Worm, the creature that all of us are familiar of. An animal that live inside soil they dig holes into soil and live in it most of the times they construct tunnels that can enter at one position an exit in another
what is the similarity of this with Virus Worms, well it does the same, The virus worm as you know it dig a tunnel from your machine/Server to out side. so any one can come in to your machine/Server. Most of the times it is able to penetrate firewalls since connection is initiated inside your server and firewalls are allowing that, so some one can use the tunnel that the worm has made and do some damage to your system. or spy on your servers or your activities.
Monday, March 28, 2016
Thursday, March 17, 2016
Trojan Horse Viirus and web development
Trojan, according to Greek methodology City of troy is attacked by Trojans because of a dispute over a women they fort for about 20 years but the walls of troy is impenetrable after 20 years Trojans device a plan they made a large wooden horse and put some of their finest worriers inside and send a message to troy, that they have given up the war, and as a gift of troys victory. they offer this horse and all went and hid them self. the people of troy came and see that no one is there and find the note and was very happy. they pull the horse inside the gates and begin to celebrate all men took wine and other alcohol and was drunk in the mid night
when they got drunk the worriers in side the horse come out and open the gate letting rest of them to come in and to finish the drunken worriers
so how this apply to the Trojan Horse Virus well it attack in slimier fashion, it will arrive to you as a gift and you will accept it since it is a gift and when opening it will attack your system. for an example you will receive a computer game or utility program which is very useful but underneath that there will be a virus that attack your computer setting or give control of your system to another user, so while you play the game or use the utility, it will damage your system or give control to another
so how this apply to web see most of the websites today are build by popular web developing softwere like joomla or wordpress with these you get the ability to attach plugins so you can give functionality to program or make it looks better, better yet most of them are free. so some one can write a plugging and embedded a Trojan inside. plugin is nice has lot of functionality so you are bound to use it, and when you dose it will give the developer of plugin, access to the server and make a security hole so he will be able to manipulate your system through access given by plugin he will be able to upload files like php scripts or run commands linux or windows on your server(if your operating system is one of them) even delete using del command DOS or rm in linux and you will never know what happen.
when they got drunk the worriers in side the horse come out and open the gate letting rest of them to come in and to finish the drunken worriers
so how this apply to the Trojan Horse Virus well it attack in slimier fashion, it will arrive to you as a gift and you will accept it since it is a gift and when opening it will attack your system. for an example you will receive a computer game or utility program which is very useful but underneath that there will be a virus that attack your computer setting or give control of your system to another user, so while you play the game or use the utility, it will damage your system or give control to another
so how this apply to web see most of the websites today are build by popular web developing softwere like joomla or wordpress with these you get the ability to attach plugins so you can give functionality to program or make it looks better, better yet most of them are free. so some one can write a plugging and embedded a Trojan inside. plugin is nice has lot of functionality so you are bound to use it, and when you dose it will give the developer of plugin, access to the server and make a security hole so he will be able to manipulate your system through access given by plugin he will be able to upload files like php scripts or run commands linux or windows on your server(if your operating system is one of them) even delete using del command DOS or rm in linux and you will never know what happen.
Wednesday, March 16, 2016
Friday, March 11, 2016
Enlightenment & Middle Path
Enlightenment & Middle Path All over the world the people think that good & evil are two separate things and been so good will drive the evil away, but as I began to realize things, I began to search myself what is good what is evil and what separates them. Long I search I realize that they are not two but two ends of an same entity, jest as string has two ends, they exist hand to hand with each other, make one end bigger and other will follow, and make one end shorter so as the other, so how do you get rid of the evil if the good and evil exist with side by side, I was searching for an answer for many years of my times. If they both are two ends of one string how are we going to lose one end each time I try to find out I could not get an answer, and suddenly it strikes me you can’t lose one end of a string without losing the other, that is to lose one end, you have to lose the whole string itself, in order to lose evil you have not only lose evil but good itself, such a person will be no good neither evil, and he will do no good no evil, he will act on no good nor evil, no good and no evil act on him. This realize me of one thing one thing that we all was thought from our child hood the teaching of lord Buddha himself the enlightenment & the Middle Path, which many try to find. Is this what he talk about what middle path is, it is not a path between middle of good and evil but a path with no good and no evil, And men who achieve it will see things as it is. He will see the continuation of life flow of nature and many things, more you hang on to one end the other will hang on to you. So giving up both of them will make you free of everything. Free to feel the world from all earthly things, things that the mere mortal will never understands, I wish I would know.
