Sunday, 19 February 2017

CEO Sundar Pichai replies to 7-year-old girl who wanted a job in Google



A lot of us have asked little children about what they want to become when they grow up, only to listen to them keenly listing the job prospects they are considering. From doctors and teachers to scientists and astronauts — they come up with interesting answers. But it seems one little girl has her heart set at joining the world’s biggest search engine — Google, and she got a response from Sundar Pichai, Google’s CEO, no less!
Watch What Sundar Pichai Replied To The Little Girl Here

In an adorable letter that seven-year-old Chloe Bridgewater from Hereford, UK wrote to the “Google Boss”, she has set her priorities straight. From working with Google to also working in a chocolate factory and swimming in the Olympics games, she seems to have big plans etched out for herself. Also, it seems Chloe’s interest piqued after her father said she could “sit on bean bags and go down slides and ride go karts in a job in Google”. If you think what we infer to be her ‘resumé letter’ is adorable, then wait till you see what Pichai had to say to her.

Mass stranding

Hundreds of whales dead after mass stranding in New Zealand


At least 250 whales were already dead of 400 found beached on Farewell Spit in Golden Bay on the tip of the South Island Friday, the Department of Conservation said in a statement.
Rescuers attempted to refloat more than 100 whales mid-morning, of which about 50 returned to sea.
However, another 80 to 90 whales who were freed re-stranded themselves in the same place just five hours later, 

Volunteers swoop on site

Hundreds of locals turned out to help keep the whales cool.
"There's like two to three hundred car loads of people who have come to help, maybe three to four hundred people," Department of Conservation Community Ranger Kath Inwood.
The largest whale stranding in New Zealand took place in 1918, when 1,000 whales stranded themselves on Chatham Islands.
The second largest was in Auckland in 1985, when 450 ended up on a beach.


Monday, 13 February 2017

Internet and Intranet

Internet

It is a worldwide system which has the following characteristics:
  • Internet is a world-wide / global system of interconnected computer networks.
  • Internet uses the standard Internet Protocol (TCP/IP)
  • Every computer in internet is identified by a unique IP address.
  • IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer’s location.
  • A special computer DNS (Domain Name Server) is used to give name to the IP Address so that user can locate a computer by a name.
  • For example, a DNS server will resolve a name http://www.tutorialspoint.com to a particular IP address to uniquely identify the computer on which this website is hosted.
  • Internet is accessible to every user all over the world.
Internet

Intranet

  • Intranet is system in which multiple PCs are connected to each other.
  • PCs in intranet are not available to the world outside the intranet.
  • Usually each company or organization has their own Intranet network and members/employees of that company can access the computers in their intranet.
  • Each computer in Intranet is also identified by an IP Address which is unique among the computers in that Intranet.
Intranet

Similarities in Internet and Intranet

  • Intranet uses the internet protocols such as TCP/IP and FTP.
  • Intranet sites are accessible via web browser in similar way as websites in internet. But only members of Intranet network can access intranet hosted sites.
  • In Intranet, own instant messengers can be used as similar to yahoo messenger/ gtalk over the internet.

Differences in Internet and Intranet

  • Internet is general to PCs all over the world whereas Intranet is specific to few PCs.
  • Internet has wider access and provides a better access to websites to large population whereas Intranet is restricted.
  • Internet is not as safe as Intranet as Intranet can be safely privatized as per the need.

Router modem

Router and modem 

Routers and modems are two of the most common computer peripherals, yet many people don't know the function of each one. While the two devices may look similar, they each serve a difference purpose. Fortunately, the functions of the two devices are pretty easy to understand.
A router is a small box that allows multiple computers to join the same network (see below).
Netgear Router
While early routers provided several Ethernet ports for wired connections, most modern routers offer wireless connectivity as well. These "wireless routers" often have one or two moveable antennas on the sides, though some models house the antennas inside the enclosure. Wireless routers allow multiple computers and other devices, such as smartphones and tablets, to join the same network.
While connecting to a router provides access to a local network (LAN), it does not necessarily provide access to the Internet. In order for devices on the network to connect to the Internet, the router must be connected to a modem. Therefore, most routers have a specific Ethernet port that is designed to connect to the Ethernet port of a cable or DSL modem.
A modem is a device that provides access to the Internet (see below).
Cisco Cable Modem
The modem connects to your ISP, which typically provides either cable or DSL Internet service. Cable modems have a coaxial (or "coax") connection, which is the same type of connector found on a TV or cable box. This connects to a cable port on the wall. DSL modems have a telephone connector, also called an RJ-11 jack, which connects to a telephone socket on the wall.
By connecting your modem to your router (instead of directly to a computer), all devices connected to the router can access the modem, and therefore, the Internet. The router provides a local IP address to each connected device, but they will all have the same external IP address, which is assigned by your ISP.
To summarize, the device connection order is outlined below:
  1. PC or wireless device
  2. Router
  3. Modem
  4. ISP
  5. Internet
While the router and modem are usually separate entities, in some cases, the modem and router may be combined into a single device. This type of hybrid device is sometimes offered by ISPs to simplify the setup process

