Techknow_Study

Archive for the category “Computer World”

Spyware

Spyware  
               

Spyware is a type of malwarethat can be installed on computers, and which collects small pieces of information about working process without user knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Sometimes, however, spywares such as keyloggers are installed by the owner of a corporate, or public computer on purpose in order to secretly monitor other users.

 While the term spyware suggest software that secretly monitors the user’s computing.
spyware can collect many type of information like personal information, internet surfing etc.
spyware knows to change computer setting and slow connection speed foe different website

 

spyware components make use of exploits in Javascript, Internet Explorer and Windows to install without user knowledge or permission. Spyware can also come bundled with other software. The user downloads a program and installs it, and the installer additionally installs the spyware. Spyware is as similar as to viruses in that it can be considered destroyable {harmful} in nature.

 

The Windows Registry contains multiple sections where modification of key values allows software to be executed automatically when the operating system boots. The spyware typically will link itself from each location in the registry that allows execution. Once running, the spyware will periodically check if any of these links are removed. If so, they will be automatically restored. This ensures that the spyware will execute when the operating system is booted, even if some (or most) of the registry links are removed.

Secure Sockets Layer

Know More About Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https. In simple words HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a SECURE communication.
What exactly is Secure Communication ?
Suppose there exists two communication parties A (client) and B (server).
Working of HTTP
When A sends a message to B, the message is sent as a plain text in an unencrypted manner. This is acceptable in normal situations where the messages exchanged are not confidential. But imagine a situation where A sends a PASSWORDto B. In this case, the password is also sent as a plain text. This has a serious security problem because, if an hacker can gain unauthorised access to the on going communication between A and B , he can see the PASSWORDS since they remain unencrypted. This scenario is illustrated using the following figure

Now lets see the working of HTTPS
When A sends a PASSWORD (say “mypass“) to B, the message is sent in an encrypted format. The encrypted message is decrypted on B‘s side. So even if the Hacker gains an unauthorised access to the ongoing communication between A and B he gets only the encrypted password (“xz54p6kd“) and not the original password. This is shown below
How is HTTPS implemented ?
HTTPS is implemented using Secure Sockets Layer (SSL). A website can implement HTTPS by purchasing an SSL Certificate. Secure Sockets Layer (SSL) technology protects a Web site and makes it easy for the Web site visitors to trust it. It has the following uses
  1. An SSL Certificate enables encryption of sensitive information during online transactions.
  2. Each SSL Certificate contains unique, authenticated information about the certificate owner.
  3. A Certificate Authority verifies the identity of the certificate owner when it is issued.
How Encryption Works ?
Each SSL Certificate consists of a Public key and a Private key. The public key is used to encrypt the information and the private key is used to decrypt it. When your browser connects to a secure domain, the server sends a Public key to the browser to perform the encryption. The public key is made available to every one but the private key is kept secret. So during a secure communication, the browser encrypts the message using the public key and sends it to the server. The message is decrypted on the server side using the Private key.

Google Summer of Code 2012

Google Summer of Code 2012


Visit the Google Summer of Code 2012 site for more details about the program this year.
For a detailed timeline and further information about the program, review our Frequently Asked Questions.

About Google Summer of Code

Google Summer of Code is a global program that offers post-secondary student developers ages 18 and older stipends to write code for various open source software projects. We have worked with open source, free software, and technology-related groups to identify and fund projects over a three month period. Since its inception in 2005, the program has brought together over 6000 successful student participants and over 3000 mentors from over 100 countries worldwide, all for the love of code. Through Google Summer of Code, accepted student applicants are paired with a mentor or mentors from the participating projects, thus gaining exposure to real-world software development scenarios and the opportunity for employment in areas related to their academic pursuits. In turn, the participating projects are able to more easily identify and bring in new developers. Best of all, more source code is created and released for the use and benefit of all.
To learn more about the program, peruse our 2012 Frequently Asked Questionspage. You can also subscribe to the Google Open Source Blogor the Google Summer of Code Discussion Group to keep abreast of the latest announcements.

Participating in Google Summer of Code

For those of you who would like to participate in the program, there are many resources available for you to learn more. Check out the information pages from the 2005, 2006, 2007, 2008, 2009, 2010, and 2011instances of the program to get a better sense of which projects have participated as mentoring organizations in Google Summer of Codeeach year. If you are interested in a particular mentoring organization, just click on its name and you’ll find more information about the project, a summary of their students’ work and actual source code produced by student participants. You may also find the program Frequently Asked Questions (FAQs) pages for each year to be useful. Finally, check out all the great content and advice on participation produced by the community, for the community, on our program wiki.
If you don’t find what you need in the documentation, you can always ask questions on our program discussion list or the program IRC channel, #gsoc on Freenode.

