Thursday, 28 July 2016

Learn The Basic Linux Commands With This Awesome Cheat Sheet

 
Fox solutions: Here I’m sharing a useful Linux commands cheat sheet that you can print and keep it as a learning guide or a refresher. The cheat sheet is organized according to different commands and sections for easy use.

If you are willing to become a system administrator or trying to make a shift from Windows to Linux, you need to become well-versed with basic Linux commands.
Even if you adopted Linux a long time ago, it becomes difficult to remember all the commands and use them to perform powerful tasks with just a few keystrokes. In such times, you feel the need of an ultimate cheat sheet that could act as an answer to all your problems.
Recently, I came across a basic Linux commands cheat sheet that one could easily use as a refresher or a learning guide.
This cheat sheet organizes all the commands in 13 different sections according to their usage to help you out with the information on package installation, how to call up system info, or how to manipulate a file.
Prepared by LinOxide, you can go ahead and download the cheat sheet in PDF format and take a look at a more detailed reference guide.

Below is the image that you can save and print:

 

Top 50 Linux System Administrator Interview Questions



Fox Solutions: Today, the job opportunities for Linux experts are more than ever. The Linux SysAdmin interview questions range from basic Linux questions to networking, DevOps, and MySQL questions. So, one needs to prepare adequately to ensure success in the Linux system administrator interview process. 


According to a report, the open source and Linux job market is full of new opportunities. Due to the increasing adoption of open source technologies by the technology giants (Microsoft says HELLO!), there are ample job opportunities for system administrators and DevOps professionals.
While a huge demand continues to exist, just like any other job in the technology world, SysAdmins have to go through a rigorous hiring process that consists of preparing a professional resume, technical exams, and interview questions. Out of these, cracking a job interview is often the most critical test.
During an interview, a candidate’s personal qualities are also checked and it’s evaluated if he/she is a right fit for the company. Apart from being calm and composed, being well-prepared for an interview is the best thing one can do in order to crack a Linux SysAdmin interview.

le Here

If you open your web browser and search for the phrase Linux SysAdmin interview questions, you’ll get a long list of search results that will help your practice. Apart from the straightforward conceptual questions like “What does the permission 0750 on a file mean?”, Linux SysAdmin interviews also come loaded with expert questions like “How do you catch a Linux signal on a script?”
To help you out in the Linux system administrator  interviews, I’ve compiled a list of my favorite questions of variable difficulty. These questions are framed with different approaches to find out more about the candidate and test his/her problem-solving skills:
1. What does nslookup do?
2. How do you display the top most process utilizing CPU process?
3. How to check all open ports on a Linux machine and block the unused ports?
4. What is Linux? How is it different from UNIX?
5. Explain the boot process of Unix System in details.
6. How do you change the permissions? How to create a file that’s read-only property?
7. Explain SUDO in detail. What are its disadvantages?
8. What is the difference between UDP and TCP?
9. Describe the boot order of a Linux machine.
10. Design a 3-tier web application.
11. Sketch how you would route network traffic from the internet into a few subnets.
12. How do you know about virtualization? Is it good to use?
13. What are different levels of RAID and what level will you use for a web server and database server?
14. List some latest developments in open source technologies.
15. Have you ever contributed to an open source project?
16. Systems engineer or a systems administrator? Explain?
17. List some of the common unethical practices followed by a system professional.
18. What is the common size for a swap partition under a Linux system?
19. What does a nameless directory represent in a Linux system?
20. How to list all files, including hidden ones, in a directory?
21. How to add a new system user without login permissions?
22. Explain a hardlink. What happens when a hardlink is removed?
23. What happens when a sysadmin executes this command: chmod 444 chmod
24. How do you determine the private and public IP addresses of a Linux system?
25. How do you send a mail attachment using bash?
26. Tell me something about the Linux distros used on servers.
27. Explain the process to re-install Grub in Linux in the shortest manner.
28. What is an A record, an NS record, a PTR record, a CNAME record, an MX record?
29. What is a zombie process? State its causes?
30. When do we prefer a script over a compiled program?
31. How to create a simple master/slave cluster?
32. What happens when you delete the source to a symlink?
33. How to restrict an IP so that it may not use the FTP Server?
34. Explain the directory structure of Linux. What contents go in /usr/local?
35. What is git? Explain its structure and working.
36. How would you send an automated email to 100 people at 12:00 AM?
37. Tell me about ZFS file system.
38. How to change the default run level in a Linux system?
39. How would you change the kernel parameters in Linux?
40. State the differences between SSH and Telnet.
41. How would you virtualize a physical Linux machine?
42. Tell me about some quirky Linux commands.
43. Explain how HTTPS works.
44. Do you know about TOR browser? Explain its working.
45. How to trigger a forced system check the next time you boot your machine?
46. What backup techniques do you prefer?
47. Tell me something about SWAP partition.
48. Explain Ping of Death attack.
49. How do you sniff the contents of an IP packet?
50. Which OSI layer is responsible for making sure that the packet reaches its correct destination?

