July 22, 2012
infotoall: CONTROLLING THE MOUSE WITH YOUR EYE
infotoall: CONTROLLING THE MOUSE WITH YOUR EYE: Most of the user of the computer suffer pain in the wrist or in fingers due to over usage of pc or laptops by infront of them whole day b...
infotoall: MODEM
infotoall: MODEM: The main function of modem is to convert the digital to analog signal(modulation) and analog to digital signal (demodulation) for the c...
CONTROLLING THE MOUSE WITH YOUR EYE
Most of the user of the computer suffer
pain in the wrist or in fingers due to over usage of pc or laptops by infront
of them whole day by typing and moving the mouse. Due to this some of the user
gets muscular pain etc. The research scholars of imperial college in London have found out a
solution to this problem that is controlling the mouse with your eye.
A small device is
used for this purpose which is called as GT3D device.
This device consists of a pair of glasses (like the coolers) that user must
wear when you need to move the mouse with eye. And also two fast control cameras
are used to keep track of your eye. The camera constantly records the movement
of the pupil and moves the cursor to the direction where it points to. This device
is on the development stage so the scholars demonstrated the effective usage of
the device by a pong game. They also demonstrated how the surfing in net could
be done using this system. The previous version devices of GT3D has some
disadvantage such as you need to look on an icon for a prolonged period of time
inorder to open the application of the icon, due to this when you stare on the
desktop screen for some time then this automatically opens. Inorder to avoid this
problem GT3D device is sensitive so that
just a look at that opens the application and they have attached the 3d
facility so that the camera could detect whether your are just looking simply
on desktop screen or the user need to open the application. The cost of this
GT3D device is much cheaper (40$) than the other system input that we use.
MODEM
The main function of modem is
to convert the digital to analog signal(modulation) and analog to digital
signal (demodulation) for the communication between the server that provides
the internet and the computer which uses those data. Modem stands for
modulation and demodulation.
TYPES OF MODEM
:
External
Modem: This is a modem separated from the system
unit in the computer case. It is connected to the serial port of the computer
by means of a cable. It is connected to the telephone jack by another cable.
Internal
Modem: An internal modem is a circuit board that
can be added to the system.
Standard
Modems: Most modems used today are standard modems. These modems are usually
operated by commands entered from a
keyboard. Users control the functions a modem through the keyboard. Modems
may use different command languages to control their functions, but most modems
(called "Hayes compatible") use a popular language developed by a
company "Hayes Microcomputer Products, Inc." The command ATDSX4, for
example, indicates that pay attention (AT), dial stored telephone number (DS),
and then display the progress of the call (X4).
Intelligent
Modems: Intelligent modems are also called advanced modems. These modems
can accept new instructions and then respond to the commands while transmitting
data and information. These can be done by microprocessor chips and internal
read only memory (ROM) contained in the modem. Of course, these modems are more
expensive.
Short-Haul
Modems: Short- haul modems are devices that
transmit signals through the cable . They are also are called modem eliminators, because they
do not require an external power source. They are also called line drivers that can send data for a distance of
more than one mile. This type of modem can be used within or across several buildings
in a company or a university campus.
Wireless
Modems: Wireless modems transmit the data signals through the air
instead of by using a cable. They sometimes are called a radiofrequency modem. This type
of modem is designed to work with wireless local area networks namely wifi.
Even in the cell phone
that we use today has modem the modems are used for surfing in the internet
etc.This modems also does the same work of modulation and demodulation but the
circuit of this modem is much smaller than the normal modem
June 04, 2012
TAJMAHAL IS NOT BUILD BY SHAJAGAN
The most
majestic building of the India is the tajmahal. It is a symbol of love for the
lovers and a historical monument in the Indian histoy.The history says that it
was built by
Shah Jahan for his lovely wife mum taj as a token of love. The taj
may be remodeled by
Shah Jahan or
Shah Jahan may have changed the history to his
way but the fact is that it was designed and built by someone else.
