Posts

Showing posts from April, 2012

Non Technical Presentation For Workplace And Office - Let's Be Happy

This is a  non technical presentation that I prepared for one of my friend for her to show it at her work among her friends and colleagues. The title of the presentation is Let's be happy . Let’s Be Happy My Indian Friend says: When two Indian Couples come face to face. Wives look at each other's Sarees and husband look at each other's Wife. My uncle has 2wives and reason is: If you marry one girl, she will fight with you, If you marry two girls, they will fight for you. My sister is lazy but has reason: Laziness is the mother of all bad habits. But ultimately she is a mother and we should respect her. Think of the moment you were laughing Wasn't it beautiful ? What Is Happiness? Nobody really knows! The word is a kind of emotional placeholder for a set of positive emotional states; A state of well-being where the person is not motivated to change their state—they are motivated to preserve it! FEEL-GOOD, DO-GOOD PHENOMENON After getting a ‘A’ on

Presentation Slide For IT Student - Two Factor Authentication

Two-factor Authentication Your introduction here Definition TFA, T-FA or 2FA authentication aproach requiring  two or more of the three authentication factors something the user knows,something the user has,something the user is Common Example Gmail Facebook Common Example - Gmail 2-step verification In addition to username and password a code needs to be entered Google will send code in text or voice message Code can be generated from app 10 backup codes in case of emergency Can be activated from account setting page Common Example - Facebook Login Approvals In addition to username and password a code needs to be entered Facebook will send code in text Common Example - Facebook Common Example - Gmail Can be activated from account setting page Explanation something the user knows eg: password something the user has eg: mobile phone, USB tokens something the use is eg: biometrics Advantages improves authentication cost effective efficient

Presentation Slide For IT Student - Data Liberation Front

Data Liberation Front We insert our data in 3rd party service For eg: email, documents and pictures As our data grows we become tied to 3rd party service Imagine this, thousands of emails in your mailbox but don't like the service. If you switch the mail provider you lose access to thousands of emails Else stuck with the bad provider Its just like not being able to take your belongings from the apartment you have leased Data Liberation Front Users should be able to control the data they store in any of Google's products. Goal is to make it easier to move data in and out. Designed to help you liberate your data from any Google service with as little pain as possible You're not locked into Gmail, for example, just because all your old email is there. Three questions before starting to use a product that will store their data: Can I get my data out in an open, interoperable, portable format? How much is it going to cost to get my data out? How much of my

Presentation Slide For IT Student - Android Fundamentals

Android Fundamentals Aapplications are written in the Java programming language .apk is android package Dalvik Executable (.dex) run by Dalvik Each application lives in its own security sandbox Multi-user Linux system, each application is a different user Each application a unique Linux user ID Each process has its own virtual machine Application Components Essential building blocks of an Android application Different point through which the system can enter your application Four different types of application components Activities Services Content providers Broadcast receivers Activities Represents a single screen with a user interface Email application might have one activity that shows a list of new emails, another activity to compose an email Different application can start any one of these activities Services Runs in the background Play music in the background Another component, such as an activity, can start the service Content providers Mana

Presentation Slide For IT Student - Android

Android “The first complete, open and free mobile platform” Google OS for smart phones Open source Apache License Developed under Open Handset Alliance OHA, consortium of 78 hardware, software and telco History Developed by Android Inc Purchased by Google in 2005 Participant in the Open Handset Alliance Introduction Modified version of the Linux kernel Ranked first among all smartphone OS handsets 100,000 apps available Introduction Dalvik virtual machine Libraries written in C 12 million lines of code 3 million lines of XML, 2.8 million lines of C, 2.1 million lines of Java 1.75 million lines of C++ Version  1.5 Cupcake  1.6 Donut  2.0/2.1 Eclair  2.2 Froyo  2.3 Gingerbread Scheduled for Q4 2010 launch  3.0 Honeycomb Scheduled for 2011 launch  4.0 Ice Cream Features Dalvik virtual machine Integrated (webkit) browser 2D and 3D graphics APIs SQLite Video and audio codecs Bluetooth, EDGE, 3G, and WiFi Camera, GPS, compass, and acceleromete