Linux Filesystems Explained — EXT2/3/4, XFS, Btrfs, ZFS


 

Fox Solutions: Linux is known for supporting the most filesystems out of all operating systems. There are many retro ones, there are the tried and true, and then there are the next generation filesystems with amazing features. There are so many, in fact, that it can be extremely daunting to the average user.
 
 The first time I installed Ubuntu on my computer, when I was sixteen, I was astonished by the number of filesystems that were available for the system installation. There were so many that I was left overwhelmed and confused. I was worried that if I picked the wrong one my system might run too slow or that it might be more problematic than another. I wanted to know which was the best.
Since then, things have changed quite a bit. Many Linux distributions offer a ‘standard’ filesystem that an installation will default to unless otherwise specified. I think this was a very good move because it assists newcomers in making a decision and being comfortable with it. But, for those that are still unsure of some of the contemporary offerings, we’ll be going through them today.

EXT2/3/4:

Extended Filesystem is by far the most popular filesystem among Linux desktop installations. It has been tried and tested, it is no doubt a solid and stable filesystem. It supports all of the standard features of the Linux kernel like quotas, POSIX attributes, and ACLs, so it still a viable solution for a desktop or server. However, there are no plans to create a new iteration of the EXT4 filesystem. The authors have decided to let it go praising Btrfs as the next defacto for Linux.

XFS:

XFS is the recommended solution for Red Hat Enterprise Linux since release 7. It has a rich history in supercomputing and server use dating back to its introduction in IRIX OS in 1994, which is probably part of why Red Hat is advocating its use. There are, however, some key disadvantages to using XFS. The most notable of the disadvantages is the lack of data checksums or ECC leaving it susceptible to silent data corruption, otherwise known as “bit rot,” making the lack of transparent compression, the ability to shrink a volume, or the inability to snapshot the volume without external tools and freezing I/O the least of your concerns.
Despite these shortcomings, XFS is known for being very stable and very fast due to its optimized parallel I/O, and if you can compensate for the demerits, it makes a very solid solution. But if you’re only running on commodity hardware, I’d recommend something that will ensure your data’s integrity like any of the others on this list.

Btrfs:

Btrfs is the new kid on the block with a cool jacket and fancy shoes. Btrfs really blows away the competition with a repertoire of features. Btrfs is a filesystem that does not need administration once it has been implemented, that is, you should never have to run an fsck on it. Whenever any errors or inconsistencies arise, it should just handle them on its own and be on its way. That’s a very big value for many, especially those that are not technically able enough to unmount the volume and run a full filesystem check.
In addition to not needing human intervention, it also plays the roles of volume manager and RAID controller. That means that you don’t have to rely on three separate facilities to accomplish robust redundant (or performance) storage anymore, which is a large value to even those that are technically inclined. Btrfs is hailed as the next generation filesystem for Linux users, and it’s easy to see why, though, it does not lend itself to all applications equally without first tweaking the defaults, but it’s surely a good choice for a desktop solution.

