Posts

Showing posts from November, 2014

What is a Blended Threat ?

" Blended threat is a kind of vulnerable attack, worse than DDOS attack, merges out multiple aspects of malwares into a single attack, in order to breach your system security and to disrupt your system or network performance." A Blended threat is a very complicated attack that merges out the worst aspects of Trojan horse, virus, worm and malicious code together or in a single threat. Blended threats use server and Internet vulnerabilities in order to spread from one place to another. Blended threats harms an infected system or a network. Blended threats can transmit from multiple methods and can be coming from multiple points. Blended threats also exploit vulnerabilities. Blended threats are more dangerous than DOS attack , because they also create a backdoor in your system or network and can damage your system or entire network. Blended threats can transport itself using multiple methods like using e-mails, IRCs and through file sha

How to download from torrent when it is blocked ?

Usually torrent is keep blocked in schools, colleges and offices to restrict the downloading by students and employees, so that they can not download movies, games, videos, softwares and so on, through torrent. The only solution of this problem is PROXY . You can download anything from torrent after applying the proxy. You will never caught by your network administrator. So we will learn now, How to download from torrent when it is blocked ? You need to follow given few steps to start downloading from torrent. Step 1. First of all download the software (freegate) to access any torrent related website like kickass torrent, to make an online proxy to access this website if it is blocked. You can learn it in our previous post. To download freegate Click here . Step 2. Now open torrent and goto Preferences tab. Step 3. Now goto connection link a

Specifications for Business Men

Businessmen might use a computer's configurations up to a limited extent, but below specifications are best suited to these people. Specifications Processor: Minimum Dual core or if core i3 III rd generation is more affordable or cost effective then you can choose core i3 generations, however dual core is best suited to you. RAM: 4GB with 32-bit processor. Cache memory: More than 5 MB if available, otherwise less then 5MB will do for you. Brand: Top most Brand Graphics memory: If you are a game freak then choose more than 2GB internal graphics memory if available with laptop or computer, otherwise built-in memory with processor will do for you. Internal storage: If you store more data then, 500GB will do for you. you can leave comments in order to further quries, keep learning from computerflicks. Please leave comments.

Specifications for General purpose computer students or DCA students or people

The below configurations are only for those people or students who are not regular user but they like to watch movies , run few softwares or even game and love to chat on socail media. Specifications Processor: Minimum Dual core or if core i3 III rd generation is more affordable or cost effective then you can choose core i3 generations, however dual core is best suited to you. RAM: 2GB with 32-bit processor . Cache memory: More than 5 MB if available, otherwise less then 5MB will do for you. Brand: Top most Brand Graphics memory: If you are a game freak then choose more than 2GB internal graphics memory if available, otherwise built-in memory with processor will do for you. Internal storage: If you store more data then, 500GB will do for you.

Specifications for other Engineering Students or engineers

The below configurations are only for other trades engineers or students instead computer (including Mechanical, civil, electronics and other), just because these people use PCs for general use or might be they run Auto CAD software on it. They too want best PC performance, the below specifications can full fill their requirements easily. Specifications Processor: Minimum Dual core or if core i3 III rd generation is more affordable or cost effective then you can choose core i3 generations. RAM: 2GB or 4GB with 32-bit processor Cache memory: More than 10 MB if available, otherwise less then 10MB will do for you. Brand: Top most Brand Graphics memory: If you are a game freak then choose more than 2GB internal graphics memory if available, otherwise built-in memory with processor will do for you. Internal storage: If you store more data then at least 1TB if available, otherwise 500GB w

Specifications for Computer System Engineers and Students

The below configurations are only for computer engineers or students (including software engineer, tester and even a network engineer or relevant), just because these people use their PC at its maximum level by running some heavy softwares like Metlab, visual studio, java virtual machine or other client server program and except it they do a lot with their PC more than a general user. They also want best PC performance, so below specifications are best suited to you.. Specifications Processor: Minimum core i3 III rd generation or maximum always choose latest processor in the market. RAM: 4GB with 32-bit processor and more than 6GB RAM with 64-bit processor . Cache memory: More than 10 MB if available, otherwise 10MB will do for you. Brand: Top most Brand Graphics memory: More than 2GB internal graphics memory if available, otherwise 1.5 GB will do for you. Internal storage: At least

What are x86 and x64 based processors ?

