Intel Processor: Letters and Numbers Explained

 
Did you ever think about the Chip-set's name? You might think that these letters and numbers are given to the product just to make them appealing. No, this is not the case. Every letter and number of the processor make sense and have some meaning. 

These numbers are important to understand while choosing Desktop or Laptop. Generally, we care about the memory, type of hard disk, storage, or the version of the processor but we always miss the letters and numbers which come along the version of the processor. 

They are some laptops that are considered as gaming laptops, but the processor used in those laptops is for Ultra-Low Power use. One of the examples is HP Pavilion 16-AU627TX. It has,
  • Intel Core i7 (7th Generation)
  • 16 GB DDR4 RAM
  • 2 TB HDD
  • NVIDIA GeForce 940MX with 4GB memory

With all these specs this laptop costs around approx. $1200 (90k INR), but still does not have good performance. Because of the processor. Let us explain to you in detail.

Processor of above-mentioned Laptop

Intel® Core™ Processor Suffixes

Suffix

Meaning

G1 – G7

Graphics level (processors with new integrated graphics technology only)

E

Embedded

F

Requires discrete graphics (needs to add a graphic card)

G

Includes discrete graphics on package

H

High performance optimized for laptops (Recommended for Gaming)

HK

High performance optimized for laptops, unlocked

HQ

High performance optimized for mobile, Quad-core

K

Unlocked

S

Special edition

T

Power-optimized lifestyle (Consumes low power)

U

Power-efficient or Ultra-Low Power

Y

Extremely low power 

The above-mentioned version has U which means ultra-low performance, which is not good for gaming and/or high-performance work but still because of other specifications this laptop seems appealing.

Next time when you buy a Desktop/Laptop, do not forget to check these numbers as well and buy according to your need. 

DO NOT LET OTHER FOOL YOU!!

We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

  Did you ever think about the Chip-set's name? You might think that these letters and numbers are given to the product just...

Hack Sleep: Sleepwell or Sleepless

 
You might be thinking about there cannot be a thing like Sleep Hack, right? But wouldn't be great if we can control or 'hack' our sleep.
 
According to the scientist, eight hours of sleep is considered as healthy sleep and a human being need at least six hours of sleep. 

Sleep is a naturally recurring state of mind and body, characterized by altered consciousness, relatively inhibited sensory activity, reduced muscle activity and inhibition of nearly all voluntary muscles during rapid eye movement sleep, and reduced interactions with surroundings according to Wikipedia. In short, sleep gives you relaxation. 

But at some point, we had trouble sleeping or we do not want to sleep but our the body gives upon us. 

SLEEPWELL LIKE KOALA

  • Power down before going to bed: Dim the light like an hour before your sleep time. Reduce the use of smartphones, television, and keep your room dark. If you are using smartphones, laptops try to use Blue Light Filter or Night Light Mode ON. 
  • Exercise Regularly: The National Sleep Foundation of America did a survey in 2013. It says, adding a bit of physical exercise in your daily schedule will help you in your rest. Just try not to do exercise close to your bedtime.
  • Avoid heavy meals: Avoid heavy meals when it's late. Our body isn't meant to digest during our sleep. 
  • Make sure your mattress is comfortable.
  • Avoid drinking too many fluids: Drinking less before sleep will save you from midnight trips to pee. But do not dehydrate yourself before sleep.  
  • Less Caffeine: Quit Smoking and/or consumption of coffee/tea at night.

SLEEPLESS LIKE ELEPHANT

  • Coffee: Caffeine can help you awake but do not drink if you are feeling sleepy, in that condition, you will sleep faster.
  • Light: Let the light shine on you. Do not have dim lights. 
  • Eat a good breakfast
  • Take a nap during the day.
  • Get some exercise at night, something like walking for 10-15 minutes.

This method might help you or might not. This all is based on surveys and reports. This can vary from person to person.

We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

  You might be thinking about there cannot be a thing like Sleep Hack , right? But wouldn't be great if we can control or ...

OWASP Top 10 - 2017

The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop and maintain applications and APIs that can be trusted. All OWASP tools, documents, videos, presentations, and chapters are free and open-source to anyone interested in improving application security.  

OWASP is a new kind of organization. Their freedom from commercial pressures allows them to provide unbiased, practical, and cost-effective information about application security. 

The OWASP Top 10 focuses on identifying the most serious web application security risks for a broad array of organizations. 

