CSS Forums

CSS Forums (http://www.cssforum.com.pk/)
-   Computers and Technology (http://www.cssforum.com.pk/off-topic-section/computers-technology/)
-   -   techniques to learn about computer (http://www.cssforum.com.pk/off-topic-section/computers-technology/108531-techniques-learn-about-computer.html)

ursula Friday, April 01, 2016 09:03 PM

[QUOTE=ursula;924851]
first of all i am highly indebted for your kinndda good elaborations and now im understanding the technical terms with elujidations and what i gotten something is that our programmers have complete information or more appropiately accessibility to our secret data evenly as ones privacy is point of enchraochment for field specialist,[B] now my question to you is that how spy agencies use the matadata to gain accessibility to individual beings, like, i hope you will be familiar with "Edward Snowdown",the lunatic man has already elaborated the american spy program of NASA:dd[/B][/QUOTE]
Here it is please.
Respected teacher!
What about your 2017 planning, were enjoying April fool, or something, duuuuuddd!

mustansar~hussain Friday, April 01, 2016 09:05 PM

[QUOTE=ursula;924924]Here it is please.
Respected teacher!
What about your 2017 planning, were enjoying April fool, or something, duuuuuddd![/QUOTE]
Include it as well in your assignment questions.

ursula Friday, April 01, 2016 09:15 PM

Already included,
I want some intro from you as well.
Lagta he assignment ab month pe jae g.(student bhag jae ga)dedupppp
Oh, April fool is already included in assignment as well.

[QUOTE=mustansar~hussain;924923]@Ursula
I have finalized material for you which you have to cover at least before you die. Covering it within one year, will be a laudable achievement. So, ready for start?[/QUOTE]

More than welcome, let's share your outline that we're going to "cover".

mustansar~hussain Friday, April 01, 2016 10:03 PM

[B][Try to explore things by yourself][/B]
You have to go through following 11 levels. This whole process can take approximately 01 to 03 years.

[B]Levels:[/B]
[B]1)[/B] Java Programming: An Introduction to Software | Coursera
[B][B]2)[/B][/B] Full Stack Web Development
[B]3)[/B] HTML, CSS, and Javascript for Web Developers - Johns Hopkins University | Coursera
[B]4)[/B] Android App Development | Coursera
[B][B]5)[/B][/B] Search Engine Optimization (SEO) | 7 march - 1 Aug
[B]6)[/B] Cybersecurity and Its Ten Domains | Coursera
[B]7) [/B]Cybersecurity | Coursera
[B]8) [/B]Interaction Design | [B]Optional[/B]
[B]9)[/B] PHP and MySQL Tutorial in Urdu / Hindi Complete - Lecture 1 - YouTube
[B]10)[/B] Introduction to Research for Essay Writing | Coursera
[B]11)[/B] How to Write and Publish a Scientific Paper (Project-Centered Course) | Coursera

For each level, I will be providing you its description and guidance. You will have to update me with your progress regularly.


Level 01: [URL="https://www.coursera.org/specializations/java-programming"]Java Programming: An Introduction to Software | Coursera[/URL]

[B]Deadline for whole specialization: 31 August.[/B]

[B]Assignment 01: [/B]Submit your review about this specialization. Your review should answer following questions:
1) what is this specialization about?
2) How many sub-levels, it encompasses?
3) Short intro about its each sub-level.

Deadline for Assignment 01: 09:30 P.M; 03 April 2016

[B][B]"Failure will never overtake you if your determination to succeed is strong enough."[/B][/B]

[B]Best of Luck.[/B]

ursula Friday, April 01, 2016 11:17 PM

insahllah, i will meet the goal.:):)
just one question, the brief introduction of these courses that are four in number?

the problem is that it is not free of cost, please help me in this regard.:oo
Can i register free of cost????

mustansar~hussain Saturday, April 02, 2016 11:27 AM

[QUOTE=ursula;924949]insahllah, i will meet the goal.:):)
just one question, the brief introduction of these courses that are four in number?

the problem is that it is not free of cost, please help me in this regard.:oo
Can i register free of cost????[/QUOTE]

Precise introduction of all those four courses.

