Sunday, 28 December 2014

Ethernet

Networking is playing vital role in current IT era where data distribution and access is critically important. As the use of communication between two or more entities increases the networking technologies need to be improved and refurbished over time. Similarly the transmission media, the heart of a network, has been changed with the time improving on the previous one. If you know a little bit about networking you surely have heard the term Ethernet which is currently the dominant network technology. Wide spread of the Ethernet technology made most of the offices, universities and buildings use the technology for establishment of local area networks (LANs).


To understand what actually Ethernet is, we need to know about IEEE first which is a short of Institute of Electrical and Electronics Engineers. IEEE is a part of International Organization for Standardization (ISO) whose standard IEEE 802.3 is defined for Local Area Network. The standard 802.3 commonly known as ETHERNT defines the communication standards for how data is transferred from one network device to another in a local area network. Since the limit for Ethernet cable is few hundred meters Ethernet is commonly deployed for networks lying in a single building to connect devices with close proximity. The same standard for Ethernet enables manufactures from around the earth to manufacture Ethernet products in accordance with the ISO standards that are feasible for all computing devices worldwide.

Local Area Network
A LAN is an interconnected group of computers that span over a relatively small area. Generally LANs are limited to a single building or a group of buildings where a wired or wireless communication channel is used for connecting the computers. A LAN consists of following components:
· Two or more computers
· NIC (Network Interface Card) cards embedded in each computer.

· A switch or hub to centrally connect all the computers and controlling traffic.
· An Ethernet cable to connect each computer’s NIC to hub/switch.
· Networking software.
A NIC is installed on each computer and is assigned a unique address. The Ethernet cable connects all computers through hub or switch where each computer is directly connected to the central hub/switch. In wireless LANs also called Wi-Fi, a wireless NIC is used in lieu of cables and data is transferred through radio waves.

History

Ethernet was developed by Robert Metcalfe at Xerox PARC between 1973 and 1974 and first documented on May 22, 1973. Later it was successfully deployed at PARC in 1976. After two years Xerox developed X-Wire - a 10 Mbit/s Ethernet running on a coaxial cable.

In June 1979, Robert Metcalfe left Xerox and founded 3Com to commercialize the Ethernet. He convinced Gordon Bell at DEC, David Liddle at Xerox and Phil Kaufman at Intel to jointly develop an Ethernet specification based on X-Wire. This specification was called DIX Ethernet which specifies a 10 Mbit/s ethernet cable.
In 1982 Sun Microsystems was founded to develop UNIX workstations with Ethernet. Later soon Intel introduced the first Ethernet interface card. In November 1982, the second version of ethernet was launched known as Ethernet II. Next year the 802.3 specification was formally approved by IEEE and it was adopted by ISO. Soon there were many new companies like Novell, Cabletron, CISCO, Network General, and SynOptics to develop a variety of devices for Ethernet LAN. Ethernet became the major technology in computer networking by the end of 1980’s. Since then the technology is continuously evolving data speeds and reliability measures.

Ethernet terms
Ethernet specification defines all aspects of local area network communication. To understand its actual working, below are some important terminologies that are frequently used in Ethernet networking
· Medium - An Ethernet medium is the cable used for data travelling. The earlier medium that was used in Ethernet systems was co-axial copper cable which was replaced by twisted pair cables.
· Segment – A piece of the medium that is used in a single connection is known as segment.
· Node – The end devices which are connected through segments.
· Frame – Data and information is divided into frames, where each frame is a short message that travels from source node to destination node. Each frame is constructed according to the protocols and contains a source and destination address.

