Showing posts with label Web Technology. Show all posts

Tor or VPN? What’s Best And Which One Should I Use?

TOR vs VPN, a futile discussion that has been into existence since the last five to ten years. You should enlighten yourself with the fact, the two of them were created to serve the same purpose of accomplishing anonymity on the internet.
The two anonymity tools, Tor and VPN, are often confused to be rivals, as assumed by a layman internet user. But the question about the rivalry between the two is as vague as it is to compare a burger and french fries, as both them are meant to satisfy our belly, and the burger + fries combination does a commendable job enhancing our taste.
Talking about our anonymity saviours, they can be understood as two modes of transportation, like an aeroplane and a bus, VPN is like an aeroplane which is faster but costlier. And TOR, like the bus, is slower but cheap, can pick you up right outside your house, but that’s not the case with the aeroplane. TOR and VPN are meant to provide anonymity to you and help you hide your data and location from any “middle-man” existing in the network you’re connected to.
Now, before proceeding further, you need to read the following articles to get a better understanding about the working of TOR and VPN, if you’re not familiar with it:

When to use Tor?

The sole aim of TOR or The Onion Router, is to provide anonymity to you. It conceals your location from any probable third party by your data with some encryption layers and bouncing your data through different relays that exist in the TOR network, that are unknown to everyone using the TOR network.
Let me enlighten you with the fact, TOR encrypts your connection not your data, so if you’re sending some ‘plaintext’ information, then the exit node where the last layer of encryption is decrypted, the vulnerability exists that someone might access your unprotected data. So, it is advised that you use HTTPS connections to safeguard your data while it is on its way to the destination server.
And try not to send any confidential information like your email, phone or other personal details without any encryption, as it might serve as the means to identify you, no matter how many relays you’ve jumped through.
TOR is used in where high level of anonymity is required by the user such as in situations where you might want to act as a “Whistleblower” like Edward Snowden, who exposed NSA’s unethical acts, or if you’re under surveillance by the court of law, or if you don’t want someone to know who you are and what are you doing, or if you’re facing death threats or being stalked on the internet.
Well, TOR can’t be regarded as a full proof solution for the quest of anonymity, but the various relays present in the TOR network add to the difficulty faced by someone to trace your activity on the network, even NSA finds it difficult to identify someone on the TOR network.
Though it serves the purpose of hiding your identity, but costs your connection speed, that you’ll have to sacrifice if you want to use the TOR network. The movie buffs, and the torrenting guys will find TOR not much compelling as the high latency of the connection created while the data jumps through the relays, reduces the connection speed by a considerable amount.
It will be a wise act to use TOR only for loading static pages, which are well served on the high latency network, you’ll not be able to buffer youtube videos or download HD movies, for that need you’ll have to use VPN.

When to use VPN?

As you’ve the read the above links, and very well know that in a VPN connection an encrypted tunnel is created that allows an uninterrupted flow of your data from your device to the VPN server, which acts as your representative to the public internet.
VPN is capable of providing high speeds, can successfully meet the needs of our movies buffs and YouTubers. But in this thing also, only your connection is encrypted and not your data, so I advise you to use SSL protocol while sending some confidential data, as the VPN server has access to all the traffic you’ve initiated, but popular VPN services claim that they don’t store any logs. Well, that claim might be legitimate until any government agency asks them about your existence on their network.
A VPN network can be used in low-risk situations like if you’re not accused of some crime that you may or may not have committed, or if you want to hide yourself from various tracking tools on the internet and simply browse the internet or download torrents. They are also used to extend a company’s private network facilitating the employees to work from a remote location and still have access to the company’s resources.
VPN network can also be used to bypass geographical boundaries so as to gain access to blocked services or use the internet in places where the federal organisations have implemented network restrictions for the network users.

