Friday 16 June 2017

Is Linux faster than Windows ?

Why Is Linux Faster Than Windows?
One question that comes up a lot in discussion is whether Linux is genuinely a faster OS when compared to Windows. Most of the questions direct us to the time it takes for the OSes to boot up and in that parameter, yes, Linux is noticeable faster than Windows. Why then, does it fail the speed test when compared along other parameters ?
Kernel
One big reason why Linux can boot up faster than Windows is the difference in the way their kernels are designed. The nucleus of an OS is very different in these 2 products. Linux has a monolithic kernel – meaning it holds every core functionality needed by the OS such as drivers ,memory management, task scheduler and the file system. Windows on the other hand contains a micro kernel which contains only the basic necessities and the remaining aspects are loaded separately thus making it a little bit slower when compared to Linux.
Backward Compatibility
This is one aspect wherein Windows suffers owing to the decades of software support it provides it’s users. While it may slow down the loading process, there’s no denying that a majority of the world’s computing needs require this compatibility. Linux on the other hand, being a minority shareholder in the computing world can afford to forgo backward compatibility.
While discussing this, we also need to note that Microsoft can afford for Windows to be slower for the simple reason that a potential user will not be dissuaded from purchasing a Windows license just because it works a little bit slower. Windows being a propriety OS has a limited number of developers and thus a finite number of man hours they can commit. Therefore, the development activities need to be market driven for Microsoft. Optimization is not as high a priority for Windows compared to other requirements.
Linux on the other hand outperforms Windows in many areas because it is essential for its existence.
Explanation From Tech-savvy Reddit user logicalkitten 
  • One of the more hidden benefits to linux is that applications share files better than windows. So instead of DLLs like in windows, linux uses .so files, or “shared objects”. There are also .ko files, which are kernel objects, somewhat like drivers in windows.
  • A Windows application might depend on a very specific version of a DLL. The person who writes the application doesn’t know what version of windows you will be installing it on and if that particular DLL will be present in your system. So the easiest solution is to just include the correct DLL with the application. Effect: installers are much larger, C drive is fuller, and more ram is used.
  • Linux does it differently. When you ask to install Midori web browser for instance, apt-get (or the software center front end) checks the package for a list of dependencies. Instead of including all the files, Midori just says what it depends on.
  • So apt-get checks the system and sees that fileX.so.1 is already installed, which is one of the dependencies, so it doesn’t need to fetch it from the central software repository. It then notices that Midori needs another file, which is not installed yet, so it checks the software repository for a version that matches, or one that is newer. It installs that. And so on. Once the dependencies are satisfied, it installs the application itself. Result: Software can be installed very quickly and doesn’t take up as much space or ram.
  • The apt-get system also keeps track of how many applications need fileX.so.1, so that if you remove Midori, it doesn’t remove fileX.so.1, unless nobody else is using it. So Linux has pretty good house keeping skills.
How many of the ardent Linux supporters would stick around if the OS starts having problems ?

