Wednesday, 31 May 2017

https://www.blogger.com/





















Spam refers to the usage of electronic communication systems in order to send out unwanted and repetitive advertising messages. The term "Spam" was derived from a Monty Python sketch from the 70's, wherein two customers tried to order breakfast from a menu that includes Spam in almost every dish. The canned luncheon meat is usually perceived as unlikable in certain countries, so the stereotypical appeal of the food was transferred to electronic spams by means of analogy.

The most common type of this modern-day nuisance is Email Spam also known as "Junk email", however, there are also other forms of media spamming such as: Instant Messaging, Newsgroup and Forum, Mobile Phone, Social Networking and Online Game Messaging Spams. The email addresses of the recipients are usually collected from customer lists, chat rooms, newsgroups or websites. Moreover, some computer viruses and bots (collection bots) are created to specifically harvest email addresses from computers and networks which are then sold to spammers. At present, receiving unsolicited messages like these are unavoidable, thus, being involved in deploying spam activities are considered illegal in the United States.

Most email spams have commercial or advertising messages and are usually sent out by spammers in bulk or through multiple posting. There are also instances, wherein the messages may contain links that are presumably from familiar websites, but will eventually lead you to a different site that hosts malwares or redirect you to phishing websites. In this regard, spam is definitely designed as a major online security risk especially in the workplace, where large volume of data may be compromised.

Company email and IP addresses are main targets of electronic spamming because the direct impact of unauthorized manipulation of sensitive and valuable information in these domains are much greater than the threat that commonly applies to regular individual email accounts. Business Email spams must be immediately identified, filtered and avoided because they always carry potentially dangerous content and malicious software. Practice internet safety at all times, not only in your office but also in your own home.so stay protected from Email Spam which is also known as "Junk email.

Monday, 29 May 2017

Visual Captcha: An Effective Alternative

CAPTCHA (Completely Automated Public test to tell Computers and Humans Apart) is a type of test that is commonly used in this age of modern computing in order to identify if the user is human or not. It is dependent on the user’s challenge-response. However, there are instances wherein text based captchas displayed vulnerability from machine attacks, thus, other forms of captchas were created by researchers.
The most popular alternative to text based captcha includes image recognition, which is also known as “Visual Captcha”. In this variation of computer initiated human validation, the user is presented with varied image options that he/she must correctly identify. Analysts pointed out that the task of recognizing objects are much more complex than typing simple texts, therefore visual captcha execution is much more reliable in withstanding machine learning-based attacks.

Some examples of Visual Captcha:


More and more businesses are now taking advantage of using Visual Captcha in their company websites because it promotes better customer engagement and highly-improved security. This type of captcha can be enhanced in many ways due to its flexibility in working with different frameworks and website environments.




Calling Child Component Method in Angular2


One of my current tasks in the development of the newer app version (Angular 2) is to call the child component from parent component. The logic is when a button is clicked and certain conditions are met then it calls the child component’s method and inside that method (child component), I need to display a div that contains a form to be filled up by the user.
I thought that by simply calling the child method, I will achieve what is required to do but it did not and here is what I have been doing wrong.

//inside parent component
openTab(){
this.childcomponent.showPage(2, ‘2’);
}

On this code, I was calling the child component’s method without injecting to it. So this code will not work the way I was expecting.
It took days for me to look for a solution on how to do it right until I found a guide from Stack Overflow that also points to angular.io’s Component Communication

I then understood what should be done. What exactly I have been looking for as a solution is to inject the child component to parent as a ViewChild where I can directly inject to child component’s method. I thought that the issue I face will be a never-ending one, but I was able to resolve it after reading the thread from Stack Overflow and angular.io.



Saturday, 27 May 2017

CodeIgniter Modules That Every Developer Should Know




CodeIgniter is a prominent PHP framework, generally utilized by web designers & developers. The advantage of this system is it’s execution due to its light-weight library. It loads minimal (only required) library at the time of initialization which takes less memory of system and makes the code load faster at server and client end as well.
With CodeIgniter, engineers can create web applications, running from web journals to big business application frameworks utilized by substantial organizations.
CodeIgniter is simple to create in light of the fact that it has a component called the module. CodeIgniter Modules are extra programs that can enhance application execution, as WordPress module and jQuery modules.
Since it is extremely valuable, I tried to gather helpful CodeIgniter modules:
  • CodeIgniter-cURL
  • CodeIgniter Pagination Library
  • flexi auth
  • ci-syntax-highlight
  • CI-Merchant
  • CodeIgnitertwitter tweets
  • Visual Captcha for CodeIgniter
  • Highchart library for CodeIgniter
  • MailChimp-for-CodeIgniter
  • CodeIgniterOAuth 2.0
  • CodeIgniter-simple-uploadify
  • Sitemaps for CodeIgniter JS-Loader-Helper
  • Facebook Connect CodeIgniter Library
  • CodeIgniter Amazon SES
  • CodeIgniter Cache Helper
  • ly CodeIgniter Library

Setting up a Network Folder Sharing Using Samba

Sometimes we would require files and directories to be accessed and saved across the Network.
·          On Computers with Windows Operating systems,
·          it is very simple, if you are under same WORKGROUP.
·          you only have to right-click and setup network sharing.

What if you would need to share the files to a Computer with Unix like Operating Systems ?
It is more simpler than we would ever think of.
In this blog, we will see how to setup network folder sharing using Samba.

Samba

·          Samba is an opensource software suite that provides file and printer sharing services using SMB/CIFS
·          SMB (Server Message Block) is a network file sharing protocol from Microsoft.
·          It is also known as CIFS (Common Internet File System)

Installing Samba
We will use Ubuntu Server for our Samba Setup. Let us install the samba server and its dependencies.
# install using apt-get
apt-get install samba samba-common python-glade2 system-config-samba
Creating network folder for sharing
# Lets make a directory to share via Samba and provide permissions
mkdir -p /home/share
chmod -R 755 /home/share              # Provide read,write permissions as required
chown -R nobody:nogroup  /home/share  # Change Ownership for anonymous access (you can also setup authentication)

Configuring Samba
The Samba configuration file is located in the path, /etc/samba/smb.conf
# Lets backup the original Samba configuration file
mv /etc/samba/smb.conf /etc/samba/smb.conf.bak
Edit the configuration file.
vim /etc/samba/smb.conf
[global]
workgroup = WORKGROUP                 # name of windows domain workgroup, usually WORKGROUP
server string = Samba Server         
netbios name = samba                 
security = user
map to guest = bad user
dns proxy = no

# configure your folder here
[Samba]
path = /home/share
browsable =yes
writable = yes
guest ok = yes
read only = no
# The above configuration is a minimal configuration for sharing a folder across network.
# For the other options, you can refer to the originial configuration file, you have backed up.
Restart Samba Server
service smbd restart
Accessing network share from a Windows Computer
Go to Windows, Start–> Run. Enter ip-address or hostname of samba server
\\172.16.2.100
• The remote folder will open on windows explorer.
• You will now have access to the network drive (/home/share) created
• You can also map it as network drive, so you can access it like a normal folder.


Accessing network share from a Windows Computer
Go to Windows, Start–> Run. Enter ip-address or hostname of samba server
\\172.16.2.100
                      The remote folder will open on windows explorer.
                      You will now have access to the network drive (/home/share) created

                      You can also map it as network drive, so you can access it like a normal folder.