The reasons why the Tajmahal was not build by Shah Jahan are
1.At the top of the Tajmahal there is a home
sign(kalash) .The kalash are mostly build in Hindu temple and it is made up of
yempon(that is made up of 5 metals namely gold ,silver bronze and two other
metals .This kalash are built so that it
can hold the earth’s magnetic field. In the tajmahal kalash you could see a kumbam
(the pot that consist of coconut at the top of the pot), this are mostly used by
Hindus in their marriages as a sign of good hopes for the Hindus. Then why is
this kalash and kumba in the tajmahal.
This arise slight drought in our mind
that who built taj.
2.There is
a well inside the tajmahal. What is the need for the well inside tajmahal ? If
the well is for their personal use there is the river to their reach so they
could have done some other way instead of well. Actually in Hindu temple they build well for drawing water for their spiritual activities
since the river water is not holly for their
divine act to their god.
3.In the book “a real story of tajmahal” it is
said that the taj was an ancient temple and shajagan harassed the people and
remodel the temple as tomb for his wife.
4. During the Mughal Empire some of the English
writer wrote about the Indian culture heritage and monuments but they did not
write about the Tajmahal which plays an
important role in the history of India .Only the Indian writers who were under
the influence of shajagan only wrote about the Tajmahal. Why was it so.
5.The OM sign are used by Hindus in the starting a new work as the symbol of good hope and they believe that all the activities will be done successfully. So what is the need of the OM sign in the tajmahal.
6.When we look into the Muslims history they did not name any monuments as
mahal except the Tajmahal. Then why did
Shah Jahan named it so?
7.Actually the tajmahal was anciently named as Tejamahal,Teja refer to the
light of the world but later it may have been changed as Tajmahal.
This report justifies that the
tajmahal was not build by
Shah Jahan But this monument is a great treasure to India .
May 28, 2012
ALL ENGINEERS MUST SEE THIS
May 21, 2012
20 GOOGLE SECRETS
Google is clearly the best general-purpose search engine on
the Web.But most people don't use it to its best advantage. Do you
just plug in a keyword or two and hope for the best? That may be the quickest
way to search, but with more than 3 billion pages in Google's index, it's still
a struggle to pare results to a manageable number.
But Google is an remarkably powerful tool that can ease and
enhance your Internet exploration. Google's search options go beyond simple
keywords, the Web, and even its own programmers. Let's look at some of Google's
lesser-known options.
Syntax Search Tricks
Using a special syntax is a way to tell Google that you want
to restrict your searches to certain elements or characteristics of Web pages.
Google has a fairly complete list of its syntax elements at
www.google.com/help/operators.html
. Here are some advanced operators that can help narrow down
your search results.
Intitle: at the beginning of a query word or phrase
(intitle:"Three Blind Mice") restricts your search results to just
the titles of Web pages.
Intext: does the opposite of intitle:, searching only the
body text, ignoring titles, links, and so forth. Intext: is perfect when what
you're searching for might commonly appear in URLs. If you're looking for the
term HTML, for example, and you don't want to get results such as
www.mysite.com/index.html
, you can enter intext:html.
Link: lets you see which pages are linking to your Web page
or to another page you're interested in. For example, try typing in
link:http://www.pcmag.com
Try using site: (which restricts results to top-level
domains) with intitle: to find certain types of pages. For example, get
scholarly pages about Mark Twain by searching for intitle:"Mark
Twain"site:edu. Experiment with mixing various elements; you'll develop
several strategies for finding the stuff you want more effectively. The site:
command is very helpful as an alternative to the mediocre search engines built
into many sites.
Swiss Army Google
Google has a number of services that can help you accomplish
tasks you may never have thought to use Google for. For example, the new
calculator feature
(www.google.com/help/features.html#calculator)
lets you do both math and a variety of conversions from the
search box. For extra fun, try the query "Answer to life the universe and
everything."
Let Google help you figure out whether you've got the right
spelling—and the right word—for your search. Enter a misspelled word or phrase
into the query box (try "thre blund mise") and Google may suggest a
proper spelling. This doesn't always succeed; it works best when the word
you're searching for can be found in a dictionary. Once you search for a
properly spelled word, look at the results page, which repeats your query. (If
you're searching for "three blind mice," underneath the search window
will appear a statement such as Searched the web for "three blind
mice.") You'll discover that you can click on each word in your search
phrase and get a definition from a dictionary.
