Daniel Andrukonis

Web developer

TCP/UDP Ports, numbers, descriptions

Several days ago I have been working on Angular revision which takes a while to understand. In common sense Angular were create by Alpha group which one of the main purposes was to create a framework which would provide a well known service for applications in different platforms. As we know they do have open source which is available in official Git cloud. As there is many available frameworks I have decided to switch off from the world and work in local machine.


After few hours, I did get the output which was needed with help of Atom application. In addition terminal was in use which helped to manipulate with open applications. After successful Bubble sample installation, I have decided to use same approach which would lead to other samples manipulation which would show how effective it could be used when we do understand mechanics of new technology written in JavaScript.


Nevertheless I encountered an error as the output stated that the port which needed to be used already in use. As a result, I have decided to create another host service for this specific framework in local machine which would lead for this problem, however, I knew that each framework or application likes to use its ports which by standard are written in specific file in this case the configuration was held in package.json (“start”: “http-server -a localhost -p 8000 -c-1 ./app”,) this was one of lines which contained information of the script which terminal runs. Instead of 8000 I have used 8001 which allowed me to start a new server with another sample which also worked.


Due to this, I have decided to do revision on well known ports which should be known for Information Technology specialist. To find this port wasn’t easy as it could be misunderstood. One of the books contained information about hardware ports which are used to connect other devices, such as, Network Interface Cards (NIC), Universal Serial Bus (USB), Small Computer Systems Interface (SCSI), Serial communications (COM) also, known as an RS-232 or COM have been used to connect the following; external modems, serial mouse or pointing devices such as trackballs or touchpad, label printers, serial printers, PDA docking stations, digital cameras PC-to-PC connections used by file transfer programs such as Direct Cable Connection, LapLink and Interlink.


However, it wasn’t the information I was looking for. As a result, after connecting to the world again I have decided to look for information in the web. After typing TCP and UDP port numbers I did get the first outcomes of 21, 22 which are well known in computer world. File Transfer Protocol (FTP:21), Secure Shell Protocol (SSH:22).


TCP/UDP Ports table[1]

PortTCPUDPIANA statusDescription
In programming (APIs not in communication between hosts), requests a system - allocated (dynamic) port.
1YesAssignedOfficialTCP Port Service Multiplexer (TCPMUX). Historic. Both TCP and UDP have been assigned to TCPMUX by IANA, but by design only TCP is specified.
5AssignedAssignedOfficialRemote Job Entry was historically using socket 5 in its old socket form, while MIB PIM has identified it as TCP/5 AND IANA has assigned both TCP and UDP 5 to it.
7YesYesOfficialEcho Protocol
9Yes, and SCTP.



Discard Protocol
11YesYesOfficial Active Users (systat service)
13YesYesOfficialDaytime Protocol
15YesNoUnofficialPreviously netstat service
17YesYesOfficial Quote of the Day (QOTD)
18YesYesOfficialMessage Send Protocol
19YesYesOfficialCharacter Generator Protocol (CHARGEN)
20Yes, and SCTPAssignedOfficialFile Transfer Protocol (FTP) data transfer
21Yes, and SCTPAssignedOfficialFile Transfer Protocol control (command)
22Yes, and SCTPAssignedOfficialSecure Shell (SSH), secure logins, file transfers (scp, sftp) and port forwarding
23YesAssignedOfficialTelnet protocol - unencrypted text communications
25YesAssignedOfficialSimple Mail Transfer Protocol (SMTP), used for email routing between mail servers
37YesYesOfficialTime Protocol
42AssignedYesOfficialHost Name Server Protocol
43YesAssignedOfficialWHOIS protocol
49YesYesOfficialTACACS Login Host protocol. TACACS+, still in draft which is an improved but distinct version of TACACS, only uses TCP 49
51ReservedReservedOfficialHistorically used for Interface Message Processor logical address management, entry has been removed by IANA on 2013-05-25
53YesYesOfficialDomain Name System (DNS)
54AssignedAssigned Official
56AssignedAssignedOfficialXerox Network Systems (XNS) Clearinghouse (Name Server). Despite this port being assigned by IANA, the service is mean to work on SPP (ancestor of IPX/SPX), instead of TCP/IP
58AssignedAssignedOfficialXerox Network Systems (XNS) Clearinghouse (Name Server). Despite this port being assigned by IANA, the service is mean to work on SPP (ancestor of IPX/SPX), instead of TCP/IP
61ReservedReservedOfficialHistorically assigned to the NIFTP-Based Mail protocol, but was never documented in the related IEN. The port number entry was removed from IANAs registry on 2017-05-18
67Assigned YesOfficialBootstrap Protocol (BOOTP) server, also used by Dynamic Host Configuration Protocol (DHCP)
68AssignedYesOfficialBootstrap Protocol (BOOTP) server, also used by Dynamic Host Configuration Protocol (DHCP)
69AssignedYesOfficialTrivial File Transfer Protocol (TFTP)
70YesAssignedOfficialGopher protocol
71-74YesYesOfficialNETRJS protocol
79YesAssignedOfficialFinger protocol
80Yes, and SCTP



Hypertext Transfer Protocol (HTTP)

Quick UDP Internet Connections (QUIC), a transport protocol over UDP (still in draft as of July 2018), using stream multiplexing, encryption by default with TLS, and currently supporting HTTP/2.
81YesUnofficialTorPark onion routing
82YesUnofficialTorPark control
88YesAssignedOfficialKerberos authentication system
90YesYesUnofficialPointCast (dotcom)
101YesAssignedOfficialNIC host name
102YesAssignedOfficialISO Transport Service Access Point (TSAP) Class 0 protocol.
104YesYesOfficialDigital Imaging and Communications in Medicine (DICOM; also port 11112)
105YesYesOfficialCCSO Nameserver
107YesYesOfficialRemote User Telnet Service (RTelnet)
108YesYesOfficialIBM System Network Architecture (SNA) gateway access server
109YesAssignedOfficialPost Office Protocol, version 2 (POP2)
110YesAssignedOfficialPost Office Protocol, version 3 (POP3)
111YesYesOfficialOpen Network Computing Remote Procedure Call (ONC RPC, sometimes referred to as Sun RPC)



Ident, authentication service/identification protocol, used by IRC servers to identify users.

