What is Cloud Computing?

“I don’t need a hard disk in my computer, if I can get to the server faster; carrying around these non connected computers is excessively complex by comparison.” –Steve Jobs

Is this Cloud in the sky?

No, the Cloud is just a metaphor for Internet. The term Cloud used in science is used to describe collection of objects that visually appear from a distance as a cloud.

What’s the cloud?

Remote machines owned by another company run everything from e-mail to word processing to complex data analysis programs over a network, where a these applications may run on many connected computers at the same time. You need to access your data or your programs over the Internet using Cloud Computing.

Where it is?

Cloud Computing is divided into 2 sections:
  • The front end is the side the computer user, or client, sees.
  • The back end is the "cloud" section of the system.

What’s the architecture?

The services offered by the Cloud Computing providers are based on different fundamental models, like:

  1. Infrastructure as a Service (IaaS): Most basic cloud service model, providers of IaaS offer computer’s physical & virtual machines and other resources like Server storage, load balancers, networking and many more. E.g. Google Compute Engine. Windows Azure.
  2. Platform as a Service (PaaS): Cloud providers deliver a computing platform, typically including operating system, programming language execution environment, database, and web server. e.g., Google App Engine
  3. Software as a Service (SaaS): Cloud providers offers user access to application software and databases such as CRM, Email, virtual desktop, communications, games and many more.

“Every kid coming out of Harvard, every kid coming out of school now thinks he can be the next Mark Zuckerberg, and with these new technologies like cloud computing, he actually has a shot.” –Marc Andreessen, Board Member of Facebook

For more Information about Cloud Computing please attend the Cloud Computing workshops

Read more..

What is Cyber Security?

Cyber security, also referred to as Information Technology security or Computer Technology, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.

The term Cyber security is used to refer to the security offered through on-line services to protect your online information.Cyber security protects confidential information by responding, detecting and preventing attacks.

Cyber security is very important because governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security. As the number of mobile users, digital applications and data networks increase, so do the opportunities for exploitation.

To understand the techniques for securing a computer system, it is important to think from the perspective of an attacker and the various ways an attacker can use to infiltrate the security of our systems. There are numerous ways any security can be breached but in case of Cyber security it can be categorized into 7 types such as:

  • Backdoor
  • Denial of Service Attack
  • Direct Access Attack
  • Eavesdropping
  • Exploits
  • Indirect Attacks
  • Human Error

The most vulnerable areas where Cyber security has great importance are Cloud Computing and Aviation Industry.

Cyber security can be implemented by improving the System Designs & Architecture, executing Security Measures, reducing the vulnerabilities , Hardware protection mechanisms, use of secure operating system and coding.

In today’s world cyber attacks are considered more dangerous than terrorist attacks. The most secure computers are those not connected to the Internet and shielded from any interference. But there’s no life without Internet.

Don’t worry Cyber security is to the rescue!!

For more Information about Cyber security please attend the Ethical Hacking workshop

Read more..

What is Cryptography?

Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the internet) so that it cannot be read by anyone except the intended recipient.

Don’t understand anything?


Here we go again:

In Cryptography, we change our normal text into somewhat complex text using some techniques. A normal person who is not aware of these cryptography techniques is able to read it but he/she cannot find the meaning behind it. The person who knows these cryptography techniques can change the text to the original one and can use it.

Now Go Some Technical:

In Cryptography, Normal text is called Plain text.
In Cryptography, Converted text is called Cipher text.
In Cryptography, Changing normal text to some complex form is called as Encryption.
In Cryptography, Changing encrypted text into the plain text again is called Decryption.
The techniques which we use for encryption and decryption are called as Alogorithems.

What is the actual use?

Think what will happen if everyone in the world knows everything about everyone?
By only thinking this, i feel something weird? What do you feel?
So the Cryptography is used for mainly security purposes like
  • details in government records,
  • banking details
  • Facebook chatting details,
  • Communication between army people and much more

Some popular Cryptography techniques are:


Do you love Graphics?

Cryptography sample example

Don’t understand a lot?

Here the girl converts the plain text into cipher text using a key which is “C”. The boy must have this key which he can use to convert the cipher text into the plain text.

The point here is that if you want to read the message then you must possess the key that is used for encryption.

For more Information about Cryptography please attend the Ethical Hacking workshop

Read more..

About Code Instruct
  • ✔ 2nd Best Business Venture Award, Ideas'12, IIT Kanpur
  • ✔ 30 Most Promising Startups, Next Big Idea'12, IIM Bangalore
  • ✔ Runner Up, UnLtd India Growth Challenge 2013
  • ✔ Limca Book of records for conducting largest Aeromodelling event in India
  • ✔ Experience of training students across 26 states in India and Dubai
  • ✔ Officially a part of IIT Delhi course and IIT Kanpur Orientation Program for freshers
  • ✔ Venture funded by The Chennai Angels & Spark Capital
  • ✔ A Venture by IIT Kanpur alumni