Friday, 23 January 2015

BhaskarRaghuHardware

BhaskarRaghuHardware


WhatsApp web: messaging client now available on internet browsers

Posted: 22 Jan 2015 07:44 PM PST

WhatsApp web: messaging client now available on internet browsers

Popular smartphone messaging service WhatsApp has been made available on web browsers for the first time.

Jan Koum, the firm's CEO, made the announcement on his Facebook page.
“Our web client is simply an extension of your phone: the web browser mirrors conversations and messages from your mobile device – this means all of your messages still live on your phone,” he wrote.

Smartphone users who wish to connect to the client using their web browser must go to https://web.whatsapp.com.

The post WhatsApp web: messaging client now available on internet browsers appeared first on BhaskarRaghuHardware.

35 Google’s Tricky Interview Questions

Posted: 16 Jan 2015 07:30 PM PST

By Patel Umair Khan’s Blog

1) Do you have an IQ more than 130?
This question is put to check "Intellectual Humility" and "Yes" could be the worst answer to this. Remembering your IQ score sends a wrong message of your insecurity and self-aggrandizement.

2) What shall we have for dinner this evening?
Don't give an answer like "whatever you like", "I don't mind" ,"what would you like", etc. This will hide your quality of leadership or taking stand, when your opinion is asked.  This will show your willingness to take charge and when not.

3) Are you incompetent and Lazy?
Interviewer only wants to hire people who are competent, but that does not mean you should say yes to what you are not. So "clever and active", would be the right answer to avoid this question.

4) Do you have a track record of doing something really well?
Try to give a smart answer by answering like, it usually does not happen with me; there will be something always standing to re-solve at the end of the day. This will highlight your problem solving skills.

5) Mention what is the weight of the empire state building?
This question was actually asked by google employers to check the thought process of the employee. It is to see how well employee can do "guestimate" that is what is referred for such question. It is a little tricky but if you good at numbers and height width calculation, you will surely come up with some answer. Anyway the answer to this question was something 750,000 tons or 1.5 billion pound of weight, after considering all the parameters like single floor widthXheight, weight, etc.

6) How much should you charge to wash all the windows in NewYork?
The answer will not be on estimation as we did in the previous question, but rather it is very simple.  You have to answer "$500" a week.

7) Why are manhole covers round?
Manhole covers round, so that man does not fall through the manhole as the plane, or square shape ordinarily flush with the plane of the street goes perpendicular to the street.

8) Mention how many times a day do a clock's hands overlap?
Clock hands overlap about 22 times a day.

9) Explain the significance of "dead beef"?
Usually, people respond this question with an answer like "Beef is always dead" – Wrong Answer.  The correct answer is that "DEADBEEF" is a hexa-decimal value that was used in debugging back in the mainframe/assembly days as such it was easy to see when marking and finding specific memory in pages of hex dumps. Most computer engineers are aware of this term.

10) Tell me what happened when a man pushed his car to the hotel and lost his fortune?
He landed on the boardwalk- that is the answer

11) Out of eight balls, seven balls weigh equal while the one ball is slightly heavier than the others how would you figure out which one is the heavier by using a balance and only two weighing?

  • Take 6 balls out of 8 balls
  • Put 3 balls on each side of weighing machine, if they weight equal you know that the heavier ball is in the remaining two which is left out
  • But if they don't weigh equal, then the heavier ball is in one of those triplets
  • Out of those 3 balls that have heavier ball, pick any 2 and put them on the scale and keep doing until you get your heavier ball

12) Explain what is database to an eight year old kid?
A database is a machine that memorizes lot of information about lots of things. People use them to remember that information.

13) Some months have 30 days, and some have 31, how may months have 28 days?
Answer to this question is 12 months, as each month has 28 days. So don't answer 1 or Feb.

14) What number comes next 10, 9, 60, 90, 70 and 66?
Forget the numbers, here the trick is how you spell the numbers like

  • Ten -3
  • Nine -4
  • Sixty – 5
  • Ninety- 6
  • Seventy-7
  • Sixty-six-8
  • ?

The next probable number would be anything that has 9 letters in it, i.e., ninety-six or ninety-one.

15) Suppose Tom is 16 year old, and he is four times older than his brother Robert. How old Tom would be when he is twice as old as her brother?
If Tom is 16 year old and he is 4 times older than his brother Robert, then currently his brother age would be 16/ 4 = 4. So his brother is 4 year old.
This makes Tom 12 years older than her brother
Now, Tom will be double his brother age when Robert is 12 year old.
i.e 12X2 = 24.  Which means when Tom will be 24 year old his brother age will be 12.

16) Which number does not belong to this series 1,1,2,3,4,5,8,13,21?
Your answer is 4. Let see how
This question is based on adding the adjacent number in the series.
1+1=2
1+2=3
2+3=5, there you go
3+5=8
5+8= 13
8+13=21 and so on

17) What will be the next number 5,10,19,32,49,70 ….?
The next number will be 95. How? Let see
This time the difference between the adjacent number is calculated like
10-5 = 5
19-10 = 9
32-19=13
49-32= 17
70-49=21
?- 70= 25
For each answer 5, 9, 13 there is a difference or increase of 4, so our next increment will be 25.
So, ? -70 = 25
25+70= 95

18) There are about 13 caves arranged in a circle, and one of these caves has treasure of Each day the treasure keepers can move the treasure to the adjacent caves or keep it in the same cave. Every two-day treasure keepers visit the place and have enough time to enter any two caves of their choice __ So how do the treasure seekers can find a treasure in minimum possible days?
Answer: Seven days.  If one of the treasure seeker moves clockwise every day and one of the seeker's moves anti-clock wise, they will find a treasure in minimum seven days.

