Friday, March 29, 2024
04:58 PM (GMT +5)

Go Back   CSS Forums > Off Topic Section > Computers and Technology

Computers and Technology Discuss computer issues, topics, and technology. Ask your questions about computer related problems, software, gadgets, computer science & emerging technologies.

Reply Share Thread: Submit Thread to Facebook Facebook     Submit Thread to Twitter Twitter     Submit Thread to Google+ Google+    
 
LinkBack Thread Tools Search this Thread
  #21  
Old Friday, April 01, 2016
Banned
 
Join Date: Dec 2015
Posts: 582
Thanks: 586
Thanked 467 Times in 335 Posts
ursula will become famous soon enough
Default

Quote:
Originally Posted by ursula View Post
first of all i am highly indebted for your kinndda good elaborations and now im understanding the technical terms with elujidations and what i gotten something is that our programmers have complete information or more appropiately accessibility to our secret data evenly as ones privacy is point of enchraochment for field specialist, now my question to you is that how spy agencies use the matadata to gain accessibility to individual beings, like, i hope you will be familiar with "Edward Snowdown",the lunatic man has already elaborated the american spy program of NASA
Here it is please.
Respected teacher!
What about your 2017 planning, were enjoying April fool, or something, duuuuuddd!
Reply With Quote
  #22  
Old Friday, April 01, 2016
mustansar~hussain's Avatar
Senior Member
 
Join Date: Feb 2013
Posts: 374
Thanks: 251
Thanked 329 Times in 207 Posts
mustansar~hussain will become famous soon enough
Default

Quote:
Originally Posted by ursula View Post
Here it is please.
Respected teacher!
What about your 2017 planning, were enjoying April fool, or something, duuuuuddd!
Include it as well in your assignment questions.
__________________
Or do you think that the Fellows of the Cave and the Inscription were of Our Signs wonderful?
Reply With Quote
  #23  
Old Friday, April 01, 2016
Banned
 
Join Date: Dec 2015
Posts: 582
Thanks: 586
Thanked 467 Times in 335 Posts
ursula will become famous soon enough
Default

Already included,
I want some intro from you as well.
Lagta he assignment ab month pe jae g.(student bhag jae ga)dedupppp
Oh, April fool is already included in assignment as well.

Quote:
Originally Posted by mustansar~hussain View Post
@Ursula
I have finalized material for you which you have to cover at least before you die. Covering it within one year, will be a laudable achievement. So, ready for start?
More than welcome, let's share your outline that we're going to "cover".

Last edited by Man Jaanbazam; Friday, April 01, 2016 at 11:41 PM. Reason: merge chain posts
Reply With Quote
The Following User Says Thank You to ursula For This Useful Post:
mustansar~hussain (Friday, April 01, 2016)
  #24  
Old Friday, April 01, 2016
mustansar~hussain's Avatar
Senior Member
 
Join Date: Feb 2013
Posts: 374
Thanks: 251
Thanked 329 Times in 207 Posts
mustansar~hussain will become famous soon enough
Default

[Try to explore things by yourself]
You have to go through following 11 levels. This whole process can take approximately 01 to 03 years.

Levels:
1) Java Programming: An Introduction to Software | Coursera
2) Full Stack Web Development
3) HTML, CSS, and Javascript for Web Developers - Johns Hopkins University | Coursera
4) Android App Development | Coursera
5) Search Engine Optimization (SEO) | 7 march - 1 Aug
6) Cybersecurity and Its Ten Domains | Coursera
7) Cybersecurity | Coursera
8) Interaction Design | Optional
9) PHP and MySQL Tutorial in Urdu / Hindi Complete - Lecture 1 - YouTube
10) Introduction to Research for Essay Writing | Coursera
11) How to Write and Publish a Scientific Paper (Project-Centered Course) | Coursera

For each level, I will be providing you its description and guidance. You will have to update me with your progress regularly.


Level 01: Java Programming: An Introduction to Software | Coursera

Deadline for whole specialization: 31 August.