People always confuse between both x86 and x64 based processors. In this tutorial you will learn about them, because I am going to clear your confusion. So basically a processor may be of two types. 1. x86 based processor 2. x64 based processor x86 based processors x86 based processor means they have backward compatibility with 8086, 80286, 80386 and 80486 processors, therefore named with x86, pronounced as (EX-86), where 86 is the suffix of above previous processors and also means that all those program who has the capability to run on 8086 to 80486 will also run on x86 based processors. x86 based processors are also known as 32-bit processors, which is a very common term among people. Its called 32-bit because this processor contains 32-bit registers, integer size, 32-bit wide data bus, address bus and even word size. A 32-bit processor means it can handle or directly access 2 32 byte data = 4 Gigabytes or 4GB at a t

What are dual core, core i3, core i5 and core i7 processors?

From the beginning of processors they have developed a lot. Modern processors has more capability, storage power and even operating or processing power. So what are dual core, core i3, core i5 and core i7 processors , we will learn in this post. After Pentium 4, processors are developed rapidly, and eventually Intel introduced multi core processor family in the market. A Dual core processor introduced by Intel, has two processor cores in a single package arranged in parallel, along with individual core operating clock frequency. Because they has two cores multi processing and multi-tasking has improved a lot in order to increase processing power of the CPU. However it was just the beginning of multi core to introduce a better performance with in efficient timing. Later on core i3 introduced by Intel. Core i3 is a processor which also has two cores, however these cores are logically divided as three core processing power, or three times faster and processing p

What are Shared, VPS and Dedicated hosting ?

Different types of hosting services are provided by the different hosting vendors (Hostgator, Godaddy, Bigrocks) that are shared, VPS and dedicated services, which fulfills your needs. Its all up to you what service is better for you. So lets have a look in brief what are Shared, VPS and Dedicated hostings ? It will help you to choose right hosting service to you, so that you can get a right direction. Shared Hosting In shared hosting all server (where you site is hosting) resources are shared among all websites running on the same server. Where Server resources means CPU cycles, RAM slots and most important thing is bandwidth of the network, keep common among all the sites on the server which are chosen to get shared hosting services. Shared hosting is a cheep service and you can choose a plan while hosting using this service. If you have a website with less traffic you can choose it. But if you have a massive traffic on

How to access blocked internet and blocked websites ?

Usually internet or web surfing and downloading is blocked in your schools, colleges and offices to restrict the use of internet by students and employees, so that they can not download or surf internet to different purposes. Sometimes some particular websites like facebook, Gmail, movies and software downloadinng websites are banned by the network administrator to resist the opening of website in the offices, colleges and schools. You can only open some allowed website to complete company's or your college work. The only solution of this problem is PROXY . You can access internet even all restricted websites without any fear. You will never caught by your network administrator. So we will learn now How to access blocked internet and websites? If you are encountering this kind of problem you need not to worry that how to solve it ? We will solve this problem by a proxy software. There

Meaning of ping, Ip config, Trace-rt and netstat commands in Networking.

In the field of networking, sometimes some basic commands are very necessary to keep in mind because they help us to Know a lot of things like how to get the Ip address of a URL?, How to check that there is a connection established between client and server ?, How to trace the route of packets or get the IP address of the routers through your packet is coming ?, How to know your IP and MAC address ? and How to get the IP address of any system connected in a LAN (Local Area Network) ? So let me explain each of them one by one in this post. PING PING stands for Packet Internet Gopher and it is a utility software of windows operating system and often used to check the connection establishment between your PC and server e.g, it may your ISP's (Internet Service Provider) Server, if you are unable to use Internet while using broadband service you can ping your ISP server to get the connection. Basically it is used to estab

How to remotely access desktop without team-viewer?

If you want to access your friends or office desktop without any third party software. You can do this easily by using windows operating system built-in software utility named Remote Desktop Connection . To do so you need to follow the given steps and before them a little bit setup. SETUP : Goto to your system properties and select Remote settings in the left side bar. Now it will pop up a window named system property , in Remote Assistance section click and check the Allow Remote Assistance connections to this computer , box. In Remote Desktop section click on the Allow remote connections to this computer option and eventually click on apply and OK. Do the same setting on the other computer. Now you're going to learn How to remotely access desktop without team-viewer?. Step 1. Goto start menu by pressing windows key on your desktop and type remote desktop connection , after getting the option in your sea

What is 127.0.0.1 ?

