Posts

Showing posts from 2017

oVirt

Image
Introduction With the beginning of Next generation of IT, the Cloud is taken a higher place in the IT world. Implementing a cloud is simply laying on virtualization of resource pools over network. It is typically a combination of virtualization and data centers. Pool is constituted with servers, storages, network and etc. The resources are shared according to the client requirements as applications or services and other requirements to the clients as on demand over network with minimal management effort. Elasticity, flexibility, easy to manage and allocate resources as client pays are some advantages of deploying a cloud. All the operations are done through network. Costs are cut off than fully hardware services by using a cloud. Most of the cloud platforms are open source and they can be deployed and manageable for the requirement, clients meet, even as private, public and hybrid clouds for an organization. Open source software’s typically do similar things, with different inst

Network Monitoring Workshop - 2017

  Network Monitoring Workshop  Objectives To educate and give an idea of what the network monitoring is and the tools which are used for network monitoring for universities and institutes who have ac.lk domain. Introduction In present network, monitoring and having measures in a network is a key thing for all security and managing a network. Failure in a network can be caused a huge disaster. Keeping on all the physical structure can not be done. Even, about the devices on the network can be monitored with some open source tools. For those utilities are provided by many open source softwares like SNMP, cacti, LibreNMS. By holding a network monitoring workshop, the basics of network monitoring and measuring was introduced and some open source tools were described.

Task - Creating a website in Code Academy

The course for create a website on Code academy is consist of 3 parts HTML  CSS Boostrap The HTML part consists 13 sessions, CSS consists 10 sessions. Basically in this course it gives the rough idea about the structure of a website and with what components they are made of.

CCNA inetrview questions

Image
The questions that CCNA asked frequently. And after referring them, the quiz from CCNA

Wireshark

Wireshark tool can be used to packet sniffing and we can get the data stream which are sending via FTP, Telnet since FTP and Telnet are not using encryption when sending data. When we using wireshark, we can filter the packets by protocol and the data packet is containing which is sent. They are containing sequentially and FTP or Telnet is not secure enough to send sensitive data.   We can sniff SSH packets but we can not get the data as the data is encrypted.

Note - Summary

Algorithms searching sorting algorithm analysis Design methods Dynamic programming Recursion Greedy Data Structures linear trees graphs Algorithms : finite sequece of step or instructions to solve a problem No algorithm Algorithm but too comlex (in network security) Tractable algorithms(in web applications) RAM - Random Access Machine primitive operations assigning the value to a vollatile calling a method performing an arithmatic operations compare 2 numbers indexing into an array following an object refference returning from a method Divide and conque divide in to subproblems conque - solving combine them Searching Linear Searching compare the key with the elements(starting 0 to n) return true if the key is found in the array Binary searching compare the key with the middle element If the middle element is the key then return if not pick one half of the array depending on the

Little Tricks Collection

Image
The small tricks we can do 1.clicking on the .bat file, we can make random numbers on a cmd infinitely. it just running in a loop and it does not store any number, but shows. We can use any color to use the font color. @echo off color 0c :top echo %random% %random% %random% %random% %random% %random% %random% goto top 2.Change to name of the command promt title Shaggy The title of the command prompt is "Shaggy" 3.To change the cmd font color and background color. go to start and open the file location of the cmd. Then right clicking on that, an interface is opened and we can change the color of the command prompt and the font colors. The popped up interface to change the features We can change the font color of the cmd by typing "color attr" and hitting enter. Then some details are going to appear and then we can choose the color and type the value of the color we need Details of the colors Changing the font color of the cmd C

Hiding files on Android phone without wasting storage for a third party

Image
On a Android phone, the files can be hide without installing a third party application from google playstore.        For that make a folder in file manager and move the files that should be hidden and rename the folder adding " . " (dot) extension infront of the folder. And then the folder disappears and when we want to have the folder, we only have to do is, unhiding the hidden folders. Then the folder would appear Creating a new folder After adding files, rename the folder Rename the folder with " . " extension When we need the folder, simply apply "show hidden files" The folder is there

note - Linux

All the usable and useful commands on linux and some commands on shell scripting on a paper .