ZFS:

ZFS is like the very intimidating nemesis of Btrfs, complete with neck beard. While ZFS predates Btrfs by four or five years, conceptually, they share a lot. ZFS has a very strong track record of reliability and robustness. Although, due to conflicting licenses, it cannot be shipped with Linux, something which Canonical is currently challenging with Ubuntu. As of now, in order to run ZFS, you must install software from third party repositories, and having a ZFS root volume can be very tricky or simply impossible with some distributions. While ZFS is a world-class heavyweight in the domain of filesystems, it is likely that it will always be a foreign resident on Linux systems.
These are just the contemporary filesystems, there are many other filesystems that Linux supports that have either died out or faded away into obscurity like ReiserFS. According to Wiki, there are 36 filesystems supported directly by the Linux kernel including those of Windows and OS X and at least a couple dozen more through FUSE.
So, I think the one thing that really hasn’t changed since the first time I installed Ubuntu on my computer is the amount of choice. The amount of choice is daunting, but I wouldn’t have it any other way.
What filesystems do fossBytes readers use? Did we miss any big ones? Let us know in the comments below.

Friday, 24 June 2016

All the Terms Of Hacking World You Should Know

Terms Of Hacking World 


Today we will discuss most common terms used in the hacker community. These definitions are a must to a wanna be ethical hacker and helps a lot for a programming enthusiast.

Common Terms Of Hacking World:

1#DDoS: DDoS  means Distributed Denial of Service. This is a type of DOS attack in which multiple compromised systems are used and these systems are often infected with a Trojan. All these infected systems select a target and cause a Denial of Service (DoS) attack.

2# VPS: It stands for Virtual private server (VPS) . It is a virtual machine that is sold as a service by an Internet hosting service. A VPS generally runs its own copy of an operating system, and the customers have superuser-level access to that operating system instance, so they can install almost any software that runs on that OS.

3# SE: Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

4# HTTP: The Hypertext Transfer Protocol (HTTP) is an application protocol for  collaborative, distributed, hypermedia information systems. HTTP is the basis of data communication for the World Wide Web. The part  Hypertext is a structured text that makes use of logical links (hyperlinks) between nodes containing text.

5# SSH: Secure Shell( SSH)  is a cryptographic i.e, encrypted network protocol that operates at layer 7 of the OSI Model. It allows remote login and other network services to operate in a secure way over an unsecured network. In simple words, SSH is used to connect with Virtual Private Servers.

6# FTP: The FTP or File Transfer Protocol is a standard network protocol that is used to transfer files between a client and server using a computer network.

7# XSS (CSS): Cross-site scripting or XSS is a type of computer security vulnerability usually found in web applications. This vulnerability allows hackers to inject client-side script into web pages which are viewed by other users.

8# Script Kiddie: A Skiddie or Script Kiddie is an unskilled individual who uses programs or scripts developed by other hackers to attack networks and computer systems even to deface websites.

8# VPN: A Virtual Private Network or VPN helps in extending a private network across a public network, such as Internet. It allows the users to send and receive data across public or shared networks just like their computing devices are directly connected to the private network. Hence this benefit from the security, functionality and management policies of the private network.

10# Nix: Nix is a very powerful package manager for Linux and other Unix based systems that make package management reproducible and reliable. It provides side-by-side installation of multiple versions of a package, atomic upgrades and rollbacks,  easy setup of build environments and multi-user package management.

11# SQL:  Structured Query Language or SQL is a special-purpose programming language designed for managing data contained in a relational database management system (RDBMS), or even for stream processing in a relational data stream management system or RDSMS.

12# FUD: Fully undetectable or FUD in short, can stand for data that had been encrypted, making it appear to be random noise. This term is used in hacker circles to refer something as a clean software to many anti-viruses but still contain some kind  of hacking tool inside it.

13# LOIC/HOIC: The Low Orbit /High Orbit Ion Cannon, often abbreviated to LOIC/HOIC. It is an open source denial-of-service attack and network stress testing application written in BASIC and is designed to attack as many as 256 URLs at a time.

