Skip to main content

Posts

Showing posts from 2015

New Programming Language, Do we really need ?

We have seen multiple new programming languages every year and question which is commonly asked is Will there always be new programming languages coming out? I believe  many new programming languages will keep coming and many are on the way. Technologies are evolving around us will make it fairly easy; everyday big corporation and tech individual/communities are making consistent progress towards technological advancement. If you observe every new programming language has one thing in common and that is they are based on software engineering principals, you will find same loop, iteration, conditional processing and stuff like that. What makes them different is Adoption, you can make your own programming language using other languages but it will only be popular when it can convince large tech community on the ground of Efficiency, Security, Agility, Portability, platform support etc. Wikipedia has impressive List of programming languages We have seen many languages in the past a

ipconfig/displaydns

Why does the aboave command prints URLs, Websites addresses that we have never accessed before ? When your system communicates with the DNS server for resolvingthe name queries, Your system builds the cache over the perios of time, This cache normally contains records from the host file and also the retrieved records from the recently resolved queries. Coming to the question that the site which were never accessed showing up there. DNS cache notes down positive and negative results as well. as you know caching is all about performance improvment. Now lets say you accessed Website1 and Website1 has some functionalities which makes it to communicate with Website2. Now Fortunately or unfortunately Website2 is blocked in your network and name query for this Website is not resolved. Still this unresolved queries will be recorded in DNS cache. I think those results are coming as they were initiated from your system implicitly. Issue this command to clean the DNS cache

Backend vs Frontend

Why did backend guys always feel superior over frontend guys? I have been on both side and have done both front-end development and back-end development for long time. Truth is in a web based product nothing is superior both complement each other. Think about the product which has sophisticated transaction processing system, better error handling,reliability and availability but lacks good user experience and poorly designed user interface. Consider user interface as front desk, no matter how good your back office processes are if front desk does not behave in respected manner nothing works. Coming to so called superior feeling of backend developers much of it can be largely attributed to technology stack, I think it’s better to say traditional technology stack. Normally engineer feel great when they deal with stuff which has fair amount of complexity and backend gives you that.Front end was nothing more than JAVA script, HTML and CSS, not counting tools and productivity solutions

Information Security Profile Questions

One of the friend asked this question in one of the popular forums, i thought I should keep copy of my answer in my blog as well. What sort of interview questions can be asked in information security profile? It depends on your role under information security profile, If you are ininformation security engineering role, questions will be more from tools andtechnologies and security audit and analysis methodologies. Questions may comefrom application security(OWASP TOP10), network security or computer forensics. In the corporate world no one expects an information security engineer to bemaster of all the security disciplines. Questions from different operating system techniques and popular web serversand information security architecture will be asked. Various operating system administrationdetails questions may surface. Vulnerability assessment is another topic whichcan be discussed. Security consultant as a profession itself is about being specialist notjournalist. So solid un

Google and Facebook's Data Center

I think Capacity wise Facebook is the good place to start as no other website has experienced kind of volume and traffic that Facebook has witnessed in the recent past. As you have not specified whether You want to know more about the infrastructure, security or you are interested in their operating model, staff size and remote site management? I would go with the general details. Facebook has multiple data centers around the world and the reason behind this is a common knowledge i.e huge volume of the data that FB process on daily basis. Facebook is currently the world’s most popular web site, with more than 1 trillion page views each month, according to metrics from Google’s DoubleClick service. Facebook currently accounts for about 9 percent of all Internet traffic, slightly more than Google, according to HitWise. This is the first data center of the Facebook in Prineville FB realized that they need many data centers in different locations to support the performance demand of

Microservices Architecture, A developer's Prespective

Microservices architecture addresses many concern of application development but does not solve all the problems. It has its own advantages and limitations. In order to understand it fully, we need to understand one common architecture pattern in practice, i.e. Monolithic Architecture Monolithic architecture are highly tightly coupled and you can’t change something without impacting other. Look at this building and tell me how easy it is to change Let’s take an example of an e-commerce website that has many components and services i.e. Order service Invoice service Payment services will talk to various payment gateways. User Administration services. Graphical user interface for web, WAP and for various mobile platform like android, iOS, blackberry etc. Database services, possibly more than one database will be involved. Now let’s see what are some common problems associated with it Ever Growing Container size Generally all these components are packaged in one

What is RSASecure ID and How it works

RSA SecureID is in use from long time, I think even before GPS. It uses two factor authentication mechanism. **RSA SecurID**, formerly referred to as **SecurID**, is a mechanism developed by Security Dynamics (later RSA Security and now RSA, The Security Division of EMC ( RSA Security )) for performing two-factor authentication ( Two-factor authentication ) for a user to a network resource. RSA secureID generates token which is then transmitted to the server where it is matched against the stored value in the server database. to understand it clearly we need to go through one use case and i hope that will make things pretty clear. This token can be transmitted using USB port or directly by user input. so 2 type of device is being used. John Smith joins a new company, According to new company's information security policy John is instructed to use RSASecureID to authenticate himself in corporate network. From the companies IT infrastructure department he got his brand new RS

Cryptocurrencies, what is it ?

Precious metal, exchange of goods have served as currency in the past, as human race advances and their knowledge of market, financial innovations surfaces. This time its about the Cryptographic currencies. You might have heard about Block Chain, Bitcoin, Titcoin, Primecoin etc.. all of them are digital way of exchanging values. These frameworks outlines how participants can exchange values securely. Security of transaction is very important as system without faith will not even last for seconds. It has to be time tested and robust. BTW Why we call it Cryptocurrencies ? digital because we do not need it in physical form, Cryptocurrencies because this whole thing is bullet proofed by Cryptographic system. Which supports encryption/decryption, public/private keys, transformation, block and stream ciphers almost everything that can make even a Geek to Freak. Is it Legal ? The whole idea is to make the value exchange system decentralized. Crptocurrencies are not regulated by Ce

Web Development Technologies, 2016 and Beyond

Its hard to arrive at conclusion in this wide and ever changing job market of IT industry but one thing is quite evident that now data is becoming highly critical and crucial to any business. Most of the recruitment are happening around 1. Dealing with data. (Web service, SOA, API's etc..) 2. Protecting Data (Protection of data at rest and at transit, Web development  Security, AppSec, Cyber Theft, Computer Forensics) 3. Analyzing data (BigData implementation platform, Hadoop, Stream Analytics and technologies supporting this platforms). Of course there are many other technologies which are highly paid but that have become quite saturated but form the above mentioned 3 points, let me try to get into the specific job titles 1. Web Application Development :  Application development which supports all the operating systems and possible hardware(s). Android, iOS, Smart watch and other devices. This include Web based and native app development. Front end development is also

Apple Siri's Architecture

Apple siri has evolved many times and each and every time it has managed to bounce back with solid capabilities, sky is the limit and we can only expect some or other kind of improvement in the architecture as the technology evolves. These guys have not given an inch to rivals. Apple Siri backend runs thousands of services and they are running on equal number of nodes. Siri’s Application data resides in HDFS (Hadoop distributed file system) cluster . Apple have created a proprietary PaaS-like scheduler framework named J.A.R.V.I.S. , which allows developers to deploy Siri services in a scalable and highly available manner. Apache Mesos is the one that Apple Siri is leveraging for backend cluster management, it serves the CPU, Memory and computing resources abstraction very well, to prove the capability, following is the data published by Apache Mesos Apache Mesos Features Scalability to 10,000s of nodes Fault-tolerant replicated master and slaves using ZooKeeper Support for