Thursday, March 17, 2016


An increasing number of IT professionals have been finding it difficult to handle emotional stress, according to experts. An ‘occupational hazard,' the stress related to work needs to be addressed without delay, they emphasise.

“Coping with stress and striving for mental health welfare should be a matter of concern for all and not treated simply as a lifestyle problem of the ‘IT phenomenon',” says Nithya Chandrasekaran, a consultant physician for many IT companies in the city. Post-recession, employees feel pressured to perform well.

Regular occupational problems such as wrist problems due to constant handling of the mouse, slip disc and eye fatigue are common now, but handling stress that arises owing to fear of losing job or to cope with the increasing competition, affects the employee's performance, eventually, taking a major toll on his health, doctors explain.

The project that K. Balajee (29) was handling was pulled off after six months of its inception. Currently managing a team of software professionals working on a crucial database project, the software professional spends nearly 12 hours every day in front of the system to make sure “the demo of my next application is just perfect.”

“As you gain experience in the IT industry, you are endowed with more responsibilities that involve working under stricter deadlines, managing more people from business units across countries, and reworking on millions of lines of code to suit the changing patterns of client requirements,” says Satish Menon, who has been working in the IT industry for 12 years now.

His job ensures a quality lifestyle for his family and holds a lot fascination for onlookers, but the implications on health, especially due to increase in levels of stress, could be serious, he says.

As if to acknowledge the prevalence of high levels of stress among employees, many IT companies have “help hotlines” that provide counselling intervention to their employees who face stress or psychological fatigue. Companies are also trying to help employees combat stress better. Companies such as Infosys, Tata Consultancy Services, Cognizant and Wipro have regular “stress breaks” intended to help the employees strike a healthy balance between work and fun.

Cognizant, as part of an initiative called ‘The Everest,' has a set of people planning ‘adventure travel' for employees. The company also has yoga sessions for interested employees. While companies such as Wipro and TCS have regular ‘family day functions' and ‘workout programmes' for their employees, Infosys has regular ‘green food stalls' on its food courts to encourage healthy eating habits among its work force.

However, some employees feel that most activities tend to prepare them for the stress and not necessarily help prevent it. “These recreational activities engage new recruits and only a few interested individuals,” says Aniket Pradhan, a senior engineer with a leading MNC in Chennai. “What really keeps you going here is your ability to beat stress at work and the rating you get from your managers at the end of the year.”

Source The Hindu

Tuesday, December 15, 2015

Internet Safety Tips and Rules

Why is it important to stay safe online?

Most of us are ‘connected’ via our laptops, mobile phones, tablets or personal computer. The potential for the internet to be a valuable and a fun resource for entertainment, making friends, keeping in touch and learning is huge. But if you use the internet, you could be at risk of illegal activity or abuse - be it bullying, fraud or something more serious. Unlike seeing someone face to face, on the net, people aren't always what they first seem.

In the same way you learn about safety when you leave the house, it is important to learn how to stay safe online. These are skills that will stay with you for life.


Internet Safety Tips for Kids and Teens
1. Spend time having fun with your parents online and helping them understand technology!
2. Never post your personal information, such as a cell phone number, home number, home address, or your location on any social networking site or through mobile apps like Snapchat or Instagram.
3. Never meet in person with anyone you first “met” on the internet. If someone asks to meet you, tell your parents or guardian right away. Some people may not be who they say they are.
4. Check with your parents before you post pictures of yourself or others online. Do not post inappropriate pictures of anyone.
5. Never respond to mean or rude texts, messages, and e-mails. Delete any unwanted messages. You may need to delete friends who continuously bother you or post things that are not appropriate.
6. NEVER share your password with anyone, including your best friend. The only people who should know your password are your parents or guardian.
7. If you wouldn’t say something to another person’s face, don’t text it or post it online.
8. Do not download or install software or anything on your computer or cell phone before checking with your parents or guardian.
9. Use the privacy settings of social networking sites.
10. If anything makes you feel uncomfortable online, while gaming or when using your cell phone, talk with your parents or guardian right away.