Final Note:

Both TOR and VPN have their pros and cons, but they are no enemies. Instead they were created to serve the same purpose, to provide anonymity to online users, but have been misunderstood as rivals. I can’t suggest you to choose one of them as each one outperforms the other on some aspects, and we can’t declare a winner in the TOR Vs VPN battle.
The need of the hour is to use both of them as per your need and proceed with serving your intentions. It is wise not to converse on their credibility and only contributes to the topic of a nugatory discussion. So, stay anonymous, stay safe.


Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

How An SQL Injection Attack Works


Just like DDoS attacks, SQL injection attacks too are pretty infamous in the internet world. They are responsible for about 27% of the total online attacks and thus they demand your attention. Read more to know different aspects and how an SQL injection attack works.
SQL injection attacks are one of the most common forms of cyber attacks. These attacks are very effective and about 32% of all Web applications are vulnerable to SQL injections.
SQL is a technique of code injection that is used to attack data-driven applications. Here, malicious SQL statements are inserted into any entry field for execution.
If you are not using the best practices, the notorious attackers can target your website to deploy SQL injection attacks and play with the sensitive data.
About 27% of all the web attacks are SQL injection attacks and the average cost of minor SQL injection attack is about $196,000.
We are sharing an infographic prepared by Barricade detailing different aspects of an SQL injection attack.
Take a look to know more on how an SQL injection attack works:


Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

How DDoS Attack Works?

DDoS attack is one of the favorite tools used by hackers to disrupt an online service. Here, we are going to tell you more about the attack using an easy-to-understand infographic.
Most of us are aware of the fact that DDoS attack- Distributed Denial of Service- is one of the most common attacks faced- and the recent times have seen a tremendous growth in such attacks. Recently, the New York Magazine’s website was down due to an alleged DDoS attack for more than 12 hours. For those who are new to this term, in simple works, a DDoS attack is an attempt to make an online service/website unavailable by flooding it with tons of traffic from different sources.
DDoS attack is one of the favorite tools used by hacktivists and other online groups to fulfill their motives by hiding behind a storm of HTTP request. The attacker makes a network of infected systems (botnets) by spreading malicious emails and software. After being infected, these systems could be controlled remotely and thus used to deploy a DDoS attack.
The infographic shared below is created by Ireland-based security firmBarricade and it gives a visual picture of a DDoS attack and other factors related to it. The good guys at Barricade have used various industry data to show that DDoS attacks affect more than 45% of organizations.
With an exponential growth in the internet usage, cyber vandalism and hacktivism have become more prominent and organizations face such DDoS attacks regularly. The security firm notes that launching a DDoS attack costs just $150, while its impacts could be quite expensive.
The infographic shows that China and India, followed by the U.S, are the biggest nurseries of DDoS attacks.
Take a look at this visual depiction of a DDoS attack and protect yourself and your site better:

Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

Who’ll Be The Winner: Human Intelligence Vs. Artificial Intelligence

The emergence of highly advanced technologies allowing generic  selection and fabrication of complex traits, including the selection of logical reasoning abilities, suggests that Human Intelligence will co -evolve with Artificial Intelligence.
While the belief in the abundance of availability and ease of fabrication of ARTIFICIAL INTELLIGENCE (AI) is  rather exaggerated, there is yet a streak of hope as there will expectedly be a speedy evolution of HUMAN INTELLIGENCE (HI) as well.
On one hand, while it is estimated that by the year 2050, AI would gain human ability and super-human ability by 2080, other facts like the cost to sequence a human genome $1,000 and the existence of highly advanced technologies allowing generic  selection and fabrication of complex traits. This includes the selection of logical reasoning ability, which leaves us in anticipation of the colossal potential of human ability.
Although by 2015, cognitive engineering is expected to produce individuals with an IQ of over 1,000, this only enlightens the fact that future smarter people and smarter machines shall be interwoven in a complex cycle of mutual interdependence.
History has been the witness of a handful of such geniuses with extraordinary cognitive abilities like Alan Turing- who broke the German Enigma Code and conceptualized the notion of “ mechanized thoughts”. The other exceptional example being Von Neumann, who laid practical realization of  first electronics, computers through his revolutionary von Neumann Architecture

While some fear that with the advancement in AI in the future, the ordinary human may lose the ability to comprehend advancement in technologies,  there lies a counter theory to this being that ordinary human beings of future will accept MI without deep understanding of it just like we use high technology smart-phones now without any prior knowledge about its knowledge or architecture.