14# Trojan: A Trojan or Trojan horse is a type of malware that disguises itself as a legitimate software. these Trojans can be employed by hackers and cyber-thieves trying to gain access to users’ systems. Users are typically tricked  into loading and executing Trojans on their systems.

15# Botnet: A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet.

16# SQL Injection: SQL injection is a famous code injection technique, commonly to attack data-driven applications.In this attack, malicious SQL statements are inserted into an entry field for execution.

17# Root: Root is the Highest permission level on a computer that allows the user to modify anything on the system without a  single restriction.

18# Warez: Warez is copyrighted works distributed without fees or royalties, and may be traded, in general, violation of copyright law. Warez are generally unauthorized releases by organized groups, as opposed to file sharing between friends or large groups of people with similar interest using a darknet. Warez are not usually commercial software counterfeiting.

19# White Hat Hacker: A white hat hacker is a computer security specialist ( ethical hacker ) who breaks into secured systems and networks to test and assess their level of security. These are the good guys in the hacking community and use their skills and knowledge to to improve security by exposing vulnerabilities before a malicious hacker (also known as black hat hackers) detects and exploits them.

20# Black Hat Hacker: A black hat hacker is an individual with very good computer knowledge and with a sole purpose to bypass or breach internet security for malicious reasons. Black hat hackers are also known as dark-side hackers or crackers. These are the guys with whom White hat hackers have to fight all the time.

21# Grey Hat Hacker: The term Grey Hat hacker refers to a computer hacker or computer security expert who sometimes violate laws or typical ethical standards, for personal purposes but don’t have the malicious intentions like a typical black hat hacker.

22# Rootkit: A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words “root” and “kit”. This kind of virus can be easily removed by booting the computer in safe mode.

23# Ring0: Very hard to remove and very rare in the wild, these can require you to format, it’s very hard to remove certain ring0 rootkits without safe mode.

24# IP Grabber: IP Grabber is a link that grabs victim’s IP when they visit it the particular web address.

25# Malware: ‘Malware’ is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.

26# Phreak: Phreak is a slang term coined to describe the activity of a culture of people who  experiment with, explore, or study, telecommunication systems. Phreaker, phreak, or phone phreak are names commonly for and by individuals who participate in phreaking.

27# DOX: Doxing or doxxing, is the Internet-based practice of researching and broadcasting personally identifiable information about an individual. The methods employed to acquire this information include searching publicly available databases and social media websites (like Facebook), hacking, and social engineering. It is closely related to internet vigilantism and hacktivism. Doxing may be carried out for various reasons, including to aid law enforcement, business analysis, extortion, coercion, harassment, online shaming and vigilante justice.

28# Worm: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.

29# Deface: A website deface is an attack on a site that changes the appearance of the site or a certain web page or technically when a hacker replaces the index file with their own one.

30# Keylogger: Keylogger is a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.

31# RAT: A remote administration tool (RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, “RAT” software is usually associated with criminal or malicious activity.


Did you like the article on hacker terms ? Please share it with your friends and let them know this information.

