FREE AND OPEN SOURCE SOFTWARES FROM NASA

Hello my dear reader, Hope you are fine

In this writing,I am going to share about latest update from NASA, well I don’t think anybody not aware of NASA.the space exploration arm of United States. Engineers at NASA write  programs for the benefit of National Aeronautics and Space Administration. Some of the softwares are later been distributed as Open Source Softwares for the benefit of public.First installment of softwares was open for public distribution in April 2014 and now NASA has just published its 2017-2018 software catalog which is the third installment of the software. The software list comes both in hard copy and offline format.

Steve Jurczyk, an associate administrator for NASA’s Space Technology Mission Directorate (STMD) in Washington, informed that the software catalog is their way of supporting the innovation economy by granting access to tools to the entrepreneurs, small businesses, academia, and industry.”which is used by today’s top aerospace professionals.

 “Access to these software codes has the potential to generate tangible benefits that create American jobs, earn revenue and save lives.”

Dan Lockney, NASA’s Technology Transfer program executive, claimed that Softwares had played a significant role in NASA’s mission successes and scientific discoveries “Software has been a critical component of each of NASA’s mission successes and scientific discoveries. In fact, more than 30 percent of all reported NASA innovations are software.”

nasa

Here is some popular software that has been open sourced by NASA recently:

  1. Video Image Stabilization and Registration
  2. JP L’s Stereo Vision Software Suite
  3. CARES/LIFE
  4. What’s Up at Wallops (Android and iOS)
  5. Global Planetary Reference Models
  6. Worldview Satellite Imagery Browsing and Downloading Tool
  7. Lossless Hyper-/Multi-Spectral Data Compression Software
  8. CARES/LIFE
  9. PixelLearn
  10. NASA Root Cause Analysis Tool
  11. Cart3D

Well, if you want to try the software that is released under NASA’s Technology Transfer program, you need to visit this Software Link. For the complete list of tools that are released by NASA visit NASACATALOG.

Or Just click here —–>  Jagatprasad (for catalogue)  jagatprasad (for softwares)

Hope this information will be of some benefit.

Thanks for reading

Jagat

Email from Benedict Brown

Hello dear readers ,Hope you all are fine

Here I am sharing a latest scam and security issue for email users (mostly). A recent malware known as NUTRINO, considered to be one of the dangerous malwares knock your window by the name of Microsoft security expert (not in actual but posing themselves). Victim receive an email claim to be from ‘Benedict Brown’ representing Microsoft security Office telling the recepient that access to their bank accounts and cards has been blocked because of suspicious activity.

Email force you to click a link to download a report containing more details, and to read instructions to unblock your account. The report comes in word document and in order to read that report you will be asked to enable macros and doing so you permit the Nutrino to strike you PC and its working is very simple. Nutrino take sccreenshots of your PC and record what you type (as keylogger) and absorb your computer into a botnet. Nutrino is easy to handle by hackers so it is just a hotcake for them as it requires little knowledge of computer security. This scam is being discovered by Malwarebytes, acknowledge that criminal with zero coding knowledge can use Nutrino and it exploits programs that are known to be riddled with security flaws like adobe flash player.If you are using microsoft office 2007 you can be one of the victim.

What to do : Do not activate your macros unless you are well versed to it and use only when you are upto programming addons with microsoft office. If enabled, disable your macro from MS word etc.  secondly there is no Benedict Brown in Microsoft who is concerned about your personal account.(if such issue occured you will be notified on the account logging page itself and not in your mail address before your knowledge and in that case too you will be warned first)

Hope this will help you of being alert.

Thanks for reading

Jagat

How much safer are you with your antivirus

Hello my dear readers, Hope you people are fine,

I am sharing my post after couple of days due to busy schedule. We all are well aware of anti-viruses and their effectiveness since 1980’s when the term anti-virus was first establishing its name in the field of digital world. since then this word is jostling in the mind of computer users. In early years users did’nt gave  much weightage but as time passed and uses of computers and its applications increased, security measures to avoid any damage to softwares becomes a concern and the hence the importance of the antivirus was felt first. But a debate continued as to whether AVs are necessary or not. Sceptics sometimes blame security providers of hyperbolizing the issue. Some even reached to the extent of blame that the security companies create their own malwares and then put its crack later in market to establish and carry on their business. 

