Monthly Archives: January 2017

TOP FIVE SUGGESTIONS FOR MOBILE FRIENDLY WEBSITE

Top five suggestions for mobile friendly website

In the past few years’ mobile design has been detonated, but knowing what to do and where to start can be a big task. Mobile website design is not just about choosing between a mobile website or an application but, there is a range of options in between and aspects to take into account, including responsive web design, mobile-friendly web fonts, and much more.

To help you out, we have segregated together top tips on what to be considered while defining your mobile strategy and designing for mobile. So let’s dive deep-in and see the top suggestions for the mobile friendly website.

Mobile_Friendly_Website

USE A RESPONSIVE DESIGN

Responsive design allows the website developers to create a website which is effortlessly viewable on different size devices. This reduces the amount of work the website developers have to do when it comes to creating a website.

The responsive design approach makes use of flexible layouts, flexible images, and cascading stylesheet media queries. When responsive design is used on a website, the web page will be able to detect the user’s screen size and orientation and can change the layout accordingly.

ALWAYS INCLUDE A VIEWPORT META TAG

The viewport is a virtual area used by the browser rendering engine to determine how the content is scaled and sized. Without this viewport, your website will not work perfectly on a mobile device. What the viewport meta tag tells your browser is that the page needs to get fitted into the screen. There are many different configurations that you can specify your viewport to control. Here’s what we recommend in using at the head of the document.

Note: This only needs to be declared once.

FONT SIZES AND BUTTON SIZES ARE ALWAYS MATTERS

Your font size and button sizes always matter a lot for mobile devices. For font size, it should be at least 14px. This may seem big, but instead of users to zoom-in to read the web content, make it easier for them by adjusting the font size for maximum readability. The only time the user should be choosing a smaller to a minimum of 12px, is on labels or forms.

As for buttons, the bigger the button, the better—it reduces the chances that the user will miss or hit the wrong button by mistake. For instance, Apple’s design guidelines recommend button sizes to be at least 44px by 44px. Following these guidelines will help to maximize the user’s experience on their mobile device and increase conversions for e-commerce sites.

USE HIGH-RESOLUTION IMAGES

High-resolution images are very important in responsive websites to ensure the user’s experience in a high standard. The latest models of iOS devices have high-definition screens which requires an image double the resolution of a desktop. Having extremely high-resolution images will help the developers to avoid in having pixelated or even blurry images when viewed on a retina-quality screen.

NEVER STOP TESTING

Once you’ve created your responsive website, test it for a multiple number of times. We don’t just mean “try it on one of your mobile devices multiple times;” test it on an iPhone, an Android, a Windows phone, and on different tablets. Test every page, user action, buttons; and while you’re testing, it’s always important to put yourself in the position of the user, or ask someone who didn’t design it to test it for you.

We hope these tips has provided you the guidance in knowing how to make your website mobile-friendly.

suggestions_for_mobile_friendly_website

HOW TO SECURE THE MOBILE APPS?

How to Secure The Mobile Apps?

The use of mobile devices continues to mount at a higher rate. 80% of the world population are already more on Internet-connected mobile devices, such as smartphones and 3G/4G tablets. The use of dedicated mobile applications is also increasing and is completely influencing mobile internet usage. Flurry reports that mobile applications account for 86% of the average U.S. mobile user’s time, which amounts to more than two hours per day.

Mobile apps are available through online by app distributors such as Apple’s App Store and Google’s Play Store are without a doubt the ascendant form of delivering value to the users throughout the world. Organizations have embraced mobile apps as a way to improve employee’s productivity and align with their new agile and mobile lifestyle, but are these mobile applications really secure and protected from malicious data and hackers?

So, explore this article and know how to secure your mobile apps from hackers.

Secure The Mobile Apps

SECURE THE CODE: CONSTRUCTING A SECURE APPLICATION

Mobile malware often taps vulnerabilities or errors in the design and coding of the mobile applications they target. Recent research from Kindsight reported by Infosecurity shows that malignant code is infecting more than 11.6 million mobile devices. Even before a vulnerability is oppressed, hackers can obtain a public copy of an application and can reverse engineer it. Popular applications are repackaged into “rogue apps” containing suspicious code and are posted on third-party application stores to allure and trick unaware users to install them and compromise their devices.