Authentication Service (auth), the predecessor to identification protocol. Used to determine a user's identity of a particular TCP connection.
115YesAssignedOfficialSimple File Transfer Protocol
117YesYesOfficialUUCP Mapping Project
118YesYesOfficialStructured Query Language (SQL) Services
119YesAssignedOfficialNetwork News Transfer Protocol (NNTP), retrieval of newsgroup messages
123AssignedYesOfficialNetwork News Time Protocol (NNTP), retrieval of newsgroup messages
126YesYesOfficialFormerly Unisys Unitary Login, renamed, by Unisys to NXEdit. Used by Unisys Programmer's Workbench for Clearpath MCP, an IDE for Unisys MCP software development



DCE endpoint resolution

Microsoft EPMAP (End Point Mapper), also known as DCE/RPC Locator service,[65] used to remotely manage services including DHCP server, DNS server and WINS. Also used by DCOM
137YesYesOfficialNetBIOS Name Service, used for name registration and resolution
138AssignedYesOfficialNetBIOS Datagram Service
139YesAssignedOfficialNetBIOS Session Service
143YesAssignedOfficialInternet Message Access Protocol (IMAP), management of electronic mail messages on a server
152YesYesOfficialBackground File Transfer Program (BFTP)
153YesYesOfficialSimple Gateway Monitoring Protocol (SGMP), a protocol for remote inspection and alteration of gateway management information
156YesYesOfficialStructured Query Language (SQL) Service
158YesYesOfficialDistributed Mail System Protocol (DMSP, sometimes referred to as Pcmail)
161AssignedYesOfficialSimple Network Management Protocol (SNMP)
162YesYesOfficialSimple Network Management Protocol Trap (SNMPTRAP)
170YesYesOfficialNetwork PostScript print server
177YesYesOfficialX Display Manager Control Protocol (XDMCP), used for remote logins to an X Display Manager server
179Yes, and SCTPAssignedOfficialBorder Gateway Protocol (BGP),[75] used to exchange routing and reachability information among autonomous systems (AS) on the Internet
194YesYesOfficialInternet Relay Chat (IRC)
201YesYesOfficialAppleTalk Routing Maintenance
209YesAssignedOfficial Quick Mail Transfer Protocol
210YesYesOfficialANSI Z39.50
213YesYesOfficialInternetwork Packet Exchange
218YesYesOfficialMessage posting protocol (MPP)
220YesYesOfficialInternet Message Access Protocol (IMAP), version 3
259YesYesOfficialEfficient Short Remote Operations (ESRO)
264YesYesOfficialBorder Gateway Multicast Protocol (BGMP)
300YesUnofficialThinLinc Web Access
308YesOfficialNovastor Online Backup
311YesAssignedOfficialMac OS X Server Admin (officially AppleShare IP Web administration)
318YesYesOfficialPKIX Time Stamp Protocol (TSP)
319YesOfficialPrecision Time Protocol (PTP) event messages
320YesOfficialPrecision Time Protocol (PTP) general messages
350YesYesOfficialMapping of Airline Traffic over Internet Protocol (MATIP) type A
351YesYesOfficialMATIP type B
356YesYesOfficialcloanto-net-1 (used by Cloanto Amiga Explorer and VMs)
366YesYesOfficialOn-Demand Mail Relay (ODMR)


codaauth2, Coda authentication server

securecast1, outgoing packets to NAI's SecureCast servers. As of 2000
371YesYesOfficialClearCase albd
383YesYesOfficialHP data alarm manager
384YesYesOfficialA Remote Network Server System
387YesYesOfficialAURP (AppleTalk Update-based Routing Protocol)
388YesAssignedOfficialUnidata LDM near real-time data distribution protocol
389YesAssignedOfficialLightweight Directory Access Protocol (LDAP
399YesYesOfficialDigital Equipment Corporation DECnet (Phase V+) over TCP/IP
401YesYesOfficialUninterruptible power supply (UPS)
427YesYesOfficialService Location Protocol (SLP)
433YesYesOfficialNNSP, part of Network News Transfer Protocol
434YesYesOfficialMobile IP Agent (RFC 5944)
443Yes, and SCTP



Hypertext Transfer Protocol over TLS/SSL (HTTPS)

Quick UDP Internet Connections (QUIC), a transport protocol over UDP (still in draft as of July 2018), using stream multiplexing, encryption by default with TLS, and currently supporting HTTP/2
444YesYesOfficialSimple Network Paging Protocol (SNPP), RFC 1568



Microsoft-DS (Directory Services) Active Directory,[82] Windows shares

Microsoft-DS (Directory Services) SMB[10] file sharing
464YesYesOfficialKerberos Change/Set password



URL Rendezvous Directory for SSM (Cisco protocol)

Authenticated SMTP[10] over TLS/SSL (SMTPS)
475YesYesOfficialtcpnethaspsrv, Aladdin Knowledge Systems Hasp services
491YesUnofficialGO-Global remote access and application publishing software
500AssignedYesOfficialInternet Security Association and Key Management Protocol (ISAKMP) / Internet Key Exchange (IKE
502YesYesOfficialModbus Protocol
504YesYesOfficialCitadel, multiservice protocol for dedicated clients for the Citadel groupware system
510YesYesOfficialFirstClass Protocol (FCP), used by FirstClass client/server groupware system


Rexec, Remote Process Execution

comsat, together with biff






Remote Shell, used to execute non-interactive commands on a remote system (Remote Shell, rsh, remsh)

Syslog, used for system logging
515YesAssignedOfficialLine Printer Daemon (LPD), print service



efs, extended file name server

Routing Information Protocol (RIP)
521YesOfficialRouting Information Protocol Next Generation (RIPng)
524YesYesOfficialNetWare Core Protocol (NCP) is used for a variety things such as access to primary NetWare server resources, Time Synchronization, etc.
525YesOfficialTimed, Timeserver
530YesYesOfficialRemote procedure call (RPC)
533YesOfficialnetwall, For Emergency Broadcasts
540YesOfficialUnix-to-Unix Copy Protocol (UUCP)
542YesYesOfficialcommerce (Commerce Applications)
543YesOfficialklogin, Kerberos login
544YesOfficialkshell, Kerberos Remote shell
546YesYesOfficialDHCPv6 client
547YesYesOfficialDHCPv6 server
548YesAssignedOfficialApple Filing Protocol (AFP) over TCP
550YesYesOfficialnew-rwho, new-who
554YesYesOfficialReal Time Streaming Protocol (RTSP)
556YesOfficialRemotefs, RFS, rfs_server
560YesOfficialrmonitor, Remote Monitor
563YesYesOfficialNNTP over TLS/SSL (NNTPS)
564YesUnofficial9P (Plan 9)
585UnofficialLegacy use of Internet Message Access Protocol over TLS/SSL (IMAPS), now in use at port 993
587YesAssignedOfficialemail message submission (SMTP)
591YesOfficialFileMaker 6.0 (and later) Web Sharing (HTTP Alternate, also see port 80)
593YesYesOfficialHTTP RPC Ep Map, Remote procedure call over Hypertext Transfer Protocol, often used by Distributed Component Object Model services and Microsoft Exchange Server
601YesOfficialReliable Syslog Service — used for system logging
604YesOfficialTUNNEL profile, a protocol for BEEP peers to form an application layer tunnel
623YesOfficialASF Remote Management and Control Protocol (ASF-RMCP) & IPMI Remote Management Protocol
625YesNoUnofficialOpen Directory Proxy (ODProxy)


