Tuesday 12 August 2014

What is the difference between a domain, a workgroup, and a homegroup? Domains, workgroups, and homegroups

They represent different methods for organizing
computers in networks. The main difference
among them is how the computers and other
resources on the networks are managed.
Computers running Windows on a network
must be part of a workgroup or a domain.
Computers running Windows on home
networks can also be part of a homegroup,
but it's not required.
Computers on home networks are usually
part of a workgroup and possibly a
homegroup, and computers on workplace
networks are usually part of a domain.
In a workgroup:
============
All computers are peers; no computer has
control over another computer.
Each computer has a set of user accounts. To
log on to any computer in the workgroup,
you must have an account on that computer.
There are typically no more than twenty
computers.
A workgroup is not protected by a password.
All computers must be on the same local
network or subnet.
In a homegroup:
=============
Computers on a home network must belong
to a workgroup, but they can also belong to
a homegroup. A homegroup makes it easy to
share pictures, music, videos, documents,
and printers with other people on a home
network.
A homegroup is protected with a password,
but you only need to type the password
once, when adding your computer to the
homegroup.
In a domain:
==========
One or more computers are servers. Network
administrators use servers to control the
security and permissions for all computers
on the domain. This makes it easy to make
changes because the changes are
automatically made to all computers. Domain
users must provide a password or other
credentials each time they access the
domain.
If you have a user account on the domain,
you can log on to any computer on the
domain without needing an account on that
computer.
You probably can make only limited changes
to a computer's settings because network
administrators often want to ensure
consistency among computers.
There can be thousands of computers in a
domain.
The computers can be on different local
networks.
==========================================
Note : - Info Based and copied from MS
official Website , For more u can visit &
learn From Microsoft Website
===========================================

Asymmetric digital subscriber line ( ADSL ) & Digital subscriber line (DSL )

Asymmetric digital subscriber line (ADSL) is a
type of digital subscriber line (DSL)
technology, a data communications
technology that enables faster data
transmission over copper telephone lines
than a conventional voiceband modem can
provide. It does this by utilizing frequencies
that are not used by a voice telephone call. A
splitter, or DSL filter, allows a single
telephone connection to be used for both
ADSL service and voice calls at the same
time. ADSL can generally only be distributed
over short distances from the telephone
exchange (the last mile),
Note :- typically less than 4 kilometres (2
mi), but has been known to exceed 8
kilometres (5 mi) if the originally laid wire
gauge allows for further distribution.
At the telephone exchange the line generally
terminates at a digital subscriber line access
multiplexer (DSLAM) where another
frequency splitter separates the voice band
signal for the conventional phone network.
Data carried by the ADSL are typically routed
over the telephone company's data network
and eventually reach a conventional Internet
Protocol network.
ADSL (Asymmetric Digital Subscriber Line)
uses an ordinary phone line to deliver a
high-speed Internet connection. It does this
by converting the data from your computer
into high-frequency signals. These high-
frequency signals can travel along a
telephone cable at the same time as a voice
call because the ADSL and voice signals use
different frequency ranges
Digital subscriber line (DSL; originally digital
subscriber loop) is a family of technologies
that provide internet access by transmitting
digital data using a local telephone network
which uses the Public switched telephone
network. In telecommunications marketing,
the term DSL is widely understood to mean
asymmetric digital subscriber line (ADSL), the
most commonly installed DSL technology.
DSL service is delivered simultaneously with
wired telephone service on the same
telephone line. This is possible because DSL
uses higher frequency bands for data. On the
customer premises, a DSL filter on each non-
DSL outlet blocks any high frequency
interference, to enable simultaneous use of
the voice and DSL services.
The bit rate of consumer DSL services
typically ranges from 256 kbit/s to over 100
Mbit/s in the direction to the customer
(downstream), depending on DSL technology,
line conditions, and service-level
implementation. Bit rates of 1 Gbit/s have
been reached in trials. In ADSL, the data
throughput in the upstream direction, (the
direction to the service provider) is lower,
hence the designation of asymmetric service.
Note:- In symmetric digital subscriber line
(SDSL) services, the downstream and
upstream data rates are equal.
Researchers at Bell Labs have reached
broadband speeds of 10Gbps, while
delivering 1Gbit/s symmetrical ultra-
broadband access services using traditional
copper telephone lines. These speeds can be
achieved with existing telephone lines and
can be used to deliver broadband where
fiber optic cables can't be installed to the
premise.
A 2007 book described DSL as "the most
globally prolific broadband access
technology, yet it is only available to around
60–75 percent of the population in many
developed countries." A 2012 survey found
that "DSL continues to be the dominant
technology for broadband access" with 364.1
million subscribers worldwide

Voice-over-Internet Protocol (VoIP)

