Pages

Wednesday, March 21, 2012

Indepth Guide for Cloud Computing,its Working,Advantages and Disadvantages

World is moving fast and now everyone is migrating their data online for better safety and quick access. Cloud Computing is a new computing service through which users can access shared resources, software and information over a network. Cloud Computing is a general term that delivers hosted services on the internet. It is a new technology where no installation of applications is required and users can access the files on any computer with internet access.
Yahoo, Gmail, Google Docs etc are the best real time examples of Cloud Computing where you don’t have to install any application on your system or server. Cloud Computing provides computation, data access, data management, storage resources to users and they can use it without having any knowledge of cloud infrastructure.
Types of Clouds

There are two types of clouds Public and Private.

    Public Cloud: Public Cloud is open for all the users connected to the internet. Here everyone shares and uses the same information without interrupting other users using the same cloud. This type of cloud requires very high bandwidth.
    Private Cloud: Private Cloud is only for the members or users of an organization which helps them to work use shared resources quickly and efficiently. This doesn’t require very high bandwidth.

How Does Cloud Computing Works

Before proceeding to concept of how it works first of all imagine a scenario in your mind. Suppose you are hosting a website on your machine or on local server then you have to install WAMP on windows or LAMP on Linux to keep your website live. However if you deploy your website on the cloud then you don’t have to think about your system configuration and operating system running on your machine or server. Now it the headache of the cloud service provider to give you require configuration and bandwidth on their server.

Now we will shift our focus How Does Cloud Computing Works? Cloud Computing is done through various layers known as Cloud Layers. There are five different layers used in Cloud Computing. Here is brief overview of each layer.

26 Indepth Guide for Cloud Computing,its Working,Advantages and Disadvantages



    Cloud Application Layer:- This layer is also known as Software as a Service (SaaS). It is most utilized and visible (Front-end) layer to the end-users using the cloud. This layer is completely for the use of users. Sometimes you have to pay some fee to use SaaS applications.
    Cloud Software Environment Layer: This is the second layer of Cloud Architecture and it is also known as Platform as a Service (PaaS). In this layer Application Developers role comes in play, Here developers develops and install new applications and deploys it on cloud to give more flexibility to cloud users.
    Cloud Software Infrastructure Layer: this is a basic cloud service layer which is also known as Infrastructure as a Service (IaaS). It is a physical layer which manages the data, storage, firewalls etc on the cloud. This layer can be categorized into three parts: Computational resources, Data Storage and Communications.
    Software Kernel: This layer is also known as Operating System (OS) layer which ensures the system is working correctly and all the required applications have installed on it. This layer basically provides the software management for the physical servers that compose the cloud.
    Hardware and Firmware: This is the last and backbone layer of our Cloud which is also known as Hardware as a Service (HaaS) or Virtualization layer. This layer is the foundation of our cloud technology. In this layer, large number of virtual machines are connected and configured for the hosting of cloud.

Pros and Cons of Cloud Computing

Cloud Computing has following key characteristics:-

    It is not much expensive software to setup a cloud server.
    Applications can be easily migrated from one physical server to another.
    It is most reliable service to store data and data can be recovered after any disaster.
    Avoid Expense of updates and maintenance.
    Access program and files from anywhere.
    Run complicated programs without the technical experience.
    Allows the experts to do updates and preventative maintenance quickly
    It works smoothly and has high performance.
    It provides high security to our data and can recover any time after any misshapen.
    You don’t have to purchase licence copy of same software to run in an organization.

Disadvantages of Cloud Computing

Nothing is perfect in this world. Everything has some drawbacks along with their benefits.

    Security is the major advantage in Cloud Computing but you have to trust on the cloud service providers for that.
    Whole our database is on third party’s hand and which again comes down to trust.

Cloud Computing has garnered so much popularity in short span of time and there are big named brands like Google, Yahoo, Amazon etc which are investing heavily in it. 

How to Bypass Pandora Radio U.S IP Restriction

Pandora is popular music streaming website which is currently available only in United States.It automatically creates a personalized radio based on your previous song selections and plays similar songs .To select the songs it uses Genome Project, which analyses music through factors such as tone, speed, instruments and styles.It also changes its song selection depending upon the ratings given to songs played earlier. 

Why Pandora isn’t Available Outside U.S
Pandora is a genuine music streaming Radio service that pays the royalties to the artists or production houses for every time a song is played.Since it follows local laws it couldn’t reached an agreement with other countries.Earlier it was available in United Kingdom but later due to dispute over royalties it had to stop its services. 
How Pandora Detects whether You from U.S or Outside
Pandora Radio detects Geo Location by analyzing the Ip address of the user.If your IP address belongs to U.S it streams the songs otherwise it will redirect you to restricted page.So, it uses Ip Address to locate your Location which isn’t hard thing to bypass. 
How To Bypass Pandora Radio U.S IP Restriction
There is not a single method but three methods using which I was able to Bypass the Ip restriction.
1. By Using Proxy Servers (most obvious)
2. By Using Hide Ip Software
3. By using Https Enforcer Extensions
 How To Bypass Pandora Radio Ip Restrictions using Proxy

When you surf using a Proxy server your Ip address gets masked from the website instead the Ip address of the Proxy Servers is Visible to the web server.So, by using a US proxy server you will mask your actual Ip address .Proxy servers are not reliable as they go down from time to time.
How To Bypass Pandora Radio Ip Restrictions using Hide Ip Software

Hide ip Softwares automatically selects an Ip address and apply the proxy settings in your browser.So you don’t have to bother yourself for finding a working proxy as the software will automatically handle all this without need of your intervention.
How to bypass Pandora Radio IP restrictions Using Browser Extensions

There is a loophole in secure version (https) of pandora’s website.If you force your browser to open pandora in secure version then it doesn’t check your Ip Address.So, this trick doesn’t require masking of IP address and will be a cakewalk for most of the users.

