Monday, 22 February 2021

Wish coupon Code

wish.com coupons code & Deals 

Wish.com Promos: Save 50% w/ Feb. 2021 Coupons & Deals

💰 Look what I found on Wish! I'm giving you CA$7 off your first purchase with code: 

ckptltzw

Tuesday, 1 March 2016

Streaming vs. progressive download : Understanding the difference


One of the most frequently asked questions about delivering video online is – “What’s the difference between streaming video and progressive download?” As a user clicking a video link on a website, you will not often know which delivery method is being used, unless you do some poking around. Although the end result may look the same to the end user, streaming and progressive download are very different delivery methods, each with their own strengths and weaknesses. Here we will take a look at the two delivery methods and help you to decide which will work best for you.

Delivering a file via HTTP:

  • Delivery of a file over HTTP is normally referred to as ‘progressive download’ or ‘http streaming’.
  •  In reality, it is not streaming at all but a very simple bulk download of a video file to the end user’s computer.
  •  A temporary copy of the video file is then stored on the local computer so that the viewer can watch the file over and over without having to download the file each time.

  • Let’s assume you have a video file encoded at 500kbps.
  •  The server delivering the file does not know or care that your video file is encoded at 500kbps; 
  • it simply pushes data to the host machine as quickly as it can. This can sometimes give the illusion that the file is being streamed because playback can start as soon as enough of the file is available on the local machine.
  •  This obviously restricts the users from skipping to parts of the file that have not yet been downloaded.
If the bandwidth available to the machine downloading the file is smaller than the encoded bit-rate there may be a wait before the file will start to play. For example, on a 56kbps dial-up modem, trying to play a file that is encoded at 500kbps you may have to wait a fairly long time before enough of the file has been downloaded for it to start playing. On a 500kbps internet connect, or faster, playback should start almost immediately and the file should download faster than it will play, meaning that playback will not have to stop because not enough data has been downloaded.
HTTP(Hypertext transport protocol) operates over TCP(Transport control protocol) which controls the actual transport of the packets over the network. TCP is optimized for guarantee of delivery, regardless of file format or size. If a packet is skipped during the transfer of a file, it will request a resend of that packet. Resend requests take time and bandwidth and could increase the load on the server. TCP is not designed for efficient real time delivery or careful bandwidth control, but for accurate and reliable delivery of every bit.

Delivering from a streaming server:

Effectively, a streaming server is a piece of software which deals with video requests. Unlike a standard web server delivering a video file over HTTP (progressive download), a streaming server opens a conversation with the local machine. There are two sides to this conversation, one is for transferring the video and the other is for control messages between the media player and the server. These control messages include commands such as ‘play’, ‘pause’, ‘stop’ and ‘seek’.
If you have a 56kbps connection, you will not be able to receive a stream encoded at 500kbps; you will have to settle for a lower quality video encoded for 56kbps connections. Streaming does however have many advantages.
1. You can begin video playback at any point of the video, or skip through the video as you see fit. This is very convenient for users.
2. It makes a lot more efficient use of bandwidth as you are only using bandwidth for part of the video that are actually watched as opposed to HTTP delivery where the whole file gets delivered.
3. The video file is not stored on the viewer’s computer – the video data is played and then discarded by the media player. This lets you maintain more control over your content.
Streaming servers use a specific set of protocols to deliver streams, such as RTSP(Real time streaming protocol), RTMP(Real time messaging protocol) and MMS(Microsoft media services). These protocols are all more suited to delivering video streams because they are more focussed with continuous delivery than they are with 100% accuracy. Unlike TCP, they do not send resend requests for missing packets but instead continue with the rest of the video file. The idea is that it is better to have a momentary glitch in audio or video than for the playback to stop altogether and wait for the missing data.

Saturday, 7 February 2015

Whtsapp Call Rolling out Based on invite

WhatsApp’s much requested calling feature has been rumored for a while now but the company has finally flipped the switch on it. One reddit user was able to get the feature activated on his number and it is now rolling out to others as well.


