Keep Blogging

Yesterday, I was quite tired and skipped writing my daily diary. Trust me, I was figuring out to take a nap for about 1 hour and then get back to work. But, I couldn’t 😦

I seriously admire those persons who can prioritize their work and make a perfect balance in between. (Heading towards that)

Starting with the technical aspects, I explored a little bit about LARAVEL. Plus, an interesting tool i.e Invoice Ninja It is a free and opensource invoicing software. You may also refer here

I have made a documentation on this software. You can find it here: GitHub

During the installation and configuration, Whenever I tried to login, it was giving an error:

Whoops, looks like something went wrong

So, I checked the logs and saw an error related to php_curl. For solving it,

sudo apt-get install php5-curl
Then,   sudo service apache2 restart

Also, I have used Sublime editor for the first time and find it really beneficial in searching a text within the whole folder.


Oops! an unanticipated action happened. The Apache server stopped working and when I was giving a command to restart it. It was giving an error to check:

systemctl status apache2.service


Then after figuring out, I found the problem was related to the libphp5 file.

I checked that /usr/lib/apache2/modules/ file was missing. I could have found some other solution but just to seek it out quickly, I purged apache2 and then reinstalled it again.

I have also made a simple presentation using reveal-js. You can find it here

Also, I get to know about an enbuilt software in Linux for messaging i.e Empathy Internet Messaging.



Digging Deeper

Today, was my second day at the firm (counting many more.) I started with exploring different frameworks for PHP. Some of them are:

  • CodeIgnitor
  • CakePHP
  • Lithium
  • Yii
  • Symfony

and much more …..

I have successfully installed and configured CakePHP on my ubuntu virtual box and was accessing it using Windows.

I have followed this link to install and configure CakePHP on my Ubuntu system. (Don’t forget to give permissions to the folder.)

Interesting? I get to familiarize with a new tool today, i.e Samba. Samba is an open source/Free software which gives many powers to the client. It’s used for interoperability between Linux/Unix and Windows users.

sudo apt-get install samba

Then, I have created a folder in /var/www/html with 777 permissions, so that I can access (read+write+execute) the folder from Windows itself. Later on, under configuration file present in /etc/samba i.e smb.conf, I have added my folder details in the end.



read only= no 

printable = yes

guest ok = yes

Command: testparm is used to check whether Samba is configured properly or not.

Finally, On Windows, Start -> Run -> (enter IP address here). You will be able to access your files located on that server using Windows.

Apart from this, I get to know about Putty

Putty is a free/open source application for sharing files over a network. PuTTY includes pscp and plink which serves as SSH and SCP directly through the console window.

Also, I have worked on TTY (teletype, now named as terminal) today and has created a new sudo user:

 sudo adduser <user_name>

Then enter the password. For switching to this user,

su – <user_name>

To delete a user,

userdel <user_name>

Apart from this, just wanna put light on Bitnami

Bitnami Stacks are used to install software on Linux, Windows etc. It is a library of installers and software packages.


9th + 10th Day (Century Count)

Hello, lovely people from every nook of this world. Today I am gonna share my experience about the sessions I was pursuing from last 10 days. In the last days of this college training, I have gained some knowledge related to Data Mining and WEKA tool. You can contact Google “Baba” to get acquainted with their  basic functionalities 😛 🙂

I am not gonna discuss about the basic terms related to Mining like Classification, Clustering, Pre-processing etc. One can look up about its definition (I have already suggested the contact :p)

I am here gonna focus on my thought, progress, changes in me and much more. Intially, I guess a year before when I was just a beginner in blogging trend (Still a learner), I used to copy-paste stuff or later on just reading and side by side writing in my language by taking help. So, I am narrating about the changes I have noticed in myself from being a copier to a learner then a writer (still emerging). Plus I am truly in love with this tranformation. It used to raise my confidence level and my trust to accomplish the things I intend for.

Apart from this I helped my fellow batchmates Amisha and Taman in common gmail settings related to reply snipping. For this, just got to settings and under Labs section, enable quote selected text. I also tried installing GUI for Postgresql i.e pgadminIII


sudo apt-get install postgresql-9.3-postgis-2.1


sudo apt-get install pgadmin3

After this, I have connected this GUI with localhost server.

sudo vim /etc/postgresql/9.x/main/pg_hba.conf

Change the line:

local   all             postgres                                md5


local   all             postgres                                trust

Error: I have even uncommented a Database line written before this by mistake. Later on, I commented it again. i.e

Database administrative login by Unix domain socket

Then, restart the server

sudo service postgresql restart

Now, login into psql and set a password

psql -U postgres

ALTER USER postgres with password 'new password';

Now, restart the server again.



