Facebook has acquired its presence in one of the leading real-time internet search engines across the cyberspace: OneRiot. OneRiot announced recently that it would include the posts that descend from the popular social networking website in its search results. This would suggest that the search engine would implant over 500 million updates that take place from users of the vast social networking site. The real-time internet search engine has more than hundred real-time applications under its prestigious network platform, which it has announced to share with Facebook. The most interesting and advantageous aspect of this dialogue is that the applications that the internet search engine uses is not only web-based but also includes those that can be accessed in mobile devices.
OneRiot has been an ever-growing tree swollen with fruits that it keeps dropping for its users. It has been expanding its resources for the benefit of the users. Apparently, it has struck partnerships with various popular websites, namely, Digg, Twitter and thousands of others spread over the internet. Having struck a deal with Facebook, the internet search engine has got itself more and better opportunities than ever before because of the huge population of Facebook users, which comes to a quantitative figure of 500 million.
The data that would take a count on the search results would include updates by users on Facebook, links posted on users account as well as articles that were publicly liked by the users from all over the internet. This new development is supposed to yield positive results as it would give the users a wide range of choices and would enable them to perform research even when using Facebook. It is also estimated to be advantageous for application developers. The search results would give them an idea of what is happening over the internet. This way, the application developers are bound to stay abreast and get them easily hooked up with what the Facebook users are at present buzzing about.
The accession of Facebook shares is of utmost importance for the OneRiot API. According to OneRiot, offering the application developers with the best real-time search experience is only possible if they are exposed to best understand the happenings around the global network and what the social web is concerned about at the moment. The updates by users and likes are bound to give the developers an idea about what they are.
Facebook has also been getting in close connections with several web search engines to be able to provide real-time results on their search result pages as well. Some of the search engines that have acquired the services of Facebook in their web pages or SERP business include Bing and Google.
|
In the recent times one of the major cyber crimes is password hacking. We should be very careful with our password not to hack as we will be having lot of personal and professional information in our account. It’s not so difficult to keep the password very safe, but one should be very careful when creating the password and using it.
Here are some important tips to make the password difficult for the hackers to hack:-
- Don’t put your password with any word from the dictionary. Because there are some soft wares which will check the password with the dictionary and at one point it will be matched.
- Never check the option “Remember my password” or “keep signed me in” when you go to public net cafe. If you select that, your password will be saved and the person who uses that system can be able access your account.
- Keep in mind that if your password length is more, it will be more difficult for the hackers to hack it. It’s better to have the password with minimum 6 letters.
- Don’t write your password anywhere. If you really want to save it to recollect in future incase if you forget that, write it on a piece of paper and keep it in a very safe place and don’t forget to tear it once you can memorize the password.
- Don’t share your password with anyone, even with your close ones. If you are really in an emergency situation when you can’t access your account, ask them whom you trust the most to do the work for you and change the password immediately once you are able to access your account.
- Keep changing your password at least once a month for accounts which are very important for you that must be never hacked into.
- When creating a password, it should have the following features to make it impossible for the hackers to hack it.
- It should have at least one capital letter and one small letter (as the password field is case sensitive, it will differentiate capital and small letters).
- It should have at least one number and one symbol like &, @, * etc.
- It should have at least 6 to 8 digits.
- Then the password will look like for example Av4k$b9 and it will be nearly impossible for the hackers to hack it.
CRYPTOGRAPHY :Cryptography in layman’s terms would mean the study of creating messages in a form of secret code that masks the actual message and displays it as something completely unintelligible.These cryptic messages make absolutely no sense to the casual observer, but the original content can be reconstructed by the intended recipient. That’s what cryptography is about—it uses complex mathematical calculations and computer science to pull off the job.
ENCRYPTION: Encryption is simply the implementation of cryptography. It is the process by which messages are converted into encrypted files. These files are password-protected by the creator author.Without the password, the file cannot be accessed and the original contents cannot be extracted. On entering the password correctly, the computer decrypts the file,revealing the actual message or data. Prior to encryption, data is simply referred to as ‘plaintext’ but once encrypted, it is called ‘ciphertext’, which means jumbled or puzzled data.
CIPHER: In simple terms, a cipher is a code or a set of instructions. More accurately put, it’s an algorithm that contains precise instructions for encrypting and decrypting data. In the world of encryption, there are two main types of ciphers; the transposition cipher and the substitution cipher. The two work in completely different ways. The former rearranges characters in a file, making them look illogical e.g. the word ‘COMPUTER’ might look like ‘UEORCPTM’ after encryption.The second method completely changes the content to corresponding values, and then reconstitutes it upon decryption, e.g. The word ‘COMPUTER’ might look like ‘YGBLWDJI’. In this example, the letters in both words correspond to each other sequentially starting from the first (A=W,B=X, C=Y, etc).
ALGORITHM: In the field of mathematics, an algorithm is a predefined set of precise instructions for a task to be accomplished successfully, from the initial stage right to the output. For instance, when you try switching on your computer and it doesn’t come on, you check the connections. If connections aren’t ok, you fix them and if they are, you look for a fault somewhere else, ruling out different possibilities at each step. It is an ‘if-then’ principle.
KEYSTREAM: A keystream is a collection or a stream of alphanumeric and special characters combined with the actual message. These characters are either randomly placed or appear to be random in nature.
BRUTE FORCE ATTACK: A brute force attack is an intensive trial-and-error procedure by which a person can try to crack the key or password of a file by trying different combinations of alphanumeric or special characters until the perfect match is found.
1.Open the start menu and click on run
2.In the text box type 'regedit' and press Enter. Registry Editor will Open.
3. open 'HEKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\StorageDevicePolicies' Key
4.If it does not exist , create it with ' Edit|New | Key' and rename it 'StorageDevicePolicies' and select it.
5.Now create a registry value by Right clicking on right side of window and select 'New| DWORD' and rename it with ' WriteProtect'
6.Now right click on it and select 'Modify' and set the value 1
now close the registry editor and restart the computer.
Now ,Your data is protected. NO one can copy you data by USB DRIVES.
When you wants allow the pen drive, change the value 0 from 1 nd restart computer.
Pen-drives will allow to copy data.
Have a FUN!!!!!!!!!!!!!!
More Articles …
Page 8 of 24