19) There are six drinking glasses standing in a row, with first three full of juice and the next three empty? How can you arrange those glasses so empty and full glasses alternate by moving only one glass?
Pour the second glass in the fifth glass, and you can arrange them in alternate order.

20) Brother and sisters I have none but this man's father is my father's son? Who is the Man?
The man is my son.

21) A red house is made of red bricks; a blue house is made up of blue bricks than what does the green house is made up of?
Green house is made up of Glasses

22) Explain how five minus two equal 4?
If you take f and e from five what remain is Roman numeral iv.

23) The day before the day before yesterday is three days after Saturday. What day is today?
Answer is Friday. ->  Three days after Sunday is Tuesday, and then the day before yesterday was Wednesday (Tuesday being the day before the day before yesterday), therefore, today is Friday.

24) Who will be the shortest among all of them?

  1. Roger is as tall as Oliver
  2. Binny is shorter than Tony
  3. Tony is taller than Oliver
  4. Roger is shorter than Binny

Answer: There is no answer, because Roger and Oliver are equally tall.

25) A trader buys sugar for $1200 and sell it for $1500, per sack of sugar he makes a profit of $50. How many sacks of sugar did he have?
He might have 6 sacks of sugar,
$1500- $1200 = 300
300/50 = 6

26) Mention which lamp is brightest than all?

  1. Lamp A is less brightest than Lamp B
  2. Lamp B is brighter than Lamp C
  3. Lamp C is as bright as Lamp D
  4. Lamp B is brighter than Lamp D
  5. Lamp D is brighter than Lamp A

The correct answer is B.

27) How can you get a total of 1000, by adding eight 8?
888+88+8+8+8=1000

28) There is a casino and it has 4 gates, let say A, B, C and D. Now the condition is that every time you enter casino you have to pay $5 and every time you leave the casino, you again have to pay $5. Also, whenever you enter the casino whatever amount you have with you will get double. Now you enter the casino through gate A and come out through gate B, again you go inside casino from gate C and come out of gate D, at the end of this process you should be left with no money? So calculate how much money you should carry with you when you enter the Casino?
Ok, we have to work out some math's over-here,

  • Let say when you enter a casino you had the amount ""
  • When you enter the gate A you spend $5, so the amount becomes (X-5)
  • But there is a condition, your amount will get double when you enter the casino and becomes 2(x-5), e., (2X-10)
  • Now you leave the casino through gate B, and you pay $5, which makes the amount (2X-15)
  • Again you enter a casino through gate C, and you pay $5, so the amount you have now (2x-15) which becomes (2X-20)
  • Now you are in the casino; your amount will get double e., 2(2x-20) which is (4x-40)
  • At last you are making your final exit through gate D by paying $5, which will make your amount (4x-40-5) e., (4x-45)
  • So now the condition is when you finally leave casino you should have 0 amount of money left with you
  • For that, we will have equation 4x-45=0, and we solve this to get the answer 11.25
  • You should carry the amount of $11.25 inside the casino so that you must not leave with any money at the end

29) By using number 7,3,7,3 can you get number 24 by using any mathematical signs (+, – , x, /)?
Answer: 7x ((3/7) +3) = 24

30) Now we have a committee of 10 members, where age of all 10 members is same as it was 4 years ago, because an old member is replaced by young member? Find out how much younger is the new member?

  • Let say the sum of nine member = X and age of old man = Z
  • So its average 4 years before = (x+z)/10
  • After 4 years let Z be replaced by Y
  • So now avg=(x+4×10+y)/ 10
  • Now, (x+z)/10 = (x+40+y)/10
  • So in the end you will get z=y+40
  • So young committee member is 40 years younger than old member

31) Find a 8 digit number that if multiplied with 9 or any of its multiples ( 18, 27, 36, 45,…) it will get the multiplication factor repeated (n) number of times like 111111, 22222, 333333 and so on?
That eight digit number is 12345678
12345678 x   9 = 111111111111
12345678 x 18 = 222222222222
12345678 x 27 = 333333333333  and so on

32) If you have a piece of paper that have a thickness of 0.1 mm, how many times you have to fold the paper in half to become tall enough to reach the moon?
With every fold of paper, the thickness of paper gets double, after two folds it will get 2mm thick. In order to reach a height of the moon, you require only 42 folds of paper as it will be cover the distance of 4,39,804 km.

33) If a car is driving at 100mph down straight road, then what is the speed of each of its wheels at the point where they touch the ground?
Answer is zero, when the wheel rolls, it is moving in two ways; rotationally around its center and horizontally in the direction of the travel.  At its point of contact with the ground, both of these motions cancel each other out, leaving a net speed (with respect to the road) of zero.

34) An airplane crashed into a field and every single person died except two how come?
Because they were married and not single.

35) A man predicts that he can predict the exact score of every foot ball game before it begins, and he is always right, how come?
Because the score he predicts before the match begin is " 0-0 ".

By Patel Umair Khan’s Blog 

The post 35 Google's Tricky Interview Questions appeared first on BhaskarRaghuHardware.

30 Networking Interview Questions

Posted: 15 Jan 2015 09:19 PM PST

By Patel Umair Khan’s Blog

1. Define Network?

A network is a set of devices connected by physical media links. A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes.
2. What is a Link?
At the lowest level, a network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Link.
3. What is a node?
A network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Links and the computer it connects is called as Nodes.
4. What is a gateway or Router?
A node that is connected to two or more networks is commonly called as router or Gateway. It generally forwards message from one network to another.
5. What is point-point link?
If the physical links are limited to a pair of nodes it is said to be point-point link.
6. What is Multiple Access?
If the physical links are shared by more than two nodes, it is said to be Multiple Access.