Wednesday, March 9, 2016
Wednesday, January 6, 2016
Tuesday, January 5, 2016
āļ¸āļąāˇ āˇා āļāˇි āļ්āļģිāļēාāļාāļģීāļ්āˇāļē
āļāˇුāļģුāļą් āˇෝ āļāˇු⎠āˇොāļ් āļ¸ේāļŊෝāļāļēේ āļˇāļēාāļąāļāļ¸ āļāļēුāļ°āļē
āļුāļ¸āļ්āļ¯ āļēāļą්āļą āļļොāˇෝ āļ¯ෙāļąාāļේ āļ´ිāļŊිāļුāļģāˇāļą්āļąේ āļą්āļēāˇ්āļ§්āļ āļļෝāļ¸්āļļ, āļĸෛ⎠āļģāˇාāļēāļąිāļ āļāļēුāļ°, āˇāļ¸āˇāļģ
āļ´āļģ්āļēේāˇāļĢ āˇāļŊිāļą් āļąිāļ´āļ¯āˇා āļāļැāļēි āļිāļēāļą āļĸාāļą āˇිāļෘāļ්āļි āļāļģāļĢ āļŊāļ¯ āļļැāļ්āļ§ීāļģිāļēා āˇෛāļģāˇ් āļŊෙāˇ
āļ´ිāļŊිāļුāļģු āļŊැāļļෙāļąු āļāļ.
āļąāļ¸ුāļ් āļ¸ාāļේ āļ¸āļāļēāļąāļ¸් āļ¸ේ āļŊෝāļāļēේ āļ´āˇāļිāļą āļˇāļēාāļąāļāļ¸ āļāļēුāļ°āļē
āˇāļą්āļąේ āļ¸ිāļąිāˇ් āļ¸āļąāˇāļēි. āļ¸āļ් āļąිāˇාāļ¯āļēāļ් āļāļ¸ āļ¸ිāļąිāˇ් āļ¸āļąāˇ āļ
āļ¯ āļąොāļ´ැāˇāļිāļēාāļąāļ¸ි āļāˇāļ āļී āļිāˇිāļ¯ු
āļˇāļēාāļąāļ āļāļēුāļ° āļ
āļ´āļ§ āļ¯āļ්āļąāļ§ āļąොāļŊැāļļෙāļą āļļැāˇිāļąි.
āļ
āļ´ි āļ¸āļąāˇේ āļ්āļģිāļēාāļාāļģීāļ්āˇāļē āˇොāļēාāļļāļŊāļ¸ු. āļļāļ§āˇිāļģ āˇිāļ¯්āļēාāˇāļ§
āļ
āļąු⎠āļāļē āļ´්āļģāļ°ාāļą āˇāˇāļēෙāļą් āļොāļ§āˇ් āļ¯ෙāļāļි āļāļąāļ¸් conscious mind,subconscious mind (āļ´ිāļēāˇි āˇිāˇිāļē āļāļි āļොāļ§āˇ āˇා āļ´ිāļēāˇි āˇිāˇිāļēāļ§ āļēāļ§ිāļą් āļāļි āļොāļ§āˇ) āļŊෙāˇāļēි āļļුāļ¯්āļ° āļ°āļģ්āļ¸āļē āļ
āļąු⎠āļ¸āļąāˇ āļ ෛāļිāˇිāļāļēāļą් āļෙāļą් āļොāļŠāļąැāļුāļąු āļ¯ෙāļēāļ් āļŊෙ⎠āˇිāļ්āļģāˇ
āļāļģāļĢ āļ
āļāļģ āļāˇි āˇිāˇිāļ° āļ ිāļ්āļ āļ´āļģāļ¸ිāļ´āļģා āļāļිāˇීāļ¸ āļąැāļි āˇීāļ¸ āļැāļą āļ¯ේāˇāļĢාāļāļģāļēි. āļāļŊෙāˇāļ¸ āˇිāˇිāļ¯ āˇිāļ්
āļ´āˇāļිāļą āļļ⎠āļ¯ේāˇāļąාāļāļģāļą āļ
āļāļģ āļ¸ිāļąිāˇුāļą්āļේ āˇිāļුāˇිāļŊි āļ
āļąු⎠āļāˇා āˇෙāļąāˇ් āˇāļą āļļ⎠āļāļාāļāļģāļēි.
