Monday, January 19, 2015

Deep WEB : beyond googling

 


Also known as the invisible web, the deeper web refers to the portion of the Web that is indexed by search engines like Google. According to The New York Times,computer scientist Mike Bergman is credited with coining the term “deep web” in a paper titled “The Deep Web: Surfacing Hidden Value” published in The Journal of Electronic Publishing in August of 2001.




The so-called surface Web, which all of us use routinely, consists of data that search engines can find and then offer up in response to your queries. As for the rest of it? Well, a lot of it's buried in what's called the deep Web. The deep Web (also known as the undernet, invisible Web and hidden Web, among other monikers) consists of data that you won't locate with a simple Google search.

When you surf the Web, you really are just floating at the surface. Dive below and there are tens of trillions of pages. The deep Web contains 7,500 terabytes of information compared to nineteen terabytes of information in the surface Web To understand how the deep web works,you need to know how search engines operates.

How Search Engines Work : Search engines obtain their listings in two ways: Authors may submit their own Web pages, or the search engines "crawl" or "spider" documents by following one hypertext link to another. The latter returns the bulk of the listings. Crawlers work by recording every hypertext link in every page they index crawling. . To give you results, Google (GOOG), Yahoo (YHOO) and Microsoft's (MSFT) Bing constantly index pages. They do that by following the links between sites, crawling the Web's threads like a spider. But that only lets them gather static pages, What they don't capture are dynamic pages, like the ones that get generated when you ask an online database a question.

How is the Deep Web Invisible to Search Engines?

Search engines like Google are extremely powerful and effective at distilling up-to-the-moment Web content. What they lack, however, is the ability to index the vast amount of data that isn’t hyperlinked and therefore immediately accessible to a Web crawler.

The dark web is like the Web’s ID it’s private. It's anonymous. It's powerful. It unleashes human nature in all its forms, both good and bad. Just as Deep Web content can’t be traced by Web crawlers, it can’t be accessed by conventional means.

To dive into deep web you need special software, such as The Onion Router, more commonly known as Tor. Tor is software that installs into your browser and sets up the specific connections you need to access dark Web sites. Critically, Tor is an encrypted technology that helps people maintain anonymity online. It does this in part by routing connections through servers around the world, making them much harder to track.


The dark Web is home to alternate search engines, e-mail services, file storage, file sharing, social media, chat sites, news outlets and whistleblowing sites, as well as sites that provide a safer meeting ground for political dissidents and anyone else who may find themselves on the fringes of society.

New channels are popping up daily in the Deep Web. Currently, marketplace alternatives to Silk Road, Agora, and Pandora are the most frequented.Interestingly, In late October 2014, Facebook enabled Tor browser users to visit them anonymously, saying in a press release that "It’s important to us at Facebook to provide methods for people to use our site securely."

So although the dark Web definitely has its ugly side, it has great potential, too.

"It has been said that what cannot be seen cannot be defined, and what is not defined cannot be understood" ...Deep web

Saturday, December 27, 2014

PARTITION TABLE (MBR or GPT)

              MBR (Master Boot Record) and GPT (GUID Partition Table) are two different ways of storing the partitioning information on a drive. This information includes where partitions start and begin, so your operating system knows which sectors belong to each partition and which partition is bootable. This is why you have to choose MBR or GPT before creating partitions on a drive.


MBR’s Limitations

              MBR standards for Master Boot Record. It was introduced with IBM PC DOS 2.0 in 1983.

              It’s called Master Boot Record because the MBR is a special boot sector located at the beginning of a drive. This sector contains a boot loader for the installed operating system and information about the drive’s logical partitions

             The boot loader is a small bit of code that generally loads the larger boot loader from another partition on a drive.

              MBR works with disks up to 2 TB in size, but it can’t handle disks with more than 2 TB of space.

  • Supports 4 paritition
  • One partition can be a extended partition
  • Partition Limit of 2TB usable 

GPT’s Advantages

              This system doesn’t have MBR’s limits. Drives can be much, much larger and size limits will depend on the operating system and its file systems. GPT allows for a nearly unlimited amount of partitions, and the limit here will be your operating system — Windows allows up to 128 partitions on a GPT drive, and you don’t have to create an extended partition.

  • supports 128 partition
  • supports zettabyte hard disk
  •  required for booting
         it uses Unified Extensible Firmware
         it needs 64bit hardware

           On an MBR disk, the partitioning and boot data is stored in one place. If this data is overwritten or corrupted, you’re in trouble. In contrast, GPT stores multiple copies of this data across the disk, so it’s much more robust and can recover if the data is correupted. 

          GPT also associated with UEFI(Unified Extensible Firmware Interface) — UEFI replaces the clunky old BIOS with something more modern, and GPT replaces the clunky old MBR partitioning system with something more modern. It’s called GUID Partition Table because every partition on your drive has a “globally unique identifier,” or GUID — a random strong so long that every GPT partition on earth likely has its own unique identifier.

BIOS uses MBR and UEFI uses GPT

Thursday, December 25, 2014

What is spam mails

           Spam" (the term junk mail is also used) refers to the sending of unsolicited bulk e-mails.

