–Hacker computer security–

                                        Hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.[1] The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.

Different Types Hack :-

  1. White hat
  2. Black hat
  3. Grey hat
  4. Elite hacker
  5. Script kiddie
  6. Neophyte
  7. Blue hat
  8. Hacktivist 
  9. Nation state
  10. Organized criminal gangs
  11. Bots

Techniques:-

 

  • Vulnerability scanner
  • Password cracking
  • Packet sniffer
  • Spoofing attack (Phishing)
  • Rootkit
  • Social engineering
  • Trojan horses
  • Computer virus
  • Computer worm
  • Key log

A typical approach in an attack on Internet-connected system is:
Network enumeration: Discovering information about the intended target.
Vulnerability analysis: Identifying potential ways of attack.
Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.
List of convicted computer criminals…,

Google

                                  Google is the corperation company which has an millans of Users ,the specializing in Internet-related services and products. It offers online productivity software including email Gmail, an office suite Google Drive, and social networking Google+ Desktop products include applications for web browsing, organizing and editing photos, and instant messaging. The company leads the development of the Android mobileoperating system and the browser-only Chrome OS for a specialized type of netbook known as a Chromebook.It has been estimated to run more than one million servers in data centers around the world,and to process over one billion search requests and about 24 petabytes of user-generated data each day. Google-owned sites such as YouTube and Blogger.Its market dominance has led to criticism over issues including copyright, censorship, and privacy.The company announced plans to build three data centers at a cost of more than $200 million in Asia (Singapore, Hong Kong and Taiwan) and purchased the land for them. Google said they will be operational within two years.

                                         Google Apps is another primary Google enterprise service offering. The service allows organizations to bring Google’s web application offerings, such as Gmail and Google Docs, into their own domains. Controversy was generated in June 2013 after the Washington Post news outlet revealed that Google had donated US$50,000 to the Competitive Enterprise Institute, a right-wing organization responsible for numerous law suits that aimed to discredit the science behind climate change. Google was further criticized in July 2013 following the publicity for a Google-hosted fundraiser for Oklahoma Republican politician Jim Inhofe, who is well known for dismissing climate change science as a “hoax” in the U.S. Senate. Tickets for the event range between US$250 and US$2,500, and a portion of the funds raised will be donated to the national Republican Senatorial Committee. At Lost Future it will be the Great One..,

I phone 5

                                              First it was my favorite & Dream I phone Then Most popular phone in the world. The iPhone 5 is a touchscreen-based smartphone developed by Apple Inc.It is the sixth generation of the iPhone and succeeds the iPhone 4S. The phone is a slimmer, lighter model that introduces a higher-resolution, 4-inch screen to the series with 16:9 widescreen aspect ratio. The phone also includes a custom-designed ARMv7 processor called the Apple A6, an update to Apple’s mobile operating system known as iOS 6, and support for LTE.The iPhone 5 features iOS, Apple’s mobile operating system
                                      Interaction with the OS includes gestures such as swipe, tap, pinch, and reverse pinch, all of which have specific definitions within the context of the iOS operating system and its multi-touch interface.The phone can act as a hotspot, sharing its internet connection over WiFi, Bluetooth, or USB.The service allows users to browse and download applications from the iTunes Store that were developed with Xcode and the iOS SDK and were published through Apple.Like the iPhone 4S, the iPhone 5 that has allows the user to operate the iPhone by spoken commands. The software was improved in iOS 6 to include the ability to make restaurant reservations, launch apps, dictate Facebook or Twitter updates, retrieve movie reviews and detailed sports statistic,the iPhone 5, texting can be aided by the voice assistant, which converts speech to text.The frame used in previous versions was redesigned to use an aluminum composite frame.[39] The iPhone 4 and iPhone 4S used stainless steel instead of aluminium due to Steve Jobs’ preference for the metal which he thought, “looks beautiful when it wears” Totally Awesome….

