Posts

Showing posts from 2014

Best CMD Commands with it’s Function

In this post I have arranged the CMD commands in an alphabetical order for your convenience.CMD is a useful tool which is capable of controlling the whole computer.The commands are really simple. Its is the easiest method to learn your computer user arrangement.

Here comes the command list

A             ADDUSERS                         Add or list users to/from a CSV file
                ADmodcmd                         Active Directory Bulk Modify
                ARP                                      Address Resolution Protocol
                ASSOC                                 Change file extension associations
                ASSOCIAT                         One step file association
                AT                                        Schedule a command to run at a specific time
                ATTRIB                              Change file attributes
B
                BCDBOOT                          Create or repair a system partition
                BCDEDIT                    …

Six fundamental steps to improving mobile workforce security

1) Understand how mobile devices are used
Companies must recognize that mobile devices represent a highly valued, real time, ‘always on’ means of connecting. Understanding how devices are being used and what data they can access are the fundamental first steps to improving mobile security. This helps to avoid over-securing devices or applying the same controls for a mobile device as you would for a laptop.
2) Deepen your knowledge of mobile
Embracing the opportunities of mobile simply requires knowledge and small changes rather than trans-formative innovation. Deepening your understanding of the benefits mobile has to offer stands to benefit your business.
3) Exploit key features to the full
Being aware of every aspect of mobile technology allows companies to exploit relevant features, such as the location function.  You can put limits on what people can access outside of the office via the location settings on your employee’s devices. You wouldn't permit printed versions of highly co…

Basic Tips To Prevent A DDoS Attack

Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks isthat there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to preventDDoS attack, let’s first understand what exactly a DDoS attack is!
Understanding DDOS Attack

A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’ resources inaccessible to its anticipated user. In order to carry out a DDOS attack the attackers never uses their own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.
Let’s understand the basic…
Image
How Accelerometer Works
An accelerometer Sensor is an electromechanical device that measures acceleration forces. These forces may be static or dynamic which is caused by moving or vibrating the accelerometer. By measuring the amount of static acceleration due to gravity, you can find out the angle the device is tilted at with respect to the earth. By sensing the amount of dynamic acceleration, you can analyze the way the device is moving. There are different types of accelerometers : Piezo electric accelerometerPiezo resistive accelerometerStrain gage accelerometers
How does Piezoelectric accelerometer works Piezo electric accelerometer is based on principle of piezo electric effect. A Piezo electric substance is one that produces an electric charge when a mechanical stress is applied.  In a Piezo electric accelerometer a mass is attached to a Piezo electric crystal which is in turn mounted to the case of the accelerometer. When the body of the accelerometer is subjected to vibration the …

Encrypt your face and foil the NSA

Image
How you look, like your fingerprint, is write-once, read-many data., a fact that surveillance systems use to track you in person and online. But what if they couldn't see you? The "they" of course is the computer vision (CV) software that automagically detects faces and then zeros in on the details. CV scans a photo or video image looking for faces, scoping out eyes, noses, ears, hair and chins. The most common CV systems uses OpenCV, a free CV library from Intel, so that's the enemy you're looking to defeat. It uses a combination of image sampling, transformation and processing techniques - among many others - to enable a computer to "see". A modern version of dazzle is used on pre-announcement cars to hide the details of its design while testing on public roads. Do you recognize this BMW?  CV Dazzle New York artist Adam Harvey has been investigating techniques for making CV not see a face. Dazzle is based on an older technique first used in WWI to pr…