āļļෞāļ¯්āļ° āļ¸āļāļēෙāļą් āļ§ිāļāļ් āļļැāˇැāļģ⎠āļ¸āļ¸ āļāļē āļļāļ§āˇිāļģ āļ¸āļąොāˇිāļ¯්āļēාāˇāļ§
āļ
āļąු⎠āˇිāļ්āļģāˇāļēāļ් āļ¸ෙāˇිāļ¯ී āļිāļģීāļ¸āļ§ āļļāļŊාāļ´ොāļģāļ්āļු āˇෙāļ¸ි. āļ¸āļ්āļąිāˇාāļ¯āļēāļ් āļļොāˇෝ āļ
āļē āļāļē āˇāļģāļ¯āˇා
āļේāļģුāļ¸් āļෙāļą āļāļි āļļāˇāļēි āļ¸ාāļේ āļ¸āļāļēāļēි.
āļļāļ§āˇිāļģ āˇිāļ¯්āļēාāˇāļ§ āļ
āļąු⎠āļ¸āļąāˇේ āļ´ිāļēāˇිāˇිāˇිāļē āļāļි āļොāļ§āˇ
āļ
āļ´āļේ āļāļ¯ිāļąෙāļ¯ා āļĸීāˇිāļāļēේ āļ්āļģිāļēාāˇāļą් āļ´ාāļŊāļąāļē āļāļģāļąāˇා āļ
āļ´ි āˇිāļāļą āļ´āļāļą āļ¯ෑ āļ¯āˇāˇේ āļāļģāļĢ āļ්āļģිāļēාāˇāļą්
āļ´ාāļŊāļąāļē āˇāļą්āļąේ āļ¸ෙāļēිāļą්.
āļąāļ¸ුāļ් āļ´ිāļēāˇි āˇිāˇිāļēāļ§ āļąොāļ¸ැāļි⎠āļāļි āļොāļ§āˇ āļāļē āļැāļą āļ
āļ¯්āļēāļąāļē
āļිāļģීāļ¸ āˇා āˇිāļ්āļģāˇāļē āļ¸āļ¯āļ් āļ
āļ´āˇāˇුāļēි āļļāļ§āˇිāļģ āˇිāļ¯්āļēාāˇāļ§ āļ
āļąු⎠āļ¸ෙāļ¸ āļොāļ§āˇේ āļ¸ිāļąිāˇුāļą්
āˇාංāˇාāļģිāļ⎠āļāļŊ āˇොāļ¯ āļąāļģāļ āļ¸ෙāļą්āļ¸ āļāļ´āļēාāļāļ් āļ¯ේ āļ¯ āļැāļ¸්āļ´āļ් āˇී āļිāļļෙāļąāˇා āļēāļ¸් āļෙāļąෙāļුāļ§ āļ¸ෙāļ¸
āļොāļ§āˇāļ§ āļāļුāļŊ්āˇීāļ¸āļ§ āˇැāļිāļąāļ¸ි āļāˇුāļේ āļāļ්āļ¸ āˇāļŊ āļāļ´āļēාāļāļ් āļ¯ේ āļ
āļąු⎠āļāˇුāļ§ āļļොāˇෝ āļ¯ේ āļąැāˇāļ āļŊāļļාāļāļ
āˇැāļිāļēි.
āļāļ¯ාāˇāļģāļĢāļēāļ් āļŊෙ⎠āļ¸āļ¸ āļāļŠ්āļා āļේāˇි āļෙāļą āļ¯ෙāļą්āļąāļ¸ි. āļāˇු
āļ
āˇු 5000 āļāļ§ āļ´ෙāļģ āˇිāˇූ āļāļා āļļāļŊāļāļු āļ´ූāļĸāļāļēෙāļ් āˇෙāļąāˇා āļāˇු āļēāļ¸් āļෙāļąෙāļ් āļāˇු āˇෙāļ āļ´ැāļ¸ිāļĢිāˇිāļ§
āˇ්āˇං āļ¸ොāˇāļąāļē āļ¸āļිāļą් āļāļ¸āļą් āļේ āļ¸āļąāˇ āļ
āļģ āļ
āˇු 5000 āļ§ āļāļŊිāļą් āļිāļļූ āļāļ්āˇāļēāļ§ āļģුāļෙāļą āļēāļąāˇා. āļ´āˇු⎠āļāļ¸
āļ¸āļąāˇිāļą් āļāˇු āļ¯ෙ⎠āļļāļŊා āļāļļ āļāˇāļ āļāļ්āļ¸āļēāļāļ¯ී āļ¸ෙāˇැāļąි āļ්āļģිāļēා āˇිāļ¯ු āļිāļģීāļ¸ āˇේāļුāˇෙāļą් āļāļļāļේ āļ
āļ¯
āļāļ්āˇāļē āļāļ¯ාāˇී āļ
āļිāļļāˇāļ් āļāˇා āļēෙāļą් āļ¸ිāļ¯ීāļ¸āļ§ āļĸීāˇිāļāļē āļෙāˇේ āˇෙāļąāˇ් āļāļģāļāļāļēුāļුāļ¯ āļēāļą්āļą āļ´ිāļŊිāļļāļ¯āˇ
āļ´ැāˇැāļ¯ිāļŊිāļāļģ āļ¯ෙāļąāļŊāļ¯ි.