IF ANY ONE Wants INVITE Comment Your Number


It looks like WhatsApp is in the process of rolling out the much-awaited calling feature. According to a user at Reddit, he got the calling feature in his WhatsApp and he managed to make calls. The new feature also comes with a new user interface, which segregates calls, chats and contacts in three different tabs.

The Reddit users - Pradnesh07 - also showed screenshots of the updated app (posted above). He said that he was using the app APK, which is an install file for Android phones, available directly through the WhatsApp website and not the one downloaded from the Google Play store.

"It's like an invite thing, where a person with the call feature needs to 'call' another person who wants to start using the feature," wrote Pradnesh07 . "You need to get the APK from the website and not from the Play store."

For now it looks like WhatsApp is still testing the feature. Pradnesh07 wrote that he managed to call a few people in India but the feature doesn't work with all users. "I can't seem to send invites to other people, the only thing I can ensure is that it works in India for people running Lollipop 5.0.x on a Nexus 5. Other Indians without the earlier combo don't get it," he wrote.

The calls feature on WhatsApp will allow users to call their WhatsApp contacts using the internet connection. This means the calls will be free irrespective of where the users are. Users will have to only pay for the data charges, which are likely to be nominal.

This is similar to how other instant messaging apps like Skype and Viber allow users to make voice calls using internet.

However, given the scale of WhatsApp, the feature is likely to have far reaching consequences for both users and telecom industry. WhatsApp has over 500 million active users.


Recently WhatsApp added a feature to the app that allows users to use the service on the web. You can read more about how to use WhatsApp in a web browser here.

Sunday, 1 February 2015

Wednesday, 30 July 2014

Google's Redesigned Drive

Google today gave its Drive online storage service a major redesign today and with it, it is also bringing a number of new features to its Docs, Sheets and Slides productivity apps on mobile and the desktop.


Check out Some Screen Shot.!







Incoming
The Incoming section lets you see the files and folders that other people have shared with you, beginning with the most recent. You can add files to My Drive with one click. Remember, files that are shared with you don’t use any of your storage quota when you add them to My Drive.






For mobile
If you use the Drive app for Android or iOS, you’ll notice everything is now a bit speedier and easier to navigate. Thanks to faster background syncing, the new mobile app makes it easy to find and quickly open files. Plus, you get a host of new features that let you see who has access, view recent changes, or grab a link to share with more people. You can even enable offline access or print a file directly from the app.

For the web
You’ll be offered access to the new Drive for the web over the coming weeks. When you agree to give it a try, you’ll experience a new look and better performance. It's also easier to take some of the most common actions — simply click once on a file to see recent activity, share with friends, or enable offline access. For you organizational fiends, you now have three easy ways to take group actions on multiple files: right click on the selected files, use the menu above the file area, or simply drag the group to a new location in Drive.

For everyone
We are committed to making Drive useful for everyone. This includes having it localized in over 70 languages and, with this latest update, making Drive much more accessible for our blind and visually impaired users. The new Drive includes improved keyboard accessibility, support for zooming and high contrast mode, and better compatibility with screen readers. 

Saturday, 31 May 2014

Steps To Become A Hacker!


Step 1: Learn To Program In C

C programming is one of the most powerful languages in computer programming. It is necessary to really master this language. This programming language was invented by Denise Ritchie in between the years 1969 and 1973 at AT&T Bell Labs. C programming will essentially help you divide the task in smaller pieces and these pieces can be expressed by a sequence of commands. Try writing some program on your own by assessing the logic.


Step 2: Learn More Than One Programming Language

When you are trying to become a hacker, it is very important to learn other modern computer programming languages such as JAVA, Perl, PHP and Python. One of the best ways to learn these is by reading books from experts.



