Wednesday 7 October 2015

Term Of the Day- "ARP Poisoning"


Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker
changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets. This modifies the layer -Ethernet MAC address into the hacker's known MAC address to monitor it. Because the ARP replies are forged, the target computer unintentionally sends the frames to the hacker's computer first instead of sending it to the original destination. As a result, both the user's data and privacy are compromised.

ARP poisoning is very effective against both wireless and wired local networks. By triggering an ARP poisoning attack, hackers can steal sensitive data from the targeted computers, eavesdrop by means of man-in-the-middle techniques, and cause a denial of service on the targeted computer. In addition, if the hacker modifies the MAC address of a computer that enables Internet connection to the network, access to Internet and external networks may be disabled.

An effective ARP poisoning attempt is undetectable to the user. For smaller networks, using static ARP tables and static IP addresses is an effective solution against ARP poisoning. 

Saturday 26 September 2015

Term of the day- "User Threat Quotient"

Cyberoam, a leading global provider of network security appliances has introduced a unique capability – User Threat Quotient (UTQ) – to help IT security managers identify users posing security risks with ease. The User Threat Quotient (UTQ) studies the web behavior of users by analyzing massive data of allowed and denied web traffic for web categories like IP Address, P2P, Phishing and Fraud, Porn, Spam URL, Spyware, URL Translation Sites and more that pose security and legal risks.
UTQ helps administrator to
   • Spot risky users at a glance.
   • Find out malicious insiders.
   • Avoid chances of human oversight in correlating data from various logs and reports.
   • Take appropriate actions like fine-tuning security policies, security awareness training etc.

UTQ report is displayed in the form of bubble graph as well as in a tabular format. The bubble graph is plotted between Relative Risk Ranking and Average Threat Score, where the bubble represents the user and bubble size represents Average Threat posed by the user. Mouse over on the bubble displays details like Average Threat Score, Relative Risk Ranking and Maximum Threat Score along with date.
The bubble graph area is divided into three sections where;
  • Top 10% are marked as High Risk Users
  • Next 40% are marked as Medium Risk                Users
   • Last 50% are marked as Low Risk Users.

Tuesday 4 August 2015

Term Of the Day - Gnutella


Gnutella is a file sharing network that allows users to send and receive files over the Internet. The first part of its name comes from the GNU General Public License, which originally allowed the source of the program to be made available to the public. The Gnutella network is a peer-to-peer (P2P) network, which allows users on different networks to share files.
Gnutella is a network protocol, not an actual program. Therefore, to access other computers on the Gnutella network, you must install a P2P program that supports Gnutella. Each user still must connect to an "ultrapeer," which is a server that lists files shared by connected users. This makes it possible to search for files across hundreds or even thousands of other computers connected to the network.
Some popular Gnutella clients include Acquisition for the Mac and BearShare and Morpheus for Windows.

Monday 27 July 2015

Resource Throttling


Resource throttling refers to the artificial cutting down or lowering of the amount of resources or returns in a system. This term is often used to refer to SharePoint features that allow administrators to narrow the results of heavy queries.

There are times when a full system search or other full operation makes too many demands on the system; in this scenario, IT professionals sometimes resort to resource throttling.This will conserve CPU and other resources. IT professionals can also monitor server activity and look for drains on the system. They can then apply resource throttling in order to control resource use on the system and bring it back to manageable levels .

Wednesday 8 July 2015

Network Behaviour Analysis

Network behaviour analysis (NBA) is a network monitoring program that ensures the security of a proprietary network. NBA helps in enhancing network safety by watching traffic and observing unusual activity and departures of a network operation.
Network behaviour analysis monitors the inside happenings of an active network by collecting data from many data points and devices to give a detailed offline analysis. It is constantly watching the network, marking known and unknown activities, new and unusual patterns and indicating potential threats by flagging. The program also checks and accounts for change in bandwidth and protocol being used during communication. This is particularly applicable in finding a potentially dangerous data source or website.

The duty of a network behaviour analysis program is to reduce the labour and time expended by network administrators in detecting and resolving network issues. It is thus an enhancement to protect the network along with firewalls, antivirus software and spyware detection tools. Conventional methods of defending a network against harmful data include packet checking, signature recognition and real-time blocking of malicious sites and data.


Tuesday 23 June 2015

Google Penguin


Google Penguin refers to a set of algorithm updates and data refreshes that the Google Search Engine periodically releases, that are aimed at improving the value of search query results for users.

This is done to prevent spamming the page index algorithm ( called spamdexing or Black Hat SEO) to prevent irregularities in search results to prevent from being successfully ranked high among query results. Spamdexing can be done by techniques such as Key-stuffing, invisible text display, link-spamming or even displaying copyright items from high-ranking websites and more.
Google Penguin is different from similar enhancement algorithm such as Google Panda and Google Hummingbird such that it not only aims at preventing companies that attempt to “boost” their search engine ranking index but also “penalizing” them.
The first such algorithm published in April 2012 and was estimated to affect 3% of all English-language website.