Open System Interconnection (OSI) Model
OSI Model is a characterization for standardization of working of a communication system. The model divides the central tasks of data communication into seven layers. Each layer is built upon the one beneath it, acting as an instance which carries out its tasks according to rules defined by protocols which can extend over several layers. These layers are –
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Data transmission on an Ethernet network works in accordance with OSI model layers. For simplicity first two layers are commonly called as physical layers, network and transport layers are termed as transmission layers however each layer has the different tasks to be done. The first – physical layer defines the electrical, mechanical and functional interface to the transmission medium. The second layer – Data Link Layer defines data addressing and reliable data connection between end devices and communication channel by using error detection functions. The network layer controls data transmission timing and logic while transport layer segment data and assigns it to applications. The last three layers – session, presentation and application layer, as all the programs and applications have a direct access to these layers, they are summarized to application layers.
The Ethernet protocol mainly implements the bottom two layers of the OSI 7-layer model, i.e., the data link and physical layers. It uses Carrier Sense Multiple Access/Collision Detection (CSMA/CD) to support the data link layer. CSMA/CD, a protocol to determine how network devices respond when two devices attempt to use a data channel simultaneously, checks the media for other devices before transmitting data to minimize the number of collisions.
The systems communicating over Ethernet send information dividing it to a stream of data into shorter pieces called frames. Each frame contains source and destination addresses and error-checking data so that damaged data can be detected and re-transmitted. There are specific rules for generating frames to send over the Ethernet network:
Length of a frame varies
A frame must contain the source and destination address
There should be a unique address for each device in the network.
A node should be uniquely identified.

Structure of Ethernet Frame
An Ethernet frame is made up of five fields: the Destination and the Source MAC address field, the Ethertype field that contains some control information, a Payload (data) field, and a trailing Frame Check Sequence field that holds a checksum for the frame. The Ethernet frame starts with preamble and start frame delimiter, followed by an ethernet header containing MAC address of source and destination devices. The middle section of the frame consists of payload data including headers for other protocols such as internet protocol, carried in the frame. The end part of the frame consist a 32-bit cyclic redundancy check which detects the errors in transmission. The standard data frame has a maximum length of 1518 bytes, and contains a Payload field of at least 46 and up to 1500 bytes.
The Data Link layer receives data in bit form and combines them into bytes which are combined into frames. These frames encapsulate data packets from the Network layer for. A MAC frame format is used by Ethernet devices to pass data frames and perform a cyclic redundancy check (CRC) for error detection.

Types of Ethernet cabling
The Ethernet physical layer evolved over a considerable time span and encompasses coaxial, twisted pair and fiber optic physical media interfaces and speeds from 10 Mbit/s to 100 Gbit/s. Depending on the requirement and use, Ethernet cables are divided into various categories.


Straight through and crossover are two types of cables used in networking. Straight through is used for connecting two different types of network devices such as PC and Hub while Crossover cables are used for connecting two same type of networking devices such as PC to PC or Hub to Hub. Besides this simple categorization there are some other things that vary in different Ethernet cables.
Cat 3 – It is used for voice cabling and 10Mb Ethernet
Cat 5 – It is used for 10/100Mb Ethernet and works for voice as well
Cat 5E – It is an enhanced Cat 5 cabling that helps to prevent cross-talk, works for 10/100Mb and 1000Mb (or Gigabit Ethernet)
Cat 6 – It is similar to Cat 5E but with larger gauge wires, works for 10/100/1000Mb. This cable is better than Cat 5e for Gigabit Ethernet.
Cat 7 – Also called Class F, Cat 7 cables are fully-shielded cabling and support up to 600Mhz. This is a relatively new type of cabling and has not been used much.
Besides the new advancements in Ethernet cabling, Category 5E is still in wide use as it works for 100 Mbit/s and is economical compared to the higher categories of cabling.
Get in depth detail about a conventional ethernet cable through exclusive images and thorough explanation through Insight of ethernet cable.
Wired Vs Wireless LAN
Generally the cables used in wired LANs are Ethernet cables consisting twisted pair cable with RJ45 connectors at both ends. All the data transfer occurs through this cable. Similar like wired LAN, a wireless LAN, commonly known as Wi-Fi can also be established where radio waves are used for data communication instead of a cable. There are particular wirelesses LAN cards are used instead of simple LAN cards. A small antenna situated in wireless network card receives radio signals from computers or hub or switches.

Saturday, 27 December 2014

Web Tools

Internet tools make the life easier. Here is the list of top 10 web tools of 2014.

