong></div>
<div>
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><strong style="line-height: 21.6px;">1. Aircrack-ng: </strong><span class="skimlinks-unlinked" style="border: 0px; line-height: 21.6px; margin: 0px; padding: 0px; vertical-align: baseline;">Aircrack-ng.org</span><span style="line-height: 21.6px;"> is a 802.11 WEP and WPA-PSK keys breaking program that can resolve keys once enough information regarding the term stealed. It executes the standard FMS attack alongside a few improvements like KoreK breach, and additionally the all-new PTW attack, in this way making the assault much quicker contrasted with other WEP splitting devices. Actually, Aircrack-ng is an arrangement of software for evaluating remote systems.</span></span></div>
<div>
<span style="line-height: 21.6px;"><span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></span></div>
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><span style="line-height: 21.6px;">2.<b>SQLMAP:</b> s</span><span style="line-height: 21.6px;">qlmap is an open source infiltration testing device that roboticized the procedure of recognizing and abusing SQL infusion imperfections and assuming control of database servers. Full support for</span><span style="line-height: 21.6px;"> </span><strong style="line-height: 21.6px;">MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB and HSQLDB</strong><span style="line-height: 21.6px;"> </span><span style="line-height: 21.6px;">database management systems.</span></span><br />
<span style="background-color: white;"><br /></span>
<br />
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">It accompanies an effective identification program, numerous corner elements for a definitive infiltration analyzer and an expansive scope of changes enduring from database fingerprinting, over information getting from the database, to getting to the basic record framework and executing orders on the working framework through out-of-band network.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>3. JOHN RIPPER:</b> John the Ripper is a free secret password cracking tool. At first created for the Unix working framework, it now keeps running on fifteen distinct stages (eleven of which are building design particular adaptations of Unix, DOS, Win32, BeOS, and OpenVMS).</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">It is a standout amongst the most mainstream watchword testing and breaking projects as it joins various secret word wafers into one bundle, autodetects watchword hash sorts, and incorporates an adjustable saltine. It can be keep running against different scrambled secret word organizations including a few sepulcher watchword hash sorts most usually found on different Unix variants (in view of DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Extra modules have extended its capacity to incorporate MD4-based secret key hashes and passwords put away in LDAP, MySQL, and others.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>4. n-map(network mapper) : </b><span style="line-height: 21.6px;">Nmap is a contraction of ‘System Mapper’, just like an exceptionally surely understood free open source programmers device. Nmap is utilized for system disclosure and security examining. Numerous framework administrators use nmap for system stock, open ports, overseeing administration update timetables, and observing host or administration uptime.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">The apparatus utilizes crude IP parcels as a part of innovative approaches to figure out what hosts are accessible on the system, what administrations (application name and form) those hosts are putting forth, what working frameworks (and OS renditions and conceivable patches) and what sort and form of bundle channels/firewalls are being utilized by the objective.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">Nmap keeps running on all real PC working frameworks, and authority parallel bundles are accessible for Linux, Windows, and Mac OS X. Notwithstanding the fantastic charge line Nmap executable, the Nmap suite incorporates a propelled GUI and results viewer, an adaptable information exchange, redirection, and investigating apparatus, an utility for looking at output results, and a bundle era and reaction examination device.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>5.THC hydra:</b> <span style="line-height: 21.6px;">THC Hydra is another exemplary watchword splitting apparatus. Entirely speaking Hydra is a system logon watchword splitting apparatus, which is very quick. An extraordinary element about Hydra is that you can add modules to expand the usefulness of this hacking instrument.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">When you have to savage power break a remote association administration, Hydra is regularly the instrument of decision. It can perform fast wordreference assaults against more than 50 conventions, including telnet, ftp, http, https, smb, a few databases, and considerably more. Like THC Amap this discharge is from the fine people at THC. Other online wafers are Medusa and Ncrack. The Nmap Security Scanner additionally contains numerous online savage power secret key splitting modules.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"> <b>6.burp suit:</b> <span style="line-height: 21.6px;">Burp Suite is an incorporated stage that was fabricated to assault (pentest) web applications. The stage contains many hacking devices with various GUI interfaces that encourage and accelerate the procedure of assaulting an application. As ever, the apparatus is intended to have a similar outlook as a dark cap programmer would.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">Burp Suite is a coordinated stage for performing security testing of web applications. Its different instruments work consistently together to bolster the whole testing procedure, from starting mapping and investigation of an application’s assault surface, through to discovering and misusing security vulnerabilities.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>7.Cain and Abel: </b> <span style="line-height: 21.6px;">Cain and Abel (regularly abridged to Cain) is a secret key recuperation instrument for Microsoft Windows. It can recuperate numerous sorts of passwords utilizing techniques, for example, system parcel using so as to sniff, breaking different secret key hashes routines, for example, lexicon assaults, animal power and cryptanalysis assaults.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">Cryptanalysis assaults are done by means of rainbow tables which can be created with the <span class="skimlinks-unlinked" style="border: 0px; font-style: inherit; font-weight: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">winrtgen.exe</span> project gave Cain and Abel. Cain and Abel is kept up by Massimiliano Montoro and Sean Babcock. Recording VoIP discussions, translating mixed passwords, recuperating remote system keys, uncovering secret key boxes, revealing stored passwords and breaking down steering conventions.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">The system does not misuse any product vulnerabilities or bugs that couldn’t be altered with little exertion. It covers some security viewpoints/shortcoming present in convention’s norms, verification routines and reserving components; its primary design is the disentangled recuperation of passwords and qualifications from different sources, on the other hand it likewise sends some “non standard” utilities for Microsoft Windows clients.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>8. OWASP Zed: </b><span style="line-height: 21.6px;">The OWASP Zed Attack Proxy (ZAP) is a simple to utilize integrated penetration testing tool for finding vulnerabilities in web applications. The Zed Attack Proxy (ZAP) is currently a standout amongst the most mainstream OWASP ventures. This hacking and pentesting instrument is an exceptionally proficient and ‘simple to use’ program that discovers vulnerabilities in web applications.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">It is intended to be utilized by individuals with an extensive variety of security experience and as being what is indicated is perfect for designers and useful analyzers who are new to entrance testing. ZAP is a mainstream device on the grounds that it has a ton of bolster and the OWASP group is truly an astounding asset for those that work inside Cyber Security. ZAP gives robotized scanners and an arrangement of instruments that permit you to discover security vulnerabilities physically.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>9. Maltego: </b><span style="line-height: 21.6px;">Maltego is a computerized legal sciences stage that was made to convey a digital danger picture to the earth in which an association works. The one of a kind viewpoint that Maltego offers to both system and asset based substances is the accumulation of data posted everywhere throughout the web whether it’s the present arrangement of a switch balanced on the edge of your system or the present whereabouts of your Vice President on his global visits, Maltego can find, total and picture this data.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">Maltego is an one of a kind stage created to convey an unmistakable danger picture to the environment that an association possesses and works. Maltego’s interesting leeway is to exhibit the many sided quality and seriousness of single purposes of disappointment and in addition trust connections that exist presently inside of the extent of your base.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>10.Metasploit: </b><span style="line-height: 21.6px;">The Metasploit is much more popular tool cubersecurity allows a penetration tester which hackers allowed to used this tool, its function to seek the security of the network with making a vulnerability along with system also. What’s more, Metasploit likewise obliges productive administration and testing of Intrusion Detection Systems.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">The most well known “division” of this ‘multi reason hacking device’ is the open source Metasploit Framework Project, ordinarily alluded to as essentially ‘Metasploit’.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">This apparatus helps the client create and execute (known or generally) adventure code against a remote target machine. Numerous Metasploit clients utilize the apparatus for hostile to criminological and avoidance purposes, a large number of which are incorporated with the Metasploit Framework.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>11.Wireshark :</b> <span style="line-height: 21.6px;">Wireshark is perhaps the best known ‘Programmers Tool’ out there. Wireshark has been around for quite a while now and it is utilized by a huge number of security experts to troubleshoot and break down systems. Wireshark is a fabulous is, programming and correspondences convention improvement, and instruction. Initially named Ethereal, in May 2006 the task was renamed Wireshark because of trademark issues. a free and open-source parcel analyzer.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">Initially named Ethereal, in May 2006 the task was renamed Wireshark because of trademark issues. a free and open-source parcel analyzer.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>12.Angry IP scanner:</b> <span style="line-height: 21.6px;">Irate IP Scanner on the other hand known as ipscan is an open-source and cross-stage system scanner intended to be quick and easy to utilize. It examines IP addresses and ports and has numerous different elements.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">It is generally utilized by system executives and simply inquisitive clients around the globe, including huge and little endeavors, banks, and government organizations. It keeps running on Linux, Windows, and Mac OS X, potentially supporting different stages too.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>13. Nessus scanner : </b><span style="line-height: 21.6px;">At the odd days previously this software tool is much more popular by the demand of the hacking world, currently this application source is unavailable for official but users can still use it for free, it usually works with a client server system, it help users to find out vulnerability, it have been users more than 75,000 companies.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">Nessus Security Scanner is the most famous for companies, Nessus helped many big companies for analysis their business proportional audit process which efficiently cost saving.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>14. Ettercap : </b><span style="line-height: 21.6px;">Ettercap is a free and open source system security device for man-in-the-center assaults on LAN. It can be utilized for PC system convention examination and security evaluating.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">It keeps running on different Unix-like working frameworks including Linux, Mac OS X, BSD and Solaris, and on Microsoft Windows. It is equipped for blocking movement on a system section, catching passwords, and leading dynamic listening stealthily against various normal conventions.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;">Ettercap meets expectations by putting the system interface into wanton mode and by ARP harming the objective machines. Along these lines it can go about as a ‘man in the center’ and unleash different assaults on the casualties. Ettercap has plugin bolster so that the elements can be stretched out by including new plugins.</span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><b>15. Wapiti: </b><span style="line-height: 21.6px;">Wapiti is a web application vulnerability scanner tool allows you to audit the security of your web application through scanning the application and program of the web it works “black-box” types of scanning that will scan the webpages of the deployed webapp but will not study the source code of the webpages, and from the webpage scan it can inject data.</span></span></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<strong><span style="background-color: white; font-family: Courier New, Courier, monospace;">If you found any tool we have missed it then you can comment in the commentary box below so later on we can add up to the content as modification! Thank you for reading this article!</span></strong></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<strong><span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></strong></div>