Monday 15 June 2015

Business Intelligence


Business Intelligence is the use of computing technologies for the identification, discovery and
analysis of business data such as sales, revenue, products, costs, income, etc. BI provides historical, present and predictive view of internally structured data for products and departments by more effective decision-making and strategic operational insights. BI software applications make use of Data warehouses or Data marts which are separate yet related BI architectural fragments and are used for preparation and use of data.

BI is used for multiple business purposes, including:
  • Measurement of performance and benchmarking progress toward business goals
  • Quantitative analysis through predictive analytics, predictive modelling, business process modelling and statistical analysis
  • Reporting of departmental/divisional and enterprise perspectives of data visualization, EISs and OLAP
  • Collaborative programs that allow internal and external business entities to collaborate through electronic data interchange (EDI) and data sharing
  • Use of knowledge management programs to identify and create insights and experiences for learning management and regulatory compliance


BI also involves specific methodologies and procedures for implementing such interactive information gathering techniques, including:

  • Identifying interview teams
  • Researching organizations
  • Selecting and preparing interviewees
  • Developing interview questions
  • Scheduling and sequencing interviews


Saturday 13 June 2015

Spatial Data Mining

An GIS Tool application

Spatial Data Mining Application Example

Spatial Data Mining is the application of Data Mining techniques to spatial models. In Spatial Data Mining, analysts use geographical or spatial information to produce business intelligence or other results. Analysts might be looking into large data bases or extremely large database to find relevant data based on GIS/GPS tools or similar mechanism. The core goal of Spatial Data Mining is to distinguish the information in order to build related, actionable patterns. This requires specific techniques and resources to get geographical data into relevant and useful formats.

Tuesday 31 March 2015

TERM OF THE DAY

“Delay tolerant Network”


Delay tolerant networking is built with the dream motive of actuating inter-planetary Internet networking. In general, DTN is used for communications over a vast distance, generally in scales of thousands of kilometres and to overcome the logistical hurdles involved in the same.
Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale. In such an environment, long latency, sometimes measured in hours or days is inevitable. However, similar problems can also occur over more modest distances when interference is extreme or network resources are severely overburdened.

Delay-tolerant networking involves some of the same technologies as are used in a disruption-tolerant network but there are important distinctions. A delay-tolerant network requires hardware that can store large amounts of data. Such media must be able to survive extended power loss and system restarts. It must also be immediately accessible at any time. Ideal technologies for this purpose include hard drives and high-volume flash memory. The data stored on these media must be organized and prioritized by software that ensures accurate and reliable store-and-forward functionality. In a delay-tolerant network, traffic can be classified in three ways, called expedited, normal and bulk in order of decreasing priority. Expedited packets are always transmitted, reassembled and verified before data of any other class from a given source to a given destination. Normal traffic is sent after all expedited packets have been successfully assembled at their intended destination. Bulk traffic is not dealt with until all packets of other classes from the same source and bound for the same destination have been successfully transmitted and reassembled.

Thursday 19 February 2015

Term of the day – “Internet of Things”


Internet of things (IOT) is an umbrella term used to refer all devices that are connected over the Internet . These include PC’s , mobile devices , tablets , etc. Beside computers , these also includes appliances such as micro-ovens , refrigerators , etc . These devices are also called “smart devices” as they can communicate with each other . IOT must be enabled for wireless communication to connect to wired media . Generally these devices use Bluetooth to connect amongst themselves .
Besides communicating and connecting over internet , IOT devices are also with an array of sensors , that can help in multi-faceted applications of the same .

Monday 9 February 2015

Term Of the Day – Dynamic URL


an Example of setting up Dynamic URL .
Dynamic URL refers to links that are generated as a result of queries from databases and are very different from static URLs . While the content of pages generated of static URL doesn't changes until the HTML code has been changed by the user , the content of dynamic URL pages are customized as per the query contents required by the user . The page is generally a database template filled with display based on  database query results . Any website with a dynamic URL has an associated
database which fills in most contents of the web page .

The parameters of a dynamically defined URL can be manually generated or can be automated . For instance , some websites track user’s IP address location and suitably decide on display options such as offers and language , etc. It is a highly convenient method to cater to individual user’s choice .

Monday 2 February 2015

Term Of The Day – Conficker !!


Conficker is a virus worm , that is directed to infect systems with  Microsoft Windows 2000 / 7/8 , etc. Operating system . This was first detected in 2003 , when it affected the French Navy computer network to such extents that it had to ground several of it’s fleet for being unable to download flight data . Since then , Conficker has appeared and re-appeared in over 200 countries , each time more powerful with added malware protection tools implanted in itself .

The virus’s unknown authors are believed to be tracking anti-malware websites and law enforcement authorities , and to be plugging the virus’ loopholes . Ever Since , five variants of Conficker have appeared , each powerful than the later .

Possible effects of Conficker on an infested system are :

  • Modification of System settings .
  •  Killing anti-malware software .
  • Termination / disablement of windows service such as Firewall , Defender , etc .
  • Resetting system restore points .
  • Deleting Back-up
  • Checking for internet connectivity and downloading arbitrary files
  • System used as a peer in seeding further the current or higher Conficker brethen .  