Suppose you want to contact someone and don't have his phone
number handy. Google can help you with that, too. Just enter a name, city, and
state. (The city is optional, but you must enter a state.) If a phone number
matches the listing, you'll see it at the top of the search results along with
a map link to the address. If you'd rather restrict your results, use
rphonebook: for residential listings or bphonebook: for business listings. If
you'd rather use a search form for business phone listings, try Yellow Search
(www.buzztoolbox.com/google/yellowsearch.shtml).
Extended Googling
Google offers several services that give you a head start in
focusing your search. Google Groups
(http://groups.google.com)
indexes literally millions of messages from decades of
discussion on Usenet. Google even helps you with your shopping via two tools:
Froogle
CODE
(http://froogle.google.com),
which indexes products from online stores, and Google
Catalogs
CODE
(http://catalogs.google.com),
which features products from more 6,000 paper catalogs in a
searchable index. And this only scratches the surface. You can get a complete
list of Google's tools and services at
www.google.com/options/index.html
You're probably used to using Google in your browser. But
have you ever thought of using Google outside your browser?
Google Alert
(www.googlealert.com)
monitors your search terms and e-mails you information about
new additions to Google's Web index. (Google Alert is not affiliated with
Google; it uses Google's Web services API to perform its searches.) If you're
more interested in news stories than general Web content, check out the beta
version of Google News Alerts
(www.google.com/newsalerts).
This service (which is affiliated with Google) will monitor
up to 50 news queries per e-mail address and send you information about news
stories that match your query. (Hint: Use the intitle: and source: syntax
elements with Google News to limit the number of alerts you get.)
Google on the telephone? Yup. This service is brought to you
by the folks at Google Labs
(http://labs.google.com),
a place for experimental Google ideas and features (which
may come and go, so what's there at this writing might not be there when you
decide to check it out). With Google Voice Search
(http://labs1.google.com/gvs.html),
you dial the Voice Search phone number, speak your keywords,
and then click on the indicated link. Every time you say a new search term, the
results page will refresh with your new query (you must have JavaScript enabled
for this to work). Remember, this service is still in an experimental phase, so
don't expect 100 percent success.
In 2002, Google released the Google API (application
programming interface), a way for programmers to access Google's search engine
results without violating the Google Terms of Service. A lot of people have created
useful (and occasionally not-so-useful but interesting) applications not
available from Google itself, such as Google Alert. For many applications,
you'll need an API key, which is available free from
CODE
www.google.com/apis
. See the figures for two more examples, and visit
www.pcmag.com/solutions
for more.
Thanks to its many different search properties, Google goes
far beyond a regular search engine. Give the tricks in this article a try.
You'll be amazed at how many different ways Google can improve your Internet
searching.
Online Extra: More Google Tips
Here are a few more clever ways to tweak your Google
searches.
Search Within a Timeframe
Daterange: (start date–end date). You can restrict your
searches to pages that were indexed within a certain time period. Daterange:
searches by when Google indexed a page, not when the page itself was created.
This operator can help you ensure that results will have fresh content (by
using recent dates), or you can use it to avoid a topic's current-news blizzard
and concentrate only on older results. Daterange: is actually more useful if
you go elsewhere to take advantage of it, because daterange: requires Julian dates,
not standard Gregorian dates. You can find converters on the Web (such as
CODE
http://aa.usno.navy.mil/data/docs/JulianDate.html
excl.gif No Active Links, Read the Rules - Edit by Ninja
excl.gif
), but an easier way is to do a Google daterange: search by
filling in a form at
www.researchbuzz.com/toolbox/goofresh.shtml or
www.faganfinder.com/engines/google.shtml
. If one special syntax element is good, two must be better,
right? Sometimes. Though some operators can't be mixed (you can't use the link:
operator with anything else) many can be, quickly narrowing your results to a
less overwhelming number.
May 15, 2012
ARCHITECTURE AND WORKING OF ANTIVIRUS
Antivirus is one of the inevitable part of a system, whether at home, office or even on gadgets, the prime concern is that of security of the device, system. But have you ever wondered that how the Antivirus works? In this resource we are having a detailed discussion on the Antivirus Architecture, as well as the algorithms which they follow.
