Skip to main content

Posts

UNIX-File Management

All data in Unix is organized into files. All files are organized into directories. These directories are organized into a tree-like structure called the filesystem. When you work with Unix, one way or another, you spend most of your time working with files. This tutorial will help you understand how to create and remove files, copy and rename them, create links to them, etc. In Unix, there are three basic types of files − Ordinary Files − An ordinary file is a file on the system that contains data, text, or program instructions. In this tutorial, you look at working with ordinary files. Directories − Directories store both special and ordinary files. For users familiar with Windows or Mac OS, Unix directories are equivalent to folders. Special Files − Some special files provide access to hardware such as hard drives, CD-ROM drives, modems, and Ethernet adapters. Other special files are similar to aliases or shortcuts and enable you to access a single file usin

UNIX

Unix is a computer Operating System which is capable of handling activities from multiple users at the same time. The development of Unix started around 1969 at AT&T Bell Labs by Ken Thompson and Dennis Ritchie. This tutorial gives a very good understanding on Unix. What is Unix ? The Unix operating system is a set of programs that act as a link between the computer and the user. The computer programs that allocate the system resources and coordinate all the details of the computer's internals is called the operating system or the kernel . Users communicate with the kernel through a program known as the shell . The shell is a command line interpreter; it translates commands entered by the user and converts them into a language that is understood by the kernel. Unix was originally developed in 1969 by a group of AT&T employees Ken Thompson, Dennis Ritchie, Douglas McIlroy, and Joe Ossanna at Bell Labs. There are various Unix variants available in the m

The New Face of War: Attacks in Cyberspace

War continues to spread online. Known as cyberwarfare, the spread of malicious online viruses just may be the future of war. Cyber attacks continue to grow in number and sophistication each year. In 2006, Russian Mafia group Russian Business Network (RBN) began using malware for identity theft. By 2007, RBN completely monopolized online identity theft. By September 2007, their Storm Worm was estimated to be running on roughly one million computers, sending millions of infected emails each day. In 2008, cyber attacks moved from personal computers to government institutions. On August 27, 2008 NASA confirmed a worm had been found on laptops in the International Space Station; three months later Pentagon computers were hacked, allegedly by Russian hackers. Financial institutions were next. The State Bank of India (India'’s largest bank) was attacked by hackers located in Pakistan on December 25, 2008. While no data was lost, the attack forced SBI to temporarily shut do

Cybersecurity Challenges

USB encryption Almost half the respondents were lacking when it came to USB encryption. They failed to ensure that data from a device connecting to end points via USB was sufficiently encrypted, were it to end up in an unsecured or hostile environment. Third party device connectivity Some 35% of organizations aren’t controlling end point connectivity solutions like SD cards, Bluetooth, and Fire Wire, to limit the threats they potentially bring. USB control USB devices can be a significant vector for the distribution of cyber attacks. However, over 35% of respondents don’t control or limit any device connecting to end points via USB. Data loss prevention Some 37% of companies have no assurance against loss of information, documents, and IP. Reverse engineering of malware Only 39% of organizations are actively working on reverse engineering of malware, while 32% are still in an initial phase of developing this. Emergency response team Only 16% o

Artificial Neural Networks and Analogy to the Brain

What are Artificial Neural Networks? Artificial Neural Networks are relatively crude electronic models based on the neural structure of the brain. The brain basically learns from experience. It is natural proof that some problems that are beyond the scope of current computers are indeed solvable by small energy efficient packages. This brain modeling also promises a less technical way to develop machine solutions. This new approach to computing also provides a more graceful degradation during system overload than its more traditional counterparts. These biologically inspired methods of computing are thought to be the next major advancement in the computing industry. Even simple animal brains are capable of functions that are currently impossible for computers. Computers do rote things well, like keeping ledgers or performing complex math. But computers have trouble recognizing even simple patterns much less generalizing those patterns of the past into actions of the future.

Amended Fruit fly Optimization

Amended Fruit fly Optimization According to food finding characteristics of fruit fly swarm, the whole procedure of the original FOAcan be divided into several step as follows:- ALGORITHM FOR aFOA Step 1 Start:             Start the algorithm. Step 2 Parameter Initialization:                      The main parameters of aFOA are maximum iteration number, the population size. Step 3 Population Initialization:             Randomly initialize the population size is NP. Randomly produce solution, half blending and un-blending. Step 4 Neighborhood Generations and Find Best            Neighborhood:             NN neighborhoods are randomly generated. NN neighborhoods are produced by three kinds of neighborhood search. Find out the best neighbor. Step 5 Replacements of Neighbor:             If the best neighbor is better than the fly then replace the fly with the best neighbor and go to next step, else go to next step without replacing. Step 6 Local Neig

Why Kejriwal is wrong

Corruption seems to be most important issue for many people. While I disagree with the notion that it is the most important problem, I have bigger issues with the kind of solutions that are proposed. This post is aimed at dispelling the common notions about how to solve corruption. Let us take a simple example. Given below is a typical problem. Problem : We all visit our neighborhood shop/store to buy groceries or other items. However, these shopkeepers never give us any bills. Since they don’t give any bill, obviously the shop is saving its taxes. But all big brands like Big Bazaar do give a bill. They are corporates, easier to track. From a customer’s point of view, they get their products much cheaper at neighborhood stores since there is no tax. How many such shops are there across the country? How much tax is being lost by the Government? How can we fix this? Now if I were to ask you to solve this problem, how would you do that? I posed the same question