Skip to main content

Posts

Showing posts from 2016

Normalization of Database

Database Normalisation is a technique of organizing the data in the database. Normalization is a systematic approach of decomposing tables to eliminate data redundancy and undesirable characteristics like Insertion, Update and Deletion Anamolies. It is a multi-step process that puts data into tabular form by removing duplicated data from the relation tables. Normalization is used for mainly two purpose, Eliminating reduntant(useless) data. Ensuring data dependencies make sense i.e data is logically stored. Problem Without Normalization Without Normalization, it becomes difficult to handle and update the database, without facing data loss. Insertion, Updation and Deletion Anamolies are very frequent if Database is not Normalized. To understand these anomalies let us take an example of  Student  table. S_id S_Name S_Address Subject_opted 401 Adam Noida Bio 402 Alex Panipat Maths 403 Stuart Jammu Maths 404 Adam Noida Physics Updation Anamoly :  To upda...

File systems (FAT, FAT8, FAT16, FAT32 and NTFS)

The precise manner in which data is organised on a hard disk drive is determined by the file system used. File systems are generally operating system dependent. However, since it is the most widely used PC operating system, most other operating systems’ file systems are at least read-compatible with Microsoft Windows. The FAT file system was first introduced in the days of MS-DOS way back in 1981. The purpose of the File Allocation Table is to provide the mapping between clusters – the basic unit of logical storage on a disk at the operating system level – and the physical location of data in terms of cylinders, tracks and sectors – the form of addressing used by the drive’s hardware controller.  The FAT contains an entry for every file stored on the volume that contains the address of the file’s starting cluster. Each cluster contains a pointer to the next cluster in the file, or an end-of-file indicator at (0xFFFF), which indicates that this cluster is the end of the file...

What is a Darknet?

Under development for years and in use for reported thousands (maybe more), the definition of this ‘secret Internet has been elusive as its evolution is user-defined and built. This shifting innovation landscape results in frequent new concepts on how to apply Darknet technology and further navigate the future of cloaked or otherwise ‘deep’ network relations. As defined by Wikipedia: “A Darknet is an overlay network that can only be accessed with specific software, configurations, or authorization, often using non-standard communications protocols and ports. The purpose of of darknets is motivated by the desire to hide content, or even the existence of data and communication, from competing business or government interests. The most widespread darknets are governmental and corporate intranets, the use of which is a standard security practice nowadays, friend-to-friend networks (usually used for file sharing with a peer-to-peer connection) and privacy networks such as Tor.” The no...

HTTPS and HTTP Difference

You click to check out at an online merchant. Suddenly your browser address bar says HTTPS  instead of HTTP. What's going on? Is your credit card information safe? Good news. Your information is safe. The website you are working with has made sure that no one can steal your information. Instead of HyperText Transfer Protocol (HTTP), this website uses  HyperText Transfer Protocol Secure . Using HTTPS, the computers agree on a "code" between them, and then they scramble the messages using that "code" so that no one in between can read them. This keeps your information safe from hackers. They use the "code" on a  Secure Sockets Layer (SSL) , sometimes called Transport Layer Security (TLS) to send the information back and forth. How Does HTTP Work? In the beginning, network administrators had to figure out how to share the information they put out on the Internet. They agreed on a procedure for exchanging information and called it HyperT...