āļāļ්āļāļ§āļ¸ āļිāļēāļąāˇාāļąāļ¸් āļļāļ§āˇිāļģ āļ¸āļąෝāˇිāļ¯්āļēාāˇāļ§ āļ
āļąු⎠āˇිāļ්
āļිāļēāˇීāļ¸ "āļ
āļි āļāļą්āļ¯්āļģීāļē āļĨාāļĢāļē" (ESP- Extra Sensory Perception) āˇැāļąි āļ¯ේ āļ¸ිāļąිāˇුāļą්āļ§ āļිāļģීāļ¸āļ§ āˇැāļිāļēා⎠āļŊැāļļෙāļą්āļąේ
āļāˇුāļą්āļෙ āļ¸ෙāļ¸ āļēāļ§ි āˇිāļ āļāļා āˇāļ්āļිāļ¸āļ් āˇූ āˇිāļ§āļēි. āļļුāļ¯ු āļ¯āˇāļ¸āļ§ āļ
āļąු⎠āļ¸āļ§ āļāļē
āˇ්āļ්āļģ⎠āļිāļģීāļ¸ āļ
āļ´āˇāˇුāļēි āļ⎠āˇāļģිāļēāļ§ āļ
āļ´āļේ āļ¸āļąāˇāļ§ āļēāļ§ිāļą් āļˇāˇාංāļ āļāļāˇී āļāļි āˇිāļāļ් āļŊෙāˇ
āˇāļ¯ුāļą්āˇāļą්āļą āļ´ුāļŊුāˇāļą්
āļāļ්āļāļ§āļ¸ āļ¸āļąāˇ āļēāļąු āļāļා āļ
āļģුāļ¸ āļ´ුāļ¯ුāļ¸ āˇāˇ්āļුāˇāļි āļāļē āļොāļ´āļ¸āļą
āļāļෙāļą āļැāļąීāļ¸āļ§ āļāļ්āˇāˇ āļāļģāļ් āļāˇි āļąිāļ¸āļ් āļąොāļ¸ැāļි āļļāˇāļēි āļ´ෙāļąී āļēāļą්āļąේ.
āļ¸ෙāļ¸ āˇāˇ්āļුāˇāļ§ āļොāļ´āļ¸āļą āˇැāļිāļēාāˇāļ් āļļāļŊāļēāļ් āļිāļļේāļ¯ āļēāļą්āļą āļāļē
āļąිāļāļģ āļˇාāˇිāļාāļāļģāļą āļāļļāˇāļ් āļąො āļ¯āļą්āļąāˇා āˇෙāļą්āļą āļ´ුāļŊුāˇāļą්. āļāļ්āļāļ§ āļ¸ āļļොāˇෝ āļ´ොāļ්āˇāļŊ āļ¯āļ්āˇāļą්āļąේ āļ¸āļąāˇ
āļāļļේ āˇāļģ්⎠āļļāļŊāļ°ාāļģී āļ¯ෙāˇිāļēා āļļāˇāļēි. āļāļ්āļāļ§āļ¸ āļිāļēāļąāˇා āļąāļ¸ි āļāļē āļāˇේāļ¸āļēි. āļāļļ āļēāļ¸āļ්āļ¯ැāļŠි⎠āˇිāˇ්āˇාāˇ
