Sunday, December 6, 2015

YouTube opens first video production studio in India

Stepping up its India focus, YouTube along with Subhash Ghai-owned film school Whistling Woods International, has opened its first video production studio in the country.
Called YouTube Spaces, it has similar collaborations in Los Angeles, London, Tokyo, New York City, Sao Paulo, Paris and Berlin. The company said that the “watch-time” of its content in India was growing at 80 per cent on a year-on-year basis while the content uploaded to India has grown by 90 per cent.
Through this collaboration, India’s popular up-and-coming YouTube creators, as well as their students, will have free access to Whistling Woods’ studios, high-end audio, visual and editing equipment, in addition to training programs, workshops and community events.
Lance Podell, Director, Global Head of YouTube Spaces, said, in addition to physical studio space that is available to students and creators, YouTube and Whistling Woods are developing original courses to train filmmakers, especially to create content for the digital and online media.

YouTube said that the viewership from mobile devices was growing much higher than desktop. “There is a 55 per cent watch-time from mobile devices,” he added.
“We see growth coming from not just metros but also tier II and III cities. The headroom for growth from India is huge as net connectivity improves,” said Ajay Vidyasagar, Regional Director, Youtube Partnerships, India and South East Asia.
Youtube, which has a billion in viewership, is seeing a huge surge in creator-based content. He said the company was also looking to step up the offline views.

Only one-third internet users create strong passwords: Survey

Netizens all are very particular about the safety of personal and financial assets, keeping them locked and in vaults. However, when it comes to online presence, not many pay a lot of attention to creating a secure password. One of the most common mistakes of netizens is the use of the same password or its variants for multiple accounts.

This was among the findings of a study conducted recently by cyber security giant Kaspersky Lab to test people's cyber savviness. The study found that only 38% users made the effort of creating strong and separate password for each of their accounts. Around 36% use just a few passwords for a larger number of accounts and 12% use variations of the same password pattern. Another mistake was in the form of storing passwords in easily accessible places.

"Passwords are the basic level of security for our virtual presence. Unfortunately, not many internet users understand the scale of cyber threats they face because of a weak password," said Altaf Halde, managing director South Asia of Kaspersky Lab. A strong password is the basic security requirement for anybody using the internet to share sensitive data, he added.

Microsoft, Karnataka chamber partner to help 2 lakh SMBs

Federation of Karnataka Chambers of Commerce and Industry (FKCCI) and Microsoft have partnered to help more than 2 lakh small medium businesses (SMBs) in Karnataka to adopt technology with cloud computing.
This initiative will not only open more avenues for SMBs but also help them connect better with their existing customers and reach out to the potential customers across India.
“Technology lies at the heart of any business and the right mix of IT adoption helps businesses accelerate their growth at a minimum cost. We are excited to partner with Microsoft to drive the next wave of growth for our member organizations,” said Tallam R Dwarakanath, President, FKCCI.
Meetul Patel, General Manager – SMS&P, Microsoft India, said, ”Amongst SMBs the primary workloads are productivity, Internet connectivity, mail and messaging, business applications, collaboration, cloud storage and cloud platform. With our association with FKCCI we are able to reach out to thousands of SMBs and democratize information technology for small businesses while providing enterprise-class solutions that level the IT playing field for them and offer superior value to SMBs. This will open new avenues for them while gaining access to new markets resulting in profitable growth.”

Saturday, December 5, 2015

Zuckerberg Invests In A Better World

There is something undeniably unnatural in amassing wealth only to voluntarily give almost all of it away to strangers. The level of unnaturalness is only increased when the amount, worth 99% of the person's total shares in his own company , amounts to a neat pile of $45 billion. Facebook CEO Mark Zuckerberg has announced making such an act of charity in order to “leave the world a better place“ for his newly born daughter and “all children“. This is, in effect, taking the perfectly normal desire to use one's wealth to better the lives of one's loved ones to its logical extreme: using money to make the world in which they will grow up and live in a better place.

