Monday, 28 August 2017

Parents, here are 5 things you must know about the Blue Whale Challenge

blue_whale_challenge_task_

If you are a parent and don’t know anything about the Blue Whale Challenge, then it’s important that you read the following post.
What is the Blue Whale Challenge?The Blue Whale Challenge is supposedly an Internet game where players are assigned 50 different tasks by the game admin (also known as curator). A player has to complete all these tasks within 50 days and can only win it by completing the last task – which is to take their own life.
According to Wikipedia, Blue Whale Game has its origins in Russia and is the creation of a 21-year-old man called Philipp Budeikin. The game began back in 2013 and there have been 130 separate cases of suicide that are linked to it. This claim, however, still remains unverified.
The name of the game originates from the unverified phenomenon of ‘beached whales’ – refers to whales who strand themselves on land ending their lives.
How is the Blue Whale Game played?Just how this game is played is a mystery – some say it can be played by installing a mobile app while some are of the view that the ‘curators’ recruit participants via Social Networking sites. And there are theories that suggest – people who are willing to play the game leave messages in places such as public forums or comment boxes of shady websites using hashtags like #bluewhalechallenge, #curatorfindme, #i_am_whale to help the game’s admins find them.
There are 50 tasks that every player has to undertake while playing this game. These include making cuts on the arm, carving certain characters on the hand using a sharp object, watching psychedelic and horror movies, visiting a railroad, standing on the edge of a building and other such daring and self-destructive tasks – with jumping off a building as the final one.
Reported cases of suicide linked to Blue Whale Game in IndiaThe following cases (sourced from Wikipedia) are allegedly linked to the Blue Whale Challenge based on various anecdotes from the deceased or affected person’s family, friends, and acquaintances. There is still no concrete evidence that can prove their association with the Blue Whale Game. But, the details in these incidences do paint a picture of this sinister game – such as the behavior of the victims and what they did before ending their lives.
  1. A 16-year-old boy from Kerala committed suicide on 26 July 2017.
  2. A 14-year-old boy from Mumbai committed suicide by jumping off a building.
  3. On 10 August 2017, a student from Indore tried taking his life but was stopped by a group of students.
  4. On 10 August 2017, a 14-year-old boy was stopped by the Maharashtra Police before he could complete the final task of the Blue Whale Challenge.
  5. On 12 August 2017, a student from West Bengal committed suicide by asphyxiating himself as per reports.
  6. On 15 August 2017, a 16-year-old boy from Kerela committed suicide by hanging himself.
  7. A 22-year-old man from Kerela committed suicide by hanging himself on 16 August 2017.
  8. On 21 August 2017, a 24-year-old girl jumped off the seventh floor of a building. She survived the fall with severe injuries.
  9. A 15-year-old boy from Jamshedpur in Jharkhand has been reported to may have drowned himself in a city lake on 21 August 2017.
Who are the most likely candidates to play this game?The answer is well covered by the following article on indiatoday.in
Why will anyone play a game such a Blue Whale Challenge that asks them to end their life?
Now, the most important question – What should parents/guardians do about it?To begin with, we must understand that the Blue Whale Challenge is not a mobile app nor a website or a social media group until proven otherwise – it’s a phenomenon. Which means, you cannot prevent the game from getting installed on your kid’s phone nor can you block any websites. Yes, you may bar your kids from using the Internet or social media but to what extent?
So, what remains? Your good old bonding with your children – the strongest shield that can keep them safe from all the bad things in life including the Internet. Prohibiting myself from giving any lecture on parenting, I’ll just keep it to this – start getting more engaged with your kids; talking is essential. They should be able to voice their thoughts to you without the fear of getting judged or rejected – problems from trouble sleeping at night and anxiety of joining a new class to being worried about that bully in their school or what others think about them – anything. Also, if you see sudden behavioral changes in them, do not give a second thought to visiting a professional.
Their lives might look ordinary, careless or nothing grand to attract attention, but a lot goes around in those tiny little minds – more than we grownups assume.
From the point of view of online security, here are some things that you can do:
  1. Teach your kids (right from a young age) not to share their personal information on the Internet. Follow this rule yourself.
  2. Let them know that they can talk to you about anything wrong they see or come across online.
  3. Help them understand that strangers in real life are no different from strangers on the Internet.
  4. Caution them against joining any groups that ask them to perform undesirable tasks.
  5. Consider giving your children phones that they can use for just calling and texting. This way, you can limit their impressionable minds to the Internet. Dr. Harsh Shetty, child psychiatrist at LH Hiranandani Hospital, Mumbai, says “never give gadgets as gifts, and do not use gadgets as a means to calm a child or keep them busy”.