Former Firefox developer Robert O’ Callahan in his blog (www.snipca.com/23283) urged window 10 users to uninstall their antivirus saying that antivirus sellers are terrible. He recommended Windows defender as capable of any of the antivirus available in the market. This is what the topic I want to share over here. Yes, if the user is upto genuine windows and is having regular updates from Microsoft he/she must not be afraid of attacks or safety to maximum extent. Microsoft company itself worked and is working a lot in view of safety issues of the windows and utilities of Microsoft itself is providing all the common measures to keep its user safe and secure.

Why a big company like Microsoft will ignore such a major aspect of its product. As per former mozilla developer Antivirus hurt security significantly and poison other softwares of the windows as well. He draws on his own experience blaming AVs for blocking security updates to the browser which consumed major time of developer in fixing this. Security blogger Graham Cluley acknowledged that AVs sometimes suffered from its own flaws and vulnerablities. But people are crazy enough to use web without using one. In security lab test Microsoft defender did’nt overcome all security issues and failed in 10% but still it is recommended a better option than other rivals of the market. 

In my own experience, I tried to install one new AV as my old one getting expire a day after installation of new one and my new antivirus shows other as presence of virus. To my shock I tried to remove the files (vault backup) from my computer as there are chances when AVs put your infected files into their vault but still my new AV kept on showing my old one as virus. As per my view since XP is not being updated now from Microsoft and most of latest AVs do not offer any installation to XP hence safety of windows XP is on the verge of infection. Similarly windows vista and windows 7 too are vulnerable to an extent as these windows possess some old files which continued even in its latest versions too. Hence updating windows till windows 7 do not offer as much safety as required.Hence good antivirus becomes a necessity in this case. But windows 8 and 10 do provide a tough security to the sneakers if are updated to latest versions. 

In all I must say if your are using genuine windows with later versions your worry chances are reduced to large extent but still you can use antivirus with customized using capabilities for hastlefree browsing but pirated windows do need antivirus softwares from security point of view. Windows updates and availability of antivirus both are the need of hour as one cannot stay safe since thousands of attacks are being faced by your PC within an hour of your browsing in open world.

Thanks for reading

Jagat

Learn about types of Viruses

elk-cloner

Hello readers, hope you all are fine,

Dear ones as you all are using PCs in one or the other way, it is obvious that virus is one of the basic word which flashes through mind when we talk about PC problem. I am sharing my knowledge about the same :

What are viruses : Little programmes or scripts designed to lay digital garbage to your PC.when triggered it destroy data files or system files, some execute other unwanted software by providing smooth way to your system,some nefarious ones steal the confidential informations, some multiply themselves to slow down or full your PC with its own replicas even there are few which rig the system power load and cause to catch it a fire.

Virus is simply categorised into :

Replicators : A developer developed a game during nineties, in which when a fencer/ sword master hits a demon with his  sword and cuts the demon into pieces, as per programme not all but few bits of demon regenerated themselves in full demon again. Due to some erronous writing the programme transformed and not a few but all pieces of demon regenerated into a new full demon hence the demon kept on multiplying with every hit. thereby filling whole computer with single demon file and functioning of system stops. same is still existing in one or the other form.Good AV proves useful in controlling it.

Multi morphs : A genre of replicators/ multipliers, but these virus while making copy of its own change its programme little bit different from that of previous one and ultimately its functionally and spreads differently in different areas of PC. Every copy of new virus if forms is different from the parent. AV does not able to detect all hence this virus resides easily in the system.

Overwriting virus : these virus overwrite the programmes of the softwares and thereby making them to crash or malfunction. an overwriting virus destroys the oringinal file it infects. It does this by overwriting data in the system’s memory. The virus can be removed only by deleting the infected file. Often, cleaning an overwriting virus means losing the infected programs and reinstalling them.

Boot Sector Virus : Boot sector is a section in the system file which execute to boot the system. Boot sector virus hide inside the boot sector and execute itself before operating system starts and hence disallowing some programmes or even whole operating system to get started.

Residents : Virus which start itself with booting of machine are resident viruses. These virus don’t need any click to get started bu start itself with start of PC.It is able to do this because it stores and hides within the memory of the infected computer.

Non resident are those which needs to be executed by click or triggering some programme on the computer.

Mutlisector Virus : Also called multipartite virus , these kind of virus attacks both boot sector as well as system files as the same time infecting computer at serious levels. Because of this dual infection approach, the multipartite virus can re-infect the same system over and over again until fully eradicated.

The Macintosh didn’t release until 1984. However, the first virus for it was made by a 15 year old. Known as Elk Cloner, this virus infected the boot sector of Apple II computers. Interestingly, the first IBM PC virus (known as Brain) did not appear until 1986.

The field is quite vast this is only a drop, but still ,……..

