Thursday, 9 November 2017

Google used to ask these interview questions, but they’re so complicated they were banned


These tricky questions were banned from being asked during interviews at GoogleTo get a job in Google, you need skills and talent. But besides these, you also need to be prepared to tackle its “Googleyness,” as it is not that easy to get hired by the search giant.

Google is well-known for its high standards and bizzare set of head-scratching questions asked during interviews, which seems to have no answers. As a result, the candidate would apparently lose the race even before it use to start. Thankfully, these interview questions were ultimately banned from being asked completely.

In 2009, Seattle job coach Lewis Lin compiled a list of 140 questions that his clients were asked by Google. In this article, we have listed the 17 roughest interview questions in no particular order asked by the search giant.

How many golf balls can fit in a school bus?

How much should you charge to wash all the windows in Seattle?

Why are manhole covers round?

How many piano tuners are there in the entire world?

How many vacuums are made per year in USA?

Explain the significance of “dead beef.”

Every man in a village of 100 married couples has cheated on his wife… 

Every wife in the village promptly knows when a man other than her husband has cheated but does not know when her own husband has. The village has a law that does not allow for infidelity. Any wife who can prove that her husband is disloyal must kill him that very day. The women of the village would never disobey this law. One day, the queen of the village visits and declares that at least one husband has been unfaithful. What happens?

Design an evacuation plan for San Francisco.

How many times a day does a clock’s hands overlap?

You are at a party with a friend and 10 people are present (including you and the friend)…

Your friend throws a bet that for every person you find who has the same birthday as you, you get $1, but for every person he finds who does not have the same birthday as you, he gets $2. Would you accept the challenge?

A man pushed his car to a hotel and lost his fortune. What happened?

You need to check that your friend Bob has your correct phone number, but you cannot ask him directly…

You have to get from point A to point B. You don’t know if you can get there. What would you do?

You must write the question on a card and give it to Eve who will take the card to Bob and return the answer to you. Besides the question, what must you write on the card to make sure that Bob can encode the message so that Eve cannot read your phone number?

If a person dials a sequence of numbers on the telephone, what possible words/strings can be formed from the letters associated with those numbers?

Explain a database in three sentences to your 8-year-old nephew.

You are shrunk to the height of a nickel and your mass is proportionally reduced so as to maintain your original density. You are then thrown into an empty glass blender. The blades will start moving in 60 seconds. What do you do?

You have two eggs and get access to a 100-story building…

Eggs can be very hard or very fragile, which means they may break if dropped from the first floor or may not even break if dropped from 100th floor. Both eggs are the same. You need to determine the highest floor of a 100-story building an egg can be dropped without breaking. The question is how many drops you need to make. You are allowed to break two eggs in the process.

Friday, 3 November 2017

What is an Internet Cannon ? How does it works ?


What is an Internet Cannon?


Many things happen in the world of technology today. Any time you mention internet censorship, the first thing that comes to my mind is the nation of China. The country has earned fame from the Great Wall of China as well as the Great firewall of China. The experts from the country have the ability to access and proceed to block a particular website indefinitely. You may be asking yourself why a government such as this one can decide to do so. One of the simple reasons for this restriction is to illegalize certain forms of speech, activities and filter certain keywords from search engines by those who may be having ill motives as far as democracy is concerned. With such actions in place, individuals who may seem to offend the nation risk facing judicial consequences the end of the day.

What is an internet cannon?


Have you ever heard something about cyber crimes and cyber criminals? An internet cannon is a special type of cyber attack tool that has the capability of hijacking traffic flow on the internet. This takes place at the national level and then there is direction of traffic to the various targeted networks. Moreover, there is spyware or malware is send to another website where traffic seems to be flowing. While using any website from the different parts of the world, you risk attack by different attackers who are ever working day and night to steal important information from you. Some of them do it for fun while other does it for financial gains. Websites that have a lot of junk traffic are at higher levels of risk of attack than any other 

How does internet canon work?


Internet canon works by intercepting data that has been send between different nodes and go ahead to redirect the same to the another node. The powerful device does the balancing of analytic script that is most cases distributed by a specified search engine. The script does not necessarily mean that it is malicious. On the hand, this weapon has the ability to produce a full fledges form of attack. Similarly, it is used in intercepting emails that have not been encrypted. While talking about the internet cannon, I remembered NSA that had Quantum, which is also a tool that had the capability of redirecting individuals to fake networks with malware served by site without encryption. Other countries have also raised their concerns over the Chinese nation’s capability to access websites of foreign countries. 
 Many researchers have come up with claims that neutralization of the weapon is possible. However, this can only happen if the various websites do communicate through the encrypted https connections. When websites have communication encryption from end to end, it becomes very tricky to do the modification of any attacker who may be operating in between the person sending and the one receiving. Nevertheless, this may not take place in the case where the websites do not load files or the resources through the encryption that is non-HTTPS connected.

Thursday, 2 November 2017

What Is DDoS Attacks And How Does It Works ?


The internet has grown exponentially in use and not all of its controls have grown proportionally with it. The fact that DDoS Attacks stands for Distributed Denial of Service and is today’s most common Web-based attack method, the primary weapon of hacktivists and APT (advance persistent threat) groups looking to disguise their real intentions under a cloud of HTTP requests.