<div style="border: 0px; color: #333333; font-size: 12px; line-height: 21.6px; margin-bottom: 1.8em; padding: 0px; vertical-align: baseline;">
<strong><span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span></strong></div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-2623739210401884482015-10-22T19:17:00.001+05:302015-10-26T19:56:52.914+05:30How to Root Android with Kingo Android Root<h4 style="height: 0px;">
<span style="font-family: Courier New, Courier, monospace;">
Prerequisite for rooting any Android powered device </span></h4>
<ul style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px; margin-top: 0px;">
<li style="box-sizing: border-box;"><span style="font-family: Courier New, Courier, monospace;">Device powered ON</span></li>
<li style="box-sizing: border-box;"><span style="font-family: Courier New, Courier, monospace;">At least 50% battery level</span></li>
<li style="box-sizing: border-box;"><span style="font-family: Courier New, Courier, monospace;">Internet connection necessary</span></li>
<li style="box-sizing: border-box;"><span style="font-family: Courier New, Courier, monospace;">USB Cable (the original one recommended)</span></li>
</ul>
<h4 style="height: 0px;">
<a name='more'></a><span style="font-family: Courier New, Courier, monospace;">Now follow the STEPS below </span></h4>
<div>
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div>
<h4 style="background-color: white; box-sizing: border-box; font-size: 20px; font-weight: 500; line-height: 1.1; margin-bottom: 10px; margin-top: 10px;">
<span style="font-family: Courier New, Courier, monospace;"><a href="http://downloads.ziddu.com/download/25045503/android_root_other.exe.html">Click here</a> to download kingo root directly</span></h4>
<h4 style="background-color: white; box-sizing: border-box; font-size: 20px; font-weight: 500; line-height: 1.1; margin-bottom: 10px; margin-top: 10px;">
<span style="font-family: Courier New, Courier, monospace;">
Step 1: <a href="http://www.kingoapp.com/android-root/download.htm" style="background-attachment: initial; background-clip: initial; background-color: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; box-sizing: border-box; text-decoration: none;" target="_blank" title="Free Download Android ROOT">Free download</a> and install <em style="box-sizing: border-box;">Kingo Android Root</em>.</span></h4>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;">Kingo offers the best one-click Android root software for free. Just download and install it now.</span></div>
<h4 style="background-color: white; box-sizing: border-box; font-size: 20px; font-weight: 500; line-height: 1.1; margin-bottom: 10px; margin-top: 10px;">
<span style="font-family: Courier New, Courier, monospace;">
Step 2: Double click the desktop icon of <em style="box-sizing: border-box;">Kingo Android Root</em> and launch it.</span></h4>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;">After launching Kingo Android Root, you will see its interface as shown below.</span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnT-RgmnwX-Ue_6Dv-rwIcZcfJvN6YC5HCLDYlmg-Tv2MwwMY3EuhZv3yiG5lxIEhvLXg5bu8bhQRI_LfD2Go8imfLs2sJRjjdDtQg-_U3y8S-DuubO2WzgS3c0xfqqRtVMlCAv33QbM8/s1600/and2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Courier New, Courier, monospace;"><img border="0" height="229" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnT-RgmnwX-Ue_6Dv-rwIcZcfJvN6YC5HCLDYlmg-Tv2MwwMY3EuhZv3yiG5lxIEhvLXg5bu8bhQRI_LfD2Go8imfLs2sJRjjdDtQg-_U3y8S-DuubO2WzgS3c0xfqqRtVMlCAv33QbM8/s320/and2.jpg" width="320" /></span></a></div>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="background-color: white; font-family: Courier New, Courier, monospace; font-size: 20px; line-height: 1.1;">Step 3: Plug your Android device into your computer via USB cable.</span><br />
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;">If your device driver is not installed on your Computer, Kingo will install it for you automatically. Make sure you get Internet conenction so that device driver can be downloaded. If you are using Windows 8, you may need to change some settings first. When running Kingo Android Root on Windows 8, the issue you may most likely encounter is driver installation looping.</span></div>
<h4 style="background-color: white; box-sizing: border-box; font-size: 20px; font-weight: 500; line-height: 1.1; margin-bottom: 10px; margin-top: 10px;">
<span style="font-family: Courier New, Courier, monospace;">
Step 4: Enable USB Debugging mode on your Android device.</span></h4>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;">USB Debugging mode enabled is a necessary step of Android rooting process.</span></div>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;"><span style="box-sizing: border-box; font-weight: 700;">INPORTANT</span>: Pay attention to your device screen for a prompt window. Tick "Always allow from this computer". If you don't, you will probably get yourself an OFFLINE DEVICE</span></div>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi4-9fOIpBQ5yoiBwKw1eT3Em5KB_THqtYr8lHDjJVoenoUKtZ4mWmGyCAU3P1dkh0oYny9PTiJMLBr_37P2nq1FBPEsujZ0YgSlFYpgPuOizvaPOdRAdIpQfSspjAbb5bioiXy-R4X-E/s1600/and2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Courier New, Courier, monospace;"><img border="0" height="229" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi4-9fOIpBQ5yoiBwKw1eT3Em5KB_THqtYr8lHDjJVoenoUKtZ4mWmGyCAU3P1dkh0oYny9PTiJMLBr_37P2nq1FBPEsujZ0YgSlFYpgPuOizvaPOdRAdIpQfSspjAbb5bioiXy-R4X-E/s320/and2.jpg" width="320" /></span></a></div>
<div style="background-color: white; box-sizing: border-box; color: #585858; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace; font-size: 20px; line-height: 1.1;"><br /></span></div>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace; font-size: 20px; line-height: 1.1;">Step 5: Read notifications carefully before rooting your device.</span></div>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;">Android rooting is nothing big. However, it is not exactly a small issue either. Rooting your device may open a door for you, and yet with risks.</span></div>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;"><span style="font-size: 17.5px; line-height: normal;">Android rooting is a modification process to the original system, in which the limitations are removed and full-access is allowed and thus resulting in the ability to alter or replace system applications and settings, run specialized apps and even facilitate the removal and replacement of the device's operating system with a custom one. Rooting your device will immediately void your warranty... Click to know more about</span><span style="font-size: 17.5px; line-height: normal;"> </span><em style="box-sizing: border-box; font-size: 17.5px; line-height: normal;"><a href="http://www.kingoapp.com/help/android-rooting.htm" style="background: 0px 0px; box-sizing: border-box; text-decoration: none;" target="_blank" title="What is Android Rooting?">Android Rooting</a></em><span style="font-size: 17.5px; line-height: normal;">.</span></span></div>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace; font-size: 17.5px; line-height: normal;"><br /></span></div>
<h4 style="background-color: white; box-sizing: border-box; font-size: 20px; font-weight: 500; line-height: 1.1; margin-bottom: 10px; margin-top: 10px;">
<span style="font-family: Courier New, Courier, monospace;">
Step 6: Click "ROOT" to root your device.</span></h4>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;">Kingo Android Root will employ multiple exploits on your device, which will probably take a couple of minutes. In the rooting process, your device may be rebooted several times. Do not be panic, it is perfectly normal. And once it begins, please <em style="box-sizing: border-box;">DO NOT</em> touch, move, unplug or perform any operation on your device.</span></div>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd1X5Y-mqD8T89PuP-fAlKKS94qDKKR5RtfJO4KeIJaVHUkTpkpTOGjcYsK-TDGrRYCLbJE9xYQ1uCaNM3Qyh2T9Kolo4_r1xVWc_0yQHN-P5Y4nyPzX7CipwbZ7SFmZvbv_2IIrT-5NI/s1600/and+2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Courier New, Courier, monospace;"><img border="0" height="228" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd1X5Y-mqD8T89PuP-fAlKKS94qDKKR5RtfJO4KeIJaVHUkTpkpTOGjcYsK-TDGrRYCLbJE9xYQ1uCaNM3Qyh2T9Kolo4_r1xVWc_0yQHN-P5Y4nyPzX7CipwbZ7SFmZvbv_2IIrT-5NI/s320/and+2.jpg" width="320" /></span></a></div>
<div style="background-color: white; box-sizing: border-box; color: #585858; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="background-color: white; box-sizing: border-box; color: #585858; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;"> </span></div>
<div style="background-color: white; box-sizing: border-box; color: #585858; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<h4 style="background-color: white; box-sizing: border-box; font-size: 20px; font-weight: 500; line-height: 1.1; margin-bottom: 10px; margin-top: 10px;">
<span style="font-family: Courier New, Courier, monospace;">
Step 7: Root succeeded, click "Finish" to reboot your device.</span></h4>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;">Hopefully your device is well supported and successfully rooted by Kingo. Until your device reboots itself, do not operate.</span></div>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;"><br style="box-sizing: border-box;" /></span></div>
<h4 style="background-color: white; box-sizing: border-box; font-size: 20px; font-weight: 500; line-height: 1.1; margin-bottom: 10px; margin-top: 10px;">
<span style="font-family: Courier New, Courier, monospace;">
Step 8: Check the root status of your device.</span></h4>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;">Normally, you will find an app named SuperSU installed on your device after successful rooting.</span></div>
<div style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0yahFXQEAjDRoHxa5p4Mg4xCUQW61SMsopt4zKry31oBy_8n82hQRv6ozWhkqNXwsG_g-FQxE_g8q_H70DQPtdNEhBSGCamhNweXjUCk92m_1aGRqLiKL381iidQ-s1EfGdmVJQfvJwI/s1600/and4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Courier New, Courier, monospace;"><img border="0" height="229" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0yahFXQEAjDRoHxa5p4Mg4xCUQW61SMsopt4zKry31oBy_8n82hQRv6ozWhkqNXwsG_g-FQxE_g8q_H70DQPtdNEhBSGCamhNweXjUCk92m_1aGRqLiKL381iidQ-s1EfGdmVJQfvJwI/s320/and4.jpg" width="320" /></span></a></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Courier New, Courier, monospace;"><hr></span></div>
<div style="background-color: white; box-sizing: border-box; color: #585858; font-size: 14px; line-height: 20px; margin-bottom: 10px;">
<span style="font-family: Courier New, Courier, monospace;"><br /></span></div>
<div style="box-sizing: border-box; margin-bottom: 10px; text-align: center;">
<span style="color: white;"><span style="background-color: #5bc0de; font-family: Courier New, Courier, monospace; font-size: 10.5px; line-height: 10.5px; white-space: nowrap;"><b><br /></b></span></span></div>
<div style="box-sizing: border-box; margin-bottom: 10px; text-align: center;">
<span style="font-family: Courier New, Courier, monospace;"><span style="background-color: #5bc0de; font-size: 10.5px; line-height: 10.5px; white-space: nowrap;"><b>NOTE </b></span><span style="background-color: white; font-size: 14px; line-height: 20px;">If your device is not supported by Kingo or it fails to root, here are some tips for you.</span></span></div>
