Wednesday, August 29, 2018

HOW TO CREATE BOOTABLE PENDRIVE ?

1) Insert USB flash drive into a computer.
2) open command prompt window as a administrator.


3) Diskpart

4) List disk

5) Select disk 1

6) Clean

7) Create partition primary

8) Format quick

9) Active

10) Assign

Tuesday, August 28, 2018

SOME BASIC WINDOWS COMMANDS |


  1. MSINFO32 - Full PC information.
  2. DXDIAG - Graphics inforamtion
  3. WINVER - OS inforamtion
  4. NCPA.CPL - Open LAN connection
  5. DISKMGMT.MSC - Disk management
  6. DEVMGMT.MSC - Device manager
  7. MMC - Consol Root
  8. COMPMGMT.MSC - Computer management
  9. %TEMP% - Temporary files
  10. GPEDIT.MSC - Local group policy editor
  11. REDEDIT - To open registry editor
  12. MSRA - To open remote assistance
  13. MSTSC - To open remote desktop connection
  14. APPWIZ.CPL - To open program and feature
  15. CONTROL - To open control panel
  16. TASKMGR -  To open task manager
  17. LUSRMGR.MSC - To open local user and group
  18. EVENTVWR - To open event viewer
  19. MAGNIFY - To open magnifier
  20. NARRATOR - To open narrator
  21. FIREWALL.CPL - To open firewall
  22. SECPOL.MSC - To open security policy
  23. GPUPDATE - To update group policy 
  24. DEFRAG - To open disk defragement.
  25. CHKDSK - Check volumes.

Monday, August 27, 2018

WHAT IS TCP/IP? HOW TCP/IP WORKS ?

TCP(Transmission control protocol)/IP(Internet protocol) is the basic communication  language or protocol of the Internet. It can also be used as a communication protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provide with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.

TCP/IP is a two-layer program. The higher layer, Transmission control protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even through some packets from the same message are routed differently than others, they'll be reassembled at the destination.


TCP/IP uses the client/server model of communication in which a computer uses (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) inn the network to another point or host computer. TCP/IP and the higher-level application that use is are collectively said to be "stateless" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. its connection remains in place until all packets in a message have been received.
   

Saturday, August 25, 2018

WHAT IS INTRUSION DETECTION SYSTEM & TYPES OF IDS |

Intrusion detection system which works for a computer system and network to make them secure by attacks of many of many types of viruses which may destroy them. To secure information systems and to maintain them in that condition only is a very difficult task. The operational constraints are a system to secure the system but, it also sometimes fails to do that job. So, the work of Intrusion detection system(IDS) is to detect the insecure states of systems by monitoring them. The IDS system is used to detect the misuse done by the user of the information system; they also check the abuse done for the privileges.

In 1981, many Intrusion detection prototypes have been created by Denning. From all prototypes, only 59 of them have been listed by soberly. An information system is free of security flaws that are why the Intrusion detection system emerges in the computer security area. It is very difficult and costly to make your computer system not to be susceptible to attacks because there may be any mistake done in manufacturing or at the time of origin of the computer system.


An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network.

IDS comes in a variety of  "flavors" and approach the goal of detecting suspicious traffic in different ways. There are two types of IDS
  •  Network bases (NIDS)
  • Host based (HIDS) 
NETWORK BASED (NIDS)


Network Intrusion detection system are placed at a strategic point or point within the network to monitor traffic to and from all devices on the network. Ideally you would scan all inbound and outbound traffic, however doing so might create a bottleneck that would impair the overall speed of the network. The image shows the working concept of NIDS, all the network traffic (for hosts A, B and C) passes through NIDS.

HOST BASED (HIDS)


Host Intrusion Detection system are run on individual hosts or devices on the network. A HIDS monitors the inbound and outbound packets from the devices only and will alert the user or administrator of suspicious activity is detected. Host based IDS works on either of following 2 concepts, they are,
  • Signature based - A signature based IDS will monitor packets on the network and compare them against a database of signature or attributes from known malicious threats. This is similar to the way most antivirus software software detects malware. The issue is that there will be a lag between a new threat being discovered in the wild and the signature for detecting that threat being applies to your IDS. During that lag time your IDS would be unable to detect the new threat.
  • Anomaly based - An IDS which a anomaly based will monitor network traffic and compare it against an established baseline. The baseline will identify what is "normal" for that network- what sort of bandwidth is generally used. what protocols are used. what ports and devices generally connect to each other- and alert the administrator or user when traffic is detected which is anomalous, or significantly different, than the baseline.