 DDoS attacks is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information. Recently New York Magazine site alleged to DDoS attack, which became inaccessible for over 12 hours.

Types of DDoS Attacks


DDoS attacks come in many different forms, from Smurfs to Teardrops, to Pings of Death. Below are details about the types of DDoS attacks : 


  •     TCP Connection Attacks – These attempt to use up all the available connections to infrastructure devices such as load-balancers, firewalls and application servers. Even devices capable of maintaining state on millions of connections can be taken down by these attacks.
  •     Volumetric Attacks – These attempt to consume the bandwidth either within the target network/service, or between the target network/service and the rest of the Internet. These attacks are simply about causing congestion.
  •     Fragmentation Attacks – These send a flood of TCP or UDP fragments to a victim, overwhelming the victim’s ability to re-assemble the streams and severely reducing performance.
  •     Application Attacks – These attempt to overwhelm a specific aspect of an application or service and can be effective even with very few attacking machines generating a low traffic rate (making them difficult to detect and mitigate).

In this article, with the help of infographic created by Barricade will explain you what is DDoS attacks and how does it works.



Wednesday, 1 November 2017

Top 5 Questions Asked During IT Job Interviews


Every year thousands are being recruited for the IT industry, such is the boom. Looking from s student’s point of view, facing the IT interviews can be really difficult. The best thing that you can do to get ready is to thoroughly consider the inquiries you’re prone to be solicited and figure answers ahead from time. Here are top 5 IT interview questions and how to make an in number response to each.

1. Why do you need this employment?

A standout amongst the most unsurprising inquiries and critical! You have to show that you have examined the business and tie your insight into them into the skills and intrigues that drove you to apply. For instance, an interviewee with a little advertising office may say: “I’m generally prepared to tackle obligation and feel this will come all the more rapidly with a firm of this size. A little firm additionally allows to manufacture closer working associations with customers and partners and I’ve found through my past work encounter this makes an association more viable and also all the more fulfilling to work in.”

Attempt to locate some particular component on which the business prides themselves: their preparation, their customer base, their distinction, their open picture, and so on. This may not generally be conceivable with little associations but rather you may have the capacity to get something of this nature from the questioner.

2. Depict a circumstance where you worked in a group

Another competency-based inquiry. Most occupations will include a level of cooperation. The questioner needs to evaluate how well you relate to other individuals, what part you take in a gathering and whether you have the capacity to concentrate on objectives and targets.

Diagram the circumstance, your specific part and the assignment of the gathering general. Depict any issues which emerged and how they were handled. Say what the outcome was and what you gained from it.

Cases could incorporate putting on a dramatization or music creation; a gathering task at college; a business diversion or “Youthful Enterprise” plan or working in a fast-food eatery.

3. What do you hope to be doing in 5 years time?

Attempt to dodge unclear or general answers, for example, “I would want to develop with the obligation I am offered and to create myskills to the extent I am capable” or “I would hope to be in an administration part by then”.

Be particular, however adaptable: selection representatives need to know you recognize what you need. Procuring, preparing and creating staff costs a great deal of cash, something like £7,000 to enlist another graduate, so they need to ensure that you are focused on staying with the association. “I’d like to progressively take more obligation and maybe by then be a brand supervisor for a noteworthy item.”
Discuss your enthusiasm for the business in which the organization with works. Stress the worth you can convey to the association and what you can accomplish for it.

You have to demonstrate that you are goal-oriented additionally your objectives must be practical – saying you hope to be a senior supervisor following two years is unrealistic to go down well! Utilize the business’ site or LinkedIn profiles to pick up a thought of the profession ways took after by past graduates. You may have the capacity to supplement this by demonstrating your insight into expert bodies and the strides you should take to pick up their capabilities, e.g. in territories, for example, showcasing or HR.

Discuss obligations you might want to have and expected accomplishments instead of the amount you would hope to be acquiring in five year time as this will make a business believe you’re more inspired by the material advantages than the profession itself. Discuss your vocation advancement: abilities you’d like to procure or you’d like to be utilizing, and expert capabilities you’d like to get.

4. What has been your most prominent accomplishment?

To say that your most prominent accomplishment was getting to University, or getting your degree, will do nothing to recognize you from the various applicants. Unless you have needed to battle with remarkable troubles to pick up your scholarly capabilities -, for example, disease or real family issues – attempt to say something other than what’s expected that will make you emerge.

This doesn’t need to be an Olympic award or a demonstration of bravery. Preferably, it ought to give proof of aptitudes applicable to the occupation such as communication, activity, cooperation, sorting out or determination. Like organising a games or raising money occasion, learning enough Spanish in three months to make myself comprehended when I went around Mexico, training for and finishing a marathon then again even a 5 Kilometer race.


5. Why did you pick your college and what elements affected your decision?

On the off chance that you had, truth be told, no genuine decision in where you went to University – e.g. on the off chance that you needed to concentrate near and dear for budgetary or family reasons – you can discuss the more broad issues you needed to consider in coming to University and maybe lead the inquiry round to your decision obviously as opposed to organization.
Your real answer is less imperative than the confirmation of choice making, arranging and sensible thinking abilities that it ought to illustrate. This is an open door for you to show these key features.