Posts

Showing posts from August, 2018

cPanel - Quick Guide

Image
INTRODUCTION cPanel is a Linux-based hosting management control panel. It is used to manage your website and server’s backend working system. It provides graphical user interface for most of the tasks we perform on the website’s server, for example, uploading files, creating emails, setting cron jobs, handling databases, etc. cPanel Users cPanel is installed on a Linux system by the server administrator. With the help of the cPanel Software Server, an Administrator can create Virtual Private Servers or it can dedicate the whole server for shared hosting environment. cPanel Shared hosting has three types of user levels. Server Administrator − This user is the root user of a cPanel Linux Server and has all the permission over the server. Server Admin can create, modify or delete any account from the cPanel Server. The Server Admin has access to cPanel WHM (Web Host Manger), which can be understood as the backend of cPanel. Reseller Accounts − This user is created by the server...

How To Registering a Domain Name

Image
Registering a Domain Name If you have a website developed locally or you have planned to make a website, then there are two things that you will need — a Domain Name and Web Hosting. A Domain name is the address of your website, which will be used by your users to access it. For example, tutorialspoint.com or google.com these are domain names. A domain name has two parts, TLD (Top Level Domain) and SLD (Second level domain), for example in tutorialspoint.com, tutorialspoint is second level domain of TLD .com, or you can say it’s a subdomain of .com TLD. There are many top level domains available, like .com, .net, etc. and also country specified TLD like .in, .uk, .ae, etc. Importance of a domain Getting a domain name of your choice can be very useful. You can use it for many reasons, for instance, you can create the identity of your brand online or you can create a personal blogging website. If you have a business, people will be able to learn about your business remotely. Regis...

What is Web Hosting And Types Of Webhosting

Image
Getting Web Hosting If you have already registered your domain name, the next step is to get a web hosting for your website. Web hosting is a service, which provides space for your website on internet. If you want your website to publish online, then you will have to get web hosting service. In a web hosting service, your website is stored in high powered computers called web servers, which are connected to a high speed network and they are powered-on 24/7. While purchasing a web hosting service, you rent a space for your website on these servers. There are basically three types of web hosting − Shared Hosting − In this type of web hosting, a single server hosts multiple websites, sometimes thousands of them. Each account on this server has certain limits on using disk space to store websites, databases and bandwidth. This is the amount of data transferred through your website. This type of hosting is cheap and suitable for small and medium websites. Virtual Private Servers ...

What is Nameserver and Setting Up

Image
Setting Up Nameserver When you have purchased your hosting, you will have to connect your domain with the hosting that you have purchased. If you have purchased the domain and hosting from the same provider, then it is liable that your Nameservers are already setup. If you have purchased your domain and hosting from different providers, then you will have to manually add new Nameservers to your domain, so that it can point your domain to the right server. Nameservers are a part of Domain Name System. These DNS servers keep the records of which domain is connected to which IP address. Nameservers allow us to use a domain instead of IP address of the DNS server. When a visitor types the URL of your domain then the DNS server tells the browser that from which server it should load content from. In easy words, Nameservers define the current DNS provider of your domain. When you get the email of the Login details of your web hosting server along with it, you also get the details o...

Facial Recognition System and Iris Recognition System

Image
Facial Recognition System Facial recognition is based on determining shape and size of jaw, chin, shape and location of the eyes, eyebrows, nose, lips, and cheekbones. 2D facial scanners start reading face geometry and recording it on the grid. The facial geometry is transferred to the database in terms of points. The comparison algorithms perform face matching and come up with the results. Facial recognition is performed in the following ways − Facial Metrics − In this type, the distances between pupils or from nose to lip or chin are measured. Eigen faces − It is the process of analyzing the overall face image as a weighted combination of a number of faces. Skin Texture Analysis − The unique lines, patterns, and spots apparent in a person’s skin are located. Merits of Facial Recognition System It offers easy storage of templates in database. It reduces the statistic complexities to recognize face image. It involves no physical contact with the system. Dem...

Fingerprint Recognition System

Image
INTRODUCTION It is the most known and used biometrics solution to authenticate people on biometric systems. The reasons for it being so popular are there are ten available sources of biometric and ease of acquisition. Every person has a unique fingerprint which is composed of ridges, grooves, and direction of the lines. There are three basic patterns of ridges namely, arch, loop, and whorl. The uniqueness of fingerprint is determined by these features as well as minutiae features such as bifurcation and spots (ridge endings). Fingerprint is one of oldest and most popular recognition technique. Fingerprint matching techniques are of three types − Minutiae Based Techniques − In these minutiae points are found and then mapped to their relative position on finger. There are some difficulties such as if image is of low quality, then it is difficult to find minutiae points correctly. Another difficulty is, it considers local position of ridges and furrows; not global. Correlation Base...

Ethical Hacking Process

Image
Reconnaissance Reconnaissance is the phase where the attacker gathers information about a target using active or passive means. The tools that are widely used in this process are NMAP, Hping, Maltego, and Google Dorks. Scanning In this process, the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited. The tools used in this process are Nessus, Nexpose, and NMAP. Gaining Access In this process, the vulnerability is located and you attempt to exploit it in order to enter into the system. The primary tool that is used in this process is Metasploit. Maintaining Access It is the process where the hacker has already gained access into a system. After gaining access, the hacker installs some backdoors in order to enter into the system when he needs access in this owned system in future. Metasploit is the preferred tool in this process. Clearing Tracks This process is actually an unethical activity. It has to do w...

