Lion.dr.K.S.rangasamy, MJF Founder & President
Post on 18-Nov-2014
197 Views
Preview:
Transcript
Ishare
EDITORIAL … The economic downturn
woes have settled down. Good signs
are visible and the IT sector faces a
new emerging recruiting phase.
Employers seek for right candidate
and not a candidate. They are in
need of employees who possess
multitasking skills. Since we are in
dynamic forum, we have to meet
the multilevel challenges. Hope,
this book serves a droplet of filling
your knowledge ocean. Please send
your comments, suggestions and
articles to the email id:
ksrcas.ishare@gmail.com.
By,
Editorial Board
PATRON
Lion.Dr.K.S.Rangasamy, MJF
Founder & President
ADVISORS
Kavithaa Srinivashaan, M.A.,M.B.A.,
Executive Director
Dr. N. Kannan, M.Sc., Ph.D.
Principal
Prof.K.Natarajan, M.Sc.,M.Phil.,
Director, Center for Information
Technology
Mr. R. Pugazendi, M.Sc.,M.Phil.,M.E.,
HOD, Department of Computer
Science & Applications EDITORIAL TEAM
S.Sasikala, M.Sc., M.Phil., PGDPM &IR.,
S.Ranichandra, M.Sc., MBA.,M.Phil.,
S.Nithya., M.Sc(CS & IT).,
G.Anwar Basha., M.C.A.,
S.Maheswaran, III BCA ’A’.,
M.Karthikeyan, III B.Sc(CS) ’C’.,
& Office bearers of TRACE and ACAI
Ishare
CONTENTS
Articles
1. Windows 7 New Microsoft Release
2. Search Engine-Some Information
3. Who Invented the Internet
4. Forgotten Operating System
5. Key Punch Cards
6. How to Perform Special Searches
Tech Zone
7. Tech Tips
8. Placement Forum
9. HitBits
10. Jargons
11. Trojen Horse
12. Rainfinity Technology
Fun Zone
13. Funny Syntax Error
14. Who is Who , Twishing
Ishare
Trojan Horse
A "Trojan Horse" has come to mean
any trick that causes a target to
invite a foe into a securely protected
bastion or place, now often
associated with "malware" computer
programs presented as useful or
harmless in order to induce the user
to install and run them.
Trojan horse (computing)
A Trojan horse (sometimes
shortened to trojan), is non-self-
replicating malware that appears to
perform a desirable function for the
user but instead facilitates
unauthorized access to the user's
computer system. The term is
derived from the Trojan Horse story
in Greek mythology.
Purpose and operation Trojan horses are designed to allow
a hacker remote access to a target
computer system. Once a Trojan
horse has been installed on a target
computer system, it is possible for a
hacker to access it remotely and
perform various operations. The
operations that a hacker can perform
are limited by user privileges on the
target computer system and the
design of the Trojan horse.
Operations that could be performed
by a hacker on a target computer
system include:
• Use of the machine as part of
a Botnet (e.g. to perform
spamming or to perform
Distributed Denial-of-service
(DDoS) attacks)
• Data theft (e.g. passwords,
credit card information, etc.)
• Installation of software
(including other malware)
• Downloading of files
Author
G.Anwar Basha, Lecturer,
CS Article title Trojen Horse Article Description This article gives the details about the trojen horse malware and some of its technical description.
Ishare
• Uploading of files
• Deletion of files
• Modification of files
• Keystroke logging
• Viewing the user's screen
• Wasting computer storage
space
Trojan horses require interaction
with a hacker to fulfill their purpose,
though the hacker need not be the
individual responsible for
distributing the Trojan horse. In fact,
it is possible for hackers to scan
computers on a network using a port
scanner in the hope of finding one
with a Trojan horse installed, that
the hacker can then use to control
the target computer
Installation and distribution Trojan horses can be installed
through the following methods:
• Software downloads (e.g. a
Trojan horse included as part
of a software application
downloaded from a file
sharing network)
• Websites containing
executable content (e.g. a
Trojan horse in the form of an
ActiveX control)
• Email attachments
Also, there have been reports of
compilers that are themselves Trojan
horses While compiling code to
executable form, they include code
that causes the output executable to
become a Trojan horse.