       TYPES OF IDS
  • PASSIVE IDS - A passive IDS simply detects and alerts. When suspicious or malicious traffic is detected an alert is generated and sent to the administrator or user and it is up to them to take action to block the activity or respond in some way.                                                                                                                                                                                                                                           

  • REACTIVE IDS - A reactive IDS will not only detect suspicious or malicious traffic and alert the administrator, but will take pre-defined proactive actions to respond to the threat. Typically this means blocking any further network traffic from the source IP address user.                                                                                                                                                                                   
  • SNORT - One of the most well known and widely used intrusion detection systems is the open source, freely available snort. It is available for a number of platforms and operating systems including both Linux, Windows. Snort has a large and loyal following and there are many resources available on the Internet where you can acquire signature too implement to detect the latest threats. For other freeware intrusion detection applications you can visit free IDS software on Google.







Wednesday, August 22, 2018

NEW Mi POCO F1 | NEW Mi POCO F1 SPECIFICATION & HOW TO BUY?

Mi new phone "POCO F1" which is going to launch on 29th August on official website of MI India.


Qualcomm® Snapdragon™ 845 Flagship processor with AIE 845 POCO F1 runs on the Qualcomm® Snapdragon™ 845 mobile platform, meaning you get Snapdragon's powerful AI engine on their most advanced flagship 10nm class chip. Enjoy unbeatable performance and lower power consumption.
LiquidCool Technology Sustained peak performance to keep the CPU of POCO F1 fast and cool with our LiquidCool Technology, usually reserved for hardcore gaming smartphones.No matter how intensely you're gaming, the cooled Snapdragon 845 has no problem keeping up its peak performance andhigh frequency output. Say goodbye to slow response time and frozen screens, this phone stays faster than fast.


The 4000mAh (typ) high-capacity battery has the endurance to keep your phone going as you game,watch videos, snap pictures and more without a second thought. It provides enough power for 30 hours of calling or 146 hours of audio playback on a single charge.Supports Quick Charge 3.0.Drained battery. Fast charging rapidly replenishes power.



12MP + 5MP rear camera with AI dual camera with dual pixel autofocus instant autofocus even in dark camera. 20MP high-res front camera capture incredible selfies. This is Lighter, Faster and Smoother. IR face unlock equipped with an infrared light sensor and infrared camera, face unlocking is instant and secure even in the dark. Ports are type-C charging port, the POCO F1 comes with a 3.5mm audio port that is sorely missed in modern flagship phones. Listen to music and gaming audio while charging your phone at the same time.


Better screen display System-level full screen gestures allow for an intuitive experience on the 18.7:9 edge to edge display. The internationally renowned Corning® Gorilla® Glass is highly resistant to wear and tear, so POCO F1 is built to last. The price is expected to be around 20,999 Indian rupees

Friday, August 17, 2018

HACKERS ATTACK ANDROID STORAGE SYSTEM | MAN-IN-THE-DISK ATTACK | HOW MAN-IN-THE-DISK ATTACK WORK |

"MAN-IN-THE-DISK" is a new attack technique it takes advantage of storage protocols in third party applications in order to crash a victim's Android mobile device.The "Man-in-the-Disk" attack surface allows a hacker to interfere with an android app's data stored in external storage, the operating system’s type of storage typically used to share data between applications for instance a messenger using a photo from a camera app.



The "Man-in-the-Disk" attack works because of two reasons. First any app can tamper with another app's External Storage data. Second because almost all apps ask for this permission, users are generally willing to give it and unaware of any security risks. This can be abused to install another app in the background without the user’s knowledge and further whatever privileges the attacked app has, the bad code can gain access to all of those privileges for its own purposes.

Thursday, August 16, 2018

HOW TO PROVIDE SECURITY OVER A NETWORK?

1) Use strong password is a combination of letters, numbers, and symbols that is not a word or common phrase.
2) Do not install free software on the internet these software often great security risk.
3) Operation system up to date.
4) Firewall enable
5) Antivirus up to date.
6) Use only secure site.
7) Use encryption on your wireless access points (AP).
8) Encrypt Your Drive or Folders.
9) Turn off remote access-related features.
10) Shut down risky services.

Tuesday, August 14, 2018

TAKE JIO PHONE 2 QUICKLY| JIO PHONE 2 SPECIFICATION & HOW TO BUY?

