Author Archives: Ranjit Rajan

Written on Jul, 24, 2014 by in | Comments Off on Documentary film
image documentary

A non-fictional motion picture planned to essay some aspect of reality, mainly for the purposes of tutoring or maintaining a historic record. Originally shot on the typical medium earlier, now includes both digital and video productions which can either be direct to video, completed into a TV show or released in cinemas. It is labeled as filmmaking practice, a cinematic …

Continue Reading...
Written on Jul, 05, 2014 by in | Comments Off on Heartbleed a Security Bug
Real heartbleed. - Copy (2)

Heartbleed a Security Bug Cryptographic software library which contains the prevalent OpenSSL has been threatened by severe susceptibility known as The Heartbleed Bug. This can cause theft of information which would otherwise remain confidential in normal cases by the use of encryption i.e. SSL/TLS for protection on the Internet. SSL/TLS offers communication privacy and security towards the Internet based application …

Continue Reading...
Written on Jun, 23, 2014 by in | Comments Off on Computer virus
virus

Computer virus A Program or a part of code that is encumbered onto a computer without the knowledge of the person who owns the computer, such program is known as a computer virus. All the computer viruses are codes written by certain individuals. Viruses are capable to create a duplicate of itself, such kind of virus is known as a …

Continue Reading...
Written on Jun, 16, 2014 by in | Comments Off on Denial of service attack
New Microsoft PowerPoint Presentation

Denial of service attack When a large number of collaborated system attacks a solo target, it causes denial of service for users that are exists in the under attack system. The overflow of incoming message to the attacked system basically causes it to shut down. This is known as distributed denial-of-service [DDoS]. Typically in DDoS attack, the attacker instigates by …

Continue Reading...
Written on Jun, 04, 2014 by in | Comments Off on Water that can start Fire – Supercritical water
Supercritical water

A special state of substance that exists above its critical point is known as supercritical fluid Imagine an indestructible glass ball which is half-full of water, and the rest is a vacuum overhead it. Some of the empty space will be filled by water vapor. If we heat this ball the water boils and forms steam. Thus density of liquid …

Continue Reading...
Written on Apr, 29, 2014 by in | Comments Off on Whatsapp – Pro’s and Con’s
Whatsapp

Whatsapp, founded in 2009 has emerged as the largest messaging platform across the world. Whatsapp was founded by Brain Acton and Jan Koum, They were the former employees at Yahoo.  Initially only the Android platform was targeted during development of Whatsapp, but then other platforms like Windows, Symbian, iOS, Blackberry OS were also developed to increase its market reach and …

Continue Reading...
Written on Apr, 11, 2014 by in | Comments Off on Types of Web Hosting
HOSTING TYPES

Shared Hosting: In a shared hosting your own website and other website owners share one server. This encompasses sharing the physical server and the software applications that are on the server. Shared hosting services are economical because the cost to run the server is mutual borne between you and the other owners. However there are a number of down sides, …

Continue Reading...
Written on Apr, 01, 2014 by in | Comments Off on Black box
Black Box

In Melbourne, Australia the Aeronautical Research Laboratories scientist Dr. David Warren was the person who invented the “Black Box” flight data recorder. He was the main person to conceive of the idea of recording the flight crew’s conversation on an airplane and of guarding that recording in the event of a crash or fire. The resolution of the Black Box …

Continue Reading...
Written on Mar, 26, 2014 by in | Comments Off on Is your password Secure?
paswd

A password is an unspaced arrangement of characters used to regulate that a computer user requesting access to a computer system is really that specific user. Generally we know that users of a multiuser or securely protected single-user system claim a unique name (often called a user ID) that can be usually known. To verify that somebody entering that user …

Continue Reading...
Written on Mar, 22, 2014 by in | Comments Off on All about Domains
domains

Domain names are used to recognize one or more IP addresses. Let us take an example, the domain name yahoo.com represents about a half-dozen IP addresses. Domain names are used in URLs to classify particular Web pages. For example, in the URL http://www.tecsys.in/ the domain name is tecsys.in. Every domain name has a suffix that specifies its top level domain …

Continue Reading...