Removal Antivirus software is designed to
detect and delete Trojan horses, as
well as preventing them from ever
being installed. Although it is
possible to remove a Trojan horse
manually, it requires a full
understanding of how that particular
Trojan horse operates. In addition, if
a Trojan horse has possibly been
used by a hacker to access a
computer system, it will be difficult
to know what damage has been done
and what other problems have been
introduced. In situations where the
security of the computer system is
critical, it is advisable to simply
erase all data from the hard disk and
reinstall the operating system and
required software.
Ishare
Windows 7 is the latest version of
Microsoft Windows, a series of
operating systems produced by
Microsoft for use on personal
computers, including home and
business desktops, laptops,
netbooks, tablet PCs and media
center PCs. Windows 7 was released
to manufacturing on July 22, 2009,
and general retail availability on
October 22, 2009, less than three
years after the release of its
predecessor, Windows Vista.
Windows 7's server counterpart,
Windows Server 2008 R2, was
released at the same time.
Unlike its predecessor, which
introduced a large number of new
features, Windows 7 is intended to
be a more focused, incremental
upgrade to the Windows line, with
the goal of being fully compatible
with applications and hardware with
which Windows Vista is already
compatible. Presentations given by
Microsoft in 2008 focused on multi-
touch support, a redesigned
Windows Shell with a new taskbar,
a home networking system called
Home Group, and performance
improvements. Some applications
that have been included with prior
releases of Microsoft Windows,
including Windows Calendar,
Windows Mail, Windows Movie
Maker, and Windows Photo Gallery,
will not be included in Windows 7;
some will instead be offered
separately as part of the free
Windows Live Essentials suite.
Author
S.Maheswaran, III BCA A
Article title Microsoft’s Invention Article Description This article provides the details about Windows 7 the latest version of Microsoft.
Ishare
Minimum hardware requirements for Windows
7
Architecture 32-bit 64-bit
Processor 1 GHz 32-bit
processor
1 GHz 64-bit
processor
Memory
(RAM)
1 GB of RAM 2 GB of RAM
Graphics
Card
DirectX 9 graphics processor with
WDDM driver model 1.0 (For
Aero)
HDD free
space
16 GB of
available disk
space
20 GB of
available disk
space
Optical drive DVD drive (only to install from
DVD/CD Media)
Additional requirements to use
certain features:
• Bit Locker requires a USB
flash drive to use BitLocker
To Go.
• Windows XP Mode requires
an additional 1 GB of RAM,
an additional 15 GB of
available hard disk space, and
a processor capable of
hardware virtualization with
Intel VT or AMD-V enabled.
Windows 7 includes a number of
new features, such as advances in
touch and handwriting recognition,
support for virtual hard disks,
improved performance on multi-core
processors, improved boot
performance, DirectAccess, and
kernel improvements. Windows 7
adds support for systems using
multiple heterogeneous graphics
cards from different vendors
(Heterogeneous Multi-adapter), a
new version of Windows Media
Center, a Gadget for Windows
Media Center, improved media
features, the XPS Essentials Pack
and Windows PowerShell being
included, and a redesigned
Calculator with multiline
capabilities including Programmer
and Statistics modes along with unit
conversion. Many new items have
been added to the Control Panel,
including ClearType Text Tuner,
Display Color Calibration Wizard,
Gadgets, Recovery,
Troubleshooting, Workspaces
Center, Location and Other Sensors,
Credential Manager, Biometric
Devices, System Icons, and Display.
Windows Security Center has been
renamed to Windows Action Center
(Windows Health Center and
Ishare
Windows Solution Center in earlier
builds), which encompasses both
security and maintenance of the
computer. The default setting for
User Account Control in Windows 7
has been criticized for allowing
untrusted software to be launched
with elevated privileges by
exploiting a trusted application.