As a role model for 21st century entrepreneurship, Zuckerberg sends out a powerful message for other high net worth individuals to emu late. More cynical (and perhaps less wealthy) observers will cite Zuckerberg's act of redistributing his considerable wealth--as they do with other philan thropists such as Warren Buffett and Bill Gates--to be yet another act of cannin ness to be associated with one of Silicon Valley's most success ful protagonists. They are right. But only to the extent that the Facebook founder is not doling out his money in a fit of com mune-istic `I'm tired of material things' zeal but to make mate rial comforts more widely accessible to people lacking them.

Sure, nothing makes for a better brand endorsement than the face of Facebook being `unnaturally' generous. But the end re sult is Zuckerberg's wealth reaching people who need what money can provide and that they lack. For this breaking away from the herd, his announcement is to be lauded. It is part of a grander plan with one pivotal idea behind it that both individ uals and states should heed: to share wealth, one must first create, and then keep creating, it.

Share this Amazing News with your friends too:

Nucleus Software launches digital cash solution

You may soon be able to withdraw money from your banking
 account sitting in the comfort of your living room.

This could happen without having to go out and search for an automated teller machine (ATM) to get the withdrawal done.
Nucleus Software - a leading provider of transaction banking solutions to the global financial services industry - on Wednesday launched “PaySe”, an offline smart digital solution that could potentially democratise money.

PaySe - which is a play on the phrase ‘pay securely’ and denotes ‘cash’ in hindi language - could also address the challenges faced by banks and microfinance institutions in making basic banking services accessible to the unbanked, Ashutosh Pande, Executive Vice President, Nucleus Software said.

“We are bringing in a technology that could help banks provide efficient services for financial inclusion”, said Pande, who is the Founder and Chief Innovation Officer, PaySe.

This solution comprises of three components - PaySe processing system (a platform that digitises cash); PalmATM (a bank teller application allowing smartphone to perform functions of an ATM including the ability to withdraw and deposit) and ‘Purse’ (a mobile device to carry digital money).

“PaySe has been developed to primarily address the requirements of citizens at the bottom of the pyramid. It does not mean the solution is only for those at the bottom of the pyramid. PaySe will revolutionise the way money is saved, carried and spent. Not only does it have the capability to facilitate online withdrawals and deposits, but also enables completely offline usage like cash”, Pande said.

This peer-to-peer digital solution has potential to revolutionise banking and is going to save money for individual users, save cost for banks and increase the velocity of money in the economy, he said.

“Just like democratisation of music was possible because of ability to rip music, the PaySe platform makes it possible to rip currency and make it digital”

The digital platform allows transaction history to be captured and allow banks to analyse data and provide loan products to unbanked.

As this is a peer-to-peer digital solution, there is also no levy of any fees. “When I make ₹ 100 payment to a merchant, he receives ₹ 100. That does not happen in the digital world till today. We have to face fancy words like merchant discount ratios, where card companies extract some money out before giving it to the merchant”, Pande noted.

PaySe comes across at different price points. While the consumer purse is being launched at ₹ 1,000, the merchant purse is being launched at ₹ 2,000.

Pande also said that all the mobile wallet providers can use the PaySe platform to provide offline solutions.

Plustek eScan A150 network scanner

The instructions are lacking, but persevere and the eScan A150 is a decent scanner with useful online features, ideal for digitising multi-page documents. There's some great third-party software thrown in too.

Pros: Compact, big screen with a good UI, can scan directly to major cloud services, includes Abbyy OCR software

Cons: Convoluted initial set-up, no Ethernet cable included, very light colours aren't detected


Maximum resolution: 600dpi
Automatic document feeder capacity: 50 sheets
Scanning speed: Up to 17ppm/34ppm
Scanning area: 13.2x13.2mm to 216x356mm
Paper size: 50.8x50.8mm to 244x356mm
Connectivity: WiFi, Ethernet, USB 2.0
Display: 7in IPS touchscreen at 1280x800
Processor: RK3188 Cortex A9 quad-core GPU at 1.6GHz
Dimensions: 318x170x189mm
Weight: 2.8kg

Keep sharing this information with your friends too.

Ransomware - Malware

Ransomware is a type of malware that compromises computer systems, thereby restricting access to it or making files unusable until the user pays the demanded amount of money to the attacker or to the creator of the malware.

Ransomwares are capable of disrupting the operations of major enterprises or small businesses, as well as potentially wiping out individuals’ personal documents.