WannaCry lookalike encrypts files on Android smartphones’ external storage

WannaCry Ransomware Lookalike Targeting Android Smartphones
It looks like the WannaCry ransomware has become a source of inspiration for many crooks around the world. We had recently reported how a 14 year-old teenager from Japanimpressed by the malware was arrested last week for developing a malware similar to the WannaCry malware.
Now, cybercriminals in China have developed an Android ransomware that uses similar graphics of WannaCry and trick users into quickly paying the ransom.
For those unfamiliar, WannaCry ransomware exploited a weakness in Microsoft’s Windows operating system and went on to infect more than 3,00,000 computers in 150 countries within 72 hours last month. The WannaCry ransomware cryptoworm encrypted data and demanded payment in virtual currency Bitcoin in exchange for a password to unlock data.
Spotted first by Chinese security firm Qihoo 360 and dubbed as “ WannaLocker ” by Avast, this lookalike version of WannaCry ransomware and is currently targeting Android users living in China. The hackers are spreading this ransomware via Chinese gaming forums where it is disguised as a plugin for the King of Glory, a very popular mobile game in China.
How does the malware work?
Upon installation of this fake add-on in the device, the WannaLocker ransomware hides its app icon from the app drawer and changes the main wallpaper on the infected device to an anime image. Then, it starts encrypting the files stored on the infected device’s external storage.
The ransomware uses AES encryption to lock the files (see code below). To prevent corruption and crashing of the Android OS, it doesn’t not encrypt files that begin with a “.”, or files that include “DCIM”, “download”,  “miad”, ”android” and “com.” in the path, or files that are bigger than 10 KB.
Once the encryption process is completed, it demands ransom even less than Simplocker, and uses a ransom message clearly inspired by WannaCry’s note to reveal its orders.
Nikolaos Chrysaidos, head of mobile threat intelligence and security at Avast, explains more in a blog post:
“The ransomware then demands a ransom of 40 Chinese Renminbi, which is equivalent to about 5-6 US dollars. This is not much compared to what other mobile ransomware has demanded in the past. The fact that the ransom is being demanded in regular currency and not in cryptocurrencies makes me think the people behind this are trying to make money, and fast. This is, however, risky as the money can be easily traced, unlike when sending cryptocurrencies.”
The victims of the ransomware are instructed to pay the ransom in regular currency using Chinese payment methods like QQ, Alipay and WeChat.
The sloppy handling of ransom suggests that it could be a work of an amateur hacker or group of hackers. As a result, it is just matter of time for the Chinese authorities to find out who are behind the WannaLocker ransomware and who is receiving the ransom.
Here’s a security advice from Avast for Android users:
To protect your phone and valuable photos, videos, contacts stored on it from ransomware, make sure you frequently backup your data and install antivirus on all of your devices.
Additionally, Android users should refrain from downloading apps on any app marketplaces other than Google Play. In case, you become a victim of a ransom-based attack, don’t give into the ransom demand and seek professional help instead.
Last week, Check Point, an online security firm, had detected a malicious malware called “ Fireball ” that was created by Chinese ad corporation Rafotech that takes control of the user’s web browser and generates fake advertisement clicks and promotions for its clients online. The malware affected more than 250 million computers around the world, with India being the worst hit.
Source: IBT

Your Windows 10 PC Doesn’t Have Hibernate Option? Here’s How To Add it!

How To Add Hibernate Option In Windows 10

Your Windows 10 PC Doesn’t Have Hibernate Option? Here’s How To Add it!

Hibernation is a state between a traditional shut down and sleep mode, in which the computer takes a snapshot of your system files and drives before saving it to your hard drive and shutting down. The benefit of hibernating is that it allows your machine to start up faster since it doesn’t need to spend time to re-establish those files and drivers.
Reason for hibernation
Hibernate is not enabled by default and most people do not really use it. However, when it is enabled it generally takes around 75% of your RAM due to the disk space that it reserves. The hiberfil.sys file is the file responsible for the hibernation and is allotted the 75% RAM space. Thus if the total RAM on your machine is 8 GB this file alone will take up 6 GB. Therefore, if you need that RAM it is probably a good idea to have the hibernate mode disabled.
Here’s how to disable hibernation in windows 10:
Step 1:
Open up your command prompt by right-clicking on your Start menu.
Step 2:
In the command prompt, type the command – powercfg.exe /hibernate off  and hit Enter.
Step 3:
To enable hibernation in windows 10 if you need it, type the command – powercfg.exe /hibernate on in the command prompt and hit Enter.

” Add ” Hibernate option on the Start menu in windows 10

Now if you use hibernate on a regular basis, you might want to add it on your Start menu >power option. To do this, you will need to go into the Control Panel and Find the Power OptionsWithin that, choose the option in the left that says Choose what the power buttons do
On the next screen, click on the blue link that says Change settings that are currently unavailable.
Now scroll down to the bottom half of the page, click the checkbox next to hibernate and save your changes. The Hibernate option will now show up in your Start Menu on your windows 10 when you click the Power button.

Why do most professional programmers prefer Macs?