Hope it will be helpful knowledge about virus

Thanks

Jagat

How to find – Websites, secretly connected to your computer

Hello dear friends, Hope you all are fine with health and happiness.

Sometimes we use better connections but still we get slow speed which is quite annoying,this things happens due to fact that malware, spyware or any adware using your internet behind the scenes resulting to slow data transfer on original requirement of speed. Here is the technique to know what is going behind the hood.

Third party firewall also provide feature of blocking unwanted connections unless to manage exclusion option for some sites.

netstat command from command prompt window is used to find the network statistics in details. This works in windows XP (out of date) and above i.e vista, 7,8,8.1 etc. In XP only service pack 2 is found to be responsive in this case. netstat command generate list of networks in systematic way in specified amount of time.

First of all log in your computer – window as an administrator (Any changes to the computer or information in the computer can be easily generated from Administrative log)ximg_53e314466c377-png-pagespeed-gpjpjwpjjsrjrprwricpmd-ic-iygyw7ynls

Window 8.x , command prompt is obtained by right clicking on desktop and choosing command prompt (Admin) option. Below 8, command prompt is entered by clicking start menu and entering “cmd.exe” in the search box. When the result display right click on cmd.exe and click run as administrator from popup menu.

2

If user account control Dialogue box appears click yes to continue.(User Account Dialogue Box may or may not appear depending upon your user settings).

4

Type the following command in the command prompt:

netstat -abf 5 > activity.txt

5

Here the  –a option shows all connections and listening ports,

–b option shows the application which is making the connection,

–f option displays the full DNS name for each connection option for easier

understanding of where the connections are being made to.

You can also use the –n option if you wish to only display the IP address.

The 5 option will poll every 5 seconds for connections to make it more easy to track what is going on, and the results are then piped into the activity.txt file.

Wait about two minutes and then press Ctrl + C to stop the recording of data.

Once  recording data is finished, Simply open the activity.txt file in your favorite editor to see the results, or type activity.txt at the command line to open it in Notepad.

The resulting file will list all processes on your computer (browsers, IM clients, email programs, etc.) that have made an internet connection in the last two minutes, or however long you waited before pressing Ctrl + C. It also lists which processes connected to which websites.

If you see process names or website addresses with which you are not familiar, you can search for “what is (name of unknown process)” in Google and see what it is. It may be a system function you don’t know about or a function of one of your running programs. However, if it seems like a bad site, Google helps you to get rid of it.

6

Some third party softwares are also handy in knowing and removing unwanted connections.

CURRPORTS and TCPVIEW are some of the common ones.

Thank you for bearing me ..

Jagat

Data Security tips – Learn how to secure your data

Hello dear readers, Hope you all are fine

Day 28th of January, celebrated as “Data Privacy Day” recognized annually to be celebrated, by almost all the concerned developing as well as developed countries of the world and also those who are on brim to enter the digital world. It is an initiative to safeguard personal data, entrusting faith and respect of privacy and enabling binding effort in the field against digital furtiveness. A global effort has been made through this annual “data privacy day” to raise and promote awareness around for data safeguard and protection among the users.

Here are some safety tips, (basically promoted by antivirus company, but edited and added as per requirement by me) to safeguard and get the data protected:-