Internet Printing Protocol (IPP)
635YesYesOfficialCommon Unix Printing System (CUPS) administration console (extension to IPP)
636YesAssignedOfficialRLZ DBase
639YesYesOfficialLightweight Directory Access Protocol over TLS/SSL (LDAPS)
641YesYesOfficialMSDP, Multicast Source Discovery Protocol
643YesYesOfficialSupportSoft Nexus Remote Command (control/listening), a proxy gateway connecting remote control traffic
647YesYesOfficialLabel Distribution Protocol (LDP), a routing protocol used in MPLS networks
648YesYesOfficialRegistry Registrar Protocol (RRP)
653YesYesOfficialSupportSoft Nexus Remote Command (data), a proxy gateway connecting remote control traffic
654YesYesOfficialMedia Management System (MMS) Media Management Protocol (MMP)
655YesYesOfficialTinc VPN daemon
657YesYesIBM RMC (Remote monitoring and Control) protocol, used by System p5 AIX Integrated Virtualization Manager (IVM) and Hardware Management Console to connect managed logical partitions (LPAR) to enable dynamic partition reconfiguration
660YesAssignedOfficialMac OS X Server administration, version 10.4 and earlier

Doom, first online first-person shooter
674YesOfficialApplication Configuration Access Protocol (ACAP)
688YesYesOfficialREALM-RUSD (ApplianceWare Server Appliance Management Protocol)
690YesYesOfficialVelneo Application Transfer Protocol (VATP)
691YesOfficialMS Exchange Routing
694YesYesOfficialLinux-HA high-availability heartbeat
695YesOfficialIEEE Media Management System over SSL (IEEE-MMS-SSL)
698YesOfficialOptimized Link State Routing (OLSR)
700YesOfficialExtensible Provisioning Protocol (EPP), a protocol for communication between domain name registries and registrars (RFC 5734)
701YesOfficialLink Management Protocol (LMP),[93] a protocol that runs between a pair of nodes and is used to manage traffic engineering (TE) links
702YesOfficialIRIS[94][95] (Internet Registry Information Service) over BEEP (Blocks Extensible Exchange Protocol)[96] (RFC 3983)
706YesOfficialSecure Internet Live Conferencing (SILC)
711YesOfficialCisco Tag Distribution Protocol— being replaced by the MPLS Label Distribution Protocol
712YesOfficialTopology Broadcast based on Reverse-Path Forwarding routing protocol (TBRPF; RFC 3684)
749YesYesOfficialKerberos (protocol) administration
750YesOfficialkerberos-iv, Kerberos version IV
751YesYesUnofficialkerberos_master, Kerberos authentication
752YesUnofficialpasswd_server, Kerberos password (kpasswd) server
753YesYesOfficialReverse Routing Header (RRH)


tell send
760YesYesUnofficialkrbupdate [kreg], Kerberos registration
782YesUnofficialConserver serial-console management server
783YesUnofficialSpamAssassin spamd daemon
808YesUnofficialMicrosoft Net.TCP Port Sharing Service
829YesAssignedOfficialCertificate Management Protocol
830YesYesOfficialNETCONF over SSH
831YesYesOfficialNETCONF over BEEP
832YesYesOfficialNETCONF for SOAP over HTTPS
833YesYesOfficialNETCONF for SOAP over BEEP
843YesUnofficialAdobe Flash
847YesOfficialDHCP Failover protocol
848YesYesOfficialGroup Domain Of Interpretation (GDOI) protocol
853YesYesOfficialDNS over TLS (RFC 7858)
860YesDNS over TLS (RFC 7858)
861YesYesOfficialOWAMP control (RFC 4656)
862YesYesOfficialTWAMP control (RFC 5357)
873YesOfficialrsync file synchronization protocol

cddbp, CD DataBase (CDDB) protocol (CDDBP)

IBM Endpoint Manager Remote Control
897YesYesUnofficialBrocade SMI-S RPC
898YesYesUnofficialBrocade SMI-S RPC SSL
902YesYesUnofficialVMware ESXi
903YesUnofficialVMware ESXi
953YesOfficialBIND remote name daemon control (RNDC)
981YesUnofficialRemote HTTPS management for firewall devices running embedded Check Point VPN-1 software
987YesUnofficialMicrosoft Remote Web Workplace, a feature of Windows Small Business Server
989YesYesOfficialFTPS Protocol (data), FTP over TLS/SSL
990YesYesOfficialFTPS Protocol (control), FTP over TLS/SSL
991YesYesOfficialNetnews Administration System (NAS)
992YesYesOfficialTelnet protocol over TLS/SSL
993YesOfficialInternet Message Access Protocol over TLS/SSL (IMAPS)


UnofficialInternet Relay Chat over TLS/SSL (IRCS). Previously assigned, but not used in common practice
995YesYesOfficialPost Office Protocol 3 over TLS/SSL (POP3S)
1010YesUnofficialThinLinc web-based administration interface



z/OS Network File System (NFS) (potentially ports 991–1023)


Check your knowledge in the following link. (Isn’t finished yet)


[1] https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers

United Nations controls international laws

Every time I try to write something I do get question in my mind regarding the Organisation who are responsible for LAW. With all respect to United Nations (UN) due to my curiosity I will write a short publication for personal educational purpose. It seems that this organisation is responsible for the LAWS, even though, each country and states have their own LAWS. As a result, it’s very often so confusing where we have to go or do in order to get freedom of speech. Very often in many countries we are not allowed to copy or represent some information which has been written in one of other newspaper or book. It always leads to Copy Rights acts etc.

Ironically as this domain is .com I due believe that this Website/Blog has to be represented by American laws which are controlled by United Nations. As a result, to educate myself with the rights I have decided to follow their own Copyrights which redirect to the link which redirects to the shop sub domain which has written basic rules. Generally, .org domains were created for non-profit organisation ironically personally I do get a view that even this organisation doesn’t provide service for free. It seem that we have to pay for everything in this world. To write and keep myself educated I will continue to write.


Excerpts definition according to Oxford dictionary is a paragraph. As a result, if I will try to reproduce a paragraph not a database as the official permission is not needed. As I do not resell this information I’m also free to use their information unless it would mislead. Web links could be used in order to provide official source. However, not allowed to use their emblem or logotype. In order to get this access I would need to fill the form and request permission for official body. Even though, each person could understand the information from their own perspective I will try to do it in formal way.


Apparently, to share video from United Nations on public domain which has over 60 years’ I should contact [email protected]. When I’m trying to get access to their Archives the page represent that it was not found. Therefore, I don’t find a need to write a letter with permission as this source was not available. What I did found it the live stream. The hyperlink to stream contains videos which are fresh and are recorded in different lengths.


