Saturday, 3 December 2016

How to Compress Images On Android Without Losing Quality

In Android, there are many applications which are not available for Computers. In which if you want to compress any images then there is hardly any software available which can help you to compress image there are online websites available which will do changes for you. Today I am going to tell you about the application which will help you to Compress Images On Android without losing the quality.
Many of times we encounter the situation where we need to send any image to our friend and it is not getting send just because of high quality and size of the images or just because you have too slow internet.

This is absolutely fine. Just because we are coming up with one of the great application which will help you to edit the images and compress the size of the application in just some clicks.
There are many applications available but some of the applications are not working or else they are fake. This is the reason I am going to tell you one of the best application which will help you to edit the picture for you.

Compress Images On Android

Why do You need to Compress Image?

We have seen peoples using Websites to compress the images. Now, many of times we need to send those images to someone else? Then here this application comes to help you in the following situation.
I think no one is having time to compress the image and then again send it to your mobile using USB cable and then send it to your colleagues or friends. We don’t have to regularly open the website and compress the images for you.

Everything needs to be handy and fast everyone likes that you get the results in just some clicks. This is the best application which will help you to get the better results in just some clicks.

How to Compress Images On Android Without Losing Quality

This is the application which is ad free and this application pretty good in its features.  This application is having 2 ways which will be helping you out to loose the quality of the images.
The first method your image will be automatically compressed and you don’t need to do anything this application will be best and it can automatically set the quality and size of the image.
The second method is that you can choose your best settings this is the custom settings which will help you out to compress the images. You can choose your quality and your own way of editing the images.
  • Download and install the Photo Compress 2.0 Ad-free version from here:Play Store
Compress Images On Android

  • Open the application and you will see 2 options in which camera and gallery. You can choose any way to edit the picture.
Compress Images On Android
  • Now, simply load the image and you will see an option of Quick Compress. Just click on it and your image will be compressed.
Compress Images On Android
  • Then click on Replace and Exit and then your image will be replaced with the old image. This makes it clean and doesn’t create too many images and folders.
  • If you want to compress the image manually according to your choice then you can do so with the help of the Compress Button. After loading the image this can be easily done without any issues.
  • Set the quality of the image and then done. This way you can easily compress the images on your Android device.
Compress Images On Android
_____________________________________________________________






Top Posts

What Are Denial of Service and DDoS Attacks ?

How to Delete a Gmail Account

Baidu Root What is it How Can it Help You

How to Recover Deleted Files Android using Dr.Fone Recovery Software

8 Best YouTube Downloader Apps for Android






Friday, 2 December 2016

What Are Denial of Service and DDoS Attacks ?










DoS (Denial of Service) and DDoS (Distributed Denial of Service) attacks are becoming increasingly common and potent. Denial of Service attacks come in many forms, but share a common purpose: stopping users from accessing a resource, whether it’s a web page, email, the phone network, or something else entirely. Let’s look at the most common types of attacks against web targets, and how DoS can become DDoS.

The Most Common Types of Denial of Service (DoS) Attacks

At its core, a Denial of Service attack is typically performed by flooding a server—say, the server of a web site—so much that it’s unable to provide its services to legitimate users. There are a few ways this can be performed, the most common being TCP flooding attacks and DNS amplification attacks.

TCP Flooding Attacks

Almost all web (HTTP/HTTPS) traffic is performed using the Transmission Control Protocol (TCP). TCP has more overhead than the alternative, User Datagram Protocol (UDP), but is designed to be reliable. Two computers connected to each other via TCP will confirm receipt of each packet. If no confirmation is provided, the the packet must be sent again.
What happens if one computer gets disconnected? Maybe a user loses power, their ISP has a failure, or whatever application they’re using quits without informing the other computer. The other client needs to stop re-sending the same packet, or else it’s wasting resources. To prevent never-ending transmission, a timeout duration is specified and/or a limit is placed on how many times a packet can be re-sent before dropping the connection completely.
TCP was designed to facilitate reliable communication between military bases in the event of a disaster, but this very design leaves it vulnerable to denial of service attacks. When TCP was created, nobody imaged that it would be used by over a billion client devices. Protection against modern denial of service attacks was just not a part of the design process.
The most common denial of service attack against web servers is performed by spamming SYN (synchronize) packets. Sending a SYN packet is the first step of initiating a TCP connection. After receiving the SYN packet, the server responds with a SYN-ACK packet (synchronize acknowledgement). Finally, the client sends an ACK (acknowledgement) packet, completing the connection.
However, if the client does not respond to the SYN-ACK packet within a set time, the server sends the packet again, and waits for a response. It’ll repeat this procedure over and over, which can waste memory and processor time on the server. In fact, if done enough, it can waste so much memory and processor time that legitimate users get their sessions cut short, or new sessions are unable to start. Additionally, the increased bandwidth usage from all the packets can saturate networks, making them unable to carry the traffic they actually want.