A Macbook is a great piece of machinery, that’s beyond debate. From the build quality to battery efficiency, there aren’t any machines out there that can compete with a Macbook. That being said, there are questions that come to mind when deciding to purchase a Mac. One of them being – is it a good machine to code on ?
No matter which side you are in the Windows vs Mac debate, its hard to ignore the fact that Macbooks have limitations. From a small user base to limited applications to the higher price point, there are obstacles which do not allow Macbooks to be as widely accepted as a machine running Windows. Though in some cases – such as digital content creation, Macbooks tend to be preferred, coding specifically is a domain that’s fiercely debated. On one hand, I have come across dozens of vocal Macbook supporters while on the other, Windows is clearly the preferred choice when seen by the sheer number of coders on the platform.
Therefore, we’ve decided to delve into the hot topic of discussion – not to find out which one is better – but to see how good a Macbook is for a programmer. Hopefully this article will help those readers who are in a quandary between choosing a Macbook as the primary coding machine.
Hardware
First, let’s discuss hardware. Though not extremely crucial for development, you simply cannot code efficiently on a machine that cannot keep up with you. A programmer may not need a beast of a machine, but one needs to have a machine which has decent raw power. On a hardware comparison, even the most basic Macbook is clearly not a slouch when it comes to performance. On the most expensive side of the Macbook range, the hardware just keeps getting better and better. Many individuals who work on a Mac on a daily basis will also tell you how good a Retina display is. Barring the better colour reproduction and sharp display, most people will also tell you that your eyes won’t hurt after a long day of staring at the screen.
On the flip side though, this hardware also comes at a much steeper price. While a Macbook might be mighty powerful under the hood, it is also mighty high on the price point. In the most common reason to refute a Macbook, Windows machine pride themselves in being able to offer the same raw power in a much more affordable price range. Granted, the Macbook range has a design to die for, but it was only a matter of time before other companies in the fray managed to develop laptops that could go head to head in the design department if not better than the Macbook.
Development Environment
Its needless to say it, but if you’re developing Windows apps, Mac obviously isn’t your best option. With the level of support that Microsoft’s OS has for software development for its own platform, one would be best served for developing Windows apps on a Windows machine. That being said, MacOS does have a native UNIX environment – which is what a majority of web servers use as well. In simpler terms, if the server you will eventually use runs UNIX or Linux, it makes sense to consider developing on a machine that runs on the same environment.  In simpler terms, it means that the applications you develop on a Macbook will run on the machine in the exact same way as they will on the actual server once deployed. Web applications developed using PHP, Ruby on Rails, or Node.js will work exactly as they would on the production server as will MySQL and Postgres.
Tools
The Macbook also has access to the 3 major internet browsers which means testing those aforementioned web apps on these browsers will not be an issue.  As a plus point, the Web Inspector of Apple’s native browser Safari can easily connect to an iOS simulator thus allowing you the benefit of testing these apps on tan iPhone and iPad like interface. For an iOS developer, this is an invaluable plus point.
In respect to other development tools, Macbooks play host to a number of text editors including TextMate, BBEdit, SublimeText, Atom, SubEthaEdit (with Google Docs-like live collaboration features). The Macbook range also has access to specialized developer tools like source control GUIs (Cornerstone and Versions for SVN, Tower and SourceTree for git), file comparison and merge tools (Kaleidoscope), GUI design helpers (xScope), quick-lookup documentation viewers (Dash), and file transfer tools (Transmit). In addition to these if you end up requiring access to a different development environment, there always are Virtual environments to be utilized like  VMware Fusion and Parallels Desktop.
In conclusion, there are several tools available to make Macbook a serious coding machine. For developers switching from a Windows environment, if you find some resources missing, you will also find plenty of alternatives. While the high cost of entry is a major obstacle keeping Macs out of reach for students and younger developers , if you are an experienced developer or can afford a Macbook without much investment in the Windows platform, you should consider making a Macbook your next coding device.