Architecture of an Antivirus Engine
The antivirus engine has a very interesting layeral architecture. There are around five layers; each has its own specialty as well as the functionality attached to it. The first one is the User Interface layer which has the functionality of enabling the interface. The second layer is of the Engine Core, which follows a particular algorithm. The third layer contains File System Interface, File Type Scanner, Memory scanner, Decompression and code emulator. The last but not the least layer is the Hardware.
Working of an Antivirus Engine
Whenever we attach any external drive into our system, the very first step we perform is the security of the system. We try to scan the drive, which so ever is attached by using antivirus we have installed on our system.
1. In order to understand how antivirus engine works, it is very necessary to understand the basic architecture and details so that when the one runs on the system, each and every detail can be analyzed.
2. It is not so evident that every time we have a new version of a particular Antivirus engine, then the core is made from the scratch, it is sometimes revised from the earlier one, so the load is minimized.
3. The antivirus engine contains an Engine core, the second layer is dedicated to the file system interface, scanner and emulators.
4. The engine core has the functionality to intact the entire software together. In order words it acts as a sticky substance which is ready to call the desired module, when required.
5. The basic requirement is to have a scan engine, some prefer to have third party scan engines and it is very clear that they are not considered as part of the framework.
6. But some of the most popular and genuine used software's have their own scan engines. The Scanner used in these scan engines are their own scanner.
7. There are generally two scanning algorithms, one is a heuristic based and other is signature. The scan string based technologies search in the given file and looks for a particular matching string.
8. When the scanner founds the already defined or predefined strings then the necessary actions are performed by the engine.
9. When following heuristic based scanning algorithms, the string is not looked but we look for certain instruction or commands in the files.
10. In order to understand better, when certain codes is encrypted then we tend to find decryption code, instructions by following the heuristic scanning algorithms.
11. So when we select a particular file or folder, then it passes through number of steps, which includes submitting a file to scan engines, scanning based on algorithms and then appropriate actions are performed.
12. The processing of file is one of the most important phase of any antivirus engine. We have certain modules which are designed appropriately.
13. The Random Access Memory is generally accessed by the scanning blocks, there are memory scanners which perform the appropriate actions on the memory.
14. We have emulators and its function is similar to any other emulator. It creates its own virtual environment. There are several benefits of having an emulator attached to it.
15. The emulator has the ability to determine which action will be performed and what effect can be there on the whole system, if the malware is allowed to run.
16. Another important module which runs after a particular time interval and acts is the update module. Every day new definitions are created and that has to be added in the database as well.
May 14, 2012
HIDE A FOLDER WITHOUT THE CMD
For eg,
If u’ve a folder with name “Anything”
press F2,
then type, “Anything.{645FF040-5081-101B-9F08-00AA002F954E}”
and Press Enter.
If u’ve a folder with name “Anything”
press F2,
then type, “Anything.{645FF040-5081-101B-9F08-00AA002F954E}”
and Press Enter.
Step 2 : To get back to its original form,
Make a new batch file with any name and type
“ren Anything.{645FF040-5081-101B-9F08-00AA002F954E} Anything” .
Make a new batch file with any name and type
“ren Anything.{645FF040-5081-101B-9F08-00AA002F954E} Anything” .
May 13, 2012
trendsetter:
2 Sides of INDIAN Cyber Law or IT Act of INDIA
C...: 2 Sides of INDIAN Cyber Law or IT Act of INDIA Cyber laws are meant to set the definite pattern, some rules and guidelines that defin...
2 Sides of INDIAN Cyber Law or IT Act of INDIA
C...: 2 Sides of INDIAN Cyber Law or IT Act of INDIA Cyber laws are meant to set the definite pattern, some rules and guidelines that defin...
HOW DOES RECAPTCHA WORKS
Here in this article you will be able to see how to use reCAPTCHA in a proper manner and it helps the user to make good security for their websites. Mainly the people does not know the use of reCAPTCHA and they unnecessarily avoids it and their websites or blogs will be hacked or attacked in minutes.
reCAPTCHA is free service which helps to digitize newspapers, books, tv shows etc. CAPTCHA is a program which tells that whether the user is a human or a computer. When we get into different pages approximately of registration forms we can see that at the bottom there will be colourful images with text. Most of the websites use CAPTCHA as a tool for protecting from spamming. The computer will not be able to read text, but humans can read the text so the people will not be able to hack into sites which is having CAPTCHA. Daily around 200 millions CAPTCHA are solved by human beings and in ten seconds we are spending our time and these type of puzzles will take around 15 lacs hours to complete the work. reCAPTCHA does exactly the same by giving some effort to solve CAPTCHA as online reading books.
