Cryptocurrency heard a lot but what is it ???

Blockchain

Today when we all are trying to get back to our normal lives after the struck of the pandemic COVID19, there is still something more which we are reading daily but not understanding it i.e. Cryptocurrency.

Although Cryptocurrency is an ocean itself, here we are trying to understand the basis of it, lets see some technical terms related to cryptocurrency.

What is Cryptocurrency?

Cryptocurrency is a type of digital currency which uses digital files as money.

What is BitCoin?

Bitcoin is the best known cryptocurrency.

What are the Types of Cryptocurrency?

There are many types of cryptocurrency such as BitCoin, Ethereum, Ripple, Tether, Shiba, Sandbox etc.

Bitcoin is the best known cryptocurrency whereas a cryptocurrency is a medium of exchange.

What is Blockchain Technology?

Blockchain is a type of security in cryptography where it uses cryptography encryption to protect every transaction.

In technical terms, blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s ledger.

What is the role of Blockchain in cryptocurrency?

Blockchain forms the bedrock for cryptocurrencies like Bitcoin. By spreading its operations across a network of computers, blockchain allows Bitcoin and other cryptocurrencies to operate without the need for a central authority, by this, it not only reduces the risk but also eliminates many of the processing and transaction fee.

If you want to know more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

SPLUNK..!!!!

Whenever we are in a group surrounded by Cyber experts somewhere or the other talk there is a discussion on this tool known as SPLUNK. Some get goosebumps and don’t understand what is this greek talking about either we start turning back our mind pages or mostly we do Google.

So here we talk about in gist as what exactly is SPLUNK:

SPLUNK

What is Splunk?

Splunk is a tool that is used for monitoring, searching, analyzing and visualizing machine-generated data in real-time. It helps improve velocity, quality and the business impact of app delivery. It is commonly used for information security and development operations and more advanced use cases for custom machines, the Internet of Things, and mobile devices.

How it Works?

It indexes and correlates information in a container that makes it searchable and possible to generate alerts, reports, and visualizations.

What is Splunk in DevOps?

For IT teams adopting DevOps, Splunk software helps improve velocity, quality, and app delivery’s business impact.

Splunk Products

Splunk is available in three different versions.

  • Splunk Enterprise
  • Splunk Light
  • Splunk Cloud

Splunk Processing Components

If you want to more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

What is SIEM vs SIAM?

SIEM vs SIAM

SIEM: Security Information and Event Management (SIEM) is a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure.

How do SIEM works?

It works by collecting log and event data generated by an organizations applications, security devices and host systems and bringing it together into a single centralized platform. SIEM gathers data from antivirus events, firewall logs and other locations; it sorts this data into categories, for example : malware activity and failed and successful logins. 

SIEM tool it identifies threat through a network security monitoring, which generates an alert and identifies a threat level based on predetermined rules set. Ex: If some user tries to log into an account 10 times in 10 minutes that is okay, but 100 times in 10 minutes might be flagged as an attempted attack.

By this, it detects threats and creates security alerts. SIEM’s custom dashboards and event management system improves investigative efficiency and reduces time wasted on false positives.

The threat detection element itself can help to detect threats in emails, cloud resources, applications, external threat intelligence sources and endpoints. This can include user and entity behaviour analytics (UEBA) which analyzes behaviours and activities to monitor for abnormal behaviours which could indicate a threat. It can also detect behaviour anomalies, lateral movement and compromised accounts.

Main features of SIEM

  • Threat Detection
  • Investigation
  • Time to respond

SIAM: Service Integration and Management (SIAM) is an approach to managing multiple suppliers of services (business services as well as information technology services) and integrating them to provide a single business-facing IT organization.

If you want to more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

CHINA Passes Personal Information Protection Law (PPPL)

Personal Information Protection Law (PPPL)

On 20th August 2021, China’s Standing Committee of the National People’s Congress has passed the Standing Committee of the National People’s Congress. This is the china’s first comprehensive data protection law.