The video “Making disability visible in statistics – Side Event at the 50th Statistical Commission” was reviewed in order to understand how the the presentations are presented in United Nations. It was hard to understand the speaker, however, we should practise to speak in order to learn. As we come from different countries and different cultures each person has its own difficulties. In common sense everyone has to have a right to speak if he know how to do it.


From the speaker I did understand that if we want to do some research we should create surveys which contain many questions which would had to be answered by people. As I’m writing I was advised to look for work. As a result, I will stop writing and go to look for a job.


Happy international woman day! Ladies have a great day!

Film reviews, job research, new technology, standards and law

This article appearance was proposed on Monday which aims to introduce some films which were watched in previous months. In the beginning I thought to concentrate only on films, however, it would may show negative impact to other interests, such as, employment, technology development, international standards which apply during development cycles.


As many of you I do believe that before watching any film we do like to do some research about it. Personally, for some reason I do like to check for official ratings/reviews from imdb[1] which provides me the first impression of the story.


Film: Eddie the Eagle (2016)


Description: The story of Eddie Edwards, the notoriously tenacious  British underdog ski jumper who charmed the world at the 1988 Winter Olympics. Apparently, based on true story which shows how one young man tried to acomplish his goal life. The brave man who tried to become famous simply by working hard on his belief that he will visit Olympics.


Film: First Man (2018)


Description: A look at the life of the astronaut, Neil Armstrong, and the legendary space mission that led him to become the first man to walk on the Moon on July 20, 1969. Film was made to impress local population during space competition at that time.


Film: Hidden Figures (2016)


Description: The story of a team of female African-American mathematicians who served a vital role in NASA during the early years of the U.S space program. Apparently, true story which make sense and brings some emotions which shows how different race populations was at the time.  It’s hard to believe, however, it shows how hard it was for black people at the time.


Film: I Am Vengeance (2018)


Description: When ex-soldier turned mercenary, John Gold, learns of the murder of his best friend, he sets off on a mission to dine out what happened. What he discovers is a sinister conspiracy and he sets about taking down those responsible one by one.


Film: All the Money in the World (2017)


Description: The story of the kidnapping of 16-year-old John Paul Getty and the desperate attempt by his devoted mother to convince his billionaire grandfather Jean Paul Getty to pay the ransom. This film show that money sometimes doesn’t bring the happiness.


Film: Darkest Hour (2017)


Description: In May 1940, the fate of Western Europe hangs on British Prime Minister Winston Churchill, who must decide whether to negotiate with Adolf Hitler, or fight on knowing that it could mean a humiliating defeat for Britain and its empire. Emotional film which brings memories to 2nd World War.  Churchill made me laugh which is good – hapiness extends lifecycle. His pipes and cigars reminds me our past expeditions in musuems.


Film: The Hitmans’ Bodyguard (2017)


Description: The world’s top bodyguard gets a new client a hitman who must testify at the International Crime Court. They must put their difference aside and work together to make it to the trial on time. Action film which brings effects where you may think that it was well made.


Film: Mowgli Legend of the Jungle (2018)


Description: A human child raised by wolves must face off against a menacing tiger named Shere Khan, as well as his own origins. This films reminds how humans could find same language with animals.


Film: Overlord (2018)


Description: A small group of American soldiers find horror behind enemy lines on the eve of D-Day. This actually brings some good visualisations and memories underground. How one man actually finds the way in-out.


Film: Searching (2018)


Description: After his 16-year old daughter goes missing, a desperate father breaks into her laptop to look for clues to find her. It shows how Western countries trying to fight with technology which they made.


Film: The Square (2017)


Description: A prestigious Stockholm museum’s chief art curator finds himself in times of both professional and personal crisis as he attempts to set up controversial new exhibit. This film bring some shock episodes which were difficult to understand.


As our world expands every second it’s not easy to write an article about many topics at the same time. During studies in United Kingdom I did have access to the libraries which have had so many resources. However, each library has different approach and materials. Therefore, during my journey back I was trying to think that I still may come back one day. When we do think about it could bring some requirements of knowledge in law.


First memory from dealing paperwork in UK/LT reminds me a huge mess. As we know each country has it’s own laws, as a result, different country residents has different rights. When we are trying to escape one or another country boards we meet their regulations. One of the most probably famous would be BREXIT which was an article 50. When we really trying to get some information in LAW then we start to find some documents which were signed once or twice in the past. They are held in secure registry centres and should be available for public, however, not everyone may have access to them.


How do we get access to libraries?


When we want to start study and improve or extend our intelligence. Libraries were made to contain information which is provided by goverment or people. This place in general means that to expand your knowledge you should start read books as they have answers to questions. When we start to explore the world in our age then we do get questions to exercise how to communicate with others. We do get books to read and do homeworks. That’s how our knowledge expands. If you couldn’t read or speak later or sooner you will start to learn. The best practise is practical work – that’s what I could share from my personal experience during job research in London.


Simple experiment in Computer Science degree, for example, if you want to build application one of academics will provide a clue where we could search for answers. That’s where the journey begins.


International Standards Organization (ISO)


This terminology is widely used for international recognition. It was proven that organisations have to use for different purposes. Following information has been taken from WikiPedia which is not profit organisation. It could contain wrong information, however, if references are provided thats means the source is good enough for educational purposes. As we could see the following basic structure shows stages which has to be followed in order to learn or authorise one or other standart.


  • Stage 1: Proposal stage
  • Stage 2: Preparatory stage
  • Stage 3: Committee stage
  • Stage 4: Enquiry stage
  • Stage 5: Approval stage
  • Stage 6: Publication stage


ISO is used in about 159 countries according to their official body. The Lithuanian Standards Board (LST) was established on 25 April 1990 by the Government of the Republic of Lithuania. The LST is a budgetary institution, functioning as a National Standards Body (NSB) and within its competence taking part in establishing and implementing the policy of the Government of the Republic of Lithuania in the field of standardization.

The strategy of 2016-2020 is available. This journal contains more accurate information which states that it has 165 countries. In addition, their main aims are to develop high quality standards through ISO’s global membership by ensuring that we effectively engage stakeholders and partners. A strong foundation in people and organization development, effective use of technology, and focus on communication will help us to achieve the ultimate objective of ISO standards user everywhere. In according journal information about how this goals will be achieved are representet in an easy layout which is availalbe for everyone.

Great things happen when world accepts information easy enough to ensure success.

Forensic science standards

  • ISO 18385:2016 specifies requirements for the production of products used in the collection, storage, and analysis of biological material for forensic DNA purposes, but not those consumables and reagents used in post-amplification analysis.
  • ISO 18385:2016 applies to the production of consumables and reagents which do not require cleaning for continued use. This International Standard does not cover technical product specifications (i.e. product design).
  • ISO 18385:2016 excludes microbiological testing.
  • ISO 18385:2016 specifies a requirement for manufacturers to minimize the risk of occurrence of detectable human nuclear DNA contamination in products used by the global forensic community.