7. What are the advantages of Distributed Processing?
a. Security/Encapsulation
b. Distributed database
c. Faster Problem solving
d. Security through redundancy
e. Collaborative Processing

8. What are the criteria necessary for an effective and efficient network?
a. Performance
   It can be measured in many ways, including transmit time and response time. b. Reliability
   It is measured by frequency of failure, the time it takes a link to recover from a failure, and the network’s robustness.
c. Security
   Security issues includes protecting data from unauthorized access and virues.
9. Name the factors that affect the performance of the network?
a. Number of Users
b. Type of transmission medium
c. Hardware
d. Software

10. Name the factors that affect the reliability of the network?
a. Frequency of failure
b. Recovery time of a network after a failure

11. Name the factors that affect the security of the network?
a. Unauthorized Access
b. Viruses

12. What is Protocol?
A protocol is a set of rules that govern all aspects of information communication.

13. What are the key elements of protocols?
The key elements of protocols are
a. Syntax
   It refers to the structure or format of the data, that is the order in which they are presented.
b. Semantics
   It refers to the meaning of each section of bits.
c. Timing
   Timing refers to two characteristics: When data should be sent and how fast they can be sent.

14. What are the key design issues of a computer Network?
a. Connectivity
b. Cost-effective Resource Sharing
c. Support for common Services
d. Performance
15. Define Bandwidth and Latency?
Network performance is measured in Bandwidth (throughput) and Latency (Delay). Bandwidth of a network is given by the number of bits that can be transmitted over the network in a certain period of time. Latency corresponds to how long it t5akes a message to travel from one end off a network to the other. It is strictly measured in terms of time.
16. Define Routing?
The process of determining systematically hoe to forward messages toward the destination nodes based on its address is called routing.
17. What is a peer-peer process?
The processes on each machine that communicate at a given layer are called peer-peer process.
18. When a switch is said to be congested?
It is possible that a switch receives packets faster than the shared link can accommodate and stores in its memory, for an extended period of time, then the switch will eventually run out of buffer space, and some packets will have to be dropped and in this state is said to congested state.

19. What is semantic gap?
Defining a useful channel involves both understanding the applications requirements and recognizing the limitations of the underlying technology. The gap between what applications expects and what the underlying technology can provide is called semantic gap.
20. What is Round Trip Time?
The duration of time it takes to send a message from one end of a network to the other and back, is called RTT.
21. Define the terms Unicasting, Multiccasting and Broadcasting?
If the message is sent from a source to a single destination node, it is called Unicasting.
If the message is sent to some subset of other nodes, it is called Multicasting.
If the message is sent to all the m nodes in the network it is called Broadcasting.
22. What is Multiplexing?
Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.
23. Name the categories of Multiplexing?
a. Frequency Division Multiplexing (FDM)
b. Time Division Multiplexing (TDM)
   i. Synchronous TDM
   ii. ASynchronous TDM Or Statistical TDM.
c. Wave Division Multiplexing (WDM)
24. What is FDM?
FDM is an analog technique that can be applied when the bandwidth of a link is greater than the combined bandwidths of the signals to be transmitted.

25. What is WDM?
WDM is conceptually the same as FDM, except that the multiplexing and demultiplexing involve light signals transmitted through fiber optics channel.
26. What is TDM?
TDM is a digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate required by the sending and receiving devices.
27. What is Synchronous TDM?
In STDM, the multiplexer allocates exactly the same time slot to each device at all times, whether or not a device has anything to transmit.
28. List the layers of OSI
a. Physical Layer
b. Data Link Layer
c. Network Layer
d. Transport Layer
e. Session Layer
f. Presentation Layer
g. Application Layer
29. Which layers are network support layers?
a. Physical Layer
b. Data link Layer and
c. Network Layers
30. Which layers are user support layers?

a. Session Layer
b. Presentation Layer and
c. Application Layer

The post 30 Networking Interview Questions appeared first on BhaskarRaghuHardware.

30 Useful Linux Commands

Posted: 15 Jan 2015 04:18 AM PST

By Patel Umair Khan’s Blog

 

1. Uptime Command

In Linux uptime command shows since how long your system is running and the number of users are currently logged in and also displays load average for 1,5 and 15 minutes intervals.

# uptime

08:16:26 up 22 min, 1 user, load average: 0.00, 0.03, 0.22

Check Uptime Version

Uptime command don't have other options other than uptime and version. It gives information only in hours:mins if it less than 1 day.

[tecmint@tecmint ~]$ uptime -V
procps version 3.2.8

2. W Command

It will displays users currently logged in and their process along-with shows load averages. also shows the login name, tty name, remote host, login time, idle time, JCPU, PCPU, command and processes.

# w

08:27:44 up 34 min, 1 user, load average: 0.00, 0.00, 0.08
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
tecmint pts/0 192.168.50.1 07:59 0.00s 0.29s 0.09s w

Available options

  1. -h : displays no header entries.
  2. -s : without JCPU and PCPU.
  3. -f : Removes from field.
  4. -V : (upper letter) – Shows versions.

3. Users Command

Users command displays currently logged in users. This command don't have other parameters other than help and version.

# users

tecmint

4. Who Command

who command simply return user name, date, time and host information. who command is similar to w command. Unlike w command who doesn't print what users are doing. Lets illustrate and see the different between who and w commands.