Latest Ransomware Threats:

The ransomware family has rapidly grown with many new players such as Cryptowall, TeslaCrypt, LinuxEncoder creating havoc in Indian geographic region by gaining control of critical computer systems until a ransom is paid. Predominantly targeted towards gamers, the latest version of these malwares are now effectively being used to target Indian businesses & individuals.

When a victim visits a compromised website or downloads untrusted email attachments, the virus uses vulnerabilities in the browser (usually in plugins) or unpatched software’s/operating system to install Ransomware in the system & encrypts the victim’s files rendering them inaccessible.

It also displays warning indicating that the computer’s files have been encrypted & a set of detailed instructions on ransom payment modes to recover the files. However, there is no guarantee that the victims can recover the files even after making the payment.

Keep sharing this information with your friends too.

Tuesday, February 3, 2015



Encryption is the process of transforming information using an algorithm called a cipher to make it unreadable to anyone except those who have special knowledge, refereed to as a key.

Encryption Needs and Usage:-

1. Encryption is generally required for securing communication. 

2. It Requires when two parties are communicating and do not want third party to listen in. 

3. The objective of Encryption is to protect the company and its assets from hackers. 

4. The best way to prevent others from snooping on your communication or accessing you private data is to use strong encryption

5. Encryption Locks data with Key, so that only someone with a suitable key can unlock it. 

6. Encryption protects information as it passes through a network and resides on computer.

7. It ensures the information is received by correct entity and is not modified during transmission.

# The main parts of Encryption is Algorithm and Keys.

1. Algorithm used in computer systems are complex mathematical formulas which dictate how the plain text will be turned in to cipher text.

2. Key is a string of random bits that will be used by the algorithm too add to the randomness of the encryption process.

 # For two entities to communicate via encryption, they must use the same algorithm and same key.       

# Ciphertext - Message altered to be unreadable by anyone except the intended recipients.


The Plain text is " My Name is John"

The ciphertect is "NDHCBOLMYIGTVDRS"

Encryption Methods and Protocols:-  

The actual process and algorithms by which encryption technologies and software use differ. The current standard specification  for encrypting electronic data is Advanced Encryption Standard (AES) 

Symmetric VS Asymmetric Key Algorithm 

Symmetric Key Algorithm-  It uses related often identical keys to both encrypt and then decrypt information. This is generally known as shared secret between two or more parties.

Asymmetric Key Algorithm- It use different keys to encrypt and decrypt information. One key encrypt or locks information while other key decrypt or unlocks it. This is generally known as Public/Private Key. The Public key can be shred openly. Private key should not. In most cryptographic systems, it is extremely difficult to determine the private key values based on Public key. 

How Encryption Works:-

Using Public/Private keys, the lock/unlock algorithm can go two ways. John can encrypt some bit of information with Maria's public key and then send to Maria. Only holder of Maria's private key should be able to decrypt and read the message. On other side John could encrypt some bit of information with his own private key and if anyone is world want to read message, they would have to use John's public key to do so which means that message must have come from John.

Tuesday, January 27, 2015

Domain User Login Process

Domain User Login Process 

Many of us as Windows Server Engineer knows and aware well about how to make Domain, How to join a PC to Domain. How to troubleshoot about slow login process. But very few from us as Engineer knows and think about what exactly process runs in background when user logins to a Domain. It takes few seconds to login but in this few seconds lots of process runs in background. Let us try to see and understand what exactly happens in background when user logins.

When User Logon to Workstation below steps happens:-

When a user enters his password and hits enter key, the Kerberos Client on his Workstation converts his password to an encryption key. Kerberos is based on concept of symmetric encryption keys, means same keys were used to encrypt and decrypt message. This also referred as Share private key.

After Kerberos Client converted User's password to an encryption key, its saves in Workstation's credential cache. The Workstation than sent an authentication request to DC or KDC (Key Distribution Center). The authentication request identifies User, and names the service that user is requesting access to, and some per-authentication data, which proves that User knows password. 
First portion of Authentication request identifies User and ask for access to TGS (Ticket Granting Service). TGS is service on KDC that issues tickets for access to other services. All of services within Kerberos  domain trust the TGS, so they know if ticket was issued by TGS, User successfully authenticated him/her self and is really who he/she claims to be. The second part of authentication request contain the per-authentication data, and is a generic timestamp encrypted with User's long-term key.

