Cryptography
Cryptograthy is used for security. Simply Cryptography is converting the understanable text to not understanable text.
Encryption means converting plaintext into cipher text.
Decryption means converting cipher text into plain text.
Purpose of cryptograthy
Cryptography is used to protect the data from theft. And also used for user authentication.
Types of Cryptographic algorithms
There are 3 types of cryptographic algorithm. They are
- Secret Key Cryptography
- Public Key Cryptography
- Hash Functions
Secret Key Cryptography:
This cryptography is also known as Symmetric. Uses single key for both encryption and decryption.
Public Key Cryptography
This cryptography is also known as Asymmetric. Uses Two key for encryption and decryption. One for encryption and other for decryption.
Hash Function
This type uses mathematical transformation to encrypt and decrypt the data.
How should a person start hacking??
That means what should be the first step of him in the world of hacking??
Hacking is not a thing which someone can learn from others. But, ya at first he should see how hackers work, and also have a look on the new hacking tips!!
He should be very much active and all the time should keep his eyes in the world of computing, and the best way to do is Internet Surfing especially GOOGLE.
You can search different things everyday,and by reading then you will know the computing world very well!! Then you can search the hacking tips and should understand yourself,
How these are working !! Doing all these things you will get confidence and also get knowledge!!
Then you can think the things yourself on your own view and that will be the start of your own hacking .
What is a Virus?
A virus is a program that is able to replicate, that is create (possibly modified) copies of itself. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file and are spread as files that are copied and sent from individual to individual. The replication is intentional, not just a side-effect.
Several years ago, most viruses spread primarily via floppy disk, but the internet has introduced new virus distribution mechanisms. With email now used as an essential business communication tool, virus are spreading faster than ever. Viruses attached to email messages can infect an entire enterprise in a matter of minutes, costing companies millionsof dollars annually in lost productivity and clean-up expenses.
More than 60,000 viruses have been identified, and 400 new ones are created every month, according to the International Computer Security Association (ICSA).
Life Cycle of a Virus:
The life cycle of a virus begins when it is created and ends when it is completely eradicated. A virus has to attach itself to a "host", in the sense that execution of the host implies execution of the virus. The following outline describes each stage of its life cycle.
Creation : Until recently, creating a virus required some knowledge of the computer programming languages. Today anyone with basic programming knowledge can create a virus. Typically, individuals who wish to cause widespread, random damage to systems create viruses. A virus may be modified, either by the original author or someone else, so that a more harmful version of it appears.
Replication : Viruses typically replicate for a long period of time before they activate, allowing plenty of time to spread.
Activation : Viruses with damage routines will activate when certain conditions are met, for example, on a certain date or when the infected user performs a particular action. Viruses without damage routines do not activate, instead causing damage by stealing storage space.
Discovery : When a virus is detected and isolated, it is sent to the anti-virus software developers. Discovery normally takes place atleast one year before the virus might have become a threat to the computing community.
Assimilation : At this point, anti-virus software developers modify their software so that it can detect the new virus.
Eradication : If enough users install up-to-date virus protection software, any virus can be wiped out. So far no viruses have disappeared completely, but some have long ceased to be a major threat.
Some Other Terminologies:
Trojan : A Trojan is a program that pretends to do something useful or interesting, but when it is run, it may have some harmful effect, like scrambling the FAT (File Allocation Table), formatting the hard disk or releasing a virus. The main difference between a Trojan and a virus is the inability to replicate. Trojans cause damage, unexpected system behavior, and compromise the security of systems, but do not replicate. If it replicates, then it should be classified as a virus.
Malware : Short for malicious software - refers to any malicious or unexpected program or code such as viruses, Trojans, and droppers. not all malicious programs or codes are viruses.
Worms : Unlike viruses, worms do not require a host.
Boot Sector Viruses : This virus infects boot sectors on diskettes and / or hard disks. It replaces the original boot sector with itself and stores the original boot sector somewhere else.
