Posts

Showing posts from 2014

Best CMD Commands with it’s Function

In this post I have arranged the CMD commands in an alphabetical order for your convenience.CMD is a useful tool which is capable of controlling the whole computer.The commands are really simple. Its is the easiest method to learn your computer user arrangement. Here comes the command list A             ADDUSERS                         Add or list users to/from a CSV file                 ADmodcmd                         Active Directory Bulk Modify                 ARP                                      Address Resolution Protocol                 ASSOC                   ...

Six fundamental steps to improving mobile workforce security

1)  Understand how mobile devices are used Companies must recognize that mobile devices represent a highly valued, real time, ‘always on’ means of connecting. Understanding how devices are being used and what data they can access are the fundamental first steps to improving mobile security. This helps to avoid over-securing devices or applying the same controls for a mobile device as you would for a laptop. 2)  Deepen your knowledge of mobile Embracing the opportunities of mobile simply requires knowledge and small changes rather than trans-formative innovation. Deepening your understanding of the benefits mobile has to offer stands to benefit your business. 3)  Exploit key features to the full Being aware of every aspect of mobile technology allows companies to exploit relevant features, such as the location function.  You can put limits on what people can access outside of the office via the location settings on your employee’s devices. You wouldn't permit p...

Basic Tips To Prevent A DDoS Attack

Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online  presence . The main cause behind the proliferation of DDoS attacks is that there  is a very low-cost that the attacker has to incur to put such attack  in motion . Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to  prevent DDoS attack, let’s first understand what exactly a DDoS attack is! Understanding DDOS Attack A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’  resources  inaccessible to its anticipated user. In order to  carry out  a DDOS attack the attackers never uses their own system; rather they create  a network  of zombie computers often called as a “Botnet” – that is a hive of co...
Image
How Accelerometer Works An accelerometer Sensor is an electromechanical device that measures acceleration forces. These forces may be static or dynamic which is caused by moving or vibrating the accelerometer. By measuring the amount of static acceleration due to gravity, you can find out the angle the device is tilted at with respect to the earth. By sensing the amount of dynamic acceleration, you can analyze the way the device is moving. There are different types of accelerometers : Piezo electric accelerometer Piezo resistive accelerometer Strain gage accelerometers How does Piezoelectric accelerometer works Piezo electric accelerometer is based on principle of piezo electric effect. A Piezo electric substance is one that produces an electric charge when a mechanical stress is applied.  In a Piezo electric accelerometer a mass is attached to a Piezo electric crystal which is in turn mounted to the case of the accelerometer. When the body of the acceleromete...

Encrypt your face and foil the NSA

Image
How you look, like your fingerprint, is write-once, read-many data., a fact that surveillance systems use to track you in person and online. But what if they couldn't see you? The "they" of course is the computer vision (CV) software that automagically detects faces and then zeros in on the details. CV scans a photo or video image looking for faces, scoping out eyes, noses, ears, hair and chins. The most common CV systems uses OpenCV, a free CV library from Intel, so that's the enemy you're looking to defeat. It uses a combination of image sampling, transformation and processing techniques - among many others - to enable a computer to "see". A modern version of dazzle is used on pre-announcement cars to hide the details of its design while testing on public roads. Do you recognize this BMW?  CV Dazzle New York artist Adam Harvey has been investigating techniques for making CV not see a face. Dazzle is based on an older technique first used in...