Hadoop 3, launched in 2017 made a notable difference in the world of data and a new era began. The Hadoop framework is at the core of the entire Hadoop ecosystem, and various other libraries strongly depend on it. The table below describes the differences between Hadoop 1.x, Hadoop 2.x and Hadoop 3.x.Continue reading “Hadoop 1 vs Hadoop 2 vs Hadoop 3”
Do you want to check if your account has been compromised in a data breach? It may not be your e-mail account or banking credentials that may have been compromised but it can also be e-mail address that was used or associated with some other type of service or account. It might be possible that you used your e-mail id somewhere to create an account or sign-up or even sign-in may have been compromised in a data breach and the attacker might use the same credentials i.e username or e-mail and password to gain access on a different website or service.Continue reading “Password Help!”
The Machine Learning Engineering
The machine learning technology makes a deep-dive interest of maximum computer science engineers now a days. A huge number of people from different domains has involved in this technology to develop something amazing and better.
In machine learning convention of being tautology for solution of each and every problems doesn’t exist currently. Researchers and various organizations have trying to find the way to make thing applied in machine learning completely.Continue reading “The engineering behind Machine Learning”
In Linux, the directories can be divided into two classifications:
- Root Directory → It is denoted by ” / ” (forward slash). Root directory is the root/base of the entire file system and cannot be renamed or deleted. There can be only one root directory.
- Sub Directories → Directories that are under the root ( / ) directory are called sub-directories.
FileSystem Hierarchy Standard (FHS)
The FileSystem Hierarchy Standard (FHS) defines the directory structure and directory contents in a Linux distribution. It also defines the names, permissions and locations for several file types and directories. All files and directories appear under one common root directory, even if they are stored on different devices physically. The root is the parent directory to all other directories. The Linux file system contains the following directories:Continue reading “Linux File System Directory Architecture”
The ‘/etc/shadow‘ file in Linux contains password and password related information of users listed in the /etc/passwd file.
An entry in /etc/shadow file contains nine entries/fields and looks like:
a → Username
The user name of whose the entry contains the password details.Continue reading “/etc/shadow file in Linux”
The ‘/etc/passwd‘ file in Linux contains user and user related information.
An entry in /etc/passwd file contains seven entries/fields and looks like:
a → Username
username is between 1 and 32 characters in length.
b → Password
an ‘x‘ character indicates that encrypted password is stored in /etc/shadow file.Continue reading “/etc/passwd file in Linux”
The way in which the devices are connected in a network both physically and logically is referred to as Network Topology. If one understands the topology of a network, one can easily determine the functioning of the network i.e., the connection between the devices, the number of devices in the network, the capacity of the network, whether the network is centrally controlled or distributed, etc.
There are two ways of defining network topology. They are:
- Physical Topology
- Logical Topology or, Signal Topology
A group of devices when connected together to share resources forms a computer network.
Computer Network are required so that the devices can:
- can communicate with each other
- share resources such as files, printers, databases and much more
- transfer data from one to another.
The exchange of data between two devices via some form of transmission medium is known as data communication.Continue reading “Introduction to Computer Networks”
Mobile and Internet communications have made our life a lot easier but at the same time it has also put our privacy vulnerable. Protecting the information online is one of the major challenge that we all face today. The goal has become to access everything without revealing anything. When it comes to privacy, almost no one can be trusted. There is even a possibility that out ISP provider or our VPN service provider is maintaining a log for everything that we do online and keeping a track on us and there is good chance that we are not aware of it.Continue reading “Tor Enabled Sim Card Will Keep Communications Anonymous”
Researchers from Oxford University, UK have analyzed about 959,000 apps from the US and UK Google Play Store and the research revealed that almost 90% of the apps that are present in the Play Store are sharing data with Google. The study also revealed that the data harvested are also shared with major social media platforms like Facebook and Twitter and also with tech giants like Amazon. The data harvested and collected is estimated to be shared with over 10 companies. 90% apps that are available on the play store keeps track of users personal data and collects the data and shares it with multiple companies.Continue reading “90% of Android Apps are Collecting User Data reveals Oxford University Researchers”