Posts

Google Panda update

Image
Panda Demystified There are several updates released by Google to ensure, only quality content website come up in searches, and websites having bad links or low quality content must be removed from searches or demote so, that people could not get these sites under top searches. Regarding the same concern, Google released a new algorithm in February 2011, named Panda update. Totally concerned about to rank those sites higher, having quality content, and demote those sites having less quality content or part of content farming. It was about to give priority for those sites which are authorized or registered. This update was related to Google’s search engine, and to maintain the ranking system of Google. One major problem was, there is no way to catch content infringes or scrapers.  In some cases, a few scrapers stole content from a non-registered site and make it's own and took copyright on their name, and got ranking in Google. It was a shortcoming of this algorithm. La...

Ransomware

Image
It seems that this is the time to get back on security and protections, where we left off earlier. So, sit back tight and buckle up. A new malware just hitting desktop computers in more than 70 countries and spreading itself quickly, got name ransomware as per it’s working. Let’s plunge into malware bay. What is ransomware? Ransomware is a kind of malware, which encrypts your important data e.g., images, PPTs, and documents, and sometimes encrypt your entire hard disk or SSD , thereafter it locks down your PC, files and asks you to visit a given site to pay ransom amount or buy bitcoins (a form of digital currency). It pops up a message on your computer that, “ if you don’t pay the ransom amount your data would be encrypted, and you would not be able to regain access on your PC or files until you pay ransom amount or buy bitcoins ”. Most of the people pay ransom amount because most of the time, data is more important than ransom amount. And especially in the case, when you are t...

Google Penguin Update

Image
What is the Google Penguin Update? Google penguin is an algorithm or mechanism, which is designed and released by Google in April 24, 2012 to check those websites which are violating Google SEO policies (these policies are pre-defined as webmaster guidelines). Google released penguin version 1.0 and then later, updated versions came in turn, which basically identifies spam sites, to maintain its website ranking system in a genuine manner, and to reduce the search of inefficient content to provide you the best contents or genuine search results. What does it do? Let’s plunge into penguin update. Google penguin check those websites, being searched through google search engines, and verify that, these sites are as per Google webmaster guidelines and not violating any policies, which helps in maintaining Google ranking for bad content and sites having bad links. This update also categorizes websites into a black hat or grey hat SEO habits. It finds unnecessary links or paid links pointi...

RAID Technology

Image
What is RAID Technology? RAID stands for redundant array of independent disks. Raid technology is generally used for upgrading the performance of the disk, hence leading to high storage capacity. The logic behind RAID technology is that the disk or the drive components are arranged in the form of the array where the data is distributed in each array but it is considered as a single disk by the system. Small disks are combined together to form a large storage device. The way how disks are organized into arrays refers to the term RAID levels. ORGANIZATION OF RAID STORAGE    The organization of the data into independent disk or array can be done through a few methods: striping, mirroring, parity, or combining all of them. Here we discuss these methods in brief. STRIPING : In this technique data is split-ted across various disk available. Data is spread across two or more disks and hence when necessary it is combined and read as single disk data. RAID 0 is formed through ...

What is NAS ?

Image
NAS Or  Network Attached Storage NAS is a brief form of Network Attached Storage , it is a network device basically, which is used to store and backup your data in a network. It is a device that works on RAID technology and backs up your data without your day to day intervention. NAS is a good option for your home and small businesses or at the places where you don’t have lots of data storage and backup requirements. NAS is just a network device with multiple hard disk support, you can insert multiple hard disks to increase your storage and backup capacity, thereafter you can access and share your data from anywhere within a network, except that you can also create cloud storage to access it publicly when you are not at your home. NAS basically does centralize file management in a very efficient manner and provides an additional data security layer to your files and data by using some encryption techniques. It is not affected by viruses because it is just external storage ap...

What is HS2(Hotspot 2.0)

HS2 stands for Hotspot 2.0 which is an advanced version of Hotspot, mainly designed to give more control over peers. Security of this version enhanced a lot as compare to previous version. It is also known as Wi-Fi CERTIFIED PASSPOINT. It works on 802.11 u standard protocol and WPA2 encryption standard, which is a strong encryption standard. It has more bandwidth as compare to the previous version, which offers more Internet speed to download and upload or to surf internet for other purposes. This is mainly designed to connect with hotspots at airport, railway or metro stations, Coffee Shops, libraries and public areas. It ensures that you will surf internet securely at these places without worrying about malicious users. It does not require additional sign up information and authentication process. As a Hotspot 2.0 device comes under the range it automatically connects to the network without sing up and authentication. It is discovered by WI-FI alliances, to ease WI-FI services ...

Concepts of Subnetting

Subnetting is a technique used in order to divide a network into subnetworks, so that all of the networks could mange easily and if a network fails then it will not affect on the other networks. When we do subnetting a concept of subnet mask is used in order to divide a network into subnetworks. So we will learn that how do we create subnetworks by using subnet mask. For instance if we use 192.77.50.0 which is a class C IP address so here we need class C subnet mask 255.255.255.0 . So it depends on the numbers of the subnetworks we have to create means if we have to create 2 subnetworks then we will borrow a bit from third octate of the subnet mask. We can easily calculate no. of bits to create desired no. of networks with the help of 2 n , where n is no of bits. So we will borrow 1 bit because 2 1 = 2. Believe me it is very easy. Let me show you how do we do that. IP address:        192.77.50.0 Subnet mask:    ...