History stands as the witness of how great scientists back in 20th Century feared about the ignorance of the future generation about Quantum Theory in Physics. While in Today’s world a good fraction of people  not only has successfully understood the theorems, but also found brilliant applications of the same.
With advancements in technologies, human minds shall be uploaded with AI to create the beginning of “ shared thoughts “ – which shall lead to the dawn of new horizon of AI.
Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

What Is SSL Encryption and Why Is It Important?

The Internet is not a safe place and one thing everyone knows is that you’ve got to be careful when it comes to protecting your private information. There are many people out there who want to obtain your information and use it for their own personal gains. This means you have to be extremely careful as you seek to avoid this.
If you’re trying to play it safe while surfing the internet, you need to make sure you’re using a website you can trust. You can verify this by making sure the sites you visit use SSL protocol.

How SSL Protocol Works

SSL was developed by Netscape as a means to make the internet a little bit safer. SSL stands for “Secure Sockets Layer.” It’s a protocol that was developed which allows you to transmit private documents and data on the internet. SSL keeps your data encrypted by using a cryptographic system made up of two separate keys. The first key is public and the second key, which belongs to the user receiving the data, is private.
SSL is used by websites which commonly collect information like log-in data, private data such as your social security information and credit card information.

How Do You Know If a Website Uses SSL Encryption?Websites which need a SSL connection will start with “HTTPS” as opposed to “HTTP.” The acronym “HTTPS” stands for “Hyper Text Transfer Protocol Secure” which means that if implemented correctly, your data is safe to be transmitted. This means you should get into the habit of looking for the “HTTPS” in the web address of whatever site you’re using if you plan on transferring private data through the site’s server.


Sites using SSL will need to register for a digital certificate. This digital certificate allows a website to transfer private data on the internet by using a public key infrastructure, commonly referred to as simply PKI. This digital certificate is also known as a public key certificate.
It’s worth it to take a few extra minutes and do some research on the sites you use. A site with a good reputation will have great reviews and little if any instances of a security breach.

What This Means to You

Now that you know a little bit about SSL and how it works, you should have a better idea of how you can protect yourself in the digital world. The internet isn’t always a safe place but there is plenty you can do to protect your information. And knowledge equals power when it comes to maintaining your privacy.
You now know what to look for and it’s up to you to make sure that the websites that you use are reputable and trustworthy. The internet creates victims every single day but you don’t have to be one of them. Remember to always look for the “HTTPS” when making a purchase or transferring private data. The power is in your hands, so keep your eye on the address bar in your web browser and always follow your gut, if something doesn’t seem right, leave it and play it safe.

Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

Six Steps to Build a Perfectly Branded Website

Every single business needs to have a perfectly branded website, as this is the place where all of your online marketing efforts begin and end, it’s the center of your universe and all of your social media and other online marketing channels act as satellites directing people back to your website.
Having just any old website will not do your business any favors, in fact it’s more than likely to do the opposite and help drive potential customers away. To help ensure you have a perfectly branded website, follow these few steps.

Choose Your Domain Name Wisely

If you already have a name for your business, your domain name should typically match it. If you cannot purchase the exact name, because someone else has it, consider using keywords or keyword phrases that match what you do in your business instead. Be careful here, though. If you change your products or services later, you may have to start over.

Use a Reliable Hosting Service

While this may not seem to be related to your brand, it is because you want your hosting company to be very reliable so that your website does not have much, if any down time because most people will not revisit a website they find that is offline. If they click through on some of your advertising and end up on an error page due to the fact that your website has crashed or is down, they probably won’t come back. It’s also worth checking out what support your hosting company offers and how easy it is to contact them when something goes wrong.