Some Golden Rules
  • Don't give out personal information such as your address or phone number.
  • Don’t send pictures of yourself to anyone, especially indecent pictures.
  • Don't open emails or attachments from people you don't know.
  • Don't become online ‘friends’ with people you don't know.
  • Never arrange to meet someone in person who you've met online.
  • If anything you see or read online worries you, tell someone about it.

Give your valuable suggestion for blog and thanks for visit 

subscribe the email for the new updates in Welcome 2 Gyan

Thursday, December 10, 2015

Cyber Crime

welcome 2 gyan cyber crimeCyber Crime is a fast-growing area of crime.More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, either physical or virtual, cause serious harm and pose very real threats to victims worldwide.

What is the Cyber Crime?

Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). 
Additionally, cyber crime also includes traditional crimes conducted through the Internet. 
For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.

Identity theft

Identity theft and fraud is one of the most common types of cyber crime. The term Identity Theft is used, when a person purports to be some other person, with a view to creating a fraud for financial gains. When this is done online on the Internet, its is called Online Identity Theft. The most common source to steal identity information of others, are data breaches affecting government or federal websites. It can be data breaches of private websites too, that contain important information such as – credit card information, address, email 
ID’s, etc.


This is one of the detestable malware-based attacks. Ransom-ware enters your computer network and encrypts your files using public-key encryption, and unlike other malware this encryption key remains on the hacker’s server. Attacked users are then asked to pay huge ransoms to receive this private key.

DDoS attacks

DDoS attacks are used to make an online service unavailable and bring it down, by bombarding or overwhelming it with traffic from multiple locations and sources. Large networks of infected computers, called Botnet are developed by planting malware on the victim computers. The idea is normally to draw attention to the DDOS attack, and allow the hacker to hack into a system. Extortion and blackmail could be the other motivations.


Botnet are networks of compromised computers, controlled by remote attackers in order to perform such illicit tasks as sending spam or attacking other computers.  Computer Bots can also be used act like malware and carry out malicious tasks. Then can be used to assemble a network of computers and then compromise them.

Spam and Phishing

Spamming and phishing are two very common forms of cyber crimes. There is not much you can do to control them. Spam is basically unwanted emails and messages. They use Spam bots. Phishing is a method where cyber criminals offer a bait so that you take it and give out the information they want. The bait can be in form of a business proposal, announcement of a lottery to which you never subscribed, and anything that promises you money for nothing or a small favor. There are online loans companies too, making claims that you can get insecure loans irrespective of your location. Doing business with such claims, you are sure to suffer both financially and mentally. Phishing has its variants too – notably among them are Tab-nabbing, Tab-jacking. and Fishing and Smashing.

counts of cyber crime
Such spamming and phishing attempts are mostly emails sent by random people whom you did not ever hear of. You should stay away from any such offers especially when you feel that the offer is too good. The US Cyber crime Center says – do not get into any kind of agreements that promise something too good to be true. In most cases, they are fake offers aiming to get your information and to get your money directly or indirectly.

Social Engineering

Social engineering is a method where the cyber criminals make a direct contact with you using emails or phones – mostly the latter. They try to gain your confidence and once they succeed at it, they get the information they need. This information can be about you, your money, your company where you work or anything that can be of interest to the cyber criminals.It is easy to find out basic information about people from the Internet. Using this information as the base, the cyber criminals try to befriend you and once they succeed, they will disappear, leaving you prone to different financial injuries directly and indirectly. They can sell the information obtained by you or use it to secure things like loans in your name. The latter case is of Identity theft. You should be very careful when dealing with strangers – both on phone and on the Internet


Malvertising is a method whereby users download malicious code by simply clicking at some advertisement on any website that is infected. In most cases, the websites are innocent. It is the cyber criminals who insert malicious advertisements on the websites without the knowledge of the latter. It is the work of advert companies to check out if an advertisement is malicious but given the number of advertisements they have to deal with, the malverts easily pass off as genuine ads.

In other cases, the cyber criminals show clean ads for a period of time and then replace it with malverts so that the websites and advertisements do not suspect. They display the malverts for a while and remove it from the site after meeting their targets. All this is so fast that the website does not even know they were used as a tool for cyber crime. Malvertising is one of the fastest, increasing types of cyber crime.


