Wednesday, January 21, 2015
Monday, January 19, 2015
Deep WEB : beyond googling
Also known as the invisible web, the
deeper web refers to the portion of the Web that is indexed by search engines
like Google. According to The New York Times,computer scientist Mike Bergman is
credited with coining the term “deep web” in a paper titled “The Deep Web:
Surfacing Hidden Value” published in The Journal of Electronic Publishing
in August of 2001.
The so-called surface Web, which
all of us use routinely, consists of data that search engines can find and then
offer up in response to your queries. As for the rest of it? Well, a lot of
it's buried in what's called the deep Web. The deep Web (also known as
the undernet, invisible Web and hidden Web, among other monikers) consists of
data that you won't locate with a simple Google search.
When
you surf the Web, you really are just floating at the surface. Dive below and
there are tens of trillions of pages. The deep Web contains 7,500 terabytes of
information compared to nineteen terabytes of information in the surface Web To
understand how the deep web works,you need to know how search engines operates.
How
Search Engines Work : Search
engines obtain their listings in two ways: Authors may submit their own Web
pages, or the search engines "crawl" or "spider" documents
by following one hypertext link to another. The latter returns the bulk of the
listings. Crawlers work by recording every hypertext link in every page they
index crawling. .
To give you results, Google (GOOG),
Yahoo (YHOO)
and Microsoft's (MSFT)
Bing constantly index pages. They do that by following the links between sites,
crawling the Web's threads like a spider. But that only lets them gather static
pages, What they don't capture are dynamic pages, like the ones that get
generated when you ask an online database a question.
How is the Deep Web Invisible to Search Engines?
Search
engines like Google are extremely powerful and effective at distilling
up-to-the-moment Web content. What they lack, however, is the ability to index
the vast amount of data that isn’t hyperlinked and therefore immediately
accessible to a Web crawler.
The
dark web is like the Web’s ID it’s private. It's anonymous. It's
powerful. It unleashes human nature in all its forms, both good and bad. Just
as Deep Web content can’t be traced by Web crawlers, it can’t be accessed by
conventional means.
To
dive into deep web you need special software, such as The Onion Router, more commonly
known as Tor.
Tor is software that installs into your browser and sets up the specific
connections you need to access dark Web sites. Critically, Tor is an encrypted
technology that helps people maintain anonymity online. It does this in part by
routing connections through servers around the world, making them much harder
to track.
The dark Web is home to alternate search engines, e-mail services, file storage, file sharing, social media, chat sites, news outlets and whistleblowing sites, as well as sites that provide a safer meeting ground for political dissidents and anyone else who may find themselves on the fringes of society.
New channels are popping up daily in the Deep Web. Currently, marketplace alternatives to Silk Road, Agora, and Pandora are the most frequented.Interestingly, In late October 2014, Facebook enabled Tor browser users to visit them anonymously, saying in a press release that "It’s important to us at Facebook to provide methods for people to use our site securely."
So although the dark Web definitely has its ugly side, it has great potential, too.
"It has been said that what cannot be seen cannot be defined, and what is not defined cannot be understood" ...Deep web
Saturday, December 27, 2014
PARTITION TABLE (MBR or GPT)
MBR’s Limitations
MBR standards for Master Boot Record. It was introduced with IBM PC DOS 2.0 in 1983.
The boot loader is a small bit of code that generally loads the larger boot loader from another partition on a drive.
MBR works with disks up to 2 TB in size, but it can’t handle disks with more than 2 TB of space.
- Supports 4 paritition
- One partition can be a extended partition
- Partition Limit of 2TB usable
GPT’s Advantages
This system doesn’t have MBR’s limits. Drives can be much, much larger
and size limits will depend on the operating system and its file
systems. GPT allows for a nearly unlimited amount of partitions, and the
limit here will be your operating system — Windows allows up to 128
partitions on a GPT drive, and you don’t have to create an extended
partition.
- supports 128 partition
- supports zettabyte hard disk
- required for booting
it uses Unified Extensible Firmware
it needs 64bit hardware
it needs 64bit hardware
On an MBR disk, the partitioning and boot data is stored in one place.
If this data is overwritten or corrupted, you’re in trouble. In
contrast, GPT stores multiple copies of this data across the disk, so
it’s much more robust and can recover if the data is correupted.
GPT also associated with UEFI(Unified Extensible Firmware Interface) — UEFI replaces the clunky old BIOS with something more modern,
and GPT replaces the clunky old MBR partitioning system with something
more modern. It’s called GUID Partition Table because every partition on
your drive has a “globally unique identifier,” or GUID — a random
strong so long that every GPT partition on earth likely has its own
unique identifier.
BIOS uses MBR and UEFI uses GPT
BIOS uses MBR and UEFI uses GPT
Thursday, December 25, 2014
What is spam mails
Spam" (the term junk mail is also used) refers to the sending of unsolicited bulk e-mails.
The word "spam" comes from the name of the lunch meat sold by the company Hormel Foods. The association of this word with abusive e-mails comes from a Monthy Python sketch (Monty Python's famous spam-loving vikings) that takes place in a viking restaurant whose speciality is Spam. In this sketch, whenever a customer orders a different dish, the other customers start to sing "spam spam spam spam spam..." in chorus so loud that the poor customer can't be heard!
so why sending spam ?
one word "advertisement"
Many spam emails contain URLs to a website or websites.The most popular spam topic is "pharmacy ads" which make up 81% of email spam messages.It's beleive that the advance fee fraud spam such as the Nigerian "419" scam may be sent by a single guy/gal from somewhere.