<ol style="background-color: white; box-sizing: border-box; font-size: 14px; line-height: 20px; margin-bottom: 10px; margin-top: 0px;">
<li style="box-sizing: border-box;"><span style="font-family: Courier New, Courier, monospace;">Go <em style="box-sizing: border-box;"><a href="http://www.kingoapp.com/troubleshoot/" style="background: 0px 0px; box-sizing: border-box; text-decoration: none;" target="_blank" title="Troubleshoot of Kingo Android Root">Troubleshoot</a></em> sector.</span></li>
<li style="box-sizing: border-box;"><span style="font-family: Courier New, Courier, monospace;">Save the log file. <em style="box-sizing: border-box;"><a href="http://www.kingoapp.com/root-tutorials/how-to-save-log.htm" style="background: 0px 0px; box-sizing: border-box; text-decoration: none;" target="_blank" title="How to save log of Kingo Android Root?">How to save log of Kingo Android Root?</a></em></span></li>
<li style="box-sizing: border-box;"><span style="font-family: Courier New, Courier, monospace;">Email us to <a href="http://mailto:support@kingoapp.com/" style="background: 0px 0px; box-sizing: border-box; text-decoration: none;">support@kingoapp.com</a> with detailed information of your device such as device model, build number, kernel version and else. Attach the log file would be better.</span></li>
<li style="box-sizing: border-box;"><span style="font-family: Courier New, Courier, monospace;">Follow us on Facebook (<a href="https://www.facebook.com/kingoapp" style="background-attachment: initial; background-clip: initial; background-color: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; box-sizing: border-box; text-decoration: none;">Kingoapp</a>), reply to any post or send us a message.</span></li>
</ol>
</div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-51688580220987643802015-10-22T19:16:00.002+05:302015-10-26T19:57:17.294+05:3010 Hidden Features You Can Find In Android Developer Options<span style="font-family: Courier New, Courier, monospace;"><span style="color: #444444; font-size: 17.6px; line-height: 29.92px;">Do you notice that your </span>Android device<span style="color: #444444; font-size: 17.6px; line-height: 29.92px;"> has a "developer options" feature hidden somewhere? There are many things you can do on your Android but</span><strong style="color: #444444; font-size: 17.6px; line-height: 29.92px;"> there’s more you can do when you have this option enabled</strong><span style="color: #444444; font-size: 17.6px; line-height: 29.92px;">. From </span>speeding up<span style="color: #444444; font-size: 17.6px; line-height: 29.92px;"> your device by turning animations off, to obtaining higher quality rendering for a good gameplay, there are plenty of features you can enable from the </span><strong style="color: #444444; font-size: 17.6px; line-height: 29.92px;">Android Developer Options</strong><span style="color: #444444; font-size: 17.6px; line-height: 29.92px;"> section.</span></span><br />
<span style="font-family: Courier New, Courier, monospace;"><span style="color: #444444; font-size: 17.6px; line-height: 29.92px;"></span><br /></span>
<br />
<a name='more'></a><span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><span style="color: #444444; font-size: 17.6px; line-height: 29.92px;">Note that </span><strong style="color: #444444; font-size: 17.6px; line-height: 29.92px;">this is not for everyone</strong><span style="color: #444444; font-size: 17.6px; line-height: 29.92px;"> – some of you may not want to change anything in fear of "messing up" your mobile device. Not to worry, just backtrack and change the setting back. For some phones, you can enable developer options by going to </span><strong style="color: #444444; font-size: 17.6px; line-height: 29.92px;">Settings</strong><span style="color: #444444; font-size: 17.6px; line-height: 29.92px;"> > </span><strong style="color: #444444; font-size: 17.6px; line-height: 29.92px;">About</strong><span style="color: #444444; font-size: 17.6px; line-height: 29.92px;">, then tapping repeatedly on </span><strong style="color: #444444; font-size: 17.6px; line-height: 29.92px;">Build Number</strong><span style="color: #444444; font-size: 17.6px; line-height: 29.92px;"> until </span><strong style="color: #444444; font-size: 17.6px; line-height: 29.92px;">Developer Options</strong><span style="color: #444444; font-size: 17.6px; line-height: 29.92px;"> is enabled.</span></span><br />
<span style="font-family: Courier New, Courier, monospace;"><span style="color: #252525; font-size: 1.325em; line-height: 29.92px;"><br /></span>
<span style="color: #252525; font-size: 1.325em; line-height: 29.92px;">1. Enable and Disabling USB Debugging</span></span><br />
<div style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin-bottom: 1.5em; margin-top: 0.5em; padding-right: 20px;">
<span style="font-family: Courier New, Courier, monospace;">You probably already noticed that most Android-related tools on your PC will require you to enable USB Debugging for the tool to run properly. That because without it enabled, the tools cannot establish a connection between your device and your desktop. To enable USB Debugging:</span></div>
<ol style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin: 1em 0px; padding: 0px 0px 0px 40px;">
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Go to Settings > <strong>Developer Options</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;"><strong>Tick </strong>on the<strong> USB Debugging </strong>checkbox.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;"><strong>Select</strong> <strong>OK</strong> when you’re prompted with a message saying "Allow USB Debugging?".</span></li>
</ol>
<div>
<span style="color: #252525; font-family: Courier New, Courier, monospace; font-size: 1.325em; line-height: 29.92px;"><br /></span></div>
<div>
<span style="color: #252525; font-family: Courier New, Courier, monospace; font-size: 1.325em; line-height: 29.92px;">2. Create Desktop Backup Password</span></div>
<div>
<div style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin-bottom: 1.5em; margin-top: 0.5em; padding-right: 20px;">
<span style="font-family: Courier New, Courier, monospace;">Before you create a backup using Android tools on your desktop, you can first create a password for your backup in the developer options. To put protection on your backup from being accessed easily:</span></div>
<ol style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin: 1em 0px; padding: 0px 0px 0px 40px;">
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Head to <strong>Settings</strong> > <strong>Developer Options</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;"><strong>Tap</strong> on <strong>Desktop backup password</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Fill in the current password, then type and retype the new password for full backup</span></li>
</ol>
<div>
<span style="color: #252525; font-family: Courier New, Courier, monospace; font-size: 23.32px; line-height: 29.92px;">3. Tweak Animation Settings</span></div>
</div>
<div>
<div style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin-bottom: 1.5em; margin-top: 0.5em; padding-right: 20px;">
<span style="font-family: Courier New, Courier, monospace;">When you transition from screen to screen on your Android device you will notice that there is animation added in between. You can choose to speed up this animation or turn it off entirely. The lower the number you choose, the faster the animation will be.</span></div>
<ol style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin: 1em 0px; padding: 0px 0px 0px 40px;">
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Go to <strong>Settings</strong> > <strong>Developer Options</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Scroll down and look for <strong>Window animation scale</strong>, <strong>Transition animation scale</strong>, and <strong>Animator duration scale</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Adjust the scale for the animation you want. The greater the number, the slower the animation (and the longer you have to wait).</span></li>
</ol>
<div>
<span style="color: #252525; font-family: Courier New, Courier, monospace; font-size: 1.325em; line-height: 29.92px;">4. Enable MSAA For OpenGL Games</span></div>
</div>
<div>
<div style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin-bottom: 1.5em; margin-top: 0.5em; padding-right: 20px;">
<span style="font-family: Courier New, Courier, monospace;">If you like to play games on your Android device and you’re playing it using high-end Android devices, you might want to <strong>force enable MSAA to obtain a higher quality rendering of your in game graphics</strong>. This feature is turned off in some games by default because it can drain your device’s battery rather quickly. To enable FXAA:</span></div>
<ol style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin: 1em 0px; padding: 0px 0px 0px 40px;">
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Head to <strong>Settings</strong> > <strong>Developer Options</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;"><strong>Tap</strong> on <strong>Force 4x MSAA</strong> to enable it.</span></li>
</ol>
<div>
<span style="color: #252525; font-family: Courier New, Courier, monospace; font-size: 23.32px; line-height: 29.92px;">5. Allow Mock Location</span></div>
</div>
<div>
<div style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin-bottom: 1.5em; margin-top: 0.5em; padding-right: 20px;">
<span style="font-family: Courier New, Courier, monospace;">To be able to fake your current GPS location, you need an app. But to use that app, you will need to first allow Mock Location for the app to work. Enable Mock Location in two steps.</span></div>
<ol style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin: 1em 0px; padding: 0px 0px 0px 40px;">
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Go to <strong>Settings</strong> > <strong>Developer Options</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Look for <strong>Allow Mock Location</strong> and <strong>tick</strong> on it to enable.</span></li>
</ol>
<div>
<span style="color: #252525; font-family: Courier New, Courier, monospace; font-size: 1.325em; line-height: 29.92px;"> 6. Stay Awake While Charging</span></div>
</div>
<div>
<div style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin-bottom: 1.5em; margin-top: 0.5em; padding-right: 20px;">
<span style="font-family: Courier New, Courier, monospace;">When you charge your phone, the screen of the device will automatically turn off. If for some reason you want it to stay awake, you can do that with these two steps:</span></div>
<ol style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin: 1em 0px; padding: 0px 0px 0px 40px;">
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Go to <strong>Settings</strong> > <strong>Developer Options</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Tap on <strong>Stay Awake</strong> to <strong>tick</strong> it, thus enabling the feature.</span></li>
</ol>
<div>
<span style="color: #252525; font-family: Courier New, Courier, monospace; font-size: 23.32px; line-height: 29.92px;">7. Display CPU Usage Overlay</span></div>
</div>
<div>
<div style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin-bottom: 1.5em; margin-top: 0.5em; padding-right: 20px;">
<span style="font-family: Courier New, Courier, monospace;">Need to keep an eye on the CPU usage of your device? There is a way to get an overlay to <strong>show the processes that are currently being use by your CPU</strong>. To display CPU usage, follow the tips below. (Note that this shouldn’t be turned on all the time – as the number of processes increase, it minimises the space you can see in your screen).</span></div>
<ol style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin: 1em 0px; padding: 0px 0px 0px 40px;">
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Head to <strong>Settings</strong> > <strong>Developer Options</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;"><strong>Tick</strong> on <strong>Show CPU Usage</strong> to enable it.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">You will see an overlay of your current CPU Usage on the right side of the screen.</span></li>
</ol>
<div>
<span style="font-family: Courier New, Courier, monospace;"><span style="color: #252525; font-size: 1.325em; line-height: 29.92px;"> </span><span style="color: #252525; font-size: large; line-height: 29.92px;">8. Don’t Keep App Activities</span></span></div>
</div>
<div>
<div style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin-bottom: 1.5em; margin-top: 0.5em; padding-right: 20px;">