Malware abuses Intel Chip Management Feature to infiltrate



Malware using Intel's tool to evade firewall
Hackers have been known to use creative and innovative ideas to break into a system. However, it is usually by means of deceiving the user and/or exploiting loopholes. This security breach however, happens to the rare scenario when a hacker has utilized a software in the exact way as it was designed to be used to hack into a system.
Bypassing the Firewall
Microsoft has announced that a group going by the name of Platinum has made use of Intel’s Active Management Technology (AMT) to bypass Window’s firewall completely. The tool is available on machines running Intel’s vPro line of processors and chipsets. The group has its own file transfer tool which utilizes – for its communication services – Serial-over-LAN (SOL) channel from within the AMT. This channel has been designed to operate independently of the Operating System running on the machine and therefore, the tool is able to bypass Window’s firewall thus making it ” invisible to firewall and network monitoring applications running on the host device.” 
The Serial-Over-Lan (SOL) channel” exposes a virtual serial device with a chipset-provided channel over TCP” is not enabled by default, and requires administrative privileges to actually run on the target workstations. Since the provisioning of such a channel is bound by the use of user credentials – username and password – the Redmond giant speculates that PLATINUM “might have obtained compromised credentials from victim networks”.
The AMT firmware runs at a low level, below the operating system, and it has access to not just the processor, but also the network interface.The software allows a user to remotely install an OS on a machine that does not have one yet, allows for the power cycling of devices and also provides an IP based KVM (Keyboard,Video,Mouse) solution to enable users to accomplish these tasks.
Statements
This is what Microsoft had to say in a public statement:
We confirmed that the tool did not expose vulnerabilities in the management technology itself, but rather misused AMT SOL within target networks that have already been compromised to keep communication stealthy and evade security applications.
The new SOL protocol within the PLATINUM file-transfer tool makes use of the AMT Technology SDK’s Redirection Library API (imrsdk.dll). Data transactions are performed by the calls IMR_SOLSendText()/IMR_SOLReceiveText(), which are analogous to networking send() and recv() calls. The SOL protocol used is identical to the TCP protocol other than the addition of a variable-length header on the data for error detection. Also, the updated client sends an unencrypted packet with the content “007″ before authentication.
Not everyone needs to be worried about this however, since machines running Windows 10 version 1607 or later and Configuration Manager 1610 or later are deemed protected for this or any other attack by the same means. This system configuration is not only capable of detecting a targeted attack activity but it can also “differentiate between legitimate usage of AMT SOL and targeted attacks attempting to use it as a communication channel.”
The company has also said this is the first attack that has utilized chipset features for its purposes and it does not expose the vulnerabilities of Intel’s AMT software, rather it uses the technology to evade security systems in a complex and compromised network. Microsoft has also released a video alongside the public statement for users to understand how the attack takes shape which you can check out below.
Source: Neowin

Using your Mobile to have a Bet

.Using your Mobile to have a Bet
Each year over the last few years more and more people go online in search of their entertainment and this is especially so as technology advances and wi-fi connections are more reliable.
Entertainment like music, video games, and online bingo sites and casinos can easily be accessed via mobile devices, and the gambling industry has an established history of  pioneering new technology and innovative ideas, and that is why they were light years ahead games that transferred over to mobile devices really well compared to many other industries.
Because the gambling industry was quick to see the potential of the mobile boom many sites optimized their games for the mobile user. This means that games can be played at any time and from anyplace making having a game of bingo, blackjack or poker a simple process.
Many sites do not even ask you to download an app which again adds to the convenience side of things, something that we are all wanting in our busy lives.
New players are offered exclusive bonuses, and if they are existing players they will be able to sync all of their mobile devices enabling them to sign in using the same password. Many sites also offer their player the option of paying for their games using their mobile phone bill.
This means that either their games are paid for by adding the amount they have spent on their monthly contract bill or deducting the amount from their pay as you go balance. In this way, there is no need to give any credit card details or bank details over to the site.
Mobile gambling has also lost its shady character due mainly to legislation and regulation of the industry. Gambling has been around for centuries in one form or another, and as a race, we enjoy the excitement of placing a bet, especially if we are in with a chance of a win.
Now we can enjoy exciting, modern interfaces with step by step tutorials on regulated sites that offer a great range of fully optimized games for the mobile user in an environment that is both entertaining and safe.

