No more non-sense stuffs !

How to Install FTP over RDP in windows server 2008 ?

Again,I am here to give you new valuable information about RDP. RDP i.e Remote Desktop Protocol is use to connect Remotely PC from one system .Mainly ,we use RDP for specific tasks/Performance .I know ,you guys are curious to know about more about RDP and how we can Transfer huge files over RDP from one system to another without any conflict and in secured Environment .

Microsoft in year 2005 released secured FTP Service for Windows server 2008 .The New FTP service incorporates lots of features and security.Please follow the steps as below for installing FTP in your Windows Server 2008 and connect it to your PC via FTP Protocols…

Important Steps

Step 1: Download FTP Software from Microsoft website ..Link is as follow :
Check your system architecture whether it 64 Bit or 32 Bit and Download it.

Step 2:Open Command Prompt (Run as administrator) and run the following command ..
ICACLS “%SystemDrive%inetpubftproot” /Grant IUSR:R /T
and close it

Step 3: Go to Administrative Tools and Then Internet Informative services (IIS).

Step 4: Click on the sites on the Left Pane

Step 5: Right Click and click on “Add FTP Site ”

Step 6: Enter any FTP Name and Path to the FTP (which you want to share)

Step 7:Choose Local Ip address in Next Step i.e. and Port 21 or Try your RDP ip address for better Performance :).

Step 8:Click on No SSL

Step 9:Click on Next and then Create Authentication type (Basic or Anonymous)

Step 10:Go with Basic one and give permission(check) on read and write .

Step 11:Enter Username and Password of that RDP user (any user)

Step 12:Click on Finish and your FTP is ready.

Step 13:Connect it from your remote pc with the help of FTP Softwares (Filezilla or SmartFTP)

Step 14: Connect it from your RDP ip and username that created at step 11.
any comment are appreciated …:)



Posted by on Jan 26, 2017 in Tech-BLOG | 0 comments


The notification of the apple ios upgrade brings some important fixes that make it an important and essentially required update. It has announced this update after four betas and six weeks of public testing and the end result the update which doesn’t fascinated the users as much as it should. The ios 10 compatible devices will get this update. To get this update is damn simple as the update prompts is received in the device automatically but if one don’t get the update as notification as it can happen one can go into the settings and then general settings and one can found the software update option right there if their device is compatible enough for the update.

By clicking in then software update option one can get their devices updated frequently without any other formalities. Ios updates will be differ in the size depending on the user device. The ios 10.2.1 is on the small side at between 30 MB to 90 MB, but its appearances may change accordingly so that is a very big deal some users can face.

Though the update is tested by the several users and as the apple has promised its user to deal with the battery drainage bug in the device. But he has not done that perfectly which makes its users quite dull and unhappy as it is found that the update has made the 30 % battery drainage even worse after their devices are updated. Affected users began commenting or tweeting after the updates are done they were not found it so worthfull.


So what was the deal?

The jailbreaker :

The meaning of the above word in the software world is the modifications in the smartphone or other electronics devices to remove the restrictions imposed by the manufacturer or the operator.  In the ios 10.2.1 update there is no jailbreak and with these to hack ios proving increasingly any user who wants the jailbroken devices will need to stay clear.

The other bug that is making the people insane is the 30 % battery drainage remains unfixed. As per as the reports from several big users but the bug of the battery discharge has not been resolved. According to the apple there is no bug that exists in any iphone model except the iphone 6s. People are becoming more exhausted of this bug rather than the other ones. Other bit problems that users experience was the dimming displays and degraded wifi performance and some Bluetooth issues.


So what should we expect?

The ios 10.2.1 is a bug fix pure, simple and improves the security of the device. There were some vulnerabilities ios 10.2.1 fixes across like auto unlock, wifi and webkit flaws. By all this issues the move that the apple made is quite frustrating. About 30% bug is absurd. Ios 10.2.1 is widely regarded as causing the problem so as an ios update will be able to fix it or not the users wants to know.






Enhancing data in the era of – “BIGDATA” and “CLOUD”

Posted by on Jan 23, 2017 in Tech-BLOG | 0 comments

Enhancing data in the era of – “BIGDATA” and “CLOUD”





download (5)                                                                       images (2)



Bigdata for years and now is the most famous topic everyone’s been talking about.  The data to be stored securely can be so large or complex that the traditional data processing applications are inadequate to deal with them.