Design User-Friendly Navigation

No one likes going to a website and being unable to find what they are looking for, so try to make it super easy for your visitors to find everything on your website by having multiples types of website navigation and multiple ways to contact you. Don’t try to have a flash navigation system that no one understands, have your home button top left and contact us far right, why? Because this is where people expect to find them and by doing this you’ll give people what they expect and you’ll get more click through.

Create an Attractive Layout

The layout of your website should be pleasing to the eye, match your other marketing materials and evoke the emotions you want it to, based on your brand’s image. It should be responsive and work on multiple devices, oh and if your website is not responsive you are losing out big-time as more people now access the Internet via mobile devices than by computer and these people are not going to your website unless its responsive.

Blog Regularly and with a Purpose

It’s not enough to just have a blog that you update every now and again. You need a blog that has targeted information relating to your business written for your targeted audience. The blog posts should be smart, unique, and speak to your audience as well as use keywords that attract search engine traffic and you must update your blog regularly and to a schedule your audience can learn and therefore can anticipate new content.

Keep All Information Updated

Aside from a blog that is updated on a regular basis, it is important that other information on your website is also kept updated. If you’ve listed your staff on your website, and someone leaves or someone else joins make it a priority to update this information. This applies to all information as people don’t want to read about past events, outdated news or anything that isn’t currently applicable, so keep it updated and your audience engaged.
It’s also important to always keep promoting your website via your social media accounts and every other means you know about and understand The more you promote your website, the more likely you are to want to keep it current and relevant to your audience. You should be proud of your website, and it should form one of the key ingredients of your marketing plan.
Any type of marketing done online should be aimed at directing people back to your website – whether it’s to go to the website to fill out a form, to read a blog post, to watch a video, to sign up for a contest, or to buy something. The website is the center of your online universe and everything else satellites directing people back.


Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

2 Billion Lines Of Code For Google’s Internet Services And Its All In One Place

Google’s Internet Services Has 2 Billion Lines Of Code, Which Is 40 Times Size Of The The Windows

According to Google Engineering Manager, Rachel Potvin at an engineering conference in Silicon Valley on Monday estimated that the software required to run all of Google’s Internet services from Gmail to Google Search to Google Maps extends to about 2 billion lines of code, in comparison to Microsoft’s Windows operating system, which is likely around 50 million lines of code. This means that the size of the software required for the Google service is 40 times the size of the Windows.
These 2 billion lines of code that support Google services include running Google Search, Google Maps, Google Docs, Google+, Google Calendar, Gmail, YouTube, and any other Google Internet service, all sit in a singular formula repository accessible to all 25,000 Google engineers.
Google treats a formula like a very large handling system within the company. “Though we can’t infer it,” Potvin says, “I would theory this is a largest singular repository in use anywhere in a world.”
Only coders inside Google have access to its enormous repository. With the internet at large, in some way, it is similar to GitHub, the public open source repository where engineers can share enormous amounts of code.
“Having 25,000 developers, as Google does, means it’s sharing code with a diverse set of people with diverse set of skills,” says Sam Lambert, the director of systems at GitHub. “But, as a small company, you can get some of that same advantage using GitHub and open source. There’s that saying: ‘A rising tide raises all boats.’”
On the down side, it is no simple task to build and run a 2-billion-line monolith. “It must be a technical challenge—a huge feat,” Lambert says. “The numbers are absolutely staggering.”
The best thing about GitHub is that it lets coders to easily share and work jointly on code. While GitHub spans millions of projects without housing any software project, Google combines many projects into one. This might look a little foolish due to the difficultly of juggling that much code across that many engineers. However, it works, according to Potvin.