Mice selection

Mouse selection
HI friend does a question  arise in your mind that how the mice  differentiate.
Ok I will try to  help u……………….
A mouse is differentiate by his speed. The unit of measuring the mouse speed is DPI/CPI.
DPI=Dots per inch
CPI=count per inch
As you move your mouse one inch the dots /counts done in the movement of cursor in PC screen.
that if I have a mouse that’s 1000 dpi and I move it one inch physically, the pointer on screen should move 1000 dots per inch on the monitor.
As  we also know that  inbuilt software comes  with OS to increase the sensitivity of mouse. which means the mouse DPI is basically being altered via the OS. To me that implies that the mouse DPI isn’t such an important thing anymore (high DPI anyway). No it is wrong ignore the windows point speed settings and that the DPI adjustments override that. Means leave the default setting in Windows. That time the dpi is the speed of mouse………..
DPI is the number of pixels per inch. CPI is the sampling rate per inch. DPI and CPI can be used to indicate the resolution of the mouse, but the DPI response is a static index, used in the printer or scanner seems more appropriate. As the mouse is a dynamic process, with the CPI to represent a more appropriate resolution of the mouse.
CPI / DPI buttons to adjust the mouse speed and scope. Radium-plated mouse resolution are two stalls. 

BSNL Tablet Follows Aakash’s Footsteps

 
BSNL Tablet Follows Aakash’s Footsteps  

While there is only a difference of Rs 500 in price between Aakash tablet and BSNL tablet (Penta IS701R), users are expected to get 5 GB for data download from BSNL for 60 days with BSNL’s tablet.
It is commonly known by the people that to launch Aakash tablet and bsnl tablet that government is involved in this project makes it reliable.
Both the low cost tablet earned a lot of attention in media and public equally but in my information they have yet not reached into the market, as promised.
another thing common between them is that they opened their online booking much before the launch and disappointed one and all.
When asked about the retail available of the device, Managing director of pantel technology, said some days back, “we have the shipments ready and we will definitely see to it that our tablet reaches the store by 1 march 2012.”

Riversip Technology {android}

RIVERSIP

New App] Riversip Technology News Comes To Market, Provides Quick, Easy News Updates On The Go
R u looking for the technology news or content about the topic on your schedule and busy time “ Briox  introduced riversip to the android market recently.”  Riversip without a doubt provides a unique take on the “news reader” concept, automatically choose the news source based on the user requirement  {chosen topic} and show only  the top headline about that topic.
Riversip also makes a point of its incredibly easy user experience, promising that “no setup or learning time [is] required.”  The application also allow the other source about the user chosen topic. Additionally, Riversip can comb your Twitter feeds for reactions to or mentions of specific stories, to show you what your friends are talking about most. All of these factors combine to fulfill Riversips promise of updating users on the latest tech news in mere minutes, requiring very little effort while providing  the maximum amount of pertinent information available. 
Overall, Riversip seems to make an awesome solution for keeping track of tech news and is certainly worth checking out, especially considering the fact that it’s free from the Android Market.

What is Phishing

 
What is Phishing ?

Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets.
Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used.
Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as facebook, orkut are also a target of phishing.
Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.
TECHNIQUES BEHIND PHISHING ATTACK
1. Link Manipulation
Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL
2. Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.

Sony Releases Xperia S Open Source Archive

 

Sony Releases Xperia S Open Source Archive

The company has made  the code of its xperia source S smartphone open source.
Android itself  have a broad name. but in this area sony has released an archive of  code and the tools necessary for its xperia S smartphone. The Android based phone  run on the Qualcomm  Snapdragon s3 plateform.
 Sony released  the open source archive for xperia which contains files you can use when building a kernel. This is the first time sony publish source code for a product built on the Qualcomm Snapdragon s3 platform, and to flash this software, you need do some additional step and run a script.
Since this is the first time the company is publishing the code “for a product built on the Qualcomm Snapdragon S3 platform”, custom ROM developers can make use of it while working on handsets featuring the same chipsets, such as the HTC Evo 3D.
Besides the source code and tools required to build ROM images, the open source archive for the Xperia S also includes a binary firmware blob and a script. “The script is used specifically for Xperia S and replaces mkbootimg, which you would normally use. The script creates a flashable image needed to flash your ROM onto Xperia S. If you don’t do this, you won’t be able to flash the software on your Xperia S,”.

Camera Scans 36 Million Faces

New Security Camera Scans 36 Million Faces Per Second
Hit 
achi kokusai electric has developed a security camera,
It have fast searching or we can say scanning capacity.
 This camera search 36 million faces in 1 second in the
case if we consider the a face library. Means this system
is very useful for the customer have a relatively large scale
surveillance system, such as railways, power companies
and large stores. Authorities earlier used to spend hours
trawling through CCTV footage to find an individual. But 
using this they can now capture a person’s face in the blink
of an eye.

Smart mouse

Imooze Smart mouse with             4speed transmission

The wireless mouse comes with power saving technology that function on automatic standby mode.
     :-portronic is an emerging company in electronics industry and it recently bring out his first wireless mouse. The price of mouse is approx 799 an available in india in three colours that are black orange ,black blue and white pink.
Portronics has competitors like H.P., Microsoft, intex in this segment but it claims that imooze is different from them .jasmeet sing sethi director says that “our product are different from the mouse existing in indian market. This smart mouse with four speed transmission. It means that you can use 4 different speeds wih the mouse:-500 DPI,1000 DPI,1500 DPI,17500 DPI.  

Post Navigation

Design a site like this with WordPress.com
Get started