For making the knowledge of humans into an accessible section, we are making projects from different areas by digitizing books which were written before computer age. The pages of book are scanned and then converted into a technique known as Optical Character Recognition. Converting into a text is really useful, so that we will get images which are stored in books and which are difficult to store in devices, taking effort to download and which cannot be searched properly. OCR technique is not proper to use every time.
reCAPTCHA uses the books in a proper way, thus digitizing books by sending words which cannot be read by computers in web and it will be in the form of CAPTCHA's and human beings can read the text in a proper manner. Each word cannot be read by OCR and it will be placed on a image and it will be used as a CAPTCHA. Most of the OCR programs will give you an alert on the words which cannot be read properly . The word which cannot be read by the OCR will be given to a user in different styles and conjunction with other words and answer will be known. User will be prompted to read both word and if the user can solve it, then system shows that answer is a correct one. System will then give it to other people to test whether original answer is correct or not.
When we are running a website and it is having any problems which are related to spam, then you can put the 6yhbeyu7eumreCAPTCHA on your site. For word press applications and mediawiki applications, there are some plugins which allows to use reCAPTCHA without writing any code. For common web applications such as PHP, there are many easy to write codes for giving best solutions for your life.
.
reCAPTCHA is having good security installed in a proper manner and when compared to other CAPTCHA's they use some improper texts which can be attacked by a hacker in an easy manner. Most of other image comparing programs like 'MAPTCHA' are easily attacked in an easy style. reCAPTCHA uses 2 layers to protect the user by making good images. Normally the computer will not be able to read this image and it gives suggestions to users and they will make proper point.
They will first start to scan a book having many words. Then they will extract word which will not be able to ready by the OCR technique and the words are shown as improper texts and this mainly depends upon the author or the book or quality of scanning mechanism. To make good security they are then providing with some lines or wrapping mechanisms, so that it cannot be read in an easy manner. Mainly the CAPTCHA is taken from the book having two words which is having distorted texts.
Introduction
reCAPTCHA is free service which helps to digitize newspapers, books, tv shows etc. CAPTCHA is a program which tells that whether the user is a human or a computer. When we get into different pages approximately of registration forms we can see that at the bottom there will be colourful images with text. Most of the websites use CAPTCHA as a tool for protecting from spamming. The computer will not be able to read text, but humans can read the text so the people will not be able to hack into sites which is having CAPTCHA. Daily around 200 millions CAPTCHA are solved by human beings and in ten seconds we are spending our time and these type of puzzles will take around 15 lacs hours to complete the work. reCAPTCHA does exactly the same by giving some effort to solve CAPTCHA as online reading books.
Why human beings are not making positive effort of CAPTCHA's?
For making the knowledge of humans into an accessible section, we are making projects from different areas by digitizing books which were written before computer age. The pages of book are scanned and then converted into a technique known as Optical Character Recognition. Converting into a text is really useful, so that we will get images which are stored in books and which are difficult to store in devices, taking effort to download and which cannot be searched properly. OCR technique is not proper to use every time.
reCAPTCHA uses the books in a proper way, thus digitizing books by sending words which cannot be read by computers in web and it will be in the form of CAPTCHA's and human beings can read the text in a proper manner. Each word cannot be read by OCR and it will be placed on a image and it will be used as a CAPTCHA. Most of the OCR programs will give you an alert on the words which cannot be read properly . The word which cannot be read by the OCR will be given to a user in different styles and conjunction with other words and answer will be known. User will be prompted to read both word and if the user can solve it, then system shows that answer is a correct one. System will then give it to other people to test whether original answer is correct or not.
When we are running a website and it is having any problems which are related to spam, then you can put the 6yhbeyu7eumreCAPTCHA on your site. For word press applications and mediawiki applications, there are some plugins which allows to use reCAPTCHA without writing any code. For common web applications such as PHP, there are many easy to write codes for giving best solutions for your life.