Ip

IP Address


Internet Protocol Address (or IP Address) is an unique address that computing devices such as personal computers, tablets, and smartphones use to identify itself and communicate with other devices in the IP network. Any device connected to the IP network must have an unique IP address within the network. An IP address is analogous to a street address or telephone number in that it is used to uniquely identify an entity.

Dotted Decimals


The traditional IP Addresses (known as IPv4) uses a 32-bit number to represent an IP address, and it defines both network and host address. A 32-bit number is capable of providing roughly 4 billion unique numbers, and hence IPv4 addresses running out as more devices are connected to the IP network. A new version of the IP protocol (IPv6) has been invented to offer virtually limitless number of unique addresses. An IP address is written in "dotted decimal" notation, which is 4 sets of numbers separated by period each set representing 8-bit number ranging from (0-255). An example of IPv4 address is 216.3.128.12, which is the IP address previously assigned to iplocation.net.

An IPv4 address is divided into two parts: network and host address. The network address determines how many of the 32 bits are used for the network address, and remaining bits for the host address. The host address can further divided into subnetwork and host number.

Class A, B, C and CIDR networks

Traditionally IP network is classified as A, B or C network. The computers identified the class by the first 3 bits (A=000, B=100, C=110), while humans identify the class by first octet(8-bit) number. With scarcity of IP addresses, the class-based system has been replaced by C lassless I nter- Domain Routing (CIDR) to more efficiently allocate IP addresses.

Class Network Address Number of Hosts Netmask

CIDR /4 240,435,456 240.0.0.0
CIDR /5 134,217,728 248.0.0.0
CIDR /6 67,108,864 252.0.0.0
CIDR /7 33,554,432 254.0.0.0
A /8 (1-126) 16,777,216 255.0.0.0
CIDR /9 8,388,608 255.128.0.0
CIDR /10 4,194,304 255.192.0.0
CIDR /11 2,097,152 255.224.0.0
CIDR /12 1,048,576 255.240.0.0
CIDR /13 524,288 255.248.0.0
CIDR /14 262,144 255.252.0.0
CIDR /15 131,072 255.254.0.0
B /16 (128-191) 65,534 255.255.0.0
CIDR /17 32,768 255.255.128.0
CIDR /18 16,384 255.255.192.0
CIDR /19 8,192 255.255.224.0
CIDR /20 4,096 255.255.240.0
CIDR /21 2,048 255.255.248.0
CIDR /22 1,024 255.255.252.0
CIDR /23 512 255.255.254.0
C /24 (192-223) 256 255.255.255.0
CIDR /25 128 255.255.255.128
CIDR /26 64 255.255.255.192
CIDR /27 32 255.255.255.224
CIDR /28 16 255.255.255.240
CIDR /29 8 255.255.255.248
CIDR /30 4 255.255.255.252

Note: (1) 127 Network Address reserved for loopback test. (2) Class D (224-247, Multicast) and Class E (248-255, Experimental) are not intended to be used in public operation.

