Wednesday, February 29, 2012

Operating System (STORAGE) RAID Technology

RAID Technology:

RAID Technology is RAID (redundant array of independent disks; originally redundant array of inexpensive disks) is a way of storing the same data in different places (thus, redundantly) on multiple Hard Disk. This technology is basically a strategy which help to maintain a backup of data with Storage, the basic purpose to understand RAID is that server is also used as a tool to store data on the Cyber Space so this data present on the server is backed up using the Mirror techniques present in RAID Technology.

Operating System Basics Part-1

What is a Process ?

A Process is defined as the executing program of a computer, A program is basically a combination of Active and Inactive section and the Active Section of a program is called a Process. 

Process Cycle :

Ready Queue--> Running (CPU/Server)-->Terminate[end cycle] or Wait Queue-->Read Queue
                                                                  Diagram:

Hacking Basics and Introduction(OSI Model) Part-2

OSI MODEL,

OSI defines inter-networking in terms of a vertical stack of seven layers. The upper layers represent software that implements network services like encryption and connection management. The lower layers of the OSI model implement more primitive, hardware-oriented functions like routing, addressing, and flow control.
7)  Application Layer : The application layer provider different services to the application. Example of services provided by this layer are file transfer, electronic messaging e-mail, virtual terminal access and network management.
6) Presentation Layer : The Presentation layer is responsible for protocol conversion, date encryption/decryption, Expanding graphics command and the date compression. This layer makes the communications between two host possible.

Hacking Basics and Introduction Part-1


Hello Friends,
Before we Start with Hacking and Penetration we are supposed to be familiar with basics of two entities which are:
1. Computer Network and Security
2. Operating System Basics
 CHAPTER 1a:
COMPUTER NETWORKS,
Computer Network is the Basic theoretical knowledge about how does the Network Work, where Network are of 2 Types:

a. Intranet : An intranet is a private network that is contained within an Organization/Enterprise. It may consist of many interlinked local area networks and also use leased lines in the WAN(Wide Area Network).

Motive of Ethical Hacking

We will Focus on:
  1. Imparting Knowledge about Hacking
  2. Understanding The Dark Side of Internet
  3. Protecting ourselves From Any Attack(HACK)
  4. Understanding various Components of Hacking

Welcome to Ethical Hacking | by Piyush Bansal

Hackwithpiyush.blogspot.com, Ethical Hacking Tutorials is a platform for everyone to gain knowledge and exchange ideas in the vast and Super exciting field of Ethical Hacking and Security. You can know interesting facts and Tricks which work on the internet and some facts might even leave you thinking on the very basic question "ARE YOU SECURE ON THE INTERNET ? "
We also allow you to post views and information on new-found technologies in this domain that you wish to share with others and we will be uploading information about various tools that are used to check penetration, you can also ask us if you wish to know the functioning of tools.
We also bring you a series of E-tutorials and Presentations that would allow you to sit back at home and learn key concepts of ethical hacking, cyber security and also give you basic knowledge about Penetration Testing.
PS: We advise you to use information available on the website for knowledge, protection and awareness purpose. Please do not use information for any kind of criminal activity, we will also update which all activities are illegal on the internet.