" 127.0.0.1 is a reserved IP address also known as localhost. It is a loopback address means you request as a client from your computer to itself and then your computer replies as a server to you. So called loopback address. " 127.0.0.1 means localhost i,e your own computer. It is also called a loopback address because it is an address which requests from your system and also replies to you from your system, means when you request something your system works as a client and then it replies to you like a server. It is a reserved class A IP address. Every system on this earth is a local host i,e 127.0.0.1 . The sentence is famous for 127.0.0.1 that there is no place like 127.0.0.1. And it is very true for me. It is used in web application testing by software programmers or by testers. It is also play a very nice role when you apply proxies from your system. If you are a computer freak like me then you can get this very easily and wisely.

What is IP address?

Image
IP Address " IP address is a unique address used to uniquely identify your location or your computer over the massive Internet. So that data packets can be delivered to you without any confusion." An IP address is an acronym of Internet Protocol used to assign a unique address to each node or computer to be Identify uniquely on the massive Internet. It is similar to your home address through which you get posts, couriers, and other things easily. Similarly, you get all the requested data only on your computer with the help of an IP address. An IP address is a 32-bit address which is divided into two parts i.e. host ID and Net ID e.g, 10.30.35.89 is an IP address. There are Five Classes in Class-based IP addressing like: Class A: 1 - 127 Class B: 128 - 191 Class C: 192 - 223 Class D: 224 - 239 Class E: 23 9 - 255 There are two types of IP address e.g, 1. Static IP address 2. Dynamic IP address Static IP address A static IP

What is a firewall?

Firewall is a security software which helps you to restrict unauthorized access from the outside world and filters out all packets passing through it and allow them to enter or exit. Firewall can restrict all ports on your network or on your system to prevent the unauthorized access that are attempted by a hacker or intruder. Firewall also restrict the inbound and outbound calls means you can restrict user to use Internet by applying some policies on the outbound calls, similarly you can restrict an anonymous user not to access your network from the rest of the world by just applying some policies on inbounds calls. Firewall protect your network a lot so that your network or intranet remain safe from the outside world. My recommendations to you that always keep ON your firewall it will also safe you from trojan horse malware attacks. There are two types of firewall e.g, 1. Software level firewall 2. Hardware level firewall Software level fire

What is Virtual Private Network (VPN) ?

VPN stands for Virtual Private Network and is a way to extend private network across public network i,e Internet. VPN is a way to securely connect to your remote private network i,e Intranet with the help of a secure and encrypted tunnel or channel. VPN basically, provides a secure way to connect two or more geographically distant locations or offices in such a way that they seems connected directly. VPN creates a secure tunnel over the public network i,e Internet to communicate. VPN is also an alternative of leased line networks, but provides effectiveness and security more than leased line networks. Use of VPNs 1. VPNs usually used by business companies, offices and university campuses to connect its different campuses or branches , so that they can share information and data securely without the interrupt of any other user except an authorized user. 2. You can also use VPN as a proxy server to hide your identity over the Inter

What is IPv6 address?

IPv6 is an abbreviation of Internet Protocol version 6, and created to overcome the problem of IPv4 crisis. IPv6 is 128-bit hexadecimal address and especially designed to assign billions of IP addresses and has the capability or a huge pool to assign IP address to devices on every 6 inches on the earth. This version of IP address was designed to keep one thing in mind that almost every device is about to being an IP device means Smart phones, Set top box, Computers, Routers and so forth. They all are working on IP addresses and needs an IP address to work. For Instance fe80::3db3:f139:1c08:899b%12 is an IPv6 address. If you want to check out your IPv6 address then follow the simple steps: Step 1. Open CMD and then type ipconfig Step 2. Your IPv6 address would appear below your IPv4 address. So we have learned now, What is IPv6 addresses? And uses of IPv6 address , keep learning from computerflicks. Please l

What is IPv4 address?

Image
What is an IP V4 address? IPv4 address is an acronym of Internet Protocol Version 4, was created to overcome the massive problem of IP address crisis. Once there was a time in which all IP address had been assigned to the nodes on the Internet. So a solution had to take place to overcome the crisis, then version 4 came into existence with millions of new IP addresses and a new concept of classes. IPv4 addresses are divided into 5 classes i.e. A, B, C, D, E. The addresses of class A, B, C and are used but class E addresses are reserved for future use. Class D addresses are used in broadcasting. IPv4 address is a 32-bit address which is divided into two parts i.e. host ID and Net ID e.g, 10.30.35.89 is an IP address. Because of classes, a person had to buy a class means if a person has 1200 members in his company and he wants to buy IP addresses to them in order to assign an IP address to each node in his network. Then he had to buy a class but class A contains

What is a Reseller Hosting?