Microsoft's Windows kernel
engineer Mark Russinovich
acknowledged the problem, but
noted that there are other
vulnerabilities that do not rely on the
new setting. Windows 7 also
supports Mac-like RAW image
viewing through the addition of
WIC-enabled image decoders, which
enables raw image thumbnails,
previewing and metadata display in
Windows Explorer, plus full-size
viewing and slideshows in Windows
Photo Viewer and Window Media
Center. The taskbar has seen the
biggest visual changes, where the
Quick Launch toolbar has been
replaced with pinning applications to
the taskbar. Buttons for pinned
applications are integrated with the
task buttons. These buttons also
enable the Jump Lists feature to
allow easy access to common tasks.
The revamped taskbar also allows
the reordering of taskbar buttons. To
the far right of the system clock is a
small rectangular button that serves
as the Show desktop icon. This
button is part of the new feature in
Windows 7 called Aero Peek.
Hovering over this button makes all
visible windows transparent for a
quick look at the desktop. In touch-
enabled displays such as touch
screens, tablet PCs, etc., this button
is slightly wider to accommodate
being pressed with a finger. Clicking
this button minimizes all windows,
and clicking it a second time restores
them. Additionally, there is a feature
named Aero Snap, that automatically
maximizes a window when it is
dragged to either the top or left/right
edges of the screen. This also
allows users to snap documents or
files on either side of the screen to
compare them. When a user moves
windows that are maximized, the
system restores their previous state
Ishare
automatically. This functionality is
also accomplished with keyboard
shortcuts. Unlike in Windows Vista,
window borders and the taskbar do
not turn opaque when a window is
maximized with Windows Aero
applied. Instead, they remain
transparent.
For developers, Windows 7 includes
a new networking API with support
for building SOAP-based web
services in native code (as opposed
to .NET-based WCF web services),
new features to shorten application
install times, reduced
UAC prompts, simplified
development of
installation packages,
and improved
globalization support through a new
Extended Linguistic Services API.
At WinHEC 2008 Microsoft
announced that color depths of 30-
bit and 48-bit would be supported in
Windows 7 along with the wide
color gamut scRGB (which for
HDMI 1.3 can be converted and
output as xvYCC). The video modes
supported in Windows 7 are 16-bit
sRGB, 24-bit sRGB, 30-bit sRGB,
30-bit with extended color gamut
sRGB, and 48-bit scRGB. Microsoft
is also implementing better support
for Solid State Drives, including the
new TRIM command, and Windows
7 will be able to identify a Solid
State Drive uniquely. Microsoft is
also planning to support USB 3.0 in
a subsequent patch, although support
would not be included in the initial
release due to delays in the
finalization of the standard. Internet
Spades, Internet Backgammon and
Internet Checkers, which were
removed from Windows
Vista, were restored in
Windows 7. Windows 7 will
include Internet Explorer 8
and Windows Media Player
12.Users will also be able to disable
many more Windows components
than was possible in Windows Vista.
New additions to this list of
components include Internet
Explorer, Windows Media Player,
Windows Media Center, Windows
Search, and the Windows Gadget
Platform. Windows 7 includes 13
Ishare
additional sound schemes, titled
Afternoon, Calligraphy, Characters,
Cityscape, Delta, Festival, Garden,
Heritage, Landscape, Quirky, Raga,
Savanna, and Sonata. A new version
of Virtual PC, Windows Virtual PC
Beta is available for Windows 7
Professional, Enterprise, and
Ultimate editions. It allows multiple
Windows environments, including
Windows XP Mode, to run on the
same machine, requiring the use of
Intel VT-x or AMD-V. Windows XP
Mode runs Windows XP in a virtual
machine and redirects displayed
applications running in Windows XP
to the Windows 7 desktop.
Furthermore Windows 7 supports
the mounting of a virtual hard disk
(VHD) as a normal data storage, and
the bootloader delivered with
Windows 7 can boot the Windows
system from a VHD. The Remote
Desktop Protocol (RDP) of
Windows 7 is also enhanced to
support real-time multimedia
application including video playback
and 3D games. That means that
Direct X 10 can be used in a remote
desktop environment. The three
application limit will be removed
from Windows 7 Starter.
