Skip to main content

Posts

6 Life Lessons From The Himalayan Trek

Far from the busy world, where there is zero signal, where the word 'busy' has no existence, that is where I've gathered these invaluable life lessons from a wonderful experience. The story began with a single thought - Why don't I start my new year with an adventurous trek? Kedarkantha trekking is considered one of the most visited and beginner-friendly winter treks. This blog is intended on the life lessons that I've learnt from my trekking experience. Before that, why should you even bother to study further? Maybe one of the good reasons is to expand your perspectives. Let's start. Lesson 1 Expect The Unexpected. We never thought that we can't reach the Kedarkantha peak because of heavy snowfall, this is completely unexpected. But then, it is just a travel scenario. Similarly, we frequently come across so many unexpected situations in our lives. Sometimes, the intensity of the situations will be in a way that it questions your existence. What I intend to

Client-Server Architecture Made Easy

Servers Made Easy: Whenever you visit a website, you see many pictures, videos, text etc. This is known  as the data of the website. If you want to see this data every time you visit  that website, the website’s data should be stored in a device that is connected  to the internet at all times. These devices are called “ Servers ” . These servers  store the data of the website and are connected to the internet so that the  website works 24/7. In simpler terms, A server is a computer that stores data and sends it when it is asked for. Based on these observations, let’s derive the features of a server. Characteristics of a Server: 1. Servers always wait to serve the requests. 2. In order to serve the request, a server may communicate with other related servers as well. But the question is, who asks for the data from the server? Clients Made Easy: When you type ‘facebook.com’ and hit enter, the data of the website should get loaded from servers, but who’s asking to load the data

Understanding Ports

  Let's say you're using Twitter, Facebook, Youtube, all at once. You are commenting on someone else's post on Facebook, tweeting something on Twitter and listening to a song in the background on Youtube simultaneously. In this case, your device is connected to all three servers i.e, Twitter, Facebook and Youtube servers and also you're receiving data from all three servers at the same time. Now, if all this data comes together, then will the device not get confused as to which data is from which server? Similarly, if requests from multiple devices are going to a server, will the server not get confused as to which node requested which information? Well, it does! And to solve this problem, all devices i.e, both clients and servers are assigned Ports . Let's take another example, In a shop, there are three different counters namely Electronics, Homecare and Clothing. These three different counters provide different services and are selling different things. These cou

How to Start Your Own Blog For Free?

I have started this blog on April 23, 2020. Recently, This blog crossed an overall of 10k+ views. So I believe, I am in the right position to guide you regarding how to start your own blog for free. Many of my friends have asked me questions like: How to start a blog? Is it free of cost? How and where should I publish my blog?  and the list goes on... By the end of this post, I assure you that you will get better clarity on how to start your own blog. Let's start. Basically, there are two ways that you can start your blog. Paid Blogs Free Blogs Paid Blogs: You need to purchase your own domain name (For example, www.sairohith.com , Here 'sairohith' is the domain name) and also buy a web hosting service for your blog from reputed websites like GoDaddy, Wix etc.  This literally means that the blog is completely under your control. Once you purchase your own domain name along with good web hosting, you can start writing by choosing a template of your choice. I'm not going

How do White Hat Hackers Hack a System?

  Who are White Hat Hackers:  White hat hackers are legal security professionals who work for protecting organizations  from cyber threats. Remember, the only difference between black hat hackers and white hat hackers is the intention behind the hack. Both hack the computer systems, but white hat hackers hack for protecting the organization from cyber threats whereas black hat hackers hack for their own benefit illegally. In the previous post, we have discussed how do black hat hackers hack a system. If you haven't seen it yet, I suggest you read that before reading this. How do Black Hat Hackers Hack a System? Now lets finally get into our topic - How do White Hat Hackers Hack a System? Step-1: Legal Documentation White hat hackers make sure they sign Memorandum of Understanding (MOU) , which is a document that describes the testing activity and the steps that will be taken, on a legal paper.  Along with MOU, there is another document called the Non-Disclosure Agreement (NDA) , w

How do Black Hat Hackers Hack a System?