Sarahah app uploads your address book without your knowledge

Honesty app’ Sarahah is dishonest, as it uploads your phone contacts to the server

Sarahah, the anonymous feedback messaging app, is all over the place. Be it Facebook, Twitter, Instagram or Snapchat, everyone is talking about the app for the past couple of weeks.
For those unaware, ‘Sarahah’ – means ‘honesty’ in Arabic, is an app that allows the users to send anonymous messages to others registered with the app. Created by Saudi Arabian developer Zain al-Abidin Tawfiq, the app is aimed to help people identify their strengths and weaknesses. However, users have no way of knowing who sent the message or how to reply to them. The app is available in two languages, English and Arabic, for iOS and Android users.
“Sarahah helps you in discovering your strengths and areas for improvement by receiving honest feedback from your employees and your friends in a private manner”, the app description explains.
However, it now appears that the app is collecting more just than feedback messages. Apparently, the app is uploading users’ phone numbers and email addresses in the address book to the company’s servers, which was spotted by Zachary Julian, a senior security analyst at Bishop Fox when he installed the app on his Android smartphone, a Galaxy S5 running Android 5.1.1.
When this news was reported by The Intercept, Zain al-Abidin Tawfiq responded by tweeting that the contact lists were being uploaded “for a planned ‘find your friends’ feature.” However, the removal of the functionality was “delayed due to a technical issue.” He now claims that the functionality has removed from the server and the data request will be removed in a future release. He also tweeted that Sarahah currently stores no contacts in its databases, which is impossible to verify.
Julian discovered the behaviour of Sarahah by using BURP Suite, a traffic analyzer, which intercepts internet traffic entering and leaving the device, allowing the owner to see what data is sent to remote servers. When Julian launched Sarahah on the device, BURP Suite caught the app in the act of uploading his private data.
As soon as you log into the application, it transmits all of your email and phone contacts stored on the Android operating system,” he said. The same occurrence was later determined on Apple’s iOS too, although after a prompt to “access contacts,” which also appears in newer versions of Android.
The above occurrence clears that the app is somewhere interested in your contacts. For instance, on iOS, the app says “the app needs to access your contacts to show you who has an account in Sarahah,” and allows the user to select between “Okay” and “Don’t allow.” On the other hand, in some cases on Android, the app requests access to contacts without providing any explanation for needing such access, while in other cases it makes no such request. On both iOS and Android, there is no mention of data being uploaded to a server.
The privacy policy specifically states that if it plans to use your data, it’ll ask for your consent,” Julian said. “While the app’s entry in Google’s Play Store does indicate the app will access contacts, that’s not “enough consent” to justify “sending all of those contacts over without any kind of specific notification,” he added. On the other hand, the app on iOS platform claims to use contact data in the user’s address book to show them their list of friends using Sarahah, which it actually does not do, reveals the testing done by Julian.
Even though the app’s privacy policy states that, “We will never sell the data you provide to any third party as part of personal marketing without your prior and written consent unless it was a part of bulk data used for statistics and research and it won’t contain any data to identify you,” it is not completely clear as to what Sarahah uses uploaded contact lists for.
For those who really want to use Sarahah and are concerned about their privacy can take comfort from the fact that they do not require to download the app to use the service. You can instead register yourself on Sarahah via a website after which you be allowed to send and receive messages. The site doesn’t ask for or require access to your contacts in the digital address books for you to use Sarahah.