<span style="font-family: Courier New, Courier, monospace;">Your Android app activities are still intact even after you have exited from your app. Most of your apps relies on local cached data on Android <strong>so that they can load faster and will not face any forced close moments</strong>. However, there may be apps that use a lot of activities. You can choose to not keep these activities with these steps:</span></div>
<ol style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin: 1em 0px; padding: 0px 0px 0px 40px;">
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Head to <strong>Settings</strong> > <strong>Developer Options</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;"><strong>Tick</strong> on <strong>Don’t keep activities</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">You can switch back anytime by unticking the disable.</span></li>
</ol>
<div>
<span style="color: #252525; font-family: Courier New, Courier, monospace; font-size: large; line-height: 29.92px;"> 9. Switch Dalvik To ART</span></div>
</div>
<div>
<div style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin-bottom: 1.5em; margin-top: 0.5em; padding-right: 20px;">
<span style="font-family: Courier New, Courier, monospace;">Art is a new experimental runtime by Google that is supposed to replace Dalvik in the near future as it is faster. If you want to test run ART on your device, you will need an Android device running at least Kit Kat 4.4 and above. To set this up:</span></div>
<ol style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin: 1em 0px; padding: 0px 0px 0px 40px;">
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Head to <strong>Settings</strong> > <strong>Developer options</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;"><strong>Tap</strong> on <strong>Select runtime</strong> and <strong>choose Use ART</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Note that ART is still experimental and not many apps support it, hence it may turn your device slower. If you experience this, switch back to Dalvik.</span></li>
</ol>
<div>
<span style="font-family: Courier New, Courier, monospace;"><span style="color: #252525; font-size: 1.325em; line-height: 29.92px;"> </span><span style="color: #252525; font-size: large; line-height: 29.92px;">10. Enable Wireless Display Certifications</span></span></div>
</div>
<div>
<div style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin-bottom: 1.5em; margin-top: 0.5em; padding-right: 20px;">
<span style="font-family: Courier New, Courier, monospace;">This option is only useful if you own a Miracast-ready display (or something else of a similar technology), to transmit your Android content to your TV. To watch Youtube videos on your Miracast-ready display, you will need to <strong>enable Wireless Display Certifications</strong>. To do that, follow the steps below.</span></div>
<ol style="color: #444444; font-size: 17.6px; line-height: 29.92px; margin: 1em 0px; padding: 0px 0px 0px 40px;">
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Go to <strong>Settings</strong> > <strong>Developer options</strong>.</span></li>
<li style="margin: 6.09375px 6.09375px 10.9688px;"><span style="font-family: Courier New, Courier, monospace;">Then look for <strong>Wireless display certification</strong> and <strong>tick</strong> it.</span></li>
</ol>
</div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-40457533972506054592015-10-13T22:06:00.004+05:302015-10-26T19:57:40.489+05:30Some Cool Registry Tricks<span style="font-family: Courier New, Courier, monospace;">The registry is a hierarchical database that stores the value of
variables in windows and the application and services that run on
windows.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">The operating system and the other programs also uses the registry to
store about user and about the current configuration of the system and
its components.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">SUBTREE:Subtree are the root, or primary divisions, of the registry.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">he registry is divided into five subtrees. Subtree contains the keys, subkeys, ans enteries in which the data is stored.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />
<a name='more'></a><span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<b><span style="font-family: Courier New, Courier, monospace;">LIST OF SUBTREES:</span></b><br />
<span style="font-family: Courier New, Courier, monospace;"><b><br /></b>
HKEY_CLASSES_ROOT</span><br />
<span style="font-family: Courier New, Courier, monospace;">HKEY_CURRENT_USER</span><br />
<span style="font-family: Courier New, Courier, monospace;">HKEY_LOCAL_MACHINE</span><br />
<span style="font-family: Courier New, Courier, monospace;">HKEY_USERS</span><br />
<span style="font-family: Courier New, Courier, monospace;">HKEY_CURRENT_CONFIG</span><br />
<span style="font-family: Courier New, Courier, monospace;"><b><br /></b>
<b>TRICKS:</b></span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">First of all open Registry Editor.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Go to start> run> regedit</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />
<h3 style="text-align: left;">
<span style="font-family: Courier New, Courier, monospace;">
How TO REMOVE THE SHORTCUT ARROW FROM SHORTCUTS.</span></h3>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<b><span style="font-family: Courier New, Courier, monospace;">STEPS:</span></b><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">1.Open regedit.exe file.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"> 2.Scroll down to create the following registry key:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[HKEY_CLASSES_ROOT\lnkfile]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"> Under the lnkfile key, in the right pane delete a String value named IsShortcut.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />
<h3 style="text-align: left;">
<span style="font-family: Courier New, Courier, monospace;">
How TO DISABLE RIGHT CLICK ON THE DESKTOP AND EXPLORER.</span></h3>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<b><span style="font-family: Courier New, Courier, monospace;">STEPS:</span></b><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Open regedit.exe file.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Scroll down to create the following registry key:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">In the left side pane, right click on the Policies key and create a new key called Explorer.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Under the Explorer key, in the right pane create a new DWORD value named
NoViewContextMenu within the above registry key and set its data value
to 1 to disable the right click context menu on the desktop, and to 0 to
enable it.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">NOTE: You may want to completely delete the DWORD value NoViewContextMenu when you want to enable right click.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />
<h3 style="text-align: left;">
<span style="font-family: Courier New, Courier, monospace;"><b>How TO DISABLE RIGHT CLICK ON THE TASKBAR</b>.</span></h3>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<b><span style="font-family: Courier New, Courier, monospace;">STEPS:</span></b><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Open regedit.exe file.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Scroll down to create the following registry key:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">In the right pane, create a new DWORD value named NoTrayContextMenu
within the above registry key and set its data value to 1 to disable the
right click context menu on the taskbar, and to 0 to enable it.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">NOTE: You may want to completely delete the DWORD value NoTrayContextMenu when you want to enable right click.</span><br />
<h3 style="text-align: left;">
<span style="font-family: Courier New, Courier, monospace;">
How TO DISABLE WINDOWS HOTKEYS.</span></h3>
<b><span style="font-family: Courier New, Courier, monospace;">STEPS:</span></b><br />
<span style="font-family: Courier New, Courier, monospace;"><b><br /></b>
Open regedit.exe file.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Scroll down to create the following registry key:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Under the Explorer key, in the right pane create a new DWORD value named
NoWinKeys within the above registry key and set its data value to 1 to
disable the windows hotkeys, and to 0 to enable it.</span><br />
<span style="font-family: Courier New, Courier, monospace;">NOTE: You may want to completely delete the DWORD value NoWinKeys when you want to enable hotkeys.</span><br />
<h3 style="text-align: left;">
<span style="font-family: Courier New, Courier, monospace;">
How TO DISABLE THE CONTROL PANEL.</span></h3>
<b><span style="font-family: Courier New, Courier, monospace;">STEPS:</span></b><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Open regedit.exe file.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Scroll down to create the following registry key:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Under the Explorer key, in the right pane create a new DWORD value named
NoControlPanel within the above registry key and set its data value to 1
to disable the windows hotkeys, and to 0 to enable it.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">NOTE: You may want to completely delete the DWORD value NoControlPanel when you want to enable control panel.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />
<h3 style="text-align: left;">
<span style="font-family: Courier New, Courier, monospace;">
How TO DISABLE THE FOLDER AND SEARCH OPTION.</span></h3>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<b><span style="font-family: Courier New, Courier, monospace;">STEPS:</span></b><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Open regedit.exe file.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Scroll down to create the following registry key:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ Explorer]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Under the Explorer key, in the right pane create a new DWORD value named
NoFolderOptions within the above registry key and set its data value to
1 to disable the folder and search option, and to 0 to enable it.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">NOTE: You may want to completely delete the DWORD value NoFolderOptions when you want to enable the folder and search option.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />
<h3 style="text-align: left;">
<span style="font-family: Courier New, Courier, monospace;">
How TO ADD AN APPLICATION TO THE RIGHT CLICK MENU OF THE DESKTOP.<br />STEPS:</span></h3>
<span style="font-family: Courier New, Courier, monospace;">Open regedit.exe file.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Scroll down to create the following registry key:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[HKEY_CLASSES_ROOT\Directory\Background\shell]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">In the left side pane, right click on the shell key and create a new key called Paint.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">In the left side pane, right click on the Paint key and create a new key called command.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Under the command key, in the right pane double click on the (Default)
string key and change its data to: C:\Windows\System32\mspaint.exe</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">NOTE: Now when you right click on your desktop, a new menu item called Paint has been added to the context menu.</span><br />
<h3 style="text-align: left;">
<span style="font-family: Courier New, Courier, monospace;">
How TO ADD CONTROL PANEL TO THE RIGHT CLICK MENU OF THE DESKTOP.<br />STEPS:</span></h3>
<span style="font-family: Courier New, Courier, monospace;">Open regedit.exe file.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Scroll down to create the following registry key:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[HKEY_CLASSES_ROOT\Directory\Background\shell]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">In the left side pane, right click on the shell key and create a new key called Control Panel.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">In the left side pane, right click on the Control Panel key and create a new key called command.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Under the command key, in the right pane double click on the (Default) string key and change its data</span><br />
<span style="font-family: Courier New, Courier, monospace;"> to: rundll32.exe shell32.dll,Control_RunDLL</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">NOTE: Now when you right click on your desktop, a new menu item called Control Panel has been added to the context menu.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />
<h3>
<span style="font-family: Courier New, Courier, monospace;">
How TO PREVENT ACCESS TO CERTAIN DRIVES.
