Showing posts with label Information. Show all posts
Showing posts with label Information. Show all posts

Friday 18 October 2013

Common Computer Acronyms


Here is a list of Common Computer Acronyms and there full forms.
Check out my other tips and tricks here.

---A---

ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended

--- B ---

BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector

--- C ---

CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)

--- D ---


DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSL - See ASDL
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory

--- E ---

ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation

--- F ---

FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus

--- G ---

GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz

--- H ---

HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan

--- I ---

IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization

--- J ---

JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America

--- K ---

Kbps - Kilobits Per Second
KBps - KiloBytes per second

--- L ---

LG - LG Electronics
LAN - Local Area Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode

--- M ---

MAC - Media Access Control
MB - MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International

--- N ---

NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card

--- O ---

OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer

--- P ---

PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit

--- R ---

RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute

--- S ---

SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface

--- T ---

TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name
TCP - Transmission Control Protocol

--- U ---

UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair

--- V ---

VCD - Video CD
VPN - Virtual Private Network

--- W ---

WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get

--- X ---


XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology

Home Page Tutorials

Saturday 5 October 2013

Awesome websites to Learn Hacking

Awesome Websites to Learn Hacking


You might also like:How to change Splash screen of Photoshop


Are you one of those who are interested in Hacking and want to learn How the Hackers do those stuff? Than the websites mentioned below will help you pull out something and you can do those hacky stuffs too.

Let's move to our list of Awesome Websites to Learn Hacking !

Backtrack

If you have used Backtrack than you must have known it's usefulness in Hacking and Penetration Testing. This website provides many tutorials using Backtrack and they have their own training programs. Visit this Site: Backtrack-Linux.org

Hack This Site!


Hack This Site is one of the best ethical hacking training website. This site provides many hacking and cracking challenges to test your skills. This site also provides vast selections of ethical hacking articles and tools. Visit this Site: HackThisSite.org

HellBound Hackers

HellBound Hackers is a security training website which provides wide range of topics including programming, cracking, encryption etc. This website also provide hacking, cracking, encryption and many challenges too. Visit this Site: HellBoundHackers.org

If you like this article please share it!
If you have any questions put them on comments!