# who

tecmint pts/0 2012-09-18 07:59 (192.168.50.1)
# w

08:43:58 up 50 min, 1 user, load average: 0.64, 0.18, 0.06
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
tecmint pts/0 192.168.50.1 07:59 0.00s 0.43s 0.10s w

Who command Options

  1. -b : Displays last system reboot date and time.
  2. -r : Shows current runlet.
  3. -a, –all : Displays all information in cumulatively.

5. Whoami Command

whoami command print the name of current user. You can also use "who am i" command to display the current user. If you are logged in as a root using sudo command "whoami" command return root as current user. Use "who am i" command if you want to know the exact user logged in.

# whoami

tecmint

6. ls Command

ls command display list of files in human readable format.

# ls -l

total 114
dr-xr-xr-x. 2 root root 4096 Sep 18 08:46 bin
dr-xr-xr-x. 5 root root 1024 Sep 8 15:49 boot

Sort file as per last modified time.

# ls -ltr

total 40
-rw-r--r--. 1 root root 6546 Sep 17 18:42 install.log.syslog
-rw-r--r--. 1 root root 22435 Sep 17 18:45 install.log
-rw-------. 1 root root 1003 Sep 17 18:45 anaconda-ks.cfg

7. Crontab Command

List schedule jobs for current user with crontab command and -l option.

# crontab -l

00 10 * * * /bin/ls >/ls.txt

Edit your crontab with -e option. In the below example will open schedule jobs in VI editor. Make a necessary changes and quit pressing :wq keys which saves the setting automatically.

# crontab -e

8. Less Command

less command allows quickly view file. You can page up and down. Press 'q' to quit from less window.

# less install.log

Installing setup-2.8.14-10.el6.noarch
warning: setup-2.8.14-10.el6.noarch: Header V3 RSA/SHA256 Signature, key ID c105b9de: NOKEY
Installing filesystem-2.4.30-2.1.el6.i686
Installing ca-certificates-2010.63-3.el6.noarch
Installing xml-common-0.6.3-32.el6.noarch
Installing tzdata-2010l-1.el6.noarch
Installing iso-codes-3.16-2.el6.noarch

9. More Command

more command allows quickly view file and shows details in percentage. You can page up and down. Press 'q' to quit out from more window.

# more install.log

Installing setup-2.8.14-10.el6.noarch
warning: setup-2.8.14-10.el6.noarch: Header V3 RSA/SHA256 Signature, key ID c105b9de: NOKEY
Installing filesystem-2.4.30-2.1.el6.i686
Installing ca-certificates-2010.63-3.el6.noarch
Installing xml-common-0.6.3-32.el6.noarch
Installing tzdata-2010l-1.el6.noarch
Installing iso-codes-3.16-2.el6.noarch
--More--(10%)

10. CP Command

Copy file from source to destination preserving same mode.

# cp -p fileA fileB

You will be prompted before overwrite to file.

# cp -i fileA fileB

11. MV Command

Rename fileA to fileB. -i options prompt before overwrite. Ask for confirmation if exist already.

# mv -i fileA fileB

12. Cat Command

cat command used to view multiple file at the same time.

# cat fileA fileB

You combine more and less command with cat command to view file contain if that doesn't fit in single screen / page.

# cat install.log | less

# cat install.log | more

13. Cd command (change directory)

with cd command (change directory) it will goes to fileA directory.

# cd /fileA

14. pwd command (print working directory)

pwd command return with present working directory.

# pwd

/root

15. Sort command

Sorting lines of text files in ascending order. with -r options will sort in descending order.

#sort fileA.txt

#sort -r fileA.txt

16. VI Command

Vi is a most popular text editor available most of the UNIX-like OS. Below examples open file in read only with -R option. Press ':q' to quit from vi window.

# vi -R /etc/shadows

17. SSH Command (Secure Shell)

SSH command is used to login into remote host. For example the below ssh command will connect to remote host (192.168.50.2) using user as narad.

# ssh narad@192.168.50.2

To check the version of ssh use option -V (uppercase) shows version of ssh.

# ssh -V

OpenSSH_5.3p1, OpenSSL 1.0.0-fips 29 Mar 2010

18. Ftp or sftp Command

ftp or sftp command is used to connect to remote ftp host. ftp is (file transfer protocol) and sftp is (secure file transfer protocol). For example the below commands will connect to ftp host (192.168.50.2).

# ftp 192.168.50.2

# sftp 192.168.50.2

Putting multiple files in remote host with mput similarly we can do mget to download multiple files from remote host.

# ftp > mput *.txt

# ftp > mget *.txt

19. Service Command

Service command call script located at /etc/init.d/ directory and execute the script. There are two ways to start the any service. For example we start the service called httpd with service command.

# service httpd start
OR
# /etc/init.d/httpd start

20. Free command

Free command shows free, total and swap memory information in bytes.

# free
total used free shared buffers cached
Mem: 1030800 735944 294856 0 51648 547696
-/+ buffers/cache: 136600 894200
Swap: 2064376 0 2064376

Free with -t options shows total memory used and available to use in bytes.

# free -t
total used free shared buffers cached
Mem: 1030800 736096 294704 0 51720 547704
-/+ buffers/cache: 136672 894128
Swap: 2064376 0 2064376
Total: 3095176 736096 2359080

21. Top Command

top command displays processor activity of your system and also displays tasks managed by kernel in real-time. It'll show processor and memory are being used. Use top command with 'u' option this will display specific User process details as shown below. Press 'O' (uppercase letter) to sort as per desired by you. Press 'q' to quit from top screen.

