Posts

Showing posts from June, 2017

NET NEUTRALITY

Image
INTERNET  is built around the idea of openness. It allows people to connect and exchange information freely, if the information or service is not illegal. Much of this is because  of the idea of net neutrality If you like the current state of the internet, you should know about net neutrality. Many web users are aware of it. But if you are not, don't worry. I explain it here: Net neutrality is an idea derived from how telephone lines have worked since the beginning of the 20th century. In case of a telephone line, you can dial any number and connect to it. It does not matter if you are calling from operator A to operator B. It doesn't matter if you are calling a restaurant or a drug dealer. The operators neither block the access to a number nor deliberately delay connection to a particular number, unless forced by the law. Most of the countries have rules that ask telecom operators to provide an unfiltered and unrestricted phone service . When the internet started to...

INTERESTING AND UNKNOWN FACTS ABOUT THE COMPUTER AND INTERNET PART 2

Image
1. Only 8% of the world’s currency is physical money, the rest only exists on computers. 2. There was a computer worm that would gain access to Windows XP systems, download a patch from Microsoft to close the vulnerability that it used to infect the system, attempt to delete the infamous Blaster worm (if present) from the system, then delete itself 3. The worst breach of U.S. military computers in history happened when someone picked up a memory stick (infected by a foreign intelligence agency) they found in the parking lot and plugged it into their computer, which was attached to United States Central Command. 4. Investigators missed incriminating Google searches done on Casey Anthony’s computer – including “fool-proof suffication [sic]” – because they checked her Internet Explorer history, but ignored Firefox 5. In 1978, Apple Corps (owned by The Beatles) sued Apple Computer for trademark infringement. The case settled for $80,000 along with the condition that Apple Comput...

INTERESTING AND UNKNOWN FACTS ABOUT COMPUTER AND INTERNET PART 1

Image
1. Amazon, originally a printed book seller company, now sells more e-books than printed books. 2. The first domain name ever registered was symbolics.com.. 3. 80% of all pictures on the internet are of naked women 4. Tim Berners-Lee coined the phrase “World Wide Web” in 1990. 5. U.S. President Bill Clinton’s inauguration in January 1997 was the first to be webcast. 6. Google uses an estimated 15 billion kWh of electricity per year, more than most countries. However, google generates a lot of their own power with their solar panels. 7. Bill Gates, the founder of Microsoft was a college drop out. 8. Bill Gates house was designed Using a Macintosh computer. 9. About 1.8 billion people connect to the Internet, only 450 million of them speak English. 10. In 2012, approximately 17 billion devices (which includes computers, tablets and mobile) connected to the Internet. 11. Sweden has the highest percentage of internet users, they are 75%. 12. Did you know that ...

BLOODY MARRY

Image
"NOTE:This is not a technology related article as my blog suggests." We all freaked ourselves out with this urban legend as kids, and we're all familiar with the Bloody Mary dare:   While holding a lit candle go into a room that has a mirror and gets pitch dark, then turn out the lights. Spin around three times in front of the mirror while slowly chanting   ‘Bloody Mary Bloody Mary Bloody Mary.’ Then… look in the mirror and you will see the  pale face and glowing eyes  of Bloody Mary staring back at you. Back when I was a kid that’s what two friends dared me to do when we were bored one summer afternoon. It was too hot to go out and do something and we had resorted to a truth or dare kind of game to pass the time. I’d never heard of the Bloody Mary game before and was intrigued but a little creeped out, would Bloody Mary really appear in the mirror if I did all that stuff? ‘Okay, I’ll do it.’  I said after giving it a little bit of thought. So I too...

TOR BROWSER-ANONYMOUS WEB BROWSING

Image
Most of us give a considerable time of ours to Internet. The primary Application we require to perform our internet activity is a browser, a web browser to be more perfect. Over Internet most of our’s activity is logged to  Server / Client  machine which includes  IP  address, Geographical Location, search/activity trends and a whole lots of Information which can potentially be very harmful, if used intentionally the other way. Moreover the  National Security Agency  ( NSA ) aka International Spying Agency keeps tracks of ours digital footprints. Not to mention a restricted proxy server which again can be used as data ripping server is not the answer. And most of the corporates and companies wont allow you to access a proxy server. So, what we need here is an application, preferably small in size and let it be standalone, portable and which servers the purpose. Here comes an application – the  Tor Browser , which has all the above discussed feat...

ANDROID AND DESSERT NAMES

Image
Google's Android division certainly has a sense of humor: It named all of its version codenames after desserts (just as Intel names all of its CPUs after rivers). To celebrate a new version, a giant mock-up of the dessert that matches the codename is usually delivered to the Google Campus and put on display. So what are the different versions of Android OS and the desserts associated with them? Let us go over a short history. Android 1.0 and 1.1: Unnamed There appears to be no codename assigned to versions 1.0 and 1.1 of Android OS. Google bought a company called Android back in July 2005. Android was headed by several mobile big shots, including the former head of a big carrier, ex-owner of a phone maker, and more. After their buyout, Android went into stealth mode, and rumors spread that Google was working on a mobile phone. The dam finally broke in November 2007, when Google suddenly announced that they were indeed working on a phone (Google Phone). More than that...

QUANTUM COMPUTER

Image
Quantum computing   is the area of study focused on developing  computer  technology based on the principles of  quantum  theory, which explains the nature and behavior of energy and matter on the  quantum  (atomic and subatomic) leve L . Q uantum computers can solve problems that are intractable for conventional computers. That is, it’s not that quantum computers are like regular computers, but smaller and faster. Rather, quantum computers work according to principles entirely different than conventional computers, and using those principles can solve problems whose solution will  never  be feasible on a conventional computer. In everyday life, all our experience is with objects which can be directly simulated by a conventional computer. We don’t usually think about this fact, but movie-makers rely on it, and we take it for granted – special effects are basically just rough computer simulations of events that would be more expensive for ...