The Mysteries of Stonehenge

Posted by Milind Koyande | 1:39 PM | 0 comments |

Get Acquainted with Stonehenge – A Monument, which is considered as on of the World’s Biggest Enigmas 


         Stonehenge is probably the world’s best-known megalithic site. A megalith is a standing stone monument. Stonehenge, which is situated on Salisbury Plain in southern England, has been associated with all sort astronomical and religious myths. Every year, on June 21, which is the longest day, thousands of visitors collect for a festival to mark the summer solstice.
There have been many theories over the years as to who built the site and why. Probably the most famous is that the Druids (ancient magicians) built it as a place of worship. The problem with this theory is that there were no Druids in England at the time it was built, and the Druids preferred places with trees for their worship.
Another theory is that it was some sort of religious site where human sacrifices were made, but this theory is the weakest of all, since no human remains have been found there.
Another, and the best theory, is that it was some sort of astronomical observatory. The sun rises directly over the heel stone on midsummer’s day. It is not very likely that this is coincidence. The problem with this theory is that over the 5000 years that it has stood, mid summer’s day has changed and so has the position of the sun. However, people have estimated that 5000 years ago, midsummer’s day was June24, and that the sun would have risen over the heel stone then. Other calculations show that it could have been used to predict solar and lunar eclipses, and perhaps even as a daily calendar.
            We will never know exactly why the site was built. One thing is certain, though. It was built for an important purpose, since no one would have gone to so much effort just for fun.


Ethical Hacker’s Test’

Posted by Milind Koyande | 6:45 PM | 0 comments |

Wanna know what exactly Ethical Hackers Do to Secure Networks? Just Check this out

Securing any network (or system) consists of several tests. Based on the results of these tests, ethical hackers secure the weakness of that network. Depending on such tests ethical hacking is classified as following:

White Box Testing: Ethical Hacker, who is performing this test have fill knowledge of the network. He knows the basic hierarchy of the network. Also he knows which operating systems are running, what the security measures are taken, which software company uses for their work and every single detail of it.

And then he plans how to find the system’s vulnerabilities and attack it. But this type of test is not effective, as he already knows where weakness is in the system. He can directly intrude there and perform the task. So such tests are preferred in low priority sections of network.

Black Box Testing: From the above explanation you might have guessed that how black box is performed. In this test ethical hacker has no knowledge of the network, not even the infrastructure of the company. He doesn’t know how network is classified and what is going on ‘in there’. This is where the skill of every ethical hacker is waiting for. So what he will do now?

He tries to get information from the outside. Every detail of the company, its history, or from some past employees of the company is helpful for him. From all information he gathered, he makes fingerprint of the company network. Fingerprint diagram is made on a paper with details he received. He fails to get access to some details obviously, so he assumes them and prepares a fingerprint of the same. (Not one, two or three – if one fails he uses the other)

Then he attacks from the network from outside. (By using the internet)

And then he finds vulnerabilities of the network as criminal hacker do. This is where network is actually subjected to its security test. This is best for securing network and every company prefers it.

Now again, the above test consists of two parts named vulnerability and penetration testing. The vulnerability assessment is done by automated tolls and hackers just checks the results and secures weakness. For penetration test, hacker actually finds vulnerabilities, tries to exploit every single of it, and then determines how this would affect the network. Based on result he eliminates some of them whichever possible and remaining are secured one bye one.

Some prefer either the black box or the white box test, and others prefer both. Doesn’t matter what kind of test you are performing, aim is only one- “Security”.


The fruit that fights wrinkles

Posted by Milind Koyande | 4:26 AM | 0 comments |

You really can fight wrinkles from the inside you. And there’s a fruit that can lead the charge. It’s papaya. What makes papaya so perfect? Easy, Vitamin C. Papaya has loads of it, and getting lots of vitamin C may mean more youthful skin – fewer wrinkles and less thinning and dryness.

The mysteries of C
Vitamin C is a natural friend to skin. The nutrient is essentials for making collagen, the protein fibres that give skin its strength and resiliency. And being a powerful antioxidants, C also disarms free radicals that would otherwise chip away and weaken collagen. Vitamin C helps protects skin from this sun scourge too.

More food for your Face
 A little extra vitamin C isn’t all it takes to plump your complexion. Here are a few more tips that can help keep your face fresh:
 
Munch on walnuts. In the Vitamin C study, researchers also noted that diets rich in linoleic acid – as essentials fatty acid in walnuts – meant moister; plumper skin.
 
Ease up on fats and refined carbs. Scientists found both were linked to aging skin. Think whole grains. The magnesium and B vitamins you get from them help with the regeneration of skin cells.


Cyber Criminals

Posted by Milind Koyande | 6:08 AM | 0 comments |

With the technology evolving continuously, activities of cyber criminals are also increasing. Taking advantage of inadequate enterprise security cyber crooks are spreading the wings of this low-risk criminal business. Criminal gangs are targeting top students from leading academic institutions to enrich their resources for committing hi-tech crimes. To ensure the next generation of malicious coders and hackers they are sponsoring young graduates everywhere.

The gangs with criminal intentions have formed an online cult, which gives them status of celebrities within online communities. And they also spread ‘black-hat’ hacking tricks in this cult.

Cyber criminals basically targeting social networking and community sites and spread ad ware, mal wares and viruses through these media. And the authors of such viruses are cashing in depending on their popularity.

They are developing new tricks daily, which make them harder to detect. Following are the basic things they use.

Phishing attack:
Hackers design fake emails same as your banks have and forward that email asking your passwords for some security reasons. If you fall in their trap you can lose your all money.