Monday 19 January 2015

Term Of the Day – “ PCI Mezanine Card ”


A PCI Mezanine Card is a printed circuit board generally used to extend the connectivity and function of a compatible computer System . PMC typically has all features of a PCI bus as well as the physical attributes of a Common Mezanine Card (CMC) format .

It is a peripheral card that is used to extend the functionality of a system by connecting the peripheral devices and provide service as a data acquisition card for industrial setting such as Sensors , Sonar and like wise . These functionalities often yield analog signals , so it is the function of the card to convert them to machine-readable and human-readable forms .


It is generally used for systems such as VMEbus , Futurebus+ and other systems supporting the PCI specifications .

Friday 16 January 2015

Geeky terms that are cooler then they sound …..



The last decade or so has seen IT boom not only in size and figures but also there has been a blasting high in the number of additions to Jargons used . Though geeky jargons are often misleading by their lay man assumptions , but there are quite a few of them which are cooler than they sound .


Here are some terms broken down and explained in the simplest possible way :

Data Analytics : 


This is a perfect example of how IT jargons are deceptive by look . The otherwise boring and dumb appearing term actually defines a cooler process .  It is all about taking into account of all available data and making the best use of it . It can be also explained as “ crunching of data ” or  “ making stuff out of data ” .
This one is really taking a big shape as companies are looking deeper into big data , for utilizations such as using personal history of customers to generate better future transaction results .

Uptime Provision :


This is again something we regularly glaze over . This when included in the service terms means that the customer will be provided with the service as and when required by the individual . This is however a mile’s distance from the lay man conclusion we derive when one encounters it in text .

Wearable Computing :


This again is something that’s going to be big , very big as technology heads towards the Cyborg phase . This is generally used for computing options that come melded physically to humans . Something that instantly trickles in as an example is the Google Glass , as even more intimate relations are being planned , as is a new jargon called “ Humantronics ” .





Fog Computing :


Ok , this one appears a bit cool , but what it actually stands for is , well , foggy . This stands for the next-generation of cloud computing or the next step after the presently dominant “ Full Cloud ” services . To explain , the present cloud set-up requires complete transfer of data to the cloud , as a whole , which reduces infrastructural constraints as well as maintenance billings . But again, this might not sound healthy for individuals . Fog computing refers to moving relevant parts of data to the farthest corner , to make utilization efficient and provide an even cheaper option .


Responsive Design :

This again is something very important for today . As we know , it is incredibly tough to surf age-old websites using our smart phones , with sometimes , users being forced to droll about the large , beyond screen-holding capacity pages , searching frantically for the needful . In today’s era , where smart phones are rapidly coming up as device usage leaders , designers need to have implementations that are friendly for smart phone screens .

Wednesday 14 January 2015

Term Of the Day - “ Push Media ”


Push Media refers to a media distribution model in which they are delivered without direct involvement of the recipients . This is also called push marketing and is mostly employed by start-ups and less popular organizations to introduce their new products before the masses . These are delivered without any action from the receiver’s side , and is something opposite to  Pull Media , where the receivers categorically demand for the content . 
General Push Media content means include direct mails containing announcements , product brochures , etc.

Wednesday 7 January 2015

Term Of the Day – “ Alureon ”



Alureon is a Trojan primarily used for data theft and online fraud . It primarily appears bundled in compromised packages of Windows Security Essentials software . Once into the system it
manipulates the master boot record to its preferred routine to suit its purpose .  In addition to stealing essential data , Alureon can corrupt and delete important files . It can also hamper the functioning of anti-virus software and prevent updates to Windows .

Computers infected with Alureon were confronted with BSOD and system crashes , especially when installing security update MS 10-015 in Windows systems .


Friday 2 January 2015

IT Predictions for 2015




IT continues to dump its own data centres in favour of Cloud :
Though this is something that has been going on for a while , there is a whole new reason why this might just take-off in 2015 . With Windows server 2003 nearing death , companies might find it feasible to shift out to the cloud rather than investing in new server installations and updations .

Big Data’s growth is hampered by talent shortage :
Big Data is expected to be the biggest thing doing rounds of the IT world , but the explosive growth potential might just be hampered by lack of professionals trained for the purpose . But rest assured , any talent is this field is bound to be awarded with the richest dividends .There are all possibilities that the HR turns towards Big Data this fiscal year .


Tablets will crash and burn :
Of one of the biggest innovations that have not bode well to their expectations are tablets . An irreplaceable battery makes them even more tougher choice for potential buyers . Thus tablets are expected to go down line until and unless a Steve Jobs idea injection is done for them .


Expected Hiring explosion in Q1 and Q2 :
Hiring is expected to get a major boost with increased focus in employee education and training .The next generation of employees is also expected to be more inclined towards free lancing rather than full-time contracts .

Windows 10 will be a blockbuster , mostly :
This is expected to be the biggest contender for product of the year both by number and quality . Microsoft seems to be heading towards a big big year ahead .