The analysis, capture, data curation, visualization and information privacy are the challenges in the handling of the huge data. Apart from these to make them easily access data by increasing the agility in making decisions with the data. The concept of the big data and cloud are becoming standard for many organizations as every organization tries to create more value out of it.

This trend in the era of the data-driven business approach targets a growing transverse variety of data and it is more difficult to include all data assets as part of next generation data. To allow the master of a company data in the environment where they can react quickly to the business needs.

It is clear that the projected growth in the population will require huge resources for storage of all the enterprise data especially those which are hard to access by the legacy platforms like the mainframe which is the most critical data assets with the emerging data from the internet of things.

To make the bigdata cloud technology bit simple for the companies to handle and manage the proper visibility to data lineage. Following steps can be taken by it to resolve few issues related top big data:

  • Ensure easy and secure access to all data assets as the data is populated in the data lake.
  • One should make sure that the selected functions can adapt to the changing technology.
  • The selected tools and products can be integrated and keep up with the speed of the bigdata stack.
  • By following the product based approach to custom coding for repeatability, simplicity, and productivity.
  • Create a streamlined, standardized and secure process to collect transform and distribute data.
  • By making data quality as a priority and by creating business rules to validate match and clean the data as it will get populated as it is in the form of a data lake.
  • Organizations should ensure that the data should stay intact and its recovery can be done anytime even when the next generation data measure changes. Thus it should be flexible with both the changes
  • One should also have the information from where the data is coming and taking into account all the system of the business processes




” BIGDATA” is at the foundation of all the megatrends that are happening today, from social to mobile to cloud to gaming”



A brilliant approach towards “CYBERSECURITY”

Posted by on Jan 23, 2017 in Tech-BLOG | 0 comments

A brilliant approach towards “CYBERSECURITY”



download (3)

Cyber security is the branch of the technologies that is formed by the processes and practices to protect the network and computer programs along with data from attack, damage or unauthorized access. For the computing context, as the web to connect with the world and several information by using the internet, we also require security. So that our wok or data doesn’t get trapped by the unwanted or unknown peoples. There are several approaches world is using and making their data secure and by adding more high-level security patches.

As the technologies are evolving the new security features are added but as there are two faces of coins like two faces of everything along with positivity and development of something good there are means that can turn out to be in another track leading it into negative side. There are several major areas in which cyber security is essential are application security, information security, network security and disaster recovery

The blockchain provides an alternative approach to storing and sharing information provides a way out of this security mess. The hacking technology has also made a great move in the tampering the user network and making the information out by steal and spoof identities. The block chain’s technology has enabled secure transactions with the cryptocurrencies such as bitcoin and ethereum could now serve as the tool for preventing the cyber attacks and security incidents.

Blockchains can increase security on the three ways:

Blocking identity theft

Stopping denial of service attacks

Data tampering



It is a popular form of cryptography that provides security for e-mails, messaging applications, websites and another medium of communications. The encrypted end to end information provides the user authorities to have safe conversations. It will definitely provide people the authenticated way to users conversation by securing it from the third party. In blockchain, the publishing keys on a blockchain instead would eliminate the risk of the failure and false key propagation and remove the shadow of the doubt.

Certcoin is the first implementations of the block-chain-based PKI. It removes the central authorities altogether and uses the block chain as a distributed platform of domains. It also provides a public and auditable PKI that also doesn’t have a single point of failure. Another tech research company Pomcor published a blueprint for a blockchain based PKI that doesn’t remove central authorities but uses blockchains to store hashes of issued and revoked certificates with a decentralized and transparent source. It also has the benefit of optimizing network access by performing key and signature verification on local copies of the blockchain.



We sometimes use sign documents and files with private keys so that the recipient and users can verify the source handling data. The blockchain alternative to document signing replaces the transparency, distributing evidence across many blockchains nodes making it practically impossible to manipulate data without getting caught.



A blockchain project led by the data security startup guard time is one group that aims to replace the key based authentication. KSI stores the hashes of the data and files on the blockchain and verifies other copies by running several algorithms and comparing the results that is stored on the blockchain.