Note - Operating Systems

Operating systems     Operating system is a program that act as an intermediary between a user of a computer and the computer hardware and it provides a environment for execution of programs another set of OS functions exist for ensuring efficient operation of the system. They are,     - Resource allocation     - Accounting     - Protection and security     - User interface     - Program execution     - I/O operations     - File system manipulations     - Communication     - Error detection Distributed systems     Distributed system is a collection of physically separate, possibly heterogenous computer systems  that are networked to provide the users with the access to the various resource that the system maintain. The characteristics of a distributed system     - Fault tolerance     - Highly availability     - Recoverable     - Consistent     - scalable     - predictable performance     - secure Special purpose systems     - Real time embedded systems     - Multimedia systems     - Ha

Note - Summary note collection of Linux

An operating system based on the Linux kernel is called a Distribution or Distro Unix/Linux uses a tree like hierarchical file system and there is no drivers in Linux ,unlike Windows. Linux file naming convention is case sensitive. Peripherals like hard drives, cd rom, printers are also considered files in Linux/ Unix. There are three user account types                   1.Regular                   2.Root - the super user and has all the administrative privileges.                   3.Service Account Absolute path is complete address of a file or directory. Relative path is relative location of a file of directory with respect to current directory. Linux being a multi-user system uses permission and ownerships for security. there are three user types on a Linux system.           1. User            2. Group            3. Other  Linux divides the file permissions into read, write and execute denoted by r,w and x. The permissions on the files can be changed by 'chmod' c

Note - Be a curious Baby who collects interesting stuff...

Extensible Business Reporting Language(XBRL)   is used by public and private enterprises to publish and share financial information with each other and industry analysts across all computer platforms and the internet. Book 1 is an example of how Name Box are numbered and named during each work session. Back up is Using earlier data Voice mail is functions much like an answering machine, allowing callers to leave a voice message for the called party. When data changes in multiple list and all lists are not updated, this causes data inconsistency. Control structures are words that a programming language has set aside for its own use.   Memory contents are lost when the computer turns off. Scanner can input graphical images and pictures for a computer. Windows are not common feature of software applications Linux is Shareware and Open source software. Expansion cards are inserted into Slots. Digital camera is an  input type device. Web-hosted technology allows us

Game:Haiku escape - Hidden Ruins

Image
This is a very interesting and addictive game for who likes to find the clues and solve the problems.. The game is with the conversations of the characters. A place to find the clues and solve the problems. There may be hidden clues in any corner After solving a small part of the puzzle, a way to the diamond. to reach that had to find all the components which are on the hands of the four statues. Some rascals, who have come to rob the diamond The way, changing the chapters on the game Another puzzle on the game, an under ground tunnel.

Project(on going) - IPv6 Fragmentation

An IP Datagram travels over different networks, each of which may have different MTU (Maximum Transmit Unit ) , which is the largest IP datagram that can be carried by a network. MTU - - maximum size of an unit which can be transmitted in a network and it depends on the network and media and how they be allowed to transmitted. also encapsulation....etc. It happens when the MTU values of hosts and routers are different from each other;         When we have two different type of network/media connected with router which have different MTU in such case router broke down packet to appropriate size regarding network/media type payload exceed the Maximum Transmission Unit in the interface. so the payload has to be chopped and put them into IP fragmented packets. they are:     -reassembled at destination     -each fragment is independent datagram        - could be routed in a different direction        - could be delivered out of order        - can be used to bypass IPS       

Contest - Hourrank22

The competition Hourrank on Hackerrank on 2nd July 2017 at 08.30pm to 09.30pm hourrank-22

shell scripting on Hackerrank

Shell scripting as a beginner is a kind of tough task as the syntaxes are confusing sometimes.