Step 3: Learn UNIX

UNIX is a multi-tasking and multi-user computer operating system that is designed to provide good security to the systems. This operating system was developed by some employees of AT&T in Bell Labs. The best way to learn it is to get into an open-source version (e.g. centos) and install/run the same on your own. You can operate internet without learning UNIX, but it is not possible for you to be an internet hacker without understanding UNIX.



Step 4: Learn More Than One Operating Systems

There are many other operating systems apart from UNIX. Windows operating system is one of the most commonly compromised systems, hence, it is good to learn hacking Microsoft systems, which are closed-source systems.

According to the National Vulnerability Database, Microsoft operating systems have a large number of vulnerabilities.
Windows OS installers are distributed in binary, therefore, it is not easy for you to read the code. Binary code is basically the digital representation of text and data that computer understands. However, knowing how programs are written for Windows and how different applications behave on this operating system will help.

One of the recent vulnerabilities of a popular OS was that Java Web Start applications get launched automatically even if the Java plug-ins are disabled. How to be a hacker is about knowing the weaknesses of these operating systems and targeting them systematically.



Step 5: Learn Networking Concepts

The networking concept needs to be sharp when you want to be a hacker.

Understanding how the networks are created is important, however, you need to know the differences between different types are networks. Having a clear understanding of TCP/IP and UDP protocol is a must to be able to exploit the vulnerabilities on world wide web.

Understand what is subnet, LAN, WAN and VPN.
The networking commands to do a HTTP request needs to be on your fingertips. The HTTP protocol, is the gateway through which one enters the internet world. Hence, it is necessary to learn this protocol in order to break the barriers. The hackers often use the HTTP gateway to breach the security of the system and take control over it.

Apache Httpd is one of the most commonly used web servers and knowing in and out of it is going to empower you on any HTTP or other application layer protocol related endeavors.
Also Nmap is a powerful network scanning tool that is used by hackers and security professional across the world to identify vulnerable hosts. However, to effectively start using it you must understand the networking basics.



Step 6: Start Simple: Go Through Tutorials About Hacking

This is the simple and best way to start. Read as many tutorials as possible that are meant for hacking. These articles will give you insight and help you develop the attitude to be a hacker. Some tutorials will initiate you with Nmap, Nessus and SuperScan, some of the hacking programs or tools that hackers generally use. These tutorials are readily available over the internet; Both text and video tutorials are available for you to answer your question how to be a hacker.



Step 7: Learn Cryptography

As an expert hacker, you need to understand and master the art of cryptography. The technology of cryptography and encryption is very important for internet and networking. It is the practice and study of techniques that are used for secure communication in the presence of third parties. The encryption is done for various aspects of information security such as confidentiality of the data, integrity of the data and authentication. Moreover, the technology of cryptography is extensively used in ATM cards, computer passwords and e-commerce. While hacking, these encrypted codes needs to be broken, which is called decryption.
Understand various techniques used for password cracking. There are dozens of tools available to do password cracking, and using it is not hacking. To be expert at hacking its important for you to understand how to create a program that can crack a password from cypher text.



Step 8: Experiment A Lot

This is an important step for setting yourself up as an expert hacker. Setup a laboratory on your own to experiment the learning on the practical applications. A simplest lab will have your computer, however once you advance you may want to add more and more computers and required hardware for your experiments.
It is good to try experimenting on your own computers, where you can rectify if you have done any mistake. Many hackers initially start off by downloading virtual lab applications such as Oracle VirtualBox. You require at least 3 GBs of RAM and a comparatively powerful processor to carry out your hacking experiments. Setting up the virtual machine is crucial, as it will allow you to test virus, applications and different servers without affecting your own PC.
Some of the things you may need to keep in mind when doing experiments

- Keep a backup before any experiment.
- Start small and have check points.
- Know when to stop.
- Document your progress
- Keep improvising
- Automate repetitive tasks



Step 9: Read Some Good Books From Experts

Reading will always enhance your knowledge. Try to read as many books and articles as possible written by the experts in the field field of ethical hacking and enterprise security
Reading a lot about anything related is so important in the world of hacking that you must also consider enhancing your reading speed. If your reading speed is slow, then you may not be able to progress fast in this field. Practice speed reading techniques like skimming, chunk reading etc.
When it comes to reading a lot, it's also important to know that a majority of content on web is not worth your time. Many people use search engine tricks to attract traffic but have little value in it. If you skim through an article within seconds and decide not to read that is going to save you a lot of time for some really well researched content.



