Monday, 30 January 2017

What is CAPTCHA - The Complete Explanation



       Image result for captcha images

                     Ever wondered what CAPTCHA means??

What is the difference between reCAPTCHA & CAPTCHA?


CAPTCHA is "Completely Automated Public Turing Test To Tell Computers and Humans Apart". This will test and analyse whether the user is a human or computer and so prevents spam and automated data downloading. It typically asks the user to write down a combination of alphabets/numbers from an image. The text cannot be copy pasted from the image, thus preventing computers any access.

Below pic is an example of CAPTCHA:





This user identification procedure has received many criticisms, mostly from the disabled people and also from other people who feel that their everyday work is slowed down to sort out the words that are difficult to read.Do you known something! For an average person it takes approximately 10 seconds to solve a typical CAPTCHA.
Any program that passes the tests generated by a CAPTCHA can be used to solve a hard unsolved AI (Artificial Intelligence) problem.

               

What is reCAPTCHA?

reCAPTCHA is a free service that protects your website from spam and abuse. reCAPTCHA uses an advanced risk analysis engine and adaptive CAPTCHAs to keep automated software from engaging in abusive activities on your site. It does this while letting your valid users pass through with ease.reCAPTCHA offers more than just spam protection. Every time our CAPTCHAs are solved, that human effort helps digitize text, annotate images, and build machine learning datasets. This in turn helps preserve books, improve maps, and solve hard AI problems.

Easy for People.  

Hard for Bots               RecaptchaLogo.svg

Purposefully designed. And actively aware. reCAPTCHA knows when to be easy on people and hard on bots. Our easy CAPTCHAs are a breeze for legitimate users.


  This idea an interesting application of CAPTCHA. There are several projects of converting books to the ebook version. One method is to scan the books and use OCR software to convert image of text to actual text. But somebody has to validate whether the conversion is successful. Luis von Ahn, Ben Maurer, Colin McMillen, David Abraham and Manuel Blum at Carnegie Mellon University developed reCAPTCHA to help in this problem. Instead of random texts in CAPTCHA, actual texts from scanned books are shown. The user writes the digital text. This is used to validate each word from several users.

                              Related image
                            
             Check out this video Guys!                                                                                                                                                                                                                                                                                                       
                                                                - sandeep simeon
                                                           
   

Sunday, 22 January 2017

All About Google Tango Enabled " Lenovo PHAB2 Pro "

Hey people i'm back with the review of brand new  Lenovo smartphone which has Google Tango enabled The Lenovo PHAB2 Pro 


Lenovo Phab 2 Pro Phone
The Phab 2 Pro is the world's first smartphone enabled with Tango which is a  new technology from Google that enables augmented reality (AR) gaming and utilities. All you have to do is look through the Phab 2 Pro, and you'll see objects and information overlaid onto the real world.You can make really cool stuff like measuring objects with  your phone, visualize furniture like a new table or sofa to see how it looks in your home Or simply play with your virtual pet may be a Dinosaur  Wherever you go with the Phab 2 Pro, there's always more to explore and trust me this will take you to the next level of smartphone usage and the Augmented Reality experience.

What is Augmented Reality

                            How many of you have ever played the most trending game of 2K16 any guess? |> Its the Pokémon GO i know most of you are still addicted to it.


HD Wallpaper | Background ID:638835


It is a free-to-play location-based augmented reality mobile game developed by Niantic. It was initially released in July 2016 for iOS and Android devices. The game allows players to capture, battle, and train virtual Pokémon who appear throughout the real world.

Lets get back to AR :

 Augmented Reality means your smartphone that will be aware of it surroundings, and  create computer generated images to superimpose them on a user's view of the real world  to provide a merged view that they can interact with. The PokÃmon Go and House of the Dying Sun are some of the top AR games in the  world.

