Posts

Showing posts from August, 2017

The Benefits and Risks of Ultra-Violet Radiation

Image
Ultraviolet (UV) radiation is a type of energy produced by the sun and some artificial sources, such as solariums.  Ultra-violet (UV) lasers for Raman spectroscopy typically include laser wavelengths ranging from  244 nm through to 364 nm . UV radiation isn’t like the sun’s light or heat, which we can see and feel. Your senses cannot detect UV radiation, so you won’t notice the damage until it has been done. Theoretically UV Raman spectroscopy is no different from standard analysis using visible laser wavelengths.  However, in practice there are a  small amount that gets through has both positive and negative effects.  Positive effects of UV Photolithography:  UV is employed in fine resolution photolithography and hence is extensively used in the field of electronics. Vitamin D Production :  UV from the Sun is needed by our bodies to produce vitamin D. Vitamin D helps strengthen bones, muscles and the body’s immune system. It may also lower the risk of g

Bermuda Triangle : Devil's Triangle

Image
The Bermuda Triangle, also known as the Devil's Triangle is a loosely defined region in the western part of the  North Atlantic Ocean  where a number of aircraft and ships  are said to have disappeared under mysterious circumstances. According to the US Navy, the triangle does not exist, and the name is not recognized by the  US Board on Geographic Names .Popular culture has attributed various disappearances to the paranormal or activity by extraterrestrial beings. Shocking Facts About Bermuda Triangle  The Bermuda Triangle is not small. In fact, it is quite large and covers an area of 440,000 miles of sea. This is larger than the combined area of Rajasthan, Madhya Pradesh & Maharashtra. The bermuda triangle is certainly not fixed and its effect can be experienced outside of the triangle too.  The disappearances are ascribed to UFO's and alien activity, city of Atlantis lost under the triangle, and various other technical, natural and geographical reas

List of Hijacking of Indian Aeroplanes - 1971, 1981, 1982, 1984, 1993, 1999

Image
1971 January 30 : An Indian Airlines plane on its way from Srinagar to Jammu was hijacked by Hashim Quereshi and Ashraf Quereshi of the JKLF, who took it to Lahore. Zulfikar Ali Bhutto, then Foreign Minister of Pakistan rushed to Lahore and met the hijackers and helped them get maximum international publicity. On February 1, he persuaded them to release the crew and passengers who were then sent by road to Amritsar. The Government of India sought permission of Pakistan to send a replacement crew to fly the aircraft back to India. Pakistan authorities denied the permission. Instead it is alleged they supplied petrol to the hijackers with which they burnt the aircraft on February 2. From Lahore Airport the hijackers were taken into a procession as heroes. 1981 September 29 : An Indian airlines plane on flight from Srinagar to Delhi is hijacked by Sikh Terrorists and taken to Lahore. Pakistan took commando action and got all passengers released. 1982 August 22 : A lone mili

How To Get WIFI Password Anywhere In The World Without Any Software

Image
Hey ! I know you have try so much to know how to find someone's wifi password and i am sure you got nothing after a lots of search everywhere. But today i'll show you how you can find someone's wifi password (anywhere in the world) without doing any illegal work. Now You are thinking that what will be happened if the owner of wifi will change the password after sometime. Don't worry LOL . You can see the password of any wifi anytime anywhere. OK ! So Let's Start. Open the PLAY STORE on your android mobile and type wifi map You will see many apps , you have to choose the first app shown below. Install this App and open it after installing it. Now you will see a green button. Click on it. Enable the location. After enabling the location you will see all wifi networks near your location. Now You can see any wifi password by clicking on it.

Zombies (Bot and Botnets)

Bot  : A ‘bot’ is a type of malicious code that allows an attacker to take complete control over the affected computer – turning the computer into a “robot” that the criminal can remotely control. Once infected, these machines may also be referred to as ‘zombies’. While taking over one computer is useful, the real value comes from collecting huge numbers of computers and networking these so they can all be controlled at once (a botnet). There are between 100-150 million computers worldwide (out of 600 million PCs on the Internet) infected with bots and under the control of hackers. Botnet : A botnet is a group of computers connected in a coordinated fashion for malicious purposes. Each computer in a botnet is called a bot. These bots form a network of compromised computers, which is controlled by a third party and used to transmit malware or spam, or to launch attacks. A botnet may also be known as a zombie army . Originally, botnets were created as a tool