Organizations should look for tools to support their developers to detect and close security vulnerabilities. However, “consumer applications” still produce a threat as they may not undergo the appropriate coagulate process; and if rogue applications, malware and enterprise apps share the same device, the threat is detectable.

SECURE THE DEVICE BY DETECTING COMPROMISED AND VULNERABLE RUN-TIME ENVIRONMENT

As an application, its security always relies on the underlying device security. Organizations should look into the ways to dynamically gauge the security of the underlying device. Firstly, the mobile application sandbox, which is popular in modern mobile operating system design, must be undamaged. Rooting or jailbreaking the device breaks the underlying security model, and it is always recommended to restrict these devices from accessing organizations data. Jailbreak technology is progressing rapidly to elude detection; managing with these mechanisms is essential for keeping up with these threats. Organizations should consider up-to-date intelligence sources and application reputation services to trail the tidal wave of applications and their associated risks. Using this data, application capabilities could be enabled or disabled based on the device risk profile.

SECURE THE DATA: PREVENTING DATA THEFT AND LEAKAGE

When mobile applications access the organizations data, documents, and unstructured data are often stored on the device. If the device is lost or when the data is shared with non-enterprise applications, the potential for data loss will be increased.

Many organizations are already looking into “remote wipe” capabilities to address stolen or lost devices. Mobile data encryption can be used to secure the data within the application sandbox against suspicious data and other forms of culprit access. To control application data sharing on the device, every individual data element should be encrypted and controlled.

SECURE THE TRANSACTION

Mobile applications enable the users to transact with organization services on the go, the risk tolerance for transactions will vary. Organizations should adapt an approach of risk-aware transaction execution that restricts client-side functionality based on policies that consider mobile risk factors such as device security attributes, user location, and the security of the network connection, among others.

SECURE_THE_TRANSACTION

ANGULAR 1 Vs ANGULAR 2

Angular 1 Vs Angular 2

AngularJS is a structural framework for dynamic web apps. It lets the user to use HTML as their template language and extends HTML’s syntax to express their application’s components clearly and concisely.

There are many conceptual and syntactical differences between Angular 1 and Angular 2. In this article, we are going to explain you the major differences between the above frameworks.

1) AngularJS 1 is easy to setup. All you need to do is to add a reference to the library and you are good to go. Whereas AngularJS 2 is dependent on other libraries and it requires some efforts to set up.

2) Angular 2 provides more choice for languages. The developer can use any of the languages from ES5, ES6, TypeScript or Dart to write Angular 2 code. Whereas, Angular 1 supports only ES5, ES6, and Dart.

3) Angular does not have in-built with mobile support, whereas Angular 2 is mobile oriented.

4) In Angular 1 there is no usage of controllers and $scope, whereas in Angular 2 con-trollers has been replaced with components. Angular 2 is component based.

ANGULAR 2 COMPONENTS USING TYPESCRIPT

import { Component } from ‘angular2/core';

@Component({

selector: ‘prodsdata’,

template: `

<h3>{{prods.name}}</h3> `

})

export class ProductComponent {

prods = { name: ‘Prod1′, quantity: 1 };

}

* Angular 1 consists of two ways to bootstrap angular. One is using ng-app attribute and other through code.

<script>

angular.element(document).ready(function() {

angular.bootstrap(document, [‘myApp’]);

});

</script>

SAY GOODBYE TO NG-APP

Angular 2 doesn’t support ng-app. Say goodbye to ng-app. The only way to support angular is through code.

import { bootstrap } from ‘angular2/platform/browser';

import { ProductComponent } from ‘./product.component';

bootstrap(ProductComponent);

The bootstrap is a function; it takes starting component which is also a parent component of the angular application.

* The Structural directives syntax is changed. ng-repeat is replaced with *ngFor in Angular 2.

ANGULAR 1 STRUCTURAL DIRECTIVES

<ul>

<li ng-repeat=”technology in technologies”>

{{technology.name}}

</li>

</ul>

<div *ngIf=”technologies.length”>

<h3>You have {{technologies.length}} technologies.</h3>

</div>

* In Angular .2 local variables are defined using a hash (#) prefix.

* In Angular 1, ng-model is used for two-way data binding, but in Angular 2 it is replaced with [(ngModel)].