āļāļŊāˇොāļ් āļēāļ¸āļ් āļāļļāļ§ āļŊැāļļෙāļą āļļ⎠āˇැāļුāļą āˇොāļ් āļāˇේāˇāļąāļļ⎠āļāļļāļ¯ āļ¯ැāļąී āļිāļļෙāļąāˇාāļ¯? āļāļ්āļāļ§āļ¸ āļāˇු āļāļļේ
āļ¸āļąāˇ āļāļļ āļāļŊ්āļŊāļą āļāļąැāļ¸ āļ¯ෙāļēāļ් āļāļļāļ§ āļ¯ෙāļą්āļą āļŊැāˇ්āļිāļēි. āļāļļ āˇිāļˇාāļāļēāļ් āˇāļ¸āļ්āˇāļą āļļ⎠āļ¯ැāļŠිāļŊෙāˇ
āˇිāˇ්āˇා⎠āļāļģāļą්āļą. āļāˇිāļ§ āļāļļේ āļ¸āļąāˇ āļāļ¸ āˇිāļˇාāļāļē āˇāļ¸āļ්āˇීāļ¸ āˇāļ¯āˇා āļāļļ āˇුāļ¯ාāļąāļ¸් āļāļģාāˇි āļāļļāļ§
āˇිāļąාāļŠිāļēāļ්āˇāļ් āļąිāļāļģුāļąේ āļාāļŊāļē āļāļ āļිāļģීāļ¸āļ§ āļąොāˇිāļේāˇි āˇැāļ¸ āļ¸ොāˇොāļāļāļ¸ āļ´ාāļŠāļ¸් āļිāļģීāļ¸āļ§ āˇිāļේāˇේ. āļāļļේ āˇිāļ āļāļļ⎠āļ්āļģāļ¸ āļ්āļģāļ¸ āļēෙāļą් āļ āļ¯ෙāˇāļ§ āļēොāļ¸ුāļāļģාāˇි.
āļāļāļēි āļ¸ිāļąිāˇුāļą් āļ´āˇāˇāļą්āļąේ āˇිāˇ්āˇාāˇāļēāļ§ āˇිāˇාāļŊ āļļāļŊāļēāļ්
āļāļිāļļāˇ, āļļොāˇෝāˇිāļ§ āļāļļ āļ
āˇාāļāļි āļ¸āļ¸ āļāļ āˇිāˇ්āˇා⎠āļāļŊා āļāļ āļāˇිāļ°ිāˇāļ§āļ¸ āļāļąා āļēāļą්āļą. āļāˇේ āˇāļą්āļąේ āļāļļāˇ
āļēāļ¸් āļ¯ෙāˇිāļēෙāļ් āˇෝ āļēāļ්āˇāļēෙāļ් āļ¸ෙāˇෙāļēāˇāļą āļąිāˇා āļąොāˇේ āļāļļ āļāļē āļ¯ැāļŠි⎠āˇිāˇ්āˇාāˇāļāļģāļąāˇිāļ§ āļāļļāļේ āļ¸āļąāˇ āļ
āļ¯ෙāļē āļිāļģීāļ¸āļ§ āļāļļ⎠āļ´ෙāļŊāļļāˇāļą āļąිāˇා āļāļ්āļāļ§āļ¸ āļāļļ⎠āļ¸ෙāˇෙāļēāˇāļą āļ¯ෙāˇිāļēා āˇෝ āļēāļ්āˇāļēා āļāļļāļේ āˇිāļāļēි.