Image
"Reseller hosting is a hosting service provided by hosting organizations like Hostgator in order to start your own web hosting service business without having a server, Internet, and bandwidth." Reseller hosting is a kind of hosting in which you rent out a portion of the web hosting server by a hosting service provider or a hosting service firm. After starting this service you can become a web hosting service provider and can rent out a portion of bandwidth and resources for your end-users and can earn money easily. Reseller Hosting packages, usually provide an individual control panel for each end-user. Why use the Reseller Hosting service? If you are an entrepreneur and going to start your own hosting services so it would be a good move to do so because it is relatively cheap, probably a few dollars a month and you don't have to desperate about the maintenance of the server at all. Pros and Cons As I said above it i

What is SSD ?

Image
" SSD is an acronym of Solid State Drives, an alternate of HDD (Hard Disk Drives), more powerful, reliable, and faster than HDD. SSD are next-generation secondary storage drives" SSD OR Solid State Drives SSD stands for Solid State Drives , a new technology taking place in the market. They simply are EEPROM circuits integrated on a very small chip. They are the replacement of HDD (Hard Disk Drives). SSD is more powerful, fast, and efficient as compared to the Hard disk drive, they can store more data than HDD and also reliable than HDD. SSD doesn't contain any movable parts therefore more long-lasting and reliable. SSD is like your flash USB drives because they also are EEPROM circuits bundled together on a very small chip, however, SSD is more effective and efficient than USB flash drives . Which gives it more data access read and write speed. The only thing which is not good about SSD is, it is costlier than HDD. However, it doesn't mat

Brute force attack or Brute forcing

Brute force attack is a very dangerous attack in which an intruder or a hacker try different types of code or password combinations to bypass your security most often your password. It is a very common and a well known attack among hackers groups, and can be achieved easily by means of some particular softwares e.g, hydra. If your password is not strong enough, it can bypassed easily by using brute force attack. Therefore I told you to create a strong password. If your are still not aware that how to create a strong password then read my previous post to create a strong password, and make your password strong right now before its too late. How does this attack works? This attack was simply created to keep one thing in mind that every password on this earth contains digits, alphabets and some special characters. In a brute force attack a hacker uses the combination of digits, alphabets, dictionary and special characters, explicitly or using softwa

What is SSL (Secure Socket Layer) ?

" SSL an acronym of Secure Socket Layer, is an encryption protocol, used to encrypt your data between you and server so that no body can hack your sensitive data. Can be recognized easily by its green padlock symbol with https protocol." SSL stands for Secure Sockets Layer is a security tunnel or protocol used to secure data between two machines through which you can communicate securely, and also ensures you that your credentials will be secure from the rest of the world by encrypting it with a strong algorithm. SSL certified means a website or a web application is entirely secure and certified by the genuine community which providing certification. You can easily check a website SSL certification in the URL bar contains two things a padlock and https protocol. A green color symbol with named SSL shows the certification genuineness. When you click on it you can see the certificate. High level security terns the URL bar into green color

What is XSS (Cross Site Script) ?

XSS is an abbreviation of Cross Site Scripting , is a kind of security attack which uses dynamically generated web page technology to exploit. XSS gets the benefit of genuine user account to send malicious code or script on to the server by hiding it in its legitimate requests. In XSS attack an intruder creates an account on a dynamic website to become an unsuspected user of the site, after getting the permission to sign in or sign out he or she uses some malicious script and send it to the server in its request to target the vulnerabilities, after getting accomplishment he/she can poison cookies, steal user's profile, expose SSL connection and can crash down the server. XSS attacks are created by using JavaScript, VBScript, HTML, Perl, C++ and so forth. How to prevent XSS attacks in order to save yourself? In order to keep your application protected from XSS attack don't allow some tags like <applet>,<script> and

What is CSRF (Cross Site Request Forgery) attack ?

CSRF is a short term for Cross Site Request Forgery and pronounced as "SEE-Surf", is a sort of attack in which a hacker or an intruder hijacks a person's session to steal his credentials in order to use his identity to send malicious code on to the server through that person's credentials. Unlike from XSS attack in CSRF attack an intruder uses another person's account instead itself. We can also say that CSRF attack is an extension of XSS attack. In CSRF attack intruders hacks our cookies and use those who are still valid to exploit. How to prevent CSRF attacks in order to save yourself? In order to keep your application protected from CSRF attack generate a new session Id and assign it to the user on every request. Always assign an expiry to your cookies in order to save the user's session hijacking. So we have learned now, What is CSRF (Cross Site Request Forgery) attack? And how to prevent the

What is DoS and DDoS attack?