<b>STEPS:</b></span></h3>
<span style="font-family: Courier New, Courier, monospace;"><b><br /></b>
Open regedit.exe file.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Scroll down to create the following registry key:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">Under the Explorer key, in the right pane create a new DWORD value named
NoViewOnDrive within the above registry key and set its data value to
the number of the drive that you want to hide as per the below list:</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">A: 1 , B: 2 , C: 4 , D: 8 , E: 16 , F: 32 , G: 64 , H: 128 (ALL: 67108863)</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">NOTE: You may want to completely delete the DWORD value NoViewOnDrive when you want to enable access to certain drives.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<br />
<h3 style="text-align: left;">
<span style="font-family: Courier New, Courier, monospace;">
How TO DISABLE THE FOLDER AND SEARCH OPTION.</span></h3>
<span style="font-family: Courier New, Courier, monospace;">STEPS:</span><br />
<span style="font-family: Courier New, Courier, monospace;">Open regedit.exe file.</span><br />
<span style="font-family: Courier New, Courier, monospace;">Scroll down to create the following registry key:</span><br />
<span style="font-family: Courier New, Courier, monospace;">[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ System]</span><br />
<span style="font-family: Courier New, Courier, monospace;">Under the System key, in the right pane create a new DWORD value named
DisableTaskMgr within the above registry key and set its data value to 1
to disable the folder and search option, and to 0 to enable it.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">NOTE: You may need to restart Windows for the changes to be implemented.</span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
<span style="font-family: Courier New, Courier, monospace;">That's it friends..!!! Hope you like it..don't forget to comment..!!</span>shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-82021549463108849692015-10-13T21:51:00.000+05:302015-10-26T19:58:01.739+05:30Hirte Attack – Easily Method To Hack Wirless PasswordHirte is a type of attack that aims to crack the WEP key of wireless
networks that are not reachable but the client device (laptop, mobile,
etc.) is in the area of the attacker. This can be achieved because the
WEP key and the configuration details are still stored in the wireless
device.<br />
The only requirement for this attack is to setup a fake access
point with the same SSID of the WEP network. When the client device will
try to connect automatically then ARP packets will be sent from the
fake access point (attacker machine) to the device and the other way
around which they will contain part of the keystream.<br />
<br />
<a name='more'></a><br />
<h2>
Breakdown of the Hirte Attack</h2>
<ol>
<li>Setup a fake WEP AP and waits for a client to connect</li>
<li>Upon connection of a client waits for auto-configuration IP address</li>
<li>Client sends an ARP packet</li>
<li>Obtain the ARP packet and converts it into an ARP request for the same client</li>
<li>Client replies</li>
<li>Collect these packets</li>
<li>Crack the WEP key</li>
</ol>
<h2>
Deployment of Hirte Attack</h2>
The first step is to create the WEP access point with the use of the
tool airbase-ng. The -c variable defines the channel, the -W sets the
encryption bit, mon0 is the interface and the -N enables the Hirte
attack mode.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmaVOWC3IUe9z5fd6IaxdFw2SlTy1QCP4ELy6pWQgyN3kxvpAfBwUct659tTCT6i9SI-tiTOQnv3m8BdgsBzKdeoCnzwoYmPMK3kNH8VSQWO61WitK4kn2CYll69EHR1Q8W4MCZBVIUEI/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="171" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmaVOWC3IUe9z5fd6IaxdFw2SlTy1QCP4ELy6pWQgyN3kxvpAfBwUct659tTCT6i9SI-tiTOQnv3m8BdgsBzKdeoCnzwoYmPMK3kNH8VSQWO61WitK4kn2CYll69EHR1Q8W4MCZBVIUEI/s400/3.png" width="400" /> </a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
The next step is to configure airodump-ng to capture packets and to write those in a file called Hirte.</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjC2FBtYxijzzS_SH6CVCwzIcVM7Pfn_8CXtpp9ixvQ11t3DNHf-Ial0RP1oGGsiV2TgdG3yOJyUP4CGvi426mVd7dYdt1dIKGX-b7H6oReM-5qarl5mWvFvSVn9H2znQ4vphNXH_uKHJw/s1600/4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="113" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjC2FBtYxijzzS_SH6CVCwzIcVM7Pfn_8CXtpp9ixvQ11t3DNHf-Ial0RP1oGGsiV2TgdG3yOJyUP4CGvi426mVd7dYdt1dIKGX-b7H6oReM-5qarl5mWvFvSVn9H2znQ4vphNXH_uKHJw/s320/4.png" width="320" /></a></div>
As we can see the fake access point appears on the list of the available wireless networks.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_nQhOpyW1wBXTj-F4f6y8ZeJU-8qAfR3dEviBM_xCwUYoxg4wVjacJKl5-9QgwzJ81BpdqKTTiBs77RUwmWTmiWJ2DBItSFRHUTo_jK5HTu-rk-XdmTpwvDVzod62WHS2jbADu58Tf-w/s1600/5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="95" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_nQhOpyW1wBXTj-F4f6y8ZeJU-8qAfR3dEviBM_xCwUYoxg4wVjacJKl5-9QgwzJ81BpdqKTTiBs77RUwmWTmiWJ2DBItSFRHUTo_jK5HTu-rk-XdmTpwvDVzod62WHS2jbADu58Tf-w/s320/5.png" width="320" /></a></div>
The same network will appear and on the victim device<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwdLpYMEZjGVuHcm_opq2xfet1I_z063BC14p-BKoQHJc3RoTfuuDlnFfe-wtcbooBpjFgnAxsW5Gdg93BFEMqCwJ60BMpzko3QV7De135hWY-j_oaQhAPl3TxyJSc-cC2EleDKZzsrG8/s1600/6.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="175" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwdLpYMEZjGVuHcm_opq2xfet1I_z063BC14p-BKoQHJc3RoTfuuDlnFfe-wtcbooBpjFgnAxsW5Gdg93BFEMqCwJ60BMpzko3QV7De135hWY-j_oaQhAPl3TxyJSc-cC2EleDKZzsrG8/s320/6.png" width="320" /></a></div>
<br />
<div class="wp-caption-text" style="text-align: left;">
Victim – Fake Wireless Network Available</div>
<div class="wp-caption-text" style="text-align: left;">
The victim device
will connect automatically on the Wireless Pentest Lab as it is a
network that it was connected previously when the genuine Wireless
Pentest Lab was in range. The Hirte attack will start and ARP packets
will be sent as the device will try to obtain an IP address. However
this will not be possible as there is no DHCP server running but the
collection of IVs will start.</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv6B5BVoC0f4j2OJ5oEH_MUkQk7VPdtWpGan0rI4exw3l5Ci703BHj67PpC5lYKKswyebGmL2Ci9vr_VV_73dQfQDN-p_S60HFcpYDWi10tvVHxBdebPyq16AnnBu1OOzFioK3jGw_ZQY/s1600/7.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="89" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv6B5BVoC0f4j2OJ5oEH_MUkQk7VPdtWpGan0rI4exw3l5Ci703BHj67PpC5lYKKswyebGmL2Ci9vr_VV_73dQfQDN-p_S60HFcpYDWi10tvVHxBdebPyq16AnnBu1OOzFioK3jGw_ZQY/s320/7.png" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="wp-caption-text" style="text-align: left;">
<br /></div>
<div class="wp-caption-text" style="text-align: left;">
Hirte Attack Running</div>
<div class="wp-caption-text" style="text-align: left;">
The final step is
to start the aircrack-ng in order to crack the WEP key from the packets
that have been captured on the file called Hirte.</div>
<div class="wp-caption-text" style="text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD6YfaZ808TI-PKHhgymiPU3ZDj8yS2Pd4g_zqMMBKX3ylcXAXFTMtTd5u1fatitDaXYp-dZSzTtcMrjEfeIBR3K3pJj-MYkTvz4Tl3fGWhbtjvON57xSV1lM_ysQZ9tiMF8heiTNOnmA/s1600/8.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="87" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD6YfaZ808TI-PKHhgymiPU3ZDj8yS2Pd4g_zqMMBKX3ylcXAXFTMtTd5u1fatitDaXYp-dZSzTtcMrjEfeIBR3K3pJj-MYkTvz4Tl3fGWhbtjvON57xSV1lM_ysQZ9tiMF8heiTNOnmA/s320/8.png" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="wp-caption-text" style="text-align: left;">
<br /></div>
<div class="wp-caption-text" style="text-align: left;">
<br /></div>
<div class="wp-caption-text" style="text-align: left;">
Read the packets</div>
<div class="wp-caption-text" style="text-align: left;">
As we can see from
the image below the WEP key has been cracked for a wireless network that
it was not even in the range of the attacker</div>
<div class="wp-caption-text" style="text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh6l8XmQwcAYJpaiC-j9JNQlA-kLxZIp61sIKjy83nMaEg_cSmIAUkYt1Q4KkPJvvCEsZq78hA-RJXDbKg1nHUIWDmcgwvgQVNyhFqcWlV_N-PJqiUhscZ8G2cyg5PWFp50Sh9MTAm4xg/s1600/9.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="144" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh6l8XmQwcAYJpaiC-j9JNQlA-kLxZIp61sIKjy83nMaEg_cSmIAUkYt1Q4KkPJvvCEsZq78hA-RJXDbKg1nHUIWDmcgwvgQVNyhFqcWlV_N-PJqiUhscZ8G2cyg5PWFp50Sh9MTAm4xg/s320/9.png" width="320" /></a></div>
<div class="wp-caption-text" style="text-align: left;">
WEP Key Found</div>
<h2>
Conclusion</h2>
As we saw with the Hirte attack someone is able to crack the WEP
wireless key from a network just by exploiting a roaming client and
without attacking the access point at all. This happened because the
wireless configuration including the WEP key was stored on the device
and client had the option to connect automatically to this wireless
network when it was found in range. In a summary this attack uses the
following principles:<br />
<ul>
<li>It is a fragmentation attack</li>
<li>Targets isolated clients</li>
<li>Collects ARP packets that contain the WEP key.</li>
</ul>
<div class="separator" style="clear: both; text-align: center;">
</div>
shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-45692953812091076292015-10-13T21:27:00.003+05:302015-10-26T19:58:38.871+05:30Download only audios from videos of YOUTUBEThere would have been many times when you wanted to download just the
audio of a YouTube video, but not finding any way on how to extract
just the audio. You had to download the whole video, which took a lot of
bandwidth as well as time to download.<br />
<span class="su-dropcap su-dropcap-style-flat">T</span>here
are many ways you could just download the mp3 of a video. You could use
IDM, or Down Them All Firefox Plugin etc. But I found a way to download
the mp3 without using any third party tool or plugin.I found a website
called <a href="http://www.listentoyoutube.com/" rel="nofollow" target="_blank">listentoyoutube</a>. Just go to it.