Public and Private IP Addresses

In order to maintain uniqueness within global namespace, the IP addresses are publicly registered with the Network I nformation C enter (NIC) to avoid address conflicts. Devices that need to be publicly identified such as web or mail servers must have a globally unique IP address, and they are assigned a public IP address. Devices that do not require public access may be assigned a private IP address, and make it uniquely identifiable within one organization. For example, a network printer may be assigned a private IP address to prevent the world from printing from it. To allow organizations to freely assign private IP addresses, the NIC has reserved certain address blocks for private use. A private network is a network that uses RFC 1918 IP address space. The following IP blocks are reserved for private IP addresses.
Class Starting IP Address Ending IP Address

A 10.0.0.0 10.255.255.255
B 172.16.0.0 172.31.255.255
C 192.168.0.0 192.168.255.255

In addition to above classful private addresses, 169.254.0.0 through 169.254.255.255 addresses are reserved for Zeroconf (or APIPA, Automatic Private IP Addressing) to automatically create the usable IP network without configuration.

What is loopback IP address?


The loopback IP address is the address used to access itself. The IPv4 designated
127.0.0.1 as the loopback address with the 255.0.0.0 subnet mask. A loopback interface is also known as a virtual IP, which does not associate with hardware interface. On Linux systems, the loopback interface is commonly called lo or lo0 . The corresponding hostname for this interface is called localhost.

The loopback address is used to test network software without physically installing a
Network I nterface C ard (NIC), and without having to physically connect the machine to a TCP/IP network. A good example of this is to access the web server running on itself by using http://127.0.0.1 or http://localhost.

Sunday, 12 February 2017

Hacking

What is Hacking?


During the 1990s, the term "hacker" originally denoted a skilled programmer proficient in machine code and computer operating systems. In particular, these individuals could always hack on an unsatisfactory system to solve problems and engage in a little software company espionage by interpreting a competitor's code.
Unfortunately, some of these hackers also became experts at accessing password-protected computers, files, and networks and came to known as "crackers." Of course, an effective and dangerous "cracker" must be a good hacker and the terms became intertwined. Hacker won out in popular use and in the media and today refers to anyone who performs some form of computer sabotage.

Hacker Tools

There now are more than 100,000 known viruses with more appearing virtually daily. The myriad of hackers and their nefarious deeds can affect any computer owner whether an occasional home user, e-mailer, student, blogger, or a network administrator on site or on the internet. No matter your level of computer use, you must protect your computer, business, or even your identity. The best way to know how to protect your computer is to understand the hacker's tools and recognize their damage.

Viruses, Exploits, Worms, and More

The term computer "virus" originated to describe machine code command inserted into a computer's memory that, on execution, copies itself into other programs and files on the computer. Depending on the hacker's intent, the design of a virus can merely be an inconvenience or have very serious consequences up to a potential catastrophe.
Generally, a virus is a piece of software, a series of data, or a command sequence that exploits a bug, glitch, or vulnerability. Each example is appropriately termed an "exploit." An exploit causes unintended or unanticipated behavior to occur in a computer's operating system or applications while propagating itself within the computer.
An exploit and operates through a network security vulnerability or "hole" without previous access to the vulnerable system is a "remote" exploit. An exploit that needs prior access to a system is termed a "local" exploit. These are usually intended to increase the hacker's access privileges beyond those granted by a system administrator.
Worms are simply viruses that send copies over network connections. A bomb resides silently in a computer's memory until set off by a date or action. A Trojan horse is a malicious program that cannot reproduce itself, but is distributed by CD or e-mail.

Protect Your Computer: Avoid Computer Holes/Vulnerabilities

Install only trusted software and delete unknown emails. If you have any doubt about a piece of software's function, do not install it. If you receive e-mails from random people's names, resist your curiosity and do not open it, just delete it.
Under no conditions download or open attachments from anyone that you do not know and even then be cautious. Banks and most companies that create online personal accounts will not send you attachments. If they do, it is probably best to go to the company site and request the download or at least see if it is legitimate. Avoid adult web sites, a hacker's paradise.
Whether in your e-mail or online, do not click on ads. If the ad is of interest, find the site. Be careful with what you physically put into your computer. This is especially true for shared R/W CDs, USB hard disks, or flash drives. This is an easy path for a virus to follow from computer to computer.