.
Security
reCAPTCHA is having good security installed in a proper manner and when compared to other CAPTCHA's they use some improper texts which can be attacked by a hacker in an easy manner. Most of other image comparing programs like 'MAPTCHA' are easily attacked in an easy style. reCAPTCHA uses 2 layers to protect the user by making good images. Normally the computer will not be able to read this image and it gives suggestions to users and they will make proper point.
How exactly the reCAPTCHA works?
They will first start to scan a book having many words. Then they will extract word which will not be able to ready by the OCR technique and the words are shown as improper texts and this mainly depends upon the author or the book or quality of scanning mechanism. To make good security they are then providing with some lines or wrapping mechanisms, so that it cannot be read in an easy manner. Mainly the CAPTCHA is taken from the book having two words which is having distorted texts.
WEBSITE THAT CHANGED THE WORLD
Wikipedia
Date started- 15/1/2001.
Founder- Jimmy Wallace, Larry Sanger.
Languages- 240.
Wikipedia is one site that provides every information under the sun on anything. Once you search for anything on the internet using a search engine the first link you come across is that of Wikipedia. There were a number of online encyclopedias before Wikipedia but all of them had only limited information and they were not user friendly. But all that changed ever since Wikipedia came. This site is the number one information providing site on the internet. This site can be accessed by anyone anywhere. The number of people using and contributing at this site is increasing day by day. This site is not only in English, but supports 240 languages worldwide today.
Date started- 4/2/2004.
Founder- Mark Zuckerberg.
Face is the most famous social networking website today. In the USA this site even more popular than Google. The number of users who have Facebook profiles run into millions. There are people who are addicted 24 hours on this site! However Facebook was not the first social networking site. Facebook has changed the way people are interacting with the world today. There are a number of third party applications which can be added to Facebook enhancing its charm. Facebook is popular because it has been changing with times.
Date started- 2006
Founder- Evan Williams, Jack Dorsey and Biz Stone.
Twitter users range from a common citizens, politicians, rich men, poor men etc. In just 140 words you can be connected to the world. One can connect to celebrities, Politicians and famous people using this site and they respond. This was unthinkable years back. Twitter has blurred the lines between the so called 'high class' and 'low class'. Now famous people want to connect to the local people using twitter. Information on any issue or topic spreads like wildfire on twitter. Twitter has become a part of life today.
You tube
Date stared- February 2005.
Founder- Chad Harley, Jawed Karim and and Steve Chen.
You tube has changed the norms of entertainment. Before this site there was no other online video sharing site on the internet at such a large scale. When You-tube started, India was facing low bandwidth and people thought that this site would not become popular because of this problem. People were reluctant to upload videos in India at that time, being limited by bandwidth. But Indian ISPs provide very good bandwidth today and You tube has reached popularity levels. Today even large videos can be uploaded in a short amount of time and people can watch their favorite clips on You tube.
Date started- 4/9/1998.
Founder- Sergey Brin and Larry Page.
Every person knows what Google is, the name is enough. There is hardly an internet user who does not know what Google is. Google means 'search'. No matter what you do on the internet, chances are that you may be visiting this search engine at least once a day. Even those who do not use Google frequently tend to use the services offered by Google like Gmail, reader, blog-spot, Picassa, You tube and Orkut.
Amazon
Date started- 1994.
Founder- Jeffrey P Bezos.
Amazon is an online purchasing site. You can purchase a commodity of your choice online by logging onto this site. Payment is made by credit card. The product is delivered to your home. Amazon has changed the way people shop today. An increasing number of people are using this site for purchasing stuff online. Now there are a number of online shopping sites but Amazon is the most famous of them all.
Hotmail
Date started- 4/7/1996.
Founder- Shabeer Bhatia and other Microsoft members.
Today youngsters and new internet users may not be much familiar with Hotmail. But hotmail was perhaps the first company offering free email services to users years ago. Initially email services were not free and even the free email accounts offered by hotmail were not easy to get. Hotmail started the revolutionary webmail based email service and made email easy to use, making it possible to access email from any computer. Microsoftsubsequently purchased hotmail in 1996. Now hotmail has been replaced by Microsoft live mail. Hotmail still brings about nostalgia in some.