            The word "spam" comes from the name of the lunch meat sold by the company Hormel Foods. The association of this word with abusive e-mails comes from a Monthy Python sketch (Monty Python's famous spam-loving vikings) that takes place in a viking restaurant whose speciality is Spam. In this sketch, whenever a customer orders a different dish, the other customers start to sing "spam spam spam spam spam..." in chorus so loud that the poor customer can't be heard! 

so why sending spam ?

                   one word "advertisement"

Many spam emails contain URLs to a website or websites.The most popular spam topic is "pharmacy ads" which make up 81% of email spam messages.It's beleive that the advance fee fraud spam such as the Nigerian "419" scam may be sent by a single guy/gal from somewhere.

There are big spam companies too .

                     The computers in Ralsky's basement control 190 e-mail servers -- 110 located in Southfield, 50 in Dallas and 30 more in Canada, China, Russia and India. Each computer, he said, is capable of sending out 650,000 messages every hour -- more than a billion a day -- routed through overseas Internet companies Ralsky said are eager to sell him bandwidth.

How to stop spam ?

                   The best technology that is currently available to stop spam is spam filtering software.
More advanced filters, known as heuristic filters and Bayesian filters, try to take this simple approach quite a bit further to statistically identify spam based on word patterns or word frequency.


Friday, August 9, 2013

No GUI Boot Screen Splash

What The No Gui Boot Tweak Does :


This tweak disables the display of the bitmap animation on startup.

win7guiboot 

                                  When the Windows 7 operating system is booting up, it displays to the user an animated graphical Windows logo.  Loading and displaying this logo adds a few seconds to the Windows 7 startup time, so disabling it will shave off these seconds.  The downside?  The screen is black while Windows loads, and if users are uncomfortable with that, then it is not a good idea to disable it.

                                   The logo really has no added value or benefit to display other than letting the user know Windows is loading.  If you have tweaked your system to a comfortable level, and you are comfortable not seeing this image anymore, then it is safe to disable.  Personally, it was tougher for me on Windows 7 than their other operating system, mostly because the Windows load GUI was more fun to look at than it’s predecessors.

Disable The Logo GUI Boot On Windows 7 Startup:


1. Select the Windows ‘Start’ button.
2. In the search box, type ‘msconfig’.
3. Scroll up and right click on the program.
4. Select ‘Run As Administrator’.
5. When the system configuration utility is loaded, select the ‘Boot’ tab.
6. Check the box titled ‘No GUI Boot’ at the bottom center of the form.
7. Click ‘Apply’.
8. Select ‘Ok’.
9. Restart your computer.



 


Thursday, August 1, 2013

Hyper-V

Installing the Hyper-V Role

Now, log in using an account with local administrative privileges, and then open the Server manager. In case you aren’t familiar with the Server Manager, it’s the new tool that acts as a centralized management utility for Windows Server 2008. You can access it by entering the ServerManager.msc command at the server’s Run prompt.

When Server Manager opens, right click on the Roles container, and then choose the Add Roles command from the resulting shortcut menu. Windows will now launch the Add Roles Wizard.


You must choose the Hyper-V Role.

At this point, you will see the screen that’s shown in Figure B. Basically, this screen just tells you that you may end up needing to enable virtualization at the BIOS level prior to installing the Hyper-V roll. Some servers require this, and others don’t. The screen also tells you that after installation is complete, you can use the Hyper-V Manager to create and configure your virtual machines. The serene also contains a few links that you can use to access more information about the Hyper-V role.

This screen allows you to access more information about the role that you are installing.

Click Next, and you will be taken to a screen similar to the one that’s shown in Figure C. As you can see in the figure, your virtual machines require virtual networks in order for them to be able to communicate with other network hosts. Essentially, this screen allows you to choose the physical network adapter that you want to bind the virtual network adapter to.


You must bind the virtual network adapter to at least one physical network adapter.

You have the option of choosing multiple network adapters for load balancing, but you also have the option of using a single physical network adapter for all of your virtual machines. When you have made your selection, click Next.

You should now see a screen confirming that you are about to install the Hyper-V role, and warning you that the server may require a reboot after installing the role. Now, just click the Install button to install the role. The actual amount of time that it takes to install the role varies depending on your server’s performance, but the entire process took about 20 seconds on my server.

When the installation process completes, click the Close button, and then click Yes when you are prompted to reboot the server.  When the server reboots, log back into the server and the Server Manager should automatically load and resume the installation process. After about a minute, you should see a message telling you that Hyper-V has installed successfully. Click Close to complete the wizard.


Terminal services

Terminal services manager and Windows 7

I just found out that Terminal services manager does not exist in Windows 7. But fear not, the Remote Desktop Services Manager will do the trick. It is included in the Remote Server Administration Tools for Windows 7, which can be downloaded from here.

After some serious googling, I was also able to figure out how to actually enable the feature, in "Programs and Features", "Turn Windows Features on or off":

Go to "Remote Server Administation Tools", "Role Administration Tools", and enable "Remote Desktop Services Tools".


 There! Now you'll find the Remote Desktop Services Manager in your start menu — and can start kicking out stale remote desktop connections from your servers. :)