How do you add text abbreviations
to autocorrect in word 2007?
1. Open Microsoft Word 2007.
Press on the Office symbol in
the left top corner.
2. Go to the bottom and press on
the Word Options button.
See the screenshot below.
3. Word options will appear.
Choose Proofing from the left
menu. Now press on the
AutoCorrect Options button
as in the screenshot below.
4. The autocorrect options will
appear. Go down to where it
says replace.
5. Under that type in the
abbreviation you want to use
when you are typing in Word.
I have written yt in this area.
Ishare
6. Now move to the right side
and enter the word that will
appear when the abbreviation
is typed. I have entered You
tube.
7. Therefore when I type yt and
then press the space bar the
word You tube will appear.
8. Now press the add button.
9. Keep entering more
abbreviations and words to
match. Press add after each
one.
10. Press ok when you are
finished.
Article title: Tech Tips
By, G. Manigandaprabhu
II B.Sc(CS) ’B’
Ishare
TOP 5 SEARCH ENGINES IN
THE UNITED STATES (THE
MAJORS) BY RANK
1. Google
Free Submit:
http://www.google.com/
2. Yahoo! Search
Free Submit:
http://submit.search.yaho
o.com/
3. MSN Live Search
Free Submit:
http://search.msn.com/
4. AOL Search - Powered by
Google Submit:
https://adwords.google.co
m/
5. Ask - Powered by Teoma
http://static.wc.ask.com/
TOP 5 ALTERNATIVE SEARCH
ENGINES
Gigablast
Gigablast has a huge index and some
nice advanced search options,
although not terribly advanced. In
addition the search engine provide
directory search using The Open
Directory, blog search and travel
search.
Factbites
The Factbites search engine not just
search for web sites that match your
search term. They search the whole
topic area. In this way it can return
relevant results on your topic that
Author
S.Sasikala,
Lecturer, CS Article Title
Search Engine Article Description This article gives details about the top 5 and semantic search engines and its excellent usage.
Ishare
don’t necessarily mention the word
you searched for.
Exalead
Exalead is a European search
engine. It has some very handy
advanced search options and a new
way of presenting search results.
The advanced features include
truncation, proximity search,
stemming, phonetic search, and
language field search.
Snap
Like Exalead, Snap wants to deliver
visually enhanced search results. It
gives you text on the left and web
site previews on the right. In this
way you don’t have to click through
every search result to see what
you’ll get, but have a chance to
“look before you leap”.
TOP 5 SEMANTIC SEARCH
ENGINES
What is semantic search?
A semantics search engine attempts
to make sense of search results
based on context. It automatically
identifies the concepts structuring
the texts. For instance, if you search
for “election” a semantic search
engine might retrieve documents
containing the words “vote”,
“campaigning” and “ballot”, even if
the word “election” is not found in
the source document.
An important part of this process is
disambiguation, both of the queries
and of the content on the web. What
this means is that the search engine
— through natural language
processing — will know whether
you are looking for a car or a big cat
when you search for “jaguar”.
When to use semantic search
engines
Semantic search has the power to
enhance traditional web search, but
it will not replace it. A large portion
of queries are navigational and
semantic search is not a replacement
for these. Research queries, on the
Ishare
other hand, will benefit from
semantic search.
Hakia
Hakia is a general purpose semantic
search engine, as opposed to
Powerset and Cognition, that search
structured text like Wikipedia.
SenseBot
SenseBot is a web search engine that
summarizes search results into one
concise digest on the topic of your
query. The search engine attempts to
understand what the result pages are
about. For this purpose it uses text
mining to analyze Web pages and
identify their key semantic concepts.
Powerset
Powerset is at present not a regular
web search engine. It works best on
smaller, relatively structured text.
DeepDyve
DeepDyve is a powerful,
professional research tool available
for free for the general public.