I will be taking about jio new phone "JIO Phone 2" which is going to launch tomorrow on 15th august on myjio app and the official website of Jio. Specifications 2.4 QVGA screen, qwerty keypad, 512MB ram and 4GB storage with 128 GB expandable SD card option with whatsapp, Facebook, and Youtube pre-installed Battery Capacity 2000mAh. The price is expected to be around 2999 Indian rupees.


Monday, August 13, 2018

INTEL LAUNCH 9TH GENERATION CORE i9

Intel launch 9th generation core i9 as early as October. The Intel Core i9-9900K will have eight cores and 16 threads. The Core i9-9900K will be the first mainstream desktop processor to use the Core i9 brand. Intel notably launched the Core i9-8950HK as the first Core i9 processor for notebooks. The upcoming chip is said to include 16MB of L3 cache and Intel's UHD 620 graphics.
The clock speeds are something to check out here, we are going to get 3.6 GHz base clock out of the box and a 5.0 GHz boost clocks in single and dual core operations. 4 core boost is rated at 4.8 GHz while 6/8 core boost is rated at 4.7 GHz. This is the highest frequency we have seen on an 8 core part across all cores. All of this is done under a 95W package so we can expect some hefty cooling solutions to go along with this chip.Multiple motherboard vendors have confirmed that upcoming 9000-series of Intel processors will be compatible with existing Z3xx series motherboards. However, Intel is also expected to launch a new top-end Z390 platform controller along with its new 8-core desktop CPU. 

NETWORK TOPOLOGY

Network topology is the arrangement of the various elements {link nodes, etc.} of a computer network. Essentially it is the topological structure of a network and may be depicted physically or logically. Topologies are divided into two types one is physical topology and another id logical topology.

Physical topology is the placement of the various components of a network including devices location and cable installation while logical topology illustrates how data flow within a network, regardless of its physical design. There are 6 different types of physical topologies.

BUS TOPOLOGY - Bus topology is a network where all the nodes are connected with each other with a single common cable. When one node wants to access another node on the network then it puts a message addressed to that device on the bus.

RING TOPOLOGY - When each device is serially connected in a closed ring pattern with a single cable then the network system is called ring topology. As a train crosses all the platforms to reach its destination, ring topology does the same to pass a message from one node to another node.

STAR TOPOLOGY - In this configuration all nodes are connected Hub with separated cables. Here the central node or hub acts like the main server and the other nodes which are connected to the central node, act like client devices.

MESH TOPOLOGY - Here each and every network is interconnected with each other. It works independently. 

TREE TOPOLOGY - A tree topology looks like the branches of the tree where each and every nodes are connected with its parent's node. It is also called by the name star+bus topology. 


HYBRID TOPOLOGY - hybrid topology is the combination of two or more different network topologies. This network is a mixture of both peer-to-peer and client-server network. It can be either wired or wireless network.

Sunday, August 12, 2018

GOOGLE WIFI

Google Wifi has become something of a poster child for the new wave of home networking systems that do away with routers and Wi-Fi extenders and instead rely on multiple Wi-Fi points. These “mesh” systems make it easier than ever to get reliable Wi-Fi coverage over a large area.


It’s not the fastest option out there, but for pure simplicity and ease of use, it’s certainly worth a look, especially if you find it discountedGoogle is pushing the Wifi as a standalone replacement for existing routers. Most mesh systems of this sort can work with just one wifi point, but as individual routers go they’re not the fastest or most feature-rich, so would seldom be our first choice. That’s also the case with the Google wifi. As such, it’s the two-node pack that I’m reviewing and would recommend you consider.

On the underside is the power socket, which is a Type-C USB port, along with two gigabit Ethernet ports. These are designed so that one is for WAN (your connection to the internet or your modem) and one for LAN (for other wired devices within your home).The WAN port can be used for wired backhaul. Wired backhaul effectively means you won’t be wasting half your Wi-Fi bandwidth with your nodes talking to one another; all the inter-node communication will instead be done other Ethernet. Plug the node into the end of the cable and it will seamlessly continue your Wi-Fi network. This is great if you have large distances to cover (adding Wi-Fi to a garage or workshop, for example), and effectively allows you to extend your network in a way that won’t result in slower speeds in far-away places.

SAMSUNG WIRELESS CHARGER DUO

The wireless charger duo, a charging pad that enable the user to change both of them simultaneously, whilst also being able to use the phone in its inclined dock. The Samsung wireless charger duo has now been listed in the US, just after galaxy note 9. The charging pad available in Black and White colour variants. The wireless charger duo, equipped with Qi charging technology, has been priced Rs. 8000 to Rs. 8500. The wireless charger duo is compatible with most samsung galaxy smartphones and also compatible other phones like iphone 8, iphone 8 plus, and iphone x. It's comes with support for up to 7.5W fast charge wireless charging output, and a built-in fan to keep the charger cool for efficient charging speeds.