Internet is full of useful web tools. We have never ran short of online tools and programs. Number of web tools and programs were launched in 2014. Web tools can help you in making your day to day work efficient as well as improve the quality of outcome. Today we have listed top 10 useful web tools of 2014.




1. Infogram

Infogram is a great tool to create infographics online. The tool is full of library of tools to generate modern, sharp and responsive graphs, charts and infographics. You can use this tool to present your idea, to make your powerpoint presentation look more interesting and polished. Infogram has quite user friendly UI. It doesn't take long time to learn all the menu and tools in Infogram.

2. Up Hail

Up Hail lets you compare the taxi fare in real time and help you find the best deal. You can simply type your destination and arrival points and Up Hail calculates the fare of your travel. This is a great tool to figure out whether Uber or Lyft is cheaper for the ride.

3. Inbox

This is another example of a great product by Google. If you are a Gmail user, then this is tool can be of great use to you. Inbox makes your email more organized. You can track your shipment of product that you purchased online using Inbox too.

4. Overcast

Overcast is a great podcast app. It is a combination of nifty layout and a great search feature. Users can control the speed and volume of playbacks using Overcast. This seems like a great upgraded version of iTunes podcasts. This is a must have tool for podcast lovers.

5. Nuzzel

The idea behind Nuzzel is pretty simple. The app links up with your social accounts to connect your friends. If you choose an option to send the most posted stories about your dinner party, the app will fetch the data and show it to you.

6. YouTube Music Key

This tool of YouTube lets you find the new as well as rare music recordings. The web tool has a library of of music that you can search through. The app records your choices and gives you recommendation based on your taste in music. You can find “music” tab on YouTube’s homepage to access the YouTube Music Key.

7. Medium

This is a premium writing platform. The online tool has very mature content. Many popular journalists, celebrities contribute to this platform. Even US President Barack Obama posts article on Medium.

8. Product Hunt

Product Hunt is a online search engine for startups, apps and ideas. You can use this tool to search about the new startups. People can even rate the products. This crowd-sourced platform is a great place to search for new apps and ideas.

9. The Internet Arcade

The Internet Arcade is the collection of video games. There are plenty of options of games available on The Internet Arcade. Some very rare game titles like Special Forces, Kung Fu Commando and Gravitar as well as some some classics like Street Fighter, Frogger are available on The Internet Arcade.

10. Flux

The screens aren't great for eyes at any time of the day. Specially during the night hours, using the computer in no light is a nightmare. It gives you headache, eyes start hurting and many such related problems occur. F.lux is a great solution to get rid of all such worries. The tool automatically adjusts the screen brightness of your computer.

Friday, 26 December 2014

SMS Gateway


After the invention of video games, ‘Short Message Service’ is by far the best thing that could have happened to the youth of the world. Short Message Service or lovingly shortened as SMS, has been one of the most significant means of exchanging information in the modern era of thumb twiddling youth. They are fast paced, tech savvy and almost always running short of time as well as mobile talk-time. Advances in technology makes them engrossed with computer and electronic gadgets for a better part of their time and sometimes, even picking up the phone to type a message seems to be a herculean task. Much like the youth is the industrial sector that thrives on youth’s desires.

The advertisement sector finds it prohibitively expensive on time and money to employ teams for typing advertising SMS on mobile phones and sending them to different numbers in a bid to garner customers. But with continued innovation in the field of technology, the divide between all sorts of communication methods is lapsing and means are being invented to extract more time from our already congested lifestyles and more juice from the limited resources. Typing with a keyboard is easy, and an add-on is that typing repetitively is no longer necessary, do it once and we are set. Use a computer and broadcast the SMS.

Anyone reading this must have used an online SMS sending website to send a couple of message to different phone numbers when running short of balance or were just too lazy to fetch the phone from the next room. If you have, then you already have experienced the magnificence of this technology, and if not, please go and do it now. A SMS is a short text message which can be sent over the wireless channel using certain standardized communication methods over the ‘Mobile Application Part’ (MAP) of the SS7 protocol. The GSM 7-bit alphabet encoding scheme limits the maximum payload length to 160 characters. There are a few ways in which the same message can be sent from a computer and we are going to discuss a few of them in the following discussion.

