Monday, 30 September 2013

All You Need To Learn To Start A Career In Linux

A lot of technology geeks and engineering graduates today want to pursue a career in open source as the scope is vast and opportunities are unlimited. For that matter, even if they are not looking at open source as a career, they are definitely looking to switch to and experiment with Linux and Open Source OS. 


So, if you have also planned to opt the Open Source route, it’s necessary to understand what is required to learn if you are willing to build a career in Linux. So here we bring to you 12 tools that are required to be understood before diving into the open source world.

1. Apache: Apache is definitely the world’s most widely used web-server which is known for its open source architecture. Often termed as the Apache HyperText Transfer Protocol (HTTP) server program, it is one of the crucial and primary requirements to create a good CMS or likewise. So even if you are not willing to learn it all, you do need to learn the basics. Major of the Linux employers would ask you to come with a hands-on over the apache administration.



2. Apt-get tool: It is a command-line tool to handle packages which are used to get hold of other tools using the APT library. Although, mainly used on Debian based systems, apt-get is cross-platform with various front ends built for it. Apt-get is one of the simplest tools to use and one should still be familiar with its working and syntax on command line.



3. BASH Shell: Bash (Bourne again shell) is a sh-compatible command language interpreter which executes commands from the standard input or a file. It incorporates cool features from the Korn and C shells(ksh and csh) too. It is fairly necessary for you to know how to program in Bash. One can save a lot of time and energy by writing down a little bash script to automate a task on the command line.



4. Iptables: If you’re hitting for a Linux administrator, or someone on similar lines, you need to master this. Iptables is used to install, manage and inspect the tables in the IP packet filter rules within the Linux kernel. With iptables you have the ability to create firewall rules on your Linux computer to allow/restrict access through each network interface. You should be capable enough to list the IP rules, filter a range of IPs and add/remove the rules to the table.



5. MySQL: MySQL is a simple SQL database with GNU readline capabilities which supports interactive and non-interactive use. While it is used interactively, the query results are presented as an ASCII-table. For a non-interactive use, as in a filter, the results are tab-separated. However, the output format can easily be altered using command options.

To work on Linux domain, it would be very possible for you work on Linux-Apache-MySQL-PHP, aka LAMP. Hence, you need to be familiar with a MySQL server.



6. SSH and OpenSSH: SSH/OpenSSH client is a tool/program for logging onto a remote machine to executing commands over it. You might have to use a lot of SSH while working on a Linux network. Some of the basic requirements are – connecting to a server using SSH and setting up a key-based authentication for SSH.



7. Perl: It is one of the best known scripting languages for system management tasks. It is optimized for scanning arbitrary text files, extracting information from them, and printing reports based on that. Perl is known to be easy to use, efficient, and complete within itself. Several administration tasks can be completed with less pain and trouble with the advent of Perl scripts. Being a Linux admin, you may have to use this feature of Perl to master your network and system upgradation processes.



8. PHP: PHP is a recursive acronym for ‘PHP: Hypertext Preprocessor.‘ This again is a widely-used Open Source general-purpose scripting language with special inclination towards Web development paradigm. It can be easily embedded into HTML and hence widely used. Having a good hands-on over PHP, Apache and MySQL is essential to get your favorite Linux job.



9. Postfix: It is a mail transfer agent (MTA) used on Linux analogous to Sendmail and Qmail. It is known to handle the routing and delivery of emails. If you’re handling a Linux network, particularly a mail server, you need to have a knowledge about this very MTA. You must master the art of configuring postfix main.cf and master.cf files along with troubleshooting other postfix errors.


10. rsync: It is a powerful tool to greatly speed up file transfers when the destination file is being updated. Rsync uses a remote-update protocol which basically copies only the difference of files that have been changed. It is a great tool for backing up files to another Linux host. An aspirant should atleast be aware of the syntax used with rsync to copy files to another host machine.



11. Samba: You would have probably come across this name while working on Linux and reading articles over the web. The Samba software suite is a collection of programs which implement the Server Message Block(SMB) protocol for *NIX systems. This protocol is often referred to as the Common Internet File System or CIFS. A lot of companies which run over a Linux based environment use Samba to share files across the network. As Linux career enthusiast, you should master Samba to perfection. The preliminaries include – installing and configuring Samba server, adding and maintaining users, setting up Samba shares, et al.