  1. Strong and unique passwords : Couple of years ago, I read and article about a survey done by a private hackers group about common password used by the people and to their utter surprise most of the passwords used are : Iloveyou, Ihateyou, welcome, personal, 1234567890,personified,password,hacked or contact number or most common are the name of  girlfriend or boyfriend or self name with 123. But to safeguard change password of online accounts frequently. Use more than 10 character alphanumericals with both upper and lower case and symbol. the best way to type short form (abbriviation)  of your most favourite song (like There’s someone for me somewhere Tsofmsw and add your fav lucky number with it and symbol  or your   DOB   too Tsofmsw08#14feb86) it was found that hackers will take about 250 years to get it cracked through classical methods of hacking.
  2. Data Back up : Take the backup of all of your mobile as well as computer data on cloud storage (read my topic what is cloud storage)  or External Hard disc drive.This will protect your data from virus attacks, aftermath of sudden crash of system and ransomeware shocks. (Ransomware is current scenario of malware attack which hijack the whole system data and demand money for release of the data.
  3. Use genuine and trusted antivirus : Use trusted antivirus which use multilayered protection and block ransomware, fake, infected and phishing websites, emails designed for phishing attacks, malicious downloads, and unauthorized data storage devices and encrypt the data automatically for safety and future use.
  4. Safe data disposal : Data privacy not only concerns with safety of data under use but also protecting your private data which according to your goodself has been deleted but it actually remained buried under files system of disc and can be recovered by advanced/sophosticated recovery tools . Emptying recycle bin or shift deleting files is not secure enough.The data which you delete can be retrieved back any time with the help of utility / recovery tools.Hence always use three level deleting process by using software provided by various antivirus companies one I know is Quickheal, Bitdefender etc.
  5. Phishing (read my note “what is Phishing): This is a trick to scoop out your data through their script oriented page which is lookalike of famous account sites. An attempt to trick you into providing your personal or financial details so that the attacker can commit illegal acts using your name.Always ignore unepected communications from unknown sources asking for online help and report them to the right authority.
  6. Avoid storing sensitive data like banking details, credit card codes, social security codes, IDs Passwords on mobiles and computers. If you like to do so try to get it in encrypted formats. There are may sites and softwares which encrypt and decrypt your data online whenever and whereever required.Encryption convert your data in coded forms unable to use by any other.
  7. Avoid Sharing : Don’t share your personal details online with any one. Social engineering can peep into your personal entities through their skills. Avoid forwarding your codes,PINs through mobiles and mails. Dont fill informations in survey forms, Online social friends unsolicited mails etc
  8. Unsecured open wifi networks are more dangerous and boon for hackers. Banking and online shopping through unsecured wifi helps attackers to steal your data. While operating through these mediums get assured that such things are secured through IDs and Passwords.
  9. Reliable source’s App Installation: Install application through reliable sources only. Read reviews of the app many times before installing and giving permissions to access your data , pictures and documents. An app may asks for permissions that are not actually required for it to function on your device. e.g Torch light app. asks for permission to access devices location, pictures contact details etc. can arise suspicion  chances are it is a malicious or a potentially dangerous app. So, stay cautious against such threats.
  10. Protection of Hardware : Protect your hardware from physical theft which ultimately leads to stealth of your personal data and passing of it from one hand to other. Mobile devices carry large amount of personal data in the form of photographs,videos and other sensitive contacts and information and if the mobile is stolen all data will passed to one unknown person and chances are there of misuse.

Hope this knowledge can add a bit to your awareness. 

Thanks for bearing

Jagat.

Learn about SaaS, (Software as a Service

Hello dear friends, Hope you all are fine and grace of god bestowed on you,

Reading my last post, one of my old friends advised me to write a note on SaaS, which is very common web based utility feature  used in cloud computing by various organizations now a days. Cloud computing is very much related to cloudstorate, I have written about cloud storage in my previous article cloud computing is kind of services provided through cloud storage by provider companies / hosting companies to their clients and the service is of any kind related to their small business procedures to multinational operational models. 

SaaS , in simple words is Software as a Service delivery to the clients by the hosting servers through internet using cloud storage. It is basically web based services provided remotely by the host companies.

Suppose an organisation wanted to run a software for its functioning and record mantanence, and to do this,  company needs hardware infrastructure to install, store and run the software, i.e server along with other accessories,hard discs for backup, client computers, operators, engineers to look after hardware and software. Daily upkeep,  monthly or annually up gradation is other requirement to be fulfilled. For overcoming all these headache / processes SaaS is an option. SaaS provide all these functionalities through web based remote servers and will cost less than paying for licensed software applications. Hosting service provides cost monthly rents for their services and the client organisation will get their all data stored, processed and retrieved whenever and where ever required without any hesitation and worry because all these things are managed remotely hence is secured and safe also. Investment for additional hardwares, softwares and personnels gets curbed in this case.

SaaS is also termed as hosted applications, storage models where business organisations rents or lease storage space from third party provider. Data is transferred to client from provider through internet, client access that data according to need using software provided by the hosting company. Software provided by the host company is used to access , update and store the data. small and mid-sized commonly follow SaaS as it usually requires quite low as investment and businessmen pay only for service based only on amount of storage only.

Hope this will help to add your knowledge.

Thanks

Jagat

Learn how to hide a folder in windows with single and simple command line

Hello dear ones, hope every thing will be great.