Impressive Specifications :
General
  • Model Number
    • PB2-690M
  • Model Name
    • Phab 2 Pro
  • Color
    • Champagne Gold
  • OS
    • Android
  • Operating System Version
    • 6.0(Marshmallow)
  • RAM
    • 4 GB
  • Voice Call
    • Yes
  • Display Resolution Type
    • Quad HD
  • Supported Network
    • 4G LTE, 4G LTE
  • Display Supported Network
    • 4G LTE, 4G LTE
  • Processor Type
    • Qualcomm (MSM8976) Snapdragon 652 Processor
  • Operating Frequency
    • GSM - B2/B3/B5/B8; UMTS - B1/B2/B5/B8; 4G LTE (FDD) - B1/B2/B3/B5/B7/B8/B20, LTE (TDD) - B38/B40/B41 (Narrow Band)



More  Details
  • Display Size
    • 6.4 inch
  • Display Resolution
    • 2560 x 1440 Pixels
  • Primary Camera
    • 16 Megapixels
  • Internal Storage
    • 64 GB
  • Processor Speed
    • 1.8 GHz
  • Sim Size
    • Nano SIM
  • Sim Access
    • Dual Standby
  • Sensors
    • Fingerprint Sensor
  • ROM
    • 64

Camera Features


  • Advanced AR-enabled Rear Camera, PDAF Fast Focus, Depth Sensor for Tango, Motion Tracking Sensor for Tango ( Tango is a New Set of Sensors and Software by Google), Depth Camera and Fisheye Camera,Fixed Focus.
  • Lenovo Phab 2 Pro 64 GB 6.4 inch

  • Display Features
    • 2K IPS Assertive Display, 2.5D Curved Gorilla Glass Curved Screen

    • Warranty
      • Warranty Summary
        • 1 Year for Mobile & 6 Months for Accessories
      • Warranty Service Type
        • On Site Service Center
      • Covered in Warranty
        • Warranty of the product is limited to manufacturing defects only
      • Not Covered in Warranty
        • Warranty does not covered any physical damage

.

Meet Lenovo Phab 2 Pro

Starting at: $499.99

The above mentioned is the price in USA and Good news for all INDIAN's over there Pahb 2 Pro in India is just for 
₹29,990 available at flip-kart.So go grab it now click here.
Check Out the Hands On Experience Here 


 Click Here !

~ SandeepSimeon

Thursday, 5 January 2017

Sundar Pichai #BackOnCampus and 10 things he said in IIT- Kharagpur.


   Google CEO Sundar Pichai is in India. And just the way he did it last time when he was here in December 2015, he  again met young students of IIT-K. In his earlier trip Pichai interacted with students at Delhi University. But this time he chose to visit his alma mater IIT- Kharagpur.
Image result for sunder pichai wife

Sunder Pichai graduated from the very same Institution way back in 1993.The Google Head was very cool,he talked about his time at the IIT-K, including how once he got C grade in one paper and discussed some of the success making tricks.He also talked about some funny incidents that  happened in IIT in his time.This event was live streamed Youtube with the Hashtag #BackOnCampus and so many people joined live with Google C.E.O.



    Here are 10 bits that made the day  from his interaction with the IIT-K students.
1Pichai is from Chennai -South India so when he came to IIT- Kharagpur, he had some tough time with Hindi. "When I came to Kharagpur for the first time I thought abe saale was how people usually call each other. Once I shouted 'abe saale' in the mess and it basically caused the mess to shut down for a few days," he said.

2. While at IIT-Kharagpur, Pichai was among the more brilliant students but once he also got C grade in one paper, he told students, that grades doesn't decide they life.
Image result for sunder pichai wife

3. He said that he really loves cricket. "I love cricket. It has been phenomenal to see Virat Kohli play. He has performed great in all forms of cricket, be it 50 overs, test or T20."

4. Pichai also likes Bollywood. "Deepika Padukone, you can call, is my favorite Indian actress right now. Back in college there were many."