Wednesday, 23 August 2017

What is the Blue Whale Challenge- the online suicide game?

he deadly Blue Whale Suicide Challenge

The Blue Whale Challenge also known as the Blue Whale Suicide Game is a social media phenomenon. Usually considered to be an urban myth, the game has gotten increased attention after a spate of teen suicides were said to be linked to the game. It is not a downloadable game, app or software. It is a social media phenomenon such as the ALS challenge that is spread through secretive groups.
Origin Story
The game appears to have originated on a russian social site VKontakte with “F57”, one of the names of the so-called “death group” of the  site leading to the first suicide in the year 2015. The game plays out over 50 days, where a player has to successfully complete 50 challenges. The challenges range from watching a horror movie to self mutilation. These tasks are given by the “curator”, who also asks for photos of the teenagers carrying out the tasks as proof for his approval. The last of the 50 challenges as we know – is suicide.
Spread & Arrests
Reports started coming in from various Russian sources that a VK group administrator had been detained for urging children to commit suicide. Some months later , a YouTuber Sasho Panchuk, uploaded a video wherein a Russian teenager pretends to jump off a roof titled  “The guy plays Blue Whale jump from roof”. Though the video has since been removed, the game spread leading to reports that the game could be responsible for around 130 deaths.
In May earlier this year, Russian authorities revealed that they had made an arrest related to these deaths – a 21 year old expelled psychology student Philipp Budeikin. Philipp claimed to have invented the game with the purpose of cleansing society by pushing people that he deemed of no value towards suicide. Later, he plead guilty to the charges of inciting at least 16 teenage girls towards committing suicide. He had also claimed that the reasons for creating this game were linked to him suffering from bipolar disorder, he was later found to be of sane mind by the court.
The game has received renewed interest after a suicide committed by a teenage boy by jumping off the roof of his house were said to be linked to the game. This has caused the local police to investigate other recent teen suicide cases as possibly connected to the Blue Whale game. Meanwhile, the Indian government has asked the top internet companies in the country including Google, Facebook, WhatsApp, Instagram, Microsoft and Yahoo to remove any links or references to the Blue Whale.

Motorola Looking To Develop Smartphones That Can Self-Heal Its Cracked Screen

Motorola has filed a patent for a smartphone screen that can heal itself

A cracked or shattered smartphone screen is definitely not good news or sight for owners who have butterfingers. What is even worse is the huge money that goes into it to get it repaired. Well, that may not be the case in the future if all goes well….
Motorola who had introduced “Shattershield” display technology with its Droid Turbo 2 smartphone has now filed a patent for a self-repairing phone display. Although the patent was filed by Motorola in February 2016, it has been just put online by the U.S. Patent and Trademark Office (USPTO) that describes the patent as a “method and device for detecting fascia damage and repairing the same.”
According to the filed patent, the company is looking into developing a smartphone that can heal its own cracked display with heat, including the phone’s own heat or the user’s body heat over a period of time. The process depends on something called “shape memory polymer”, a material that can be deformed and then recover its original shape through a process called thermal cycling. The “thermal elements” would be either built into the screen or next to it so that it can identify a crack, scratch, or unwanted bend and then apply heat to it “to reverse at least some of the deformation.” This means that the self-healing process will surely lessen the small scratches and minor cuts to the screen and make the phone usable. However, don’t expect the phone to start renewing and look as good as new.
“The self-healing effect has been shown to completely reverse scratches and indentations, and to at least partially reverse cracks and breakage,” Motorola states.
While the patent may sound cool and exciting, there’s no guarantee that Motorola would use the technology in its future smartphones any time soon. Also, a pliable polymer layer feels more like plastic and a lot cheaper than Gorilla Glass, which means that manufacturers won’t use them as they could lose on their capture market.
To read more about the Motorola patent, click here

Hackers, ‘Mr. Smith group’ threaten to leak the Game of Thrones Season 7 Final Episode

Hackers calling themselves ‘Mr. Smith group’ have promised to leak Game of Thrones Season 7 Episode 7, the final GoT episode of 2017