"DoS is a brief for Denial Of Services, is an attack used to crash or slow down a server or default gateway to down entire network on its feet. In DoS attack server keeps very busy by sending it multiple requests, so that it deny all the services providing by it for its users. DDoS is Distributed form of DoS attack, so called DDos. " DoS is an acronym of Denial Of Services . It is an attack used to break down a server or a network. When this attack assaults on a server, it keeps the server busy by sending request continuously and simultaneously from a single or multiple point, on each request the server respond to the requesting client which keeps the server very busy and then the server entirely deny to use any service in the network. So entire network breaks down because of this attack and the consequences might be server crash. All in all server does deny all the services in the network. The first DoS attack is used and creat

What is Anti virus or Anti malware?

" Anti virus or Anti malware is a software program, used to catch unwanted softwares from your system which are trying to disrupt your security, stealing your data and slowing down your system performance, in order to provide you and your system a good and real time protection. Because they are the counter part of virus and malware, so called Anti virus and Anti malware respectively." An anti virus or anti malware is a program or a software, which is used to catch viruses or other malwres respectively from your PC, who are messing up and disrupting your computer performance, stealing your data and spying on you. Anti virus or Anti malwares are designed using foot print technology which works very smartly in order to catch malwares by inspecting them footprints. A virus or a malware can enter into your system via any mean for instance malware comes into your system by emails, pen drives and by vulgar sites. Some times your inte

Mobile Internal Storage

" Mobile Internal Storage is a way to store your data and apps in your smart-phones. Usually they are flash memories. Mobile storage comes in different storage capacities like 2GB, 4GB, 8GB, 16GB and now 32GB also coming with smart-phones." Internal storage in smart-phones is a very essential factor, because it stores all your apps and data.This storage is always a kind of ROM i.e. called EEPROM or flash memory. Nowadays new modern apps growing in size and most of the people want to keep lots of personal data like audio, video files, games, movies and data in their mobile phones. So if you want to keep or store lots of data in your mobile phone then you must buy 8 GB or 16 GB according to your requirements. If you're a heavy graphics game freak then I will suggest you to 16GB or more storage. If you don't need to keep lots of data then never buy such a big storage, 2 GB or 4GB will do for you. If you don't keep movies, fi

Smart phone battery back up and mAh

"Battery back up means its mAh, which is a unit of battery consumption in an hour, so if you choose more mAh then you will get more back up. If you use your smart-phone all the time then choose battery backup according to your requirements with more or appropriate mAh." Battery back up Nowadays smart phones consumes battery more than traditional mobile phone, just because they have become an Smart phone which has an LCD and IPS LCD screens needs more power than traditional screens, they also have more RAM and multi core processors to manages more apps which also needs power and they also have Internet facilities to run Internet in a better way than traditional. So all these factors needs battery power and because of smart phone slimness, battery has also integrated. Now you have more power in a small battery. The only thing matters in smart-phone's battery is its mAh (Milli Ampere Hour), more mAh will provide you more batte

Mobile phone or smart phone processors

"Mobile processor is a component of your smart-phone used to perform different operations like calculations, execution of your apps and data. They also comes in various processing speed with multiple cores e.g, dual core, quad core , hexa and octa core. Operates on different operating frequencies like 1.2 GHz and 1400 MHz." Processor Processor, a most important factor to your mobile phone, because it perform all calculations and processing to you. Now the question is what processor is good to you. So lets read about them and then decided which one is good. There are several kind of processors has taken place in smart-phones they all are the best because of lots of reasons, like dual core (with two processor cores), quad core (processor with two cores but logically performs as four cores), hexa core (processor with two cores but logically performs as six cores) and octa core (processor with two cores but logically performs as ei

What are SD, SDHC and SDXC memory cards?