āļ¸ා āļ āˇා āļිāļļෙāļąāˇා āļිāļුāļąු āļāļāļ¸āˇි āļ´āˇāˇāļąāˇා āļāļļāļ§ āļ¯ෙāˇිāļēāļą් āļෙāļģෙāˇි āļ āļļ āļāļ§āļēāļ් āļāļģāļ¸්āˇāļ් āˇිāˇ්āˇාāˇāļēāļ් āļāļ්āļąāļ¸් āļ⎠āļ¸ෙāļāļąිāļą් āļොāˇ් āļ¸ුāˇුāļ¯ āļ¸ැāļ¯ āļ´ැāļŊāˇෙāˇāļēි āļ´ැāˇāˇු⎠āˇොāļ් āļāļē āļāˇේāˇāļą āļļ⎠āļāļ්āļāļ§āļ¸ āļāļēිāļą් āļ´āˇāˇāļą්āļąේ āˇිāˇ්āˇාāˇāļēේ āļāļි āļļāļŊāļēāļēි. āļāˇāļ¯ āļāļļ āļļෝāļ°ිāļ´ූāļĸා āˇැāļąි āˇāļාāˇāļ් āļāļģ āļāļ¸āļą් āļේ āļ¯ැāļą් āļ´āˇāļිāļą āļāļ්āˇāļēāļą් āļ¸ිāļ¯ිāļē āˇැāļිāļēāļēි āļāļŊ්āļ´āļąාāļāļģ āļāļē āļāļģāļēි āļąāļ¸ි. āļāļē āļ¯ැāļŠි⎠āˇිāˇ්āˇා⎠āļāļģāļēි āļąāļ¸ි. āļāļē āļāˇේāļ¸ āˇෙāļąāˇා. āļ¸ොāļāļ¯ āļāļļ āļēāļ¸් āļ¯ෙāļēāļ් āˇිāˇ්āˇා⎠āļāļģāļą āˇිāļ§ āļāļļāļේ āļ¸āļąāˇ āļāļē āļāļļāļ§ āļāļ§ුāļāļģāļැāļąීāļ¸āļ§ āļāļ¯āˇු āˇෙāļąāˇා. āļ¸ෙāļē āˇāļ¸āˇāļģ āļģොāļීāļāļ්āˇāļēāļą් āˇු⎠āļිāļģීāļ¸් āˇāļŊāļ¯ී āļ¯ āļēොāļ¯ාāļāļą්āļą āˇා. āļģොāļීāļēාāļ§ āļ¯ෙāļą āļļෙāˇෙāļ් āˇāļŊිāļą් āļුāļąāļēāļ් āļāļි āļļ⎠āļāļ්āļු āļැāļą්āˇීāļ¸ āļ¸āļිāļą් āˇāļ¸āˇāļģ āļģෝāļ āļāļļෙāļ¸ āˇු⎠āļිāļģීāļ¸āļ§ āˇැāļි āļļāˇāļ§ āļ āļ¯ āļ´āļģ්āļēේāˇāļĢ āļ¸āļ§්āļ§āļ¸ිāļą් āļ´āˇāļිāļąāˇා. āļāˇුāļą්āļ§ āˇිāļ§āļ¸ිāļą් āļ´ෙāļිāˇැāļąි āļļෙāˇෙāļ් āļąිāļģ්āļ¯ේāˇāļāļģ āļāļē āļāļ¸ āļģෝāļāļē āļąිāļ§්āļ§ාāˇāļ§ āļ¸ āˇුāˇāˇāļą āļļ⎠āļģෝāļීāļēාāļ§ āļāļ්āļු āļැāļą්āˇුāˇිāļ§ āļāˇුāļą් āļāļļෙāļ¸ āˇුāˇāˇāļą āļļāˇāļ§ āļ´āļģ්āļēේāˇāļą āļ¸āļිāļą් āļ āļ¯ āļāļ´්āļ´ුāˇී āļ´āˇāļිāļąāˇා. https://en.wikipedia.org/wiki/Placebo āļ¸ෙāļē āļ´්āļŊāˇීāļļෝ(Placebo) effect āļŊෙ⎠āˇෛāļ¯්āļē āˇිāļ¯්āļēාāˇේāļ¯ි āˇāļ¯ුāļą්āˇāļąු āļŊāļļāļąāˇා. (http://www.cancer.org/treatment/treatmentsandsideeffects/treatmenttypes/placebo-effect)
āļ¸ා āļ āˇා āļිāļļෙāļąāˇා āļිāļුāļąු āļāļāļ¸āˇි āļ´āˇāˇāļąāˇා āļāļļāļ§ āļ¯ෙāˇිāļēāļą් āļෙāļģෙāˇි āļ āļļ āļāļ§āļēāļ් āļāļģāļ¸්āˇāļ් āˇිāˇ්āˇාāˇāļēāļ් āļāļ්āļąāļ¸් āļ⎠āļ¸ෙāļāļąිāļą් āļොāˇ් āļ¸ුāˇුāļ¯ āļ¸ැāļ¯ āļ´ැāļŊāˇෙāˇāļēි āļ´ැāˇāˇු⎠āˇොāļ් āļāļē āļāˇේāˇāļą āļļ⎠āļāļ්āļāļ§āļ¸ āļāļēිāļą් āļ´āˇāˇāļą්āļąේ āˇිāˇ්āˇාāˇāļēේ āļāļි āļļāļŊāļēāļēි. āļāˇāļ¯ āļāļļ āļļෝāļ°ිāļ´ූāļĸා āˇැāļąි āˇāļාāˇāļ් āļāļģ āļāļ¸āļą් āļේ āļ¯ැāļą් āļ´āˇāļිāļą āļāļ්āˇāļēāļą් āļ¸ිāļ¯ිāļē āˇැāļිāļēāļēි āļāļŊ්āļ´āļąාāļāļģ āļāļē āļāļģāļēි āļąāļ¸ි. āļāļē āļ¯ැāļŠි⎠āˇිāˇ්āˇා⎠āļāļģāļēි āļąāļ¸ි. āļāļē āļāˇේāļ¸ āˇෙāļąāˇා. āļ¸ොāļāļ¯ āļāļļ āļēāļ¸් āļ¯ෙāļēāļ් āˇිāˇ්āˇා⎠āļāļģāļą āˇිāļ§ āļāļļāļේ āļ¸āļąāˇ āļāļē āļāļļāļ§ āļāļ§ුāļāļģāļැāļąීāļ¸āļ§ āļāļ¯āˇු āˇෙāļąāˇා. āļ¸ෙāļē āˇāļ¸āˇāļģ āļģොāļීāļāļ්āˇāļēāļą් āˇු⎠āļිāļģීāļ¸් āˇāļŊāļ¯ී āļ¯ āļēොāļ¯ාāļāļą්āļą āˇා. āļģොāļීāļēාāļ§ āļ¯ෙāļą āļļෙāˇෙāļ් āˇāļŊිāļą් āļුāļąāļēāļ් āļāļි āļļ⎠āļāļ්āļු āļැāļą්āˇීāļ¸ āļ¸āļිāļą් āˇāļ¸āˇāļģ āļģෝāļ āļāļļෙāļ¸ āˇු⎠āļිāļģීāļ¸āļ§ āˇැāļි āļļāˇāļ§ āļ āļ¯ āļ´āļģ්āļēේāˇāļĢ āļ¸āļ§්āļ§āļ¸ිāļą් āļ´āˇāļිāļąāˇා. āļāˇුāļą්āļ§ āˇිāļ§āļ¸ිāļą් āļ´ෙāļිāˇැāļąි āļļෙāˇෙāļ් āļąිāļģ්āļ¯ේāˇāļāļģ āļāļē āļāļ¸ āļģෝāļāļē āļąිāļ§්āļ§ාāˇāļ§ āļ¸ āˇුāˇāˇāļą āļļ⎠āļģෝāļීāļēාāļ§ āļāļ්āļු āļැāļą්āˇුāˇිāļ§ āļāˇුāļą් āļāļļෙāļ¸ āˇුāˇāˇāļą āļļāˇāļ§ āļ´āļģ්āļēේāˇāļą āļ¸āļිāļą් āļ āļ¯ āļāļ´්āļ´ුāˇී āļ´āˇāļිāļąāˇා. https://en.wikipedia.org/wiki/Placebo āļ¸ෙāļē āļ´්āļŊāˇීāļļෝ(Placebo) effect āļŊෙ⎠āˇෛāļ¯්āļē āˇිāļ¯්āļēාāˇේāļ¯ි āˇāļ¯ුāļą්āˇāļąු āļŊāļļāļąāˇා. (http://www.cancer.org/treatment/treatmentsandsideeffects/treatmenttypes/placebo-effect)
āļāļāļēි āļ
āļ´ේ āļ´ැāļģැāļą්āļąෝ āļිāˇුāˇේ āˇිāļ āļāļ්āļąāļ¸් āļ´āļ āļුāļŠාāļ¯
āļිāļēāļŊා. āļāļ්āļāļ§āļ¸ āļāļē āļ
āļ´ූāļģු āˇāˇ්āļුāˇāļ් āļāˇāļේāļ¸ āļāļļāļේ āļ¸ෙāļ¸ āļ¯ෙāˇිāļēා āļāļļ āļāļŊ්āļŊāļą āļ¯ේ āļŊāļļා āļ¯ෙāļąāˇා
āļāļļැāˇිāļą් āļāļļ āļ´āļģිāˇ්āˇāļ¸් āˇ්āļē āļēුāļුāļēි. āļāļļ āļāļļāļ§ āļąුāˇුāļ¯ුāˇු āļ¯ෙāļēāļ් āļāļŊ්āļŊුāˇāˇොāļ් āļāļļāļේ āļ¸ේ āļ¯ෙāˇිāļēා āļāļļāļ§ āļāļē
āļąිāˇāļāˇāļ¸ āļŊāļļා āļ¯ෙāļą āļļැāˇිāļą් āļāļļැāˇිāļą් āļāļ¸āļą් āļ¯ැāļŠි⎠āˇිāˇ්āˇා⎠āļāļģāļĢ āļ¯ේāļැāļą āļ´්āļģāˇේāˇāļ¸්āˇāļą්āļą āļ¸ොāļāļ¯
āļāļē āļąāļ´ුāļģු āļ ේāļāļąාāˇāļිāļą් āļāļģāļą āļāļāļ්āļąāļ¸් āļāļļāļ§āļ¯ āļāļļāˇāļ§ා āļāļą්āļą āļ
āļēāˇāļŊුāļą්āļ§āļ¯ āļ¸āˇා āˇිāļąාāˇāļēāļāļ§ āļ¸āļ
āļ´ාāļ¯āļąුāļāļ.