Step 10: Go Next Level: Write Vulnerability

Vulnerability of a program is the weakness of the program. It is a good approach to look for the vulnerability of an existing program and share the same with others. In this way you will have the option to collect varied opinions from different sources, enabling you to hone your current skill set.
The examples of computer vulnerabilities include memory safety violation, input validation error, privilege confusion bugs and user interface failure. For instance, Microsoft’s Internet Explorer 11 had the vulnerability bug in its preview version which several hackers exploited.
Identifying a new weakness in any software is the real work any expert hackers would perform.



Step 11: Contribute To Open Source Security Projects

Contributing to an open-source computer security project is a great platform to test your skills. This is not everyone’s cup of tea. Many organizations like Mozilla and Apache offer these types of open source projects. Try to be a part of these projects and add a valuable contribution to the benefit of the community.
Participating in the open source security projects such as anti-spam, anti-virus, firewall and data removals help you augment your dexterity as a hacker. Contribute your vulnerability findings to the global vulnerability databases and give back to the community.
Remember that it does not matter if your contribution is small, as long as you partic

ipate and add value it helps.

Step 12: Continue Learning And Keep Listening To Security Talks

The key to success in the hacking career is continuous learning. Reading blogs for hacking available at sites such as hackerfactor blog and IKEA hacker blog; participating in the forums such as hackforums.net and elite hack are great ways to refresh your knowledge as a hacker. The online video forums like TED or TechTalk are good sources to know more about the emergent hacking techniques and technologies that are being deployed. You should also try following the posts of famous hackers such as Adrian Lamo, Kevin Mitnick, Kevin Poulsen and Robert Tappan Morris.

Thursday, 29 May 2014

Thursday, 17 April 2014

Chrome Remote Desktop On Android

 

 Allowing Mobile Access To Your PC(Google)

 
Google this morning launched a mobile client application called “Chrome Remote Desktop app for Android” (whew!) which allows for remote access to your Mac or PC from your Android device, whether smartphone or tablet. The new app is an extension of Google’s previously launched Chrome Remote Desktop screen-sharing service, which allows you to share your desktop’s screen with other Chrome browser or Chromebook users.
 

As with its big-screen counterpart, to use the Android application you first have to install a helper application on your desktop or laptop computer. That app is here in the Chrome Web Store and works on Windows (XP and above), Mac (OS X 10.6 and above) and Linux computers. The helper app installs as an extension to Google Chrome or the Chrome-based OS that powers Google’s Chromebooks.
 

Once installed, however, you’ll be able to open the app and connect to any of your computers with just a tap, manage them, and navigate through their files and folders from afar — like a modern version of GoToMyPC, for example.

 
We’ve known an Android client was in the works for some time, as there was even a functional version of the Android client available back in January, though it required that you compile the app from source in order to use it. An iOS version is also in the works, but its development is said to be further behind.
 
The move comes at a time when competitor Amazon is targeting enterprise users with its own version of remote access software, Amazon Workspaces. Officially launched to the public in March, this service similarly lets company employees access their work computers from any device, including Mac, PC, iPhone, iPad, Android or Kindle Fire HDX tablets. Of course, in Amazon’s case, the goal is to make its tablets appear more business-friendly.
 