PUPs, commonly known as Potentially Unwanted Programs are less harmful but more annoying malware. It installs unwanted software in your system including search agents and toolbar. They include spyware, adware, as well as dialers. Bitcoin miner was one of the most commonly noticed PUPs in 2013.


Drive By Downloads too, come close to malvertising. You visit a website and it triggers a download of malicious code to your computer. These computers are then used to aggregate data and to manipulate other computers as well.

The websites may or may not know that they have been compromised. Mostly, the cyber criminals use vulnerable software such as Java and Adobe Flash and Microsoft Silver light to inject malicious codes as soon as a browser visits the infected website. The user does not even know that there is a download in progress.

Remote Administration Tools

Remote Administration Tools are used to carry out illegal activities. It can be used to control the computer using shell commands, steal files/data, send location of the computer to a remote controlling device and more.

Exploit Kits

A vulnerability means some problem in the coding of a software that enables cyber criminals to gain control of your computer. There are ready to use tools (exploit kits) in the Internet market which people can buy and use it against you. These exploit kits are upgraded just like normal software. Only difference is these are illegal. They are available mostly in hacking forums as well as on the Dark net.


Notable among Internet scams are, scams which misuse the Microsoft name and other general tech support scams. Scammers phone computer users randomly and offer to fix their computer for a fee. Every single day, scores of innocent people are trapped by scam artists into Online Tech Support Scams and forced to shell out hundreds of dollars for non-existent computer problems.

Tuesday, November 3, 2015

Android M and Android L

Its Battery life
First thing in this context to discuss is the battery life of our mobile phones with new OS Marshamallow. Some Google reports reveals that there will be 3x better battery life with Marshamallow as compared to Lollipop. So we guess we will now face battery problems with this version.

Its Speed
This new test puts Nexus 6 running on Android Marshamallow and compares it against the boot up time of Lollipop on Samsung Galaxy S6 Edge. A very new video gives a peek at the speed of the operating system when compared to Lollipop. So the Marshmallow would be very fast as compared to other previous versions.
Whenever a new operating system version is released, the first comparisons are always made against its predecessor.  Nexus devices are of course always the first few to receive the Android updates, but Galaxy S6 Edge won’t take too long to receive Android 6.0 Marshamallow as well.

1- Android Marshmallow & Android Lollipop: App Drawer

The first key difference between Android Marshmallow & Android Lollipop is the app drawer. Android Marshmallow will make it easy for the users to find their required app easily. There is a bar at the top which contain user’s 4 frequently used apps. Now user will not have to find his frequently used apps again and again because it will be there in the front all the time. This option is not available in Android Lollipop.
There is also a search bar at the top right corner. All Apps are listed vertically in an alphabetical order and there is a letter before each section.

2-Android Marshmallow & Android Lollipop: Volume Controls

Android Marshmallow will come up with the new simplified volume controls. In Android Lollipop users have to tap volume up and volume down to change the volume but in Android Marshmallow there is a drop down options which appears and let users to change the volume for notification, system volume and alarm. These volume controls will allow users to individually set the volume for apps, music, and alarms.

3-Android Marshmallow & Android Lollipop: RAM Manager

Although in Android Lollipop users can see the total amount RAM and as well as the RAM each app uses in detail. But Android Marshmallow will bring a change in RAM manager now users can see which app is slowing the device and which app is using minimum, average and maximum amount of RAM.

4-Android Marshmallow & Android Lollipop: Security

Android Marshmallow will also come up with the advanced security option i.e “Biometric Fingerprint support”. User can unlock the device with fingerprints and also can make purchases from Google Play store. If user want then device can only be unlocked by fingerprints. Whereas this option is not available in Android Lollipop.

5-Android Marshmallow & Android Lollipop: Status Bar

In Android Lollipop there are some icons that remain active in the notification bar all the time and which irritate the users. Whereas Android Marshmallow has come with the solution, now users can remove any unnecessary icons from status bar through system tuner.