There some tricks with the use of which you can apply security and also will get some knowledge
1.) To see internal & external IP :
a. Internal IP
method 1st
steps : a. My N/W Places [ right click ]
b. properties
c. Lan [ right click ] --> properties
d. TCP/IP settings
e. properties
f.We can see the manually configured IP address
method 2:
steps : a. go to run
b. type cmd
c. on smd prompt, write ipconfig/all
d. after this cmd, we can see the ip address & other imptortant things also.
method 3:
steps : a. got to taskbar[ LAN icon ]
b. right click
c. go to satus
d. click on support
e. now u can see IP
b. External IP
method 1st :
www.whatismyip.us
method 2:
www.whatismyip.com
2.) To Block Website :
method 1st :
steps: a. open the "c" drive [ the only drive in which window is installed ]
b. windows
c. drivers
d. etc
e. hosts
f. open in notepad
g. type the website which u want to be block( at the place of local host )
h. save this
i. check taht, site blocked or not.
method 2:
steps: a. got to internhet explorer properties
b. privacy
c. sites
d. type the address of website which u want to be block
e. ok & then apply
f. check that blocked or not.
3. To find the MAC address
method 1:
steps: a. got to task bar
b. Right Click --> status
c. support
d. details
e. We can see the MAC address
method 2:
steps: a. My N/W places
b. Right click --> properties
c. LAN R.C. --> status
d. support
e. Details
6. then see the MAC address
other names of MAC address :
a. Physical
b. N/W
c. hardware address
d. LAN address
e. Ethernet address
4.) To hide the MAC address
steps: 1. My N/W places
2. Right click --> properties
3. LAN [ Disable the LAN ]
4. Go To Lan properties
5. TCP/IP
6. Configure [ ask for proceed , click on " yes" ]
7. advanced
8. Locally Administered address [ select it]
9. click on the value
10. type the new MAC address [ 12 HexaDecimal code ]
11. ok
12. Enable LAN
13. we cna see the new MAC address
14. Restart [ for old MAC address ]
5.) NETMEETING :
Netmeeting is the feature of windows through which we can communicate, chat, file transfer and desktop share with all the pc connected through same LAN.
it dont need any internet connection
steps: 1. configure the netmeeting
2. type on run command - " cong "
3. after that a wizard of netmeeting will appear
4. click next --> next
5. In netmeeting we can share desktop, chat, file transfer, painting
6. Suppose that these are two ppc PC1 & PC2 , Pc1 wants to take the desktop of Pc2, then first it will call through IPaddress, if PC2 acept the call, then it can take the desktop of pc2.
Now call the another pc with the help of IP address of anotehr pc. and enjoy
Hope u will like it. please give ur comments
MOBILE POWER CONSERVATION
INTRODUCTION:
· In today’s world of mobile communications, one of the most precious commodities is power. The mobile can only operate as long as its battery maintains power.
· Most software-level techniques have concentrated on non-communication components of the mobile host, such as displays, disks and CPUs.
· A mobile phone can only guess about when other hosts may have data destined for it. If the suspension of the mobile host’s communication does not match pervading communication patterns, the isolation can cause batteries to overflow both in the mobile host and in other hosts trying to communicate with it.
Communication Model And Power Management
The introduction of wireless finks into communication systems based on wired finks has posed a number of problems. These problems include different loss characteristics and bandwidth capabilities on the wired and the wireless Erie, synchronization of disconnected operations, and issues involving packet forwarding. The obvious technique of data compression reduces the amount of transmission time, but requires additional CPU cycles for performing compression.
Communication-Based Power Management
Currently, a typical mobile host leaves its wireless Ethernet card in receive mode during the time it is not being used, less the user explicitly removes the card. The technique described in this section provides mechanisms to extend battery lifetime by suspending the wireless Ethernet card during idle periods in communication.
In order to determine the impact of our power management techniques, we measure the power consumption of a wireless Ethernet card under varying conditions.
More Articles …
Subcategories
Web Hosting
Web Hosting is a service offered by web hosting providers to the individuals and organizations to make their websites accessible on the internet. Depending on the requirement, one can avail different types of web hosting such as shared hosting, dedicated hosting, virtual private hosting, cloud hosting etc.
Page 112 of 193