Official Blog

The Increasing Reach of Virtual Reality (VR)

Whats is Virtual Reality?

Virtual Reality (VR) is a technology that makes users feel in a Virtual Environment with the help of computing systems and specifically designed software.

The term “Virtual Reality “ itself is comprised of two words i.e. Virtual and Reality .Virtual means “not real” but “like real” and reality. Thus Virtual Reality means anything that is near to reality. Technically Virtual Reality is described as “a computer generated three dimensional environment” in which a person can interact or manipulate objects of such environment.
As Wikipedia states

Virtual reality or virtual realities (VR), also known as immersive multimedia or computer-simulated reality, is a computer technology that replicates an environment, real or imagined, and simulates a user’s physical presence and environment in a way that allows the user to interact with it. Virtual realities artificially create sensory experience, which can include sight, touch, hearing, and smell.

How Virtual Reality is achieved?

In Virtual Reality (VR) with the help of computer technology a simulated environmen
t is created in which the computer is transformed into a gatekeeper to an artificial world. Unlike usual graphic experienc
e instead of viewing a screen in front of users and keyboard or mouse for input, VR places the user inside that sim
ulated environment. Users can also interact within that given environment and manipulate objects in the virtual world with their sense such as hearing, touching and watching. There are a range of systems that are used for this purpose, such as headsets, Omni-directional treadmills and special gloves. These are used to actually stimulate our senses together in order to create the illusion of reality.

Following are the main components of a virtual environment:

  1. The visual displays that immerse the user in the virtual world.
  2. The graphics rendering system that generates the ever changing images at 20 to 30 frames per second.
  3. A tracking system that continuously informs the position and orientation of the user’s movements.
  4. The database construction and maintenance system to build and maintain a detailed and realistic model of the virtual world.
  5. A sound system that can produce high quality directional sounds and simulated sound fields.
  6. Devices like tracked gloves with pushbuttons to enable users to specify their interactions with the virtual objects.

Span of Virtual Reality:

Virtual Reality can lead to a new exciting world of innovations and entertainment. Entertainment industry is Billion Dollar market where new technologies play major role to create a huge user base. Virtual Reality is getting popular nowadays for such an immersed experience in Gaming, Entertainment and training areas. Whether it’s an expensive, dangerous or impractical to do something in reality, VR makes it real for you.

VR is increasingly playing major significance in following areas:Virtual Reality Techmantr

  • Architecture
  • Construction
  • Sports
  • Medical
  • Gaming
  • Entertainment
  • Cinema

Military training to Medical surgery training can be experienced more deeply than real. It will not be surprising if we say

Virtual Reality or Immersed System can change digital interface systems we see today.

 

 

Bootstrap: A complete package for WEB

Bootstrap

bootstrap-docs-readme

BOOTSTRAP is  a complete package for web who wants to become a web designer. Bootstrap is the most popular HTML, CSS, and JS framework for developing responsive, mobile first projects on the web sites.

HTML:

logo_256

Defines data and structure of a page using elements under html.

CSS:

CSS-Logo-214x300

Defines how the data and elements actually looks and behave when interact with them.

JS: 

Badge_js-strict.svg

This is actually programming language of a web know as java script.

 

History of Bootstrap:

Bootstrap is a front-end development framework that enables developers & designers to quickly build fully responsive websites. The framework contains global CSS settings with built-in components and extensible classes in the form of typography, navigation, buttons,form,tabbing and much more.

Bootstrap was originally developed by former Twitter employees Mark Otto and Jacob Thornton, as an internal development tool to improve consistency and efficiency of web page.

It was in August 2011, released as a open source project on github and become a most popular repository platform.

 

Very easy Installation: 

Installation is very easy, just download the source file of bootstrap and upload on server and just put the references or  links of available files into your header. The installation process work is covered with that work.

example-

<!-- Latest compiled and minified CSS -->
<link rel="stylesheet" href="link of your file" > (this is for .css file)

<!-- Latest compiled and minified JavaScript --> <script src="link of .js file" ></script>

 

How to start:

You should remember this format to start ..

<!DOCTYPE html>
<html>
<head>
<title>Title Name</title>
</head>
<body>

<h1>This is a Heading</h1>
<p>This is a paragraph.</p>

</body>
</html>

 

Basic HTML elements-

  • Title- <title></title>- this is use for give title of the page.
  • Header- <h1>…<h6>- this element is use for give the heading of content.
  • Paragraph-<p></p>- This element is use for give a paragraph.
  • Simple block element-<div></div>

How to use CSS:

  • Internal / Embedded Styles. Internal Styles are placed inside the head section of a particular web page via the style tag.

