Posts

MACHINE INTELLIGENCE

Image
Yes Machines Can Get Whip-Smart ! Why can’t they? When we all know nothing is impossible. Mankind has come across a long way, the journey from stone and bronze to Iron Age is no less than a marvel. Today we are in digital age and slowly we are actually moving into the world of machines, the era of ‘Artificial Intelligence’. The phase where machines will evolve smarter, much advanced to make their own choice & decisions. We have witnessed how computers and phones have got smarter with time. We humans have senses that add to our intelligence, we have eyes to see, ears to hear, mouth to speak skin to feel, nose to smell legs and hands to work etc. When all these senses comprised together are fed into an artificial object it too can have the future where it will stand side by side to human capabilities matching intelligence of its generator. In fact if we look around we will realize lots of intelligent objects around us. We have Siri, Google Now & Cortana as our v...

Smart City IoT Applications

Image
Every year more number of peoples are moving into cities for better living standards & Livelihood. By 2050 it’s expected that 70 % of world population will be living in cities. This rapid rise in urbanization has already put the existing infrastructure in strain. So to accommodate this new demand cities are innovating new technologies such as Internet of things to enhance their services & communication.   These IOT equipment and technologies enable us to be smarter and make various aspects of cities more accessible and applicable and smarter. There’s a huge potential for IoT in every aspects of urban living. Here are some of the most important applications we would like to see in smart cities. Smart Public Transport: Internet of Things can provide us with real time insights of whenever there is a road closure, breakdowns or bad weather. With the help of IoT transport authorities can ensure public have access to safe, reliable and efficient transport i...

RANSOMWARES I WannaCry I Petya

Image

ETHICAL HACKING !

Image
Hacking is the act of finding the possible entry points that exist in a computer  system or a computer network and finally entering into them. Ethical hacking is key to strengthening network security, and it's one of the most  desired skills for any IT security professional.   A computer expert who does the act of hacking is called a "Hacker". Hackers are those who seek knowledge, to understand how systems operate,  how they are designed, and then attempt to play with these systems.   Hacking is usually legal as long as it is being done to find weaknesses in a computer  or network system for testing purpose.   This sort of hacking is what we call Ethical Hacking .    Hacking comes in many colours:- White  Grey  Black Shades in between

Secure Your Mobile Number !

Image
Secure Your Mobile Number-Protect Y ourself from Hackers !

FIGHT BACK RANSOMEWARE !

Image

CRYPTOVIROLOGY

Image
Cryptovirology is a field that studies and researches about various ways by which cryptography application can be used to design malicious software's. It investigates how modern cryptographic paradigms and tools can be used to strengthen, improve and develop new malicious software's for malware attacks. Cryptovirology is a forward engineering discipline that is primarily used for attacking rather defending. This field emerged with an observation that a public-key cryptography can be used to break the symmetry between what an antivirus analyst sees regarding a malware and what attacker observes. Antivirus analyst observes a public key contained in the malware whereas an attacker sees the public key contained in the malware as well as its corresponding private key outside the malware. This public key allows the malware to perform trapdoor function on victim's computer that attacker can only undo.