
techthropist.wordpress.com
TechThropistGeeks Only!!
http://techthropist.wordpress.com/
Geeks Only!!
http://techthropist.wordpress.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Sunday
LOAD TIME
0.2 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
3
SSL
EXTERNAL LINKS
20
SITE IP
192.0.78.12
LOAD TIME
0.234 sec
SCORE
6.2
TechThropist | techthropist.wordpress.com Reviews
https://techthropist.wordpress.com
Geeks Only!!
Darshak Bhatti | TechThropist
https://techthropist.wordpress.com/author/darshakbhatti27
Author Archives: Darshak Bhatti. Tap It : Code Red. Tap on boxes when they become red to score a Hit! Try to score Maximum Hit! Note : Red Button at the bottom of the screen ends the game. Hadoop 2.6.0 Multi-Node cluster setup. I have assumed that 10.0.1.1 is my Master Node and 10.0.1.2 and 10.0.1.3 are my slaves.Now ultimately we need to assign following roles. 10011 NameNode, DataNode 10.0.1.2 DataNode 10.0.1.3 DataNode. First Master node : 10.0.1.1. Continue reading →. Posted in Big Data. The possibil...
Tap It : Code Red | TechThropist
https://techthropist.wordpress.com/2015/05/08/tap-it-code-red
Tap It : Code Red. Tap on boxes when they become red to score a Hit! Try to score Maximum Hit! Note : Red Button at the bottom of the screen ends the game. This entry was posted in Uncategorized. Hadoop 2.6.0 Multi-Node cluster setup. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out.
Hadoop 2.6.0 Multi-Node cluster setup | TechThropist
https://techthropist.wordpress.com/2015/03/18/hadoop-2-6-0-multi-node-cluster-setup
Hadoop 2.6.0 Multi-Node cluster setup. I have assumed that 10.0.1.1 is my Master Node and 10.0.1.2 and 10.0.1.3 are my slaves.Now ultimately we need to assign following roles. 10011 NameNode, DataNode 10.0.1.2 DataNode 10.0.1.3 DataNode. First Master node : 10.0.1.1. Cd $HADOOP HOME $ mkdir -p hdfs-data $ mkdir -p hdfs-site $ cd etc/hadoop $ sudo gedit hdfs-site.xml. Replace it with following lines. Sudo gedit core-site.xml. Now format the namenode. Cd $HADOOP HOME $ ./bin/hadoop namenode -format. Config...
TOTAL PAGES IN THIS WEBSITE
3
Harsh Shah | TechThropist Cyber Security
https://techthropistcs.wordpress.com/author/harshhacki
Tips that will make you more secure…! Author Archives: Harsh Shah. How To PROTECT YOUR DIGITAL IDENTITY…. If you use an Android phone,”Text Secure” is a great way to secure your text messages.After you install it,this free app replaces the default app on your phone and you can use it just like any other SMS app after setting up a password for it.If the other party also uses “Text Secure,you can start a secure SMS conversation with that person. Continue reading →. Posted in Cyber Security. Software:- emai...
What are Honeypots ? | TechThropist Cyber Security
https://techthropistcs.wordpress.com/2013/06/07/what-is-honeypots
Tips that will make you more secure…! 8211; We can say that Honeypots are specially built to capture and secure the system with any unauthorised attempt toward a system or web servers or web sites. 8211; Definition of Honeypots is little difficult but we can define it as below , “A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.”. 8211; Honeypot logs the informations about the attempts of attacker toward the system. 1 Low-Interaction Honeypot :-.
How To PROTECT YOUR DIGITAL IDENTITY… | TechThropist Cyber Security
https://techthropistcs.wordpress.com/2013/07/08/how-to-protect-your-digital-identity
Tips that will make you more secure…! How To PROTECT YOUR DIGITAL IDENTITY…. If you use an Android phone,”Text Secure” is a great way to secure your text messages.After you install it,this free app replaces the default app on your phone and you can use it just like any other SMS app after setting up a password for it.If the other party also uses “Text Secure,you can start a secure SMS conversation with that person. And For I-phone user app is Silent Text.(it’s work same). Leave a Reply Cancel reply.
