Several years ago, a young lady wearing a salwar kameez, walked into a quiet place in a hesitant way. The environment was fairly formal and the people in the place made her feel quite warm and comfortable. This was the first time she was meeting them.
Her father had already hinted that this might not be the usual type of conversation. After the initial formalities, the conversation shifted its focus towards the real reason why she was there.
The interview process:
She was working in a computer training center then and the leading person in the situation asked a few questions along these lines:
If you think, this was a technical interview, think again!
There were also other non-technical questions such as:
I am not sure whether you are able to figure out the lead questioner in the above conversation…. it was a would-be father-in-law and a would-be daughter-in-law having a conversation! 🙂
How did it happen?
Contrary to most other ways of getting married in India, this couple got married in a novel way. The parents, sister and the girl were called for an appointment to meet the prospective groom’s family! By a strange turn of events, they marched right into their house without thinking twice(normally, it is the groom’s family that marches into the girls house!) The would-be father-in law, mother-in-law and the groom’s grand mother were all present and the casual interview began!! 🙂
Only one obvious person asked the questions – while the two other members remained silent. A person of excellent mathematical and computer skills, it was not easy to get past the would-be father-in-law’s questioning. Word had it that he could crack integration problems with ease even at his age!
Most of the questions that he asked(like love/arranged marriage etc and the many technical computer questions absolutely threw the girl off! – who would go for a wedding discussion and answer questions about pointers in ‘C’?!! :)) It was the frankness and outspokenness of the father-in-law and the girl’s ability to answer them boldly that really sealed the interview.
The girl did crack the interview because she did marry the boy just a few months later! 🙂
And no prizes for trying to identify the characters in the above story! 🙂
For most of the Apple lovers possessing iPhones, iPods, Mac books and iPad and so on, this week was an exciting week as it saw the launch of the iPhone 8, iPhone 8S and iPhone X. How will the new iPhone X be? Pronounced iPhone ’10’ and not iPhone ‘X’, this is the thought for most of the world(if not all!) Till we can lay our hands on it or see someone who lays their hands on it 🙂 we can only surmise a few details as of now:
|Features of iPhone X||Description|
|Pre-orders starting date in India||October 27|
|Sales will start from||November 3 in India|
|Price of iPhone X||$ 999 and up|
89,000 Rs in India
|Display||5.8 inch OLED display|
Highest resolution display:
2436x1125 pixels at 458 pixels per inch
|Authentication||Face ID instead of Touch ID and NO home button|
|Appearance||Durable glass in the front and back|
Water and dust resistant
|Battery life||14 hours of Internet use|
|Processor||A11 Bionic chip(can manage 600 billion operations per second)|
6 core processor
|Camera||Dual 12MP TrueDepth cameras|
Planning to go somewhere? Try booking flights through ‘Makemytrip‘!!
The most interesting features of the iPhone X are:
iPhone user experience is always beautiful and in India where owning an iPhone(or any Apple product and any version) is a symbol of pride, it remains to be seen if the new iPhone X will live up to its standards. Most of the details and doubts will only be solved in due course of time – but one final question that is on everyone’s mind – is it too pricey even by Apple standards?
Thanks to Satish for his thoughts, suggestions and tips for this post!
Data that is passed “as-is”(without encryption) is prone to attacks by hackers and people with malicious intent. In order to pass critical financial information without being eavesdropped, it is crucial to encrypt all data. Encrypting communication allows one to pass credit card numbers, banking information and other sensitive details between the client and server and it is more secure. Encryption between the client and server is done by SSL/TLS. Before seeing which is a more secure protocol,we will first understand the terms SSL, TLS and HTTPS.
SSL is ‘Secure Sockets Layer‘ and it is used to secure the connection between the client and server. It makes use of public key encryption(when a public key may be used encrypt and private key may be used to decrypt – or it can work the other way around too) and it works at the transport layer of the OSI model. It provides data integrity, confidentiality for the connections between the client and server.