Botnets:
These are the robot networks of illegally linked computers, which can be operated remotely and one of the preferred methods of performing attacks.

Trojans:
With the help of Trojan hacker can control a computer in many ways and can destroy data to great extent too. Hackers can send Trojan to you by mails, chat rooms, or files you download from internet.

I guess if you are aware of these you can at least try to stay away from hackers.

Cyber criminals have psychological warfare to try an attack and to succeed. They keep on practicing things to increase their knowledge. There hard work makes them masterminds of the dark world. But all they have is used for organized crimes. They explore the databases, breakdown networks, crack bank accounts or play mind games. Everything they do to make fast money with minimum risk. This new formatted structure is becoming more professional and strategic in its working, which is one of the recent alarming threats.

Evolving technologies in smart-phones and mobiles like Bluetooth, Wi-Fi, GPRS and VoIP they are getting new challenges and it is again increasing the number of criminals in the cyber world. Cyber crime is longer in its infancy it’s a big business with vast opportunities.

This disease of technology does not have and one-time medicine or vaccine. It is something to be continuously worked at rather than complete cure and ‘Ethical Hackers’ can be the only way.


Attitude is Everything – II

Posted by Milind Koyande | 3:51 AM | 0 comments |

If Necessity Is The Mother Of Invention,
Discontent Is The Father Of Progress 
      You say you are not satisfied? Great! You’re well on the way road to moving forward. If there is dissatisfaction with the status quo, good. The let there be ideas, and hard work. 
      Each step we take forward is accompanied by new problems. And it is in solving these new problems that further progress is made. In other words, problems are the price of and key to progress.
       “All right, I agree. Progress is desirable. I want to improve but how do I begin?” Well, we can start by changing our attitude r the way we view the world. Some tips follow
a)    Don’t be afraid of making mistakes. Remember, if each mistakes is a new one, you are making progress.
b)     Get into the habit of using the magic word, YET. Don’t say, “I can’t do it. I don’t know how to you to do it.” Say,”I can’t do it YET. I don’t know how to do it YET.” That simple three letter word has the power to change your negative thinking into possibility thinking.
c)    If you have a setback, you don’t have to take a step back. On the contrary, prepare for a comeback. Learn from your setbacks and discover the opportunities they conceal.
d)    Don’t afraid of taking risks. Few years from now you may be more disappointment by the things you didn’t do than b7 the ones you did do. So throw off the bowlines. Sail away from the safe harbor. Catch the trade winds in your sails.
e)    Don’t ask, “Do I have what it takes to succeed?” Of course, you do. Rather ask,” Am I willing to pay the price to succeed?” What is the price of success? The four D’s: Desire, Discipline, Determination, and Dedication. If there is no struggle, there is no progress. Those who profess to favor freedom and yet avoid confrontation are people who want crops without plowing up; they want rain without thunder.
f)    Our goal is not to go all year without ever losing a game. Our goal is to win more than we loose, and if we can do that consistently enough, then when the end comes, we will have won it all.
g)    Make the right choices. There is a choice you have to make, in everything you do. And you must always keep in mind. The choice you make makes you.
h)    Don’t make excuses; make progress. When the archer misses the mark, he turns and looks for the fault within himself. Failure to hit the bull’s eye is never the fault of target. To improve your aim – improve yourself.
i)    Accept Responsibility; when a teacher was asked by a student which was the worst, to be blind, deaf, or limbless, he replied, “None of these things! Lethargy, irresponsibility, lack of ambition or desire: They are the real handicaps. So as we accept this fact we must accept responsibility for our actions.
j)    Don’t be ungrateful. After all, discouragement is dissatisfaction with the past, distaste for the present. It is unawareness of the beauty, unconcern for the needs of our fellow man. 
k)    Finally, if we wish to lift ourselves up, we need to avoid getting stuck up. And if we wish to make ourselves better, we need to avoid believing we’re better than others.


Attitude is Everything – 1

Posted by Milind Koyande | 3:33 PM | 0 comments |

We must learn to guard against those feelings that have the capacity to lead our attitude down the wrong path and to strengthen those feelings that can lead us confidently into a better future
        The process of the human change begins within us. We all have tremendous potentials. We all desire good results from our efforts. Most of us are willing to work hard and to pay the price that success and happiness demand.
        Each of us has the ability to put our unique human potential into action and to acquire a desired result. But the one thing that determines our potential that produces the intensity of our activity, and that predicts the quality of the results.
      Attitude determines how much of the future we are allowed to see. It decides the size of our dreams and influences our determinations when we are faced with new challenges. No other person on earth has dominion over our attitude. People can affect our attitude by teaching us poor thinking habits or unintentionally misinforming us or providing us with negative sources of influence, but no one can control our attitude unless we voluntarily surrender that control. 
    No one else “makes us angry”. We make ourselves angry when we surrender control of our attitude. What someone else may have done is irrelevant. We choose, not they. If we select a volatile attitude be becoming hostile, angry, that we are unworthy, then again we have failed the test.
     If we care all about ourselves, then we must accept full responsibility for our own feelings that have the capacity to lead us confidently into a better future. 
    If we want to receive the rewards the future holds in trust for us, then we must exercise the most important choice given to us as members of the human race by maintaining members of the human race by maintaining total domination over our attitude. Our attitude is an asset, a treasure of great value, which must be protected accordingly. Beware of the vandals and thieves among us who would injure our positive attitude or seek to steal it away. Having the right attitude is one of the basics that success requires. The combination of a sound personal philosophy and a positive attitude about ourselves and the world around us gives us an inner strength and a firm resolve that influences all the other areas of our existence.