Google’s Remote Desktop, on the other hand, has a more consumer-focused vibe, which even had the company once touting the service as a way to be the family hero by “adjusting printer settings on your mom’s computer to finding a lost file on your dad’s laptop,” for example.
The official Chrome Remote Desktop Android app is available here on Google Play.
 

Tuesday, 25 March 2014

Detecting and Removing Trojan Horses



Detection – How to find a Trojan.


  • In this page you are going to learn about Detecting and Removing Trojan Horses. By their very nature Trojan horses are difficult to find. Unlike viruses they won’t corrupt files or delete things you might notice, they do their best to stay out of sight and avoid detection. That said, they are pieces of software and no software can run on any computer without leaving some trace of it’s existence. 
  • Below I’ll cover three basic tools that will uncover the presence of the majority of Trojan horses. None of these costs any money, in fact two of them are already installed on every windows computer!



The Task List


You may be familiar with the Task List that appears if you press CTRL+ALT+DEL within windows. This is supposed to be a list of all the programs running on your computer at the second you pressed those keys – it’s not. For reasons best known to themselves Microsoft hid a great many processes from display in the task list, possibly to avoid confusing novice users. In doing this, they gave trojan writers the perfect tool to hide their own creations from your view as well.

Less well known is the System Information Utility (msinfo32.exe) that hides in the

C:\program files\common\microsoft shared\msinfo

folder on your disk. This tool can uncover almost every process that’s running on any windows system, even those that are ‘hidden’ from the task list. Better yet, on windows 98 & ME the same tool provides an easy way to selectively disable any suspect processes at the next reboot. To use this when hunting for Trojans, look down the task listings for running tasks & services for any which you don’t recognize. Check the paths and file names. Check the file properties and run the executable or .dll through your virus scanner. If you find nothing but still aren't sure, use the Start up Programs editor in the tools menu to disable the process then reboot your machine (make a backup of your system files first!). If nothing complains, leave the process disabled for now and carry on looking at the others. Eventually you’ll have only those processes you really need running on your machine which will have the benefit of not only killing off any trojans but also making your PC seem more responsive and generally quicker to start up.


Netstat


  • All trojans need to communicate. If they don’t do that they are useless for their intended purpose. This is the second major weakness of most trojan horses, their communication leaves a trail you can follow.
  • The Netstat command lists all the open connections to and from your PC.
  • To use it, open a DOS box and enter the command netstat -an this will list all the open connections to and from your PC, along with the IP address of the machines on either side.
  •  If you see a connection you don’t recognise, you need to investigate it further and track down the process that’s using it. For this you need the third tool in the armoury, 



TCPView

  • TCPView is a free utility by Sysinternals which not only lists the IP addresses communicating with your computer, it tells you what program is using that connection. 
  • Armed with this information you can locate whatever program is sending data out of your machine and deal with it. 
  • I recommend renaming the offending file then rebooting – that way if you make a mistake you can put it right easily.


Removing a Trojan Horse

Trojans often modify the startup files of your computer, add or change lines in the system registry and even overwrite system files to make sure they are run every time you boot up. For that reason, removing them by hand takes time, patience and an understanding of what you are doing. It’s fraught with dangers, including trashing your registry or loosing the ability to run programs so it’s definatly not for everyone – even those who know exactly what they are doing often prefer to use automated tools when removing a trojan horse.
Each trojan has it’s own specific removal routine, see the Cleaners & Fixes pages for details on those. They do however all conform to the same basic patterns :
  • They usually insert a line in the run, run once or run services keys in the system registry. This is the principal startup method of most trojans including Back Orifice & Sub7. Removing the line from the registry and rebooting usually stops the trojan loading.
  • Some alter Win.ini, system.ini or plae themselves in the ‘Startup’ folder. Again, removing the offending line usually stops the trojan running.
  • Some alter or replace system files. These need careful handling and are best left to experts or automated tools.
  • One in particular can modify a certain setting in the registry, causing it to be executed before ANY program you run. removing this line stops you running ANYTHING! Again, this is best left to experts or automated tools to deal with.
The steps involved in removing a trojan are simple :
  1. Identify the trojan horse file on your hard disk.
  2. Find out how it is being started and take the necessary action to prevent it being restarted after a reboot.
  3. Reboot your machine and delete the trojan horse.
  4. See the Recovering from a System Compromise pages for more in-depth help on what else you may need to do.