The first step to use any technology is, to have a motive. In case of PC based SMS, the motive may vary with the size of organization and the targeted audience base for the SMS. The two broad types of classifications of PC Based SMS technology can be inferred from the following diagram:


Light Weight Messaging:
Lightweight Messaging is what individuals do. A GSM modem is interfaced with the computer over a serial or a USB port and a GUI (Graphical User Interface) or a CLI (Command Line Interface) is used to send messages to any mobile using the GSM modem. A GSM Modem is like a Dial-Up Modem in function, the major difference being that a dial-up modem uses transmission lines while GSM modem uses wireless network. It uses the SMS specifications to send messages, much like any GSM phone and also needs a SIM card to be able to send SMS. These are called ‘Direct to the Mobile Appliance’ type of devices, as these can directly access the mobile SS7 networks through the modem and can deliver messages right into the destination mobile device(s). Such devices do not use any kind of internet access or infrastructure in between and act as a gateway from the computer into the wireless network.

Modern Internet USB dongles are a much refined version of such GSM modems which are capable of full phone functionalities. Most network providers scrap down the capabilities of the dongles by using their own, toned down firmware with the devices. Many ‘Do It Yourself’ project ideas revolving around applications of a GSM modem interfaced with a computer are available online. The device communication is done through a sequence of AT commands which are quite easy after little practice. More information on this is available here.

This type of technology is intended for tech savvy individuals and to cater to the intra-company needs of the corporate. Seniors in big corporate offices can use such Direct to Mobile Appliances to broadcast message to the mobiles of a large number of people within the organization, for example, meeting notifications to a particular team. The advantage would be that, the contacts listing, sorting and managing can be automated and much more simplified by the use of a computer, rather than a mobile phone.

A novel use of such technology has been in the medical field, where the doctor is sent an alarm SMS from the bedside monitoring instruments of a patient in case some spurious reading is detected, indicating a critical situation which demands immediate attention. This not only increases the efficiency of the medical teams, but also reduces the workload on staff on duty.

Bulk Messaging:
Bulk messaging is the way we receive advertisements on our mobiles from various advertising companies. It is obvious that a single GSM interfaced modem cannot take care of such transmissions. Not only it is too time consuming, but the number of mobile subscribers to which the SMS is to be sent is just too large to be allowed on a single phone. Thus, mobile service providers have provided alternative means to get around this limitation for the companies. They provide direct access to their SMS Centers for companies through internet or leased lines via a SMS gateway.

An SMS gateway is generally offered as Software as a Service (SaaS), or a well documented API which can be integrated into the backend of the server. It falls into the ‘Direct to SMSC Appliance’ type of SMS devices. It generally interacts with only one SMSC at a time, which offers bulk SMS services at a certain pricing. Its function is to convert incoming SMS sending requests into a format that is compatible with the Short Messaging Service Center (SMSC).

The incoming request can be from a webpage, in the form of a hyper text transfer protocol (http), or some form of script request calling a function in the software. A typical HTTP request may look like:


A similar functionality can be provided in the form of software to be loaded on the computers. An example code snippet from JAVA can be:





These messages need to be converted into the format the serving SMSC works in. For example, Nokia SMSCs use Computer Interface to Message Distribution (CIMD) protocol, while CMG, another SMSC provider uses External Machine Interface (EMI) which is an extension to Universal Computer Protocol (UCP). There are other providers too who use Simple Network Paging Protocol (SNPP). Each protocol is different from the other in most respects except the function that they perform. For example, the above request converted into the two common SMSC protocols is shown below:





SMS Send Request in EMI Protocol

There are basically two types of SMS Gateways which can be used to send bulk messaging.
SMS Aggregators: These are the gateways used by most web based SMS service providers. The aggregators do not have access beyond the SMSCs and can only route packets up to the message centre. This is an example of Local Termination Model. They do not have access to the wireless mobile networks and cannot ensure delivery on their own and are also bounded by national boundary restrictions most of the time. After the message has been submitted at the SMSC, these gateways are pretty much at the mercy of the network service provider for the delivery of messages over the air using the SS7 protocols.

