Skip to main content

5 Amazing Tech Facts You Definitely Haven't Heard About

  • Qwerty Keyboard Was Designed To Slow You  Down



       This keyboard design is for latin-script alphabets. The name QWERTY (pronounced as kwirti) came from the first 6 letter in order of kays from top left letter row.

       When the type writer was invented, its keys was arranged like piano keys and they were in better manner to type easily and fast for everyone.

The typer used to type faster than we simply write by hands. so the typing speed was very high and because each type bar hits the same place on the device causes the type bar jams together.

so in response to this Christopher Lantham Sholes invented the QWERTY Keyboard layout in early 1870s not to slow down the typer.... (yes you are right..).. He invented the this QWERTY layout to solve this jam problem of type bars by placing the most commonly used characters forever away from each other.

       It was the first type writer which includes the Shift key to easily shifting all of the letter between upper and lower case.

Now this layout only we are using in our computer keyboards... and now typing fastly neighbouring keys is not the issue because of electronic keyboards.


  • The browser ‘Firefox’ which gets its name from English work “red panda”



       We all are familiar with the popular browser “Firefox”. That’s really a cool browsers.

       If you were ask “what’s the logo of firefox?” Your answer would be “ The red fox around the globe”, but what if I say that’s wrong answer then???

       If you had said that it’s colorful panda or maybe red raccoon..,, yeah you are very closed to the true answer. The Firefox logo is “red panda”, it also looks like raccoon and eats like a panda. The Americans call it “red panda”, Germans call it “Katzenbär” and Chinese “hǔo hú” which translates to “fire fox”.



  • 49% of emails sent are considered as spam




        By the Radicati Group in March 2018 there are 3.8 billion email account worldwide.

        The number of businesses and consumers emails sent per day in 2018 is about 281 billion. The research firm projects the latter figure to grow to more than 333 billion by 2022.

But do you know 49% of emails sent are considered as spam. Yes!! maybe you are also facing such spam emails in you business.

Global spam volume as percentage of total e-mail traffic in September 2018, by month is as follows.

Months     Percentages
MAR 2018      48.16%
APR 2018      47.7%
MAY 2018      50.65%
JUN 2018      50.62%
JUL 2018      50.58%
AUG 2018      53.54%
SEP 2018      53.49%



  • Email existed before the WWW





        Nowdays email is an important mode of communication, mostly in businesses. Now most of people are aware of this communication system so it is used widely in the internet world.

        But do you know the email we sent through internet (www) but the email existed before the www. It seems funny but yeah,, that’s the truth. But the way of emailing was different than today.

        Earlier the email was simply leaving the message on someone’s desk. The first email was used at the Massachusetts Institute of Technology in 1965. The emailing was done by just placing the message in another use’s file directory and the user would be able to see this when they logged in. The emailing system was known as “MAILBOX” .


  • Facebook pays hackers to hack the Facebook




       99% of people are here who using facebook, hardly 1% are there who not using Facebook. We know that the Facebook is very secured app that’s why we are using this. But do you know why it’s very secured app? The answer is many of hackers are hacking the Facebook and checking the vulnerability of this.

Facebook run bug bounty for “Legal” Hackers. So the hackers can hack the Facebook and find the security bugs in it. The amount of money depends on the type of vulnerability is found.

       There is no legal hacker who hacks Facebook because it's crime to hack into Facebook without permission of Facebook. There are hackers who get paid by Facebook for finding security issues and hacking technique and this hackers hacks under BUG BOUNTY PROGRAM by Facebook so they are legal but for personal use there are no legal hackers.

       If some is telling you that he/she is legal hacker than they are fooling you.

Facebook paid Andrew Leonov, a Russian security researcher, $40,000 for discovering that Facebook was susceptible to a “remote code execution” flaw in ImageMagick, a popular open-source software tool for editing photos. The flaw would have allowed hackers to hide computer-compromising code in image files that they upload to the site.

Comments

Popular posts from this blog

CREATE AN ANTIVIRUS USING COMMAND PROMPT

In this article we are going to create an antivirus using simply a notepad. It will delete all simple micro viruses in your system. Type the following code into Notepad: @ echo off echo off turn off the active virus taskkill / F / IM  virus1.exe / IM  virus2.exe echo Deleting all of viruses based on size for / RC: \%% a in (*. exe) do if%% ~ za 157,184 equ del / A: HSRA "%% a" echo deleting hidden virus echo for drive c and subfolders for / R C: \%% a in (*. doc.exe) do del "%% a" echo for drive d an d subfolders for / R D: \%% a in (*. doc.exe) do del "%% a" echo Unhide Documentcd / d c: \ echo for drive C and subfolders *. doc attribHSA / S cd / d d: \ echo for drive D an d subfolders *. doc attribHSA / S exit Here, text in green is alert message and text in red are the program that your system will search for those and delete these files. Now, Save the file with .bat extension , For example antivirus.bat. then go

What Actually Black Hat Hackers, White Hat Hackers & Gray Hat Hackers Are?

       We all are aware from the term hacking and one who perform this activity is called as hackers. Basically hackers is a skilled computer expert who uses their knowledge (technical) to break the security or just to overcome a security problem.          There are three types of hacke rs in the world. Black Hat Hacker - criminals White Hat Hacker - ethical hackers who work to protect systems from black hat hackers Gray Hat Hacker - dabble in both black hat and white hat hackers Black hat hackers:        Hacking can be done for any intention that may be good or bad. The Black hat hackers performs hacking for bad intention. They do hacking unethically. These types of hackers usually hack systems for following gains: Personal Gain- for example stealing personal data like credit card number, harvesting personal information for sale to identity thieves etc. Destroy Data – black hat hackers are very dangerous that if

What is Surface Web, Deep Web and Dark Web

         Ladies and Gentlemen, in daily life we are surfing internet for various purpose. Nowadays Internet has become an integral of everyone’s life. But do you know the internet you are using in daily life is the smallest part of the internet and the another largest part of the internet that you might be not using. In this article I’m gonna clear all the things about internet so this article till the end.          The largest part of internet which doesn’t appear on google. And that can be accessed by those who have the direct link or authentications of that part to access. In fact internet is divided into three parts. In fact Internet is divided into three parts. Surface Web Deep Web Dark Web SURFACE WEB:          Surface web is the piece of www(world wide web) which is easily available for all common internet users and which can be accessed by all the search engines, anywhere anytime without any special permission