12. SCP: It helps copy files between hosts within a network. It uses ssh for data transfer with same authentication and security as ssh. scp asks for pass-phrases if they are needed for authentication. One needs to know scp if he/she needs to copy files between Linux hosts over a public or private network with security concerns.


Learn More about Linux with i3indya Technologies

Friday, 20 September 2013

Distance Learning Program in Ethical Hacking to be launched soon by i3indya Technologies!! Booking Open!!




Learn Ethical Hacking & Cyber Security in 15 Days
Learn Hacking Techniques used by Hackers at your Home
With
i3indya’s Distance Learning Kit (DLK)
for
Ethical Hacking & Cyber Security 1.1

Wait is over Now!
i3indya is Launching its Distance Learning Kit
on
15th October 2013

Highlights
Course: Ethical Hacking & Cyber Security
Certification: Participation Certificate from i3indya Technologies
Fees: For India : INR 3000/- (including courier charge)
For Other Countries : INR 3000/- + Shipping Charges
Topics: 15 Topics Covered
Delivery: DLK will be delivered to you in 5 working days after receiving your payment


Special Pre-Launch Discount Offer
Book your order before 15th October 2013 and get special discount of INR 800
Note : In this case order will be delivered in 5 Working days after 15th Oct’13

Overview
If you don’t have time for regular classes, don’t worry! Now you can learn Ethical Hacking & Cyber Security at your home, with i3indya’s Distance Learning Kit for Ethical Hacking & Cyber Security. It is a 15 days module and it will cover following Topics:

ADVANCE MODULE 1.1 Ethical Hacking & Cyber Security

DAY
TOPICS
DURATION
1
Fundamental of Ethical Hacking
Hacking Vs. Ethical Hacking
Types of Hackers
Skill Profile of a Hacker
Some Famous Hackers and Groups
Cyber World
Advantage and Disadvantage of Cyber world
Cyber World as a Home of hackers
3 Hour
2
Overview of Cyber Law
Introduction To Cyber Law
Cyber Laws Indian
Technical Aspect Of Indian Cyber Law
IT ACT 2000 & 2008
Internet Crimes And Frauds
Cyber Law Cases In India
Organization Under Cyber Laws
Advantages Of Cyber Laws
3 Hour
3
Information Gathering
What Is Information Gathering & Why Hackers Need This?
Types Of Information Gathering
Information Gathering Using Websites
Information Gathering Using Software
Information Gathering Using Add-Ons
Search Engines- Smart Way Of Information Gathering
Scanning And Enumeration
Tracing - E-Mail, Mobile Phone, Intruder
3 Hour
4
Virtualization & System Cloning
Introduction Of Virtualization
Need & Use Of Virtualization
Virtualbox
Installing OS On Virtual Machines
Networking In Virtual Machines
System Cloning
Troubleshooting
Other Tools For Virtualization
3 Hour
5
Windows Hacking & Security (Win 8 & Win 7)
Windows OS & Security
Hacking Into System By Changing Passwords
Getting Access To System By Elevating Privileges
Finding Out The Passwords Of Windows
Bypassing The Windows Security
Hack from Guest to Admin
Password in Plain Text Directly
Hacking By USB Devices
Mitigation Of System Attacks
Setting Up A Secure System
3 Hour
6
Password Cracking Techniques
What is Password Cracking
Types of Password Cracking Techniques
How Different Password Crackers Work
Windows Password Cracking
FTP / Network Password Cracking
Zip/ RAR Password Cracking
Doc & PDF Password Cracking
Using GPU For Password Cracking
Password Security
3 Hour
7
Data Hiding Techniques
What Is Steganography
How Attacker Hides His Data In Images And Other Formats
How To Find Data Which Are Hidden
What Is Cryptography
Advanced Cryptography Tools
How Are Programs And Data Wrapped
Secure Measures To Protect Our Data
3 Hour
8
Hacking By Batch Programming & Scripting
Basics Of Scripting
Languages Used In Scripting
Writing Your First Program
Malacious Program Scripting
Session Hijacking Using Batch Scripting
Data Theft Using Batch Script
Automation Using Scripting
Designing Tools Using Scripting
Developing Security Tools Using Scripting.
3 Hour
9
Hacking by Viruses, Trojans, Keyloggers & Spywares
What is Trojan?
Trojans Attack Big Famous Cases
Types Of Trojans
Different way a Trojan Can Get Into A System
How We Create A Trojan and Control System
How Attacker Bypass Your Antivirus By Trojans
Analysis Of Trojans/Virus
How we remove Trojans Manually
Security Against Trojans
3 Hour
10
Malware Analysis & Fake Antivirus Detections
Introduction of Malware
Types of Malware
Common Malwares In Cyber
Types of Malware Analysis
Manual Malware Analysis
Tools for Malware Analysis
Countermeasures
3 Hour
11
IDS, IPS and Honeypots
Overview of IDS, IPS & Honeypot
Use of IDS & IPSAssignment & Revision
Installation of IDS & IPS
Prevention & Detection
Honeypot & its Types
Implementation - Honeypots
Honeypot Tools
3 Hour
12
Proxy Server & Virtual Private Network (VPN) Technology
Proxy And Types Of Proxies
Why Hackers Use Proxy?
How To Hide IP Address While Chatting
How To Open Block Website In College/Companies
Convert Your Machine As Proxy Server With HTTPS Proxy
Advantage And Disadvantage Of Proxy
Analyzing Proxy Bug
How Proxy Hack Your Passwords Etc
What Is Better Than Proxy
What Is VPN?
Why We Use VPN
Advantage & Disadvantage Of VPN
Free VPN
Countermeasures
3 Hour
13
Google Database Hacking
Introduction And Working Of Search Engines
List Of Common Search Engines On Web
Comparing And Choosing Best Search Engine
Dorks For Hacking Search Engines
Tools For Search Engines Hacking
Web Ripping
Finding Admin Pages And Weakness In Site
Security Against Search Engine Hacking