As we said HBO is having a bad 2017. It all started with a hacking group hacking HBO servers and stealing 1.35 TB data including scripts of Game of Thrones Season 7 and other HBO blockbuster TV series. Then some employees of Star India leaked the GoT Season 7 Episode 4 “Spoils of War.” Matters got worse as HBO Spain mistakenly aired the Game of Thrones Episode 6 “Beyond the Wall” a full six days before it is to be aired internationally today.
Now comes the worst news. The hackers who call them ‘Mr. Smith group’ who had hacked the Twitter and Facebook accounts of Game of Thrones run by HBO guys allege that they have access to the Game of Thrones Season 7 Episode 7 which is the last episode of the current 2017 season.
The Game of Thrones Season 7 has thrown a lot of surprises for GoT fans. The 2017 season saw all the living Stark kin meet albeit, without Jon Snow, King of the North who is in Dragonstone. The GoT season also saw the mother of Dragons attack Red Keep to burn all supplies and thousands of House Lannister soldiers. Ser Jamie managed to escape the fiery fury of Viserion, the Dragon that Daenerys was flying with the help of Ser Bronn. The next GoT Season 7 Episode 5 “Eastwatch” sees Jon Snow and his group set foot beyond the Wall to bring proof of the White Walkers and The Night Kings existence to Cersei and Daenerys. The entire suspense buildup has left GoT fans gasping for more and the hackers are spoiling the fun for them as well as HBO.
According to the hackers, ‘Mr. Smith group’ they have login credentials for a number of HBO’s social media, including the official HBO, Game Of Thrones and Westworld accounts on Twitter. They have also warned that they would be releasing the Game of Thrones Season 7 Episode 7, the final episode ahead of its official release on 27th August 2017.
The so-called “Mr. Smith group” told Mashable that they “have access to many HBO platforms already” and warned audiences: “Be ready for GOT S7 E6 & E7 as soon as possible.” Mashable did not attempt to verify the accuracy of the passwords but stated they have “no reason to doubt” the group’s threats after previous GoT Season 7 leaks.
A little history of Game of Thrones Season 7 – For those unaware, first, it was the news of HBO servers being hacked by cyber criminals broke wherein 1.35TB of data was stolen that included scripts of top HBO serials including Game of Thrones (GoT) Season 7, Ballers and Room 104 TV show. If this was not enough, a few days later, the script of Game of Thrones Episode 4 “Spoils of War” was leaked, which was followed by the subsequent release of the entire episode of GoT S07E04 “Spoils of War” on torrent websites. Later, the hackers went on to leak the script of Game of Thrones Season 7 Episode 5 Eastwatch (GoT S07E05).

Here are the top 8 Websites To Learn Ethical Hacking – 2017

Here are the top 8 websites to learn ethical hacking

Everybody wants to learn hacking in today’s age. However, this is not an easy task until you have basic knowledge about computers and network security. For beginners to know, there are two types of Hacking Ethical (White Hat) and Unethical (Black Hat). Unethical hacking is considered illegal while ethical hacking may be regarded as legal.
We provide you with a list of websites that offers you white hat content. However, it is important to note that as a beginner to not perform any hacking & cracking tactics that breach any cyber law.

Hackaday

Hackaday is one of the top ranked sites that provide hacking news and all kinds of tutorials for hacking and networks. It also publishes several latest articles each day with detailed description about hardware and software hacks so that beginners and hackers are aware about it. Hackaday also has a YouTube channel where it posts projects and how-to videos. It provides users mixed content like hardware hacking, signals, computer networks and etc. This site is helpful not only for hackers but also for people who are in the field of Digital Forensics and Security Research.

Evilzone Forum

This hacking forum allows you see the discussion on hacking and cracking. However, you need to be a member on this site to check out queries and answers regarding ethical hacking. All you need to do is register to get your ID to get an answer for your queries there. The solution to your queries will be answered by professional hackers. The Remember not to ask simple hacking tricks, the community people here are very serious.

HackThisSite

HackThisSite.org, commonly referred to as HTS, is an online hacking and security website that gives you hacking news as well as hacking tutorials. It aims to provide users with a way to learn and practice basic and advanced “hacking” skills through a series of challenges, in a safe and legal environment.