There are big spam companies too .
The computers in Ralsky's basement control 190 e-mail servers -- 110 located in Southfield, 50 in Dallas and 30 more in Canada, China, Russia and India. Each computer, he said, is capable of sending out 650,000 messages every hour -- more than a billion a day -- routed through overseas Internet companies Ralsky said are eager to sell him bandwidth.
How to stop spam ?
The best technology that is currently available to stop spam is spam filtering software.
More advanced filters, known as heuristic filters and Bayesian filters, try to take this simple approach quite a bit further to statistically identify spam based on word patterns or word frequency.
The word "spam" comes from the name of the lunch meat sold by the company Hormel Foods. The association of this word with abusive e-mails comes from a Monthy Python sketch (Monty Python's famous spam-loving vikings) that takes place in a viking restaurant whose speciality is Spam. In this sketch, whenever a customer orders a different dish, the other customers start to sing "spam spam spam spam spam..." in chorus so loud that the poor customer can't be heard!
so why sending spam ?
one word "advertisement"
Many spam emails contain URLs to a website or websites.The most popular spam topic is "pharmacy ads" which make up 81% of email spam messages.It's beleive that the advance fee fraud spam such as the Nigerian "419" scam may be sent by a single guy/gal from somewhere.
There are big spam companies too .
The computers in Ralsky's basement control 190 e-mail servers -- 110 located in Southfield, 50 in Dallas and 30 more in Canada, China, Russia and India. Each computer, he said, is capable of sending out 650,000 messages every hour -- more than a billion a day -- routed through overseas Internet companies Ralsky said are eager to sell him bandwidth.
How to stop spam ?
The best technology that is currently available to stop spam is spam filtering software.
More advanced filters, known as heuristic filters and Bayesian filters, try to take this simple approach quite a bit further to statistically identify spam based on word patterns or word frequency.
Friday, August 9, 2013
No GUI Boot Screen Splash
What The No Gui Boot Tweak Does :
This tweak disables the display of the bitmap animation on startup.
When the Windows 7 operating system is booting up, it displays to the
user an animated graphical Windows logo. Loading and displaying this
logo adds a few seconds to the Windows 7 startup time, so disabling it
will shave off these seconds. The downside? The screen is black while
Windows loads, and if users are uncomfortable with that, then it is not a
good idea to disable it.
Disable The Logo GUI Boot On Windows 7 Startup:
1. Select the Windows ‘Start’ button.
2. In the search box, type ‘msconfig’.
3. Scroll up and right click on the program.
4. Select ‘Run As Administrator’.
5. When the system configuration utility is loaded, select the ‘Boot’ tab.
6. Check the box titled ‘No GUI Boot’ at the bottom center of the form.
7. Click ‘Apply’.
8. Select ‘Ok’.
9. Restart your computer.
Thursday, August 1, 2013
Hyper-V
Installing the Hyper-V Role
Now, log in using an account with local administrative privileges, and then open the Server manager. In case you aren’t familiar with the Server Manager, it’s the new tool that acts as a centralized management utility for Windows Server 2008. You can access it by entering the ServerManager.msc command at the server’s Run prompt.When Server Manager opens, right click on the Roles container, and then choose the Add Roles command from the resulting shortcut menu. Windows will now launch the Add Roles Wizard.
You must choose the Hyper-V Role.
At this point, you will see the screen that’s shown in Figure B. Basically, this screen just tells you that you may end up needing to enable virtualization at the BIOS level prior to installing the Hyper-V roll. Some servers require this, and others don’t. The screen also tells you that after installation is complete, you can use the Hyper-V Manager to create and configure your virtual machines. The serene also contains a few links that you can use to access more information about the Hyper-V role.
This screen allows you to access more information about the role that you are installing.
Click Next, and you will be taken to a screen similar to the one that’s shown in Figure C. As you can see in the figure, your virtual machines require virtual networks in order for them to be able to communicate with other network hosts. Essentially, this screen allows you to choose the physical network adapter that you want to bind the virtual network adapter to.
You must bind the virtual network adapter to at least one physical network adapter.
You have the option of choosing multiple network adapters for load balancing, but you also have the option of using a single physical network adapter for all of your virtual machines. When you have made your selection, click Next.
You should now see a screen confirming that you are about to install the Hyper-V role, and warning you that the server may require a reboot after installing the role. Now, just click the Install button to install the role. The actual amount of time that it takes to install the role varies depending on your server’s performance, but the entire process took about 20 seconds on my server.
When the installation process completes, click the Close button, and then click Yes when you are prompted to reboot the server. When the server reboots, log back into the server and the Server Manager should automatically load and resume the installation process. After about a minute, you should see a message telling you that Hyper-V has installed successfully. Click Close to complete the wizard.
Terminal services
Terminal services manager and Windows 7
After some serious googling, I was also able to figure out how to actually enable the feature, in "Programs and Features", "Turn Windows Features on or off":
Go to "Remote Server Administation Tools", "Role Administration Tools", and enable "Remote Desktop Services Tools".
There! Now you'll find the Remote Desktop Services Manager in your start menu — and can start kicking out stale remote desktop connections from your servers. :)
Subscribe to:
Posts (Atom)