Presentation Slide For IT Student - GRUB

GRUB Your introduction here OBJECTIVES This presentation will cover following topics on grub. Introduction History Feature GRUB Legacy & GRUB 2 INTRODUCTION GRand Unified Bootloader is a boot loader. created for GNU Project multiple operating systems predominantly used on Unix-like systems HISTORY developed by Erich Boleyn booting the operating system GNU Hurd developed by the Free Software Foundation FEATURES simple bash-like, command line interface which lets users write new boot sequences supports multi boot system like *nix supports non-multiboot system like Windows Supports *nix file system, VFAT and NTFS supports diskless system i.e. Download operating system supports automatic decompression of OS images customize boot menu with a background image, and occasionally mouse support. supports GRUB prompt. Supports scrollbar with 150 or so boot choices chainloading - one boot loader loading another boot loader can be installed on external

Presentation Slide For IT Student - Revision Control

Revision control Your introduction Objectives Revision control introduction Distributed version control Advantage of distributed version control Common terminology Different softwares Real world usage Revision control synonyms version control source control (source) code management (SCM) Source Control Management system and alikes Definition management of changes to documents commonly used in software development, where a team of people may be changing the same files. Changes identified by a number or letter code Changes termed "revision number", "revision level", "revision" Simple Concept Simple Concept Simple Concept Repository Centralized Revision Control Distributed Revision Control Advantages of DVCS Can work offline Fast processing as network ins’t involved Easy access to projects Allows private work Server independent Centralized control possible Multiple backup of data Common terminology Repository B

Presentation Slide For IT Student - IPv4 And Addressing

IPv4 and Addressing Introduction Your introduction here Objectives Learn about IP address Learn about IP allocation Concept of public and private IP Concept of loopback IP Concept of Network and Broadcast ID Learn about IP address IP (Internet protocol) is numeric identification of  device in computer network. Every device in computer network has a unique IP address. IP is 32 bit long. Binary but represented as decimal Separated by '.' in four octets. Example of IP address 00000100.00000010.00000010.00000010 is an example of IP address in binary form. Notice '.' in every octet 4.2.2.2 is the same IP address in human readable decimal form. (dot-decimal notation) 116.197.164.1, 202.63.242.6, 10.10.5.211 are other examples. 74.125.45.100 is one of the IP of google.com IP allocation Originally, an IP address was divided into two parts: Host and Network Only 256 Network possible with this allocation To overcome this problem IP allocated as

Presentation Slide For IT Student - Securing Data WithTruecrypt

Securing Data With Truecrypt Objectives Why Secure and how to What is encryption Why encrypt Truecrypt Disadvantages of encryption Why secure data In the electronic age, information that could otherwise benefit or educate a group or individual can also be used against such groups or individuals. A letter to your girlfriend may result in a letter from your wife's lawyer. How to secure data Hiding Authenticating Password and Security Locking Destroying Steganography Law Changing form(encryption)‏ What is encryption? Encryption is the conversion of data into a form, called a cipher text, that cannot be easily understood by unauthorized people. Encryption is the process of transforming information using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. Simple email Hello bad guy, I am giving you a valuable information regarding my company. With that information

Presentation Slide For IT Student - Manually Removing Virus Left Outs

Manually Removing Virus Left Outs Objectives The Main Objective is to revert the changes made by virus. Remove settings that prevents from drives being opened by double click. Remove error message saying some files not found at startup. This presentation isn't related in removing virus. What is computer virus? According to wikipedia, A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. Virus Leftout-1 Symptoms A dialog box telling it is unable to load certain file, especially boot.vbs. Appears everytime you log in. Goes after you click OK. Some dialogue box remains no matter how manytimes you click OK. Description Actually this file alone isn't a virus. This is a simple file containing nasty script. Virus changed the setting in your computer to load this file every time you start your computer. Your system unable to load the missing file produced the error. How virus pr

Easily Crack WPA Or WPA2 PSK Under 10 Hours

WPA or even WPA2 can be easily cracked under 10 hours provided that WPS is enabled on the router. The software we'll use is reaver . The hardware I'm using is Intel(R) PRO/Wireless 3945ABG/BG on Ubuntu 11.04 and driver is iwl3945. First install the necessary libraries to compile the software. Run the following command in terminal to do so. sudo apt-get install libsqlite3-dev libpcap0.8-dev build-essential Now open terminal and go inside /tmp folder. Download reaver from here by running the command wget -c http://code.google.com/p/reaver-wps/downloads/detail?name=reaver-1.4.tar.gz&can=2&q= Now extract it by running tar xf reaver-1.4.tar.gz  Now run the following commands to compile the software. ./configure make sudo make install After this reaver will be installed on your system. Now let's install aircrack-ng(Optional). We'll not be using aircrack directly but use its tool to assist our cracking. You can install it by running: sudo apt-get in