Let us look into the pros and cons of such gateways. These are generally much cheaper that sending individual messages to multiple mobile numbers from a mobile device. If the network delivery services of the provider are reliable, then the gateway itself is reliable too. Non-critical messages can be easily sent using such method. The infrastructure required is minimal, is generally software tailored to suit the requirements of the customer or can be implemented independently by the user himself too. On the flipside, the message delivery not being guaranteed means that important message may not be sent using it, as there is no assurance of them being delivered.

SS7 Providers: SS7 providers achieve what SMS Aggregators fall short of, guaranteed message delivery provided that the destination number is valid and in service. Such type of gateways is far more complex and need a lot more infrastructure. Dedicated machines may be required to install such service. The SS7 provider Gateways have access to the SS7 channels of the mobile network, and thus, can exercise full control over the Message routing through the Wireless network right up to the delivery of the message on the destination mobile device. This follows International Termination Model and also enables sending of international SMS’s. But like most of the excellent things, such services are very expensive for just any company to buy.

This type of Direct to SMSC devices are intended for advertising companies, awareness agencies and companies offering personalized mobile services. They generally use A2P (Application to Person) services. Business ventures floating new shares in the market may send out notifications to their existing shareholders through such services. Advertisement agencies send regional advertisements and local offers using such type of devices to maximize turnouts. Banks and insurance companies offer personalized mobile services following a query response model and also providing advice and alerts to their subscribers. Governments have started to exploit the Mobile penetration to spread awareness about various activities to all people who have access to mobile phones, which encompasses a big majority of the world population. A recent example is the sending out of SMS notifications and reminders regarding the Mega Earthquake Disaster Management Mock Drill organized by DDMA. Mobile Network providers offer value added services like sports and news updates using such devices. Even Google provides SMS based localized search.

The technology may often cause nuisance by causing disturbance at the wrong hours, and may sometimes be used as a tool of mischief by individuals to send harassing SMS from websites anonymously. TO remedy this, the companies have started to offer Do Not Disturb (DND) services and the recipients may also choose not to receive any kind of SMS from that service.

Computer based SMS has gained much prominence and made an impact on society. In 2011 alone, more than 8 trillion text messages were sent and mobile advertisement revenue was around US $3.3 billion which is estimated to cross $20.6 billion by 2015. Countries like England, France and Germany have been found to be very receptive towards Mobile Advertisements. SMS has been a hit among people since it was first introduced in 1992 and till such creative innovations keep on simplifying things, SMS will continue to deliver big contents in a cramped 160 character message.


Courtesy-EG

Alternatives For Linux Mainstream Distros

Alternative distros are not feature packed as mainstream distros but they are known for their simplicity and purpose focused use-case.


2014 has been a great year in world of open source Linux distros. Many new Linux distros were released this year. Many mainstream distro users migrated to alternative options in 2014. The mainstream distros are popular as they have large userbase, number of developers working on the development, the support is quite accurate and responsive and they have their own software repositories.



Alternative distros don’t have either of the features that mainstream Linux does but, however alternative distros are created for specific purpose. Many users like to try out alternative distros for a change. These alternative distros are based on mainstream distro. Today we have listed six alternative distros that were released in 2014. However most of these alternative distros are paid.

1. Puppy Linux

Puppy Linux has unique user interface. The package comes in size of just 200 MB. It is designed to run from USB drive. Puppy Linux is basically made to work on portable devices. The distro has Quickpet installer that helps you to install common software packages. The distro is quite light. It is perfect for computers with older hardware.

Click here to download Puppy Linux

2. Makulu

The design of Makulu is inspired by Ubuntu MATE or Linux Mint. Makulu themes have nice cosmetic touch. The distro comes with Thunderbird, Dropbox, Kingsoft office, Audacious and VLC bundled within the distro. Makulu has two installers to install apps. Linux Mint installer is tried and tested for years while, Makulu’s own software installer has been inbuilt in the distro as well. Makulu also has good collection of inbuilt games. The distro has similar UI as Fundutu and Point Linux.