10 Alternatives of TeamViewer

Ever since TeamViewer got hacked, security experts are warning users to ditch it or face problems. The reason is that TeamViewer is being used as a vector of attack. This has happened on other sites where they had no critical information and within 48 hours everyone’s logged in sessions were logged out, an email went around saying you had to click the link in the email (to verify ownership) and set up two factor auth as they knew they were being targeted. TeamViewer must know they are being targeted, and the stakes are high as the software allows complete access to a trusted machine – it’s basically a master key – and there hasn’t been a single response with teeth from TeamViewer.
However TeamViewer developers say that the fault lies with the users. Therefore it would be wise to search for alternatives to TeamViewer which we give here.
Remote Desktop Access is a great way to manage the files on your desktop as well as any other possible location, and also to help your associates with troubleshooting their problems remotely. In other words, remote desktop is a program or an operating system feature that allows the user to connect to a computer in another location, see that computer’s desktop and interact with it as if it were local.
Also, remote desktops are an excellent way to expedite the deployments for developers. Remote desktop applications are used to remotely configure data centers and are the standard in industrial applications.
While the advantages to remote desktop are too good to be overlooked, the right tools are needed to connect with your friends and family safe and secured. One of the most common and widely used Remote Desktop software is ‘TeamViewer’ and we will be looking at a few alternatives that better this tool.
Why the need for TeamViewer Alternative?
While TeamViewer is a useful tool for getting started on remote desktop, it doesn’t provide the simplicity and dependability expected from such a tool. Security is one primary concern that causes many users to flock away from TeamViewer, if not properly configured. If the average user doesn’t configure the settings on this tool correctly, your system is directly put at risk.
Although the personal license version is for free, TeamViewer charges a heavy fee for the business version. Even though TeamViewer features many useful functionality like file transfers, collaborations and mobile access, there are better TeamViewer alternatives should you decide to do away with it.
Here are the 10 best alternatives to TeamViewer that you can look for your remote desktop activities.

1. Windows Remote Desktop Connection

Windows Remote Desktop Connection is a free feature built into the Microsoft Windows Operating System, Ultimate and Business versions that gives fast and complete access control over a remote PC. Supported by Windows and Mac OS X, the tool is simple, easy-to-use and easy to set up that makes this tool a great fit for beginners and amateurs, beginning out on Remote desktop application. This setting can be accessed from the computer’s System settings, found in the control panel. The router of the remote PC needs to be routed on the port 3389 to direct it to your PC. However, this tool is not capable of controlling multiple PC control at a time.
Visit website

2. Join.me

Developed by LogMeIn, Join.me is a premium online conferencing and meeting tool that allows multiple people from multiple locations connect with each other at the same time, which is supported by Windows and Mac OS X. Join.me offers unlimited audio, which means that anyone can join a call from any device, whether that is internet calling (VoIP) or phone lines. It also offers recording, one-click meeting scheduling, and phone numbers in 40 different countries to facilitate worldwide conferencing. The paid versions offers up to 250 participants to join the meeting and a presenter swap lets people share their views across the attendees
While the service is free for basic VoIP, it is $15/mo for Pro plan and $19/mo for Enterprise plans with premium meetings and advanced management.
Visit Website

3. Splashtop

Splashtop offers free and paid remote desktop solutions for individuals and businesses alike. Splashtop is easy to use once you get past the difficulties with installation. Supported by Windows, OS X, Linux, Android and iOS, Splashtop remote PC access software offers fast connections and multiple levels of security. You can use the tool for Free if you are using it for personal purposes on up to 5 computers. Setting up the tool on your Windows or Mac and accessing remotely over your Android or iOS based mobile phone is what Splashtop achieves pretty enormously. There is minimum latency on audio and video streaming, so that makes it easier for you to even enjoy your media remotely.
It is free for 6 months, after that $1.99/month (Individual use) and $60/year per user for businesses.
Visit Website

4. Real VNC

RealVNC provides both free and paid versions of the Remote Desktop Client. The software consists of a server and client application for the Virtual Network Computing (VNC) protocol to control another computer’s screen remotely. Somewhat more complicated that setting up TeamViewer, RealVNC offers the dependability and features like cross-platform remote control, VNC authentication, encryption, file transfer, collaboration tools and chat, to ensure that your remote connection bodes well for the person on the other end of it. The cross-platform utility allows you to connect individually to a remote computer or also connect multiple PC’s behind a public IP Address.
The supported platforms for this software are Windows, Mac OS X, Linux, UNIX, Ubuntu, and Raspberry Pi. The software is free for private use, while it is $30 per desktop for Personal Commercial Use and $44 per desktop for Enterprise Use.
Visit website