"SD cards is a short for Secure Digital and also comes in High Capacity and Extended Capacity in order to store data in a wide range of storage space, so called SDHC and SDXC. A kind of flash memory fabricated on a wafer or a chip with integrated ROM circuits, with various class, data transfer rate and access speed." SD cards SD cards stands for Secure Digital cards, are a kind of non volatile memory fabricated on a thin wafer with integrated circuits also known as flash memory, which deletes data using electrical pulses. SD cards used in digital cameras, mobile phones and set top boxes to store images and data respectively. SD cards comes in different size like mini SD cards and micro SD cards. SD cards also introduced in different classes like class 4, class 6 and class 10. Class 10 is considered good in SD cards because it transfer data upto 10 MBPS speed. SD cards can store data from 128 MB to 2 GB. SDHC car

Smart phone External Storage

"External storage is an extraordinary feature of smart-phones or other mobile phones, which lets you to extend your memory upto a limited extent, but vary in speed and access performance as compare to internal storage except class 10 SD cards." External Storage Smart-phone external storage is a considerable thing which can not be underestimated by you while buying an smart-phone. If you're buying an smart phone with lack of internal storage and want to extend it later by means of SD cards then I will not suggest you to do so. I will suggest you to buy an Smart-phone which suites your requirements with internal storage because if you extend your memory then you will also keep your apps and data into SD cards, and if you don't know about SD cards then 95% you will buy an external card with low level class which vary in data access speed as compare to internal storage. Which can be a cause to degrade your smart-phone performance. So

Mobile RAM

"RAM stands for Random Access Memory which lets your device to access data in an efficient and fast manner, so that your device processor doesn't need to wait for data to its execution and doesn't go idle. Data is access randomly from RAM, so called Random Access Memory." RAM (Random Access Memory) RAM is an essential thing to you and your smart-phone and plays an important role in order to speed up data access. The common job of RAM is to load your operating system and your installed apps on it, untill your smarty phone is switched ON, so that your processor can get data instantly in order to speed up your device. Now this is the common factor you must know, I mean to say that if you want to keep hundreds of apps in your smart phone and you just have 128 MB or 512 MB RAM then this is not enough to you, you need more capacity RAM. It is likewise that you want to keep a laptop in your jeans pocket. So if you want to keep mor

What is Keylogging?

" Keylogging is a spyware trick used by intruders to keep an eye on your daily activities like your credentials, websites visited by you and thereafter dispatched to the intruders through emails. " Keylogging is a trick used in security breach by hackers. People always entrap in keylogging because they don't know what is going on, in their background process. In key logging snap shots of your activities and keystrokes or keys pressed by you also stored in a record or database and finally dispatched to the person or intruder who messed up with your system. It stores data in a well format so that anybody can get it. It captures your credentials like user name and password or bank account details and eventually send it to the intruder as you connect to the Internet. Now, suppose if you are doing online payments or checking your bank details online, your password is directly passing to the intruders. Now you can guess how much it can harm yo

What is cookie?

" Cookie is a small file and an efficient way in order to store your information on your browser to reduce server's overheads. Every time you request for a website or web page, a stored cookie of that site is also sent with request to recognize you. Technically it is used to store your information and to recognize you as a returning user." Cookie is a small file which stores your information on your browser. Cookies are the efficient way of storing information on to the user's or client's system, so that a user could recognize itself as a returning user. A cookie might be design in different ways or for various purposes according to the website programmer requirements, like if a website only require your browser information and your IP address to count your visit on their site then through programming that website will store a cookie on your browser, which will tell the server every time you visit the site, that you're a

What is Social Engineering?

What is Social Engineering? " Social Engineering is a hacker's trick, used to extract useful information like credentials from someone's mouth on their will, and someone's personal data by observing some particular actions done by them in their day to day life, so called Social Engineering." Apart from Engineering social engineering is a trick used by a hacker or an intruder to extract information from your mouth on your own will and use this information to breach your securities like your passwords and user names or credentials. With the help of social Engineering you can extract information from your friends or other people by casual or friendly gossips , and by observing some data by their posts on social networking sites or from their worldly expressions and so forth. For an instance sometimes you share your post on Facebook that Hey, guys this is my daughter Anna's birthday. So if somebody watch yo

Computer's abbreviations and relevant full forms

Computer's abbreviations and relevant full forms A APPLE   ->   Ariane Passenger Payload Experiment ALU   ->   Arithmetic Logic Unit ASP   ->   Active Server Page AJAX   ->   Asynchronous JavaScript and XML ASYNC   ->   Asynchronous ALGOL    ->   Algorithmic Language AI    ->   Artificial Intelligence ADC    ->   Analog To Digital Converter ASCII    ->   American Standard Code For Information Interchange ATM    ->   Automatic Teller Machine B BIOS    ->   Basic Input Output System BASIC    ->   Beginner's All-Purpose Symbolic Instruction Code BSNL    ->   Bharat Sanchar Nigham Limited C CD    ->   Compact Disk CD ROM    ->   Compact Disk Read Only Memory CD RW    ->   Compact Disk Read and Write CAD    ->   Co