Note - Hakcing

Hacker     -is someone who likes to tinker with the electronics or computer systems and he is a person, full of...                 creativity         Will to learn         knowledge is power         patience         programming to be an elite hacker Hacker Heirachy         Script kiddies         wanna be hackers         have no hacking skills and use the tools developed by others         no knowledge of what's happening behind the scene     Intermediate Hackers         usually about computers, networks, and enough programning knowledge to understand what a script might do             Elite hackers         skilled hackers         write hacker tools and exploits         break into systems and hide their tracks Low Tech Methods     Social engineering     Shoulder surfing     Guessing High tech methods     Gmail system administrator's automatic responder     Dictionary attacks     Brute force attacks     phishing     Rainbow tables     GX Cookies     ARP Poisoning Ethical Hacking  

Note - Internet and HTTP

Internet     A global systems of interconnected computer networks and tangible network of computers sharing/exchanging information with the help of PROTOCOLS Internet Protocols     -Protocol is a form of etiquette. prescribed guide for conduct or action     -usually specifies:                    -The format of the messages         -How to handle the errors OSI Model Upper Layers         Application - HTTP, FTP, SMTP     Presentation - JPEG, GIF, MPEG     Session - Apple talk, winSock     Lower Layers         Transport - TCP, UDP, SPX     Network - IP, ICMP, IPX (router)     Data Link - Ethernet , ATM (Switch, Bridge)     Physical - Ethernet, Token Ring (hub, repeater) Hyper Text Transfer Protocol     -provides a set of rules and standards that govern how information is transmitted on the World Wide Web     -WWW uses the HTTP to talk with each other     -first part of the URL of a site on the internet, signifying a document written in HTML     -HTTP can

Note - Nmap

Nmap Introduction                - is a security scanner and Network Mapper is a free and opens source utility for network explorations and security audition.           -is used to discover hosts and services on the computer network thus creating a "map" of the network.          - sends specially crafted packets to the target host and then analyzes the response.          -uses raw IP packets in novel ways to determine what hosts are available on the network , what services those services are offering , what operation systems they are running supports all platform of OS like                    -linux                   -Microsoft                   - Mac In nMap, raw IP packets are used. Features     - Host discovery - identify the hosts on the network     - port planning - enumerating the open ports on the target hosts     - version detection - integrating network services on remote devices to determine the application name and the version number

Some on Git

Why use Source Control Systems? what is this?     A tool that helps to keep the different versions of the files and allow multiple users to work on a same code with minimum amount of collisions. why use?    It helps to keep the developing process simple and all the files are hosted. Some basic terminology     git - the shell command to work with git   repo - repository, where the code for a given project is kept   commit - verb, means the push the code to the server ,                    in Git Commit = (commit + push)  diff - the difference between the two versions of a file cat - it shows the content in the file

Networking interview questions

Few Interview questions for students who is intersted in networking can go for the questions .

Hackathon - 2017

Image
The competition "Hackathon - 2017" was officially started yesterday (5th May) .

Course - Learn Git in Code Academy

git init - initialize and this command sets up all the tools Git needs to begin tracking changes made to the project. in a git project, there are three parts and they are A Working Directory : where we'll be doing all the work: creating, editing, deleting and organizing files A Staging Area : where we'll list changes we make to the working directory A Repository : where Git permanently stores those changes as different versions of the project we can check the status of those changes with: git status - it shows the untracked files in red color and then we should do git add 'file name' to add the file and then  we should do 'git commit' to reposit the file git show HEAD git log to see the history

A place to learn

As a beginner,  found out a website to learn the syntax and the basics of some programming languages in code academy . Try and see how it is gonna be help you with.