Courses are free of cost. They charge money for providing a certificate only.
Search each course individually in the search bar, then join that freely.

ursula Saturday, April 02, 2016 01:41 PM

[QUOTE=mustansar~hussain;924988]Precise introduction of all those four courses.

Courses are free of cost. They charge money for providing a certificate only.
Search each course individually in the search bar, then join that freely.[/QUOTE]

first of all im highly indebted for suggesting me such a nice course and i found the teachers very cooperative and nice one,yeah, you are right its free and went through the course as well.
Now, alhamdollillah got your assignment and answer is!
i'm very excited, though late night disappointments has haunted me, which has vanished away:haha
[B]Assignment[/B]
first, what is web: an address used in the virtual world for example [url]www.google.com[/url]
second;how this web page is created, for example if i wanted to create [url]www.ursula.com[/url] (it is created through CS and html)
third:java script programming (that is used to manipulate imaging, computing and algorithms), which is understood by programmers only.
Fourth: the most important part that how and where to use these informations in our daily life i.e. in projects formation etc.

mustansar~hussain Saturday, April 02, 2016 04:42 PM

[Try to explore things by yourself]
 
[QUOTE=ursula;925014]first of all im highly indebted for suggesting me such a nice course and i found the teachers very cooperative and nice one,yeah, you are right its free and went through the course as well.
Now, alhamdollillah got your assignment and answer is!
i'm very excited, though late night disappointments has haunted me, which has vanished away:haha
[B]Assignment[/B]
first, what is web: an address used in the virtual world for example [url]www.google.com[/url]
second;how this web page is created, for example if i wanted to create [url]www.ursula.com[/url] (it is created through CS and html)
third:java script programming (that is used to manipulate imaging, computing and algorithms), which is understood by programmers only.
Fourth: the most important part that how and where to use these information in our daily life i.e. in projects formation etc.[/QUOTE]

That's good to read.

All courses provide assignments in the same way weekly with a deadline. They all have separate discussion groups as well. Now, you have to accomplish each course, [B]individually[/B], with its assignments. Its 2nd of April today and you have to finish whole specialization before 31 August to proceed for [B]LEVEL 02[/B] .

Moreover, try to interact with other members and place your queries there in the concerned group of the course. Here, you should [B]precisely [/B]type your progress [B]only[/B]. Your questions should be raised there only in the concerned discussion forum.


[B]Assignment 02:[/B]
Completely finish first level of specialization, Programming and the Web for Beginners, with its assignments and helpful readings. Raise questions in the discussion forum and assist others there. Make notes out of each lecture in any way you feel comfortable. I took snapshot of each slide and compiled a complete ppt file to make notes. Then, printed that ppt file with 04 pages per one side.

[B]Deadline: 20 April 9 P.M[/B]

[B][B]
Wish You Very Best Luck.[/B][/B]

ursula Saturday, April 02, 2016 04:49 PM

Yeah, I got it! Inshallah I will try, Thanks again.

quantumX Saturday, April 02, 2016 07:11 PM

[QUOTE=ursula;924851]Dude, are you kidding me or gonna to celebrate under' [B]lunatics April Fool[/B]',
if no, than babe, it makes one whole year!:laughing:laughing

first of all i am highly indebted for your kinndda good elaborations and now im understanding the technical terms with elujidations and what i gotten something is that our programmers have complete information or more appropiately accessibility to our secret data evenly as ones privacy is point of enchraochment for field specialist, now my question to you is that how spy agencies use the matadata to gain accessibility to individual beings, like, i hope you will be familiar with "Edward Snowdown",the lunatic man has already elaborated the american spy program of NASA.
oh!
once again,[B]Thanks[/B], for your kind elaborations.:dd[/QUOTE]

