Uncategorized

Childhood stress makes brain mature

Stress in early childhood due to negative experiences may lead to faster maturation of certain brain regions, during adolescence, a new study suggests.
The study found that these experiences cause faster maturation of the prefrontal cortex and amygdala- that also play a role in the control of emotions, in adolescence.
“From an evolutionary perspective, it is useful to mature faster if you grow up in a stressful environment. However, it also prevents the brain from adjusting to the current environment in a flexible way.
In contrast, stress experiences later in life such as low peer esteem at school, is connected to a slower maturation of the brain area hippo-campus and another part of the prefrontal cortex in teenage years, the researchers added.

Advertisements
Standard
Uncategorized

All about Facebook

Facebook has become the giant platform which has revolutionized the every sector of economy and country.

Nowadays, Facebook has become the No.1 social network with which anyone can share anything like their day-to-day life, Pictures, and media too.

Facebook was made by the person named “Mark Zukerberg”. Due to good programming skills and knowledge, he at last made it and now he is earning millions.

Now, Facebook is working on to build an AR (Augmented Reality) based project, which could give boost to the gaming sector, as more number of consoles, games and AR headsets would be sold out.

At last, I would conclude that with the help of Facebook we can connect with our friends, families and relatives.

But there are some demerits of it also. One can easily steal someone’s private information and even hack their account.

Standard
Uncategorized

Technology

Technology refers to that body of knowledge of information, knowledge of skills and experience which is developed for the production goods and services. It includes scientific and technical knowledge related to products, processes and methods of production; engineering knowledge required to design, develop, implement, produce, operate, install, service, maintain and adapt machinery.

p17d98f5st15qd1tsv1m9c1sbu11uo0_64674.jpg

InformationTechnology.jpg

 

 

Standard
Uncategorized

On Hacking

A white hat hacker breaks into system with explicit permission, to provide security against black hat hackers

The grey hat generally has the skills and intent of the white hat but will break into any system or network without permission.

Grey hat hackers are the computer hacker or computer security experts who violate laws, but do not have intent of a black hat hacker.

White hat hacker help others to help with their computer problems. Whereas a grey hat hacker is between a white hat and black hat hacker.

Fig. White hat hacker

Fig. Grey hat hacker

     

Fig. Black hat hacker

Black hat hackers are also known as Tracker . They perform illegal activities.

For beginners, python is a powerful language to learn hacking skills. Before that one must have a complete knowledge of C and C++ language. Then you must have networking skills,

Hacking is complete understanding of computers and computing. Its  also about exploring and joy of understanding. It is also about digging into problems and solving it.

What’s a Blackhat Hacker?

This content is taken from the magazine PC magazine dot com. A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers  are also known as crackers or dark-side hackers. The general view is that, while hackers build things, crackers break things. They are computer security hackers that break into computers and networks or also create computer viruses. The term “black hat” comes from old westerns where the bad guys usually wore black hats and the good guys wore white ones.

White hat hackers also identify security weaknesses; but, instead of performing malicious attacks and theft, they expose the security flaw in such a way as to alert the owner that there is a breach so they can fix it before a black hat hacker can take advantage of it. Though they often start out as black hat hackers,  white hat hackers sometimes are paid consultants or actual employees of a company that needs its systems protected. Other types of hackers include: blue hat hackers & gray hat hackers.  Blue hat hackers are security professionals that are invited by Microsoft to expose vulnerabilities in Windows products. Gray hat hackers are hackers that perform both malicious activities and helpful ones.

Standard