On the homepage, you will find a form where you can enter the URL of
the video you want to download . Find a Youtube video and copy the URL
link into it.<br />
<br />
<a name='more'></a><br />
<ul>
<li>It will check the link taking some time</li>
</ul>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqNr8pCuUBGNIZ8zWtL8UszWR7mh9ygE0A704bHvHRT_l-8bQCcqwhX3_IPeApttK4-DEest4Wzl7eEXNjComQ6OKNUpsZnFDmtFL23X5k6Or6xGXzniT6ndjSgZlatibJMEDmrJ1d_Kw/s1600/10634258_725712057499244_1659230167_n.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="152" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqNr8pCuUBGNIZ8zWtL8UszWR7mh9ygE0A704bHvHRT_l-8bQCcqwhX3_IPeApttK4-DEest4Wzl7eEXNjComQ6OKNUpsZnFDmtFL23X5k6Or6xGXzniT6ndjSgZlatibJMEDmrJ1d_Kw/s320/10634258_725712057499244_1659230167_n.jpg" width="320" /></a></div>
<ul>
<li>Click on the highlighted area .</li>
</ul>
<ul>
<li>Now click on the “Download mp3” button</li>
</ul>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1Yd2YWHNVou1uobD93dVz9fll0gA1HXBaKeNNWY-m6jYB8_bxIEWHsKE3zdYp4DUR-acl0QMC0HOz8CVb0dm240v1C_SM8Cq8iWiT8ZgOCGtQmoWlG6J4rx70Tso89yk0PT9e7yg3uNo/s1600/10621040_725712050832578_1313884621_n.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="157" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1Yd2YWHNVou1uobD93dVz9fll0gA1HXBaKeNNWY-m6jYB8_bxIEWHsKE3zdYp4DUR-acl0QMC0HOz8CVb0dm240v1C_SM8Cq8iWiT8ZgOCGtQmoWlG6J4rx70Tso89yk0PT9e7yg3uNo/s320/10621040_725712050832578_1313884621_n.jpg" width="320" /></a></div>
<b>Enjoy!<br />
</b><br />
You can also visit <a href="http://www.theyoump3.com/" rel="nofollow" target="_blank">TheYouMp3</a> for the same.<br />
<br />shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-46218419614883328122015-10-10T12:26:00.002+05:302015-10-26T19:58:23.988+05:30GOD MODE IN WINDOWS 10..!!<span class="main-article-info"></span><br />
<div style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;"><a href="http://thehackernews.com/2015/08/windows-10-download-features.html" target="_blank">Microsoft's Windows 10</a>,</span>
<span style="font-family: "Courier New",Courier,monospace;"> the latest version of Windows Operating System, has been creating waves
since it rolled out, and reached to 110 million devices within just 2
months.</span></div>
<div style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
</div>
<div style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;">If you are a long-time Windows user, you may remember a trick called, '<b>God Mode</b>'.</span></div>
<div style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
</div>
<div style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;">God Mode is an inbuilt, but hidden feature of Windows that provides additional customization options for the operating system.</span><br />
<span style="font-family: "Courier New",Courier,monospace;"></span><br />
<a name='more'></a></div>
<div style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
</div>
<div style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;">With Windows 10, all the
Settings of the operating system are kept under Settings App, and
categorized between System, Devices, Network & Internet,
Personalization, Update & Security, Privacy and more.</span></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;"><span class="main-article-info"></span></span><br />
<div style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;"><span class="main-article-info">Enabling God Mode, also known as <i>'Windows Master Control Panel Shortcut</i>', in Windows 10 essentially unlocks a backdoor of the OS to access 260+ additional settings from a single folder.</span></span></div>
<span style="font-family: "Courier New",Courier,monospace;"><span class="main-article-info">
</span></span>
<br />
<div style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;"><span class="main-article-info"><br /></span></span></div>
<span style="font-family: "Courier New",Courier,monospace;"><span class="main-article-info">
</span></span>
<br />
<h3 style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;"><span class="main-article-info">
How to Enable God Mode in Windows 10?</span></span></h3>
<span style="font-family: "Courier New",Courier,monospace;"><span class="main-article-info">
</span></span>
<div style="text-align: justify;">
<span style="font-family: "Courier New",Courier,monospace;"><span class="main-article-info"><br /></span></span></div>
<span style="font-family: "Courier New",Courier,monospace;"><span class="main-article-info">
<div style="text-align: justify;">
Follow the steps given below to enable the God Mode in your Windows 10:</div>
<ol style="text-align: left;">
<li>Create a new folder on your Windows desktop (New > Folder) and save it with the name: <u><b>GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}</b></u></li>
<li>The folder’s icon will change to an icon as of a Control Panel.
Double-click on the new icon to see your universal settings panel.</li>
<li>You can name the folder other than "GodMode"; before the Period (.).</li>
<li>Now, click the folder, open it and get god-like access to more than 260 functions and tools.</li>
</ol>
<div style="text-align: justify;">
Some functions are unique to Windows 10 while others are similar to the previous versions of Windows.</div>
<div style="text-align: justify;">
</div>
</span></span><br />
<h3>
<span style="font-family: "Courier New",Courier,monospace;"><span class="main-article-info"><div style="text-align: justify;">
<b>using God Mode...</b></div>
</span></span></h3>
<div id="aim22895744221319536417">
<div style="text-align: justify;">
You
can drag and drop any of the commands to your desktop in order to
create a shortcut for the command, but it will be pinned to the Start
screen.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The average user probably wouldn't use this feature.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
If you have already switched this feature ON, share your experience with us by hitting the comments below.<br />
<br />
<h4>
NOTE :- THIS TRICK CAN ALSO BE APPLIED TO THE LOWER VERSIONS OF WINDOWS LIKE WIN 8.1,8,7(NOT TESTED IN BELOW VERSIONS).. SO IF YOU ARE A LOWER VERSION VERSION WINDOWS USER USE THIS TRICK TO ACCESS "HARD TO FIND FEATURES" OF WINDOWS....</h4>
</div>
</div>
<span style="font-family: "Courier New",Courier,monospace;">
</span></div>
<span style="font-family: "Courier New",Courier,monospace;"><span class="main-article-info">
</span></span> shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0tag:blogger.com,1999:blog-8245236749442994051.post-13387593226017780602015-09-25T15:22:00.002+05:302015-10-26T19:58:13.630+05:30SINS OF CYBER SECURITY<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
<span style="font-family: "Courier New",Courier,monospace;">Criminals have taken the cyber route to steal from your wallets. Cyber crime has evolved in terms</span><br />
<span style="font-family: "Courier New",Courier,monospace;">of both nature and scope. Cyber security is inresponse mode and growing in significance. This blog focuses on sins of cyber security.</span><br />
<span style="font-family: "Courier New",Courier,monospace;"></span><br />
<a name='more'></a><br />
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
<span style="font-family: "Courier New",Courier,monospace;">>> The Information technology (IT) revolution has made it easier to communicate and</span><br />
<span style="font-family: "Courier New",Courier,monospace;">disseminate information over long distances and in real time. IT has entered into major</span><br />
<span style="font-family: "Courier New",Courier,monospace;">realms of a person’s life like education, occupation, commerce and entertainment. The</span><br />
<span style="font-family: "Courier New",Courier,monospace;">speed, convenience and efficiency associated with IT have made it the lifeline of most</span><br />
<span style="font-family: "Courier New",Courier,monospace;">organizations, government agencies, professionals and individuals. Whether you take a look</span><br />
<span style="font-family: "Courier New",Courier,monospace;">at banking and finance, energy, health care, utility services and communication, IT has</span><br />
<span style="font-family: "Courier New",Courier,monospace;">revolutionized every sphere of business activity and service delivery. The services sector, in</span><br />
<span style="font-family: "Courier New",Courier,monospace;">particular has been one of the major beneficiaries of the IT revolution. Banks now offer</span><br />
<span style="font-family: "Courier New",Courier,monospace;">multiple channels for interacting with their clients such as branch, Internet, mobile, phone and</span><br />
<span style="font-family: "Courier New",Courier,monospace;">teller machines which make financial products more attractive, and banking more convenient</span><br />
<span style="font-family: "Courier New",Courier,monospace;">for customers. In this case, banking industry customers are networked to their bank in one</span><br />
<span style="font-family: "Courier New",Courier,monospace;">way or another.</span><br />
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
<span style="font-family: "Courier New",Courier,monospace;">Cyber Security</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Information Technology and its significance in the business world have become</span><br />
<span style="font-family: "Courier New",Courier,monospace;">ubiquitous. Today’s business environment is comprised of service industries that are</span><br />
<span style="font-family: "Courier New",Courier,monospace;">completely dependent on their IT infrastructure. For example, the air traffic control</span><br />
<span style="font-family: "Courier New",Courier,monospace;">industry is critical to the “normal” functioning of airlines so any disruption in their “traffic</span><br />
<span style="font-family: "Courier New",Courier,monospace;">control systems” can cause errors that could result in accidents and could even lead to</span><br />
<span style="font-family: "Courier New",Courier,monospace;">loss of life. Conversely, a power breakdown resulting from a disruption in a company’s IT</span><br />
<span style="font-family: "Courier New",Courier,monospace;">infrastructure could bring all “operational” activities to a standstill.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">The explosive growth and dependence on Information Technology has also provided a</span><br />
<span style="font-family: "Courier New",Courier,monospace;">veritable breeding ground for cyber crime. Information Technology has made it easier for</span><br />
<span style="font-family: "Courier New",Courier,monospace;">unscrupulous entities to deceive, steal and harm others through cyberspace. The ease</span><br />
<span style="font-family: "Courier New",Courier,monospace;">with which these cybercrimes can be committed has raised concerns regarding</span><br />
<span style="font-family: "Courier New",Courier,monospace;">information confidentiality, integrity and availability. Therefore, the importance of cyber</span><br />
<span style="font-family: "Courier New",Courier,monospace;">security cannot be overstated. Cyber security involves protection of the data on all</span><br />
<span style="font-family: "Courier New",Courier,monospace;">computers and systems that interact with the Internet. It is possible to achieve this level</span><br />
<span style="font-family: "Courier New",Courier,monospace;">of protection by ensuring proper authentication and maintaining confidentiality, integrity</span><br />
<span style="font-family: "Courier New",Courier,monospace;">and access controls. In addition, non-repudiation of data is a crucial element of cyber</span><br />
<span style="font-family: "Courier New",Courier,monospace;">security.</span><br />
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
<span style="font-family: "Courier New",Courier,monospace;"> Vulnerabilities</span><br />
<span style="font-family: "Courier New",Courier,monospace;">The evolution of Cybercrime is evident when one examines how technologically advanced</span><br />
<span style="font-family: "Courier New",Courier,monospace;">the scope and nature of common attacks have become. Cybercriminals have a more</span><br />
<span style="font-family: "Courier New",Courier,monospace;">sophisticated modus operandi and purpose. Information can be stolen through social</span><br />
<span style="font-family: "Courier New",Courier,monospace;">engineering techniques like phishing, or via direct attacks, installing malware through</span><br />
<span style="font-family: "Courier New",Courier,monospace;">browser tools, ad-links, and key loggers among others. Cybercrime is steadily evolving into a</span><br />
<span style="font-family: "Courier New",Courier,monospace;">well-organized but still very illegal business activity. In spite of these advances, adherence to</span><br />
<span style="font-family: "Courier New",Courier,monospace;">a standard of IT Security fundamentals can facilitate appropriate handling of cyber threats.</span><br />
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
<span style="font-family: "Courier New",Courier,monospace;">i. Weak passwords</span><br />
