Sunday, 11 October 2015

HARDWARE NETWORKING

                                  COMPUTER HARDWARE

It refers to objects that you can actually touch, like disksdisk drives,display screenskeyboardsprintersboards, and chips. In contrast,software is untouchable. Software exists as ideas, concepts, and symbols, but it has no substance.Books provide a useful analogy. The pages and the ink are the hardware, while the words, sentences, paragraphs, and the overall meaning are the software. A computer without software is like a book full of blank pages -- you need software to make the computer useful just as you need words to make a book meaningful.
                                             HARDWARE COMPONENTS
1.MOTHERBOARD
Now, the first thing is the motherboard. It's the basis of your computer. It's the first component installed in the system unit, and it holds all of the circuitry that ties the functions of the computer components together.
You can think of it like your car (which has many computer systems of its own). If you have a frame and tires, you've got a car (or you've got a system unit), but it won't take you very far! Now, add your engine - the motherboard - where all the systems tie in one way or another, and you've got the start of a working vehicle.
Image result for intel mother board
2.CENTRAL PROCESSING UNIT
The central processing unit, or the brains of the computer, sits on the motherboard and does actually have its own cooling fan. The processors now are so fast they need to be cooled down. All the instructions you give the computer - like a click of a mouse - go through the CPU, which processes in billions of cycles per second. 
Image result for cpu
3.RANDOM ACCESS MEMORY 
Random-access memory (RAM) is a type of computer data storage. A RAM device makes it possible to access data in random order, which makes it very fast to find a specific piece of information. Certain other types of storage are not random-access. For example, a hard disk drive and a CD will read and write data in a predetermined order. The mechanical design of these devices prescribes that data access is consecutive. This means that the time it takes to find a specific piece of information can vary greatly depending on where it is located on the disc.RAM devices are used in computer systems as the main memory. RAM is considered volatile memory, which means that the stored information is lost when there is no power. So, RAM is used by the central processing unit (CPU) when a computer is running to store information that needs to be used very quickly, but it does not store any information permanently.Present-day RAM devices use integrated circuits to store information. This is a relatively expensive form of storage and the cost per unit of storage is much higher than for devices like a hard drive. However, the time to access data is so much faster for RAM that speed outweighs cost. A computer therefore uses a certain amount of RAM for fast-access, temporary storage of information and a much larger amount of non-random, permanent mass storage, like a hard disk drive. For example, a typical computer system may have two to eight GB (gigabytes) of RAM. 
Image result for ram
3.CACHE MEMORY
Cache memory, also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. This memory is typically integrated directly with the CPU chip or placed on a separate chip that has a separate bus interconnect with the CPU.The basic purpose of cache memory is to store program instructions that are frequently re-referenced by software during operation. Fast access to these instructions increases the overall speed of the software program.As the microprocessor processes data, it looks first in the cache memory; if it finds the instructions there (from a previous reading of data), it does not have to do a more time-consuming reading of data from larger memory or other data storage devices.Most programs use very few resources once they have been opened and operated for a time, mainly because frequently re-referenced instructions tend to be cached. This explains why measurements of system performance in computers with slowerprocessors but larger caches tend to be faster than measurements of system performance in computers with faster processors but more limited cache space.Multi-tier or multilevel caching has become popular in server and desktop architectures, with different levels providing greater efficiency through managed tiering. Simply put, the less frequently access is made to certain data or instructions, the lower down the cache level the data or instructions are written.
Image result for cache memory
4.READ ONLY MEMORY(ROM)
Computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read.Unlike main memory (RAM), ROM retains its contents even when the computer is turned off. ROM is referred to as being nonvolatile.
Image result for read only memory
TYPES OF ROM
Programmable Read-Only Memory (PROM)
Electrically Programmable Read-Only Memory (EPROM)
Electrically Erasable Programmable Read-Only Memory (EEPROM; also called Flash ROM)
Electrically Alterable Read-Only Memory (EAROM)

5.MOUSE
A device that controls the movement of the cursor or pointer in a display screen. A mouse is a small object you can roll along a hard, flat surface. Its name is derived from its shape, which looks a bit like a mouse, its connecting wire that one can imagine to be the mouse's tail, and the fact that one must make it scurry along a surface. As you move the mouse, the pointer on the display screen moves in the same direction. Mice contain at least one button and sometimes as many as three, which have different functions depending on what programe  is running. Some newer mice also include a scroll wheelfor scrolling through long documents.
Image result for mouse
6.KEYBOARD
A keyboard is the set of typewriter-like keys that enables you to enter data into a computer and other devices. Computer keyboards are similar to electric-typewriter keyboards but contain additional keys. 
Image result for keyboard
7.MODEM (mō´dem) (n.) Short for modulator-demodulator
A modem is a device or programe  that enables a computer to transmit data overfor example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms.
Image result for modem













Saturday, 10 October 2015

                                     HACKING TIPS

HACKING is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hackerhave a deeper look

1. Learn UNIX/LINUX

linux operating system

UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.

2. Code in C language 

c programming
C programming is the base of learning UNIX/LINUX as this operating system is codedin C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language

programming languages

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available.

4. Learn Networking Concepts

computer networking
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 

operating system
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

cryptography encryption
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

hacking or hackers
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

8. Experiment A Lot

experiment
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)

hacking vulnerability

Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.

10. Contribute To Open Source Security Projects

open source software
An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, apache offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

learning hacking
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 

discussion
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.