Assignment 01: Submit your review about this specialization. Your review should answer following questions:
1) what is this specialization about?
2) How many sub-levels, it encompasses?
3) Short intro about its each sub-level.

Deadline for Assignment 01: 09:30 P.M; 03 April 2016

"Failure will never overtake you if your determination to succeed is strong enough."

Best of Luck.
__________________
Or do you think that the Fellows of the Cave and the Inscription were of Our Signs wonderful?
Reply With Quote
The Following User Says Thank You to mustansar~hussain For This Useful Post:
ursula (Friday, April 01, 2016)
  #25  
Old Friday, April 01, 2016
Banned
 
Join Date: Dec 2015
Posts: 582
Thanks: 586
Thanked 467 Times in 335 Posts
ursula will become famous soon enough
Default

insahllah, i will meet the goal.
just one question, the brief introduction of these courses that are four in number?

the problem is that it is not free of cost, please help me in this regard.
Can i register free of cost????

Last edited by Man Jaanbazam; Friday, April 01, 2016 at 11:42 PM. Reason: merge chain posts
Reply With Quote
The Following User Says Thank You to ursula For This Useful Post:
mustansar~hussain (Friday, April 01, 2016)
  #26  
Old Saturday, April 02, 2016
mustansar~hussain's Avatar
Senior Member
 
Join Date: Feb 2013
Posts: 374
Thanks: 251
Thanked 329 Times in 207 Posts
mustansar~hussain will become famous soon enough
Default

Quote:
Originally Posted by ursula View Post
insahllah, i will meet the goal.
just one question, the brief introduction of these courses that are four in number?

the problem is that it is not free of cost, please help me in this regard.
Can i register free of cost????
Precise introduction of all those four courses.

Courses are free of cost. They charge money for providing a certificate only.
Search each course individually in the search bar, then join that freely.
__________________
Or do you think that the Fellows of the Cave and the Inscription were of Our Signs wonderful?
Reply With Quote
The Following User Says Thank You to mustansar~hussain For This Useful Post:
ursula (Saturday, April 02, 2016)
  #27  
Old Saturday, April 02, 2016
Banned
 
Join Date: Dec 2015
Posts: 582
Thanks: 586
Thanked 467 Times in 335 Posts
ursula will become famous soon enough
Default

Quote:
Originally Posted by mustansar~hussain View Post
Precise introduction of all those four courses.

Courses are free of cost. They charge money for providing a certificate only.
Search each course individually in the search bar, then join that freely.
first of all im highly indebted for suggesting me such a nice course and i found the teachers very cooperative and nice one,yeah, you are right its free and went through the course as well.
Now, alhamdollillah got your assignment and answer is!
i'm very excited, though late night disappointments has haunted me, which has vanished away
Assignment
first, what is web: an address used in the virtual world for example www.google.com
second;how this web page is created, for example if i wanted to create www.ursula.com (it is created through CS and html)
third:java script programming (that is used to manipulate imaging, computing and algorithms), which is understood by programmers only.
Fourth: the most important part that how and where to use these informations in our daily life i.e. in projects formation etc.
Reply With Quote
The Following User Says Thank You to ursula For This Useful Post:
mustansar~hussain (Saturday, April 02, 2016)
  #28  
Old Saturday, April 02, 2016
mustansar~hussain's Avatar
Senior Member
 
Join Date: Feb 2013
Posts: 374
Thanks: 251
Thanked 329 Times in 207 Posts
mustansar~hussain will become famous soon enough
Default [Try to explore things by yourself]

Quote:
Originally Posted by ursula View Post
first of all im highly indebted for suggesting me such a nice course and i found the teachers very cooperative and nice one,yeah, you are right its free and went through the course as well.
Now, alhamdollillah got your assignment and answer is!
i'm very excited, though late night disappointments has haunted me, which has vanished away
Assignment
first, what is web: an address used in the virtual world for example www.google.com
second;how this web page is created, for example if i wanted to create www.ursula.com (it is created through CS and html)
third:java script programming (that is used to manipulate imaging, computing and algorithms), which is understood by programmers only.
Fourth: the most important part that how and where to use these information in our daily life i.e. in projects formation etc.
That's good to read.