Saturday, August 11, 2018

5 Gadgets That Every Student Needs


1) Amazon kindle paperwhite-  There is nothing back-busting as the first week of the class book-buying ritual when you  have to lug dozen of books from the campus store back to your dorm room. Forget the heavy lifting and pick up a kindle paperwhite which can store all the books you will need for the semester at a mere 7-ishounces, with highlighting and note-tacking features the paperwhite is a great study buddy too.



2) HP sprocket photo printerSmartphone may be replacing point-and-shoot cameras but does not mean printed images are obsolete photo printers like the HP sprocket turn your smartphone snaps into tangible glossies for decorating your room or hanging on a fridge hp sprocket is light and portable enough to toss in your bag and you can peel the back off to turn your photo into a sticker as well.


3) Mophie powerstation mini- Whether you were using your phone to film video for a project or listen to spotify at the library you can never have enough power. mophie power station mini packs an additional 3,000 mAh battery which is the size of the battery found in smartphones like the Galaxy S8. That should be more than enough power to get you through the day and it is slim enough to discreetly stash in a backpack or purse.
4) Roku Streaming Stick - Apple, Amazon, Roku and Google, there are plenty of options if you want to cut the cord. But Roku’s streaming stick is affordable dead simple to use and offers a wide variety of a channels. It plugs into your TV’s HDMI port and works with a remote control meaning you won’t have to keep your smartphone nearby in order to stream content as you would with a chromecast.
5) Ultimate Ears Wonder boom- After a long week of hitting the books, it is great to chill out on the campus quad soaking up the sun with some of your favorite tunes. The UE Wonder boom is a great way to enjoy your music while you were out and about complete with a clipuits given that it’s waterproof, buoyant and shock-resistant. that will attach to your backpack or purse. It is also great for pursuits, given that it’s waterproof, buoyant and shock-resistant.




Warning over satellite security bugs..

Satellite systems used on aircraft, ships and by the military contain bugs that could hackers take control of the a security researcher has warned.....




The worst bugs could let attackers overcharges satellite antenna to damage the equipment or harm operators and other could be used to betray the exact location of military forces in crisis zones the researcher said. IoActive which found the bugs said  it was working with manufactures to harden devices against attack.


TYPES OF NETWORKING DEVICES

1) NIC- NIC stand for network interface card. It is indeed a circuit board or a card that is installed in a computer so that it can be connected to a network. The network interface card provides the computer with a dedicated, full-time connection to a network. Personal computer and workstations on a local area network(LAN) typically contain a network interface card specifically designed for the LAN transmission technology.

2) REPEATER- Repeater is a network device, which used to regenerate or replicate a signal. It removes the unwanted noice in an incoming signal. Unlike an analog signal, the original signal, even if weak or distorted, can be clearly perceived and restored. With analog transmission signal are re-strengthened with amplifiers which unfortunately also amplify noise as well as information.
3) HUB- Basically a hub is a common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contain multiple ports. When a packet arrives at one port it is copied to the other ports so that all segments of the LAN can see all packets.

4) BRIDGE- Bridge devices inspect incoming network traffic and determine whether to forward or discard it according to its intended destination. An Ethernet bridge for example, inspects each incoming Ethernet frame-including the source and destination MAC addresses, and sometimes the frame size in making individual forwarding decisions.

5) SWITCH- Switch is a very common types of networking device that channels coming data from any of multiple input ports to the specific output port that will take the data toward, its intended destination in a telecommunications network. In the traditional circuit-switched telephone network one or more switch are used to set up a dedicated communication through temporary connection or circuit for data exchange between two or more network devices. On an Ethernet LAN the switch determines from the physical devices like MAC address in each incoming message frame which output port to forward it to and cut of. In an internet a switch determines from the IP address in each packet, and the output port of switch is connected to the next part of the intended destination.


6) GATEWAY- A gateway is a network node which connects two network in different protocols. Gateway can take a several forms including routers or computers and can perform a variety of tasks.

7) ROUTER- Router is one of the most used networking devices used to sharing internet connection between two devices. The operating of router is complicate as it can be both software and hardware and operate at layer 3 of OSI model.

8) MODEM- MODEM stands for modulator-demodulator. A modem is a device or program that enables a computer to transmit data over. Computer information is stored digitally whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms analog to digital and vice versa.