Skip to main content

Posts

Showing posts from 2016

Popular posts from this blog

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. The CISC approach attempts to minimize the number of instructions per program, sacrificing

DHCP principle , DHCP server and client communication process

1. Explain with principle: the DHCP server and client communication process DHCP stands for Dynamic Host Configuration Protocol. It handles the automatic assignment of IP addresses and other configuration settings for devices on your network. DHCP automates Network and Sharing Center in your control panel. This is especially good for people who have laptops, aren't hooked up to the Internet all the time and often move from place to place with their portable devices. They can simply get a new IP address as needed without having to do it manually. DHCP is designed to make the assignment of IP addresses and other network configuration information faster and easier. DHCP is a protocol that uses Level 4 on the OSI model. It communicates using User Datagram Protocol (UDP) datagrams through UDP Port 68. DHCP works with most current and past Windows clients, and also Linux, Macintosh, and many network-capable printers. DHCP is desi

Recommendation System literature review | Building a recommendation system

People have always relied on the recommendations from their peers or the advice of experts to support their decision making. Amazon.com has been using collaborative filtering for a decade to recommend products to their customers, and Netflix valued improvements to the recommender technology underlying their movie rental service at $1M via the widely published Netflix Prize [6]. Research on recommender algorithms garnered significant attention in 2006 when Netflix launched the Netflix Prize to improve the state of movie recommendation. The objective of this competition was to build a recommender algorithm that could beat their internal CineMatch algorithm in offline tests by 10%. It sparked a flurry of activity, both in academia and amongst hobbyists. The $1 M prize demonstrates the value that vendors place on accurate recommendations [8]. Recommender Systems provide the users with the suggestions of information that may be useful to the users to make their decisions on various sit
                                                   Easily bypass MAC FILTERING HAVING OPEN SECURITY                                     -------------------------------------------------------------- hello everyone  today i m going to show how to hack mac-filtered wifi in kali linux v 2.0.....  Check if you are in range of the wifi network you want to target......  if it is mac-filtered wifi you cannot acess to the wifi even the network is open.... (i am trying to connect mac-filtered wifi. having open security......lets see what happens) it is open but i cant connect to the wifi as it is mac filtered...... :( but dont worry :) .....just follow me Commands.....       # airmon-ng            (check your interface if it is wlan0 or wlan1 )       # airodump-ng wlan0        (mine is wlan0)    press CTRL+C after you found your target network  then type in following commands....       airodump-ng -c BSSIDchannelNo.  --bssid XX:XX:XX:XX wlan0         you have wait until mac-adresses  appear be

How to create a Sign Up form in html page #using#html#only

<form action="demo_form.asp"> Your Name:<br>   <input type="text" name="fname" placeholder="First name">   <input type="text" name="lname" placeholder="middle name"><br> <input type="text" name="lname" placeholder="Last name"><br> <br> Email:<br> <input type="email" name="Email" placeholder="@something.com"> <input type="email" name="Email" placeholder="re-enter email"><br> Password:<br> <input type="Password" name="Password" placeholder="password.."> <input type="Password" name="Password" placeholder="re-enter password.."><br> Gender:<br> <input type="radio" name="gender" value="male" checked> male<br> <inpu

TYPES OF BIOMETRIC TECHNOLOGY, Application of Biometric Technology, Some Developing biometrics,some limitations of Biometrics

                     TYPES OF BIOMETRIC TECHNOLOGY In biometry,   there are two types of   biometric   methods.One is called behavioral biometrics.   It is used for verification purposes. Verification is determining if a person is who they say they are. This method looks at patterns of how certain activities are performed by an individual . Physical biometrics is the other type used for identification or verification purposes. Identification refers to determining who a person is. This method is commonly used in criminal investigations. 4.1 Biometrics Based On Physical Character 4.1.1       Fingerprint/ Palmprint Identification or Recognition This type of biometrics compares two fingerprints to determine identification. It analyzes the ridges and valleys patterns on the fingertip for differences. These fingerprint patterns include the arch, loop, and whorl. In   biometric   forensics, fingerprint identification is useful for narrowing down suspects. Some laptop computers u

HOW BIOMETRIC SYSTEMS WORKS?

1.     HOW BIOMETRIC SYSTEMS WORKS? Instead of using something you have (like a key) or something you know (like a password), biometrics  you are   to identify you. Biometrics can use   physical characteristics, like your face, fingerprints, irises or veins, or   behavioral characteristics   like your voice, handwriting or typing rhythm. Unlike keys and passwords, your personal traits are extremely difficult to lose or forget. They can also be very difficult to copy. For this reason, many people consider them to be safer and more secure than keys or passwords. Biometric systems can seem complicated, but they all use the same three steps: ·          Enrollment : The first time you use a biometric system, it records basic information about you, like your name or an identification number. It then captures an image or recording of your specific trait. ·          Storage : Contrary to what you may see in movies, most syst