P.S : Yippie, Hit a century 😉



7th & 8th Day

Ok, so this blog is in continuation to my previous blog related to making a website using WordPress. After setting WordPress environment and installing it on my system. I faced an error saying:

Enter your FTP/SSH Credentials.

I have used FileZilla for setting credentials. I have given my host address, user, and password for a quick connect. It worked 🙂

Furthur at the time of uploading my website on hostinger, I want to delete some of the old content I have already transferred over there. For this, I connect with FileZilla by adding credentials and deleted the stuff.

Later on, I faced error saying:

Unable to locate WordPress theme directory

Still in progress, but for an alternative, I get to know about Jekyll.

Jekyll is a static site generator. It’s simple, light-weight and one can have free hosting from gitlab or GitHub.

Apart from this, I get to know about “diff” command which can find the difference between two different files.

diff file1.txt file2.txt

Also, I was introduced to a Password manager software i.e LastPass

Do you ever get a problem in memorizing all of your passwords? We usually go for browser remembering, but it’s not much secure. Hence, here is a new software which saves your passwords and provides much more features. Though it’s free with limited functionality but is worth trying. (You can suggest any open-source password manager software in below comments 🙂)

Beside, A lecture was delivered regarding Aptitude, Interview and common things related to the placement session.

I have also upgraded cmake today.

sudo -E add-apt-repository -y ppa:george-edison55/cmake-3.x

sudo apt-get update

sudo apt-get install cmake 

The other day we were delivered a talk related to an Android Application. The product was used by municipal corporation and state govt mostly.

It’s related to clicking picture and sending the location of any such problem related to roads, bridges, garbage collection etc. which came under Municipal Judiciary and in this way there overhead to locate the problems will be relaxed. Common people can report through the App and then the action will be taken soon by municipal committee.














Sixth Day (Time for a sixer)

Today the lecture was by Mr. Devgan from BHEL. He is an expert in his field from past 17 years and has delivered a session on Information Security today. He has done many projects accordingly.

In the beginning, we get to know about the basics of security. He put light on current issues like Ransomware, WannaCry ransomware attack (A malware attack which corrupts the system or data and demand for some payment in return.)

There are many other types of ransomware:

  • CRYPTO Ransomware (files vulnerable)
  • LOCKER Ransomware (device vulnerable) …..

He also talks about CDAC, which is Centre for development of advance computing. It’s an institute offering many courses and it organises campaigns on Information Security Awareness.

We get to know about the basic terms related to Security:

  • Confidentiality
  • Integrity
  • Digital Signature
  • SSL
  • Authentication
  • Non-Repudiation
  • Availability (Ensures about a handy environment related to hardware, software, connection etc.)

He also enlighted about Attacks on different layers in an OSI Model.


One can always Google to learn in depth, as I am detailing about the terms which are new to me.

Many types of attacks can take place to disturb out system:

  • Interruption (Information will not be sent to the destined user)
  • Modification (Wrong data sent to the receiver i.e Integrity Vulnerable)
  • Interception (Third person is having eye on your data)
  • Fabrication (Authenticity vulnerable)
  • Repudiation (Tricking the authenticity)
  • Spoofing (Making a user jump to another website by spoofing links etc.)
  • Phishing (Sending bank related fake emails to get the information about the respective victim’s account.)
  • Dictionary Attack (To pursue using a very large set of words to identify the password. “That’s why it’s said to use a complicated password“)
  • Clickjacking(Manipulating the website links to make the user shift to another site.)
  • Tabnapping (A user is in a habit of opening no. of tabs simultaneously. If one of them is malfunctioned one and side by side he is accessing bank related information. Then, it will be at risk. Plus the malfunctioned site can enter into all other sites being active at that time.)
  • Stegobot (It can even detect data from an image. Hence, attack steganography technique.)

Apart from this, a new term I get to embark today is Botnet.