Protection: Install Anti-Virus Software

Anti-virus software searches for evidence of the presence of viral programs, worm, bombs, and Trojan horses by checking for the characteristic appearances or behaviors that is typical of these programs. When found the program logs its discovery, its type, often its name or an identifier, and it potential for damage. The anti-virus software then eliminates or isolates/quarantines the infected files. For the individual, commercial software is relatively inexpensive; however, there are free anti-virus programs available.
Since new viruses appear almost daily with new code it is imperative that you update you antivirus program often to keep up with these threats; therefore, make sure to set your program to update automatically. To avoid the annoyance of computer slowdown schedule full scale scans late at night.
The same is true for your Windows Operating System. Very often, your OS is where hackers discover the holes to exploit. Of course, in an ever-continuing battle, this software is continuously updated with security patches.
Finally, secure your wireless network with a router that has a built in firewall. Almost all wireless routers are set to no security when first installed. Log into the router and at least set it to basic security with a strong password to replace the factory setting that any hacker knows. A firewall or router that is not configured properly or non-existent allows hackers to scan passwords, e-mails, or files that cross your network connection

Things to Know Before Updating to iOS 10


Things to Know Before Updating to iOS 10




Protect your data during the update

The process of updating an iOS device has been a major pain point for iPhone users during past iOS launches. If at all possible, back up your devices before beginning the iOS 10 update. Not doing so could result in permanent loss of pictures, contacts, emails and more– and nobody wants that.
We recommend running the update via iTunes. Updating over the air will require Wi-Fi and significant space on the device itself, and it can be extremely time-consuming — especially on the day the operating system is released.

Don’t get locked out

iOS 10 has removed the “Slide to Unlock” functionality of the lock screen. This has been replaced with “Press Home to Unlock”, which requires a working home button OR AssistiveTouch, so before you begin an update to iOS 10, make sure your home button is functional! There is currently no way to return to the Slide to Unlock method of past iOS versions.


Say more with the new iMessage

One of the most-anticipated features of iOS 10 is the large update to Messages, which brings bubble effects and screen effects to iMessage conversations. The Reduce Motion accessibility feature will allow you to enable/disable Message Effects.
The handwriting feature is another exciting update to Messages in iOS 10; however, handwriting requires the device to be turned in landscape mode in order to properly work. Make sure to turn off Portrait Orientation Lock so you can utilize this cool new feature.

Manage rides, reservations and routes from 1 app

Apple confirmed in June that iOS 10 will be opening Maps and Siri to 3rd party applications, allowing you to use these stock features to book rides, make reservations, and more. While iOS 10 comes with this functionality, applications that take advantage of this will need to release updates before their integrated services will be available.
Until the 3rd party applications are updated, you may experience limited functionality for these updates. Keep an eye out for updates to your favorite ride sharing and reservation apps in the next few week for updates

Tips to solve Heating mobiles problem

Tips to solve heating problem


As summer approaches, the temperature is warming up and your phone may not be able to take the heat. That’s right, your phone’s internal temperature changes based on the temperature of its environment. If it gets too hot you can have some major problems like draining your battery, melting your Central Processing Unit and battery, or causing a forced shutdown of your phone. When you overheat your phone, there are no guarantees that your phone will be able to restart.
To prevent phone overheating, we want to give you some tips to prevent a phone disaster this summer.
  1. Avoid direct sunlight to your phone. While leaving it easily accessible may be better for you, it is terrible for your phone. Your phone catches light and heat from the sun and retains it, getting hotter the longer you remain in the sun. Avoiding direct sunlight and heat is the easiest way to prevent overheating your phone.
  2. Turn off unused apps on your phone. Allowing apps you’re not using to run in the background runs battery and increases the heat on your phone. On an iPhone for example, all you have to do is simply press your home button twice and swipe the apps away. Closing these down not only saves battery but also decreases how hard your phone works, which in turn decreases heat.
  3. Don’t turn your brightness up, buy a glare screen. Just the same as running background apps, turning your brightness up will affect battery, forcing it to work harder. Instead of turning your brightness up, buy a glare screen. You’ll be able to use your phone in the sun no matter how bright it is.
  4. This one is simple, if you’re not using your phone, turn it to airplane mode or turn it off. Putting it in airplane mode will allow you to keep time and play music, but that will be it. These two options make it easier to save your battery and prevent it from heating up.
  5. If your phone is already overheating, take your case off. If your phone is hot, your case traps the heat. Taking the case off will allow the phone’s heat vents to do their job fully without being blocked. This will help your phone cool down quicker.
Additional suggestions to remember and consider:
  • Keep your applications up-to-date. This one might seem counter-intuitive, but many app updates include bug fixes, and that can improve your phone’s efficiency.
  • Separate your phone from your other gadgets. Keeping your phone, tablet and computer stacked up (even worse, stacked inside a bag!) might help you keep track of your devices, but if one running electronic device is stacked on top of another running electronic device, overheating is more likely. Keep that stuff separate and you’ll keep it cool.
  • Trim unneeded apps. If your phone continues to overheat, you might want to consider the number of unnecessary items on your phone—like ringtones, games, backgrounds, or apps that you never ever use. Delete apps and functionality you’re not using and you’ll reduce your phone’s workload.
  • If your phone is already hot, here’s a bit of cure: Fan your phone, or blow on it. You might feel silly fanning your phone, but physics doesn’t care. Just as fanning keeps a body cool, a breeze can help cool off your device when it’s getting too toasty. Wave your hand or a sheet of paper to make a breeze, or even blow on the back of your phone to help it cool down.
  • Avoid sudden changes in temperature. If you’re really worried about the temperature of your phone, you might be tempted to place it in the refrigerator or freezer, just for a minute or two. This is what experts in the field might call, “a terrible idea.” Exposing your phone to extreme temperatures strains the components and also risks collecting moisture, a surefire way to break your device.