Click here to download Makulu

3. SparkyLinux (Gameover Edition)

SparkyLinux is based on LXDE desktop environment. The distro is pretty lightweight. Number of applications are already included in SparkyLinux. There is set of applications to listen to the music and watching videos as well. The OS has bundled Transmission bitorrent client and Dropbox. The distro is focused on gamelovers. It includes games like Battle For Wesnoth, SuperTuxKart and SuperTux in the distro itself. There are some retrogaming options like breakout, lemmings and tetris.

Click here to download SparkyLinux

4. Peppermint OS

This distro is a great combination of desktop Linux distro and web kiosk. The distro is based on LXDE desktop. The distro includes Gnome Mplayer, Guayadeque Audio Player, file manager, terminal, text editor and screenshot tool. Peppermint has ICE editor that lets you integrate web apps into desktop. The Peppermint OS has similar UI as Google Chromebook. Peppermint OS is the best solution if you have mid-range desktop computer which you use mainly for web apps.

Click here to install Peppermint OS

5. Netrunner

Netrunner is similar to Ubuntu. The Ubuntu users would love Netrunner. The distro is based on KDE desktop. Installing the distro is pretty easy. The distro includes installation guide. All important and commonly used applications are already included in Netrunner.

Click here to download Netrunner

6. Simplicity Linux

Simplicity Linux is based on Slacko version of Puppy Linux. It gives you access to Slackware repositories, which is great for installing applications that are not included in the distro by default. The distro is available in three main versions, Minimal, Netbook and Full. The UI of Simplicity is more like a standard desktop distro but, it packs number of great applications with most performance benefits of desktop distro.

Click here to download Simplicity Linux

7. Zorin

Zorin distro is known for glitz and appearance of desktop UI. It does not include all desktop effects that come with Compiz. The main feature of Zorin is the look changer that comes with the desktop. It enables to switch between Windows UI and GNOME 2 look. Some developers have even added OSX look in Zorin. Zorin OS is available to download for free.

Click here to download Zorin

Free Online Courses To Improve Your Tech Skills

You should take the following free courses to improve your tech skills.

There was a time when you had to go to college or university to get advance level of education. But such ways of learning are taken over by online education. Now, you can get higher education right from your house. The internet has opened many doors to us. There are number of websites that offer online courses. There are many free online tech training available. Many of these courses charge if you want to get certificate or the credit. But if you just want to learn for sake of knowledge then these courses are absolutely free. Today we have listed top 6 courses that can grow your tech skills.



1. Introduction to Linux

This course offered by edX provides you all fundamental knowledge of Linux. The Linux Foundation has partnered with edX to offer this course. The course has graphical interface and command line as well. So you can practice what you learn. The course is designed with 40-60 hours of study material. Students can audit the course at no extra cost. There is course material, tests, assignments and activities given online. You can get the certificate of achievement for free but, if you want verified certificate for bullet point on resume, you have to pay the fee.

2. Google Analytics Academy

Competition of organic search engine is long gone. It is important to understand the analytics of your website. It helps in making more data based decisions at the same time it helps in improving customer experience. Google’s Analytics tool is the best solution for analytical monitoring and tracking. They have also created the online learning center to offer courses for better understanding of hidden data located in your site.

3. Microsoft Virtual Academy


Microsoft Virtual Academy is focused on courses based on Microsoft products. The course offers almost everything, from game to cloud to app development. You can participate and learn for free but you need to use Microsoft account and create MVA profile. You can take courses, attend live events as well as track your learning progress.

4. Udacity

Udacity is famous for online programming learning courses. The site offers free courses for HTML, Python, Data science and much more. The site has over 1.6 million active users. Udacity has recently partnered with Google to offer Android programming courses. The site has free material, videos, tests, project instructions and much more. Udacity offers online courses for most of the programming languages out there.

