Skip to main content

Posts

Embedded Linux-The Magic of Open Source

Operating system (OS) is the heart of any computer device controlling tasks like process scheduling, memory management, and driver implementation. There is a large difference between OS used in main frame or desktop computers, and embedded systems Embedded Systems An embedded system is a miniature computer used to perform a single task. This could be a medical device monitoring heartbeat, or a flight control system. Because of size constraints, the processing power as well as memory/storage capacity is less for the same.  Enter the brain Embedded Linux is a stripped-down version of the original Linux kernel, used in desktops. What makes it different is its capability to run in low power embedded systems, such as smart phones, tablets, medical equipment and avionics system. This OS is a classification of RTOS (Real time operating systems). It means they process data in real time mostly from sensors measuring humidity or temperature, and provide output within a fixed deadline   ...
Recent posts

RTOS-Operating System for Embedded Devices

  If hardware is the body... Then software is the brain controlling the tasks and operations behind the scenes. It provides memory management, task allotment, priority scheduling etc. Operating system or OS is mainly divided into two main categories Real Time Operating Systems (RTOS) or General-Purpose Operating Systems (GPOS) . The classification is based on how they allocate resources The difference GPOS is used in desktop, laptops, tablets or smart phones where the processor performs several tasks at once. Here deadline for a given process is not important, and small delays are overstepped. RTOS is used in embedded systems such as medical equipment, flight avionics etc where one task is processed at any given time. Here deadline needs to be met without compromise, and data inputs are computed in real time. GPOS are usually used in microprocessors which have high computation power and voltage requirements. Examples include Intel x86/64 and AMD Ryzen chips RTOS are used in microco...

RISC Architecture - The Computer with Speed in Mind

The M series chip in MacBooks have brought about a revolution. Now we have processors providing higher speed, with lower battery usage. No wonder we hear ARM based laptops running 18 to 24 hours, on a single charge. This has even disrupted legacy chips like x86/x64 from market monopoly. Behind the Scenes All this is made possible by a chip architecture known as RISC. The acronym for Reduced Instruction Set Computer .  As the name suggests, here less is more. Lower instruction set leads to less complexity and higher performance. Data is stored in registers and executed result in memory. The Cycle Every instruction execution goes through the following stages Instruction fetch: In this stage, the processor fetch code for execution, from registers Instruction decode: The code is then decoded, and analyzed Operand fetch: The operands required is retrieved from registers Instruction execution: The code is executed by the processor. Result storage: The final data is stored in register or ...

Computer Worm - I Eat and Infect

  When we hear the term computer worm, it is sometimes classified to a virus. Though sharing similar traits, they are completely different in their mode of infection and operation. A computer virus usually gains entry through a file or attachment. Once inside, they need to be activated by the user. This is done by opening the infected file or executing it. A worm, though mode of entry is the same, does not require user assistance. They infect and replicate completely autonomous. Mode of Entry File sharing : Disguised as non-suspicious media files, they spread through sharing sites like Torrent. Social media : Appears as interesting links, they prompt the user to click and download. Phishing : Spreads via email attachments, usually from a contact whose system has been infected. Zero-day exploits : Sometimes the operating system has some bugs or security weakness which gets compromised. External devices : Infected portable hard disc or USB drive       Symptoms Low...

Firewall-The first defense against Malware

  Firewall forms the first defense against malware attack on a system. It acts as a security guard scrutinizing inbound/outbound traffic from the web. ACL (Access List) The earlier adoption to firewall, they resided in the main router.  We know data passes digitally in the form of individual packets. They contain information such as source/destination address, data type, bandwidth etc. ACL would compare each packet to a set of predefined rules, mainly in ascending order (rule1, rule 2...). If a match is found, the connection is allowed, and no further check is done. If no rule is adhered, the packet is discarded.  But this provided only basic filtering, and ACL did not care about protocol type like http or https .  Also, once the rules were set, it cannot be redefined. To edit one would be to clear the existing set and start from scratch. The era begins ... Present firewall came into existence during the late 80s, and graphical user interface (GUI) in the 90s.  ...

Why is my Internet slow?

W hen we buy a new computer, the performance is top of the world. This is true even in case of low budget options. But as time passes, the system becomes sluggish. Browsing the web becomes a herculean task. Webpages do not load easily, and online videos keep buffering.    The above case can be due to many factors, most of which can be rectified easily.  1. Buildup of Temporary files/Cookies Whenever you browse the internet, websites you frequently visit stores, some data in your computer. This is in the form of temporary files and cookies .  Temporary files include scripts, images and cached resources that help load webpages faster, on recurrent visits.   Cookies are used to store user preferences such as themes and language settings. They are also used for targeting specific ads. Over time there will be a buildup of all these files, slowing the browser considerably. To clear these files, type " Delete browsing history " in Search Panel present in Taskbar (...

Romance Scam - Phishing at its peak

  Technology has brought about a change in how we interact with the world. Online dating, in particular has ushered in a new trend. Providing anonymity and exclusivity, this can act as a double-edged sword or the breeding ground for some conmen.  Modus operandi is simple. Sell a fantasy of everlasting love. In return, empty one's bank deposits and life savings. Out for Love..... Starts with an unsuspicious friend or dating request. The scammer throws his net wide and lures in the victim.  Next a repo is built through online chat and voice calls, appearing casual, and innocent in nature. The victim is made to believe he or she is the center of attention. This follows up with small gifts, to enforce the fantasy. Once trust gets built, the scammer initiates the next phase. The chat becomes more personal, usually in the form of a tragic story, or financial tip.  " Invest in a cryptocurrency which has bright future" or "Lost travel documents and stranded in a foreign land...