5. He also said that "Digital market in India is still developing and that's where statups face trouble. In a country of 1.4 billion people only 300 million have smartphones. I advise startups to build for future if they want to compete with MNCs," 

6. Pichai really thought Gmail was an April Fool's Joke. But then the whole world did. "My interview at Google was on April 1st, April Fool's Day, so everyone thought what if it is a joke. And then we didn't know much about Google products and there was so less time to prepare. I hadn't had a chance to use it (Gmail in the beginning was an invite-only website), I thought it was an April fool's joke."


7. Pichai told students should also have grip on other skills such as knowing about environment etc. "It is important to develop other skills during a course like engineering".

8.  Pichai also said that sometimes bad grades make a way to work hard for the good grades. "I think I did get C sometime (when I was at IIT)... My first year CGP was so bad I had to work hard to make up for it for the next three years,".
Image result for sunder pichai wife

9. And this is the most interesting thing He met his wife in IIT-K. "I met my wife Anjali at IIT Kharagpur, so whenever I asked a friend to call her, they would shout loudly Anjali, Sundar is here for you," he said.



Image result for sunder pichai wife
10.  Pichai said students to follow their own dreams and not some others.He also told India should allow its students to take more risks. "Education system in India is made in such a way that students have to follow already set rules. I think it is more important to try different things and take more risks". 


Here I Conclude :
What so ever Mr.Sunder Pichai said to the students was absolutely a perfect pack of Success Tips and Tricks.So as he said, from now i wish each and every student should take risks in his/her life and try something different each day and lead their life happily.   
                        Watch the Glimpse of Google C.E.O - Sunder Pichai's Talk. 
                                                                                                   -   Sandeep simeon


Friday, 30 December 2016

I.O.T (Internet Of Things) - Simple Explanation


   Any thing that can be Connected will be ɔonnected  - Modified     
  'Murphy's Law '

 Internet Of Things (I.O.T)  is currently the Hot topic because most of the people are connected through Internet and they are exchanging information faster than anything from one corner to the other corner of the Planet.
Okay . . then you may ask what the heck is Internet Of Things(I.O.T) hm . .hold On i'll Explain you in a better way that you understand.

Image result for iot

 Internet Of Things (I.O.T) :

The concept is very simple  . . It is just the inter connection of different devices via internet.This includes anything and everything  like cell phones,T.V sets,smart watches,cars,bikes,coffee makers,lamps,air conditioners and many more. 
The analyst firm Gartner says that by 2020 there will be over 26 billion  devices connected or some even estimate this number to be much higher, over 100 billion.
Finally the basic idea is : as for now only people->people are connected through internet but in future

people->people & people->things & things->things will be connected.
So IoT is a mammoth internetwork of Connected Devices which also includes people in it.

Related image


When Did All This Start ?

The term "Internet of Things" was coined by Peter T. Lewis in a 1985 speech given at a U.S. Federal Communications Commission (FCC) supported wireless session at the Congressional Black Caucus 15th Legislative Weekend Conference. In his speech he states that "The Internet of Things, or IoT, is the integration of people, processes and technology with connectable devices and sensors to enable remote monitoring, status, manipulation and evaluation of trends of such devices."
The concept of the Internet of things became popular in 1999, through the Auto-ID Center at MIT and related market-analysis publications.Radio-frequency identification (RFID) was seen by Kevin Ashton (one of the founders of the original Auto-ID Center) as a prerequisite for the Internet of things at that point. Ashton prefers the phrase "Internet for Things." If all objects and people in daily life were equipped with identifiers, computers could manage and inventory them.

How Does This Effect You ?

If your alarm wakes you up at 5'0 clock and notifies your coffee maker to start brewing coffee for you.   
Lets imagine that you are on the way to an Important meeting and got struck in a jam then if your car could have the access to IoT then it will take you in the best route and also might send a text to the other party notifying them that you will be late.
If your office equipment is connected then it will automatically re-order the stuff that is running low.There are many more ways in which the connected devices may help you out.