* One of the major advantages of Angular is Dependency Injection. Angular 2 consists of DI but, there is a different way to inject dependencies. As everything is a class in Angular, so DI is achieved through a constructor.

THE VERDICT

Though the above two frameworks are similar, there are some essential differences in these two processes. Angular 2 is a really big step forward. And it certainly requires some efforts to migrate from Angular 1 to Angular 2. Both the tools have equal importance when compared with each other on the basis of functionality. The choice is always depends on the need and the requirements of the project.

FEATURES OF HTML5

Features of HTML5

If you are a HTML developer, it is necessary for you to keep yourself upgraded with the new features introduced by HTML5. In this article, we have explained the top features of HTML5 that will help you to develop dynamic websites for multiple platforms or devices.

1.SIMPLE DOCTYPE

Are you still using the infuriating and baffling XHTML DOCTYPE? Then, it’s high-time to swap it with the new HTML5 DOCTYPE.

The fifth version of HTML comes with a simple DOCTYPE. In order to indicate that your HTML content utilizes HTML5, the user just needs to write:

<!DOCTYPE html>

The HTML5 DOCTYPE is an appreciated standard and is suitable for all new type of documents. It is generally used for both older and modern browsers which needs a specified DOCTYPE. However, browsers that don’t understand this DOCTYPE will directly submit the contained mark-up in standard mode. Thus, one can freely use the new and simple HTML5 DOCTYPE.

2.FLEXIBILITY WITH “QUOTATION MARKS”

If you are writing HTML5 attributes, the user does not need to utilize quotation marks to define the values. It completely depends on the user whether the user wants to close the elements with quotes or not.

<p class=myClass id=someId> Start the reactor.

However, the user cannot always eliminate quotes from attribute values. For instance, if the user wants to use some more structured documents, the user needs to use the quotes.

3.CAN EDIT TEXT CONTENT HTML5

Most of the new browsers assimilated with a new attribute called content editable which enables the user to edit any of the text included within the element.

With the use of this attribute, the user can instruct the browser to enable the users to add, delete, and edit the text. There are many uses for this technique, such as enabling users to customize the way how pages crop out each time when they visit the website. If the user wants to edit the text contained in the element, the user just need to add:

<ul contenteditable=true>

4.NEW AND EASY SEMANTIC ELEMENTS

Most of the websites use the HTML code with an objective to symbolize header, navigation, and footer. However, this is quite a complicated technique.

HTML5 offers new and easy-to-memorize semantic elements that can help the developers to define different sections of a web page. Below are the following Semantic Elements:

<header>

<footer>

<nav>

<section>

<article>

HOW TO BECOME A VIRTUAL REALITY DEVELOPER?

How to become a virtual reality developer?

Virtual reality is pretty much the next big thing, as it has been for about 20 years till now. Being the “next big thing” from past two decades it just shows how much hype it has and how challenging it has been to make the virtual reality a practical reality. Most of the work falls on developers who are doing all they can with current and bleeding-edge technologies to push the envelope ever forward.

You can also be a virtual reality developer too, but only if it is truly what you’re looking for. Being a part of technology’s next big leap is an exciting prospect, but you must be able to actively contribute to it. The road to becoming a developer is something that one must be able to walk and stumble through without loss of eagerness upon reaching a milestone.

THE REQUIREMENTS

The foundation has to be as a developer first, whether you’re a programmer or a 3D artist. You must have the core skills needed to take the next step in getting into the virtual reality(VR). Experience with working in a team and working on projects is also a recommended qualification, one has to be comfortable working in such conditions. VR is fairly similar, but with more, unfamiliar and unusual hardware to deal with.

Creating 3D environments in a computer is the first thing, but making them for VR has its own set of obstacles, many from those are still being solved. The developers from other fields are also valuable as they can bring ideas and potential solutions from other perspectives. Whether it’s a film, architecture, engineering, interior design, or so on, each of these fields will be able to benefit from the origin of VR technology.

The very most important requirement is to have the desire to come up with totally fresh ideas and work on them enthusiastically.

STEPS TO BECOME A VIRTUAL REALITY DEVELOPER
Make a plan:

Plan out where you think things will go as you work. The very first step in the planning stage is usually to make a personal “code map.” Planning out for all the parts and pieces of a project before coding starts, it saves loads of time when the implementation phase rolls around. The major benefits of making an initial plan are mostly seen in the early stages of production.