May 08, 2012
ENCRYPTION
In this 21st century we
have moved into a digital world where most of use the Email for data
transmission. Some of us don’t like to share our data in the internet with the
unauthorized people but only to a
specific people .So we need a specific technology to keep our data secure from
the unauthorized people this is called
as encryption.. Encryption is a technique or a
process where the data is encoded using different methods so that one cannot
access the data until unless he has got the key to unlock the encryption. And
the process of bringing back to the original form is called decryption.
TYPES OF ENCRYPTION:
Cryptography is the study of
keeping the digital data secure.
Initially the encryption is based on replacing the alphabets with different
symbols and the decryption where also based on the same. As we are in the fast
moving world we cannot use this older type of encryption because its slow .So the cryptographer improved the
encrypting technique .Modern computer security encryption
systems can be classified into two categories.
· Symmetric-key encryption
· Asymmetric-key encryption
Modern
encrypting technique are far more complex than the older one and the combination
key in encryption are based on
algorithms.
SYMMETRIC-KEY ENCRYPTION:
In the symmetric-key encryption the
encryptor has a unique key which helps in encrypting the data that is to be
transmitted .The receiver also has the same key for decryption of data. Each
transition has a unique key for transmitted data. The 56 bit data encryption
standard was the first encryption algorithm in the Symmetric-key encryption.
This was developed byUnited States for the encryption and decryption of data.
This were easily hacked so they created a 128bit advance encryption standards.
This are still used in data security of email ,atm encryption and many more.
ASYMETRIC-KEY ENCRYPTION:
Asymmetric-key encryption is little bit similar to the previous one but the code for
encrypting the data is different from the decrypting key.In digital signatures,
has of the message is calculated first and then it is used as privatekey or
senders code . Public key or receiver key is compared first and then the
private key is used to decode the data.
SSL AND TLS:
SSL stands for Secure
Socket Layer, TLS stands for Transport layer Transport layer security.
Both the SSL and TLS are the
encryption protocol.. SSL and TLS both uses asymmetric or public key
encryption technique to encrypt the network connection segments. Basic and
foremost SSL technique was developed by Netscape for providing transport layer
security. SSL became very popular among all browsers and web servers as it was
very efficient to transfer the sensitive data .Later their wear upgrades in the
SSL and then the TLS were released.If
you have noticed while making bank transfers, the http changes to https once
you login to the bank's official website. Https uses the TLS technique to make
the data transfer more secure. TLS checks three important things before
transacting and they are whether the certificate of website is a valid one or
not, secondly it checks whether the certificate belongs to the corresponding
trusted website or not, and third one is whether the sending website does have
a valid relationship with the received certificate or not. Once all above
things are verified, then one computer generates asymmetric key and sends it to
the other computer.
CONLCLUSION:
Some of the
hackers will hack any type of encryption. So in this case data could not be
kept secured so the research are going on the field of encryption.
CLOUD COMPUTING:
CLOUD COMPUTING:
Current trend we come across in the day to day life is cloud computing .In
cloud computing - Cloud refers to network in which all the computers are connected
by the means of internet .In the cloud computing all the resources and files
are shared among the systems and they are rendered to the user as a service.
FEATURES:
·
In
the cloud computing the software need not to be installed or downloaded from
the internet sites. Instead the software can be used directly by choosing what
u need. This saves the downloading time and the initialization time. This also
saves your valuable memory space because it consumes less or no memory space
for the software to be used.
·
The
pirated products can be avoided. Since the software company release their
product in the cloud computing basis the piracy is avoid to a greater extend
·
Pay for what you use is one of the main
objective of this technology .The user are charged only for what they use. So
the user and the companies get a satisfaction.
·
This
service are provided 24*7 so that it can be used anywhere and at any time.
·
For
the security of each individuals they are provided with an user id and a
password. So that their privacy can be secured.
CURRENT WORLD AND CLOUD COMPUTING:
The real time application of the cloud
computing can be seen in the form of YOUTUBE. In the YouTube the videos can be
seen anywhere and at any time. For the user private security they are given a
user id and a password. For seeing the videos the basic software is sufficient
and this can be seen anywhere.