Best Gaming Keyboards to Buy in 2017


Razer Ornata

Best gaming keyboards of 2017


Looking at the most popular machines available today will make you feel that slim island-style keyboards are the most preferred ones. While that might be true, what with companies even going to the extent to launching touch keyboards ( looking at you Microsoft ) there is no denying that for some people, a big mechanical keyboard is the best fit. This is a big reason why we still have companies that keep releasing newer models of physical keyboards.
While the benefit of using a separate keyboard are many, it becomes essential for a particular category of PC users – the gamer. No matter your game of choice, having a good keyboard has never brought down anyone’s kill streak. For that reason, we’ve used our skills to gather for you some of the best gaming keyboards that 2017 has to offer.
Razer BlackWidow Chroma V2
A gamer would be obviously aware of the Razer brand and true to their style they have released one of the best gaming keyboards available today. This keyboard comes with detachable wrist rest and also has 5 mechanical keys that can be customized for any action based on your choice. For those of you who love a backlit keyboard, this one comes with 16.8 million colours to choose from to satisfy those needs. To take it up a notch, the keys can be colored per-key or in an animated pattern of your choosing.
Corsair K95 RGB Platinum
Just like its predecessor, this is a mechanical keyboard designed specifically, to meet every single one of your gaming requirements. The accompanying software with the keyboard might not be the best, but if all you need to do is basic configurations – such as configuring the well placed macro keys – then this should not be a problem for you.
Logitech G413 Carbon
After some time of a single minded dedication to making the best keyboards available irrespective of the price tag, Logitech has finally released a keyboard that will not suck your bank account dry. This keyboard sacrifices back light and custom macro keys for the affordable price tag, which might make it look a bit dull when compared to its peers but that is compensated by its magnesium-alloy skeleton. For a gamer who doesn’t care about bells and whistles, this should be in your short list.
SteelSeries Apex M500
Like its predecessor in this list the SteelSeries Apex M500 also forgoes fancy bells and whistles for specialization. The keyboard lacks media keys and macros to come in a compact design. This keyboard is tailor made for fans of e-sports and a refreshing feel for the minimalist user.
Cougar Attack X3 RGB
Cougar Attack X3 RGB comes in as one of the more affordable mechanical keyboards that is backed up in toughness owing to its aluminium build. It carries on its predecessor’s legacy of robustness and variety with it being available in Cherry MX Black, Brown, Red or Blue key switches to cater your needs. Features include N-Key rollover, a 1,000Hz polling rate and rubber feet on the bottom that prevents slipping.
Topre Realforce RGB
Let’s add a little variety to this list with the Japanese company Topre. This keyboard is well known for its long list of talents not least of which is the ability to be able to type on it endlessly with minimal finger fatigue. Its capacitive key switches offer a superior level of feedback although if you intend to type a lot, you will be best served with a wrist rest.
We round off this list with another beauty from the gaming community favourtie. There’s long been a debate between mechanical and membrane keys which Razer has decided to nudge towards its end with this Mecha-Membrane’ keyboard. The resultant device is a best of both worlds scenarios with shorter keys, the tactile feel of the green switches from the Blackwidow X Chroma and a loud audible click.

Click farm with 474 iPhones, 347200 SIM cards and 10 computers Busted In Thailand

Click farm with 474 iPhones, 347200 SIM cards and 10 computers Busted In Thailand