Electrical engineering standards

  • 29.020 (stage) Electrical engineering in general
    Including voltages, general electrical terminology, electrical documentation, electrical tables, safety, fire hazard testing, etc.
  • Electrical diagrams and charts, see (01.100.25)
    01.100.25(stage) – Electrical and electronics engineering drawings

Electrical power stations, see (27.100)

  • Nuclear power plants, see (27.120.20)
    ISO 6527:1982 Nuclear power plants – Reliability data exchange – General guidelines
    ISO 7385:1983 Nuclear power plants – Guidelines to ensure quality of collected data on reliability
    ISO 8107:1993 Nuclear power plants – Maintainability – Terminology
    ISO 11599:1997 Determination of gas porosity and gas permeability of hydraulic binders containing embedded radioactive waste
    ISO 14943:2004 Nuclear fuel technology – Administrative criteria related to nuclear criticality safety
    ISO 15080:2001 Nuclear facilities – Ventilation penetrations for shielded enclosures
  • Hydraulic power plants, see (27.140)
    ISO/DIS 19283 [Under development] Condition monitoring and diagnostics of machines – Hydroelectric generating units
  • Solar power stations, see (27.160)
    ISO 9059:1990 Solar energy – Calibration of field pyrheliometers by comparison to a reference pyrheliometer
    ISO 9060:2018 Solar energy – Specification and classification of instruments for measuring hemispherical solar and direct solar radiation
    ISO 9459-1:1993 Solar heating – Domestic water heating systems – Part 1: Performance rating procedure using indoor test methods
  • Wind turbine systems, see (27.180)
    ISO 16079-1:2017 Condition monitoring and diagnostics of wind turbines – Part 1: General guidelines

This is just a few standards which should be known in general. Interesting fact was found that each standard cycle is reviewed every 5 years.



Due to many things around the world the colour has been changed to the black in the background. The black code had to be changed to (#000000). Usually it happens when we do have to work or rest in peace. I would like to state that colour has been changed in the following domains;

As I got access to the host which does access to some of the websites I was trying to figure out how it happens. Usually we should have host which has control panel. Inside the control panel we could see the websites/pages on the list. We choose the website/page and try to find the background-colour text. If anyone don’t want to go through hundreds of pages of code they could use the control find function (c+f)(Mac) / (ctrl+f)(Windows) or just search where they should insert the keyword which they look for. In this case we were looking for background, as a result, we could just write “background” and the machine would start search for the inserted keyword.

In addition, the Agile bar was changed to 20%, due to, review which was made.   We know that when we have time we should do revisions and keep up to date.


How to change the bar percentages?

If you got access just go to the appearance -> editor -> skills.php and find Agile or other technology which is set and change.


If I remember correctly big companies use methodologies for better functionalities. It was created to make the product in a good state. Once I have had an experience where we were introduced to one of the similar technologies.


In overall “Defending Against Attacks from the Dark” white paper was found which reminded how serious it could be. Java projects are still available if there is some need for improvements. Norse attack services wasn’t reviewed as it may damage some systems.


Happy Holiday to Everyone!

Today is a special day as we have Christmas Evening which usually is spent with family members. Usually we should prepare 12 different type of meal which should not include meet. According to the calendar tomorrow we will have first Christmas day, as a result, many colleagues and friends around will send so many different post cards and videos.

Due to studies and other wonders I have decided to due some research in Video Editing which could lead to tricks. One of the videos which really impressed was made by @kevinlustgarten.

Because of the copyrights we not able to use some of the contents, as YouTube video advisers suggest that we should contact the owners for permission to use, as a result, we have to be very careful as the content could be removed.

Where I have started?

Apparently this is a good starting point which has so many lesson, such as,

  • Make money on Youtube
  • Make effective thumbnails and titles
  • Ads on YouTube
  • Brand your channel
  • Write smart descriptions
  • Advertising your channel
  • Making advertiser friendly content
  • Interact with your audience with new
  • An introduction to YouTube policies
  • Search and discovery on Youtube
  • How is my channel doing?
  • Youtube basics
  • Who’s watching my channel
  • 10 fundamentals of a creative strategy
  • Build your community
  • Editing
  • Protect your content with copyright
  • etc.

As we can see they offer so many different lectures with videos, tutorials and test. They have different levels. For me personally the first video attempt was successful after Editing lecture. Last time when I was in United Kingdom the YouTube music channel was available, however, in Lithuania is seems that it is in coming soon mode. I would like to share my one of the first videos which meant to be as a greeting to everyone.

In this video the Wham song was used, as it wasn’t published in YouTube I will provide some information from WikiPedia which may be not accurate, even though, usually this source provide more less appropriate information as it has some references to support the facts.

Wham! were an English pop duo consisting of George Michael and Andrew Ridgeley, formed in London in 1981.[1][2]


Andrew Ridgeley (left) and George Michael (right), 1984
Background information
Origin London, England
Genres Pop
Years active 1981–1986
(reunions: 1988 and 1991)
Associated acts
Past members


However as the above video was made several days ago, with all respect to other I will try to make another. This time I will try to find positive Christmas song which would increase the mood of people. At the moment we should celebrate and enjoy!



Let It Snow! Let It Snow! Let It Snow!“, also known as “Let It Snow“, is a song written by lyricist Sammy Cahn and composer Jule Styne in July of 1945. It was written in Hollywood, California during a heat wave as Cahn and Styne imagined cooler conditions.[1][2] Although the song’s lyrics make no mention of Christmas, it is played on radio stations during the Christmas season and is often covered by various artists on Christmas-themed albums. In the Southern Hemisphere, however, it can be played during winter (June, July, August) and in New Zealand, some play it at Matariki.


Tools used: iMovie, GDRIVE, Samsung J5

Small Business Guide from NCSC

It has been a while since the last article has been written. Therefore, when the article in pdf format was posted from National Cyber Security Centre (NCSC) I thought to share on my blog as it may be required for future developments.

The leaflet contained three key points “Policy actions”, “Technical actions” and “Training awareness actions” which has the list of actions which had to be followed to make small business save online.

As we do understand the small business should contain at least three departments which would be responsible for different matters.

Policy actions mainly should be carried by staff who responsible for cybersecurity policy are following;

  • Identify and record essential data for regular backups.
  • Create a password policy.
  • Decide what access controls your users need so they can access only the information and system required for their job role.
  • Decide what staff need to access to USB drives.
  • Sign up to threat alerts and read cyber local advice = eg. www.actionfraud.police.uk/signup
  • Create an inventory of approved USB drives and their issued owners and review whether the ownership is necessary periodically.