<style>

.clr{
color:red;
background-color:yellow;
}
#code{
font-size:12px;
}
</style>
  • Inline Styles. Inline Styles cannot be resused at all, period.
<div style="color:red,margin:12px 0 0 0"></div>
  • External Style Sheet. For the most part, we will want to place the majority of our Style Rules on an External Style Sheet.

<link href=”link of your file” rel=”stylesheet” type=”text/css”/>

How to use Javascript (JS File):

  • Internal: Internal script are placed inside the page wherever you want via the sscript tag.
<script type="text/javascript">
$(document).ready(function(){
Your code here.....
});

</script>

  • External- For the external link first you have to create a .js file in and set link in html page.
<script src="js file address" type="text/javascript" ></script>

Features:

  • css resetting for cross browser compatibility.
  • grid scaffolding for design.
  • Multi screen support.(Fully Responsive)

Javascript plugin:

  • Dialogs
  • Tabs
  • Alerts
  • Carousel
  • tooltips and many more..

Customization:

  • You can customize the css according to your requirements.
  • You can use LESS to compile your a bootstrap css version on your own.
  • You can just download the customize version from http:/bootswatch.com

 

Adding Twitter Bootstrap:

You should use CDN links also..like

For CSS-

<link href=”https://maxcdn.bootstrapcdn.com/bootstrap/3.3.6/css/bootstrap.min.css” rel=”stylesheet”/>

For Javascript File- 

<script type=”text/javascript” src=”https://maxcdn.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js”></script>

[box] An Example of Bootstrap:[/box]


Bootstrap Forms






Awadhesh Kumar

Jain Software Developers

 

Internet of things (IoT) ` BOON OR CURSE

Kevin Ashton, cofounder and executive director of the Auto-ID Center at MIT, first mentioned the Internet of Things in a presentation he made to Procter & Gamble in 1999.

Internet of things(IoT) @Techmantr

Internet of things(IoT) @Techmantr

As Wikipedia stated “The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items—embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data.”

More technically The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

Internet of things - concept @Techmantr

Internet of things – concept @Techmantr

 

A thing, in this context, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low — or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network.

 

smart water bottle and example of internet of things - techmantr

IoT – smart water bottle

Practical applications of IoT technology can be found in many industries today, including precision agriculture, building management, healthcare, energy and transportation. Wearables and activity monitors are common examples that can monitor your heartbeat sometimes your steps and send analytical reports to your smartphones. More technologies are emerging that promises to make daily life easier last thing I have heard about latest Iot is smart hydration reminder ` an intelligent water bottle that reminds you to drink water.
Operational technology (OT) and information technology (IT), allowing unstructured machine-generated data to be analyzed for insights that will drive improvements.

This technology had led IPv6’s huge increase and also a massive world of data in term massive we are talking about petabytes (1petabyte = 1024 gigabyte) of data.

Internet of thing is getting popular day by day and major companies are investing to raise this technology further. Recently BMW launched it concept video at Microsoft’s Build 2016 Conference, Microsoft too unveils cloud and IoT innovations for developers.

As a new technology or innovation arise it also create new problems and difficulties Iot is also facing problem of cyber-attacks and virus threats. An increase in the number of smart nodes, as well as the amount of upstream data the nodes generate, is expected to raise new concerns about data privacy, data sovereignty and security

No doubt this innovation has great potential of simplifying life and a huge market of smart and intelligence demanding community. But it also has its other face that is making us Digitally handicapped.

 

Node.js and its universe

It’s absolutely no doubt that JavaScript is ruling the web world.JavaScript’s rising popularity has brought with it a lot of changes, and the face of web development today is dramatically different. The things that we can do on the web nowadays with JavaScript running on the server, as well as in the browser, were hard to imagine.

As official website states: “Node.js® is a JavaScript runtime built on Chrome’s V8 JavaScript engine. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient.” In simple words we can say that this technology runs JavaScript on server side.nodejs-green

Node.js was introduced late in 2009 by Ryan Dahl at a JavaScript conference with an idea to enrich the server side with the power of JavaScript. Back in past most of the real time web application are created by using client server architecture. In such architecture we have to use two different languages for client side and server side scripting for example we use php as a server side language  and JavaScript for scripting in client side.