DLK Content
DLK will contain the following:
1.      DVD Set
2.      Book

Examination
You can give exam anytime within 6 Months

Certification
Certificate of Participation will be given by i3indya Technologies
Note: Certificate will be issued only if you have 60% or above marks in exam


  • How To Order
  •  Fill the DLK Order Form Here
  • Deposit the amount in Bank Account
  • Fill the bank deposit details here


For More Details Visit

Wednesday, 18 September 2013

Works in Progress for Tactilu : You'll able to Touch Your loved ones no matter where they are


Science and technology are moving forward and we can see a lot of changes taking place due to these advancements. We are constantly being bombarded with new gadgets and boy oh boy, the wonders that these small things can pull off are just ah-mazing! Science has definitely taken a leap from being a subject that was too boring and not much concerned with everyday aspects of life to something that is constantly working to make life better. These technological advancements have touched every aspect of our lives. Take dating for example; what once used to be a physical meeting has been converted into texting! The frequency of these texts is in most cases directly proportional to the dating compatibility. This virtual contact form is very popular and has its pros and cons. However, like everything that keeps on progressing, engineering has taken the next step in dating too. Tactilu, a wearable tech, a new idea, has been introduced which might very well turn into the next market success.

Welcome to Pangenerator, a Poland based design studio, which has created a device that will change the concept of dating and how we all go about it. Tactilu is the name of the wrist device that they have created which is the next gen thing. What we are looking at is a wearable tech which is able to transmit the sense of touch remotely and hence allows for communication. The gadget is powered by an Arduino Pro mini microcontroller along with a Bluetooth module. This prototype basically allows its users to touch each other virtually, by using haptic feedback which is simulated by using an internet connection or Bluetooth and doesn’t matter how far the users are apart.

Although the gadget is already pretty out of the future thing, the company is hopeful that the next gen of this device will be much slimmer and hence more user friendly.


Want to know more about Touch Technology??!!

http://www.i3indyatechnologies.com/workshop/surface-computing-touch.html

http://www.i3indyatechnologies.com/workshop/touch-screen-controlled-wireless-robotics.html
For More Information visit
+91 95 6060 5666

Tuesday, 17 September 2013

Facebook rewards Indian engineer : Next Could be you!!

Facebook rewards Indian engineer

An engineer from Chennai, Arul Kumar has been rewarded by Facebook for detecting a security bug which could be used to delete images on the social networking site. Kumar's discovery fetched him a reward of 12,500 US dollars. An engineer from Chennai, Arul Kumar has been rewarded by Facebook for detecting a security bug which could be used to delete images on the social networking site. Kumar's discovery fetched him a reward of 12,500 US dollars.