  Who are Black Hat Hackers? Black Hat Hackers are those who use their knowledge to hack computer systems for their own profit illegally. How do Black Hat Hackers Hack a System? Step-1: Information Gathering and Reconnaissance Let's assume if a hacker is trying to hack a website, he gathers information like on which server the website is running, the programming language behind, user base and architecture of the website. Step-2: Vulnerability Assessment Vulnerabilities are nothing but security loopholes or weak entry points. After Step-1, the hacker performs vulnerability scan using manual or automated tools. These tools run through the entire website and at the end, it gives a report of possible vulnerabilities. Meanwhile, the hacker also checks for bugs and errors on the website. Step-3: Penetration testing and Gaining Access Now after finding vulnerabilities in the Step-2, the hacker may exploit the vulnerabilities to gain access. Step-4: Escalating Privileges and Maintaining Ac

Types of User Accounts in Linux

User accounts represent identities that authenticate to the system and can use authentication credentials to do specific tasks. Individuals who will be using the Linux computer should have their own unique user accounts. Administrators will use these accounts to control the user's access to files, directories, and commands on the system. Each account is referenced by the system using a user ID (UID), rather than a name. Names are used for the convenience of the users. User accounts have several attributes, including password information, group memberships, expiration dates, comments, etc. Types of User accounts: There are three different types of user accounts: Root Standard user Service Root User Account: There are two roles played by the root user. i) As a local administrator. ii) To provide a security context for some applications and commands. A user logged on as root can do administrative tasks such as password resets, system configuration changes, user account management, et

10 lessons I have learnt in 2020...

2020 is a year of shocks, surprises, learnings and a lot of introspection for me. I know with the arise of corona pandemic, many people have lost their lives, lost their jobs, lost their own families but still, there are a lot of things we need to be grateful for. For example, at this moment, you are alive, you are reading this, your senses are working properly and above all, your health is perfectly alright in spite of the pandemic.  Now tell me, how many good things are there that we need to be grateful for amidst of corona chaos? Every year is an experience we gain for the future, experience from the mistakes that we've done, experience from the way we have responded in a particular situation and experience from our self-fulfilling prophecies. So like everyone else, this year has really taught me some valuable lessons which I believe are the first step to achieving my goals. So I thought, why not share my experience of this year with people so that they may learn something out o

Have you lost your track? - Recharge and Reflect Now

  My sincere apologies to everyone for me being inconsistent in the blog. I am swamped with my semester academics as well as with personal issues. I try my level best to be consistent from now.  Okay then, let's start this comeback with a powerfully packed post. We all make resolutions, we all make up our mind so strong that our desire to adopt new habits and the want to change seems to be at the zenith. But somewhere along the way, we lose our motivation to try and get stuck in a helpless and baffling condition. This post is intended for everyone who has lost their track of what they are doing and to refill their minds with unlimited hope and enthusiasm. Don't stress yourself too much because no matter how bad the situation is, it will change. When you face difficult times, know that challenges are not sent to destroy you. They are sent to promote, increase and strengthen you. Embrace your challenges. Never regret a day in your life. Good days give happiness, Bad days give exp

Types of Communication Links

A communication link is a communication channel that connects two or more communicating devices. This link may be an actual physical link or it may be a logical link that uses one or more actual physical links. There are majorly 4 types of links. They are: 1. Point-to-Point Link: This link connects two devices without any device in between them. 2. Transient Link or Broadcast Link: This link connects two devices with the support of other devices as well. In transient network, data can enter or leabve from any router. 3. Stub Link : Data enters and leaves through only one router. Stub network is Unidirectional. 4. Virtual Link: Virtual networking enables devices across many locations to function with the same capabilities as a traditional physical network.