You might also like:How to change Drive Icon in Windows

Sunday 22 September 2013

How secure is iPhone 5S fingerprint


Prints in the cloud? Some observers have wondered aloud on Twitter and elsewhere whether Apple, armed with a potential database of millions of thumbprints, might turn over some customers' prints to the National Security Agency (NSA) if ordered to by the government. After all, Apple was reported to have been a partner in the NSA's PRISM surveillance program and has acknowledged it hands over user data when mandated by the government. But Apple has said users' fingerprint information will be encrypted and stored securely inside the phone's new A7 processor chip instead of on Apple's servers or backed up to iCloud, the company's Web-based storage service. Apple also has said it's not allowing third-party applications to access the scanner -- at least not yet. That's good news for users' privacy, experts say -- even amid news reports that the NSA can spy on smartphones. "Your iPhone knows who you call. It knows where you are. And in the newest versions, it will know your thumbprint. Given revelations about how the NSA can access Apple devices, should you be worried about it having that biometric data? No. No no no no no no. Come on. No," writes Philip Bump in The Atlantic. "Your fingerprint ... isn't traveling anywhere. Is it possible that the NSA could ask Apple to upload a user's fingerprint from the phone so that it can be transmitted to the agency? Sure. But that likely wouldn't be a request that comes through PRISM; it would probably require a separate warrant. Not impossible, but, given the burden of demonstrating need for a warrant, not as easy as a few keystrokes." Fingerprint hacks Then there's the question of hackers replicating fingerprints to break into phones. "Fingerprints are not private, you leave them lying around everywhere, and if someone has enough incentive -- and the resources available to them -- they may try to defeat any security system that you trust your fingerprint to unlock," writes noted security researcher Graham Cluley on his blog. "One thing is for sure. With the launch of the iPhone 5S, more people will be using fingerprint sensors as part of their daily security than ever before -- and the hackers will be certainly intrigued to see how they might circumvent it," Cluley adds. Dino Dai Zovi, co-author of "The iOS Hacker's Handbook," told CNNMoney that if he were trying to hack an iPhone 5S, he would first try to lift prints from elsewhere on the device "and figure out how to replay those to the sensor to log in to the person's phone." This is not as hard as it might sound. A decade ago, a Japanese cryptographer demonstrated how to fool fingerprint-recognition systems by transferring latent prints to a "finger" made from gelatin, the ingredient found in Jell-O and other sweets. It was informally known as the "Gummi bear hack." But Apple's new Touch ID technology is presumably more sophisticated than those old systems. In addition, latent prints may not provide enough of an overlapping match to unlock a phone, says digital-security expert Robert Graham. "You use a different part of your finger to touch the iPhone sensor than what you use to touch other things," writes Graham on the Errata Security blog. "That means while hackers may be able to lift your thumbprint from you holding other objects, or from other parts of the phone itself, they probably can't get the tip print needed to do bad things on your iPhone. "This means the fingerprint databases held by the NSA, FBI, and border security are largely useless at unlocking your phone: they don't cover the same parts of your fingers," Graham adds. But there is another potential vulnerability in the iPhone 5S's fingerprint scans. The Touch ID system also can be used as a secure way to approve purchases from iTunes or the App Store, which makes some security experts uncomfortable. "If Apple is right that fingerprints never leave the device, that means the new iPhones will be sending some sort of authentication token to Apple servers to verify that the end user has produced a valid print," writes Dan Goodin in Ars Technica, a CNN.com content partner. "If attackers figure out a way to capture and replay users' valid tokens, it could lead to new ways for criminals to hijack user accounts."
Source: CNN and HBH
You might also like:facebook chat codes

Friday 20 September 2013

Introduction to Steganography

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos(στεγανός) meaning "covered or protected", and graphei(γραφή) meaning "writing".
Source:Wikipedia
Further reading:Steganography

Monday 16 September 2013

Internet Companies and their Founders

Founders of Internet services/companies and their Innovations


companies logo
Below are the list of founders of internet company and their innovations
1. Google: Larry Page & Sergey Brin
2. Facebook: Mark Zuckerberg
3. Yahoo: David Filo & Jerry Yang
4. Twitter: Jack Dorsey & Dick Costolo
5. Internet: Tim Berners Lee
6. Linkdin: Reid Hoffman, Allen Blue & Koonstantin Guericke
7. Email: Shiva Ayyadurai
8. Gtalk: Richard Wah kan
9. Whats up: Laurel Kirtz
10. Hotmail: Sabeer Bhatia
11. Orkut: Buyukkokten
12. Wikipedia: Jimmy Wales
13. You tube: Steve Chen, Chad Hurley & Jawed Karim
14. Rediffmail: Ajit Balakrishnan
15. Nimbuzz: Martin Smink & Evert Jaap Lugt
16. Myspace: Chris Dewolfe & Tom Anderson
17. Ibibo: Ashish Kashyap
18. OLX: Alec Oxenford & Fabrice Grinda
19. Skype: Niklas Zennstrom,JanusFriis & Reid Hoffman
20. Opera: Jon Stephenson von Tetzchner & Geir lvarsoy
21. Mozilla Firefox: Dave Hyatt & Blake Ross
22. Blogger: Evan Willams
23. WikiLeaks: Julian Assange

Thursday 5 September 2013

Your Facebook account has two password


Yes!, you heard it right your facebook account has two passwords, first is your real password and second is your real password with case inversed. For example if your password is 'Apple' then your other password will be 'aPPLE'. I've came across an article on ZDnet in which I've found it. But it is not a loophole or any kind of bug instead it is a feature of facebook. Facebook developers made it because of the fact that people having problem log in to their account when caps lock is on. I've tried it and it worked. Try yourself and see the Magic.
Check out my previous article here.