All courses provide assignments in the same way weekly with a deadline. They all have separate discussion groups as well. Now, you have to accomplish each course, individually, with its assignments. Its 2nd of April today and you have to finish whole specialization before 31 August to proceed for LEVEL 02 .

Moreover, try to interact with other members and place your queries there in the concerned group of the course. Here, you should precisely type your progress only. Your questions should be raised there only in the concerned discussion forum.


Assignment 02:
Completely finish first level of specialization, Programming and the Web for Beginners, with its assignments and helpful readings. Raise questions in the discussion forum and assist others there. Make notes out of each lecture in any way you feel comfortable. I took snapshot of each slide and compiled a complete ppt file to make notes. Then, printed that ppt file with 04 pages per one side.

Deadline: 20 April 9 P.M


Wish You Very Best Luck.
__________________
Or do you think that the Fellows of the Cave and the Inscription were of Our Signs wonderful?
Reply With Quote
The Following User Says Thank You to mustansar~hussain For This Useful Post:
ursula (Saturday, April 02, 2016)
  #29  
Old Saturday, April 02, 2016
Banned
 
Join Date: Dec 2015
Posts: 582
Thanks: 586
Thanked 467 Times in 335 Posts
ursula will become famous soon enough
Default

Yeah, I got it! Inshallah I will try, Thanks again.
Reply With Quote
The Following User Says Thank You to ursula For This Useful Post:
mustansar~hussain (Saturday, April 02, 2016)
  #30  
Old Saturday, April 02, 2016
quantumX's Avatar
Senior Member
 
Join Date: Feb 2016
Location: Lahore
Posts: 288
Thanks: 142
Thanked 168 Times in 124 Posts
quantumX is on a distinguished road
Default

Quote:
Originally Posted by ursula View Post
Dude, are you kidding me or gonna to celebrate under' lunatics April Fool',
if no, than babe, it makes one whole year!

first of all i am highly indebted for your kinndda good elaborations and now im understanding the technical terms with elujidations and what i gotten something is that our programmers have complete information or more appropiately accessibility to our secret data evenly as ones privacy is point of enchraochment for field specialist, now my question to you is that how spy agencies use the matadata to gain accessibility to individual beings, like, i hope you will be familiar with "Edward Snowdown",the lunatic man has already elaborated the american spy program of NASA.
oh!
once again,Thanks, for your kind elaborations.
Let me start with my story of how one of my close friend and I got interested in developing a hacking software, while studying at university. It was, I think, 3rd semester when we had been quite much familiar with programming languages, and quite good at making logics. We were quite close friends, so he started revealing his intentions of making a spy software, and hacking into computers of a few girls of our batch. I was never interested in such time consuming and useless activity, even though my programming skills were quite polished, but I never intended to do such thing throughout my stay at university. He asked me to be a part of his mission but I refused in a very friendly way. The only thing he used to discuss with me, was the programing logics of the spy software, which he was going to develop. I thought of it as a purely educational stuff for me, I never even wrote a single line of code for him, but we would just discuss concepts. A long story short, He finally got his hands on a fully working spy software (miniature one), after carrying out months of effort, which would log the keystrokes, and all the cache (where passwords are stored) of the browser, and then send it to an email address, which he had set in his software. He, then, started his mission by sending the executable file to the class mates’ email address, their Facebook accounts, whom he wanted to hack. The ones who clicked/run that malicious file in their computers/laptops were hacked, and let that malicious software do what it had been coded for, so this way their computers were compromised, and my friend got insight into their digital life. The reason why I told you this story is to make you familiar a bit in advance for the following explanations of what happens in the hacking world.