But node.js removes this conflict, Now we can write real time as well as complex web applications in just one language using node.js. This will definitely removes the overhead of bridging both languages and debugging them individually.

Node.JS owes its incredible speed and performance to a technique called the event loop and The fact that it runs on top of V8, the JavaScript interpreter and virtual machine that Google Created to make their Chrome web browser run impossibly fast

Installing Node

Node.js is very easy to install. If you’re using Windows or Mac, installers are available on the download page.

Installing on windows

On Windows, go to http://nodejs.org and download the MSI installer. Every release of node has a corresponding MSI installer that you need to download and execute. The filename follows the format nodev?.?.?.msi. Upon 3285OS_01_05executing it, simply follow the instructions in the setup wizard shown in fig

To ensure that the installation worked, open the shell or command prompt by running cmd.exe and typing

node –version.

The version name of the package you just installed should display.

 

 

Installed Node. What Next?

Once installed you’ll have access to a new command called “node”. Now Open the node command and run this command to check if it’s working

node –version

You can see it simply output your node version on screen

You can use the node command in two different ways. The first is with no arguments. This will open an interactive shell (REPL: read-eval-print-loop) where you can execute raw JavaScript code. The other way to run Node is by providing it a JavaScript file to execute. This is almost always how you’ll be using it.

To open REPL simply type node on command prompt the cursor will now come in next line with a “ > ” sign here you can write and evaluate JavaScript code if you’re a beginner with javascript you can test your expressions here. Type following to test environment

console.log(‘Hello World’);2

Further you can try this

object.keys(global)

Secondly you can write your code on a js file and execute it with node command

Open Your favorite text editor and write these lines and save it first.js.

var http = require(‘http’);

var serv = http.createServer(function (req, res) {

res.writeHead(200, { ’Content-Type’: ’text/html’ });

res.end(’<marquee>Node Running Everywhere!</marquee>’);});

serv.listen(3000);

Run the file:

open shell or node command prompt and type

node first.js

In the above code snippet, you’re harnessing the power of Node to script a fully compliant HTTP server that serves a basic HTML document.

Node.js use asynchronous callbacks. Basically when you tell it to do something and when it’s done it will call your function (callback). This is because Node is single-threaded. While you’re waiting on the callback to fire, Node can go off and do other things instead of blocking until the request is finished.68747470733a2f2f7374726f6e676c6f6f702e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031342f30312f746872656164696e675f6e6f64652e706e67

 

This is especially important for web servers. It’s pretty common in modern web applications to access a databases. While you’re waiting for the database to return results Node can process more requests. This allows you to handle thousands of concurrent connections with very little overhead, compared to creating a separate thread for each connection.

Further we will discuss more about npm –  the package manager for node.js and other powerful features of it.

IP Spoofing

IP SPOOFING:

Image result for ip spoofing

IP address spoofing” is a technique that involves replacing the IP address of an IP packet’s sender with another machine’s IP address.

IP spoofing refers to connection hijacking through a fake Internet Protocol (IP) address. IP spoofing is the action of masking a computer IP address,so that it looks like it is authentic.

  • IP Spoofing is a technique used to gain unauthorized access to computers.
    • `IP: Internet Protocol
    • `Spoofing: using somebody else’s information
  • Exploits the trust relationships.

Types of IP Address:

  1. IP is connectionless, unreliable
  2. TCP connection-oriented

 

A Blind Attack:

Host I can not see what Host V send back

img 56f8c6251f436

 IP SPOOFING STEPS:

  1. Selecting a target host (the victim)
  2. Identify a host that the target “trust”
  3. Disable the trusted host, sampled the target’s TCP sequence
  4. The trusted host is impersonated and the ISN forged.
  5. Connection attempt to a service that only requires address-based authentication.
  6. If successfully connected, executes a simple command to leave a back-door.

IP Spoofing Attacks:

  • Man in the middle-Packet sniffs on link between the two end points, and therefore can pretend to be one end of the connection.
  • Routing-redirects routing information from the original host to the attacker’s host.
  • Flooding / Smurfing-The attacker redirects individual packets by the hacker’s host.

 

Attacks:

img 56f8c880ce1cf

Flooding: SYN flood fills up the receive queue from random source addresses.