A1:2017 - Injection

Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.

A2:2017 - Broken Authentication

Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities temporarily or permanently.

A3:2017 - Sensitive Data Exposure

Many web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and PII. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser.

A4:2017 - XML External Entities (XXE)

Many older or poorly configured XM processors evaluate external entity references with XML documents. External entities can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks.

A5:2017 - Broken Access Control 

Restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can exploit these flaws to access unauthorized functionality and/or data, such as access to other users' accounts, view sensitive files, modify other users' data, change access rights, etc.

A6:2017 - Security Misconfiguration

Security Misconfiguration is the most commonly seen issue. This is commonly a result of insecure default configurations, incomplete or ad hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose error messages containing sensitive information. Not only must all operating systems, frameworks, libraries, and applications be securely configured, but they must be patched and upgraded in a timely fashion.

A7:2017 - Cross-Site Scripting (XSS)

XSS flaws occur whenever an application includes untrusted data in a new web page without proper validation or escaping, or updates an existing web page with user-supplied data using a browser API that can create HTML or JavaScript. XSS allows attackers to execute scripts in the victim's browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites.

A8:2017 - Insecure Deserialization

Insecure deserialization often leads to remote code execution. Even if deserialization flaws do not result in remote code execution, they can be used to perform attacks, including replay attacks, injection attacks, and privilege escalation attacks.

A9:2017 - Using Components with known Vulnerabilities

Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover. Applications and APIs using components with known vulnerabilities may undermine application defenses and enable various attacks and impacts.

A10:2017 - Insufficient Logging and Monitoring

Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring. 
  
If you want to read more Download the official OWASP Report.
 The information mentioned is being taken from the 6th page of the above-mentioned PDF.
We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop and maintai...

Run Android Apps on PC

There are several reasons for emulating Android on a PC or Mac. It is often easier to test apps on a desktop than a mobile device, and for everyone else, there's the appeal of being able to play mobile games on a much larger screen.

Indeed, gaming is the most common reason for emulating Android on a desktop computer, though you can also use an emulator to run any app from the Google Play Store. For example, running the Instagram app in the emulator makes it possible to upload photos from your PC or Mac desktop – something that is otherwise impossible. 
BlueStacks App Player is perhaps the best-known Android emulator, and it's hardly surprising given its quality and reliability. BlueStacks has been designed with ease of use in mind and looks and feels just like Android on a tablet or smartphone. There are free and paid-for versions available. The free one includes some ads and the occasional sponsored app, but these are discreet. 

BlueStacks is primarily about games and the interface is essentially a front end for downloading and installing them, but it is also possible to visit the Google Play Store and search for other apps.
  • Download and Install BlueStacks.

  • Download the .apk file from the PlayStore. 

There are other emulators also:

We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

There are several reasons for emulating Android on a PC or Mac. It is often easier to ...

Free coupons for online shopping

Honey is a browser extension that purportedly helps you find the best price for your items by automatically price-matching items and automatically applying coupon codes.

One of the truths of the internet is that Amazon‘s prices operate on an inscrutable formula — they fluctuate and go on sale at somewhat arbitrary intervals. One of the benefits of Honey is that it offers a price history of items on Amazon, so you know if they are likely to go on sale at some point.
  • Install the Honey extension in whatever browser you are using. Honey works with just about every browser out there, including Chrome, Firefox, Edge, Safari, and Opera. All the screenshots further below are from the Chrome extension.

  • You’ll be prompted to create a Honey account. You can either use an email, or log in with Google, Facebook, or PayPal.
  • To use Honey’s coupon feature, just put things in your cart as usual. When you are ready to checkout, Honey’s browser icon will light up, showing you a button to apply coupon codes. Select this, and Honey will automatically run through every coupon code in its database to see if any of them will work. It can take a few moments depending on the store — Honey supports several thousand of them, as you can see here — but otherwise, it requires no work from you.


ALSO, CHECK:

  • https://www.joinhoney.com/trending/
  • https://www.couponzguru.com/amazon/
  • https://zoutons.com/top-coupons
  • https://www.grabon.in/coupon-codes/5167/
  • https://www.coupondunia.in/amazon
  • https://www.shopper.com/coupon-codes/amazon-in

We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

Honey is a browser extension that purportedly helps you find the best price for your items by automatically price-matching i...