# top -u tecmint

top - 11:13:11 up 3:19, 2 users, load average: 0.00, 0.00, 0.00
Tasks: 116 total, 1 running, 115 sleeping, 0 stopped, 0 zombie
Cpu(s): 0.0%us, 0.3%sy, 0.0%ni, 99.7%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
Mem: 1030800k total, 736188k used, 294612k free, 51760k buffers
Swap: 2064376k total, 0k used, 2064376k free, 547704k cached

PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
1889 tecmint 20 0 11468 1648 920 S 0.0 0.2 0:00.59 sshd
1890 tecmint 20 0 5124 1668 1416 S 0.0 0.2 0:00.44 bash
6698 tecmint 20 0 11600 1668 924 S 0.0 0.2 0:01.19 sshd
6699 tecmint 20 0 5124 1596 1352 S 0.0 0.2 0:00.11 bash

22. Tar Command

tar command is used to compress files and folders in Linux. For example the below command will create a archive for /home directory with file name as archive-name.tar.

# tar -cvf archive-name.tar /home

To extract tar archive file use the option as follows.

# tar -xvf archive-name.tar

23. Grep Command

grep search for a given string in a file. Only tecmint user displays from /etc/passwd file. we can use -i option for ignoring case sensitive.

# grep tecmint /etc/passwd

tecmint:x:500:500::/home/tecmint:/bin/bash

24. Find Command

Find command used to search files, strings and directories. The below example of find command search tecmint word in '/' partition and return the output.

# find / -name tecmint

/var/spool/mail/tecmint
/home/tecmint
/root/home/tecmint

25. lsof Command

lsof mean List of all open files. Below lsof command list of all opened files by user tecmint.

# lsof -u tecmint

COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
sshd 1889 tecmint cwd DIR 253,0 4096 2 /
sshd 1889 tecmint txt REG 253,0 532336 298069 /usr/sbin/sshd
sshd 1889 tecmint DEL REG 253,0 412940 /lib/libcom_err.so.2.1
sshd 1889 tecmint DEL REG 253,0 393156 /lib/ld-2.12.so
sshd 1889 tecmint DEL REG 253,0 298643 /usr/lib/libcrypto.so.1.0.0
sshd 1889 tecmint DEL REG 253,0 393173 /lib/libnsl-2.12.so
sshd 1889 tecmint DEL REG 253,0 412937 /lib/libkrb5support.so.0.1
sshd 1889 tecmint DEL REG 253,0 412961 /lib/libplc4.so

26. last command

With last command we can watch user's activity in the system. This command can execute normal user also. It will display complete user's info like terminal, time, date, system reboot or boot and kernel version. Useful command to troubleshoot.

# last

tecmint pts/1 192.168.50.1 Tue Sep 18 08:50 still logged in
tecmint pts/0 192.168.50.1 Tue Sep 18 07:59 still logged in
reboot system boot 2.6.32-279.el6.i Tue Sep 18 07:54 - 11:38 (03:43)
root pts/1 192.168.50.1 Sun Sep 16 10:40 - down (03:53)
root pts/0 :0.0 Sun Sep 16 10:36 - 13:09 (02:32)
root tty1 :0 Sun Sep 16 10:07 - down (04:26)
reboot system boot 2.6.32-279.el6.i Sun Sep 16 09:57 - 14:33 (04:35)
narad pts/2 192.168.50.1 Thu Sep 13 08:07 - down (01:15)

You can use last with username to know for specific user's activity as shown below.

# last tecmint

tecmint pts/1 192.168.50.1 Tue Sep 18 08:50 still logged in
tecmint pts/0 192.168.50.1 Tue Sep 18 07:59 still logged in
tecmint pts/1 192.168.50.1 Thu Sep 13 08:07 - down (01:15)
tecmint pts/4 192.168.50.1 Wed Sep 12 10:12 - 12:29 (02:17)

27. ps command

ps command displays about processes running in the system. Below example show init process only.

# ps -ef | grep init

root 1 0 0 07:53 ? 00:00:04 /sbin/init
root 7508 6825 0 11:48 pts/1 00:00:00 grep init

28. kill command

Use kill command to terminate process. First find process id with ps command as shown below and kill process with kill -9 command.

# ps -ef | grep init
root 1 0 0 07:53 ? 00:00:04 /sbin/init
root 7508 6825 0 11:48 pts/1 00:00:00 grep init

# kill- 9 7508

29. rm command

rm command used to remove or delete a file without prompting for confirmation.

# rm filename

Using -i option to get confirmation before removing it. Using options '-r' and '-f' will remove the file forcefully without confirmation.

# rm -i test.txt

rm: remove regular file `test.txt'?

30. mkdir command example.

mkdir command is used to create directories under Linux.

# mkdir directoryname

This is a handy day to day useable basic commands in Linux / Unix-like operating system. Kindly share through our comment box if we missed out.

The post 30 Useful Linux Commands appeared first on BhaskarRaghuHardware.

Basic Cat Command Examples in Linux

Posted: 15 Jan 2015 04:09 AM PST

 By Patel Umair Khan’s Blog

The cat (short for "concatenate") command is one of the most frequently used command in Linux/Unix like operating systems. cat command allows us to create single or multiple files, view contain of file, concatenate files and redirect output in terminal or files. In this article, we are going to find out handy use of cat commands with their examples in Linux.

13 Basic Linux Cat Commands

General Syntax

cat [OPTION] [FILE]...

1. Display Contains of File

In the below example, it will show contains of /etc/passwd file.

# cat /etc/passwd

root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
narad:x:500:500::/home/narad:/bin/bash

2. View Contains of Multiple Files in terminal

In below example, it will display contains of test and test1 file in terminal.

# cat test test1

Hello everybody
Hi world,

3. Create a File with Cat Command

We will create a file called test2 file with below command.

