Skip to main content

SoFi - A Robofish to capture Marine life

As the world moving towards the Robotics and Automation, here comes a SoFi - which is called a Robofish developed by Computer Science students of MIT college which can swim in the open water along with the marine creatures. They are now secret agencies for capturing the marine life in recent times. Click here for knowing more details about how a SoFi work in the water. This is the first robotic fish in all 3 dimensions for extended period of time. It is more excited to get about the possibility of getting a system like this to get closer to marine life than humans can get on their own. SoFi can handle upto a deep of 50 feet for 40 mins. It is strong enough to push back the currents and can take high resolution photos. Using a waterproofed super Nintendo controller, it can dive in straight line, turn, dive up or down. The materials for building up SoFi is understood in the video shown above in the link. The robot is capable of close observations and interactions with marin...

What is Rooting of Android devices

Among in the Internet the "Rooting" is the term we heard in Computer and cellphone technicians.
But most of them don't know the what is the meaning of Rooting, well rooting is refer to the process by which one gains access to the administrative commands and functions of an operating system.


Benefits of rooting

When mobile well be root it's gain the access to administrative phone functions . Having a rooted Android phone is also beneficial because there are several Android applications which are extremely useful and also require root menu access. "Titanium Backup" is everyones personal favorite of these.


Cons of Rooting your device


There are essentially three potential cons to rooting your Android.
     

        Voiding phone warranty: 

Some manufacturers or carriers will void your warranty if you root your device, it means when you buy a new mobile they well give the warranty time period based upon the companies, but when you well the toot your device the warranty well be broken when if you issues in the warennty time period they well give free service when the warnnaty well be broke the corresponds companies well not give the free service of rooted phones. So keep in mind don't root until your warranty expired and wait for it.

   
         Bricking your phone:

Be careful when you well do root your device , if sometimes in some devices something goes wrong during the rooting process, you run the risk of bricking, it means corrupting  your device.

        Security risks :

Rooting introduces some security riskepending on what services or apps you use on your device, it could create a security risks. And certain malware takes advantage of rooted status to steal data, install additional malware, or target other devices with harmful web traffic. Security risks
Rooting introduces some security risks. Depending on what services or apps you use on your device, it could create a security risks. And certain malware takes advantage of rooted status to steal data, install additional malware, or target other devices with harmful web traffic.

Bottom line : 

When rooting your device its has both pros and cons, so ne careful on rooting device. If you know how to root the device then only do otherwise don't do that,because in some times it can be kill your phone

Comments

Popular posts from this blog

Ransomware a boon to Windows Users

May 12th 2017 saw the biggest ever cyber attack in Internet history (yes, bigger than the Dyn DDoS).  A ransomware named WannaCry stormed through the web, with the damage epicenter being in Europe. What is Ransomware? Ransomware is a sophisticated piece of malware that blocks the victim’s access to his/her files, and the only way to regain access to the files is to pay a ransom. There are two types of ransomware in circulation: Encryptors, which incorporates advanced encryption algorithms. It’s designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked content. Examples include CryptoLocker, Locky, CrytpoWall and more. Lockers, which locks the victim out of the operating system, making it impossible to access the desktop and any apps or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer. Examples include the police-themed ransomware or Winlock...

What is Android platform

In day-today life smartphones are placing a important role.You can make phone call,text with your friends, social media updates much more,so the topic is most of the smart phone having the platform Android so that type of device Is called Android devices. So in this post we will give some knowledge of android software and information about device * What is Android Android is a operation system which can be wildly use in smart phones,not only a operating system middleware and key applications. Android Inc was founded in Palo Alto of California, U.S. by Andy Rubin, Rich miner, Nick sears and Chris White in 2003. Later Android Inc. was acquired by Google in 2005.  Bonus:- how to run android in pc * Features & Specifications Android is a powerful system and OS supporting large number of application on it.Hardware that support android is mainly based on ARM architecture * Downloading and Developers  Android is own app which preloaded in software called Play ...

What is Computer Hacking and types of Hacking

Hacking is a technical effort of manuplating the normal network connection and connected systems. A hacker is person who engaged in hacking. In other words 'hacker' who discover a weak part of network and utilize yo exploit block access to regular users, download information, or to gain access to more computers in the network. A good hacker who hack the compute for good intention is called '' Cracking " Types of "Hackers" Based upon the intention and behavior of hacker we can classified into seven (7) types, it means their are 7 types hackers 1. Script Kiddie 2. White hat ( Certified ethical hackers) 3. Black hat 4. Gray hat 5. Green hat 6. Red hat 7. Blue hat In short terms  1. Script kiddie : Script Kiddies normally don’t care about hacking , they ate copying the code and use it for a virus or an SQLi or something else. 2. White hat hacker : This hacker popularly known as Ethical hacker or Certified Ethical Hacker/Hackers. It mea...