Skip to main content

Posts

What is Special Repository in GitHub?

 Github is an open-source platform where developers build projects and can contribute to other open-sourced projects. It is one of the biggest open-source platforms which provides developers free storage to keep their code which can be further used by any other developer if the requirements are similar. Github offers many different features that help organizations and developers for a seamless experience in building applications. Some of its great features are  Github Actions ,  Cloud Storage for storing Codes ,  Github Container Registry , etc. One such feature that is not directly visible is the  Github Special Repository  feature which Github provides for building attractive Github Profiles.  Special Repository The Special Repository in Github allows developers to expose their interests and skills and helps to build a strong profile. It is very simple to create your own Special Repository. To create a special repository just create a new repository with the same name as the username
Recent posts

Dimensionality and High Dimensional data in Machine Learning

Dimensionality and High Dimensional data in Machine Learning Dimensionality In Machine Learning and Data Science world dimensionality refers to the number of attributes a dataset has. For example, we have a telecommunication dataset having large numbers of attributes (region, tenure, age, address, etc). Each attribute is written in a CSV file, with each column representing each dimension. Dimensionality in machine learning is different from those which are used in mathematics or science. High Dimensional Data High Dimensional data means, the dataset in which the number of features exceeded the number of observations. The dataset has extremely high attributes and makes it more complex for computations. For example, we have ‘n’ numbers of observations or data points and ‘p’ no. of features or attributes. If in a dataset the values of n and p are 1000 and 2000 then the data becomes high dimensional data. In simple words no matter how big or small is the dataset if the number of observatio

Containerization Within Container

How to Launch Container within Container? In this article we will see how we can use the Concepts of Docker to achieve Containerization within Container. To launch another container within a running container is quite a tedious task but in this article I will show you how easily you can achieve this by applying right concepts. In this article I will be using few concepts of docker like Dockerfile , mounting volume , mounting port and few basic docker commands . Before starting with the container we need to make sure that Docker is installed and configured in our system. If docker is not configured then you can use my automated script which I made for installing and configuring docker from my GitHub Repository . After setting up with docker now we need launch a container so that we can launch another container inside it to achieve Containerization within container. There are two ways to launch container. By using docker pull command By using Dockerfile In this

How to Grab Someone's IP Address ?

How to Grab Anyone's IP Address? IP Address is abbreviated as Internet Protocol Address which is a unique address for all the users present on the internet. Whenever we visit any domain or click any link /images on the internet, our public IP address is being shared that source. But what if, we want someone’s IP address intentionally or we want to track someone. So in this blog I will show you how you can easily grab anyone’s IP Address just within a few steps. To grab IP address I will be using an online Web Application named Grabify IP Logger . It is an online tool that is used for IP Lookup . Before beginning with the tool it is recommended to use browser proxy or VPN . Here we have used browser proxy as you can see in the top-right corner in the image for accessing Grabify. Now we need to register ourselves in this application to use it. After registration, we have to log in to the application. After registration and login into the application, we are ready to use it. To grab

Package Management in Linux Distributions

Package Management in Linux distros In the Linux world, there are basically two different types of community-based distribution. One is  Debian based and another is based on the fedora project. Several distributions of Linux use mainly these two community distributions. Unlike some of the most popular distros like Kali, Parrot, Ubuntu, etc which uses Debian based, Redhat Enterprise Linux is based on the fedora project. Package Management Debian based distros Some of the most popular Debian based distros are Kali, Parrot, Ubuntu, Linux Mint, Deepin, BackTrack, Astra Linux, etc. In Debian based distributions the package management is done by apt  and it is configured by default when you install the operating system. To install any package in Debian based use command:  apt-get install package_name  for example, apt-get install leafpad. To remove any package:  apt-get remove package_name; to search for any package installed:  apt-cache search package_name; to list all packages in

CRYPTOGRAPHY | Encryption and Decryption

Cryptography: The Art of Hiding Cryptography can be defined as a method of protecting the digitally shared information between the users. In simple words, it helps us to protect our 'confidentiality' or 'privacy'. The word cryptography consists of two words, 'crypt' which stands for 'hidden' and 'graphy' which stands for 'writing'. Cryptography is basically related to the study of 'cryptology' and 'cryptoanalysis'. It includes various techniques such as microdot, combining words with images, merging images in audios and other different methods to maintain your confidentiality. If we talk cryptography in terms of information security  it is more often associated with scrambling or converting the plaintext into an encrypted text (or ciphertext ) and again decrypting (or decipher ) the encrypted text into the plain text. When we talk about cryptography we will always come across the two words, i.e, Encryption

How to link wifi adapter in kali virtual machine ?

How to link external wifi adapter in Kali linux in Vmware ? If you are using kali linux in Vmware then you might have seen that the connection is wired connection by default even if you are using external wifi adapter. So here I am going to show you how to link external wifi adapter in kali linux in Vmware so that you can go beyond the limitations of Vmware. STEP-1: Open your Vmware. Go to edit , and click on the  Virtual Network Editor  as shown above in the picture. STEP-2: After clicking on Virtual Network Editor you will get a confirmation pop-up then just click yes , then after you will see a interface as shown above. Here click on Change Settings. STEP-3 : After clicking on change settings you will get a confirmation pop-up, just click yes and then you will see a interface as shown above in the picture. Now in VMnet Information, change it into bridged option and in bridged option turn it into Automatic mode. And after that click on apply and then ok.  STEP-