Let me start with my story of how one of my close friend and I got interested in developing a hacking software, while studying at university. It was, I think, 3rd semester when we had been quite much familiar with programming languages, and quite good at making logics. We were quite close friends, so he started revealing his intentions of making a spy software, and hacking into computers of a few girls of our batch. I was never interested in such time consuming and useless activity, even though my programming skills were quite polished, but I never intended to do such thing throughout my stay at university. He asked me to be a part of his mission but I refused in a very friendly way. The only thing he used to discuss with me, was the programing logics of the spy software, which he was going to develop. I thought of it as a purely educational stuff for me, I never even wrote a single line of code for him, but we would just discuss concepts. A long story short, He finally got his hands on a fully working spy software (miniature one), after carrying out months of effort, which would log the keystrokes, and all the cache (where passwords are stored) of the browser, and then send it to an email address, which he had set in his software. He, then, started his mission by sending the executable file to the class mates’ email address, their Facebook accounts, whom he wanted to hack. The ones who clicked/run that malicious file in their computers/laptops were hacked, and let that malicious software do what it had been coded for, so this way their computers were compromised, and my friend got insight into their digital life. The reason why I told you this story is to make you familiar a bit in advance for the following explanations of what happens in the hacking world.

The thing you are referring to, is NSA (National Security Agency), not NASA, but before telling about NSA, I would like to explain about how an internet works and some history of it, so that you can understand the bigger picture. Before internet there was ARPANET, which helped researchers to visualize the need of a bigger network for future, which led to the creation of internet. Basically, ARPANET was the first very small network of computers, comprising of a few computers, and it was designed for military purposes. Slowly, ARPANET was started growing, and was then renamed as an internet later. But security was never a priority in the first place for researchers, but to build a simple communication medium which let computers to talk to each other. If we look around now then today’s internet is expanded all over the world, but still the problem is of security, which is a great threat to everyone who is a consumer of this technology. Now let me explain you about how internets works. Basically, it is a network of computers which are connected by some medium, like wire or wireless. Computers actually talk to each other because of a common protocol that is defined for communication. For example, you and I, can understand each other because of common languages, like Urdu, English. Similarly computers do have a common language (or protocol) for commutation with other computers, and for communication they need to be connected to some network by some medium, like wire or wireless, and there are special networking devices, which are part of a network to carry messages from one place to another. So you think that data (or message) that goes out of our computer has to travel through many networking devices to reach at destination. But the message being sent out to another networking device or computer, is not just a plain data, but actually it is encoded or encrypted by our computer before sending it to the internet, and when it reaches at destination then it again gets decoded or decrypted(means to transform it to its initial form). So this is how computers work while sending data to one another.

Basically, the story I told you, is just one way of accessing someone’s data. There are hundred other ways that can be used to look into someone’s digital life/activity. Considering NSA, let’s be clear that it is a part of a US govt., and they can go to any level to achieve their goals, whether they have to spy on their citizens, or the rest of the world. They have their own their own team, researchers, programmers, security professionals which are of fine quality, and have enormous computing power to collect data and analyze it. So the question you were asking me about how they gain access to our data may have different answers, but I will tell you what I know. The one who developed the software system, knows the loop holes of it, which can be exploited, like Microsoft knows what the loop holes in Windows operating system are. Similarly every software product has some loop holes, and can be exploited for various purposes. NSA tries to exploit those loop holes to get into someone’s computer, not only this, they have even asked big technology giants for “backdoors”, like Twitter, Facebook, Google, etc. Backdoor gives the whole access to the system. It’s like a “chor darwaza” but by the consent of the maker of the software. Like if Facebook provides backdoor to NSA, then they don’t have to exploit the loop holes, because they have now backdoor, which gives access of all the data of Facebook’s user to them. I have read the news somewhere a year back, that NSA was asking Facebook, and Google for backdoor, and I don’t know to what extent this news was true. There’s another way of gaining access to data, by intercepting the data which goes through ISP (Internet Service Provider). Like if had an access to the networking devices of PTCL, then I would try to intercept the data, and try to decode it, as you know once the data goes out of your computing device, whether it be computer, or cell phone, it is encrypted and coded. So if someone intercepts the data that flows through networking device, then they have to decode or encrypt it to make it readable. So NSA may have an access to the big ISPs and they may have intercepted the data of many users, and then have decoded by the super computers they have, which have enormous power of computing to process data, and even decode the data. NSA may have developed their own hacking tools to fulfill their needs. So I would lastly say that your computing device is secure as long as it is not connected to the internet.

I have never heard that computers are hacked by using metadata. This concept sounds weird to me. :)


10:31 PM (GMT +5)

vBulletin, Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.