# cat >test2

Awaits input from user, type desired text and press CTRL+D (hold down Ctrl Key and type 'd') to exit. The text will be written in test2 file. You can see contains of file with following cat command.

# cat test2

hello everyone, how do you do?

4. Use Cat Command with More & Less Options

If file having large number of contains that won't fit in output terminal and screen scrolls up very fast, we can use parameters more and less with cat command as show above.

# cat song.txt | more
# cat song.txt | less

5. Display Line Numbers in File

With -n option you could see the line numbers of a file song.txt in the output terminal.

# cat -n song.txt

1 "Heal The World"
2 There's A Place In
3 Your Heart
4 And I Know That It Is Love
5 And This Place Could
6 Be Much
7 Brighter Than Tomorrow
8 And If You Really Try
9 You'll Find There's No Need
10 To Cry
11 In This Place You'll Feel
12 There's No Hurt Or Sorrow

6. Display $ at the End of File

In the below, you can see with -e option that '$' is shows at the end of line and also in space showing '$' if there is any gap between paragraphs. This options is useful to squeeze multiple lines in a single line.

# cat -e test

hello everyone, how do you do?$
$
Hey, am fine.$
How's your training going on?$
$

7. Display Tab separated Lines in File

In the below output, we could see TAB space is filled up with '^I' character.

# cat -T test

hello ^Ieveryone, how do you do?

Hey, ^Iam fine.
^I^IHow's your training ^Igoing on?
Let's do ^Isome practice in Linux.

8. Display Multiple Files at Once

In the below example we have three files test, test1 and test2 and able to view the contains of those file as shown above. We need to separate each file with ; (semi colon).

# cat test; cat test1; cat test2

This is test file
This is test1 file.
This is test2 file.

9. Use Standard Output with Redirection Operator

We can redirect standard output of a file into a new file else existing file with '>' (greater than) symbol. Careful, existing contains of test1 will be overwritten by contains of test file.

# cat test > test1

10. Appending Standard Output with Redirection Operator

Appends in existing file with '>>' (double greater than) symbol. Here, contains of test file will be appended at the end of test1 file.

# cat test >> test1

11. Redirecting Standard Input with Redirection Operator

When you use the redirect with standard input '<' (less than symbol), it use file name test2 as a input for a command and output will be shown in a terminal.

# cat < test2

This is test2 file.

12. Redirecting Multiple Files Contain in a Single File

This will create a file called test3 and all output will be redirected in a newly created file.

# cat test test1 test2 > test3

13. Sorting Contains of Multiple Files in a Single File

This will create a file test4 and output of cat command is piped to sort and result will be redirected in a newly created file.

# cat test test1 test2 test3 | sort > test4
 

This article shows the basic commands that may help you to explore cat command. You may refer man page of cat command if you want to know more options. In out next article we will cover more advanced cat commands. Please share it if you find this article useful through our comment box below.

The post Basic Cat Command Examples in Linux appeared first on BhaskarRaghuHardware.

5 Stupid Interview Questions (And How To Answer Them)

Posted: 12 Jan 2015 08:48 PM PST

By Patel Umair Khan’s Blog
Where do I see myself in 5 years



1. Why do you want this job?

This question fails so hard.  A recruiter/hiring manager needs to gauge your level of interest in their position and organization, obviously .  Initially, candidates can prove that by submitting a resume/application for the opening.  Also, not that employers have time to read them, but cover letters should be very specific as to why you'd like to work for their company and particular position.  Study your cover letter and use it to answer this question.  Even without preparation, most people can BS a great answer on the spot.

2. What are your greatest strengths?

Quickly becoming extinct, most organizations have removed the question from their interview strategy.  To answer, check the job description for essential skills listed.  Use this list to create  your own personal greatest strengths.  No, I don't condone lying but the company should be punished for its use of such a terrible question.

3. What are your greatest weaknesses?

Barf.  Also becoming extinct, this question is far worse than asking candidates about their strengths.  Most candidates assume a strong answer would be something like, "I work too hard, or care too much about the projects I'm assigned", hoping to make a positive aspect of themselves sound negative.  At this point, recruiters/hiring managers have heard enough of those sugar coated answers and their interest is in your true weakness.  If you must answer this question, go about it smartly.  Again, review the job description for important skill sets, traits, and essential job functions.  Once you know what skill sets are important to the job, you'll also know skill sets NOT important.  Create a few weaknesses that aren't important for the position, and utilize those for your answer.

4. How would your co-workers describe you?

What a waste of time.  Isn't the reference check enough?  When asked this question, be very specific.  Example, "When I worked with Tom at Google, he always said I worked best with our customers."  State a name, the company, and something that reflects your value.  An example of something not to say is, "Bob told me I smiled a lot."  Easy enough, right?

5. Where do you see yourself in 5 years?

Terrible.  Absolutely terrible question.  Loyalty is gone.  Employers don't expect you to stay for 5 years, and I'm sure you feel the same.  People take whatever they can from an employer (money, skill) and move on.  There will always be people who end up staying with a company for 20 years, but its growing increasingly rare to see.  To answer, be broad.  Be honest, but be broad.  State a few of your career goals, but don't mention the exact position or company you hope to work for.  If your interviewing with a "stepping stone" company don't let them know it.

The post 5 Stupid Interview Questions (And How To Answer Them) appeared first on BhaskarRaghuHardware.

10 most asked interview questions! (Networking)

Posted: 12 Jan 2015 08:40 PM PST

By Patel Umair Khan’s Blog

 

1. What types of network do you have experience with?

This should be one of the first things you ask. It might be critical to you that the candidate has prior experience with the type of network model you use, but even candidates that don’t could be good fits, assuming they are willing to learn and have other critical skills. In fact, candidates with lots of experience on networks very similar to yours could be too set in their ways to adapt to the way your business does things.