Thursday, 13 March 2014

6 Ways to Make Your Computer Run Faster


This holiday season, the lines at Apple will flood out the door as people wait in line to upgrade their computers. However, if you’re experiencing problems with your computer it is most likely not because it’s too old or too worn down. If your computer is slow or is constantly freezing, you don’t need to run out to the store to purchase a new one. Here are 6 ways that you can save yourself the costly purchase of a new laptop or PC, and get your computer running faster:

Uninstall programs you don’t use: 


New computers come with a long list of programs, many of which you will never use, and most likely don’t even know exist. If you’ve never used a program and don’t foresee using it in the near future, get rid of it. Open the Control Panel, go into programs and features, and browse through the list of installed software. Uninstall everything that you don’t need. If you’re worried about deleting a program your computer’s hardware needs, you can use a program like PC Decrapifier which will select the programs you don’t need for you.

Run a disk de-fragment:



Maximize the efficiency of your computer by running a disk de-fragment and re-configuring how your hard drive stores information. In order to do this, open “my computer”, right-click on the hard drive and select “properties” from the drop down menu. Under the “Tools” tab click the option “Defragment now”.

Run a disk clean up:


You can also de-clutter your computer if you have windows with a built-in tool called Disk Cleanup. Disk Cleanup searches through your system for any unnecessary files that take up a lot of memory, like program installers, or temporary internet files. All you have to do to run the program is click “start”>”All Programs”> “Accessories”>”System Tools”> “Disk Cleanup”. The program does all the work for you.

Delete Temporary Files:


The every day tasks you perform on your computer cause temporary files to accumulate on your computer. These files remain on your hard disk, and slow your computer down. Remove the files to free up more hard disk space, speeding up your computer at the same time. This involves mainly deleting your internet history and cookies. In order to do this go to “My Computer”>”Local Hard Drive” (It will usually be C:\)>”Windows”>”Temp”. Right-click on “Temp”, hold your mouse over “View” in the drop down menu, and choose “Details”. Then, select the files that are older than the current date and press delete. If you want to delete cookies and web history from a laptop, open up your internet browser, choose “History” and then “clear browsing history”. Once you’ve finished these steps, make sure to empty your computer’s recycle bin.

Get A Bigger Hard Drive:


Even if you delete temporary files on a regular basis, if your hard drive is not big enough for you, your computer will slow down. When your hard drive becomes 85% full, your computer is sure to slow down. If you’re someone who uses the computer mainly for checking e-mail and moderate internet browsing, you most likely will not need a very large hard drive. However, if you regularly download television shows or other large files, you will need a large hard drive, one that’s more than 1TB in size. Head over to your nearest computer supply store in order to purchase a new one. The installation process is not difficult, and there are plenty of Youtube videos that can help you along the way. If you’re not comfortable doing it yourself, have them install the new hard drive for you at the store.

Remove Dust:


Dust can actually cause huge problems for your computer. Dust can obstruct your computer’s airflow which is necessary in order to keep it’s temperature down and keep it from over-heating. When your computer over-heats, it slows down in order to cope. In order to remove dust, simply take off the computer’s exterior and use a vacuum with a nozzle attachment at a very low power setting in order to remove some dust without damaging your computer. Make sure your computer is off before you start to clean. You can also reverse the setting if you encounter stubborn dust, and have the vacuum blow air out in order to blow the dust out.
Follow these steps, and your computer will be running as fast as it did when you ripped it out of it’s brand new box.