Smurfing:  ICMP packet spoofed to originate from the victim, destined for the broadcast address, causing all hosts on the network to respond to the victim at once.

IP-Spoofing Facts:

  • IP protocol is inherently weak
  • Makes no assumption about sender/recipient
  • Nodes on path do not check sender’s identity
  • There is no way to completely eliminate IP spoofing
  • Can only reduce the possibility of attack

 

Disable Ping Command:

img 56f8c80e60e08

  • ping command has rare use
  • Can be used to trigger a DOS attack by flooding the victim with ICMP packets
  • This attack does not crash victim, but consume network bandwidth and system resources
  • Victim fails to provide other services, and halts if runs out of memory

FIREWALL:

img 56f8c7fc4b408

  • Limit traffic to services that are offered
  • Control access from within the network
  • Free software: ipchains, iptables
  • Commercial firewall software
  • Packet filters: router with firewall built-in
  • Multiple layer of firewall

 

 

 

Google Glass

What is Google Glass?

img 56b4312d176e1

  • Google Glass is a wearable, voice-controlled Android device that resembles a pair of eyeglasses and displays information directly in the user’s field of vision.
  • Google’s project program for developing a line of hands-free,intelligent devices that can be worn by users as “wearable computing” eyewear. The first product release from Project Glass, Google Glass, was available for beta testers (U.S. residents only) to purchase in 2013, for $1,500 plus tax.
  • Google Glass is a headset, or optical head-mounted display, that is worn like a pair of eyeglasses. It was developed with the mission of producing a ubiquitous computer.

Google Glass Features:

1. Record Videos, Take Pictures:

Just say the word and Google Glass will take a picture or record a video ` you will never have to touch the hardware.

 

google glasses

2. Show Messages:

Google Glass will show you text messages as well as emails you receive and allow you to reply to them via voice commands.

GEWb6ZYNQpE5lGgnRSXkG UePDR

3. Find Information:

If you are in the habit of Googling things a lot, you will find that your task has been made easier by the new Glass. You simply need to ask a question and the device will pull the answer from the internet.

img 56b433d546118

4. Show Maps:

The widely used Google Maps are integrated into Glass, so that users will be able to chart the course of their journey or look up locations or establishments via voice commands.

img 56b433bc39aa0

5. Live Video Sharing:

Google Glass can show the world what you are seeing ` live! If you are attending a family function, your child’s school play or a concert, you can share the feed with your friends and family in real-time and make them a part of the experience.

6. Integrates Google Now:

Google Now, the digital voice assistant from the search giant, has been integrated in this device. It will keep track of your daily habits, such as when you leave for office or the route you take.

images?q=tbn:ANd9GcSIOCK3O0E4LboprciaPBbRcJJgumIMx8boVHkPllFbux l2h7j

7. Translate:

This is a neat feature that may come in handy when you travel abroad. You simply need to ask Google Glass to translate a phrase or sentence from one language to another and it will speak that out.

 

 img 56b433643e278

Applications of Google Glass:

Google Glass applications are free applications built by third-party developers. Glass also uses many existing Google applications, such as Google Now, Google Maps, Google+, and Gmail.

Third-party applications announced at South by Southwest (SXSW) include Evernote, Skitch, The New York Times, and Path.

 

 

Awadhesh Kumar

Jain Software Developers

 

 

 

JSON: What It Is, How It Works, & How to Use It

What is JSON?

  • JSON is stand for JavaScript Object Notation. and an open standard format that uses human-readable text to transmit data objects consisting of attribute`value pairs.
  • JSON is a syntax for storing and exchanging data.
  • JSON is an easier-to-use alternative to XML and it is a standard way to store data/information in an organized, easy-to-access manner. 
  • it gives us a human-readable collection of data that we can access in a really logical manner.
  • JSON is a lightweight data-interchange format.
  • JSON is language independent.
  • JSON is “self-describing” and easy to understand.

JSON is built on two structures:

  • A collection of name/value pairs. In various languages, this is realized as an object, record, struct, dictionary, hash table, keyed list, or associative array.
  • An ordered list of values. In most languages, this is realized as an array, vector, list, or sequence.
Note: JSON uses JavaScript syntax, but the JSON format is text only, just like XML.
Text can be read and used as a data format by any programming language.