Break The Security

The motive of the site is explained in its name. Break The Security provides all kind of hacking stuff such as hacking news, hacking attacks and hacking tutorials. It also has different kind of useful courses that can make you a certified hacker. This site is very helpful if you are looking to choose the security and field of hacking and cracking.

EC-Council – CEH Ethical Hacking Course

The International Council of Electronic Commerce Consultants (EC-Council) is a member-supported professional organization. The EC-Council is known primarily as a professional certification body. Its best-known certification is the Certified Ethical Hacker. CEH, which stands for Comprehensive Ethical Hacker provides complete ethical hacking and network security training courses to learn white hat hacking. You just have to select the hacking course package and join to get trained to become a professional ethical hacker. This site helps you to get all kinds of courses that make you a certified ethical hacker.

Hack In The Box

This is a popular website that provides security news and activities from the hacker underground. You can get huge hacking articles about Microsoft, Apple, Linux, Programming and much more. This site also has a forum community that allows users to discuss hacking tips.

SecTools

As the name suggests, SecTools means security tools. This site is devoted to provide significant tricks regarding network security that you could learn to fight against the network security threats. It also offers security tools with detailed description about it.

Friday, 18 August 2017

What IS Ping And How It's Work?

What IS Ping And How It's Work?

Ping is a type of network packet that is used to check if a machine that you want to connect to over the internet is available or not. A ping is a network packet termed an Internet Control Message Protocol (ICMP) packet. The process of a ping is done when a machine sends an ICMP echo request packet to another machine or interface over the internet. If the receiving machine is available and is enabled to reply back, it will respond with an echo reply packet.
This not only shows us that the receiving machine is alive and working, it also helps us to identify a number of things such as total time taken, loss of packets, etc that are used to judge the reliability of the connection.  To run a ping from your Linux machine, you will need to open a terminal and write a command. The syntax of the command is “ping destination_ip” – replace “destination_ip” with the actual IP address of the machine you want to connect with.
All recent versions of Windows and Linux come enabled with the ICMP command. On Windows, the command will send 4 echo requests before stopping while Linux will continue sending echo requests until a user stops it themselves.

What Is Actual Different Between DoS vs DDoS Attack

What are the differences between DoS and DDoS Attack? 

The terms DoS and DDoS might sound extremely similar because there is a ‘D’ missing from the two acronyms, but it turns out that there are several differences between the two that you should know about. First of all, the full form of DoS and DDoS are as follows:-
  • DoS: Denial of Service
  • DDoS: Distributed Denial of Service
Now that you know the differences between the two terms as far as their full forms are concerned, what are the primary differences between the two in terms of functionality?

DoS

A DoS attack means that one computer and one internet connection is being used to flood a server with packets (also known as TCP/UDP). The point of such a denial of service attack is to overload the targeted server’s bandwidth and other resources. As a result, this will make the server inaccessible to other computers, meaning that whatever form of content that was being loaded by the server, ranging from a website, to a hosting service will not be visible to other computers.

DDoS

While some would say that a DDoS attack is in most ways similar to a DoS attack, the results are quite different. Instead of one computer and one internet connection being used to overload a targeted server, the DDoS attack utilizes several computers and connections. The computers behind such an attack are often distributed around the whole world and will be part of what is known as a botnet. The core difference between a DDoS attack and a DoS attack is that in DDoS attack the target server will be overloaded by hundreds or even thousands of requests, involving several computers and internet connections, whereas a DoS will involve a single computer and a single internet connection for all these requests
One of the reasons why DDoS attacks have been widespread over the course of months in contrast to a DoS attack is because it is much difficult for a server to withstand the overloading attributes of a DDoS attack. Since several computers and internet connections are working in unison to bring down the server, the objective intended to being achieved is much simpler than one would expect.

What is Disposable Temporary E-mail?

What is Disposable Temporary E-mail?

 

Disposable email- is a service that allows to receive email at a temporary address that self-destructed after a certain time elapses. It is also known by names like :tempmail, 10minutemail, throwaway email,fake-mail or trash-mail.Many forums, Wi-Fi owners, websites and blogs ask visitors to register before they can view content, post comments or download something.Temp-Mail - is most advanced throwaway email service that helps you avoid spam and stay safe.