The next one is the Facebook-they
provide various services like live chats, online videos and various other
application. This are now used widely by a variety of people of different
agegroups. The feature of uploading and editing the photos are some of the
excellent featured services that they offer.
PROBLEMS OF CLOUD COMPUTING:
There
will be some unique system called the database system which loads all the
services of that they offer. Some of the hacker try to crack this database for
their personal convenience and if they do so then the other user will be in a
state that they could not do any of the activities. So in order to sort out
this problem there is a backup system
that is if the main system is hacked the backup can be used if that too is
hacked then it’s the fate and some alternative ways are their but it takes
time.so the user cannot use that to their convenience at
that period of time.
WORKING OF ATM
When we run short of money we
usually go to atm center. But have we ever thought how this magnificent atm machine works? But answer from most of
us is no. The atm is controlled by a host server which controls and
co-ordinates the whole transaction process. The host server keep track of the
transaction that are done.
WORKING OF ATM(AUTOMATED TELLER MACHINE):
The atm machine
consists of an atm card reader in which the credit or debit cardar inserted
to. The card consists of a coat of a magnetic material and outer plastic
covering .The details of the card holder are stored in the card in the form of
a magnet strip. When the debit or credit card are inserted into the atm this
machine identifies the user and it sends a requesting the password. When the
password is entered correctly the atm connects itself with the host. When the
amount is entered the information is converted into electronic signals and send
the signal to the again and connect it
with the bank data base and then in return the bank sends the information about
the transaction, then the host sends this to the atm.
These connections are classified
into two major types, that is Leased-line ATM and Dial-up ATM. Both the types
use a telephone connection to get connected to the host processor. However, the
Leased-line uses a dedicated, point to point telephone connection in order to
get connected to the host processor, making it very costly to set it up and
maintain it throughout the year. However, Dial-up ATM use an ordinary telephone
connection to get connected to the user. Hence, Dial-up ATM is very easy to set
up and the maintenance costs are also less compared to Leased-line.
The atm consists of a sensor
that checks the length and the thickness of the currency and differentiates as
100,500 and 1000that come from the safe. The damaged and folded currency are
sent to separate section in which the note are placed. Then the notes are sent
to the dispenser where the cash could be drawn. The numbers of notes are
counted by the special sensors that goes to the dispenser.
May 06, 2012
ADOLF HITLER- man of courage
The worlds most competitive man in the history of world.The people only see
the negative side of that great legend and the psychologist named him as
psycho,in-spite of his great hidden talents.If the world say him as
an inefficient leader then the world is a pessimist.
CHILDHOOD:
In the early
stage of his life he had undergone rational discrimination ,this is
the main reason for his cruel actions in the later part of his life.At the age
of 13 he lost his father and he did not get food once in a day .The
poverty struck him and he did not get the basic needs that a human being must
get.And at the age of 17 his mother died and he was in the situation that he
never ever wish to be.Hitler was interested in drawing so at the age of 17 he
became an artist but this did not fetch him for his livelihood ..So he tried to
join the armed forces.Hitler was an ordinary soldier in the army but due to his
dedication to his job he was promoted as a secret agent .
POLITICS
Hitler joined the organization in which their where only eight members ,this
organization later turned into a political party.In order to get the people
support,He conducted meeting among the members.HITLER wrote catchy pamphlets
which drew the people.Due to his mind blowing speech the people turned to his
way and this party turned into a huge force,with this influence he became
the leader of his country.
ROLE
AS LEADER
After he became the ruler he
killed the Jews in many variety of ways.Few such TRICKY TACTICS which he used
to kill the people in a fantasy way which i came upon to know that you would be
eager to know. He killed the them by stuffing the people into the room
with no air gap even to breathe bringing them suffocation by also blowing
away the Poisonous gas into the room and eventually brought down .But he did
all this because of the torch-er he under went in the childhood .
TRAGIC
END:
At the end of the world
war 2 German lost and all the area that Hitler ruled was conquered by others
.when the sense graveyard marched upon him he chose his life companion .
Some of them say that he was finally assassinated and other say that he
shoot himself but till now his death is a mist
Subscribe to:
Posts (Atom)