Example, If there is a hacker who wants to make any site like Amazon down for 2 days using Denial of Service (DOS), then he will make a script and will send that malfunctioned script to lakhs of users. It can be through e-mails depicting about “You have won a lottery, click here to claim”. All the persons clicking that link are inviting that script to get installed on their systems unknowingly.

Later on, The Bot master (Hacker) gives a command to hack Amazon and all those Bots (malfunctioned system) will start attacking Amazon site.

Plus, there is a robot.txt file through which websites can communicate with Web crawllers, robots etc. Also, this file gives permission to web crawlers (In the case of Google, Spiders) to read the website’s data and then show the results to the user.

Beside this, another way to hack systems is through Software Engineering.

It can be pursued in several ways like:

  • Dumpster Diving (Accesses trashed information, even passwords are sometimes written on sticky notes.)
  • Shoulder surfing (Back cameras for getting password information)
  • Persuasion (Fake calls, making a person pursue according to the hacker’s demand.)
  • Baiting (Similar to phishing, though difference comes in the usage of an item to entice persons. Example, an infected USB threw in a parking lounge and people took that and plug it with their systems. It may contain a malfunctioned script.)
  • Vishing (Related to phishing, but is done through Voice emails, calls etc. Example, Bank information related fake calls.)

One need to be alert and aware of the facts as there are numerous type of attacks which can infect your system.

       Identity Theft

It refers to the usage of another’s person Identity (name) to do some kind of illegal work. It can be done using Skimming attack (Example, even SIM Card can be used in this way and the person can make use of the victim’s number to pursue things. The victim is the one paying the full bill.)

For understanding, one can relate to Wifi password hacking and it’s usage for their need. But, it’s not a skimming attack purely.

Plus, I was encountered with a new term i.e Virtual Keyboards. As Keyloggers (S/W or H/W) is an attack which can record the key presses and can further detect the passwords. To resolve this type of attack, software component for users to enter characters is introduced called virtual keypad which enhances security level.


Also, the difference between a Magenetic stripe and chip-based card. Though, EMV-chip-based credit and debit cards are emerging nowadays because of their security levels. As they are having embedded microprocessor chips which protect the data. It’s named after it’s originators i.e Europay, MasterCard, and Visa.


There are few other expressions:

  • Trojan: Trojan horse is a type of computer program which is inserted in any system to corrupt it.
  • Spyware: A Spyware is a kind of software program injected in a system which will give information about the user. It’s a kind of malware, not a virus. Though both are dangerous, there is a slight difference. Malware is not self-replicating. Hence, need user interference for clicking a fake link etc. to get injected.
  • Worm/Virus: These are self-replicating which doesn’t need human intervention to spread. eg, ILOVEYOU worm etc.

Nowadays, the concept of hacking is approaching towards Mobile market, as there are huge no. of users operating through their cell phones.

  • Bluejacking: It refers to sending unsolicited messages through Bluetooth to enables devices which can inject the virus int the system. It’s done using OBEX (Object Exchange) Protocol that facilitates the exchange of binary objects among devices.
  • Bluesnarfing: It refers to the theft of information like messages, Address book etc.

Hence, one should be acquainted with the security measures.






WordPress Era

Today I tried my hands on one of the popular CMS i.e WordPress. I have installed it locally on my system (ubuntu) and then tried creating a website using wordpress.

I followed this link to install wordpress locally. I faced some of the errors which I am gonna discuss here:

I have created a user to access the database made for wordpress using:

CREATE USER wpuser@localhost IDENTIFIED BY 'password';

Then at the time of edditing details in cofig.php file apart from DB, password, host etc.

One have to put a unique phrase indicated given by terminal :

#define('AUTH_KEY', 'put your unique phrase here');
#define('SECURE_AUTH_KEY', 'put your unique phrase here');

Then I need to give permissons to wordpress folder:

sudo chmod 755 -R wordpress/


sudo chown -R deepti:www-data /var/www/html/wp-content/uploads

Still, this process is going on and I will discuss about making my first website through WordPress in my coming blogs.

Also, I have made a portfolio website using template and just uploaded it on Hostinger (But oops! It provides free hosting service only for a particular duration.)

You may visit: Portfolio

(One can suggest some more free hosting service providers in the comments below 🙂)

Apart from this, for making my experimental server to be shown on browser, I have given permissions to home:

chmod 755 -R .