Thursday, February 19, 2015


Yahoo.  (c) Yahoo
Definition: Yahoo is one of the Web's most popular websites, offering Web search, an extensive subject directory, and many more services. If you'd like to learn more about this popular site, the following articles will help:
  • Yahoo: A Quick Look: Get a brief overview of all that this extensive Web property has to offer.
  • Yahoo Search Shortcuts: Here are the top search tricks that will make your search experience fast, fun, and ultimately efficient.
  • Ultimate Yahoo Search List - More Than Just A Search Engine: In addition to having a subject directory and search engine listings, this versatile portal has many special properties that are useful resources, including News, Music, Games, Finance, and many more.
Pronunciation: YAH-hoo
Common Misspellings: yahooo
Examples: "I used Yahoo's search engine to find the information I was looking for."

Saturday, February 14, 2015

What is Google


Google logoOriginally known as BackRub, Google is a search engine that started development in 1996 by Sergey Brin and Larry Page as a research project at Stanford University. Larry and Sergey decide the name of their search engine needs to change and decide upon Google, which is inspired from the term googol. They later register the domain on September 15, 1997 and incorporated the name on September 4, 1998.
What helps Google stand out from its competition and help it grow is its PageRank technique that sorts search results. In the picture below is a capture of the site from The Internet Archive of what Google looked like in 1998.
Google in 1998

Other Google services

  • Blogger - View and create your own blog.
  • Froogle - Search for products based on prices, location, type, etc.
  • Gmail - Google's free online e-mail service with over 1gb of storage.
  • Google+ - Google social networking site.
  • Google AdSense - Google service that provides and pays website publishers or blog developers to advertise on their site.
  • Google AdWords - Service that enables users to pay to advertise on the Google search engine and other websites using Google AdSense.
  • Google Alerts - Create alert text messages sent to an e-mail address each day or as it happens of web searches, news searches, etc.
  • Google Analytics - A great site for users who run a website. Google Analytics allows anyone with their own domain to have Google post great reports of visitors on their website.
  • Google App Engine - A service that provides users the ability to create scalable web services that use Google's resources.
  • Google Base - Location where you can post information and make your information searchable on Google.
  • Google Books - Another fantastic service from Google that contains hundreds of thousands of books that can be searched.
  • Google Buzz - Discontinued Google social networking site. Latest Social networking site is Google+.
  • Google Calendar - A way to organize your schedule, synchronize, and share events with your friends.
  • Google Checkout - Service that provides users and sellers with an easy and secure method of paying each other.
  • Google Code - Allows users to view source code on websites.
  • Google Custom Search Engine (CSE) - Service that allows you to create your own custom Google Search engine.
  • Google Docs - A fantastic free solution from Google that allows you to open Microsoft Office documents as well as share them with other users with Internet access.
  • Google Drive - A cloud storage service from Google introduce April 24, 2012 that allows users to view, edit, and store their documents and files in the Google cloud.
  • Google Blog - A blog maintained by Google that helps give an insight into the company.
  • Google Deskbar and Google Desktop - Small software utility that adds a Google search to the Microsoft Windows Taskbar allowing users to search without even opening a browser.
  • Google Directory - Browse the Open Directory of web pages modified to list the directory listings by Google's PageRank technology.
  • Google Earth - A fantastic software program that allows a person to view almost everywhere on earth, get directions, find close shops and places of interest, and much more.
  • Google Features - A great listing from Google of some of its different available features as well as tricks on searching for different content on Google.
  • Google Fiber - A limited service available in some places in the United States that offers a Fiber connection to the Internet.
  • Google Fonts - A collection of thousands of fonts that can be used on your web page.
  • Google Groups - Google's bulletin board with millions of users and postings.
  • Google H4x0r - Display Google's search page and results in leet speak.
  • Google Home Page - Google's main page.
  • Google Images - Google search that allows you to search for images instead of text.
  • Google Klingon - Display Google's search page and results in Klingon.
  • Google Labs - A section of Google that once displayed upcoming features. This section was later discontinued.
  • Google Mail - Alternatively referred to as Gmail, is one of the most popular email hosts.
  • Google Maps - A great feature that enables users to search for directions from one location to another, search for local businesses, and more.
  • Google Moderator - Another great free tool  from Google that allows anyone to collect the best input from an audience of any size.
  • Google Moon - In celebration of the first Moon landing, Google created this page that has a map of our Moon as well as each of the moon landings.
  • Google Ngram Viewer - Great tool that allows you to search lots of books and other printed material for the frequency of words or phrases.
  • Google Now - Service primarily used by mobile users that gives the most relevant information that relates to you based of your searching and driving habits.
  • Google Personalized - Enables Google users to personalize the Google home page, having it display the latest news they want to view, their local weather, and more.
  • Google Pig Latin - Display Google's search page and results in Pig Latin.
  • Google Sets - Type in a few keywords that are similar to pull up a listing of more words that relate to the words you typed.
  • Google Sites - A service that enables users to create and share websites.
  • Google Scholar - Allows users to search for scholarly literature.
  • Google SketchUp - A great tool for users to create and share 3-D models.
  • Google Street View - Another great service that allows anyone to drive down the streets around the world.
  • Google News - Great news site automatically generated using the results of news sites queried by Google.
  • Google Patents- Allows users to search over 7 million patents.
  • Google SMS - Enables users to send text messages over their mobile using SMS to get quick answers such as driving directions, movie show times, local business listing, etc.
  • Google Talk - Instant Messenger program.
  • Google Toolbar - For Microsoft Windows Internet Explorer and Firefox users, this software add-on enables users using these browsers to have access to the Google search and other Google features any time the browser window is open.
  • Google Translator - Translate a foreign language web page or text into your language.
  • Google Trends - List of the 100 most active search queries and comparison of what people are searching for on Google.
  • Google URL Shortener - Service to shorten long URLs.
  • Google Video - Search for online videos hosted by Google as well as transcript text of videos and TV shows.
  • Google Voice - Use Google search over the phone using your voice.
  • Google Web Accelerator - For broadband users, this Microsoft Windows software utility can help speed up browsing times by utilizing Google's global computer network.
  • Google Webmaster tools - Another great service provided by Google that enables webmasters to view, maintain, and control how Google indexes their web page.
  • Google Zeitgeist - A listing of some of the top searches on Google.
  • - The philanthropic arm of Google.
  • iGoogle - Personalized Google page that enables you to add links, RSS feeds, games, and much more. To get to this from the Google main page click the iGoogle link in the top right corner.
  • Orkut - A social networking site that provides you a location to socialize with your friends and family, and meet new acquaintances from all around the world. Google announced the Orkut service will stop September 30, 2014.
  • Picasa - A great free Microsoft Windows software program to view images, manage images, and much more.
  • YouTube - Video service that allows users to freely upload videos and view others videos.