Its common knowledge that a significant amount of internet traffic comes via bots. Artificial accounts and bots are used to boost up traffic artificially for services and inflate likes and view counts on numerous social media platforms. When the Thailand police raided a house situated close to its Cambodian border, the world got a little glimpse into the mysterious world.
Chinese Connection
The police unearthed a fake click racket that was being run by Wang Dong, Niu Bang, and Ni Wenjin this past sunday. The 3 individuals were arrested by the Thai police on charges of working without a permit and smuggling SIM cards into the country. The setup that they discovered included 500 smartphones, 350,00 SIM cards, 21 SIM card readers, and nine computers that were being used in the operation.
Initially though, the police didn’t suspect a fake click farm, rather, they suspected the operation to be a fraudulent call center – a very common scam in the country. Later the trio spilled the beans that they were actually running a network of so-called sock puppet accounts on China’s largest social network, WeChat. The men were reported paid around 150,000 baht ($4403) by a company based in China for the operation. The operation was said to be based in Thailand owing to the country’s smartphone usage charges being relatively lower.
Another reason for the scam could be the increasing level of difficulty in gaining bulk of SIM cards in the People’s Republic of China. The Chinese government have recently begun asking users to provide identification before registering a SIM card. Thailand also has similar requirement however, therefore, the source of the huge number of SIM cards will remain uncertain until the authorities reveal more information.
The Zombie Fan Problem
The setup though surprising to us, is much more common than one would think with reports of several such farms across the country of China. Talking about WeChat in particular, it is very hard to identify how much of a problem such fake clicks are since the company is very private in its dealings. Created in 2010, the platform is designed for small groups of people to message each other – similar to WhatsApp – and boats of 880 million monthly active users.
The reason behind the fake clicks being a problem is less to do with the company and more with the design of the application. The chat groups in the app are visible only to individuals who have been invited to it, thus making it extremely hard for anyone to verify such zombie fans with credible evidence. That doesn’t mean the problem is being blown out of proportion however. A 2015 investigation conducted by The Bejinger showed it’s startlingly easy and inexpensive to manipulate likes and views on the messaging platform.
However,charges related to working in Thailand illegally can come with a sentence of up to five years in prison and the culprits are also expected to pay a fine before being deported to China . Neither WeChat nor its parent company Tencent have made any public statements regarding this story as of this moment.

How To Remove Write Protection From A USB Pen Drive And Memory Card

How To Remove Write Protection From A USB Pen Drive And Memory Card


Sometimes, you will come across a USB pen drive or an SD Card that simply does not let you write any new content onto it. Windows will tell you that the storage device is write protected even though you have not done anything to make it so. There is a switch that does make a drive write protected and for those who didn’t know about this, this is what you need to do.
The Switch
The switch as we’ve mentioned locks the drive such that one cannot carry out any write actions on it. You can still read the files on the drive however. This switch when set to locked, will keep the files on the drive safe from deletion and an accidental format. At times, you might be able to hit the delete operation, but the next time you check, the files will still be there. In some cases, the storage device might be actually broken physically or corrupted and in those cases, nothing can be done, however, in any other case, there are ways around the problem.
Regedit.exe is the executable software you will need for this and it runs on any version of Windows XP or later. Just type regedit in the search bar of the start menu and it should appear right at the top as the first option. It looks a lot like the File Explorer and therefore, you can use the left pane and navigate to Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies “. Once there, double click on the WriteProtect value. Now, you can change the value from 1 to 0. Once the changes are saved, close the application and restart your machine. When re-connected, the storage device should be working normally.
StorageDevicePolicies
If for some reason, you are unable to find StorageDevicePolicies , you will need to create it by a right-click on the white space in the Control folder and choose New -> Key and entering the name StorageDevicePolicies. Now double-click on the new key that will show up as a folder , right click in the white space once again and  choose New -> DWORD. Set this value to 0 and name it WriteProtect . Close the application and restart your machine. If this step still doesn’t resolve the problem, there is one more thing you can try.
Diskpart
For this step, attach the storage device to your computer and open a command prompt. You might need to open a command prompt with administrator privileges. You can do so, by a right-click on the start menu button. In the command prompt, type the following commands hitting enter after each of them.
diskpart
list disk
select disk x (where x is the number of your non-working drive – use the capacity to work out which one it is)
attributes disk clear readonly
clean
create partition primary
format fs=fat32  (you can swap fat32 for ntfs if you only need to use the drive with Windows computers)
exit
If your drive is still having the same problems, we regret to inform you that there is nothing more to be done besides purchasing a new device.