<span style="font-family: "Courier New",Courier,monospace;">The most fundamental, but often overlooked premise of cyber security is strong</span><br />
<span style="font-family: "Courier New",Courier,monospace;">passwords. Many users still use insecure passwords.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Some of the insecure password practices include</span><br />
<span style="font-family: "Courier New",Courier,monospace;">a) Using all letters of same case,</span><br />
<span style="font-family: "Courier New",Courier,monospace;">b) Sequential numbers or letters,</span><br />
<span style="font-family: "Courier New",Courier,monospace;">c) Only numerals,</span><br />
<span style="font-family: "Courier New",Courier,monospace;">d) Less than eight-characters,</span><br />
<span style="font-family: "Courier New",Courier,monospace;">e) Predictable characters (such as name, date of birth, phone number)</span><br />
<span style="font-family: "Courier New",Courier,monospace;">f) Common passwords for different online accounts.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Now, the question is, “What makes users use predictable passwords irrespective</span><br />
<span style="font-family: "Courier New",Courier,monospace;">of perceived threats?” Consider the number of accounts that require a user to</span><br />
<span style="font-family: "Courier New",Courier,monospace;">“login,” throughout a user’s daily routine. Social networking sites, bank websites,</span><br />
<span style="font-family: "Courier New",Courier,monospace;">official web applications, databases and email ids.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Some of the reasons for using predictable and insecure passwords include:</span><br />
<span style="font-family: "Courier New",Courier,monospace;">a) Easy to remember</span><br />
<span style="font-family: "Courier New",Courier,monospace;">b) Lack of uniformity in password policy across websites.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">A strong password must be a combination of letters, numerals and special</span><br />
<span style="font-family: "Courier New",Courier,monospace;">characters and must not be less than eight characters long. A password should</span><br />
<span style="font-family: "Courier New",Courier,monospace;">not be predictable. Users must employ different passwords for each of their</span><br />
<span style="font-family: "Courier New",Courier,monospace;">individual online accounts.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">ii. Phished</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Do you respond to e-mails asking for account information? If your answer is,</span><br />
<span style="font-family: "Courier New",Courier,monospace;">“Yes.” then you are more likely [than not], to be a victim of a phishing scam.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Phishing is a common method of identity theft that utilizes fake e-mails which are</span><br />
<span style="font-family: "Courier New",Courier,monospace;">sent to customers to acquire sensitive user information.Example:</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Mr. “XYZ” has a savings account with Target bank. Last weekend, Mr. XYZ</span><br />
<span style="font-family: "Courier New",Courier,monospace;">received an e-mail from customersecurity@XXXbank.co.ZZ with a subject line,</span><br />
<span style="font-family: "Courier New",Courier,monospace;">”Update your XXX bank online access.”</span><br />
<span style="font-family: "Courier New",Courier,monospace;">The e-mail stated that the bank had recently upgraded its services and requested</span><br />
<span style="font-family: "Courier New",Courier,monospace;">that the recipient fill out a “Customer Update Form” on the link</span><br />
<span style="font-family: "Courier New",Courier,monospace;">http://www.XXXbank.com.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Since Mr. XYZ assumed that the email came from his own bank, he clicked on the</span><br />
<span style="font-family: "Courier New",Courier,monospace;">provided link. The link took him to a website which appeared to be identical to</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Target bank’s website. Mr. XYZ filled out the web form containing personal</span><br />
<span style="font-family: "Courier New",Courier,monospace;">information as well as authentication details, which the “Customer Update Form”</span><br />
<span style="font-family: "Courier New",Courier,monospace;">required.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">A day later, when he logged on to his online account at</span><br />
<span style="font-family: "Courier New",Courier,monospace;">https://www.XXXbank.com, he was shocked to find that all the funds in his</span><br />
<span style="font-family: "Courier New",Courier,monospace;">account had been drained.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Mr. XYZ was the victim of a simple phishing scam. Let’s review some basic details</span><br />
<span style="font-family: "Courier New",Courier,monospace;">that Mr. XYZ missed in the email. First, the mail did not address him by his name;</span><br />
<span style="font-family: "Courier New",Courier,monospace;">instead, it used “Dear Customer”. Second, the email id ended with “co.uk”, while</span><br />
<span style="font-family: "Courier New",Courier,monospace;">ideally it should have ended with “.com.” Third, the link, “http://targetbank.com”</span><br />
<span style="font-family: "Courier New",Courier,monospace;">lead to a fake site www.malicious.ie/userdetails.asp. Finaly, banks usually do not</span><br />
<span style="font-family: "Courier New",Courier,monospace;">ask customers to reveal “access details” through email.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">This is the type of example that can be shared with an employee while training</span><br />
<span style="font-family: "Courier New",Courier,monospace;">them not to respond to or click on links provided in a “suspicious e-mail.”</span><br />
<span style="font-family: "Courier New",Courier,monospace;">iii. Lack of data back up</span><br />
<span style="font-family: "Courier New",Courier,monospace;">A user can lose data in events such as hardware or software failure, a virus</span><br />
<span style="font-family: "Courier New",Courier,monospace;">attack, file corruption, accidental file deletion, application failure, damage of</span><br />
<span style="font-family: "Courier New",Courier,monospace;">partition structure, or even damage due to power failure. Appropriate data backup</span><br />
<span style="font-family: "Courier New",Courier,monospace;">procedures allow a user to restore data in times of crisis. There are many ways to</span><br />
<span style="font-family: "Courier New",Courier,monospace;">backup data such as storing it on CD or DVDs drives, thumb drives, and external</span><br />
<span style="font-family: "Courier New",Courier,monospace;">hard disks. Users can create a complete system backup by using a disk image1.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Another secure way to back up data is to employ an online backup service whose</span><br />
<span style="font-family: "Courier New",Courier,monospace;">main business function is to host uploading and downloading of files as well as file</span><br />
<span style="font-family: "Courier New",Courier,monospace;">compression and encryption. The basic premise behind backing up data is to</span><br />
<span style="font-family: "Courier New",Courier,monospace;">make “backed up” data available for later use. Depending upon the changes in</span><br />
<span style="font-family: "Courier New",Courier,monospace;">data, a user may schedule backup activity on an hourly, daily or weekly basis.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Users can make use of backup options available on a backup utility to verify that</span><br />
<span style="font-family: "Courier New",Courier,monospace;">all data is properly copied A disk image is a complete sector‐by‐sector copy of the device and replicates its structure and contentsIt is not uncommon to “back up your back up” by creating multiple copies of data,</span><br />
<span style="font-family: "Courier New",Courier,monospace;">so that in case one backup copy is damaged, another copy could be used. Data,</span><br />
<span style="font-family: "Courier New",Courier,monospace;">which has been backed up, must be adequately protected from malware, Trojans</span><br />
<span style="font-family: "Courier New",Courier,monospace;">or other cyber threats by using anti-virus solutions and regular updates. Another</span><br />
<span style="font-family: "Courier New",Courier,monospace;">process, which can prove to be valuable, is to store a copy of data at an offsite</span><br />
<span style="font-family: "Courier New",Courier,monospace;">location to safeguard data from any disaster at current premises. While recovering</span><br />
<span style="font-family: "Courier New",Courier,monospace;">backup files, it is a good idea to have a data recovery software in place to retrieve</span><br />
<span style="font-family: "Courier New",Courier,monospace;">files from external hard drives.</span><br />
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
<span style="font-family: "Courier New",Courier,monospace;">Insecure Internet Browsing</span><br />
<span style="font-family: "Courier New",Courier,monospace;">A Web browser is the gateway to the Internet and is one of the most widely</span><br />
<span style="font-family: "Courier New",Courier,monospace;">utilized applications. Web browsers are embedded with scripts, applets, plugins</span><br />
<span style="font-family: "Courier New",Courier,monospace;">and Active X controls. However, these features can be used by hackers to infect</span><br />
<span style="font-family: "Courier New",Courier,monospace;">unprotected computers with a virus or malicious code. For example, web browsers</span><br />
<span style="font-family: "Courier New",Courier,monospace;">allow plugins like a flash viewer to extend functionality. Hackers may create</span><br />
<span style="font-family: "Courier New",Courier,monospace;">malicious flash video clips and embed them in web pages. Vulnerabilities in a</span><br />
<span style="font-family: "Courier New",Courier,monospace;">web browser can compromise the security of a system and its information. To</span><br />
<span style="font-family: "Courier New",Courier,monospace;">control security threats, a user may:</span><br />
<span style="font-family: "Courier New",Courier,monospace;">a. Disable active scripting in the web browser</span><br />
<span style="font-family: "Courier New",Courier,monospace;">b. Add risky sites encountered under restricted sites zone</span><br />
<span style="font-family: "Courier New",Courier,monospace;">c. Keep Web browser security level at medium for trusted sites and high for</span><br />
<span style="font-family: "Courier New",Courier,monospace;">restricted sites</span><br />
<span style="font-family: "Courier New",Courier,monospace;">d. Uncheck the AutoComplete password storage feature in AutoComplete</span><br />
<span style="font-family: "Courier New",Courier,monospace;">e. Avoid downloading free games and applications as they may have in-built</span><br />
<span style="font-family: "Courier New",Courier,monospace;">spyware and malware</span><br />
<span style="font-family: "Courier New",Courier,monospace;">f. Use anti-spyware solutions</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Cyber threats that originate as the result of web browser vulnerabilities, can be</span><br />
<span style="font-family: "Courier New",Courier,monospace;">controlled by using the latest versions of the web browser software, or by installing</span><br />
<span style="font-family: "Courier New",Courier,monospace;">updates and configuring settings to disable applets, scripts, plugins and Active X</span><br />
<span style="font-family: "Courier New",Courier,monospace;">controls.</span><br />
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
<span style="font-family: "Courier New",Courier,monospace;"> Use of pirated software</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Do you use pirated operating systems and/or software?</span><br />
<span style="font-family: "Courier New",Courier,monospace;">If your answer is, “Yes.” then you are more likely [than not], to be vulnerable to</span><br />
<span style="font-family: "Courier New",Courier,monospace;">cyber-attacks.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">The ease of availability and often low cost of pirated software can entice users to</span><br />
<span style="font-family: "Courier New",Courier,monospace;">install pirated software on their computers. However, pirated software may not</span><br />
<span style="font-family: "Courier New",Courier,monospace;">have the same configuration strength that is available with “genuine software.” The</span><br />
<span style="font-family: "Courier New",Courier,monospace;">threat to individuals and companies from the risk of privacy, identity or data</span><br />
<span style="font-family: "Courier New",Courier,monospace;">protection breaches and the exposure of financial implications in the cyber space</span><br />