2. What can you tell me about the OSI Reference Model?

The OSI Reference Model provides a framework for discussing network design and operations. It groups communication functions into 7 logical layers, each one building on the next. This question will demonstrate whether candidates have the theoretical knowledge to back up their practical skills.

 

3. What monitoring tools or approaches do you rate?

You can extend this to ask about what tools candidates have used in other jobs. Hopefully they will be able to give you a range of products and techniques, and the rationale for their favorites. This can tell you about the depth of their experience and also whether their choices of tools are a good fit for your architecture.

4. What are the benefits of subnetting?

Subnetting helps reduce network traffic and the size of the routing tables. It's also a way to add security to network traffic by isolating it from the rest of the network. You don't just want candidates who can technically deploy and administer networks – you also want people who understand the rationale behind your network model.

5. How would you recommend we support our mobile workers?

Look for answers that talk about bandwidth availability, user experience, and traffic security. It's also interesting to see if candidates ask what sort of applications mobile workers use and then tailor their answers to reflect the way the network will be used.

6. What's your experience of configuration management?

This question probes candidates’ thoughts and experiences of the structure and governance that surrounds networking. You want someone with deep technical knowledge and domain experience, but also someone who isn't a maverick who will make changes without following the proper protocols.

7. How does the networking team interact with other areas of IT?

While candidates will be networking specialists, the best will have an overall awareness of how what they do affects other areas of IT. Answers could cover working with platform and application specialists, being involved in projects, or collaboration with telephony experts.

8. What do you know about our industry?

While industry knowledge isn't a prerequisite for success at a networking job, it’s useful to find out what, if anything, the candidate knows about the environment that they will be working in. The network requirements for a hospital are very different from those of an international retailer. And this question will show you which candidates have done any homework about the job before coming to the interview.

9. What would you like your job to not include?

This question will help you avoid someone who ends up leaving after a couple of weeks. Ideally, you'll have sent your candidates a job description, and they won't have applied if they didn't like the look of the role, but that doesn't always happen – you can't rely on candidates to have read the job specs!

10. Do you have any questions for us?

Always give candidates opportunities to ask you questions. Candidates who whip out lists of questions show that they have prepared for the interview. Candidates who try to negotiate pension contributions at this first stage probably don't have the enthusiasm for the role that you are looking for. Candidates who ask nothing at all, meanwhile, are underprepared and not that interested in the company or the job.
Interviews are a two-way street. Not only do they allow you to establish whether candidates would be assets to your team, but they also provide an opportunity for candidates to find out about the company and decide if the role you’re offering is a good fit for them. Asking the right questions at interviews helps both parties get the most out of the time and, hopefully, will secure you a professional, motivated and knowledgeable candidate for your networking team.

The post 10 most asked interview questions! (Networking) appeared first on BhaskarRaghuHardware.

Poodle Attacks or Vulnerability

Posted: 12 Jan 2015 01:03 PM PST


Posted: 12 Jan 2015 04:48 AM PST

Today we are going to learn  Poodle Attacks or Vulnerability

Systems Affected by Poodle Attacks or SSLv3
All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 as soon as cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this vulnerability using web browsers and web servers, which is one of the maybe foul language scenarios.
Overview for Poodle Vulnerabilites or Poodle Attacks
US-CERT is au fait of a design vulnerability found in the mannerism SSL 3.0 handles block cipher mode padding. The POODLE enmity demonstrates how an assailant can hurl abuse this vulnerability to decrypt and extract guidance from inside an encrypted transaction.
Description
The SSL 3.0 vulnerability stems from the mannerism blocks of data are encrypted below a specific type of encryption algorithm within the SSL protocol. The POODLE violent behavior takes advantage of the protocol version arbitration feature built into SSL/TLS to force the use of SSL 3.0 and furthermore leverages this additional vulnerability to decrypt pick content within the SSL session. The decryption is ended byte by byte and will generate a large number of associates along along along with the client and server.
While SSL 3.0 is an outdated encryption all right and has generally been replaced by Transport Layer Security (TLS) (which is not vulnerable in this habit), most SSL/TLS implementations remain backwards compatible subsequent to SSL 3.0 to interoperate later legacy systems in the pursuit of a mild fan experience. Even if a client and server both retain a tab of TLS the SSL/TLS protocol suite allows for protocol description arbitration (creature referred to as the downgrade dance in added reporting). The POODLE assault leverages the fact that also a safe relationship drive fails, servers will slip back occurring to older protocols such as SSL 3.0. An attacker who can put into organization a relationship failure can along with force the use of SSL 3.0 and attempt the late late gathering violent behavior. [1 ]
Two auxiliary conditions must be met to successfully slay the POODLE aggravate: 1) the attacker must be clever to control portions of the client side of the SSL association (changing down the input) and 2) the invader must have visibility of the resulting ciphertext. The most common habit to achieve these conditions would be to act as Man-in-the-Middle (MITM), requiring a combined remove form of seizure to make known that level of entry.
These conditions make vigorous injury somewhat hard. Environments that are already at above-average risk for MITM attacks (such as public WiFi) remove some of those challenges.
Impact
The POODLE onslaught can be used adjoining any system or application that supports SSL 3.0 along along along in the midst of CBC mode ciphers. This affects most current browsers and websites, but as well as includes any software that either references a vulnerable SSL/TLS library (e.g. OpenSSL) or implements the SSL/TLS protocol suite itself. By exploiting this vulnerability in a likely web-based scenario, an provoker can profit entry to sorrowful data passed within the encrypted web session, such as passwords, cookies and adjunct authentication tokens that can with be used to profit more precise admission to a website (impersonating that user, accessing database content, etc.)