Image result for iot

We divide the architecture of IOT system into four layers :  

1. Application Service Layer
2. Information Integration Layer
3. Data Exchange Layer
4. Object Sensing Layer

·     Objectives of IoT :

 More Intensive Information Perception 

 More Comprehensive Intelligent Service

Image result for internet of things devices

 I.o.T can be Applied in :

1. Environmental monitoring
2. Infrastructure management
3. Manufacturing
4. Energy management
5. Medical and healthcare
6. Building and home automation
7. Transportation

Related image

The applications of IoT have been further extended to various areas in order to manage peoples production and living more dynamically, accurately and improve the relationship between human and environment.



Watch this 2 min video on IoT and you can really understand every thing about it.
Video Source:Youtube         


                              - sandeep simeon

Tuesday, 27 December 2016

All About - H*A*C*K*I*N*G - (EDUCATIONAL)


  Hello people . .  I'm back with a new post about ' HACKING '.
  I Hope after going through this post you will completely     
 understand  the basic terms of Hacking and i'll keep this short and  simple so that you will easily understand.
   

Image result for hacking

So, lets start with WHAT IS  HACKING ?


     Hacking is  gaining of access to a computer for viewing, copying, or creating data(leaving a trace) without any intention of damaging data or maliciously harming the computer. 
    The above Hacking definition represents the Good Guys - most of the time for they are the ones who search for these exploits to prevent crackers.
  
Now you may ask who is a Cracker? and what is Cracking?

Cracker - Person who gains unauthorized access to a computer with the intention of causing damage. 

Cracking - Method by which a person who gains unauthorized access to a computer with the intention of causing damage.
  
 We all know that there are some classifications in hacker's .These classification is done based upon the intention of their actions.Now lets see who are they !

1.Ethical Hacker or White hat Hacker : 
          A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments.This kinda Hackers are much ethical and you know something? there are certified ethical Hackers too.Image result for ethical hackingPenetration tests are done by organizations that hire certified ethical hackers to penetrate networks and computer systems with the purpose of finding and fixing security vulnerabilities.

2.Cracker or Black hat Hacker : 
          A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.So Black hat Hacking and Cracking are illegal in this planet.

3.Grey hat :
           A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner. Aaho . . .then a grey hat hacker is a neutral one maybe positive or negative.

Image result for classification of hackers

After knowing all these things we should also know what is Cyber-Crime ?
 
Cyber-Crime  in simple words it is Crime online (via Internet) : Using the computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers etc.  Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using mobile phones via SMS and online chatting applications.There are many rules and Laws against cybercrimes in all the countries.


Why ethical hacking is good ?

Image result for ethical hacking for good

  • Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of its  money.
  • Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.
                                   - * - * - * - * - * - 
Now lets know how to create a safe and secured password which is Hack-Proof.
Related image

 1.You should choose a password which is hard to guess or Hack -    so don't use Phone numbers,Birth dates,family names etc.
 2.Don't share your passwords with any one - even with your best   friend or a family member.

 3.Your Password should not be short - It should be more than 8    characters.
 4.Use at least one lowercase letter and and one uppercase          letter - eg: TechNewsUpdate_016.
 5.Make sure that you also use spaces in your password. 
 6.You can generate almost similar but a bit different passwords    if you maintain more accounts.
 7.And finally, write down your password and keep it in a safe      place.
                     -* -* -* -* -*-
   
*Top 5 Most dangerous Hackers of All Time

   This is the Interesting part  of the article . . How many of you      
   know these names :

                     1.KEVIN MITNICK
                          AKA : The Mitnick

                2. MATTHEW BEVAN & RICHARD PRICE
                           AKA : Kuji & DataStream Cowboy

                3. ANONYMOUS – Hacktivist Group

                4. UNKNOWN NAME
                            AKA : ASTRA

               5. GARY MCKINNON
                            AKA : SOLO


   Watch out the video for more info about this Most-Wanted        Hacker Criminals. 
              

                                                                                                                          -sandeepsimeon





Comments Pls !