The thing you are referring to, is NSA (National Security Agency), not NASA, but before telling about NSA, I would like to explain about how an internet works and some history of it, so that you can understand the bigger picture. Before internet there was ARPANET, which helped researchers to visualize the need of a bigger network for future, which led to the creation of internet. Basically, ARPANET was the first very small network of computers, comprising of a few computers, and it was designed for military purposes. Slowly, ARPANET was started growing, and was then renamed as an internet later. But security was never a priority in the first place for researchers, but to build a simple communication medium which let computers to talk to each other. If we look around now then today’s internet is expanded all over the world, but still the problem is of security, which is a great threat to everyone who is a consumer of this technology. Now let me explain you about how internets works. Basically, it is a network of computers which are connected by some medium, like wire or wireless. Computers actually talk to each other because of a common protocol that is defined for communication. For example, you and I, can understand each other because of common languages, like Urdu, English. Similarly computers do have a common language (or protocol) for commutation with other computers, and for communication they need to be connected to some network by some medium, like wire or wireless, and there are special networking devices, which are part of a network to carry messages from one place to another. So you think that data (or message) that goes out of our computer has to travel through many networking devices to reach at destination. But the message being sent out to another networking device or computer, is not just a plain data, but actually it is encoded or encrypted by our computer before sending it to the internet, and when it reaches at destination then it again gets decoded or decrypted(means to transform it to its initial form). So this is how computers work while sending data to one another.

Basically, the story I told you, is just one way of accessing someone’s data. There are hundred other ways that can be used to look into someone’s digital life/activity. Considering NSA, let’s be clear that it is a part of a US govt., and they can go to any level to achieve their goals, whether they have to spy on their citizens, or the rest of the world. They have their own their own team, researchers, programmers, security professionals which are of fine quality, and have enormous computing power to collect data and analyze it. So the question you were asking me about how they gain access to our data may have different answers, but I will tell you what I know. The one who developed the software system, knows the loop holes of it, which can be exploited, like Microsoft knows what the loop holes in Windows operating system are. Similarly every software product has some loop holes, and can be exploited for various purposes. NSA tries to exploit those loop holes to get into someone’s computer, not only this, they have even asked big technology giants for “backdoors”, like Twitter, Facebook, Google, etc. Backdoor gives the whole access to the system. It’s like a “chor darwaza” but by the consent of the maker of the software. Like if Facebook provides backdoor to NSA, then they don’t have to exploit the loop holes, because they have now backdoor, which gives access of all the data of Facebook’s user to them. I have read the news somewhere a year back, that NSA was asking Facebook, and Google for backdoor, and I don’t know to what extent this news was true. There’s another way of gaining access to data, by intercepting the data which goes through ISP (Internet Service Provider). Like if had an access to the networking devices of PTCL, then I would try to intercept the data, and try to decode it, as you know once the data goes out of your computing device, whether it be computer, or cell phone, it is encrypted and coded. So if someone intercepts the data that flows through networking device, then they have to decode or encrypt it to make it readable. So NSA may have an access to the big ISPs and they may have intercepted the data of many users, and then have decoded by the super computers they have, which have enormous power of computing to process data, and even decode the data. NSA may have developed their own hacking tools to fulfill their needs. So I would lastly say that your computing device is secure as long as it is not connected to the internet.

I have never heard that computers are hacked by using metadata. This concept sounds weird to me.
Reply With Quote
The Following 2 Users Say Thank You to quantumX For This Useful Post:
mustansar~hussain (Saturday, April 02, 2016), ursula (Saturday, April 02, 2016)
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
WEb Building GLossary Terms Janeeta Computer Science 3 Monday, November 04, 2019 12:09 AM
EDS- notes Predator General Science Notes 70 Sunday, February 28, 2016 12:05 PM


CSS Forum on Facebook Follow CSS Forum on Twitter

Disclaimer: All messages made available as part of this discussion group (including any bulletin boards and chat rooms) and any opinions, advice, statements or other information contained in any messages posted or transmitted by any third party are the responsibility of the author of that message and not of CSSForum.com.pk (unless CSSForum.com.pk is specifically identified as the author of the message). The fact that a particular message is posted on or transmitted using this web site does not mean that CSSForum has endorsed that message in any way or verified the accuracy, completeness or usefulness of any message. We encourage visitors to the forum to report any objectionable message in site feedback. This forum is not monitored 24/7.

Sponsors: ArgusVision   vBulletin, Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.