In the evolving new tech trends, cybersecurity threats will continue to emerge while the old threats are in continuation. Blockchain may not be a good source to fix everything that is wrong with the internet but it is the powerful tool that will definitely lessen the risk of threats that surround us, especially where centralized weaknesses and single point of failures are concerned.




” For every lock there is someone out there trying to pick it or break in”

Smart locks with built-in cameras

Posted by on Jan 20, 2017 in Entrance Corner, Tech-BLOG | 0 comments

Smart locks with built-in cameras

Smart locks are the advanced lock system. Smart locks aren’t just for smart houses  they’re made for smart businesses, too. These was founded by apple in around 2013. It also includes Bluetooth smarts and a companion app, the M-Series is an enterprise-focused deadbolt designed to help landlords and business-owners offer smarter, keyless access to tenants, employees, and customers.

Keeping aside the old system of the locking system in an Aside from using a key to unlock it the old-fashioned way, you can open up the M-Series lock by waving an NFC-equipped card in front of it, or by punching in a code on the touchscreen. There’s also a companion app that connects to the lock via Bluetooth and lets authorized users inside with just a tap. It also includes a built-in wide-angle camera that snaps a photo every time someone uses the lock. That’s an interesting addition given the popularity of smart, camera-equipped doorbells like ring and Skybell HD.

The deadbolt’s design is so fantastic. The “M” in M-Series stands for “mortise,” a recessed deadbolt design that separates the cylinder from the latch. August is trying something similar in the residential market with a mortise-style smart lock of its own, so this might be an aperture to keep an eye on as the smart-lock category continues to grow. Some smart locks, such as the August, offer add-on cameras and microphones, but you have to buy those accessories separately; meanwhile doorbells like the Ring have a camera but don’t allow for electronic keys or remote activation.

The Gate is a WiFi-connected deadbolt that features video calling and a motion-activated security camera. Say your partner is a latchkey but forgot her keys at office. Rather to stay in the front steps to wait for you to get home, he just has to press the Call button on the Gate. This sends a notification to your phone and activates the 720p color camera. You can speak to him via the app (there are speakers and a mic embedded in the lock assembly) to remotely unlock the door for her.

And for routine guests, you can text temporary unlock codes to their phones that they can punch into the keypad and then easily enter the house. They won’t need to download any apps to use these codes either, since the code arrives via SMS. Plus, all of its communications, video and audio recordings are 256-bit encrypted and stored in the cloud. To keep the house or your belongings safe you can use such locks in future to prevent the things from robbery and house break. Moreover it ensures us from stealing our things. By providing the encrypted and high authenticated security features.


download (3)

How PHP Differ From Other Technology ?

Posted by on Dec 31, 2016 in Tech-BLOG | 0 comments

How PHP Differ From Other Technology ?


PHP is one of the simplest server-side languages out there, and it was designed primarily for web development. Learning PHP is good not only because it adds one more language to your toolbelt, but also because there is a large number of sites currently built with WordPress, a content management system (CMS) built with PHP.

PHP is a popular scripting language which is widely used by developers to build application and websites like ASP, CGI, and Perl. PHP is used for WordPress and even Facebook utilizes PHP. It always comes with a certain level of credibility and popularity.

PHP is one of the most in- demand skills that each and every developer should adopt. It has almost every aspect that the developer requires for programming. Website development seems incomplete without the use of PHP. The following are the reason that make PHP so popular are given below:


  1. Rapid Application Development
  2. Cloud Ready
  3. Loosely Typed
  4. Open Source
  5. Platform Independent

The other various points which make it different from other is it is easy to learn and it is similar to C and JAVA to an extent. Even if developer only having knowledge of PHP is still fair enough to grasp. There will be no stuck with the coding issues in PHP for developers. The best part is the free support through forums, PDF, blogs and social media.It has the largest user base for any scripting language, it is an open source.

PHP has the ability to have power over 30% of the web. It is used for many web applications to integrate memory cache and pusher. PHP always retains speed without slowing down other processes while used with other software too. It has the capability to operate much faster than other scripting language. Thus, PHP is the winner among the other languages.