Wednesday, December 2, 2015
Tuesday, December 1, 2015
ISO – OSI (International Standard Organization - Open Systems Interconnection model) what is it?
ISO – OSI is a standard for communication between network devices that
is impose by ISO (International Standard Organization) it consist of 7 layers
- Application
- Presentation
- Session
- Transport
- Network
- Data link
- Physical
All the network devices have one or more of these layers to perform a
network task to communicate data with one end to another it needs to implement
this at the both ends.
Devices such as Computers has implemented all the seven layers while switch
has ether Network, Data Link , Physical or Data Link Physical layers depending
of the type of the switch which you may come across as L2 Switch and L3 Switch
stands for Layer 2 switch and Layer 3 Switch which is the number of layers from
the bottom of the list. L3 switch is mostly know as manageable switch since you
can use them to program the flow of the data in and out of it. And the routers
the things that we use to route our packets through network works on Network
layer meaning Network, Data Link and Physical are implement on them.
So Let’s look at the layers from top to bottom
Application
This refer to the actual application that you use to communicate with
the network google chrome, Mozzila Fire Fox, Putty, File Zella are some example
of applications that you may already use to communicate with the network.
Presentation
This is the data representation system conversion since different
system have different way of representing things so it converts to a format
that every one recognize and wise versa
Session
Session is a layer that contains session details like session Id.
which is reference to one of the connection of the same application since there
can be more than one for example google chrome can have many tabs opened and it
says which tab the data needed to go
Transport
This layer controls the end to end delivery it use TCP (Transmission
Control Protocol and UDP (User Datagram Protocol) to achieve that. TCP is a
connection oriented one so end to end delivery is guaranteed and UDP is not
connection oriented so it is not that reliable for sending data. In this phrase
that TCP Header is added to the data which is telling that destination that it
is a TCP packet or UDP packet also it have some flags that can be set one if
syn another is ack and also fin which is use by the three way hand shake of the
TCP to successfully establish a connection.
Network
The data with the TCP header is send to this layer which adds another header
to it which is the Network Header it contains the source IP address,
Destination IP address, source port and destination port. In this the packet is
fragmented that is divided to small parts if it is too big to send as one. This
header is use for transferring the packets end to end.
Data Link
In data link layer it adds another
header which is data link header it consist of two mac (Media access control)
address of host and a destination this use to navigate through the network the
destination and source mac are not always the address of the beginning and end
nodes it is hop to hop that mean if you send data from your computer and if it goes
through router A,B,C and Destination then fist source mac is of your computer
and destination is of router A and when it get to the router A it check it for
the destination IP by opening the IP layer and it finds that the packet need to
send to router B to get to the destination so it does not change IP Header but
when it come to data link it change it now the source mac is the mac of router
A and destination mac is the mac of router B and this process goes on until it
reach the destination. The data is also segmented at the if it is big and if is
known as a frame error control and flow control is added by this stage. This layer
is further divided to LLC and Mac
Physical Layer
Till now the data is of bits and it is not physical thing and we need
to convert is to a physical thing so we can send it across a physical media
Physical Layer dose this for wire Cables it converts to electrical Current for
Wireless it convert to wireless signals for fiber cables it convert to laser
light etc.
At the other end the data is reached by the physical layer which
convert it to bits and pass to data link which check for errors and then pass
to network which check for destination and Transport for connection session to find out which instance presentation
convert the data back to local application type and finally application which
you will see the result at your PC
Subscribe to:
Posts (Atom)