What's a Browser Cookies

Cookies are small files which are stored on a user's computer. Cookies only contain bits of text, not anything else. The text can be a user ID, session ID, or any other text. For example, web pages can be configurable – a web page could have a Hide link that hides a certain element on the page.The page can save this setting on your computer with a cookie. When you load the page in the future, the page can examine the cookie and automatically hide the element. If you clear your cookies, you’ll be logged out of all websites and websites won’t remember any settings you’ve changed on them.They are designed to hold a modest amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer. This allows the server to deliver a page tailored to a particular user, or the page itself can contain some script which is aware of the data in the cookie and so is able to carry information from one visit to the website (or related si

What is Bookmark (World Wide Web)

A bookmark is a saved shortcut that directs your browser to a specific Webpage . It stores the title, URL , and F avicon of the corresponding page. Saving bookmarks allows you to easily access your favorite locations on the Web. When you are looking at a particular Web site or Home page and want to be able to quickly get back to it later, you can create a bookmark for it. You can think of your browser as a book full of (millions of ) Web pages and a few well-placed bookmarks that you have chosen. The list that contains your bookmarks is the "bookmark list" (and sometimes bookmark is called a " Hotlist .") How to Create a Bookmark on Browser : 1 . To create a bookmark, simply visit the page you want to bookmark and select Add Bookmark   or    Bookmark this Page from the Bookmarks menu. 2.  In Internet Explorer, you can click the star icon to open the Favorites sidebar and click Add to     Favorites to add the current page to your b

How to Block Any Website On Windows Computers or Browser

There are several reasons why you might want to block certain websites on your computer. Some websites could be spreading viruses, contain explicit content or even be trying to steal your personal data. While you may well be more than capable of avoiding these websites, but that doesn't stand true for every one who uses your device. In such cases, it might be best to block certain websites. You need only make a few simple additions to the Windows hosts file. This method is straightforward and free, and it doesn’t require you to download or install any additional software. It's an effective method for restricting users of all ages from seeing the content you don’t want them to access. There are different ways to go about blocking websites. You can choose to block websites only on specific browsers, the entire operating system, or indeed your network router. Here's some process we 'll show. How to Block Any Website On Windows Computers : Click the Windows

Bitcoin - The Internet of Money

Bitcoin is a form of digital currency, created and held electronically. No one controls it. Bitcoins aren’t printed, like dollars or euros – they’re produced by people, and increasingly businesses, running computers all around the world, using software that solves mathematical problems. With the  Bitcoin price   so volatile everyone is curious. Bitcoin, the category creator of   blockchain technology , is the   World Wide Ledger   yet extremely complicated and no one definition fully encapsulates it. By analogy it is like being able to send a gold coin via email. It is a consensus network that enables a new payment system and a completely digital money. It is the first decentralized peer-to-peer payment network that is powered by its users with no central authority or middlemen. Bitcoin was the first practical implementation and is currently the most prominent triple entry bookkeeping system in existence. The price fluctuates of Bitcoin is, depending on what people were willing to

Ransomware : Attacks And Prevention

Ransomware is a form of malicious software that locks up the files on your computer, encrypts them, and demands that you pay to get your files back. Wanna Decryptor, or WannaCry, is a form of ransomware that affects Microsoft’s Windows operating system. When a system is infected, a pop up window appears, prompting you to pay to recover all your files within three days, with a countdown timer on the left of the window. It adds that if you fail to pay within that time, the fee will be doubled, and if you don’t pay within seven days, you will lose the files forever. Payment is accepted only with Bitcoin . Several factors have fueled the recent rise in Ransomware Attacks: Bitcoin has been a significant factor in the rise in ransomware attacks. The lack of oversight by any governing body coupled with anonymity makes it an ideal currency in ransomware demands. The evolution of  ransomware-as-a-service (RaaS)   has also played a significant role in the proliferation of attacks.

Difference Between 4G Vs 4G LTE Technology

If you have been browsing through different smartphones and carrier contracts, you have probably spotted a number of these terms scattered throughout advertisements and spec sheets. These days, fast mobile data connections are easy to come by in many countries around the world, but all of these terms and network types can mean slightly different things for your data speeds. The slow internet connectivity is no more; one can enjoy the high-speed connectivity. If you are in the coverage of 4th generation or  4G  comes handy as a connectivity option. Since it is the new technology, many of the folks stuck while understanding this networks. If you are one among the understanding  4G  and  4G  LTE. In this article, we’ll get you understand the difference between  4G  and  4G  LTE technologies . What is  4G  ? 4G  stands for “Fourth Generation” which is the successor of the 3G (Third Generation). The International Telecommunications Union-Radio (ITU-R) is the United Nations official