Technical actions should be carried by staff who responsible for the setup and configuration of devices, networks and software are following;

  • Switch on your Firewall.
  • Install and turn on Anti-virus software.
  • Block access to physical ports for staff who do not need them.
  • Consider making a password manager available to your staff to secure their password. Review the star ratings before choosing one from an app store.
  • Ensure data is being backed up platform eg. portable hard drive or cloud.
  • Set automated backup periods relevant to the needs of the business.
  • Switch on password protection for all available devices. Change default password on all internet-enabled devices as per password policy.
  • Install and turn on tracking applications for all available devices eg. Find my iPhone.
  • Enable two-factor authentication for all important accounts eg. emails.
  • Apply restrictions to prevent users downloading 3rd party apps.
  • Install the latest software updates on all devices and switch on automatic updates with periodic checks.
  • Ensure all applications on devices are up to date and automatic updates have been set to download as soon as they are released. Schedule manual checks for updates.
  • Set up encryption on all office equipment. Use products such as BitLocker for Windows using a Trusted Platform Module (TPM) with a PIN, or FileVault (on Mac OS)

Training and awareness actions should be carried out by staff who responsible for implementing staff training awareness are following;

  • Provide secure physical storage eg. a locked cupboard for our staff to write down and store passwords.
  • Create a Cyber Security training plan that you can use for all staff.
  • Include details of your ‘Password’ policy explaining how to create a non-predictable.
  • Include how to spot the obvious signs of phishing.
  • Include details of your reporting process if staff suspect phishing.
  • Include details on how your business operates and how they deal with a request via email.
  • Include details of Wi-Fi hotspot vulnerabilities and how to use alternative options (eg VPN/Mobile network).

In conclusion, sometimes some humans think that all these actions should be applied by one person, however, it seems that in normal life at least 3 people should work in IT department. In addition, that 3 people may have more support from other resources, such as colleagues, libraries, forums, etc. In addition, so many of these criteria mentioned above are possibly not met. For example, default password’s are not changed regularly and just left for next day which never comes. It would be interesting to find out one day how many products installed in-house environment, for instance, would be left accessible and vulnerable.

One of the most famous search index platforms which were created by, John Matherly does a similar function. As Wikipedia explains “Shodan collects data mostly on web servers (HTTP/HTTPS – port 80, 8080, 443, 8443), as well as FTP (port 21), SSH (port 22), Telnet (port 23), SNMP (port 161), IMAP (port 993), SIP (port 5060),[2] and Real Time Streaming Protocol (RTSP, port 554). The latter can be used to access webcams and their video stream.” This could be used as the practical method to find out about your company security team, even though, we are advised that Wikipedia may contain fake information. Therefore, it up to us to believe if this valid or not. Personally, I would make more research, or check for sources/references and then make the final decision.

Online business legalisations

Due to other duties and projects involved in my life frame it is probably a good idea to write at least one blog in 3 months considering how many post write other developers. This article will contain information on how to setup online legal business online.

As I have tried to help to develop other project with colleagues one of the most problems are social engineering attacks which could lead to FRAUD cases. Generally, we never know who is on other line as it could be your neighbour.

In addition, Claudflare is one of the well known services who provide some kind of protection from DDoS threads etc. If I do understand it correctly their FREE services is to provide protection against online criminals. When the network grows it adds more features which add value to the project. However, for better protection we have always to pay.

From personal experience, there is also available advice on security which helps to prevent from unknown attacks. It makes me smile when we try to snatch each time ourselves just to protect our selves when there is no point. For example, when we trying to built super secure network Virtual Private Network (VPN) which would not make any profit.

One of the tips would be – do not provide your personal details to the callers if you don’t know them, even host companies, recommend to not provide any personal credentials etc. From common sense it would be Data Protection Act as we grow and learn from our mistakes.

Projects I’m currently working require general knowledge about how to set up online businesses legally. After one conversation which have had “UK LAW LEGALISATION” key word lead me to the one of website which lead to GOVERNMENT website which provide information on generalisation.

Most important tips to trade legally online from web were to provide certain information in footer which adds more trust, for instance;

  • The company’s registered number
  • Where the company registered (England and Wales, Scotland or Northern Ireland).
  • The type of the company for example Limited (LTD).

After reading a guide from GOVERNMENT website it makes clear that our services must be accessible to everyone who needs it. If it isn’t we may be in breach of the Equality Act 2010. It’s fair because one person can’t be responsible for every breach.

Now I’m thinking that I may actually be entitled for data breach act for copying content from our GOVERNMENT by retyping the same text, therefore, it’s probably better to provide less text and write more about personal opinion which leads to Freedom Of Speech.

However, after I have read the Terms and Conditions of Government Digital Services (GDS) I found information about Open Government Licence (OGL).

The website clearly states that we are free to;

  • copy, publish, distribute and transmit the Information;
  • adapt the Information;
  • exploit the Information commercially for example, by combining it with other Information, or by including it in your own product or application.

As a result, I will add some information for informational purpose.

Meeting the Digital Service Standard

  • point 1 (helps users do the first attempt without having to understand goverment, is built on your users’ real need, not your assumptions)
  • point 2 (check your service is helping users to do the tasks they need to do)

Alpha is the development phase that comes after discovery. In this phase we need to;

  • build prototypes of our services
  • test our prototypes with users
  • demonstrate that the service we want to build is techincally possible

We should use our experience on building prototypes in the alpha to;

  • find the problems with the design of our services and decide how we will solve them
  • make some estimates about how much it will cost
  • idetify the biggest risks for the beta stage as early as possible.

Our team should work in an agile way, iterating quickly so that we can learn quickly.

Digital Service Standard is a set of 18 criteria to help goverment create and run digital services. All public facing transactional services must meet the standard. It’s used by departments and the Goverment Digital Service to check whether a service is good enough for public use.

  1. Understand user needs
  2. Do ongoing user research
  3. Have a multidisciplinary team
  4. Use agile methods
  5. Iterate and improve frequently
  6. Evaluate tools and systems
  7. Understand security and privacy
  8. Make all new source code open
  9. Use open standards and common platforms
  10. Test the end-to-end services
  11. Make a plan of being offline
  12. Make sure users succeed first time
  13. Make the user experience consistent with GOV.UK
  14. Encourage everyone to use the digital service
  15. Collect performance data
  16. Identify performance indicators
  17. Report performance data on the performance platform
  18. Test with the minister. Ministers are accountable for everything produced by their departments, so you need to show them your service before it goes live.

We should think about accessibility from the start. Interesting fact is that 1 in 5 people have a disability – this could be visual, hearing, motor or cognitive (affecting memory and thinking).

As we can see there is many factors involded in order to deliver successful legal business in England and Wales, Scotland or Nothern Ireland.

I’m certain that I have had experience up to step 7 (Understand Security and Privacy), however, who knows maybe my knowledge is not vise enough to have a such debate with others.