_RADAR_

                               Radar is an object which used for transmit and receive based on RF modal it has Certain frequency, Other systems similar to radar make use of other parts of the electromagnetic spectrum. Radar is an object detection system which uses radio waves to determine the range, altitude, direction, or speed of objects. It used in the to detect aircraft, ships, spacecraft, guided missiles, motor vehicles, weather formations, and terrain. By the way of radar dish or antenna transmits pulses of radio waves or microwaves which bounce off any object in their path. The modern uses of radar are highly diverse, including air traffic control,Many place place the radar are used its kind of signal trans receiver. Thus used in many different fields where the need for such positioning is crucial. The first use of radar was for military purposes: to locate air, ground and sea targets such that aircraft, ships, and roads.
                              Radar receivers are usually, but not always, in the same location as the transmitter. Although the reflected radar signals captured by the receiving antenna are usually very weak, they can be strengthened by electronic amplifiers.Radar waves scatter in a variety of ways depending on the size (wavelength) of the radio wave and the shape of the target. If the wavelength is much shorter than the target the size, the wave will bounce off in a way similar to the way light is reflected by a mirror( like Eco )

                                Sea-based radar systems, semi-active radar homing, weather radar, military aircraft, and radar astronomy rely on the Doppler effect to enhance performance. This produces information about target velocity during the detection process. This also allows small objects to be detected in an environment containing much larger nearby slow moving objects.

 

Robotics

Robotics is nothing but mechine combine with software and hardware. Robotics is used in many places, now a days people used the robotics as an normal life.The robotics most famous part in this generation and is a mechanical or virtual agent, usually an electro-mechanical machine that is guided by a computer program or electronic circuitry. Which robots are most complicated that branch of technology that deals with the design, construction, operation, and application of robots.These technologies deal with automated machines that can take the place of humans in dangerous environments or manufacturing processes, or resemble humans in appearance, behavior, on Conditions.Its highly secured and safe or un safe processor its depends on its status. Designing a battery powered robot needs to take into account factors such as safety, cycle lifetime and weight. Generators, often some type of internal combustion engine, can also be used.However this design does come with the drawback of constantly having a cable connected to the robot,the majority of robots use electric motors, often brushed and brushless DC motors in portable robots, or AC motors in industrial robots and CNC machines. These motors are often preferred in systems with lighter loads, and where the predominant form of motion is rotational.

Robots need to manipulate objects; pick up, modify, destroy, or otherwise have an effect. Thus the “hands” of a robot are often referred to as end effectors.Some have a fixed manipulator which cannot be replaced, while a few have one very general purpose manipulator, for example a humanoid hand. Most important role for Robots is in several robots have been made which can walk reliably on two legs, however none have yet been made which are as robust as a human. In Future Human can’t able to live without Robots.

The present Robots are exciting Everyone so its time several of robots…..!!!!

Embedded System

Embedded System is nothing but combine of software and hardware, it contain processing cores that are either micro controllers, or digital signal processors
An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system for example JCB., A processor is an important unit in the embedded system hardware but the heart is embedded system. The embedded systems range from portable devices such as digital watches and MP 3 players, to large stationary installations like traffic lights, factory controllers, and largely complex systems like hybrid vehicles, MRI, and avionics. Complexity varies from low, with a single micro controller chip, to very high with multiple units, peripherals and networks mounted inside a large chassis or enclosure.
The Embedded System work based on the Micro controller chip, the chip store the program of what we feed it as per Micro controller is run the program we feed in it.Embedded systems are commonly found in consumer, cooking, industrial, automotive, medical, commercial and military applications, also used in transportation, fire safety, safety and security, medical applications and life critical systems, as these systems can be isolated from hacking. Embedded systems are designed to do some specific task, rather than be a general-purpose computer for multiple tasks. Some also have real-time performance constraints that must be met, for reasons such as safety and usability; others may have low or no performance requirements, allowing the system hardware.
Embedded systems often reside in machines that are expected to run continuously for years without errors, and in some cases recover by themselves if an error occurs. Therefore the software is usually developed and tested more carefully than that for personal computers, and unreliable mechanical moving parts such as disk drives, switches or buttons are avoided.

“YouTube”

Everyone kwn abt youtube, YouTube is a video-sharing website, created by three former PayPal employees,which users can upload, view and share videos also the short original videos, and educational videos can be upload and watch it.youtube has two main roll 1st one User and 2nd one is Host by using this publice can able to useful.Most of the content on YouTube has been uploaded by individuals, although media corporation and other organizations offer some of their material via the site, as part of the YouTube partnership program.The Unregistered users can watch videos, while registered users can upload an unlimited number of videos. Videos considered to contain potentially offensive content and more important is in youtube is available only to registered users at least 18 years old

The Features :-

Image

 

> Video technology
> Playback
> Uploading
> Quality and codecs
> 3D videos
> Content accessibility and many more are there ..,

 

Youtube is an social impact that vast majority of videos on YouTube are free to view and supported by advertising at the time of uploading a video, YouTube users are shown a screen with the message and then Do not upload any TV shows, music videos, music concerts or advertisements without permission its main thing about youtube… at the end I love to use youtube..