This law which is passed is on the other jurisdictions’ omnibus data protection regimes, including the EU General Data Protection Regulation (“GDPR”). GDPR which stands for General Data Protection Regulation 2016/679 is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area that addresses the transfer of personal data outside the EU and EEA.

This law protects country’s efforts to regulate cyberspace and is expected to add more compliance requirements for companies in the country. It states the handling of personal information that must have clear and reasonable purpose and shall be limited to the “minimum scope necessary to achieve the goals of handling” data.

This also lays out conditions for which companies can collect personal data, including obtaining an individual’s consent, as well as laying out guidelines for ensuring data protection when data is transferred outside the country.

This law is effective from November 01st 2021, for more information on the above blog”, click here.

DocTooLss

We at DocTooLss are certified by AWS & Azure certificates and day in & day out make ourselves well versed with the AWS & Azure ongoing cloud services.

We can even assist our clients in understanding the cloud & the services provided by them, so no need to go anywhere or pay a huge amount of money on online big educational institutions. Just drop an email to info@doctoolss.com or contact the undersigned .

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

Azure vs AWS (Battle for the No.1 Spot)…!!

AWS vs Azure

Day in day out we talk about the cloud and the services provided by them. The market today is led by AWS followed by Azure and catching up are GCP (Google Cloud Platform).

There are around 160+ services provided by AWS and counts are adding up whereas in Azure the services are lesser than AWS but are also getting added up with time.

Let’s have a sneek peek at some of the important services by these market leaders:

AWS EC2 Vs Azure VM

AWS EC2 Instance Vs Azure VM Scale Sets

AWS S3 Vs Azure Blob Storage

AWS Lambda/Fargate Vs Azure Functions

AWS Beanstalk Vs Azure App Service

AWS SQS Vs Azure Queue Storage

AWS ELB (Elastic Load Balancer) Vs Azure Load Balancer

AWS VPN Vs Azure Virtual Network

AWS DynamoDB Vs Azure Cosmos DB

AWS Shield Vs Azure DDoS

AWS RDS Vs Azure SQL DB

AWS Red Shift Vs Azure Synapse Analytics

AWS Rekognition/Lex/Polly/Transcribe Vs Azure Cognitive Service

For more information on the above AWS services, click here

For more information on the above Azure services, click here

We at DocTooLss are certified by AWS & Azure certificates and day in & day out make ourselves well versed with the AWS & Azure ongoing cloud services.

We can even assist our clients in understanding the cloud & the services provided by them, so no need to go anywhere or pay a huge amount of money on online big educational institutions. Just drop an email to info@doctoolss.com or contact the undersigned .

DocTooLss

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

STRRAT data-stealing malware now posing as a Ransomware…!!

Malware Attack

Amid the global pandemic here comes a new series of tweets from the OS giants Microsoft, where they have warned with a “massive email campaign; that’s pushing of a Java-based STRRAT malware to steal confidential data from infected systems while disguising itself as a ransomware infection.”

STRRAT whic is a java based remote access tool which steals browser credentials, logs keystrokes and takes remote control of infected systems—all typical behaviors of RATs, MSI researchers described in documentation posted on GitHub about the malware.

This is a malware that has a unique feature i.e. “its a ransomware encryption/decryption module” that changes file names in a way that would suggest encryption is the next step.

How does it cause a damage?

Attackers used compromised email accounts to send several different emails. Some of the messages use the subject line “Outgoing Payments.”

STRRAT has first emerged in the threat landscape in June 2020, observing the Windows malware (version 1.2) in phishing emails containing malicious Jar (or Java Archive) attachments.

For more information on these, click here

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

The technology behind RoBooCoP…!

RoboTss

As we go around the globe we see that we all are facing this pandemic situation even now when we are near to the mid of 2021 but we still are facing this crises caused by COVID19 . We at DocTooLss believe that all our readers and followers are staying at home & following the COVID SMS rule i.e.