5. Ammyy Adminn

Ammyy Admin is free of charge, fast and easy way to gain remote sharing and remote desktop control solution for both individuals and businesses alike. Unlike heavy remote desktop software, the tool comes in as a tiny application under 1MB. In addition to remotely connecting to the other system, you can also perform actions like file transfers and live chat. Supported by Windows, secure connection and easy to manage software makes Ammyy Adminn one of the most preferred free remote desktop clients.
While it is free for non-commercial uses, the Starter, Premium and Corporate licensed tools are priced at $33.90, $66.90 and $99.90 respectively.
Visit Website

6. Ultra VNC

UltraVNC is a free tool based on the VNC technology that is developed for systems based on Windows to remotely access other systems. It offers a simple setup process that gets you connected in a matter of minutes. Once the connection is established, you can completely work on another remote system. This tool also allows file transfer that makes it a useful little free tool for quickly establishing a remote connection and getting your work done.
Visit Website

7. LogMeIn Pro

LogMeIn offers one of the best remote desktop solutions for Windows and Mac OS X for individuals and businesses. Even though the free version of LogMeIn was discontinued recently, that doesn’t keep it from being listed as one of the best alternatives to TeamViewer. In spite of this, LogMeIn still serves as one of the best premium alternatives to TeamViewer with many key features like file transfer, audio and video streaming, full-remote access to transfer files, print documents to a local printer and share documents with collaborators. Although priced somewhat less than the TeamViewer app, LogMeIn offers features that are non-existent in many remote desktop applications of its kind.
It is $99/year for individuals (Access up to 2 computers), $249/year for small businesses with 5 computers and $449/year for Businesses with 10 computers.
Visit Website

8. WebEx Free

Cisco’s WebEx free and premium tool allows you to remotely connect with people based on different systems through the free mobile or desktop applications. These remote desktop setups although have to be an attended one on the other side. The one hosting the meeting could share his desktop and choose to pass over the control of mouse and keyboard to other presenters. Sharing files, chat and face-to-face live interaction, scheduling in Outlook, Password protected messages are also capable with this tool. Supported by Windows, Mac OS X, Linux and Mobile Apps, Cisco’s WebEx would be a great fit for your needs if you are looking for a premium business solution or just for remotely accessing a desktop with added bit of interaction to it.
While it is free for 3 People, paid plans include Premium 8 ($24 per month for up to eight attendees), Premium 25 ($49 per month for up to 25 attendees) and Premium 100 ($89 per month for up to 100 attendees.)
Visit Website

9. Chrome Remote Desktop

This free tool is available as an extension for Google Chrome browser, accessible on any operating system running it and is fully secured. Setting up is simple and the add-on costs nothing in addition to providing an easy-to-use setup for getting your remote desktop connected. The add-on lets users remotely access any desktop and its contents right from their browser.
Visit Website

10. Mikogo

Mikogo is a great premium tool for businesses and individuals with commercial purposes, even though priced a bit heavily for business users. The tool is completely browser based and does not need software or plugin installations. Mikogo provides its software as native downloads for Windows, Mac OS X, Linux, iOS and Android. The software is cross-platform which allows a presenter to host the online meeting on a Windows computer and meeting attendees could join from a Windows, Mac, or Linux computer, as well as from smartphones or tablets. The software interface is multi-lingual and can be switched between one of 35 languages. It also has other features such as share documents, swap presenter, remotely control a desktop, free mobile apps, video conferencing, multi-user whiteboard, file transfer, chat and more.
It is $13 per month for 3 participants, $19 per month for 25 participants, $39 per month for 25 participants and unlimited hosts and $78 per month for 25 participants with 3 session channels.
Visit Website

Sunday, 6 March 2016

Li-Fi technology: Transfer rate up to 224 Gbps!

What is Li-Fi?

Li-fi is a new way of communication between mobile devices. It is based on the fact that intensity of a light emitted through an LED can be modulated. It can be increased or decreased in such a way which can be used to transfer data. This modulation is performed in such a way that it can’t be seen with a human eye.
Li-Fi technology was introduced by Professor Harald Haas of the University of Edinburgh. He demonstrated this technology in his TED talk in 2011 which has attracted more than 1.7 million viewers.