    For Mozilla Firefox, install HTTPS Everywhere Extension and restart the browser.
    For Google Chrome, install HTTPS Enforcer Extension and click on the icon to set Status Enable.
    Now open Pandora website and listen any song on the radio without any restriction.

In case, if you are facing any problem in opening websites like Google, Facebook then disable these extension to get rid of such problems.

Beware!! Deleted Images Can be Accessed on Facebook

If you are the power user on Facebook and share your personal information like photos, videos on it then beware you may be under threat. When a user upload any photo or video, it automatically gets syndicated to multiple facebook servers without user’s to enable quickly access and it may be accessed even after the deletion. It is a major loophole in the Facebook’s privacy.

Why Facebook Images are Available After Deletion?

Facebook works on Continent Distribution Network known as CDN to give quick and easy access to its users. When an image and video is uploaded then many copies of same photo or video becomes available on local servers. When a user deletes a photo or video from his account then it is deleted from the Facebook’s main server but remains available on other server for 30 months (2.5 Years) and user’s can access deleted photo and video.

How To Access Deleted Photos on Facebook

Deleted photos can be simply accessed if you know URL of the image which has been deleted from the Facebook Server. To get a proof follow the following steps:-
  • First of all, open Facebook image in New Tab which you want to delete.
  • Copy URL of the image from address bar and paste it in Notepad.
  • Now Right Click on it and select Copy Image URL and paste it in Notepad. (We will use this URL later)
  • Delete the Photo.
  • Now Paste the URL in the address bar which you copied in 2nd step. You will see an error message This Content is Currently Unavailable.
  • Now to Access Deleted Photo paste the URL in the address bar which you have copied in 3rd step.
So, if anyone knows the URL of the photo then he can  easily access your deleted photos.

 

Saturday, March 3, 2012

How to Access Facebook Timeline in Single Column:Social Fixer

Mark Zukerburg claims Facebook Timeline was the major change in Facebook which overhauled the complete look of one’s profile.Timeline  ha got a mix response from Facebook users. Many users find it interesting while for others it was complete waste of time and want  to switch back to old Facebook Profile view
There has a line in  middle line which divides your activities in two columns.
Social Fixer is the extension which works on all major browsers like Mozilla Firefox, Google Chrome, Safari etc but doesn’t support Internet Explorer. It adds lots of new features and removes the tow column partitioning of your  Timeline which enhances your Facebook experience and functionality.

Features of Social Fixer For Facebook

  • Tabbed News Feed
  • Advance Feed Filters
  • Hide posts you have already read
  • Themes (aka skins)
  • Automatically removes Recent Activity from your profile
  • Enlarge thumbnails on hover
  • Highlight new comments
  • Quick links to your pages and events
  • Friend tracker- Notifications of Un-friend
  • Automatically retrieve older posts

How to Access Facebook Timeline in Single Column

17 How to Access Facebook Timeline in Single Column:Social Fixer
  • Now open your Facebook account, here a window will open with many settings for your Facebook Account.
  • Choose the settings and click on the Next button on every window.
  • After all setting options a Wrench Icon will appear left to Profile Picture, click on that icon and select Social Fixer Options.
22 How to Access Facebook Timeline in Single Column:Social Fixer
  •  Again all similar settings will open that were open in second step but with more advance settings.
  • Go to Timeline tab and check the option Display Posts in Single Column box.
32 How to Access Facebook Timeline in Single Column:Social Fixer
  • After this Save settings and Refresh your page to see the changes.
Along with Single Column view of Facebook Timeline you can also enable or disable many other features using this addon.

Here is the screencast to Access Facebook Timeline in Single Column


Note:This is a browser trick so two column partitioning will be removed only in your browser.

 .

KGB Archiver: Compress 1GB File to 10MB

KGB Archiver is free and open source software which compresses 1GB file to 10MB file. Data compression utility of this software is based on PAQ6 algorithm which has AES-256 powerful encryption. KGB archiver works on both Windows and Linux operating system. Compression ratio of this software is very high. Due to high compression levels, time to compress a file goes high as the size of the file increases and compression ratio may vary depending on the format of the file.
When a file is compressed with KGB Archiver it saves it with own extension and at the time of decompression it automatically recognizes the file format. The only limitation of KGB archiver is, decompressed file cannot be open or extract with other compression softwares. You can also choose any compression level (high, maximum, normal, low, very weak) to compress a file but the compression time  will vary according to your selected compression level.
Note: If you are compressing any file with KGB archiver and sending the comprssed file to your friends then he must have KBG archiver installed on his computer to decompress the file.

System Requirements:

Due to high compression ratio of KGB archiver, you need to have a decent system hardware configuration
  • 256 MB RAM
  • 1.5 GHz Processor

Features of KGB Archiver

  • Supports native .kgb files and .zip files
  • AES-256 Encryption
  • Able to create self-extracting archives.
  • Multilanguage supports like Arabic, German, Greek, Japanese, Spanish many more.
  • Unicode is supported in both User Interface and File Systems.
  • An Explorer shell extension is available for the windows version.
  • Make Password protected compressed file.
19 KGB Archiver: Compress 1GB File to 10MB
Note: This KBG Archiver software cannot compress video format files.