Survelliance Drones that terrorists can’t escape :

Posted by on Dec 30, 2016 in Tech-BLOG | 0 comments

Survelliance Drones that terrorists can’t escape :

Surveillance drones or unmanned aerial systems (UASs) raise significant issues for privacy and civil liberties. Drones are capable highly advanced surveillance, and drones already in use by law enforcement can carry various types of equipment including live-feed video cameras, infrared cameras, heat sensors, and radar.It looks like a “star trek” bird of prey but acts like a drone that the terrorists cannot escape. It is powered by the sun and can conduct missions without landing for 45 days.

Airbus defence and space calls the new drone the high altitude pseudo satellite (HAPS), but the main thing to know is, what is pseudo satellite? It is a satellite type capabilities like extreme survelliance, the capability that makes it specific is it can be modified with alternative technology.

Some military versions can stay in air the hours for hours or days at a time, and their high-tech cameras can scan entire cities, or alternatively, zoom in and read a milk carton from 60,000 feet. They can also carry wifi crackers and fake cell phone towers that can determine your location or intercept your texts and phone calls. Drone manufacturers even admit they are made to carry “less lethal” weapons such as tasers or rubber bullets.

Drones, officially called “unmanned aerial vehicles,” are used in Canada primarily for surveillance of various kinds, although photographers and film crews are also enthusiastic to exploit their capabilities. Understandably, the industry objects to the term “drones” because of the military connotations, but “drone” is the common term. It is unlikely that the Ottawa citizen was concerned about possible warheads, just about what the machine could see and why it was watching. More countries will also use it in improving their military and security affairs functionalities.

5 New Tools For Graphic Designing:

Posted by on Dec 30, 2016 in Tech-BLOG | 0 comments

5 New Tools For Graphic Designing:

I would like to to explain you all about the new tools that will be used in graphic designing. The designing is plays very important in marketing and branding to represent the company attributes. As it is said the design is so simple and that is why it is complicated. Creativity bleeds from the pen of inspiration. Many startups and new entrepreneurs understand the value of using visuals in their marketing strategy, but why to pay a large amount for it, in this blog I would like to explain you more about the free tools that can prove to be a very ease and creative for the designer to design and create new visual effects.

Good design makes a product useful, by these tools we can change or develop the designs that are significant for oneself to create and it is completely free of cost. The first designing tool I would like to tell you is RECITE



Recite, is a free tool that lets you type in any quote, and auto-generates a great looking visual that’s ready to download. You can share it directly vis social media, or download it as an image file. No credit card required. So use it and create your beautiful visuals.



Venngage is a graphic design software that is completely free to start. There are hundreds of professionally designed templates to choose from and the drag-and-drop interface makes the entire creation process very simple. The premium plans are under $200 a year and allow you to create unlimited graphics.

Content with infographics gets 94% more views than content without. Infographics have also been proven to increase time on page and as a result, Most agencies and design firms, such as are aware of the value of infographics, and start their fees at $3,000 for a single design.


PABLO : the social media tool

Pablo is a free tool offered by Buffer. It works similarly to Recite, but there is a bit more room for customization. Simply upload your own image, or choose from those offered on the tool, and customize your font so that it fits your brand aesthetic. In a matter of seconds you will have the perfect social media image at your disposal.


BEAM chart & graph maker :

If you want to create charts like this one, or perhaps you would prefer to create charts with different statistics, Beam is a completely free graph maker that is stupidly simple to use. Choose from preset color schemes, chart styles and copy and paste your data right into the spreadsheet. The chart will apply your edits live and extremely beautiful.


Snappa Graphic Editor :

If you’re looking for a great library of high-quality photos, as well as professionally curated templates, Snappa is an easy to use graphic editor. Although the tool is not completely free to use, there is a seven day trial available.

What’s really great about this tool is that if you’re making a visual for any social media platform, you can automatically resize your visuals with a couple clicks, magically.

These designing tool will definitely enhance the view of graphics and visuals. One can really enjoy using this and these tools can make the designing easy for the peoples who are associated as graphic designers.




The Eye Tribal : The Eye Tracking System by oculus

Posted by on Dec 29, 2016 in Tech-BLOG | 0 comments

The Eye Tribal : The Eye Tracking System by oculus


The official acquisition of facebook and oculus has given us a direction to look one could control the virtual reality or mobile experience through eyes. The start-up has developed a $99 eye tracking device developer kits for computers and software that can bring Gaze based interface to smartphones and potentially virtual reality headsets.