How does Li-Fi work?

LED are small diodes which emit photons when current is applied. If current is varied, the intensity of LED also varies. Photons are emitted from LED which can be received by a receiver unit. If this beam of photon is modulated, it can be used to send information at the speed of light which can later be demodulated. Because LED are semiconductor devices, this modulation can take place at much higher speed than what a human eye can perceive.
Such LED devices can be fixed in ceiling which will provide us light for daily use and a light fast internet connection as well.

Li-Fi


Features:

Li-Fi provides much better features than Wi-Fi technology.
High speed data transfer
Since light is the medium through which data is being sent, it is the fastest way of data transfer . It is so far measured to be about 100 times faster than some Wi-Fi implementations, reaching speeds of 224 gigabits per second. Parallel data transfer is also possible which makes it even more efficient and faster.
Low cost implementations
If costs lower than Wi-Fi and other radio devices. It uses fewer component to transfer data.
Efficiency and safety
LED are already efficient semiconductor devices and requires very low voltages to operate. Like Wi-Fi it doesn’t spread waves with signals and data everywhere in the environment which can be picked up by other devices and that makes it much more safer.

Conclusion:

Li-Fi will revolutionize the world by providing lightning fast data transfer speeds to a normal users. With this technology it is estimated that you will be able to download more than 20 movies of 1Gb size each in just 1 second. Wow!

Saturday, 5 March 2016

Why am I getting I/O Error #2038 in dailymotin when uploading to My Files?

 
 
 
This error has to do with the way security is handled inside of the Adobe Flash Player browser plugin.  There are multiple versions of the plug-in that behave differently depending on which browser you use (Internet Explorer, Firefox, Chrome, etc.).  Our uploader uses the Flash plugin to make uploading multiple files at once possible.  If the Flash Player is not installed on your computer, or your Flash browser plugin is disabled, you will only be able to upload one file at a time.
 
Our uploader is configured to bypass Adobe's internal security handling procedures (which is part of the reason this error occurs), however, from time to time updates to the Flash Player can apparently interfere with this.  The fun part is that it doesn't affect everyone or every browser the same way, or even at all and unfortunately there is nothing we can do from our end when this occurs.
 
Here are some possible solutions:
  1. Make sure your internet browser is up to date by checking its About page (usually found under the "Help" option on the main menu).
  2. Try using another internet browser that is already installed on your computer (or get Firefox, Chrome, or Safari).
  3. Close any open internet browser windows.  Go into your computer's programs area where you can see what all is installed and uninstall Adobe Flash Player and any references to Flash Plugin (may have the name Shockwave or Macromedia), then go to http://get.adobe.com/flashplayer/ to download and install the latest version of it.
  4. If all else fails, go into the settings, extensions, or plugins area of your internet browser(s) and disable the Flash Player plugin so you can at least do single file uploads until a patch or update to the Flash Player is released (you'll usually know because your computer will visibly remind you about the update).

Tuesday, 16 February 2016

10 Online Activities That Can Get You Arrested

10 Online Activities That can get you Arrested

Any of these 10 online activities could land you in jail in some part of the world

Internet is an unrestricted realm for its users. It brings you latest information, allows you to share movies, images and music without any bounds, allows you to communicate in a split second and share files. It is a medium which is full of advantages, but there are some disadvantages that come with it in some countries. Particularly if you don’t follow certain rules and regulations laid down by these countries while using the Internet.
Cyber crimes and terrorist attacks have dramatically increased over the years and that may be one of the reasons that if one is seen violating rules of Internet, he/she may be put behind the bars.
So, see the below activities that can get you arrested in some parts of the world.

