- Restart laptop or Remove battery
- Uninstall unwanted software
- More desktop files to any folder or drive
- Run disk clean up and delete temporary files
- Run disk defragment
- Avoid running two graphic related program
- Remove newly installed software or hardware
- Check overheating, fan & dust
- Check with another RAM
- Check with another HDD
- Check motherboard's North bridge and South bridge they may be overheated.
Saturday, September 29, 2018
LAPTOP/DESKTOP HANGING ISSUE & HOW TO SOLVE THIS ISSUES
Friday, September 7, 2018
ATM (AUTOMATED TELLER MACHINE) | TYPES OF ATM | HARDWARE & SOFTWARE USED IN ATM

ATM machines are installed to offer the maximum comfort of making a safe and secure transaction. There are different types of ATMs that you can find in around. Here are the types of ATMs described in details.
- On-site ATMs : These are the ATM machines that you can find within the branches builder or premises. They are installed inside the branch premises to offer withdrawal as well as many other bank related transactions without going inside the branch.
- Off-site ATMs : This kind of ATMs can be seen in a separate building or location other than the branch but more or less within the areas of the bank branch.
- Worksite ATMs : These are the ATMs which are installed either by the bank or by an individual employer or an organization owner for the use of the employees of that establishment or the customers.
- Cash Dispenser ATMs : This type of ATMs is used for withdrawing cash balance inquiry, cash dispensing and mini statement printing.
- Mobile ATMs : As the name implies this kind of ATM machines moves from one place to another, usually on a van. Few private banks in the country offer such ATM facility for the customers.

- Brown Label ATMs : These are the ATMs where hardware and lease of the machine are owned by a different service provider although cash management and connectivity to the bank network is offered by the sponsoring bank. ATM has logo of the outsourced service provider. example "Indicash" by TATA .
- White label ATMs : Such ATMs are provided by the Non-Banking Financial company (NBFC). There is no logo on these types of ATMs.
- Green label ATMs : These ATMs are designed to support transactions related to Agriculture
- Orange label ATMs : This types of ATMs machines is meant for exclusive share Transactions.
- Yellow label ATMs : These ATMs are provided to support E-commerce Transactions.
- Pink label ATMs : These ATMs are exclusively meant for use by women.
Hardware and Software used in ATM
- CPU (Central processing unit) - It is used to control users interface & transaction devices.
- Magnetic or chip card reader - It is used to identify credit/debit card of the customer.
- EPP4 (Electronic PIN Pad version 4) - It is similar to touch tone or calculator keypad.
- Display - It is used by customer for performing transaction.
- Record printer - This is generally thermal printer and is used to record the customer transaction.
- Vault- It stores the cash cartridges.
- Housing - It is the external aesthetics and outer body of ATM.
- Sensors - These are security, thermal and gas sensors with led indicators

WHAT IS REMOTE ACCESS & BENEFITS OR DRAWBACK OF REMOTE ACCESS?

Benefits of Remote Access- Remote access services provides several benefits to organizations.
- It allows IT administrators to get access of servers from anywhere ant time in case of any service or server failure using a dedicated Internet connection.
- Organizations can allow administrator to work from home.
- Organizations can save cost by allowing users to bring their own devices at work (BY OD - Bring Your Own Device). They will connect to the organization securely using remote access tools, like; VPN (Virtual Private Network).
- No more administrator are required to sit in data centers to manage the physical servers.
- It also improves working efficiency of IT administrator to manage servers remotely.

- Administrator should make sure only required ports are open in external firewall to prevent ant vulnerabilities.
- Administrator should limit the user rights on servers for his team and only authorized persons can access critical servers.
- Administrator should use a secure VPN server to prevent any kind of unwanted access.
- Administrator should define a secure hardening to secure them.
Wednesday, September 5, 2018
HACKERS Vs. CRACKERS
As we have seen in the beginning of the article, hackers are not necessarily bad. In fact, While Hat hackers or Ethical Hackers use their skills constructively. On the contrary, Black Hat Hacker or Cracker are usually outlaws hacking systems specifically with criminal intent. We can further distinguish the two groups based on their knowledge, skill level and purpose.
- Hackers usually have a better understanding of computer systems and possess extensive knowledge of different computer languages like C, C++, HTML, Perl, Python and Java. However, most crackers are not skilled enough in programming languages.
- Hackers use their skills constructively, creating software programs or improving existing systems. Crackers are often unable to create their own software due to their lack of knowledge, and often rely on automated programs and modify existing software created by others.
- Hackers pursue the noble cause of finding and fixing security breaches, while crackers break into systems either for personal gain, to show off skills or to harm others.
- Hackers act with legal consent of the target system, and as such have much control over their action. However, crackers break the law knowingly and need to watch out for their actions continuously.
Subscribe to:
Comments (Atom)
