Hadoop 1 vs Hadoop 2 vs Hadoop 3

Hadoop 3, launched in 2017 made a notable difference in the world of data and a new era began. The Hadoop framework is at the core of the entire Hadoop ecosystem, and various other libraries strongly depend on it. The table below describes the differences between Hadoop 1.x, Hadoop 2.x and Hadoop 3.x.

Continue reading “Hadoop 1 vs Hadoop 2 vs Hadoop 3”

Password Help!

Do you want to check if your account has been compromised in a data breach? It may not be your e-mail account or banking credentials that may have been compromised but it can also be e-mail address that was used or associated with some other type of service or account. It might be possible that you used your e-mail id somewhere to create an account or sign-up or even sign-in may have been compromised in a data breach and the attacker might use the same credentials i.e username or e-mail and password to gain access on a different website or service.

Continue reading “Password Help!”

Linux File System Directory Architecture

In Linux, the directories can be divided into two classifications:

  • Root Directory → It is denoted by ” / ” (forward slash). Root directory is the root/base of the entire file system and cannot be renamed or deleted. There can be only one root directory.
  • Sub Directories → Directories that are under the root ( / ) directory are called sub-directories.

FileSystem Hierarchy Standard (FHS)

The FileSystem Hierarchy Standard (FHS) defines the directory structure and directory contents in a Linux distribution. It also defines the names, permissions and locations for several file types and directories. All files and directories appear under one common root directory, even if they are stored on different devices physically. The root is the parent directory to all other directories. The Linux file system contains the following directories:

Continue reading “Linux File System Directory Architecture”

Network Topology

The way in which the devices are connected in a network both physically and logically is referred to as Network Topology. If one understands the topology of a network, one can easily determine the functioning of the network i.e., the connection between the devices, the number of devices in the network, the capacity of the network, whether the network is centrally controlled or distributed, etc.

There are two ways of defining network topology. They are:

  • Physical Topology
  • Logical Topology or, Signal Topology
Continue reading “Network Topology”

Introduction to Computer Networks

A group of devices when connected together to share resources forms a computer network.

Computer Network are required so that the devices can:

  • can communicate with each other
  • share resources such as files, printers, databases and much more
  • transfer data from one to another.

Data Communication

The exchange of data between two devices via some form of transmission medium is known as data communication.

Continue reading “Introduction to Computer Networks”

Tor Enabled Sim Card Will Keep Communications Anonymous

Mobile and Internet communications have made our life a lot easier but at the same time it has also put our privacy vulnerable. Protecting the information online is one of the major challenge that we all face today. The goal has become to access everything without revealing anything. When it comes to privacy, almost no one can be trusted. There is even a possibility that out ISP provider or our VPN service provider is maintaining a log for everything that we do online and keeping  a track on us and there is good chance that we are not aware of it.

Continue reading “Tor Enabled Sim Card Will Keep Communications Anonymous”

90% of Android Apps are Collecting User Data reveals Oxford University Researchers

Researchers from Oxford University, UK have analyzed about 959,000 apps from the US and UK Google Play Store and the research revealed that almost 90% of the apps that are present in the Play Store are sharing data with Google. The study also revealed that the data harvested are also shared with major social media platforms like Facebook and Twitter and also with tech giants like Amazon. The data harvested and collected is estimated to be shared with over 10 companies. 90% apps that are available on the play store keeps track of users personal data and collects the data and shares it with multiple companies.

Continue reading “90% of Android Apps are Collecting User Data reveals Oxford University Researchers”

Network Scanning Tool: Nmap

Nmap stands for “Network Mapper”.

It is a free and open source tool used for network scanning and security auditing. It was written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich). It supports different techniques like host discovery, port scanning, service discovery, OS detection, version detection and many more. It can be used to scan any type of network, even with many devices.

Nmap uses raw IP packets in different ways to determine the available hosts on the network, the services those hosts are offering, operating system (versions) they are running, the types of packet filters or firewalls in use, etc.

Syntax of nmap command:

nmap [Scan Type(s)] [Options] {target specifications}

Continue reading “Network Scanning Tool: Nmap”

Create a website or blog at WordPress.com

Up ↑