SMS Rule

  • Social Distancing
  • Masking
  • Sanitizing

So now coming to our topic of Robotic technology , I guess we would be aware about Star Trek movies , The Robocop series or during our childhood we must have seen technology based cartoons such as “The Jetson’s” which use to get aired on “Cartoon Network” or the stone age cartoon “The Flintstones” which was just a opposite of “The Jetson’s”.

Now in 2021 we have come across with many robotic technology based machines and could even purchase from our very own e-commerce website Amazon.com

There are robotic based vacuum cleaners, the automatic drones, Alexa, Siri the voice assistance are some of the examples in AI and Machine Leaning technology .

What are Robots?

Robots are the intersection of science, engineering and technology that produces machines.

Types of Robots

Pre-Programmed Robots

Humanoid Robots

Autonomous Robots

 Teleoperated Robots

Augmenting Robots

Uses of Robots

Manufacturing

Logistics

Home

Travel

Healthcare

Differences between Cobots & Robots 

Cobots are designed to work alongside human employees, whereas industrial robots work on their own. A cobot can assist human employees. Whereas, industrial robots are used to automate the manufacturing process independently without any intervention from humans.

For more information on these devices, click here

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

Let’s Dig Down in AWS…!!

EC2 by AWS

As we know that there are many services which are offered by AWS , lets pick few and try to understand their usage and utility it has for us:

AWS EC 2 (Virtual Servers on Cloud)

  • EC2 stands for Elastic Compute Cloud
  • It is one of the most famous offerings by AWS
  • It is a IaaS platform
  • It is basically renting of VMs
  • Storing data on Virtual Drives (EBS , ELB) and Distributing load across machines
  • Scaling of service using an auto-scaling group (ASG)

There are wide variety of Amazon EC2 Instance types comprise varying combinations of CPU, memory, storage, and networking capacity that gives you the flexibility to choose the appropriate mix of resources for your applications.

Each instance type includes one or more instance sizes, allow you to scale your resources either up or down and in or out to the requirements of your target workload.

Types of EC2 Instance Types

  • General Purpose
  • Memory Optimized
  • Compute Optimized
  • Accelerated Computing
  • Storage Optimized
InstancevCPU*CPU Credits / hourMem (GiB) StorageNetwork Performance
t2.nano130.5EBS-OnlyLow
t2.micro161EBS-OnlyLow to Moderate
t2.small1122EBS-OnlyLow to Moderate
t2.medium2244EBS-OnlyLow to Moderate
t2.large2368EBS-OnlyLow to Moderate
t2.xlarge45416EBS-OnlyModerate
t2.2xlarge88132EBS-OnlyModerate

T2 instances – General Purpose Instance

Source: AWS Website , for more information, click here

EC2 Purchase Options

  • On-Demand Instance
  • Reserved Instance, Convertible Instance and Scheduled Reserve Instance
  • Spot Instance
  • Dedicated Hosts and Dedicated Instance

For more information on these, contact the undersigned

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

What is EC2 Image Builder?

EC2 Image Builder is a fully managed AWS service that makes it easier to automate the creation, management, and deployment of customized, secure, and up-to-date “golden” server images that are pre-installed and pre-configured with software and settings to meet specific IT standards.

The guided steps by EC2 Image Builder:

  • Provide starting artifacts
  • Add and remove software
  • Customize settings and scripts
  • Run selected tests
  • Distribute images to AWS Regions

Features of EC2 Image Builder

  1. Increase productivity and reduce operations for building compliant and up-to-date images
  2. Increase service uptime
  3. Raise the security bar for deployments
  4. Centralized enforcement and lineage tracking
  5. Simplified sharing of images across AWS accounts

For more information on these devices, click here

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

Website Built with WordPress.com.

Up ↑

Create your website with WordPress.com
Get started