Voice over IP
Voice-over-Internet Protocol (VoIP) is a
methodology and group of technologies for
the delivery of voice communications and
multimedia sessions over Internet Protocol
(IP) networks, such as the Internet. Other
terms commonly associated with VoIP are IP
telephony, Internet telephony, voice over
broadband (VoBB), broadband telephony, IP
communications, and broadband phone
service.
The term Internet telephony specifically
refers to the provisioning of communications
services (voice, fax, SMS, voice-messaging)
over the public Internet, rather than via the
public switched telephone network (PSTN).
The steps and principles involved in
originating VoIP telephone calls are similar
to traditional digital telephony and involve
signaling, channel setup, digitization of the
analog voice signals, and encoding. Instead
of being transmitted over a circuit-switched
network, however, the digital information is
packetized, and transmission occurs as IP
packets over a packet-switched network.
Such transmission entails careful
considerations about resource management
different from time-division multiplexing
(TDM) networks.ternet Protocol (VoIP) is a
methodology and group of technologies for
the delivery of voice communications and
multimedia sessions over Internet Protocol
(IP) networks, such as the Internet. Other
terms commonly associated with VoIP are IP
telephony, Internet telephony, voice over
broadband (VoBB), broadband telephony, IP
communications, and broadband phone
service.
The term Internet telephony specifically
refers to the provisioning of communications
services (voice, fax, SMS, voice-messaging)
over the public Internet, rather than via the
public switched telephone network (PSTN).
The steps and principles involved in
originating VoIP telephone calls are similar
to traditional digital telephony and involve
signaling, channel setup, digitization of the
analog voice signals, and encoding. Instead
of being transmitted over a circuit-switched
network, however, the digital information is
packetized, and transmission occurs as IP
packets over a packet-switched network.
Such transmission entails careful
considerations about resource management
different from time-division multiplexing
(TDM) networks.

Target website hacking

>firstly you can use the scanner like
acuenetix,netsparker,nikto,nessus etc
and you can check the known vuln like the
sqli,rfi,lfi,web dav etc
>if this attack can not success then you can
use this awesome trick
-firstly by using http://www.yougetsignal
.com/ that website you can find the all
website which is running on that server
- after that you can by using bing search
engine
-and check target website is on shared ip
-on the bing search ip:server ip adress
-ip:server ip adress .php?id= (for checking
sqli vuln website on that server)
-ip:server ip adress admin (for checking the
admin of that website in that server and use
sql injection)
-ip:server ip adress upload (for upload the
shell on website)
>if you get any vuln(like -sqli,rfi,web dav etc)
you can upload your shell on that website by
using that shell you can get access on the
target website.once you get access on target
website you can deface the whole website
******************************
**********************************
there are several dork for finding vuln
you can create your own dork and use that
for hacking all the website on that server

Prominent world founders

*Founder of facebook-Mark zuckerburg
*Founder of Apple Computers – Steve Jobs
*Founder of Artificial Intelligence – John
McCarthy
*Founder of Bluetooth – Ericsson
*Father of Computer – Charles Babbage
*Father of ‘C’ Language – Dennis Ritchie
*Founder of Email – Shiva Ayyadurai
*Founder of Google – Larry Page and Sergey
Brin
*Founder of Internet – Vint Cerf
*Father of ‘Java’- James Gosling
*Father of JQuery – John Resig
*Founder of Keyboard – Christoper Latham
Sholes
*Founder of Linux – Linus Torvalds
*Founder of Microsoft – Bill Gates and Paul
Allen
*Founder of Mobile Phones – Martin Cooper
*Founder of Mouse – Douglas Engelbart
*Founders of Oracle – Ed Oates, Larry
Ellison, Bob Miner
*Founder of Php – Rasmus Lerdorf
*Founder of USB – Ajay V.Bhatt
*Founder of WWW – Tim Berners-Lee
*Founder of Yahoo – Jurry Yang and David
Filo

Wednesday 6 August 2014

Eight unknown facts of android -

• It wasn't Google's idea: Android was the
brainchild of
Andy Rubin, who founded Android Inc. in
October 2003
with the aim of creating a new mobile
platform. Google
later bought Android Inc. and hired Rubin
and others in
August 2005.
• It almost didn't work out: Android almost
immediately
ran out of cash after its founding, only to be
saved,
according to the Businessweek, by Steve
Perlman.
• The Nexus line was a hot rumour years
before the
Nexus One: People started predicting about
the
"gPhone" as early as 2007 though Nexus
came out in
2010.
• Microsoft thought it would be a non-event:
Microsoft's Scott Horn, then head of the
Windows
Mobile marketing team, had told Engadget
after
Android's release, "I don't understand the
impact they
are going to have."
• Resolution scaling was introduced in
Version 1.6: The
ability to automatically scale images based
on display
size appeared in Donut, or Android 1.6,
paving the way
for the huge range of device form factors on
the Android
market today.
• There's an Android phone in space: A
British firm
launched a Nexus phone on Space, to control
a satellite
as part of an experiment and see how well
consumer-
grade electronics stand up to the rigors of
space.
• Every app you run on your Android phone
gets its own
virtual machine: Each active app on an
Android device
runs in its own Dalvik VM, which keeps it
safe and
separate from core functions. This improves
battery life
and boosts performance of the phone.
• The first official version code name was
NOT a
dessert: Google's Dan Morrill confirmed in
January that
the very first alpha version of Android
released to
internal developers was R2-D2.