When he was asked how he came across this bug Arul kumar said “I have always been interested in the security of frequently-used websites such as Google and Facebook. There has to be a bug somewhere, and I keep testing every feature of these sites”
“It was during one such testing exercise that he wondered if photos uploaded on Facebook by a user could be removed by others. Users are aware of two ways to remove a picture from the site — either the account owner removes it or somebody else who has a problem with it uses the dashboard to request the Facebook team to remove it”
“But Facebook also has an option that asks the user who uploaded the picture to remove it. When I tested the feature, it turned out the request to remove the picture was sent to the person who wanted it removed, and not to the one who uploaded it — that was the bug,”
“But they rejected my claim saying they could not detect the bug. It was only when I sent them a video of the malfunction that they believed such a bug existed.”
“This happened a week ago, but I waited till the bug was fixed so users would not be affected. Facebook does not pay those who hack into existing accounts,”
“My father got me a laptop this January. I look forward to helping him in managing the family’s expenses. I hope at least one of the many companies I have applied to for a job responds to my application,” he added .

+91 95 6060 5666

Monday, 16 September 2013

Less Known Facts About Linux

There are a lot of facts about Linux that are interesting and not known at all. We are giving you a list of 14 such facts about Linux that are interesting and fun all at once: 

1. Linux is Obsolete: One of the most heated debates on the relevance of Linux was held recently between Andrew S Tanenbaum and Linus Torvalds focused Linux portability and its architecture in general. Tanenbaum is of the opinion that the OS is obsolete.

2. The outspoken Linus: Linus Torvalds has been outspoken at many occasions-one of the more explicit comments he made recently was that he would not change the structure of Linux to “deep throat Microsoft”.

3. Was Linux invented by Bill Gates and has all the evidence removed by him? A compelling argument made by Mr Tom Adelstein on this topic. In his argument, he says that Microsoft has managed to show that smaller OS-es like Linux are a threat to its existence, and has managed to remove all the evidence as well!

4. Microsoft Linux AKA MSLinux: There has been talks of a Linux distribution system that tries to give the power of Linux with ease of use that one usually expect from Microsoft products. Most tech analysts say that they have a hard time believing this is true.

5. Linus was offered Job at Apple by Steve Jobs? This one’s absolutely correct. As far back as 2000, when Linus met Steve Jobs, he was offered a job at Apple’s Cupertino campus

6. GooBuntu: The Linux flavor used inside Google. This is also true that Ubuntu Linux is Google's desktop of choice and that it's called Goobuntu. 

7. Linux for supercomputers: Linux powers 90 per cent of the world’s top supercomputers. World’s fastest super computer ‘Sequoia’ (developed by IBM) runs entirely on Linux.

8. Linux in movie making business: It is an interesting fact that 90 per cent of servers that are used by Hollywood animation studios make use of Linux.

9. The ‘Linux’ name trademark dispute: There was a trademark dispute which had gained some prominence when Linus decided to name kernel as ‘Linux’, especially given the fact that he didn’t register it. Later on, in 1994, a guy named William Della Croce, Jr. filed for a trademark in United States and demanded royalties from distributors of Linux. Linus Torvalds won this legal battle over name ‘Linux’ in 1997.

10. The first Linux Live CD: This was used by yggdrasil computing, a company, that was the first one to produce a Live-CD for it’s ‘Plug and Play’ Linux distribution known as LSX

11. Microsoft spends millions to counter Linux: It is believed on the back of firm evidence, that Bill Gates, the founder of Microsoft, spent $421 million to counter the growth of Linux and its penetration in Microsoft Windows’s market.

12. Linux as a case study: A now famous case study on Linux was part of an issue of the ‘Business Week Magazine’.

13. Hundreds of Linux Distros: Linux is distributed by over 300 distributions in action across the world and the list is growing everyday!

14. Linus, Steve and Bill Gates: Hate them or love them but we cannot ignore them. Here is a compilation of great quotes from these 3 men. 


Know More about Linux with i3indya's Workshops




For More Information visit
+91 95 6060 5666

Saturday, 14 September 2013

Phone Blocks : A Phone For Future

PHONE BLOCKS : THE SOLUTION FOR FUTURE!!


A phone only lasts a couple of years before it breaks or becomes obsolete. Although it’s often just one part which killed it, we throw everything away since it’s almost impossible to repair or upgrade.

Phonebloks is made of detachable bloks. The bloks are connected to the base which locks everything together into a solid phone. If a blok breaks you can easily replace it, if it's getting old just upgrade.






Visit our Blog on Embedded System and Robotics

Friday, 13 September 2013

Reasons Why IIT World Ranking Is Going Down!