Note - Google cookies

1.Preference            Most Google will have preference cookie called "NID"  in their browser. A browser sends NID to Google sites and there is an ID in it. and it helps to keep a track of the languages we use and some activities we do.   2.Security            Security cookie for authenticate users and prevent fraudulent use of login and protect user data from unauthenticated parties. 3.Process            Make website work and deliver services that website visitors expect. 4.Advertising            Help to customize ads on Google properties.  5.Session state 6.Analytics            Google's analytics tool that helps website and app owners to understand how their visitors engage with their properties. content - Google_cookies

Note - Servelets and JSPs

Request - response model Cleint is basically something or some one who is requesting for some resource. Server is basically a machine which serves the request.                         Client request for a static page and server serves a static page,cause webserver can serve only static HTML pages. Then to handle Dynamic requests? Here, Servelets come to the picture.                     Helper application for dynamic requests is nothing but a "Servelet". What is a web container?                      Client sends a GET request to the server and server sends a request to the servelet to build the dynamic page. Servlet is a special java programme which has no main method but call back methods.                 In the middle of the server and servlet there is  the web container as the bridge. Web container is a servlet engine and it helps web server to communicate with the servlet. And also it is responsible for the invoking methods on the servlet and servlets live and die

Note -Google user pattern recognition

Google uses pattern recognition to make the sense of image                        Facial detection is used and and this technology that helps Google to protect the privacy on services like Street View, where computers try to detect and then blur the faces of any people that may have been standing on the street as the Street View car drove by.                      It is also what helps services like Google+ photos suggest that when tagging a photo or video, since it seems like there might be a face present. Facial detection won’t tell  whose face it is, but it can help to find the faces in the photos. Google page

Note - Networking

Networking      Involves connecting computers to create a local area network. For sharing information and resources For sharing hardware and software For Provide centralized administration and support There are two major types of network LAN           In LAN there are several topologies. They are, Mesh topology Star topology             Advantages to the star topology are                     -central wiring hubs ease the task of managing moves , additions and changes                    -central cabling points provide faster troubleshooting                    -independent point to point links prevent cable problems on any given link from affecting other links                    -central equipment hubs can provide easier migration to new topologies                    -physical security Tree topology   Bus topology Ring topology     2. WAN MAC - Medium Access Control  ALOHA    Mainly used in satellite systems Simplest possible medium access protoc

Software Testing - session from TiQRI

The session on the web testing was on 25th(Saturday) March 2017, in the Computing department,Faculty of Engineering, University of Peradeniya. and we could have a basic idea of the web testing.

Note - Day 2 - Tangible hardware...

In a  computer ,physically connected to the computer , something tangible. full list of component of a computer chassis Disc drive : CD ROM,CD-RW,DVD,Blu-Ray Expansion card Fan Floppy Drive Hard Drive Mother Board Power Cable Power Supply Processor Includes or can install these components Flat Panel Display Monitor  Keyboard Mouse(coodless,foot mouse,intellimouse,j mouse,joystick,mechanical,optical,touch pad, touchball, touchpoint) printers scanner CD -ROM DVD CPU - brain of a computer HardDrive - storage of a computer Mother Board RAM - main memory ,primary memory, random access memory, system memory Sound card Video card modem(Internal,external,removable) NIC-network interface card (content was taken from "Learn computer in 30 days" in appstore)

Self satisfaction - collection of certificates and medals 😊

Image
The collection of certificates i have with me and when i see these.. it makes me feel better.here we ago... Medals-house meet certificates-2012 house meet certificates-2008 house meet certificates-2010 house meet championship cups-house meets- senior prefect in science section Left-colors from school Right-badge from Athletic society certificates-left-invited participation Right-primary school Medals-divisional meet certificate-divisional school meet 2006 certificate-divisional school meet 2007 certificates-divisional club meets 2008 certificate-divisional school meet 2009 certificates-divisional meets certificates-divisional school meet 2010 certificates-divisional school meet 2012 certificates - District meet-Milo Netball 2008,2009,2011 certificate-District club meet 2008 certificate- District youth club meet 2011