In this post I am going to share my knowledge about a trick, a command trick by use of which one can hide a complete folder and no one is able to find the folder even using hidden file folder technique i.e show hidden file and folder option also fails if files are hided with this trick. Hope you will love to learn the trick, so here we go step by step :

  1. First of all create a folder (destination folder) any where in your computer but preferably desktop and name the folder as per your choice (I have named it as sec).aaaa
  2. Now make another folder inside that particular fold and name it too as per your choice, (here I named it bb)bbb
  3. Add the items (Images, documents, videos etc in that inner folder)
  4. Now  select the parent folder, press shift and right click both at the same time , and select open command window here click it.
  5. cccc
  6. Command prompt will get opened 
  7. Now type the the following code in it :
  8. attrib +s +h “folder name” (here folder name is the name of inner folder carrying items to be hidden (bb in my case) and press enter.
  9. ddd
  10. Thats it , click refresh any where on the desktop
  11. And click the parent folder to check your items “””””GONE””””””
  12. You can recover your items back by repeating the same steps but instead of typing +s +h now type -s  -h and you will retrieve or get your hidden items back. 
  13. fff

Hope this trick will be liked and used by you. 

Thanks for bearing 

 

Jagat 

How to hide your files (video, documents, images) behind single image (.jpg) file

Hello dear friends, Hope you will be good as ever,

In this note I am going to share with my knowledge about hiding files (any kind  of file) behind an image file. Yes, you read it right behind any .JPG file of your choice. You can hide all your secret files behind harmless image file and no one will be able to guess about where the file is hidden and your data too will remain secret.

  • First of all create a folder at desktop and name it as you like , I named it Jagat.
  • jp1
  • Now add all the files (you want to hide) in that folder – in my case folder is Jagat.
  • 222jp
  • Now you need to compress all these files and make it a single .zip or .rar file. I have used win.zip. You may use 7-zip etc. any one of your choice.(note: check the size of the folder)
  • 3333jp
  • Give appropriate name to that zip file,.Here again I named it Jagat. (Right click the file and see the size of file)
  • Now copy the image behind which you want to hide this .zip/.rar file and paste it in the folder (Note : image must have .JPG format / extension only, any other format will not work properly).In my case I have used image named JP.jpg. check the size of image too definitely it will be going to increase after final project.
  • Now open command prompt by typing cmd in search box of start menu as shown in image.4444jp
  • Copy and paste each command one by one and hit enter with each command line.
  •          cd Desktop\Name of the folder containing secret files·
  •          copy /b Name of image file.jpg + Name of zip file.zip   Name of image file.jpg
  • Example : CD Desktop \Jagat

          copy /b JP.jpg + Jagat.RAR  JP.jpg

5555

  • 666
  • Press enter – When it show ( one file copied) type exit and come out of command           prompt. and now select the image and right click on it, go to properties and see the.     size of image. It has increased manifold the original size of image. It means the folder is now hidden behind the image.
  • Note: It is very important to carefully the special symbols like / and space while entering commands and don’t mess up with the spacing etc. to get the accurate final result.
  • Get back to the original folder and delete all the files except the image behind which..             the matter is being hidden.
  • 7777
  • Now right click on the image file and then choose Open with. Choose a decompression software from the list. like 7-Zip File Manager or any unzip software.
  • You can extract your secret files from your  image file just like that.(or if you dont have unzip  tecchnique working working follow this step ,, make an empty zip or rar file and move this image to that file select the file in zip/rar folder right click and select view as shown in image ,,or extract the file to desired location for use.
  • 8888
  • 9999After creation, you can move the image file containing your secret files to any location as per your choice. You can save it anywhere, though, as no one would guess such a big secret could be lying under a simple image.

Hope you will find it beneficial for use.

Any query will be appreciated.

Thanks

Jagat

Learn how to hide your files without any software

Friends hope you will be fine.

I am going to share about how to save and lock a file in a folder where no software is needed but only a notepad code is all about you need. Basically it is a batch file trick and may be you people are also well aware of it if you learn DOS and notepad features etc.

This trick saves files under password protection. So follow the undermentioned process step by step

Open note pad and copy the text given below

cls
@ECHO OFF
title http://www.iktatva.tk
if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p “cho=>”
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
attrib +h +s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p “pass=>”
if NOT %pass%== jagatprasad goto FAIL
attrib -h -s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
ren “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End

Now save the notepad as lock.bat (.bat is must for it)

Double click on lock.bat file a new folder by the name Myfolder will be created.

Copy your files and data to be saved in that Myfolder

Double click the .bat file again command prompt will appear type Yand press enter.

The folder will disappear from the desktop.

To view the My folder again double click the Lock.bat file

A command prompt ask for password, here default password is jagatprasad

You can change it by finding jagatprasad in the code and writing anyone of your choice.

One thing to be sure that Lock.bat file should be kept hidden from others or saved in secure part of your system so that you can access it with ease.

Hope it will help to keep your files secure.

 

Thanks Jagat