Thursday, 29 June 2017

Petya ransomware is affecting users globally

Petya Ransomware that is affecting users globally. This clearly looks like early signs of a new ransomware attack that is spreading fast across the globe. Currently, we have seen multiple reports of this ransomware attack from several countries
Our Analysis Shows
Petya delivery mechanism is by scam emails or phishing emails. Once the email attachment is executed on the computer it shows the prompt of User Access Control. However, after executing the program it encrypts the Master Boot Record (MBR) and replaces it with a custom boot loader with a code to encrypt the full disk starting with MFT (Master File Tree) and leaves a ransom note to users. Upon successfully encrypting the whole disk of the computer it shows below ransom promp.

ransomware infection where an exploit called EternalBlue targets the security vulnerability MS17-010. This is the same vulnerability which WannaCry Ransomware has been exploiting to spread. 
Preventive steps and recommendations
  1. Avoid clicking on links in email received from unknown sender
  2. Apply all Microsoft Windows patches including MS17-010 that patches the Eternal Blue Vulnerability
  3. Ensure you take a backup of your data to some external disk regularly.
  4. Avoid login to computer with Administrative privileges. Work with user account that has standard user privileges and not administrative privileges..
  5. Avoid login to computer with Administrative privileges. Work with user account that has standard user privileges and not administrative privileges.

  6. If a threat is executed in my computer, can I still prevent my data?
    If by mistake someone executes the threat on an unprotected computer by clicking on the link in the email and downloading the attachment, and if you see a BSOD (blue screen) that restarts your computer, you can still save your data by not restarting the computer. Just keep it switched off.
    When you see the BSOD screen and the system re-starts only the MBR is replaced and your data on the disk is still intact and it can be accessed by mounting the hard disk on some other clean system. Make sure you do not boot the infected computer hard disk at that stage. Once mounted the data can be accessed and copied.

Sunday, 25 June 2017

TOP 5 GAMES IN 2017

1-Call of Duty: Advanced Warfare


While the formula is the same, Call of Duty: Advanced Warfare is the best PC game to play right now, thanks to excellent graphics, engaging (though linear) game play and a gripping story line. Kevin Spacey does add to the drama!

2-Bioshock Infinite

The Best PC Game, BioShock Infinite is a must try for gamers looking for a mind-boggling experience.

3-Company of Heroes 2


The depth of gameplay, the superb graphics and just the style and flair of the combat set Company of Heroes 2 apart.

4-FIFA 14



This year's changes have refined FIFA even more making it feel like an invigorating and engaging experience and one the best PC games.


5-Saints Row 4



Saints Row 4 feels like SR3 with God-Mode on and is a great game and definitely worth a play for open-world game fans.

Friday, 2 June 2017

ZOTAC GeForce® GTX 1050 Ti Mini

Great gaming fast, powerful ZOTAC GeForce® GTX 1050 Ti Mini. Now you can turn your PC into a true gaming rig, powered by NVIDIA Pascal™--the most advanced GPU architecture ever created. It’s loaded with innovative NVIDIA Game Ready technologies that let every gamer experience the latest titles in their full glory in super compact form.




PRODUCT SPECIFICATIONS



 Specifications
  • GPU
    GeForce® GTX 1050 Ti
  • CUDA cores
    768
  • Video Memory
    4GB GDDR5
  • Memory Bus
    128-bit
  • Engine Clock
    Base: 1303 MHz
    Boost:1417 MHz
  • Memory Clock
    7 GHz
  • PCI Express
    3.0
  • Display Outputs
    DisplayPort 1.4
    HDMI 2.0b
    DL-DVI
  • HDCP Support
    Yes
  • Multi Display Capability
    Triple Display
  • Recommended Power Supply
    300W
  • Power Consumption
    75W
  • Power Input
    N/A
  • DirectX
    12 API feature level 12_1
  • OpenGL
    4.5
  • Cooling
    Single Fan
  • Slot Size
    Dual Slot
  • SLI
    No
  • Supported OS
    Windows 10 / 8 / 7
  • Card Length
    144.78mm x 111.15mm
  • Accessories
    User Manual

Monday, 1 May 2017

WhatsApp beta on Android now lets you pin chats


Whats App has started testing a new feature. The feature in question lets users pin chats. Pinning a chat will result in it appearing at the top every time, reducing your time and effort that would have otherwise gone into finding it.
The feature, which is currently available in the beta version (2.17.162 or 163) of the app, lets you pin a maximum of 3 chats. If you try pinning a fourth chat, the app will display an error.