SSL is now known as TLS or ‘Transport layer security‘. It is again a cryptographic protocol that is used to encrypt all communication between client and server. SSL 3.0 officially became TLS and TLS 1.2 is the latest version. TLS is backward compatible to secure older SSL connections.
‘HTTPS’ is ‘Hyper text transfer protocol secure’. HTTP is the building block of the Internet. HTTPS is ‘HTTP’ secured with SSL/TLS. HTTPS is synonymous with security during transmission. Connections can be understood to be encrypted by seeing the padlock at the left hand corner of the screen or by seeing ‘https’ instead of ‘http’.
Now coming to the original question of which is more secure TLS is more secure as SSL has given way to TLS. But since communication security is still understood as SSL, it can be said that SSL/TLS is more secure.
Note: HTTP vs HTTPS image source: Google images
‘Diplomacy’ is defined as “the art of dealing with people in a sensitive and tactful way” and cyber diplomacy is a careful extension to that.
Social media is an absolute necessity for individuals, businesses and government organizations. Most major heads of state are present either on Facebook, Twitter and/or other social media platforms. Given the openness of social media platforms, interactions are easy at all levels with these social media channels. It is also easy for heads of state to carry out conversations with each other and/or with ordinary citizens.
I have always been a fan of history and particularly Indian history. India is a glorious and old country with a rich heritage. There are numerous temples and other architectural monuments all around the country which are several hundred years old. While I have never had the opportunity to visit the monuments in the Northern part of India, the temples at Hampi, Halebidu and Belur(in the southern part of India) hold a special place in my heart. Words and pictures do poor justice to the exotic monuments.Join me as I try to recreate the magic of ‘Belur’ in this post.
“Honeypots” in network security is a computer system which entices hackers to attack it. All ports are kept open on the system and the computer acts normally with its services(but in reality, it is isolated and monitored) The main idea behind setting up “honeypots” is used to study the motives of malicious individuals and track their actions.
It must be noted that none of the production systems are connected to the “honeypot” system and no vital business information is lost during the “honeypot” project.
Even as the Bitcoin fork is making news, and there is “Bitcoin” and “Bitcoin cash” now, we will deal with the elementary aspects of “Bitcoin” and “Blockchain” in this post.
“Bitcoin” first appeared in 2009, but they are much more prominent now, thanks be to better adoption by individuals and professionals. In this post, we will understand the meaning of the “Bitcoin” cryptocurrency, some basic terms related to it and the way it works.
Coming close on the heels of my previous post – “Dark web“, we will be defining “Deep web” in this blog post. Similar to “Dark web“, the “Deep web” cannot be searched by traditional search engines as well. So, what is present in this “Deep web”, which sounds so similar to “Dark web”? Here are a few features of the “Deep web”:
1. They cannot be indexed by popular search engines as well.
2. The “Deep web” has content that you do not want everyone to see. The “Deep web” contents are:bank account statements, contents of your email , medical information, academic information, databases and any dynamically generated information.
While “Dark web” is associated with illegal content, “Deep web” does not have that connotation.
3. In addition, it does not require special browsers to view it.
As seen in the previous blog post, surface web(the place where we mostly interact like Facebook, Twitter and other social media channels), the “Deep web” and the “Dark web” are best represented by an “iceberg”. The iceberg is the perfect representation of the amount of information that is visible to us (which is hardly any!)
Join me as I uncover more of the tangled web in Information Security! 🙂
“Dark web” which is not to be confused with “Deep web” is that part of the web which cannot be accessed by traditional search engines likes Google, Bing or Yahoo. In addition to this, it can only be accessed by special browsers like ‘Tor – the Onion router’ or ‘I2P'(Invisible Internet project). The “Tor router” enables anonymized browsing of the “dark web”.
“Dark web” domains end with “.onion” and are purposefully hidden from popular search engines. They are used to host a number of illegal activities.
Images source: Google images