Boot your mobile

The disk is write protected

USB flash drive/pen drive refuse to format with "The disk is write protected" error?
Cannot format your USB drive because it is write-protected? Get "The disk is write protected" error message while trying to format the flash drive, pen drive or SD card? Some removable storage devices like USB flash drives or pen drive have write protection which is designed to help users prevent unexpected data loss by refusing to delete or format. If you’re stuck with a write-protected USB drive that can’t be formatted with "The disk is write protected" error, please don’t worry! Here are 2 simple ways you can try to remove the write protection and format the USB flash drive and pen drive with no hassle. 

How to erase and format a write-protected USB flash drive & pen drive using Regedit.exe

Click Start, type Regedit in the search box, click Regedit.exe to open the Registry editor when you see it is displayed at the top of the list. And then navigate to the following key: 
Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies
Double-click on the WriteProtect value in the right-hand pane of Regedit.exe. Change the Value data from 1 to 0 and click OK to save the change. Close Regedit and restart your computer. Connect your USB flash drive or pen drive again, and you should find the write protection is removed and the device is no longer write protected. You can now format the drive as normal by right-clicking on it in My Computer and choosing Format. "The disk is write protected" error message will no longer pop up. 

How to format a write-protected USB flash drive or pen drive with EaseUS partition software

If the above method doesn’t work, you can try the second solution - formatting the write-protected USB flash drive or pen drive with EaseUS partition software, a powerful third-party disk partition management tool which works well to format USB flash drive or pen drive after removing write protection. Except for USB flash drive, the program also allows you to format a write-protected SD card. Here is the detailed guide:

Step 1. ​Connect your USB flash drive or pen drive to PC, launch EaseUS partition tool. Select and right-click the device you want to format and choose "Format partition" by right clicking the mouse.

Step 2. Configurate the label you want in the Partition Label box.


Step 3. Select the file system type to be created from the "File System" drop-down list. (FAT/FAT32, NTFS, EXT2/EXT3). If the USB drive is larger than 4GB, you can only choose FAT32, NTFS or EXT2/EXT3; and if the partition is smaller than 4GB, you can choose FAT, FAT32, NTFS or EXT2/EXT3.



Step 4. Choose the Cluster Size (512 bytes, 1, 2, 4...64KB) from drop-down list and click "OK" to apply the format operation.

Note: Smaller cluster size makes less wasting of disk space. The smaller cluster size is, the bigger file allocation table (FAT) will be. The bigger the FAT is, the slower the operation system works with the disk.
Step 5. Click "Apply" to confirm to format the write-protected USB flash drive or pen drive.

