Tuesday, 8 November 2016

Latest Web site development Combinations

Hi All,

To develop a full fledged website in a short span of time is not a dream nowadays.
Use the below sited tools for that.

a)  Bootstrap and
b)  Express.js framework designed for node.js framework

Please browse for more on these technologies.

Monday, 7 November 2016

Latest tools on network monitoring

Hi All,

See the latest Network Monitoring tools

a) IP

b) netstat

c) ethtool

d) ss - statistics tool

e) netperf

f) iperf

Please google for more information.

Secure your servers

Hi All,
"Volatility" is an open framework using Python for Memory Forensics.

install using the given command

apt-get install volatility

Today's malware are stealthier and remain hidden during dynamic behavior analysis done by scanners. "Volatility" frameworks could manage these situations. They could even handle Rootkit malware.

Join EDX for latest online courses

Hi All,
Edx offers a lot of online courses for students and employees.
a. If you are interested in Data Analytics, Big Data Analysis, Cyber security etc , Edx provides courses from IIT-B, MIT, Harvard University etc.

Indian E-Governace Software for us - Digi Locker

HI All,

"Digi Locker" is an e-Governance Software for Indians designed in PHP, Python and Node.js. This promote paperless governance. The team contains only 14 members. Mr. Amit, founder of Slideshare, which was taken over by Google owned LinkedIn is part of this project. 

Latest Programming Languages

Hi All,
You can see a host of advanced programming languages to cherry pick according to your use.

1. Google's GO
2. Swift
3. Hack
4. Rust
5. Scala
6. Dart
7. Clojure
8. Haskel
9. Apache Groovy

Please browse for more details

Wednesday, 2 November 2016

Ethical Hacking

Hi All,

Ethical Hacking is linked with client server computing, since hacking mostly affect servers.

Ethical hackers are doing the it for a good purpose, help protect vulnerable servers.

How they are doing it. For this purpose we should follow the same path of black hat hackers.

1. Footprinting step - With commands such as 'who is', ping, traceroot, nslookup , this is carried out.

2. Scanning step - nmap, nessus etc are used for this purpose

3. Enumeration step- netcat, tcpdump, telnet, firewalk etc used for this purpose

We will see more on this topic soon.

Bye

Tuesday, 1 November 2016

How to harden your Software from attacks

Hi All,

Hardening your software means,

1. Free from attacks
2. Free from vulnerabilities etc

You may use tools for
a. Vulnerability detection
b. Software monitors etc

A software Engineer must be aware of vulnerabilities like

a. XSS (Cross Site Scripting) - Use scripting languages like Javascript to inject scripts with malicious contents.
b. SQL injection - Inject sql script through textboxes which are not properly validated (either in server or client)

Topics to search
1. XSS, SQL injection, Client side validation, Server side validation

Protect your computer from attacks

Hi All,
How to make sure your Linux computer is not hacked.

Use these commands

1. iostat
2. mpstat
3. vmstat
4. sar
5.lsof

Also use these tools which check intrusion detection

1. rkHunter
2. chkrootkit

Why Computer Science Knowledge is Important

Hi All,

Aavani Vinod, my niece, asks me often to take her for a round. She is really curious to learn and see new things. The same quest will be there for a person who is living in the world of Information Technology (IT). The updated knowledge in IT will certainly help him somewhere in life.
The purpose of my blog is to selectively post about useful and innovative computer technologies and concepts for the public to cherry pick.

Let me start with a few top items currently in use from the field of Information Technology

1. Internet of Thinks
2. Cloud computing
3. Mobile Application development
4. Web Application Development
5. Mobile app integration with Web applications

I shall post in detail in coming days..