Skip to main content

Posts

Showing posts from 2022

How to use WMI from a .NET Application

To start with, let us see what is WMI and what it offers. WMI is an acronym for Windows Management Instrumentation, which is basically an interface to the Windows OS system settings, drivers, and parameters. It also allows managing Windows personal computers and servers through it. A .NET developer can use WMI to obtain information about drivers installed on the client machine, verify whether the system is licensed or not, check for hardware configuration and a lot more. Quoting Linus Torvalds, “Talk is cheap. Show me the code”, let’s get to the basics of WMI usage. To get data through WMI, a SQL-like query is used. The specific query type is called WQL (WMI Query Language). Don’t let the name confuse you. It is still very similar to SQL. Before diving into code, you should know that Windows comes with a tool called WMI Test Tool, which lets you test WQL queries, to check their correctness and returned results. It is a bit harder to track wrong query results in code, so this tool can s

Powercube multi socket adapter by allocacoc review

A very useful utility when you are traveling or at home where you have limited power socket outlets. Powercube multi-socket adapter has 4 number of 3 pin female socket ports & 2 female usb A charging sockets. This is a boon for travelers and gadget freaks that have a lot of devices that require to be charged. This is also useful when you have limited power sockets at home and you dont want to deal with the messy power strips or wired flex boxes ! Created By Madhukar Rupakumar https://techbytes-madhukar.com  https://krmadhukar.blogspot.com   Powercube adapter Amazon link - https://amzn.to/3Wax0ah   Usb A to C female converter from Wayona Amazon link - https://amzn.to/3Wax0ah My LinkTree -  https://linktr.ee/krmadhukar     Follow me on below Social media platforms: Youtube, Twitter, Instagram: krmadhukar  my FB page: https://www.facebook.com/https://www.facebook.com/MadhukarKRupakumar

My Amazon.in shopping | FireTV Stick 4K Max Unboxing & Overview

I went ahead & bought the Amazon FireTV stick 4K max in this season's Amazon great Indian festival sale. I have 2 televisions at home. One is the Google TV which is the latest software on a Sony 4K  KD-55X80AJ. The other one is a 43 inches Sony 4K TV with 200 Hz refresh rate which was a great purchase that continues to serve me very well till today since 6-7 years. However, its software had gone a bit old now it being Android TV. Hence I went ahead with this purchase. Checkout out more details about it in the video. Here is the link to buy the FireTV 4K Max.

Happy to share my certificate of completion for API Security Architect

 Happy to share my certificate of completion for API Security Architect provided by API academy Certification program .  

Secrets of a successful presentation

1. Practice makes you perfect. If you want to improve your presentation skills, keep practicing, and do more presentations. 2. Your main objective of most presentations is to motivate the audience or convey the message/content you have created clearly. For this, you need to understand what the audience wants and deliver the content nicely to create an impression. 3. It is important to understand your audience and then deliver the content. Don’t deliver the content based on what you know, understand the audience, and prepare/tune/customize the content. 4. If you are meeting the executives, you should be ready with the elevator pitch. Every executive is different and you need to understand what they like, what they don’t like, and their priorities. Tune your content to meet the executive personality and needs. 5. When you structure the presentation, opening, messaging, and closing are the 3 phases. When you open the presentation, try and convey to the audience what is in it for

Difference between Authentication & Authorization

Authentification can be defined as the verification of a claim of identity by a user, a process, or a device, often as a prerequisite to granting it access to resources within a system.  This can be done once or many times during a particular session, workday or other period of activity consisting of multiple steps & tasks. Authorization is the real-time decision that a system-issued identity claiming to have access rights to that system can be verified to be a (a) System-issued valid identity which is (b) being used or presented by the subject it has been issued to. Simply put, authentication is the process of verifying who someone is, whereas authorization is the process of verifying what specific applications, files & data a user has access to. courtesy: http://medium.com

Difference Between a Data Leak and a Data Breach

  A   data breach is the outcome of a planned cyber attack , but a data leak is the accidental exposure of sensitive data by a business. Cybercriminals do not create data leaks, they discover them and then use them to launch data breach attacks.   Data leaks tend to result from poor security practices. A business can also be impacted if any of its vendors have a data leak. Because these vulnerabilities occur throughout a vast attack landscape they’re difficult to detect and remediate before it’s too late.  Without a sophisticated data protection solution, businesses will remain vulnerable to data breaches through their third-party network. Courtesy - www.upgaurd.com 

Type or Category or Classification of Design Patterns

 Type or Category or Classification of Design Patterns Creational   Based on the concept of creating an object.     Class       Factory Method This makes an instance of several derived classes based on interfaced data or events.     Object       Abstract Factory Creates an instance of several families of classes without detailing concrete classes.       Builder Separates object construction from its representation, always creates the same type of object.       Prototype A fully initialized instance used for copying or cloning.       Singleton A class with only a single instance with global access points.                    Structural   Based on the idea of building blocks of objects.     Class       Adapter Match interfaces of different classes therefore classes can work together despite incompatible interfaces.     Object       Adapter Match interfaces of different classes therefore classes can work together despite incompatible interfaces.       Bridge Separates an object's inter

Difference between webstorage, cookie, local storage & session storage

WebStorage The Window object implements the WindowLocalStorage and WindowSessionStorage objects which has localStorage(window.localStorage) and sessionStorage(window.sessionStorage) properties respectively. These properties create an instance of the Storage object, through which data items can be set, retrieved and removed for a specific domain and storage type (session or local). For example, you can read and write on local storage objects as below localStorage.setItem('logo', document.getElementById('logo').value); localStorage.getItem('logo'); What are the differences between cookie, local storage and session storage Below are some of the differences between cookie, local storage and session storage, Feature Cookie Local storage Session storage Accessed on client or server side Both server-side & client-side client-side only client-side only Lifetime As configured using Expires option until deleted until tab is closed SSL support Supported Not supported N

Cloud Computing basics

SaaS - Software as a Service is on-demand access to ready-to-use, cloud-hosted application software. E.g. Google Docs, Google Form, Google Spreadsheet.  PaaS - Platform as a Service is on-demand access to a complete, ready-to-use, cloud-hosted platform for developing, running, maintaining, and managing applications. E.g. Amazon EC2 T2 Micro instances 1 GB memory & 1 vCPU under free tier, Microsoft Azure IaaS - Infrastructure as a Service The service provides all of the infrastructures to the business. It provides on-demand access to cloud-hosted physical and virtual servers, storage, and networking - the backend IT infrastructure for running applications and workloads in the cloud. E.g. host.com that provides dedicated servers to organizations. VMware offers support for IaaS for carving out a system rack, network storage & computer into an isolated system for customers. StaaS - Storage as a Service E.g. Carbonite, Amazon S3 Storage as a service (STaaS) is a data storage busines

Top Competitive exams in India for students & professionals

I have compiled this list of some of the most prominent competitive entrance examinations for the benefit of students. (Source: Wikipedia & the internet)   1. GRE The Graduate Record Examinations (GRE) is a standardized test that is an admissions requirement for many graduate schools in the United States and Canada and few in other countries. The GRE is owned and administered by Educational Testing Service (ETS) MBA GRE score can be used for MBA programs in some schools. The GMAT (Graduate Management Admission Test) is a computer-adaptive standardized test in mathematics and the English language for measuring aptitude to succeed academically in graduate business studies. Business schools commonly use the test as one of many selection criteria for admission into an MBA program. Starting in 2009, many business schools began accepting the GRE in lieu of a GMAT score. Policies varied widely for several years. However, as of the 2014–2015 admissions season, most business schools accept