Saturday, May 18, 2019

Top 10 Sites for Computer Science & Engineering [2019]

*Top 10 Sites for your career:* 1. LinkedIn 2. Indeed 3. Careerealism 4. Job-Hunt 5. JobBait 6. Careercloud 7. GM4JH 8. Personalbrandingblog 9. Jibberjobber 10. Neighbors-helping-neighbors *Top 10 Tech Skills in demand in 2019:* 1. Machine Learning 2. Mobile Development 3. SEO/SEM Marketing 4. Data Visualization 5. Data Engineering 6. UI/UX Design 7. Cyber-security 8. Cloud Computing/AWS 9. Blockchain 10. IOT *Top 10 Sites to learn Excel for free:* Search for these on Google: 1. Microsoft Excel Help Center 2. Excel Exposure 3. Chandoo 4. Excel Central 5. Contextures 6. Excel Hero 7. Mr. Excel 8. Improve Your Excel 9. Excel Easy 10. Excel-Jet *Top 10 Sites for Free Online Education:* *Search for these on Google:* 1. Coursera 2. edX 3. Khan Academy 4. Udemy 5. iTunesU Free Courses 6. MIT OpenCourseWare 7. Stanford Online 8. Codecademy 9. Open Culture Online Courses *Top 10 Sites to review your resume for free:* 1. Zety Resume Builder 2. Resumonk 3. Resume.com 4. VisualCV 5. Cvmaker 6. ResumUP 7. Resume Genius 8. Resume builder 9. Resume Baking 10. Enhancv *Top 10 Sites for Interview Preparation:* 1. Ambitionbox 2. AceTheInterview 3. Geeksforgeeks 4. Leetcode 5. Gainlo 6. Careercup 7. Coder career 8. InterviewUp 9. InterviewBest 10. Indiabix

Sunday, January 06, 2019

Blogger post automation via Python

Step 1: Go to https://console.developers.google.com and create a new project

Step 2: Go to API Library and search for Blogger


Step 3: Enable Blogger API v3.


Tuesday, September 04, 2018

Free VPN Service for Android

Learn more about VPN, VPN types, VPN protocols and free VPN servers: https://com.puter.tips/search/label/VPN

You can set up a PPTP server or an L2TP/IPsec connection on Android as shown in the previous articles or you can use a TOR enabled android app as described in this article.

What is Tor?

Tor is free software for enabling anonymous communication and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. The name is derived from an acronym for the original software project name "The Onion Router".

Tor on Android

Tor is available for Android by installing our package named Orbot. Orbot is an application that allows mobile phone users to access the web, instant messaging and email without being monitored or blocked by their mobile internet service provider. Orbot brings the features and functionality of Tor to the Android mobile operating system. Orbot contains Tor and libevent. Orbot provides a local HTTP proxy and the standard SOCKS4A/SOCKS5 proxy interfaces into the Tor network. Orbot has the ability to transparently torify all of the TCP traffic on your Android device when it has the correct permissions and system libraries.

Free VPN Service for Device

OSI model layers

The main concept of OSI is that the process of communication between two endpoints in a network can be divided into seven distinct groups of related functions, or layers. Each communicating user or program is on a device that can provide those seven layers of function. In this architecture, each layer serves the layer above it and, in turn, is served by the layer below it. So, in a given message between users, there will be a flow of data down through the layers in the source computer, across the network, and then up through the layers in the receiving computer. The seven layers of function are provided by a combination of applications, operating systems, network card device drivers and networking hardware that enable a system to transmit a signal over a network Ethernet or fiber optic cable or through Wi-Fi or other wireless protocols.

Data Link (Layer 2)

At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking. Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay.

Monday, September 03, 2018

Free VPN Service for Router

What is a Virtual Private Network (VPN)?

A virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.


Why have a VPN?

A VPN, or virtual private network, is a secure tunnel between two or more devices. VPNs are used to protect private web traffic from snooping, interference, and censorship. Virtually anyone can benefit from VPN, whether it is to access content outside of your territory, protect your private information, or get access to cheap airfares. There are many attributes that must be considered when choosing a VPN as well; not all VPNs were created equal.

There are two basic VPN types:

1. Remote Access VPN
2. Site – to – Site VPN

Types of VPN protocols:

The above two VPN types are based on different VPN security protocols. Each of these VPN protocols offers different features and levels of security.