Image result for json

History of JSON:

Douglas Crockford was the first to specify and popularize the JSON format.The acronym was coined at State Software, a company co-founded by Crockford. JSON grew out of a need for stateful, real-time server-to-browser communication without using browser plugins such as Flash or Java applets, which were the dominant methods in the early 2000s and 2001.

Image result for json

JSON Syntax:

The JSON syntax is a subset of the JavaScript syntax.

JSON Syntax Rules:

JSON syntax is derived from JavaScript object notation syntax:

  • Data is in name/value pairs
  • Data is separated by commas
  • Curly braces hold objects
  • Square brackets hold arrays

JSON Data – A Name and a Value:

JSON data is written as name/value pairs.

A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value:

eg:  “firstName”:“John”

Note:JSON names require double quotes. JavaScript names don't.

JSON Values:

JSON values can be:

  • A number (integer or floating point)
  • A string (in double quotes)
  • A Boolean (true or false)
  • An array (in square brackets)
  • An object (in curly braces)
  • null

JSON Objects:

JSON objects are written inside curly braces.

Just like JavaScript, JSON objects can contain multiple name/values pairs:

eg: {"firstName":"John", "lastName":"Doe"}

JSON Arrays:

JSON arrays are written inside square brackets.

Just like JavaScript, a JSON array can contain multiple objects:

eg: “customers”:[
    {“firstName”:“John”, “lastName”:“Doe”},
    {“firstName”:“Anna”, “lastName”:“Smith”},
    {“firstName”:“Peter”,“lastName”:“Jones”}
]

 

JSON Uses JavaScript Syntax:

Because JSON syntax is derived from JavaScript object notation, very little extra software is needed to work with JSON within JavaScript.

With JavaScript you can create an array of objects and assign data to it, like this:

eg: var employees = [
    {"firstName":"John", "lastName":"Doe"},
     {"firstName":"Anna", "lastName":"Smith"},
     {"firstName":"Peter","lastName": "Jones"}
 ];

What are the advantages and disadvantages of json vs xml for ajax requests?

  1. JSON is smaller than corresponding XML
  2. JSON is faster, i.e. simpler syntax -> easier parsing (faster parsing)
  3. JSON can be mapped more easily into object oriented system.
  4. JSON is smaller, faster and lightweight compared to XML. So for data
    delivery between servers and browsers, JSON is a better choice.
  5. JSON and XML both use Unicode and thus supports
    internationalization.

Example of JSON:

{
    "glossary": {
        "title": "example glossary",
		"GlossDiv": {
            "title": "S",
			"GlossList": {
                "GlossEntry": {
                    "ID": "SGML",
					"SortAs": "SGML",
					"GlossTerm": "Standard Generalized Markup Language",
					"Acronym": "SGML",
					"Abbrev": "ISO 8879:1986",
					"GlossDef": {
                        "para": "A meta-markup language, used to create markup languages such as DocBook.",
						"GlossSeeAlso": ["GML", "XML"]
                    },
					"GlossSee": "markup"
                }
            }
        }
    }
}

 

 

Exmaple of XML:

<!DOCTYPE glossary PUBLIC "-//OASIS//DTD DocBook V3.1//EN">
 <glossary><title>example glossary</title>
  <GlossDiv><title>S</title>
   <GlossList>
    <GlossEntry ID="SGML" SortAs="SGML">
     <GlossTerm>Standard Generalized Markup Language</GlossTerm>
     <Acronym>SGML</Acronym>
     <Abbrev>ISO 8879:1986</Abbrev>
     <GlossDef>
      <para>A meta-markup language, used to create markup
languages such as DocBook.</para>
      <GlossSeeAlso OtherTerm="GML">
      <GlossSeeAlso OtherTerm="XML">
     </GlossDef>
     <GlossSee OtherTerm="markup">
    </GlossEntry>
   </GlossList>
  </GlossDiv>
 </glossary>



Awadhesh Kumar
Jain Software Dvelopers

 

TRENDS IN DATA MINING

img 56ac4a0719aef

What is Data Mining:

  •  Data mining is the process of extraction of interesting patterns or knowledge from huge amount of data.
  • Using information contained within data warehouse, data mining can often provide answers to questions. Like….
    • Which products should be promoted to a particular customer?
    • Which securities will be most profitable to buy or sell during the next trading session?