Wednesday, 5 April 2017

Quick Sort

WRITE A PROGRAM ON QUICK -SORT:-
#include <stdio.h>
#include <stdbool.h>
#define MAX 7

int intArray[MAX] = {4,6,3,2,1,9,7};

void printline(int count) {
   int i;

   for(i = 0;i <count-1;i++) {
      printf("=");
   }

   printf("=\n");
}

void display() {
   int i;
   printf("[");

   // navigate through all items
   for(i = 0;i<MAX;i++) {
      printf("%d ",intArray[i]);
   }

   printf("]\n");
}

void swap(int num1, int num2) {
   int temp = intArray[num1];
   intArray[num1] = intArray[num2];
   intArray[num2] = temp;
}

int partition(int left, int right, int pivot) {
   int leftPointer = left -1;
   int rightPointer = right;

   while(true) {
      while(intArray[++leftPointer] < pivot) {
         //do nothing
      }

      while(rightPointer > 0 && intArray[--rightPointer] > pivot) {
         //do nothing
      }

      if(leftPointer >= rightPointer) {
         break;
      } else {
         printf(" item swapped :%d,%d\n", intArray[leftPointer],intArray[rightPointer]);
         swap(leftPointer,rightPointer);
      }
   }

   printf(" pivot swapped :%d,%d\n", intArray[leftPointer],intArray[right]);
   swap(leftPointer,right);
   printf("Updated Array: ");
   display();
   return leftPointer;
}

void quickSort(int left, int right) {
   if(right-left <= 0) {
      return;
   } else {
      int pivot = intArray[right];
      int partitionPoint = partition(left, right, pivot);
      quickSort(left,partitionPoint-1);
      quickSort(partitionPoint+1,right);
   }      
}

main() {
   printf("Input Array: ");
   display();
   printline(50);
   quickSort(0,MAX-1);
   printf("Output Array: ");
   display();
   printline(50);
}


OUTPUT:-

Monday, 3 April 2017

VoCore: A Cheap And Coin-sized Linux Computer With Wi-Fi


Short Bytes: VoCore is an open hardware that runs OpenWRT Linux. This tiny computer comes with Wi-Fi, USB, 20+ GPIOs that will help you to make a smart home automation system or use it in other embedded projects. Read more to know about this device and grab one for yourself.
With each passing day, mini computer boards are getting more and more popular. Single board computers like Raspberry Pi, CHIP, OrangePi etc. are being endorsed by makers and DIY enthusiasts to create new innovations. However, if you are looking for an even smaller Linux computer, VoCore is the perfect device for you.
At fossBytes, we love open source technologies and so do the makers of VoCore. It’s an open source hardware that runs OpenWrt on top of Linux. With this mini Linux machine, you can fork your own Wi-Fi router, make smart home automation systems, invent a new device, build a motherboard and whatnot.

In simpler words, you can use it as a standalone device or use it as an embedded component of a larger system. It comes with included Dock that extends the USB and Ethernet ports to enhance its functionality.

Specifications of VoCore Linux computer:

This coin-sized computer is powered by 32MB SDRAM, and 8MB SPI Flash. It provides many interfaces like 10/100M Ethernet, USB, UART, I2C, I2S, PCM, JTAG and over 20 GPIOs.
  • OpenWRT Linux
  • Onboard Wi-Fi adapter
  • Integrates a 802.11n MAC, baseband, radio, FEM & 5-port 10/100Mbps Ethernet switch
  • Processor: Ralink/Mediatek 360 MHz RT5350 MIPS
Here’s the pin map of VoCore:
An open source software and hardware of VoCore means that you will also get its full hardware design and source code. This will allow you to control every part of this tiny Linux computer.



Did we miss something? Let us know in comments below.