Step By Step Solution for Poodle Attacks

Step 1: Login to WHM, open up the Apache Configuration screen, and click on Include Editor.
Step 2: Edit the Includes
Under Pre Main Include, select All Versions. This way your server will be protected if you change your version of Apache. When selected, enter the following into the text box for CentOS/RHEL 6.x:
SSLHonorCipherOrder On
SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
When selected, enter the following into the text box for CentOS/RHEL 5.x:
SSLHonorCipherOrder On
SSLProtocol -All +TLSv1
…and then click Update. Once you click update, you’ll be prompted to restart Apache; do so at this time.
Step 3: Verify!
To verify you’re covered, run the following command in a terminal as root:
openssl s_client -connect www.yourssldomain.com:443 -ssl3
You’ll know you’ve successfully disabled SSLv3 and protected yourself from the attack POODLE if you see a response similar to this:
CONNECTED(00000003)
140421693269648:error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake failure:s3_pkt.c:1275:SSL alert number 40
140421693269648:error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl handshake failure:s3_pkt.c:598:
I hope you all have liked the topics for more  keep visiting our website.
IF YOU HAVE ANY QUERIES ASK ME through contact us!
Do you want to publish your articles click hear
keep update with us through
for facebook click hear
for twitter click hear

You are subscribed to email updates from BhaskarRaghuHardware
To stop receiving these emails, you may unsubscribe now.
Email delivery powered by Google
Google Inc., 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States

The post Poodle Attacks or Vulnerability appeared first on BhaskarRaghuHardware.

How to install Everything

Posted: 12 Jan 2015 03:37 AM PST

Hello Fellas!

I have created another blog with a name “How to install…” I am adding and have added various software and operating system installation procedures with screenshots. 

If you want, you can request me installation procedure of a software.

Thanks for your support!

The post How to install Everything appeared first on BhaskarRaghuHardware.

How to install GNS3

Posted: 12 Jan 2015 03:04 AM PST

Installing and Config GNS3 on Windows 7 

PDF Guide for GNS3 installation:
Download GNS3 PDF guide 
 

Before learning how to install the Graphic Network Simulator or GNS3 on a computer, it is important to understand what the application is, how it works, and where it can be used.

GNS3 is a GUI-based software application that is used by most networking scholars and network professionals to learn and establish Cisco-based network topologies in a virtual environment. In other words, GNS3 can be compared to VMware Workstation or Microsoft Virtual PC with the difference that in these 2 scholars and administrators can create and use the virtual machines having Windows, Mac, or Linux as guest operating systems, whereas in the GNS3 they can create and use virtual routers.

Virtual routers created and configured in the application can be mapped with the physical NIC (the LAN card on the host computer) so that the virtual router topology can interact with the physical network infrastructure.

In order to use GNS3 on your computer, you must ensure which version of Windows operating system you are using (32-bit or 64-bit), how much RAM does your computer have, what kind of processor is installed on your computer, etc.

You can download GNS3 application from the www.gns3.net/download. While downloading, you must always choose the right version of the application, i.e. 32-bit or 64-bit, according to the operating system that you have. In case you're not sure which edition of the OS is installed on your computer, it is recommended to download the all-in-one pack for GNS3 that is available on the above link.

Once you have downloaded the correct installation file for the application, the process for installing GNS3 is quite easy and is given below:

  1. Log on to the target computer using administrator account.

  2. Locate the downloaded GNS3 installation file. If not yet downloaded, you can go to www.gns3.net/download link and download the file.
  3. Once located, double-click the installation file.
  4. On the displayed welcome window, click Next.

  5. On the License Agreement window, click I Agree to accept the license terms and continue.
  6. On the Choose Start Menu Folder window, leave everything as default and click Next.
  7. On the Choose Components window, check the SuperPutty v1.4.0.4 Beta checkbox from the Select components to install list.

  8. Click Next to continue.
  9. On the Choose Install Location window, leave everything as default and click Install. Optionally you can also click the Browse button to browse and locate any different location as desired before clicking the Install button.

  10. On the displayed WinPcap installation welcome screen, click Next to install the supporting application.

  11. Accept the terms by click the I Agree button on the License Agreement page.
  12. On the next window, ensure that the Automatically start the WinPcap driver at boot time checkbox is checked.
  13. Click Install to continue WinPcap installation process.
  14. Once WinPcap is installed, click the Finish button to complete the process, and continue with the GNS3 installation.

  15. On the WireShark installation window, click Next to continue installing the supporting application.

  16. Click I Agree to accept the license terms and continue.
  17. On the Choose Components window, leave everything as default and click Next to proceed.

  18. Click Next on the Select Additional Tasks window.

  19. On the next window, choose the installation location or leave the selected one as default and click Next.

  20. On the next window that appears, click Install to begin the
    WireShark installation process.

  21. Once installed, click Next to continue.
  22. On the WireShark completion window, click Finish to finalize the process.
  23. Back on the GNS3 installation, wait till the process completes and click Next when done.

  24. On the next window that appears, click Next to proceed without signing up, and click Yes button to confirm your action. Optionally you can provide your email address in the given field to sign up for updates from the vendor.

  25. On the GNS3 installation completion page, click Finish to complete the installation and start the GNS3 application instantaneously.

The post How to install GNS3 appeared first on BhaskarRaghuHardware.

This posting includes an audio/video/photo media file: Download Now

No comments:

Post a Comment