Thursday, February 12, 2015

What Is Remote Access to Computer Networks?

In computer networking, remote access technology allows logging into a system as an authorized user without being physically present at its keyboard.Remote access is commonly used on corporate computer networks but can also be utilized on home networks.

Remote Desktop

The most sophisticated form of remote access enables users on one computer to see and interact with the actual desktop user interface of another computer. Setting up remote desktop support involves configuring software on both the host (local computer controlling the connection) and target (remote computer being accessed). When connected, this software opens a window on the host system containing a view of the target's desktop.
Current versions of Microsoft Windows include Remote Desktop Connection software. However, this software package only supports target computers running Professional, Enterprise or Ultimate versions of the O/S, making it unsuitable for use with many home networks. For Mac OS X computers, the Apple Remote Desktop software package is also designed for business networks and sold separately. For Linux, various remote desktop software exists.
Many remote desktop solutions are based on Virtual Network Computing (VNC)technology. Software packages based on VNC work across multiple operating systems. The speed of VNC and any other remote desktop software can vary, sometimes performing effectively the same as the local computer but other times exhibiting sluggish responsiveness due to network latency.

Remote Access to Files

Basic remote network access allows files to be read from and written to the target, even without remote desktop capability in place. Virtual Private Network (VPN) technology provides remote login and file access functionality across wide area networks (WANs). A VPN requires client software be present on host systems and VPN server technology installed on the target network. As an alternative to VPNs, client/server software based on the secure shell (SSH) protocol can be also be used for remote file access. SSH provides a command line interface to the target system.
File sharing within a home or other local area network (LAN) is generally not considered to be a remote access environment.