DNS Amplification Attacks

Denial of service attacks can also take aim at DNS servers: the servers that translate domain names (like howtogeek.com) into IP addresses (12.345.678.900) that computers use to communicate. When you type howtogeek.com in your browser, it gets sent to a DNS server. The DNS server then directs you to the actual web site. Speed and low latency are major concerns for DNS, so the protocol operates over UDP instead of TCP. DNS is a critical part of the internet’s infrastructure, and bandwidth consumed by DNS requests are generally minimal.
However, DNS slowly grew, with new features being gradually added over time. This introduced a problem: DNS had a packet size limit of 512 bytes, which wasn’t enough for all those new features. So, in 1999, the IEEE published the specification for extension mechanisms for DNS (EDNS), which increased the cap to 4096 bytes, allowing for more information to be included in each request.
This change, however, made DNS vulnerable to “amplification attacks”. An attacker can send specially crafted requests to DNS servers, asking for large amounts of information, and asking for them to be sent to their target’s IP address. An “amplification” is created because the server’s response is much larger than the request generating it, and the DNS server will send its response to the forged IP.
Many DNS servers are not configured to detect or drop bad requests, so when attackers repeatedly send forged requests, the victim gets flooded with huge EDNS packets, congesting the network. Unable to handle so much data, their legitimate traffic will be lost.

So What Is a Distributed Denial of Service (DDoS) Attack?

A distributed denial of service attack is one that has multiple (sometimes unwitting) attackers. Web sites and applications are designed to handle many concurrent connections—after all, web sites wouldn’t be very useful if only one person could visit at a time. Giant services like Google, Facebook, or Amazon are designed to handle millions or tens of millions of concurrent users. Because of that, it’s not feasible for a single attacker to bring them down with a denial of service attack. But many attackers could.
The most common method of recruiting attackers is through a botnet. In a botnet, hackers infect all sorts of internet connected devices with malware. Those devices can be computers, phones, or even other devices in your home, like DVRs and security cameras. Once infected, they can use those devices (called zombies) to periodically contact a command and control server to ask for instructions. These commands can range from mining cryptocurrencies to, yes, participating in DDoS attacks.  That way, they don’t need a ton of hackers to band together—they can use the insecure devices of normal at-home users to do their dirty work.
Other DDoS attacks may be performed voluntarily, usually for politically motivated reasons. Clients like Low Orbit Ion Cannon make DoS attacks simple and are easy to distribute. Keep in mind that it is illegal in most countries to (intentionally) participate in a DDoS attack.
Finally, some DDoS attacks can be unintentional. Originally referred to as the Slashdot effect and generalized as the “hug of death,” huge volumes of legitimate traffic can cripple a website. You’ve probably seen this happen before—a popular site links to a small blog and a huge influx of users accidentally bring the site down. Technically, this is still classified as DDoS, even if it isn’t intentional or malicious.

How Can I Protect Myself Against Denial of Service Attacks?

Typical users do not have to worry about being the target of denial of service attacks. With the exception of streamers and pro gamers, it’s very rare for a DoS to be pointed at an individual. That said, you should still do the best you can to protect your all devices from malware that could make you part of a botnet.
If you’re an administrator of a web server, however, there is a wealth of information on how to secure your services against DoS attacks. Server configuration and appliances can mitigate some attacks. Others can be prevented by ensuring unauthenticated users cannot perform operations that require significant server resources. Unfortunately, a DoS attack’s success is most often determined by who has the bigger pipe. Services like Cloudflare and Incapsula offer protection by standing in front of websites, but can be expensive.
_____________________________________________________________





Top Posts :-


HOW TO INSTALL PARROT SECURITY OS

what is batch file how to create a batch file

How to Stop Your WhatsApp Friends from Knowing You’ve Read Their Messages

How to Theme Any of Your Stock Android Device

Top 5 best Xposed Modules For Lollipop Marshmallow