As per the reports Google has also produced an eye tracking start-up too called eyefluence. Virtual reality systems are doing a pretty good job of immersing users in their virtual worlds, with convincing sound and visuals that put users in the middle of the action.

The simplest concern of a virtual reality system is that the user experience of viewing the things and controlling the things by the gaze of the user. The eye tracking technology is truly convincing as the user gaze is vital source here. An area where today’s VR technology is less effective is interactivity, which is based on monitoring users and ascertaining their intentions.

The tech can do a lot of new things as per as the advancement, the features may include auto scrolling of text while reading or sheet music while playing an instrument and the ability to pause or control a video player with your eyes if your hands are not vacant, moreover one can use eye tracking to let you teleport around your location or show the movement of your eyes. Perhaps after the advancement in the biometrics as used in aadhar card too, the retina scanner use in various purpose for unlocking the lock or else for the security purpose is an eye-candy for user experience and a lot more innovation in this will be definitely going to happen in the coming decades.

How Amazon is going far up than Google and Apple !

Posted by on Dec 29, 2016 in Tech-BLOG | 0 comments

How Amazon is going far up than Google and Apple !


For the above context I would like to explain you about the amazon new product in the technology industry “Amazon Echo”. Amazon Echo the voice assisted speaker was a big hit today in this season. According to a survey Amazon claims that he has sold 9 times as many as devices this month as he has sold earlier. Amazon has also been a pioneer in e-book market with kindle e-readers, also he dominates the important part of cloud segment. It has also generated $12 billion revenue this year. It is also found that amazon will also checkout the revolutionary technology in retail business.

It is said that there will be always growth of innovation in the big company, it has proved himself in every upcoming challenges how to give a strong competition to the competitors like Google in its online services and Apple in its extraordinary advanced hardware.

I would like to explain more about Amazon Echo, a smart speaker developed by amazon, it requires a WiFi connection to work, the device responds to the name “Alexa.” It is basically a 9.25 inches long cylindrical speaker with a seven piece microphone array. The device functionalities like voice interaction, make a to do list, setting an alarm, music playbacks, playing audio books and a lot more makes him perfect to be used as a smart home automation device. In contrast, the next generation of innovations is likely to be more tied to the physical world and to conventional industries like apartment sharing, self-driving cars, retail stores, health care, automobile innovations, and so forth.

As I always used to include in my blogs that the future of technologies will make amaze to those who wants to work in it and produce their own idea product that may create a buzz in the competition every firm is facing.


Posted by on Dec 28, 2016 in Tech-BLOG | 0 comments



As android is upgrading its features as days going on, the transformation in the smartphone are also enhancing its features with the range and demands of the user. The world’s first bendable smartphone made using graphene, which was first developed in Britain, is set to go on sale.


In simple terms, graphene, is a thin layer of pure carbon; it is a single, tightly packed layer of carbon atoms that are bonded together in a hexagonal honeycomb lattice. In more complex terms, it is an allotrope of carbon nanometres. The material is so strong that it can be so flexible to be worn as bracelet. These durability makes it use in way you desire. It is approximately 200 times more stronger than the steel.


One thing I would like to add on to these words is, the use of “Graphene” the scientist who discover the material have won the Noble Prize in 2014. Apart from this, the flexible level of the material can be understood by its uses in different commercial purposes like solar panels, medical devices and many more.


The first phone is created by a Chinese firm named MOXI, I would like to explain more about MOXI, as the product has stolen a march on much bigger rivals like Samsung of south korea. The first handsets will be in black and white screen but the company has also produced a full colour version of the device that will also contain video streaming. It is designed as such it can be rolled as a bracelet and can be worn on the wrist. Based on the sale of the product the company will also produce colour screen and other techno enhanced products.


Samsung the giant smartphone manufacturer is working on it to produce the best bendable gadget, it is testing the device in two versions: one that’s powered by a Snapdragon 620 processor made by Qualcomm and another that runs on the chip maker’s faster Snapdragon 820 processor. The bendable phone project will be called Project Valley. It might sounds interesting but by this move peoples are really waiting that when this project will hit the technology although the things like battery, processor, camera and sensors will be prove to be a really big deal.