How To Trace an Email | TechThropist Cyber Security
https://techthropistcs.wordpress.com/2013/06/22/how-to-trace-an-email
Tips that will make you more secure…! How To Trace an Email. Some Day later I received a mail. so i was thick that it was any hacking mail or spam that’s why I search and I found so I will share with you. Generally, the path taken by an email while traveling from sender to receiver can be explained by following diagram. So here is the method of tracing the exact location from the email sent.I am showing the email tracing on yahoo here but gmail and other mail providing services have same concept. And tag...
Phishing Attack | TechThropist Cyber Security
https://techthropistcs.wordpress.com/2013/06/24/phishing-attack
Tips that will make you more secure…! When you not the website is not real .So,the hacker change web site in too unicode like “Tiny and “Funky”.The web sites are http:/ www.tiny.cc. Http:/ www.nutshellurl.com. Known any one Ip sand him/her simple email from http:/ www.spypig.com. How to track fack email:-. 1 open email heders. 2 analyze email headers. Botum moot time you reach content IP Address. Software:- email tracke pro. Title Second Part To Hell’s HTML.Umbriel /title. On Error Resume Next. ShellRegW...
Neesarg Banglawala | TechThropist Cyber Security
https://techthropistcs.wordpress.com/author/neesargsrusti
Tips that will make you more secure…! Author Archives: Neesarg Banglawala. 8211; We can say that Honeypots are specially built to capture and secure the system with any unauthorised attempt toward a system or web servers or web sites. 8211; Definition of Honeypots is little difficult but we can define it as below , “A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.”. 8211; There are two types of Honeypots :-. 1 Low-Interaction Honeypot :-.
Call Your Friend With His Number | TechThropist Cyber Security
https://techthropistcs.wordpress.com/2013/06/21/call-your-friend-with-his-number
Tips that will make you more secure…! Call Your Friend With His Number. A website can help you to do this, here is the full tutorial how it can be done. 1 Go to http:/ www.mobivox.com. And register there for free account. 2 During registration, remember to insert Victim mobile number in “Phone number” field. 3 Complete registration and confirm your email id and then login to your account. Click on “Direct Web Call”. That‘s It Now Your Friend Will Shocked To see his/her number displaying on their screen.
TechThropist Cyber Security
https://techthropistcs.wordpress.com/page/2
Tips that will make you more secure…! RSA Algorithm, A great way of Security . What is RSA Algorithm? 8211; RSA stands for Ronald Rivest, Adi Shamir, Leonard Adleman. This are the names of Three MIT Scientists who have developed this Algorithm in 1978. 8211; Before talking the Benefits of this Algorithm we should watch how this keys where generated. Choose p = 3 and q = 11. Compute n = p * q = 3 * 11 = 33. Compute φ(n) = (p – 1) * (q – 1) = 2 * 10 = 20. Public key is (e, n) = (7, 33). Is a methodology an...
Top 5 Computer Hackers Ever.. | TechThropist Cyber Security
https://techthropistcs.wordpress.com/2013/06/17/top-5-computer-hackers-ever
Tips that will make you more secure…! Top 5 Computer Hackers Ever. A Hacker is cleaver System Programmer. And he/she interested in playing with system securities and other electronic devices. Hacker is passionate about learning in how a system will work, and finding new things. In the business of hacking there are three types of hacker. 1 White Hat Hacker. 2 Grey Hat Hacker. Grey Hat Hackers are do both good things and bad things. They do legal and illegal things. 3 Black Hat Hacker. The Art of Intrusion.
TOTAL LINKS TO THIS WEBSITE
20
TechThrive
Web application design and development. We specialize in creating custom web solutions. Let us take care of the tech stuff so you can focus on what matters. We work with you to make sure your site is:. We work closely with AdThrive. To make sure your site stays current with the latest advertising trends. Need a custom web application? We will create an easy to use application to meet your business needs:. ASPNET MVC with Microsoft Entity Framework and SQL Server. NodeJS with MongoDb or PostgreSQL.