10 Online Activities That Can Get You Arrested

#1 Having An Open Wi-Fi

Have an Open Wi-Fi
Keeping your WiFi Open and not keeping it password protected can sometimes land you in prison. Your open Wi-Fi connection can be used by criminals or terrorists without your knowledge and this can land you in trouble with the law in almost any country.
This happened with a person name Barry Covert whose open WiFi was used by his neighbor to access child pornography websites. Though, police arrested his neighbour after investigations, Barry had to face the police questioning for a month before the correct person was arrested.
It is always better to password protect your Wi-Fi with WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2).

#2 Deleting Your Search History

Deleting Your Search History
Sometimes erasing your search history can also land you behind bars. This happened in United States, when a person namely David Kernell was arrested for deleting information on his computer. A University of Tennessee student, Kernell was being investigated by federal authorities for allegedly hacking Yahoo Account of the then vice presidential candidate, Sarah Palin.
India to had brought about laws making it mandatory for users to save their browsing history for 3 months. But the same was scrapped after there was huge public outcry against it.

#3 Offensive Posts, Messages or Tweets

Offensive Messages or Tweets
Making offensive posts or tweets or sending offensive messages can land you in trouble in any part of the world. Two persons from Leigh Van Bryan aged 26 and Emily Bunting aged 24 tweeted about their upcoming visit to USA, “Free this week for a quick gossip/prep before I go and destroy America”.
They were interrogated for about five hours by the authorities. Bryan and Bunting tried to convince the police that “Destroying” was a British  slang for “Partying.”

#4 Using VOIP services

Using VOIP services
This issue is country specific and only limited to Ethiopia. Using VOIP services like Skype is strictly prohibited in Ethiopia and can land you in prison (An user from Ethiopia has contradicted this). The country’s new telecommunications law strictly prohibits VOIP services, which consist of audio and video communication and transfer of information over VOIP clients. We advise you that if you are citizen or tourist of Ethiopia, kindly check up with authorities before using Skype or any other VOIP services.

#5 Dancing in a Video

Dancing in a Video
This is a serious offence in Iran. In fact, six persons were arrested for dancing to a video from Pharrell Williams song “Happy”. The Iranian judiciary found them guilty and they received 91 lashes as well as year’s prison sentence. Though later, the sentences were suspended and they were let off in six months.
In Russia, a youth was jailed in Russia for 15 days and two women were jailed for 10 days after they were found to be allegedly dancing and making a video near a second world war memorial.

#6 Leaving Internet Comments

Leaving Internet Comments
Syria is now a battlefield between different warring factions for control of territory. Even then, commenting on the Internet is a crime in Syria. Human Rights Watch reported that in 2007, Syrian authorities arrested two person and they were shifted to unknown place, apparently for offering their comments about the censorship laws in Syria on a website.

#7 Translating Articles

Translating Articles
Translating banned books can land you in jail in any country. Thailand authorities arrested an American citizen who translated one such article on his blog. The article was termed as “offensive to the autocracy” by the Thai authorities who consider their King as a supreme being. Even posting on Facebook/tweeting against the King can land you in jail in the Lese Majeste laws.
In Indonesia, a person was put behind bars for two years after he posted “God does not Exist” on “Facebook”.

#8 Gambling

Gamble
Online gambling is banned in many countries across the globe and can land you behind the bars. This includes if you organize gambling or play online games like Poker, Blackjack etc.

#9 File Sharing

File Sharing
File sharing is a contentious issue. In some countries you are free to share movies, images or files without the worry of the law but in many countries it is illegal to share what is considered as pirated content. In some places even downloading torrents is considered as being unlawful.

#10 Posting Lyrics on Facebook

Posting Lyrics on Facebook
This may have happened only once. Unites States authorities arrested rapper and school student, Cameron D’Ambrosio for posting rap lyrics on Facebook. The police allege that D’Ambrosio made terrorist threats under the garb of rap. Prosecutors sought to charge D’Ambrosio with threats to make a bomb or hijack a vehicle, carrying a maximum sentence of 20 years in prison.
There are many such laws which can put in a spot of bother while surfing online. Making racist comments or hurting religious sentiments is a strict taboo online like it is in the real world. If you know of any other such unknown laws exist in some country, kindly note them down in the comments section.