Listen to the Piper

To juggle all this code, Google has built its own “version control system” called Piper, which runs across the immense online infrastructure it has built to run all its online services. The system spans 10 different Google data centers, according to Potvin.
This system gives Google engineers a different freedom to use and combine code from across countless projects. Further, any single code change made by the engineers can be immediately deployed across all Google services. One update everything gets updated.
However, the flipside to it, as Potvin points out, is the highly sensitive code such as Google’s PageRank search algorithm that are present in separate repositories only available to specific employees. The code for Android and Chrome also gets stored in different separate version control systems. Google code for the most part is a monument that allows for the free flow of software building blocks, ideas, and solutions.

The Bot Factor

Building and running such a system needs not only know-how but very large amounts of computing power, points out Lambert. Piper spans about 85 terabytes of data (aka 85,000 gigabytes), and Google’s 25,000 engineers make about 45,000 commits (changes) to the repository each day. While Google engineers modify 15 million lines of code across 250,000 files each week, the Linux open source operating spans 15 million lines of code across 40,000 software files.
Simultaneously, Piper must work to get rid off most of the burden from human coders. It must make sure that humans can cover their heads around all that code without stepping on other’s toes with code changes and also remove unused code and bugs from the repository, making life easier for humans. By Google switching to Piper from its previous version control system—a tool called Perforce, it has started generating a lot of the data and configuration files required to run the company’s software.
Potvin explains that humans not only maintain the health of the code to ensure changes are made and bugs removed, but also bots.

Piper for Everyone

It seems that many of today’s high-tech internet companies run their business similarly. Facebook treats its main app as a single project, as it spans upwards of 20 million lines of code. The same is done by others on a smaller scale. But, dthe logistics can become a hindrance, when companies becomes as big as Google or a Facebook. However, Google and Facebook are searching for ways to change that for everyone.
Currently, they both are working on an open source version control system that can be used to juggle code on an exceptionally large scale by everyone. It’s based on an existing system called Mercurial. “We’re attempting to see if we can scale Mercurial to the size of the Google repository,” Potvin says, pointing out that Google is working in tandem with programming guru Bryan O’ Sullivan who assists in supervising coding work at Facebook.
Very few companies today juggle as much code as Google or Facebook do. However, they will in the near future.
Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

Quantum Communications Network

China Launching Hack Proof Quantum Communications Network In 2016


In the dawn of modern warfare of subtle cyber intrusions, China is ready and set to use world’s first and largest hack proof quantum communication network. The unhackable quantum communication network will be launched in 2016 and will stretch from Beijing to Shanghai.
After whistleblower Edward Snowden’s revelations, the entire world was aware of America’s sinister plans to target “network backbones” worldwide. China as its counter is now a step closer to design and use the world’s most secure encryption technology for communication.
The “network backbones” are the net grids where a huge amount of data is transferred and if under attack, could pose a serious threat to any nation. China has claimed of putting to use a new “unhackable” quantum network that will stretch from Beijing to Shanghai by 2016.
Although the quantum communication technology was first proposed by IBM scientists in the 1980s, the technical limitations like maintaining the qubits’ ever-changing quantum state such as their spin over large distances, rendered the idea to a slumber.
There had been a recent surge in developing Quantum computers but in the wake of the cyber intrusions, China will become the first country to use the encrypted quantum communication network on such a large scale. Reports suggest that by 2030, Chinese super secure network will extend across the globe.
Xinhua, the official press agency for China said the network would specifically be used by the institutions that could be the potential targets like central government, military and critical business institutions like banks. Later, the hack proof quantum communication network will be extended to general use as well.
China has progressed in the quantum technology field due to major funding to its research and development programs. Several other countries like Japan, Canada, EU and even the US are planning to launch quantum communication satellites.
 The stress is laid on developing a quantum communication network because the system is hack proof and unbreakable, theoretically. If anyone tries to intercept the encryption key, the qubits’ physical state will be altered and the information lost. Also, an alarm will be triggered to alert the communicators.

So basically, the new hack-proof quantum communication network will be the bigger and badder version of Enigma.


Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com