Application of data mining:

Here is the list of areas where data mining is widely used −

  • Healthcare
  • Finance
  • Retail industry
  • Telecommunication
  • Text Mining & Web Mining
  • Higher Education

Trends in data mining:

  • Application Exploration
  • Scalable data mining methods
  •  Combination of data mining with database systems, data warehouse systems, and web  database systems
  • Standardization of data mining language
  •  Visual data mining
  • New methods for mining complex types of data
  • Web mining

Application Exploration of Data Mining:

  • Earlier data mining was mainly used for business purpose, to overcome the competitors.
  • Data mining is gaining wide acceptance in other fields also. And many new explorations are being done for this purpose.
  • Data mining for business continues to expand as e-commerce and marketing becomes mainstream elements of the retail industry.

Scalable Data Mining Methods:

  • As data is expanding at a massive rate, there is a need to develop new data mining methods which are scalable and can handle different types and large volume of data.
  • The data mining methods should be more interactive and user friendly.
  • One important direction towards improving the repair efficiency of the timing process while increasing user interaction is constraint-based mining.

Combination of data mining with database, data warehouse, and web database systems:

  • Database, data warehouse, and WWW are loaded with huge amounts of data and are major information processing systems.
  • The desired architecture for data mining system is the tight coupling with database and data warehouse systems.
  • Transaction management query processing, online analytical processing and online analytical mining should be integrated into one unified framework.

Standardization of data mining language: 

Today few data mining languages are commercially available in the market like Microsoft’s SQL server 2005, IBM Intelligent Miner and many more…..

Standard data mining language or other standardization efforts will provide the orderly development of data mining solutions, improved interpret-ability among multiple data mining systems and functions.

Visual Data Mining:

  • The result of the mined data can be shown in the visual form So it will further enhance the worth of the mined data.
  • Visual data mining is an effective way to discover knowledge from huge amounts of data.
  • The systematic study and development of visual data mining techniques will promote the use for data mining analysis.

Web Mining:

web mining banner
  • The WWW is globally distributed collection of news, advertisements, consumer records, financial, education, government, e-commerce and many other services.
  •  The WWW also contains huge and dynamic collection hyper linked information, providing a large source for data mining.
  • Based on the above facts, the web also poses great challenges for efficient resource and knowledge discovery.

Need of Data Mining:

img 56ac4b0d825dd
  •  The massive growth of data from terabytes to perabytes is due to the wide availability of data in automated form from various sources as WWW, Business, Society etc….
  • We are drowning in data but deficient of knowledge Data is useless, if it cannot deliver knowledge.
  • That is why data mining is gaining wide acceptance in today’s world.

 

Awadhesh Kumar

Jain Software Developers

 

Cell Phone Jammer

Cellular jammer illustr

What is Jammer?

  • Cell phone jammers are devices that create a temporary “dead zone” to all cell phone traffic in their air system.
  • A cell phone jammer is an instrument used to prevent cellular phones and their mobile signals to a base station. When used, the jammer effectively disables cellular phones in the area.
  • Other types of jammers -radar jammer  and radio jammer.

Size of Jammer:

Some cell-phone jammers are made to look like actual phones. Others are briefcase-sized or larger. The biggest jammers used by police and the military can be mounted in vehicles for convoy security.

img 56aaf97fe2f80

Why Jammers are used?

  • Cell phone jamming devices were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists.
  • Examples include: security zones public transport,classrooms,temples,jails,govt.buildings,military bases, industries etc.

How Jammer Works:

A jamming device transmits – same radio frequencies as the cell phone, the communication between the phone and the cell-phone base station in the tower. It’s a called a denial-of-service attack.

img 56aafa44994d8

  • Jammers block cell phone use by sending out radio waves along the same frequencies that cellular phones use at a  high enough power that the two signals collide and cancel each other out.
  • This causes  interference with communication of cell phones and towers to render the phones  unusable.On most  phones, the network would be out of range.

img 56aafa7c1369b

What is Inside the jammer?

Antenna: 

Every jamming – antenna to send the signal. Some are contained within an electrical cabinet. On stronger devices, antennas are external to provide longer range and may be tuned for individual frequencies.

img 56aafad2c965a

Power supply
Smaller jamming – battery operated.

Some look like cell phone and use cell-phone batteries. Stronger devices – plugged into a standard outlet or wired into a vehicle’s electrical system.

img 56aafaff8ef30

Circuitry
The main electronic components of a jammer are:

                Voltage-controlled oscillator – Generates the radio signal – interfere with the cell phone signal.