Time will show how good we are on delivering “LEGAL ONLINE BUSINESS SERVICES”.


Blog update

It has been a long time after I have decided to update personal blog which would lead to new project updates and plugin integrations. During last 3 months, I have been working on Zoomfitness and BBEN projects. Zoomfitness was created about 3 years ago and hacked according to 123-reg.co.uk team. Original message from the staff;

I am writing to advise you that your site has been hacked to host malicious content that is sending spam through our servers. We take such incidents very seriously as they can not only affect your own account but can also affect other accounts on the same server by resulting in its IP address being added to various spam black lists, as well as impacting performance/stability due to excessive load.
Due to the serious nature of this incident, I am afraid that public access to your site has been suspended until such time we receive an update to this incident to confirm what steps have be taken to resolve this issue.
While we appreciate that you may not have been aware of what has been happening as the account holder you are responsible for the content of all files within your allocated webspace. This includes safe keeping of FTP credentials and and ensuring any publicly accessible application scripts are kept up-to-date and do not contain any known security vulnerabilities that may be exploited and used for abuse activity such as relaying spam and allowing files to be uploaded without your knowledge.
Please check your webspace and ensure any third party scripts being used in the sending of spam are identified and removed and any of the scripts exploited updated or removed.
Once you have accessed your file manager please ensure your webspace is thoroughly inspected, deleting any files you do not recognise or that have been uploaded recently, including files beginning with a full-stop character, considered hidden files which most FTP clients do not display by default.
We would also recommend that you change your FTP password in case that has also been compromised, ensuring it is secure, contains numbers and mixed case letters, and does not have any correlation to the domain or email address. Instructions on how to change your password can be found here: http://www.123-reg.co.uk/support/answers/Web-Hosting/Web-Tools/changing-your-ftp-password-4209/
Simply deleting the malicious content and changing passwords is unlikely to address the root cause, which is typically due to out-of-date scripts allowing unauthorised uploads. Hence please ensure any scripts such as WordPress or Joomla are also updated.
The below external links provide additional guidance on securing websites with script vulnerabilities. Please ensure the recommendations provided are followed to avoid recurrence:
To have your website reinstated please update this incident when you have secured your site, per the recommendations above, including updating all web apps.
We apologise for any inconvenience this may cause, but hope all customers can appreciate the impact that this can have on all customers.

If we can be of any further help with regard to this or any other matter, please do not hesitate to contact us.
Kind regards,
123 Reg

The following actions were taken;

– Please check your webspace and ensure any third party scripts being used in the sending of spam are identified and removed and any of the scripts exploited updated or removed.

– Once you have accessed your file manager please ensure your webspace is thoroughly inspected, deleting any files you do not recognise or that have been uploaded recently, including files beginning with a full-stop character, considered hidden files which most FTP clients do not display by default

– We would also recommend that you change your FTP password in case that has also been compromised, ensuring it is secure, contains numbers and mixed case letters, and does not have any correlation to the domain or email address.

– Please ensure any scripts such as WordPress or Joomla are also updated.

After local scans it was found that plugins contained Trojans. The problem was resolved by deleting the files which lead to new fresh theme install. I should, also, add that the 123-reg support was very helpful. They have had helped to solve the problem much quicker.

In regards, to another project The Business Building Empowerment Network (BBEN) aim is to support business leaders progress and success to built up economy and more pleasant life for society. It is still in progress of development and the delay to deliver project on time was caused to other life factors which show how difficult sometimes could be to work voluntarily when we have to pay other bills.

However, there is always good advantages of working voluntarily, as we can now access;

– Some potential new website customers
– If we work on this on going after launch, we can now look to share some of the 5% BBEN business revenues
– We can get some higher level marketing and branding solutions to attract more customer to them directly once BBEN is live.
– We learn how to work in a team and share some experiences between each other

As “Volunteer” we are creating solutions here and systems that can get them even more customers / more personal & their own business money income.

BBEN website can benefit them & their businesses as the website go live.

If you want to join to develop this network

* indicates required


As I have been contacted by one of the Senior Recruitment Consultant with an offer for a Web Developer role I have decided to write an article which would include following skills;


  • HTML
  • CSS
  • JavaScript
  • AngularJS
  • Agile


Right, let’s start from the first skill Hypertext Markup Language (HTML) is the standard markup language for creating basic web pages and applications. With Cascading Style Sheets (CSS) and JavaScript it creates a fully functional pyramid of World Wide Web (WWW). In more common sense if we would know the basic terminology of this languages and the basic mathematics skills which include functions and algorithms we would able to communicate with Artificial world which is maintained by human beings. Before the revision beginning I would like address Tim Berners-Lee acknowledgement.

“We must fight against government overreach in surveillance laws, including through the courts if necessary. We must push back against misinformation by encouraging gatekeepers such as Google and Facebook to continue their efforts to combat the problem, while avoiding the creation of any central bodies to decide what is ‘true’ or not.”

According to Guardian 12th of March is the day when he has submitted his proposal for the worldwide web. Due to the mark of 28 years he has wrote an article with a message on how to save the web. The main points were that we have lost control of our personal data, it’s to easy for misinformation to spread of the web and political advertising online needs transparency and understanding. With all respect to him that he invented the tool which connects the community and allows us to share information between I have to move to the questionnaires which are relevant to HTML, CSS and JavaScript. For this specific revision the following Front End Interview questions will be used;

HTML / General Interview Questions

What is the difference between form get and form post?

With GET the form data is encoded into a URL by the browser. The form data is visible in the URL allowing it to bookmarked and stored in web history. The form data is restricted to ASCII codes. Because URL lengths are limited there can be limitations on how much form data can be sent.

With POST all the name value pairs are submitted in the message body of the HTTP request which has no restrictions on the length of the string. The name value pairs cannot be seen in the web browser bar.

POST and GET correspond to different HTTP requests and they differ in how they are submitted. Since the data is encoded in differently, different decoding may be needed.

What is the importance of the HTML DOCTYPE?

The doctype declaration should be very first thing in an HTML document, before the html tag.

The doctype declaration is not an HTML tag; it is an instruction to the web browser about what version of the markup language the page is written in.

The doctype declaration refers to a Document Type Definition (DTD). The DTD specifies the rules for the markup language, so that the browsers can render the content correctly.

What are some of the online tools and resources you use when you have a problem? Where do you go to ask questions?

This question really just looks for how resourceful the candidate is, it also reflects on their problem solving process and may lead you to ask more questions.

What is web a application?

A great question to feel out the depth of the applicants knowledge and experience. A web application is an application utilising web and browser technologies to accomplish one or more tasks over a network, typically through a browser.

CSS Interview Questions

Explain the difference between visibility:hidden; and display:none; ?

Visibility:Hidden: – It is not visible but takes up it’s original space.