Ask for the feedback:

Continuous feedback is the best way to make sure that the project is moving in the right direction. Try to get feedback and ask questions from your co-workers as often as possible, especially when you are treading into new programming territory. At the client level, project managers are very good about getting regular feedback from clients, which keeps everyone on the same page as you work. It saves you from a lot of reworking.

Engage the experts:

One of the best things in an organization is unlimited knowledge of fellow developers. Whenever you get stuck, first research the problem on your own for a bit but never afraid to ask for a help. Having the chance to learn and work with a great team of talented people working on awesome AR and VR projects has been, and continues to be an incredible experience.

SOME POPULAR EXAMPLES OF VR
Samsung Gear VR:

Samsung’s approach to VR has been quiet different: the Gear VR uses Oculus head-tracking technology in combination with Android smartphones such as Galaxy Note 4 to power mobile VR experiences. Instead of dedicated display technology, lenses allow the phone’s screen to act as a stereoscopic display, making the device simpler and less expensive than many other options.

Google Cardboard:

Google’s entry into VR came as a huge surprise during last year’s I/O conference. The Google Cardboard is a do-it-yourself (DIY) approach to mobile VR, is an enclosure for Android phones that can be built for less than twenty dollars. Several demos and games for the Cardboard SDK are already available on the Google Play store, and while the experience isn’t quite as immersive or ground-breaking as other organizations offerings, Google’s ad hoc Virtual Reality experiment shows a surprising amount of interest in even basic VR technology.

THE VERDICT

Becoming a virtual reality developer is more challenging and fascinating. Whatever the result may be, there are a whole lot of really smart people who are constantly working incessantly and trying to bring the virtual world into our peripheral vision.

Being a virtual reality developer, you always know that you’re changing the world for the future. That’s quite a reward in itself, and the journey is indeed a very interesting one.

WRITE ABOUT APP CONTAINER SPECIFICATION IN ROCKET CONTAINERIZATION.

Write about App Container specification in Rocket containerization.

Rocket is a command line tool, rkt, that implements the App Container specification created by CoreOS for an open portable container format, composed of:

App Container Image (ACI): Signed and optionally encrypted tgz with all the bits to run the container. Encryption allows distribution via BitTorrent, public object storage, or mirror networks.

App Container runtime: Environment in which the container should run, including devices, environment variables, privileges and a definition of a meta-data service interface for exposing data to the environment from outside the container.

App Container discovery: Federated protocol for finding and downloading images, inspired by golang’s vanity URL convention for import paths. Images can referred to with names such as coreos.com/etcd, allowing federated downloads without running a registry.

HOW IS ROCKET CONTAINER DIFFERENT FROM THE DOCKER?

How is Rocket container different from the Docker?

Rocket tries to build things differently from Docker in several aspects:

Composition: Tools for downloading, installing, and running containers should be independent and composable.

Security: Isolation should be pluggable, with image auditing and application identity.

Image distribution: Image discovery should be federated and distributed, with pluggable alternative protocols such as BitTorrent or easier private distribution without a registry.

Open: The format and runtime should be well-specified and developed by a community, allowing independent implementations of tools to be consistent.

WHAT IS THE ADVANTAGE OF CONFIGURING BURP SUITE WITH FIREFOX OR ICEWEASEL?

What is the advantage of configuring burp suite with firefox or Iceweasel?

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.

Burp Suite allows you to combine manual and automated techniques to enumerate, analyse, scan, attack and exploit web applications. The various Burp tools work together effectively to share information and allow findings identified within one tool to form the basis of an attack using another.

BurpSuite allow us to forward all of the web traffic from your browser through BurpSuite so that you can see each HTTP Request and Response and manipulate it to your heart’s content.

CAN WE GENERATE CUSTOM KALI LINUX ISOs?

Can we generate Custom Kali Linux ISOs?

One of the most powerful features of Kali Linux is the ability to create your own flavours of the distribution containing customized tools, desktop managers, and services. This workshop will show you how to create your own personalized Kali Linux ISO, customizing virtually every aspect using the live-build utility and making efficient use of the various metapackages available in Kali.