JavaScript Cheat Sheet

Ultimate JavaScript Cheat Sheet

JavaScript often abbreviated as “JS”, is a high-level, dynamic, untyped, interpreted run-time language.It has been standardized in the ECMAScript language specification. Alongside HTML and CSS, JavaScript is one of the three core technologies of World Wide Web content production.
Cheat Sheet for JavaScript:

Expres­sions Syntax

^
Start of string
$
End of string
.
Any single character
(a|b)
a or b
(…)
Group section
[abc]
In range (a, b or c)
[^abc]
Not in range
\s
White space
a?
Zero or one of a
a*
Zero or more of a
a*?
Zero or more, ungreedy
a+
One or more of a
a+?
One or more, ungreedy
a{3}
Exactly 3 of a
a{3,}
3 or more of a
a{,6}
Up to 6 of a
a{3,6}
3 to 6 of a
a{3,6}?
3 to 6 of a, ungreedy
\
Escape character
[:punct:]
Any punctu­ation symbol
[:space:]
Any space character
[:blank:]
Space or tab

JavaScript Dates

Date()
setMonth()
getDate()
setFul­lYear()
getDay()
setHours()
getMonth
setMin­utes()
getFul­lYear
setSec­onds()
getYear
setMil­lis­eco­nds()
getHours
setTime()
getMinutes
setUTC­Date()
getSeconds
setUTC­Day()
getMil­lis­econds
setUTC­Month()
getTime
setUTC­Ful­lYear()
getTim­ezo­neO­ffset()
setUTC­Hours()
getUTC­Date()
setUTC­Min­utes()
getUTC­Day()
setUTC­Sec­onds()
getUTC­Month()
setUTC­Mil­lis­eco­nds()
getUTC­Ful­lYear()
toSource()
getUTC­Hours()
toString()
getUTC­Min­utes()
toGMTS­tring()
getUTC­Sec­onds()
toUTCS­tring()
getUTC­Mil­lis­eco­nds()
toLoca­leS­tring()

JavaScript Arrays

concat()
slice()
join()
sort()
length
splice()
pop()
toSource()
push()
toString()
reverse()
unshift()
shift()
valueOf()

JavaScript Strings

charAt()
slice()
charCo­deAt()
split() x
concat()
substr()
fromCh­arC­ode()
substr­ing()
indexOf()
toLowe­rCase()
lastIn­dexOf()
toUppe­rCase()
length
toLoca­leL­owe­rCase()
locale­Com­pare()
toLoca­leU­ppe­rCase()
match() x
toSource()
replace() x
valueOf()

JavaScript Functions

decode­URI()
isNaN()
decode­URI­Com­pon­ent()
Number()
encode­URI()
parseF­loat()
encode­URI­Com­pon­ent()
parseInt()
escape()
String()
eval()
unescape()

JavaScript Booleans

toSource()
valueOf()
toString()

JavaScript Numbers and Maths

abs()
min()
acos()
NEGATI­VE_­INF­INITY
asin()
PI
atan()
POSITI­VE_­INF­INITY
atan2()
pow()
ceil()
random()
cos()
round()
E
sin()
exp()
sqrt()
floor()
SQRT1_2
LN10
SQRT2
LN2
tan()
log()
toSource()
LOG10E
toExpo­nen­tial()
LOG2E
toFixed()
max()
toPrec­ision()
MAX_VALUE
toString()
MIN_VALUE
valueOf()

JavaScript RegExp Object

compile()
lastParen
exec()
leftCO­ntext
global
multiline
ignoreCase
rightC­ontext
input
source
lastIndex
test()

Incrementing /decrementing numbers

Increment++x or x++
Decrement–x or x–

The difference is that ++x (–x) returns the incremented (decremented) value, while x++(x–) returns the previous value of x.

PHP vs Python : Which one is the Best Server-Side Programming?

PHP vs Python, the two most popular back-end programming languages. Python has the variety of dynamic features with simple script whereas ...