When KDC receives authentication request, it checks the local AD database for User's password. Decrypts the per-authentication info that was sent in the package, and if the timestamp is within the permissible guidelines, it send User  TGT (Ticket Granting Ticket) that User is going to access TGS in future.When User's workstation receives a reply from the KDC, it decrypts the session ticket with User's password and stores same is credential cache.This is the authentication info that User's workstation will use to communicate with KDC from now onwards. Next time when User log on, session ticket will be completely different  as KDC does not use same session keys. The Workstation also extracts the TGT, which will still be encrypted with KDC's long term key.

This is the process which happens in background when User will hit Enter key after putting Username and Password.

Wednesday, January 14, 2015

Offline Domain Join

Offline Domain Join

Offline Domain Join is a new process for a computers running Windows 7 and Windows Server 2008 R2 that can use to join a Domain without contacting Domain Controller. This makes possible for Computers to join to a Domain in location where their is no connectivity to corporate network. 

A Domain Join establishes trust relationship between computer running Windows and Operating System and Active Directory Domain. This operation requires state changes to Active Directory Domain Services (AD DS) and state changes on computer that is joining in Domain. To join a computer in Domain in Past requires that Computer that joined in Domain is connected to Network and should be contactable to Domain Controller.


# Active Directory State Changes are completed without any Network traffic to the computer.

# The Computer state changes are completed without any Network traffic to a Domain Controller.

# Each set of changes can be completed at different time.


To Perform Offline Domain join run command by using new tool Djoin.exe. Run Djoin.Exe to provision computer account data in to AD DS. You also need to insert Computer account data into windows directory of destination computer, Computer which you want to join in domain. The Offline Domain join does not required to complete in a specific period of time. The Computer account which is provisioned can remain in AD DS till administrator intervenes. 

Operating System:-

Note: You can run Djoin.exe only on a computer running Windows 7 and Windows Server 2008 R2.  The Computer that you want to join in a Domain must also be running Windows 7 or Windows Server 2008 R2. By Default Djoin.exe command target Domain Controller running Windows Server 2008 R2. If you want to target Domain running previous version of Windows Server than Windows Server 2008 R2, you need to specify optional /downlevel  parameter.


To perform Offline Domain Join, You must have rights that requires to join workstation to Domain. Domain Admin Group members have this rights by default.

You can use Group Policy Management Console (GPMC)  to modify domain policy or to create new policy that has settings to grant User rights to join PC to Domain.

Steps to assign rights to user to join workstation to domain:-

1. Click Start, Administrative Tools and Click Group Policy Management.

2. Double Click name of Forest, Double Click name of Domain to which u want to join a computer. Right Click on Default Domain Policy and Click on Edit.

3. Double Click Computer Configuration, Double Click Policies, Double Click Windows Settings, Double Click Security Settings, Double Click Local Policies and Double Click User Rights Assignment.

4. In Details Pane, Double Click on Add Workstations to Domain.

5. Select Define these policy settings check box and Click Add User or Group.

6. Type name of account that you want to grant rights to add workstation to Domain and Click OK twice.

Steps to perform for Offline Domain Join:-

1. Run Djoin.exe/provision command to create computer account metadata for destination computer ( Computer which you want to join in Domain). You must specify name of Domain that you want computer to join as a part of this command.

2. Run Djoin.exe/requestODJ command to insert computer account metadata into windows directory of destination computer.

3. When u start destination computer after installing OS, Computer will be join in Domain which you specify.

Friday, January 9, 2015

FTP Server in Windows Server 2012

FTP Server in Windows Server 2012

Installation of FTP Server in Windows Server 2012

1. Open Server Manager Dashboard and Click on Manage and Add Roles and Features.


2. Next step contains Type of Installation. Select      Role-based or Featured-based Installation and Click Next.

3. Next Step if for selecting Server or Virtual HDD on which we want to install Roles and Features. Here we will select a Server  from Server pool to Select Local Server option and Click Next.

4. Next Step is to Select Roles to install. Select Web Server (IIS) role and Click Next.

5. Next Step is to install any Additional Features which you want to install and Click Next.

6. Click on Next again.

7. Select FTP Server Service as a part of IIS Features and Click on Next.