What is Batch Programming?

Image
Batch Programming :- Batch file programming is nothing but a batch of DOS ( Disk Operating System ) commands, hence the name Batch programming . If you are into coding and know many languages you might have noticed that Operating System ( OS ) specific languages ( languages that work only on a particular operating system, eg: Visual Basic Scripting works only in Windows ) give you amazing control over the system. This is why Batch is so powerful, it gives you absolute control over DOS. Batch isn’t often used because it is OS specific, but it is fun and easy to learn. A well-conceived batch file is just the thing to automate the job you want to do. Batch Files are stored with .bat extension. To create a batch file follow the following steps.. 1) Goto-> Notepad 2) Type Whatever you want ( the code you want to enter) 3) Goto-> Save as 4) Change the file type to all files and folder 5) name the file as anything you want with the extension .bat ,For eg…(“learnbatch.bat”) Som...

SEO - What is SEO?

Image
Introduction SEO stands for Search Engine Optimization. SEO is all about optimizing a website for search engines. SEO is a technique for: designing and developing a website to rank well in search engine results. improving the volume and quality of traffic to a website from search engines. marketing by understanding how search algorithms work, and what human visitors might search. SEO is a subset of search engine marketing. SEO is also referred as SEO copyrighting, because most of the techniques that are used to promote sites in search engines, deal with text. If you plan to do some basic SEO, it is essential that you understand how search engines work. How Search Engine Works? Search engines perform several activities in order to deliver search results. Crawling - Process of fetching all the web pages linked to a website. This task is performed by a software, called a crawler or a spider (or Googlebot, in case of Google). Indexing - Process of creating inde...

Biometrics - Overview

Image
The term Biometrics is composed of two words − Bio (Greek word for Life) and Metrics (Measurements). Biometrics is a branch of information technology that aims towards establishing one’s identity based on personal traits. Biometrics is presently a buzzword in the domain of information security as it provides high degree of accuracy in identifying an individual. What is Biometrics? Biometrics is a technology used to identify, analyze, and measure an individual’s physical and behavioral characteristics. Each human being is unique in terms of characteristics, which make him or her different from all others. The physical attributes such as finger prints, color of iris, color of hair, hand geometry, and behavioral characteristics such as tone and accent of speech, signature, or the way of typing keys of computer keyboard etc., make a person stand separate from the rest. This uniqueness of a person is then used by the biometric systems to − Identify and verify a person. Authenticate...

Language Processor

Image
Introduction As discussed earlier, an important function of system software is to convert all user instructions into machine understandable language. When we talk of human machine interactions, languages are of three types −   Machine-level language − This language is nothing but a string of 0s and 1s that the machines can understand. It is completely machine dependent. Assembly-level language − This language introduces a layer of abstraction by defining mnemonics. Mnemonics are English like words or symbols used to denote a long string of 0s and 1s. For example, the word “READ” can be defined to mean that computer has to retrieve data from the memory. The complete instruction will also tell the memory address. Assembly level language is machine dependent. High level language − This language uses English like statements and is completely independent of machines. Programs written using high level languages are easy to create, read and understand. Program written in high level ...

Computer- Classification

Image
Introduction Historically computers were classified according to processor types because development in processor and processing speeds were the developmental benchmarks. Earliest computers used vacuum tubes for processing, were huge and broke down frequently. However, as vacuum tubes were replaced by transistors and then chips, their size decreased and processing speeds increased manifold. All modern computers and computing devices use microprocessors whose speeds and storage capacities are skyrocketing day by day. The developmental benchmark for computers is now their size. Computers are now classified on the basis of their use or size − Desktop Laptop Tablet Server Mainframe Supercomputer Let us look at all these types of computers in detail. Desktop Desktop computers are personal computers (PCs) designed for use by an individual at a fixed location. IBM was the first computer to introduce and popularize use of desktops. A desktop unit typically has a CPU (Centr...

What is Trojans?

Image
Trojans   Trojans are non-replication programs; they don’t reproduce their own codes by attaching themselves to other executable codes. They operate without the permissions or knowledge of the computer users. Trojans hide themselves in healthy processes. However we should underline that Trojans infect outside machines only with the assistance of a computer user, like clicking a file that comes attached with email from an unknown person, plugging USB without scanning, opening unsafe URLs. Trojans have several malicious functions − They create backdoors to a system. Hackers can use these backdoors to access a victim system and its files. A hacker can use Trojans to edit and delete the files present on a victim system, or to observe the activities of the victim. Trojans can steal all your financial data like bank accounts, transaction details, PayPal related information, etc. These are called Trojan-Banker. Trojans can use the victim computer to attack other systems usin...

What is Booting?

Image
Booting Starting a computer or a computer-embedded device is called booting. Booting takes place in two steps − Switching on power supply Loading operating system into computer’s main memory Keeping all applications in a state of readiness in case needed by the user The first program or set of instructions that run when the computer is switched on is called BIOS or Basic Input Output System. BIOS is a firmware, i.e. a piece of software permanently programmed into the hardware. If a system is already running but needs to be restarted, it is called rebooting. Rebooting may be required if a software or hardware has been installed or system is unusually slow. There are two types of booting − Cold Booting − When the system is started by switching on the power supply it is called cold booting. The next step in cold booting is loading of BIOS. Warm Booting − When the system is already running and needs to be restarted or rebooted, it is called warm booting. Warm booting...