<span style="font-family: "Courier New",Courier,monospace;">make the purchase of “genuine software,” a must.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Pirated software may be used to harvest Trojans and viruses in computer systems</span><br />
<span style="font-family: "Courier New",Courier,monospace;">and since the software is “unsupported” the user is deprived of technical support.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Another downside is that software updates are not available to those who have</span><br />
<span style="font-family: "Courier New",Courier,monospace;">installed pirated software. We purchase software for its functionality and pirated</span><br />
<span style="font-family: "Courier New",Courier,monospace;">software may lead to frequent interruptions and has even been documented to</span><br />
<span style="font-family: "Courier New",Courier,monospace;">cause damage to your hard disk. Users who purchase and install genuine software</span><br />
<span style="font-family: "Courier New",Courier,monospace;">products will benefit from technical support, product updates, un-interrupted</span><br />
<span style="font-family: "Courier New",Courier,monospace;">services and in the long run; cost savings.</span><br />
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
<span style="font-family: "Courier New",Courier,monospace;"> Misuse of Portable storage devices.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">The last few years have seen an increased usage of portable storage devices.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">These devices have brought improvements in working practices, but they also</span><br />
<span style="font-family: "Courier New",Courier,monospace;">pose a threat to data via theft or leakage. These devices have high storage</span><br />
<span style="font-family: "Courier New",Courier,monospace;">capacity and can easily be connected to other devices and/or to network</span><br />
<span style="font-family: "Courier New",Courier,monospace;">resources. Users can use portable storage devices to download software,</span><br />
<span style="font-family: "Courier New",Courier,monospace;">applications and data by connecting to official networks. Portable storage devices</span><br />
<span style="font-family: "Courier New",Courier,monospace;">may also be used to download privileged business information and sensitive</span><br />
<span style="font-family: "Courier New",Courier,monospace;">customer information. Organizations can restrict the use of portable storage</span><br />
<span style="font-family: "Courier New",Courier,monospace;">devices to selected users or selected set of devices.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">“The loss or theft of portable devices can lead to loss or</span><br />
<span style="font-family: "Courier New",Courier,monospace;">“leakage” of sensitive business and/or user information. “</span><br />
<span style="font-family: "Courier New",Courier,monospace;">An example:</span><br />
<span style="font-family: "Courier New",Courier,monospace;">In 2007, a leading provider of a Security Certification lost a laptop containing</span><br />
<span style="font-family: "Courier New",Courier,monospace;">names, addresses, social security numbers, telephone numbers, dates of birth and</span><br />
<span style="font-family: "Courier New",Courier,monospace;">salary records of employees. In this case, the sensitive business information could</span><br />
<span style="font-family: "Courier New",Courier,monospace;">have been encrypted to protect data from leakage, even if the device was stolen.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">vii. Lack of proper encryption</span><br />
<span style="font-family: "Courier New",Courier,monospace;">If a user does not have the proper network security practices in place, they are</span><br />
<span style="font-family: "Courier New",Courier,monospace;">essentially inviting malicious entities to attach their system. Whether a system is a</span><br />
<span style="font-family: "Courier New",Courier,monospace;">wired or wireless network it is crucial for the proper security safe guards to be in</span><br />
<span style="font-family: "Courier New",Courier,monospace;">place to assure safe operations while the computer is active in a live session oninclude:</span><br />
<span style="font-family: "Courier New",Courier,monospace;">a. Unauthorized access to files and data</span><br />
<span style="font-family: "Courier New",Courier,monospace;">b. Attackers may capture website traffic, user id and passwords,</span><br />
<span style="font-family: "Courier New",Courier,monospace;">c. Attackers may inject a software to log user key strokes and steal</span><br />
<span style="font-family: "Courier New",Courier,monospace;">sensitive information</span><br />
<span style="font-family: "Courier New",Courier,monospace;">d. Unauthorized access to corporate network. (In the event that the</span><br />
<span style="font-family: "Courier New",Courier,monospace;">user’s network is connected to a corporate network.)</span><br />
<span style="font-family: "Courier New",Courier,monospace;">e. A users IP address could be compromised and unauthorized users</span><br />
<span style="font-family: "Courier New",Courier,monospace;">may use it for illegal transactions. (User network may be used to</span><br />
<span style="font-family: "Courier New",Courier,monospace;">launch spam and virus attacks on other users.)</span><br />
<span style="font-family: "Courier New",Courier,monospace;">A network can be secured by using proper encryption protocols. Network</span><br />
<span style="font-family: "Courier New",Courier,monospace;">encryption involves the application of cryptographic services on the network</span><br />
<span style="font-family: "Courier New",Courier,monospace;">transfer layer, which exists between the data link level and the application level.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Data is encrypted during its transition from the data link level to the application</span><br />
<span style="font-family: "Courier New",Courier,monospace;">level. Wired networks use Internet Protocol Security, while Wireless Encryption</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Protocol is used to encrypt wireless networks.</span><br />
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
<span style="font-family: "Courier New",Courier,monospace;">Lack of regular updates</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Cyber threats are always on the horizon. New versions and updates of security</span><br />
<span style="font-family: "Courier New",Courier,monospace;">products are released on a regular basis with enhanced security features to guard</span><br />
<span style="font-family: "Courier New",Courier,monospace;">against latest threats. A user can make use of recommended practices to improve</span><br />
<span style="font-family: "Courier New",Courier,monospace;">defense against cyber-attacks. Users may also keep track of latest versions of</span><br />
<span style="font-family: "Courier New",Courier,monospace;">software to improve performance. Since some software developers only issue</span><br />
<span style="font-family: "Courier New",Courier,monospace;">updates for the latest versions of their software, a user that is using an older</span><br />
<span style="font-family: "Courier New",Courier,monospace;">version, may not benefit from the latest updates. One of the crucial ways to reduce</span><br />
<span style="font-family: "Courier New",Courier,monospace;">vulnerabilities is to regularly update the system’s network security devices and</span><br />
<span style="font-family: "Courier New",Courier,monospace;">related software.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">ix. Using Wireless Hotspots</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Wireless users often look for convenient ways to gain Internet access, and public</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Wi-Fi hotspots provide quick, easy and free access to the Internet. What can be</span><br />
<span style="font-family: "Courier New",Courier,monospace;">more convenient than that? A resourceful wireless user can find Wi-Fi access</span><br />
<span style="font-family: "Courier New",Courier,monospace;">points at public places such as Cyber café’s, universities, offices, airports, railway</span><br />
<span style="font-family: "Courier New",Courier,monospace;">stations and hotels. However, these Wi-Fi hotspots may be insecure. Some of the</span><br />
<span style="font-family: "Courier New",Courier,monospace;">risks involved in connecting to Wi-Fi hotspots include:</span><br />
<span style="font-family: "Courier New",Courier,monospace;">a. Users may be required to use the ISP that is hosting the Internet access for</span><br />
<span style="font-family: "Courier New",Courier,monospace;">the business that is creating a particular access point. Not all ISPs provide</span><br />
<span style="font-family: "Courier New",Courier,monospace;">secure SMTP for sending e-mail. In other words, it is possible that any e-mail</span><br />
<span style="font-family: "Courier New",Courier,monospace;">that is sent and received by users via a “random” hot spot could be</span><br />
<span style="font-family: "Courier New",Courier,monospace;">intercepted by other users sharing the same hot spot. (All users in the same</span><br />
<span style="font-family: "Courier New",Courier,monospace;">hot spot are sharing the same network.)</span><br />
<span style="font-family: "Courier New",Courier,monospace;">b. If a user’s wireless card is set to ad-hoc mode, other users can connect</span><br />
<span style="font-family: "Courier New",Courier,monospace;">directly.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">c. If the access point does not use encryption technology like WEP, other users</span><br />
<span style="font-family: "Courier New",Courier,monospace;">with a Wi-Fi card could intercept and read the username, passwords, and any</span><br />
<span style="font-family: "Courier New",Courier,monospace;">other information transmitted by a user.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">While using public access points it is safe to use secure websites protected by the</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Secure Sockets Layer. Using infrastructure mode is safer than ad-hoc mode as it</span><br />
<span style="font-family: "Courier New",Courier,monospace;">uses access controls to connect to network. A Virtual Private Network (VPN) is a</span><br />
<span style="font-family: "Courier New",Courier,monospace;">secure way for a user to connect with their company network. (VPN creates secure</span><br />
<span style="font-family: "Courier New",Courier,monospace;">access to private network over public connections.)</span><br />
<span style="font-family: "Courier New",Courier,monospace;"><br /></span>
<span style="font-family: "Courier New",Courier,monospace;">Lack of awareness/ proper training</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Internet and wireless technologies have revolutionized the daily routine of users.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">With the aid of this new technology, users can conduct transactions, access bank</span><br />
<span style="font-family: "Courier New",Courier,monospace;">accounts and reserve airline tickets in few minutes. The downside of this new</span><br />
<span style="font-family: "Courier New",Courier,monospace;">technology is that there are also incidents of data breach and transaction frauds.</span><br />
<span style="font-family: "Courier New",Courier,monospace;">Cyber security is becoming an issue of major concern. However, users can avoid</span><br />
<span style="font-family: "Courier New",Courier,monospace;">most of the risks by employing simple precautions. (Lack of awareness is a major</span><br />
<span style="font-family: "Courier New",Courier,monospace;">hurdle in the safe use of the cyberspace.) Selection of weak passwords is one of</span><br />
<span style="font-family: "Courier New",Courier,monospace;">the most fundamental errors committed by users. Unaware users are tempted to</span><br />
<span style="font-family: "Courier New",Courier,monospace;">reveal authentication details through phishing. Inadequate firewall protection, lack</span><br />
<span style="font-family: "Courier New",Courier,monospace;">of regular software updates can make systems vulnerable to cyber threats. Users</span><br />
<span style="font-family: "Courier New",Courier,monospace;">may take precautions by adhering to cyber security tips given on websites of</span><br />
<span style="font-family: "Courier New",Courier,monospace;">banks, regulatory organization, security product developers, and information</span><br />
<span style="font-family: "Courier New",Courier,monospace;">security departments such as US-CERT. Organizations can create awareness</span><br />
<span style="font-family: "Courier New",Courier,monospace;">among employees through regularly scheduled meetings, training programs and</span><br />
<span style="font-family: "Courier New",Courier,monospace;">workshops.</span>shubham swarnkarhttp://www.blogger.com/profile/11711438745512767401noreply@blogger.com0