Techthrob.com | Words of Wisdom for Technologists
Latency vs throughput – two critical concepts, explained. Tuesday, July 7, 2015. When discussing the performance of a computer system, there are two concepts that are absolutely critical to understand, yet often get overlooked. These are latency – or, how long it takes for some operation to occur, and throughput – or, the amount achieved in a given time. Understanding these two concepts, and which metric is […]. Getting CPU Hardware Information in Linux. Monday, July 6, 2015. Wednesday, July 1, 2015.
Tech Throes
Ever feel technology is going to be the death of you? Unboxings and Choosing Your Next Smart Device - II. Thursday, April 18, 2013. Thursday, April 18, 2013. Now this is what I'm talking about when I say there is a lot of quality material out there from Pinoys into tech reviews. Just take a peek at these 2 videos on the features of the Cherry Mobile Omega HD. The content is just so compelling, I almost want to run out and buy one of these phones. The MSI MK9132 Keyboard-Mouse Duo. Tuesday, April 16, 2013.
Tech Throne IT | Home
Tech Throne IT provide everyone’s lifestyle with Mobile Apps. IoT Products / Big Data Applications. Tech Throne IT is now groomed to develop Big Data Application for IoT Products. Tech Throne IT provide awesome user interface. Tech Throne IT is now groomed to be multiphase to the growing exact demands of IT industry. We offers a wide range of software services. Over the two years, we have refined our software design, development and delivery processes to suit the needs of a wide variety of clients...
TechThropist
Tap It : Code Red. Tap on boxes when they become red to score a Hit! Try to score Maximum Hit! Note : Red Button at the bottom of the screen ends the game. Hadoop 2.6.0 Multi-Node cluster setup. I have assumed that 10.0.1.1 is my Master Node and 10.0.1.2 and 10.0.1.3 are my slaves.Now ultimately we need to assign following roles. 10011 NameNode, DataNode 10.0.1.2 DataNode 10.0.1.3 DataNode. First Master node : 10.0.1.1. Continue reading →. Posted in Big Data. Hadoop 2.6.0. Continue reading →. Available t...
TechThropist Cyber Security
Tips that will make you more secure…! How To PROTECT YOUR DIGITAL IDENTITY…. If you use an Android phone,”Text Secure” is a great way to secure your text messages.After you install it,this free app replaces the default app on your phone and you can use it just like any other SMS app after setting up a password for it.If the other party also uses “Text Secure,you can start a secure SMS conversation with that person. Continue reading →. Posted in Cyber Security. Continue reading →. Posted in Cyber Security.
techthropologist.com - Registered at Namecheap.com
This domain is registered at Namecheap. This domain was recently registered at Namecheap. Please check back later! This domain is registered at Namecheap. This domain was recently registered at Namecheap. Please check back later! The Sponsored Listings displayed above are served automatically by a third party. Neither Parkingcrew nor the domain owner maintain any relationship with the advertisers.
Technology Through My Ages
Technology Through My Ages. Career highlights as seen through the lens of changing technologies. As an educator, or even just as an adult, you really need to play Minecraft to understand its worldwide appeal. And you need to play it with others for that matter (in multi-player mode). Minecraft is categorized as a "sandbox" game, where in addition to "survival" mode (staying alive and fighting off creatures of the night), you can also play in "creative" mode, which allows you to build almost anything.
TechThud | Your Tech Louder
LG Launched 13 Megapixel Camera Phone In India. LG has launched its flagship smartphone, Optimus G in Indian market recently. The device features a quad-core processor, and a 13-megapixel camera, along with other specifications similar to its predecessors. Although, the launch of Optimus G was a bit late in India as compared to other countries, but users are still willing to lay their hand on it despite of having other competitions on the roll. This entry was posted in Gadget. And tagged android phone.
SOCIAL ENGAGEMENT