Friday, December 9, 2016

Shortcut Tips

1.How to quickly Log-off Computer

Ans: Start Button+Press L

2.Want Alarm Clock Online?

Ans: http://kukuklok.com 

3.How to make beautiful online wallpaper?

Ans:http://bighugelabs.com

Tech and Tips

Some Basic Meaningful Answer

1.What is the meaning of 32k & 64k SIM ?

Ans: It Means your SIM is Operating in the frequency of 32khz or 64khz & your sim is a GSM SIM Card.


2.What is Auxiliary Memory ?

Ans:Devices that provide backup storage are called Auxiliary memory. They holds information that are not presently used by devices (computer).

3.Forgot Computer Password?

Ans: 1. Restart PC
         2. Press F5 key
         3. Select-Safe Mode
         4. Select Control Panel
         5. Select Administrator
         6. Goto User Account
         7. Remove Password
         8. Restart..Enjoy...!

4.Microsoft office is now online!

Ans: Edit your office work anywhere, anytime

Address: http://office.microsoft.com/en-in/web-apps/

Thursday, December 8, 2016

How To Download Free IEEE, Springer and Any Scholarly Paper

Follow This Step to download free IEEE, Springer and any Scholarly Paper

1.Find a Paper which is want to download.

2.Find DOI Number which is given in paper. write down this number or copy this(Ctrl+C).


3.Start new Tab in Browser and enter the website (https://sci-hub.tw/) and (https://libgen.is/)in address bar and Press Enter.



4.Find Search Box and Paste DOI number and open it, sometimes website will ask to write captcha      code before opening the article or paper.

5.Click on Download...!Enjoy..!

Black Hole Attack Survey Paper

Prevention and Detection of Black Hole Attack in MANET: A Survey
-Mitul Bhatt, Hinaxi Patel, Swati Kariya


Abstract


         Mobile Ad-hoc Networks (MANETS) are the networks which are temporary, dynamic, self-configurable and self-maintainable. MANET’s nodes are communicated with each other as being in dynamic topology and without any fix infrastructure. In MANET each and every node acts as a client and server. Any node in the MANET can join and leave the network without any permission. In MANETS have different types of security active attacks like Black Hole, Worm Hole, Grey Hole and Sink Hole Attack which disrupts the network or gaining the data by attacker. Black Hole Attacks are serious security risk to the routing protocol in MANETS. Black Hole Attacks are a kind of attacks where a malicious node advertise itself a shortest path during routing discovery and redirect the data towards malicious node. Malicious node dropped the data or its desired destination instead of original destination. In This Paper focuses of various prevention and detection methods for Black Hole Attack described.

Download Link

Monday, January 25, 2016

Android Survey Article


 A Survey Permission Based Mobile Malware Detection
-
Mitul S. Bhatt,Hinaxi Patel,Swati Kariya


Abstract

          Smartphone have been widely used in recent years due to their functionality, thus they also become attack targets of malware. Android provides a permission category that requires each application to explicitly request permission before it can be installed to run. Permissions are silent work when it is given request by the user, means over privileged permissions action going towards malicious purpose. Reverse engineering process application is repacked with the malicious permissions. Android provides inter process communication to other application are able to leak user’s location, data and identity. To protect from malicious application it is needed to have some control mechanism to analyze application from malicious activity. This paper focuses of various permission based malware analysis method to detect malwares in android application.

Download Link


http://ijcta.com/documents/volumes/vol6issue5/ijcta2015060536.pdf