Display:None; – It is hidden and takes up absolutely no space as if it was never there.

An example available here.

Name three ways to define a color in html?

1) Hex
2) RGB
3) Name (ie red)
.colorMe { color:red; color:#ff0000; color:rgb(0,0,255); }

How do you clear a floated element?

A floated element is taken out of the document flow. To clear it you would need to do a clear:both or try overflow:auto on the containing div.

What is a sprite? How is it applied using CSS? What is the benefit?

– A image sprite is a collection of images put into one single image.
– Using css positioning you can show and hide different parts of the sprite depending on what you need.
– Sprites reduces the number of http requsts thus reducing load time of page and bandwidth

JavaScript Interview Questions

What is JavaScript?

JavaScript is a client-side as well as server side scripting language that can be inserted into HTML pages  and is understood by web browsers. JavaScript is also an Object Oriented Programming language.

Enumerate the differences between JAVA and JavaScript?

Java is a complete programming language. In contrast, JavaScript is a coded program that can be introduced to HTML pages. These two languages are not at all interdependent and are designed for different intent. Java is an objet – oriented programming (OOPS) or structured programming language like C++ or C whereas JavaScript is a client-side scripting language and it is said to be unstructured programming.

What are JavaScript types?

Following are the JavaScript types:

  • Number
  • String
  • Boolean
  • Function
  • Object
  • Null
  • Undefined

What is the use of isNan function?

isNaN function returns true if the argument is not a number otherwise it is false.

Between JavaScript and an ASP script which is faster?

JavaScript is faster. JavaScript is a client-side language and thus is does not need the assistance of the web server to execute. On the other hand, ASP is a server-side language and hence is always slower than JavaScript. JavasScript is also a server side language (nodejs).

What is negative infinity?

Negative Infinity is a number in JavaScript which can be derived by dividing negative number by zero.

Is it possible to break JavaScript Code into serveral lines?

Breaking within a string statement can be done by the use of a backlash, ‘\’, at the end of the first line.

document.write("This is \a program");

And if you change to a new line when not within a string statement, then JavaScript ignores break in line.

Which company is developed JavaScript?

Netscape is the softwre company who developer JavaScript

What are underclared and undefined variables?

Underclared variables are those that do not exist in a program and are not declared. If the program tries to read the value of an undeclared variable, then a runtime error is encountered.

Undefined variables are those that are declared in the program but have not been given any value. If the program tries to read the value of an undefined variable, an undefined value is returned.

AngularJS Interview Questions

What are the basic steps to unit test an AngularJS filter?

  1. Inject the module that contains the filter.
  2. Provide any mocks that the filter relies on.
  3. Get an instance of the filter using $filter('yourFilterName').
  4. Assert expectations.

Dependency injection is a powerful softaware design pattern that Angular employs to compose responsibilities through an instinsic interface. However, for those new to the proess it can be puzzling where you need to configure and mock these depenencies when creating your isolated unit tests. The open-source project “Angular Test Patter” is a free resource that is focused on dispelling such confusiion through high-quality examples.

This question is useful since it can give us a feel for how familiar the candidate is with automated testing (TDD, BDD, E2E), as well as open up a conversation about approaches to code quality.

For more follow the link.

What should be the maximum number of concurrent “watches”? How would you keep an eye on that number?

To reduce memory consumption and improve performance it is a good idea to limit the number of watches on page to 2,000. A utility called ng-stats can help track your watch count and digest cycles.

Jank happens when your application cannot keep up with the screen refresh rate. To achieve 60 frames-per-second, you only have about 16 miliseconds for your code to execute. It is curcial that the scope digest cycles are as short as possible for your application to be responsive and smooth. Memory use and digest cycle performance are directly affected by the number of active watches. Therefore, it is best to keep the number of watches below 2,000. The open source utility ng-stats gives developers insight into the number of watches Angular is managing as well as the fequency and duration of digest cycles overt time.

For more information us the following link with resources;



How do you share data between controllers?

Create an AngularJS service that will hold the data and inject it inside of the controllers.

Using a service is the cleanest, fastest and easiest way to test.
However, there are couple of other ways to implement data sharing between controllers, like:
– Using events
– Using $parent, nextSibling, controllerAs, etc. to directly access the controllers
– Using the $rootScope to add the data on (not a good practice)
The methods above are all correct, but are not the most efficient and easy to test.

Agile Interview Questions

How would you explain Agile in 30 seconds?

Agile is a framework of approaches and behaviours that encourage “just-in-time” production that enables customers receive quality software faster.

What are the differences between Agile and Traditional Project management?

 Agile encourages that a little of everything, including design, development and testing is done at the same time, as opposed to the traditional approach to projects, where one phase is closed and completed before the next begins. Agile encourages short, frequent feedback loops and embraces changes to requirements. In Waterfall, feedback is usually not collected until the very end of the project and changes a discouraged.

What is the Scrum?

SCRUM is a process in agile methodology which is a combination of Iterative model and incremental model.

What are the main roles in Scrum?

There are mainly three roles that a Scrum team have:

  1. Project Owner – who has the responsibility of managing product backlog. Works with end users and customers and provide proper requirement to the team to build the proper product.
  2. Scrum Master – who works with scrum team to make sure each sprint gets complete on time. Scrum master ensure proper work flow to the team.
  3. Scrum Team – Each member in the team should be self-organized, dedicated and responsible for high quality of the work.


In conclusion, this revision article has been written in almost a month the information was taken from online available resources. Each skill have had at least 3 questions and answers, due to this, I will add 3% to the following skills HTML, CSS, JS, Angular and Agile.

Drupal / Ruby

During holidays I have tried to revise and learn new skills specifically for Drupal and Ruby.

Drupal experience

Apparently there is new security updates in Drupal which had to be updated from 8.2.x to 8.3.x. As a result some technical operations has been processed which would affect webpage appearance.

Also there is a new BootCamp series from “The Firehouse Project” which teaches foundations of HTML, CSS and Ruby. As I have done some basic exercises I will have to add a new skill bar for Ruby.

In addition, some basic terminal screenshots will be attached in order to show the evidence of outputs.

Drupal in local machine;

Drupal in GitHub;

One on the most easiest website tutorials which provide the revision for GitHub use.


Ruby experience

Due to the Job Search I have decided to register at The Firehose project  in which I have had to spend at least 2 hours every day on how to learn to code. The community is very helpful apparently which leads to very detail explanations on how to actually start from scratch.

All the theoretical information could be found in the official The Firehose project, however, practical exercises are available in Code Any Where Editor.


The screenshots above shows how to find SSH Terminal which allows to run .rb scripts with shell commands. As I have been studying little several operations will be proceed in order to show basic understanding of Ruby language.

This covers up to 20 lessons in Ruby. As the result I will add a new bar with 20%.