                Tuning circuit – Controls the frequency at which the jammer broadcasts its signal by sending a particular voltage to the oscillator.

                Noise generator – Produces random electronic output in a specified frequency range to jam the cell-phone network signal.

RF amplification (gain stage) – Boosts the power of the radio frequency output to high enough levels to jam a signal.

 

Applications of jammer?

  1. Cell phone jamming devices were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists
  2. It has been widely reported that a cell-phone jammer thwarted an assassination attempt on Pakistani President Musharraf in December 2003.
  3. Used in areas where radio transmissions are dangerous, such as areas with a potentially explosive atmosphere, such as chemical storage facilities or grain elevators.

Awadhesh Kumar

jain software developers

 

 

Introduction of Tripwire

What is Tripwire ?

Image result for tripwire

 

 

 

  • —Reliable intrusion detection system.—
  • —Tool that checks
    400 × 150 – gardnertackle.co.uk

    to see what changes have been made in your system.—

  • —Pinpoints, notifies, determines the nature, and provides information on the changes on how to manage the change.—
  • —Mainly monitors the key attributes(like binary signature, size and other related data) of your files.—
  • —Changes are compared to the established good baseline.—
  • —Security is compromised, if there is no control over the various operations taking place.

How does it works:

img 56a9a6c68794d

  1. —First, a baseline database is created, storing the original attributes like binary values in registry.—
  2. —If the host computer is intruded, the intruder changes these values to go undetected.—
  3. —The TripWire software constantly checks the system logs to check if any unauthorized changes were made.—
  4. —If so, then it reports to the user.
  5. —User can then undo those changes to revert the system back to the original state.

 

Where it is used?

  • —Tripwire for Servers(TS) is software used by servers.—
  • — Can be installed on any server that needs to be monitored for any changes.—
  • —Typical servers include mail servers, web servers, firewalls, transaction server, development server.—
  • —It is also used for Host Based Intrusion Detection System(HIDS) and also for Network Intrusion Detection System(NIDS).—
  • —It is used for network devices like routers, switches, firewall, etc.
  • —If any of these devices are tampered with, it can lead to huge losses for the Organization that supports the network.

Tripwire for Network Devices:

  • Tripwire for network devices maintains a log of all significant actions including adding and deleting nodes, rules, tasks and user accounts.
  • Automatic notification of changes to your routers, switches and firewalls.
  • Automatic restoration of critical network devices.
  • Heterogeneous support for today’s most commonly used network devices.

Tripwire for servers:

  • For the tripwire for server’s software to work two important things should be present `the policy file and the database.
  • The Tripwire for server’s software conducts subsequent file checks automatically comparing the state of system with the baseline database.
  • Any inconsistencies are reported to the Tripwire manger and to the host system log file.
  • Reports can also be emailed to an administrator.

There are two types of  Tripwire Manager

  • Active Tripwire Manager
  • Passive Tripwire Manager
  • This Active Tripwire Manager gives a user the ability to update the database, schedule integrity checks, update and distribute policy and configuration files and view integrity reports.
  • The Passive mode only allows to view the status of the machines and integrity reports.

How to Install and Use:

  • —Install Tripwire and customize the policy file.—
  • —Initialize the Tripwire database.—
  • —Run a Tripwire integrity check.—
  • —Examine the Tripwire report file.—
  • —Take appropriate security measures.—
  • —Update the Tripwire database file.—
  • —Update the Tripwire policy file.—

What is the benefits of Tripwires:

—Increase security:  Immediately detects and pinpoints unauthorized changes.

—Instill Accountability:  Tripwire identifies and reports the sources of changes.

—Gain Visibility:  Tripwire software provides a centralized view of changes across the enterprise infrastructure and supports multiple devices from multiple vendors.

—Ensure Availability:  Tripwire software reduces troubleshooting time, enabling rapid discovery and recovery. Enables the fastest possible restoration back to a desired, good state.

What are the features of tripwire?

—The main attractive feature of this system is that the

  •  Software generates a report about which file has been violated, when the file has been violated and also what   information in the files have been changed.
  • —If properly used it also helps to detect who made the changes.—
  • —Proper implementation of the system must be done with a full time manager and crisis management department.

—

 

Awadhesh Kumar

Jain Software Developers

 

 

 

—

—

 

Request a Free Estimate
Enter Your Information below and we will get back to you with an estimate within few hours
0