  That's all

Android 6.0

Android 6.0 Marshmallow


Android Marshmallow released on October 5 , 2015.Security Updates, Automatically full data backup and restore application, large application folder with multiple pages and application standby were the main features of this new updated version.
This version was updated later on with Android 6.01 on December 7 , 2015, providing double-tap power button to open camera

Back in October of 2015 Google officially released Android 6.0 Marshmallow, it’s latest version of Android. Over the past six months multiple users have received updates, and more are coming soon. Users can see all the changes and learn about what’s new in our Android 6.0 vs Android 5.1 walkthrough below. This is a comparison of Android 5.1 Lollipop vs Android 6.0 Marshmallow on the Nexus 5 and Nexus 6. Then, in December a quick update arrived to Android 6.0.1 with even more features.


In Android 5.0 (Lollipop), the biggest change from android KitKat was its new Material Design. It offered a completely different look with fast animations and intuitive interface.


  • Material Design — New grid-based layout with new animations, transitions and effects like shadows and lightening.
  • Battery Historian — An app to track current battery consumption of apps.
  • Fixes to video playback and password failure issues
Android 6.0 (Marshmallow) is largely focused on bug fixes and improving overall performance and usability. Although, there are some upgrades and addition of new features, but they all focus on making Android easier to use.
  • Fingerprint Authentication support
  • Open lock screen and authenticate payments with fingerprints.
  • Deep Sleep mode to save battery
  • Apps go to sleep after not touching the phone for a while.
  • USB Type-C support
  • New USB standard with better data transfer and charging speed.
  • MIDI support (support for MIDI devices )
  • Android Pay payments through the phone.
  • Improvements to Google Now
  • visual changes, Google Now on Tap and multiple ways to open apps, etc.
  • Permissions Dashboard to manage app permissions
  • A separate dashboard to manage which function an app can access and which is restricted.

Android 5.0


Android 5.0 Lollipop


Android lollipop released on November 12 , 2014.
That supported wifi calling, high definition voice call, improvement in the notification priority system, smart lock features.
Then updated 5.01 : – It was released on December 2 , 2014 & 5.02 released on December 19 , 2014.

Android Lollipop has been a long time coming. There were worries this would be an iterative update, but this is a new level for Google's OS. One that was needed.
This is Android 5, and it feels like a really big step up from Android 4.4.
The key messaging here from the search giant is not that it's just 'a bit better' - it's that it's been overhauled visually and combines well with more than phones and tablets, with watches taking centre staIn Android 5.0 (Lollipop), the biggest change from android KitKat was its new Material Design. It offered a completely different look with fast animations and intuitive interface.



  • Material Design — New grid-based layout with new animations, transitions and effects like shadows and lightening.
  • Battery Historian — An app to track current battery consumption of apps.
  • Fixes to video playback and password failure issues.
Android 5.1 Lollipop (Mar 9 2015)

Android 5.1 was announced on Mar 9 2015, without major fanfare. The focus was on making the Material Design introduced in Android 5.0 even better along with addition of some useful features.

  • Multiple SIM cards — Dual SIM support natively.
  • Lock protection
  • In case the phone gets lost/stolen, you can lock it remotely.
  • HD voice calls — Natively supports HD voice calls.
  • New quick settings shortcuts — Just tap to enable/disable apps in quick settings.
  • Animations — Few new UI and Icon animations added.
  • Screen pinning
  • Lock the screen on a specific app, so only that app could be accessed



Android 4.4

Android 4.4 KitKat




Android 4.4 Kitkat was released on October 31 in2013.
This version updated with Emoji Support, updated multi-tasking, better messages managed, GPS Support.
Android Kitkat was also known as “Ok Google” because when it runs, users can simply say “ok Google” and the search by voice

The Android 4.4 KitKat operating system uses advanced memory optimization technologies. As a result, it is available on Android devices with as little as 512 MB of RAM . This is important because previous versions of the operating system required more internal memory which made them incompatible with many older device models. This was a major cause of the problem known as Android fragmentation .


This is the latest version made available in the market, which was announced last year with cool features and latest apps for all fields like that of a camera, games and many more softwares.

Android 4.4 (KitKat) came with many new features, especially for developers.

  • Screen Recording — Record Android Screen with the help of the Android SDK.
  • New Translucent System UI — Stylish UI with Translucent bars and menus
  • Full-screen immersive mode
  • System-wide settings for closed Captioning — Allow Captioning for supported apps
  • Faster access to notifications — Faster access with Notification bar
  • Printing Framework — Printing from application Official Android 4.4 KitKat page


Mehendi design

This is my sister mehendi design These are the sample design  For more click here