Posts

Showing posts from May, 2021

Blockchain Technology

Image
Blockchain What is Blockchain Technology? How does it Work? Blockchain Technology Defined Blockchain technology is most simply defined as a decentralized, distributed ledger that records the provenance of a digital asset. By inherent design, the data on a blockchain is unable to be modified, which makes it a legitimate disruptor for industries like payments, cybersecurity, and healthcare. In simpler words, the digital ledger is like a Google spreadsheet shared among numerous computers in a network, in which, the transactional records are stored based on actual purchases. The fascinating angle is that anybody can see the data, but they can’t corrupt it. How Does Blockchain Work? Blockchain consists of three important concepts: blocks, nodes, and miners. Blocks : Every chain consists of multiple blocks and each block has three basic elements:                     The data in the Block                    A 32-bit whole number called a nonce. The nonce is randomly generated when a block is

Computer Terminologies

Image
7 Computer Terminologies you must know. 1)Firewall:  A firewall is a piece of computer software or hardware that restricts the data that is allowed to flow through. Firewalls block traffic that is undesirable in some way, the intention being to prevent infection by malware and so on without restricting the user from carrying out the legitimate activity. 2)Cookie:  A small text file sent to your computer by a web site you have visited. These can be very useful in that they can allow the website to recognize who you are when you return. Cookies cannot store viruses or other threats, although they can be used to track your activity across different web sites in order to provide, for example, “targeted” advertisements. 3)Bits, Bytes:  At a basic level, all computer data is just a series of 0s and 1s. Each of these is referred to as a “binary digit”, for which “bit” is just an abbreviation. A byte is (generally) a collection of eight bits, so-called because of the pun with bit and bite . 1

Android Security Attacks

Image
5 Types of  Android attacks All mobile devices are vulnerable to various threats. These threats continue to grow year over year and will continue to pose a major risk to mobile device users in the years to come. 1)Untrusted APKs:   If you have a phone running Android Oreo or higher, you won’t see a setting to allow the installation of apps from unknown sources. Instead, Google treats this as app permission and you’re asked each and every time you want to install an app you got from Applivery. 2)SMS attacks: It involves the creation and distribution of malware by cybercriminals designed to target a victim’s mobile device. These Trojan, in turn, are designed to make unauthorized calls or send unauthorized texts without the user’s knowledge or consent. 3)Spying attacks: Some Applications may spy on mobile users and report to remote attackers.  The spyware can steal messages, contacts, device details, browser bookmarks, and search history, record calls and ambient sound from the microphone

MS Excel Shortcut Keys

Image
 10 Shortcut Keys for MS Excel Windows Hotkey Mac Hotkey What It Does Ctrl+O Command+O Display [Open file] dialog box. Ctrl+F Command+F Display [Find] dialog box. Ctrl+C Command+C Copy the active cells to the clipboard. Ctrl+P Command+P Display [Print] dialog box. Ctrl+Z Command+Z Undo the last action. Ctrl+Y Command+Y Redo the last action. Ctrl+S Command+S Save workbooks. Ctrl+X Command+X Cut the active cells to the clipboard. Ctrl+V Command+V Paste the copied contents from the clipboard. Alt+F4 Command+Q Quit Excel.

MS Word Shortcut Keys

Image
  10 shortcut keys for MS Word Windows Hotkey Mac Hotkey What It Does Ctrl+N Command+N (New) Creates a new blank document. Ctrl+O Command+O (Open) Displays the Open dialog box to select a file to open in Word. Ctrl+S Command+S (Save) Saves the current document. Ctrl+P Command+P (Print) Opens the Print dialog box to print the current page. Ctrl+Z Command+Z (Undo) Cancels the last change made to the document. Ctrl+Y N/A (Repeat) Repeats the last command executed. Ctrl+C Command+C (Copy) Copies the selected content to the Clipboard without deleting the content. Ctrl+X Command+X (Cut) Deletes selected content and copies the content to the Clipboard. Ctrl+V Command+V (Paste) Pastes the cut or copied content. Ctrl+ F Command+F (Find) Finds text within the current document.

Power Shell Tricks

Image
5 Cool things you can do with Windows PowerShell Windows PowerShell  is a powerful tool for automating tasks and simplifying configuration and can be  used  to automate almost any task in the  Windows  ecosystem, including active directory and exchange. 1) Perform your favorite CMD task in Powershell :  Yes, you can stop using the DOS prompt and start doing all of those same tasks within PowerShell. This can make learning a little easier and help you become more familiar with the interface. Unfortunately, from the run prompt, there is no three-letter launcher like cmd. But PowerShell will launch it. You can also assign a shortcut key to PowerShell so Ctrl + Shift + P launches it directly. 2)Insert timestamps into PowerShell outputs:  For your PowerShell tasks, you can have a timestamp entered in series so you can determine how long a single step occurs or to use it as a logging mechanism for your scripts. I find this handy in Graphical PowerShell when I'm testing scripts. To inser

Computer Security Threats

Image
  8  Computer Security Threats You Must Know There are several types of computer security threats such as  Trojans   Virus ,  Adware ,  Malware , Backdoor,  hackers ,  and much more. Check some of the most harmful types of computer Security Threats. 1) Trojan:  Trojan viruses work  by taking advantage of a lack of security knowledge by the user and security measures on a computer, such as an antivirus and antimalware software programs.                                                                                        2) Spyware:  Spyware  is unwanted software that penetrates your computing device, stealing your internet usage data and sensitive information . 3) Ransomware :  Ransomware is a form of malware  that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment.  5)Adware:  Adware, or advertising-supported software, is software that displays unwanted advertisements on your computer.  Adware uses the browser
Image
  10  Annoying Windows 10 Issues & How to Fix Them 1) Fix computer booting very slowly A slow PC may be caused by a host of things, including very low memory, malware, or damaged drive. Before anything, try rebooting your computer and check whether the problem is solved. If not: In  Task Manager , open the  Startup  tab and disable the background apps that run upon booting PC. You can also try deleting temporary files. In the  Search  field, type  %temp% . In the  Run  window, a list of temp files will show. Select and delete those that you do not need anymore, since they take up a lot of memory. 2) Speeding up your PC Having too many applications on startup can slow down your PC by a lot. Since they run in the background, they will take up some of your precious drive space, making the computer boot slower. Some of these apps are unnecessary, so you can easily stop them from running as soon as you boot your computer. Press the  CTRL + SHIFT + ESC  buttons simultaneously and select