Wednesday, 14 February 2018

How to make a Bootable USB?

Firstly, after reading this word the thing is come up in mind is that what is meant by BOOT? That’s why without wasting my time first I will explain the word boot. The meaning of boot in the computer point of view is “Load”. Basically, the computer uses this word boot to load the operating system in the computer. There are different ways to load the operating system in the computer. Through
  • USB
  • CD/DVD
  • Online through internet

CD is the most common way to load the operating system in the computer. Because all the computer has CD room. But the problem is raise when the companies made the notebook computers without there are only two ways here to load the operating system in the computer the first one is online through internet and the other one is USB. The first one through the internet is difficult one. Then the option is here to the USB. That’s why we use Bootable USB to load the operating system in the computer. In this Blog I am going to teach you How to make the Bootable USB?

If you just follow my steps then it is the easiest work for done.
Step: 1
Insert your USB in computer in the USB port. Make shower that your USB capacity should be more then 8GB. Because the operating system not support the USBs that are less then 8GB.

Fig-1


 Step: 2
After this your computer show your USB. Your USB locates with the drives of your computer then right click on the USB drive. This act opens a Pop-Up menu of the USB.

Fig-2

Step: 3
In the pop-up menu some options are listed. In these options Format is one option you just click on the format option. It is necessary to delete all files in your USB. Because the files that are placed in the USB are affected when you boot your USB.

Fig-3

Step: 4
When you will click on the Format option a small window will open in this window some options are given in these options the first one is capacity of your USB used space of USB and the file system of your USB with two buttons. The first button is start and other one cancel. You just click the start the button. It starts the process to delete the files from your USB.


Fig-4

Step: 5
Know your USB is empty. Know we need to download a software rufus. Click the download below:

Step: 6
After downloading the rufus software then install it.
Fig-5

Step: 7
After installing the rufus it opens a window on your screen. Like below:


Fig-6

Step: 8
On this window the first heading is your USB name and size is displayed. After this partition scheme and target system type is label and these partitions must match with the picture above.

Step: 9
Know you just click the dropdown button in the right side of the window. And click the iso img in the dropdown list.
Fig-7

Step: 10
After that you will click the CD icon that is placed front of iso img.


Fig-8

Step: 11
After clicking the button, you just find the location where you save your iso img. And select it


Fig-9

Step: 12
Know you wait to complete the loading session


Fig-10

Step: 12
When its done click the ok and end this process.


Fig-11

Know your USB is Bootable and you can install window in notebook laptops easily through this bootable USB.
If you face any problem then comment below I will help you.

Monday, 30 October 2017

Cryptography
Network security is archived by the cryptography. This is the science based on the abstract algebra. In this article, we will discuss the short terms and also discuss the security of the data that is transferred in a network.

Introduction
First, we will the definition of the cryptography.

Cryptography
Cryptography is a word of Greek origin means “secret writing”. However, we use this term in the science and art for the transform of the message to make them secure and immune to attack.

In the below pic I’ll show you the cryptography components


Plain-text and Cipher-text
The original message, before being transformed, is called a plain text. After the message is transformed this is called cipher text. An encryption algorithm is transformed the plain text to the cipher text. A decryption algorithm is used for decipher the message for the recipient.

Cipher
We refer to encryption and decryption algorithms as ciphers. The term cipher is also used to the different categories of the algorithms in cryptography. This is not to say that every sender and the receiver needs their very unique cipher for a secure communication. On the other side one cipher can serve on millions of communication pairs.

Two categories
we can divide the cipher algorithm in to two groups: symmetric key (also called secret Key) cryptography algorithms and the other is Asymmetric (also called public Key) cryptography algorithms.

Symmetric-key cryptography
In symmetric-key cryptography the same key is used for the both parties. In sender side sender use the and the encryption algorithm to encipher the data: on the other side the receiver use the same key and the decryption algorithm to decryption the data. 





Asymmetric-Key cryptography


In asymmetric cryptography there are two keys used: first one is the public key and the second is the private key. Public key is announced for the public and the private key is only for the receiver. When the message is just about be send the sender use the public key and encryption the data on the other side receiver use the private key and decryption the data.



Comparison
Let us compare symmetric-key and asymmetric –key cryptography.Encryption can be thought of as electronic locking; decryption as electronic unlocking. The sender puts the message in a box and locks the box by using a key; the receiver  unlocks the box with a key and takes out the message. The difference lies in the mechanism of the locking and unlocking and the type of keys used.
In symmetric-Key cryptography, the same key locks and unlocks the box. In asymmetric-key cryptography , one key locks the box, the another is needed to unlock the box.

The security is necessary in the every work of life. Because we all want privacy with our matters. We don’t want that some one interrupt in our work or personal matters. And also computer network is our own privacy that’s why we want that our data keeps safe and secure without any pugs, harm and attacked.

Saturday, 28 October 2017

File Transfer

Transferring of data from one computer to the other is the one most common task in networking and inter-networking environment. As a matter of the fact, that greatest volume of data exchange in the Internet today is due to file transfer. We are going to discuss the most popular protocol on Internet that is File transfer Protocol.

Tuesday, 24 October 2017

Hot spot Technology


Today is the world of technology. Every person has their own mobile phone, laptop and iPod. People lives out of Pakistan or people in Pakistan in different cities they are connected through phone. Firstly we use the phones only for calls, massages and games only. But with the invention of internet we need internet with the phones. That was a very difficult for us but with development of the

Sunday, 22 October 2017

Transport Layer Protocol

The original TCP/IP protocol suit specifies two protocols for the transport layer: UDP and TCP. First we will discuss the UDP that is the simpler one then to the other TCP.A new third protocol is also design are STCP.

User Datagram Protocol (UDP):
The user datagram protocol (UDP) is also called as connectionless, unreliable transport protocol. It does not add anything to the services of IP except to process to process communication. If we say that, why would we want to use is it? There are many advantages of UDP other than disadvantages.

Thursday, 19 October 2017

Virtual LAN

LAN is a type of network. That we have studied.

A computer is considered as the part of the LAN if it is physically connected to the LAN. What happed if we want a virtual connection between two computers belonging to the two different LANs?

We can define the VLAN as:

Thursday, 12 October 2017

Network Backbones (Devices)

Two or more computer connected to each other makes a network. Computers are not individually connected to one another. Some other devices that connect and Internet, we call that devices network backbones. These make the LAN. Backbones help the network to share the data. Data that are share in a network are in different forms. Backbone devices work on highly complex data that is share in the network. Backbone devices are work on different layers of Network Model.