5. Alison

Alison has number of free technical courses. It has over 106 tech courses in Digital Literacy and Skills section. The site has 3 million active users. Alison offers number of tech courses right from building online business to C programming to Adobe technologies training. ABC IT-Computer Training course is the most popular course on Alison.


6. Harvard CS50

This is the introduction to computer science class by Harvard University. The course includes basic coding and learning aspects of C programming, CSS, HTML, JavaScript and MySQL. It offers number of free ways to learn to code. You can register for Harvard credit and certificate by paying a fee. The course offers auditing for free and if you achieve the satisfactory level you will get the Honor Code certificate.
You should take the following free courses to improve your tech skills.


Courtesy-Efytimes

Tips To Secure Your Emails

Here are five simple tips that can save you from serious email attacks.


Considering the number of hacking events happened in recent time. Online data security has become really important aspect these days. Latest Sony hack exposed emails of company’s employees. Hackers can spoof into company’s emails by sending fake email with malicious link to exploit sensitive user data. Today we have listed five simple tips that can help you in securing your emails to avoid such online spoofs.



1. Archive

You should 'Archive' your read email in equal interval of time. Most IT companies have auto archive policy. This takes the email off the server however, you can still access the email on your local machine. But they cannot be accessed from website or any other online media. Archiving email is the best option to secure your server database. You can even create filter to archive specific type of emails automatically.

2. Organised Mailbox

You must organise your email inbox on equal intervals of time. You can create folders to sort your emails. This can help you in segmenting data so that attacker wouldn't understand which folder to go to. You can take multiple steps to search your wanted information. Organizing email inbox is the most convenient way to secure emails.

3. Work and Personal emails

You shout never use work email for person mail and vice versa. This limits the access to attacker. In case you are using the same email for both and work emails then it lets attacker to know your shopping habits, possibly even credit card and bank account information. Attackers often send out phishing message that allow hackers to gain access of your mailbox.

4. Unknown Attachments

If you ever receive an email with link or attachment that you were not expecting. Do not click it. These are phishing emails, it exploits your system with malicious script. Sometimes hackers access some of your friends email address to send you malicious attachment. If you are not expecting any email with an attachment from your contact. Send a separate email the sender asking whether the first email was legitimate.

5. Raise Alarm

In case of your work email, if your email inbox is acting strange. If it automatically sends replies, it is highly probable that your email has been compromised. You should directly contact your IT department and alert them about the incident.
Here are five simple tips that can save you from serious email attacks.




New Year Resolutions For Job Seekers!

Are you aiming to get your dream job in 2015? You should have the following six resolutions.


he new year is almost here. Everyone makes new resolutions for new year. If you are aiming to get grab your dream job in this year, you should have different perspective towards everything. A job seeker has goals and plans. The resolutions of job seeker should be centric on the dream job. Today we have listed 6 must have resolutions for job seekers.




1. Define Goals

If you are aiming for some dream job, you must know your goals. Define and set you goals. It is important for job seekers to define the path towards tapping the dream job and set goals. The goals can guide you on how to get your dream job.

2. Research

For deciding goals and deciding plan of action, you need to research your path before setting it. Make sure that there are no loops in your plan of action. Target your research in direction of your dream job.

3. Networking

Networking is a key to your dream job. Networking doesn't happen just online. You should attend offline meetups, events to communicate with new people. Build your social influences network. Networking is the most valuable aspect for any job.

4. Volunteer

Volunteering helps in networking. Rather than sitting idle at home, you should go out and volunteer for different social jobs and programs. Volunteering develops new skills in people. Community volunteer work helps in defining short term goals. It can be added to the resume.

5. Elevator Pitch


Elevator pitch is basically a short introduction of yourself. You need to prepare elevator pitch for yourself. Elevator pitch should cover all important points that you want to tell your potential employers. Choose the qualities that you want to highlight to the employer. Elevator pitch is very useful while networking.

6. Social Media Plan

Social media helps a lot in networking. You can easily build your influencers on social media platforms. Potential employers often run a background check on you on internet. Social media comes handy at that time. Your interaction on social media gives idea about your behavioral and thinking pattern.