The well-known Indian Institute of Technology is not doing well in the global University rankings. As per Times of India, between the years 2009-2013, the IITs have been experiencing a gradual decline in the global University rankings. According to Quacquarelli Symonds (QS) rankings report, the competitors from the rest of Asia and China have gradually come into the top 400 rankings with just five old IITs in the list.
mr ooppss


According to analysis by QS, the five Indian Institutes of Technology that ranked below the last year (2012) have displayed slow progress since 2009. As stated on crazyengineers.com, the report also finds this to be surprising as the Indian economy was doing well post recession period. 

There seem to be two main reasons for the dip in rankings. They are that IIT may have gone down in terms of the overall appeal or have been left behind by its competitors. The reactions to the article on Times of India reflect that most of them are blaming this on the reservations/quota, stating that the reservation policy is responsible for its dip whereas a few have stated that the slide is nothing new or surprising. 

As IITs are our only candidate in the global race, it is a matter of concern. Apart from IITs there are no other institutes who have made it to the race in the top global list. There are no institutes that qualify even in the global 500 list from India. 

External Link : Crazy Engineers
Source : EFY

Thursday, 12 September 2013

Ethical Hacking: How To Get There

At a time when security of data has become paramount, ethical hackers are often hired by both corporate houses and governments for probing and improving the security in their networks. The following article takes a look at ethical hacking, in terms of what the market looks like and what you need to do in case you want to become an ethical hacker.

According to research reports, the IT market overall is growing despite the slowdown. According to an estimate by research firm Gartner, the worldwide enterprise IT spending grew by 5.9 percent between 2009 and 2010, to a total of $2.7 trillion. 

An ethical hacker’s position can give you a pay cheque of up to $100,000 per year even in the initial years.

The military is one way of getting into the field, given that it affords many IT opportunities. A beginner needs to earn his or her A+ Certification and get a tech support position. After some experience and additional certification (Network+ or CCNA), move up to a network support or admin role, and then to network engineer after a few years. Next, put some time into earning security certifications (Security+, CISSP, or TICSA) and find an information security position. Besides the technical skills ethical hackers should have a strong work ethic and good problem-solving and communications skills.

Never ever intrude upon or attack anyone's network without their permission. Engaging in illegal activities, even if it doesn't lead to a conviction, will likely kill your ethical hacking career.

There are courses that will signify that you are a Certified Ethical Hacker and you can also join some seminar or workshops on Ethical Hacking and Cyber Security in various cities across India.

To know more about the workshop
http://www.i3indya.com/workshop/information-security-workshop.html

Watch Some Videos Here

Still Have any Query???
Call us at +91 95 6060 5666 

Monday, 9 September 2013

Distance Learning Program in Robotics



Learn Embedded Systems & Robotics in 15 Days 


Make your Robotics & Embedded System Projects at your Home

With
 

i3indya’s Distance Learning Kit (DLK)

for

Embedded Systems & Robotics

Highlights
Course:
Embedded Systems & Robotics
Certification:
Participation Certificate from i3indya Technologies
Fees:
For India: INR 6000/- (including courier charge)
For Other Countries: INR 6000/- + Shipping Charge
Projects:
15 Projects Covered
Delivery:
DLK will be delivered to you in 10 working days after receiving your payment

Special Discount Offer

Book your order before 18th September 2013 and get special discount of INR 800


DLK Content
DLK will contain the following:
1. Set of books
2. Robotics Kit with following content:

i3indya Development Board ATMEGA16 with bootloader (1)
i3indya Chasses (1)
Seven Segment Display (1)
Wheels (2)
i3indya LED Matrix (1)
Caster Wheel (1)
16 x 2 LCD (1)
Screw driver (1)
DC Motor (2)
Speaker (1)
DC Adapter (1)
Screws Packet (1)
Stepper Motor (1)
Connecting cables
i3indya Dual IR Sensor (2)
i3indya LDR Sensor Board (1)
Temperature Sensor (1)
Onboard IC ATMEGA16 (1)
i3indya 4 x 4 Keypad Matrix (1)
Onboard IC ULN2805 (1)
RGB LED (1)
Onboard IC LM 358 (1)

Watch the DLK Video

For Course Details and Registration visit

Call Us
+91 92124 99536



i3indya Technologies has been Awarded 
"Best Company for Embedded System and Robotics Training of the Year 2013" - by TIME RESEARCH

Visit the Robotics Workshop Page