Cognition
Cognition has a search business
based on a semantic map, built
over the past 24 years, which the
company claims is the most
comprehensive and complete
map of the English language
available today. It is used in
support of business analytics,
machine translation, document
search, context search, and much
more
• Out of paper on drive D: • Press ESC to enter or Enter
to escape • REALITY.SYS corrupted.
Reboot UNIVERSE [Y,n] ? • The Earth is 98% full.
Please delete anyone you can.
• The world is coming to an end-please log off.
• This copy of planet Earth has been unregistered for 4 billion years
• Track 0 bad?? Don't worry, there's lots of others
• Troubleshooting Shortcut #1: Shoot the trouble!
• Unknown Error on Unknown Device for Unexplainable Reason
• User Failure: Please Insert a Bootable Brain.
Ishare
1. What kind of salary do you
need?
A loaded question. A nasty little
game that you will probably lose if
you answer first. So, do not answer
it. Instead, say something like,
That's a tough question. Can you tell
me the range for this position? In
most cases, the interviewer, taken
off guard, will tell you. If not, say
that it can depend on the details of
the job. Then give a wide range.
2. Are you a team player?
You are, of course, a team player.
Be sure to have examples ready.
Specifics that show you often
perform for the good of the team
rather than for yourself are good
evidence of your team attitude. Do
not brag, just say it in a matter-of-
fact tone. This is a key point.
3. How long would you expect to
work for us if hired?
Specifics here are not good.
Something like this should work: I'd
like it to be a long time. Or As long
as we both feel I'm doing a good job.
4. Have you ever had to fire
anyone? How did you feel about
that?
This is serious. Do not make light of
it or in any way seem like you like
to fire people. At the same time, you
will do it when it is the right thing to
do. When it comes to the
organization versus the individual
who has created a harmful situation,
you will protect the organization.
Remember firing is not the same as
layoff or reduction in force.
5. What is your philosophy
towards work?
Author
M. Mohammad arif , II B.Sc(CS) B Article title Interview Tips Article description This article helps to face the interview as what HR expected.
Ishare
The interviewer is not looking for a
long or flowery dissertation here. Do
you have strong feelings that the job
gets done? Yes. That's the type of
answer that works best here. Short
and positive, showing a benefit to
the organization.
6. If you had enough money to
retire right now, would you?
Answer yes if you would. But since
you need to work, this is the type of
work you prefer. Do not say yes if
you do not mean it.
7. Have you ever been asked to
leave a position?
If you have not, say no. If you have,
be honest, brief and avoid saying
negative things about the people or
organization involved.
8. Explain how you would be an
asset to this organization.
You should be anxious for this
question. It gives you a chance to
highlight your best points as they
relate to the position being
discussed. Give a little advance
thought to this relationship.
9. Why should we hire you?
Point out how your assets meet what
the organization needs. Do not
mention any other candidates to
make a comparison.
10. Tell me about a suggestion you
have made.
Have a good one ready. Be sure and
use a suggestion that was accepted
and was then considered successful.
One related to the type of work
applied for is a real plus. Get ready
for the campus interview. Wipro is
nearby..
WHO INVENTED THE
INTERNET?
Author
T.Vinodhini II-BCA-C
Article title Birth of Internet. Article Description This article gives the details about history of Internet.
Ishare
A single person did not create
the Internet that we know and use
today. Below is a listing of several
different people who've helped
contribute and develop the Internet.
IDEA:
The initial idea is credited as being
Leonard Kleinrock's after he
published his first paper entitled
"Information Flow in Large
Communication Nets" on May 31,
1961.
In 1962 J.C.R. Licklider becomes
the first Director of IPTO and gave
his vision of a galactic network. In
addition to the ideas from Licklider
and Kleinrock, Robert Taylor helped
create the idea of the network, which
later became ARPANET.
Initial creation:
The Internet as we know it today
first started being developed in the
late 1960's. In the summer of 1968
the Network Working Group
(NWG) held its first meeting chaired
by Elmer Shapiro with the Stanford
Research Institute (SRI) with
attendees: Steve Carr, Steve
Crocker, Jeff Rulifson, and Ron
Stoughton. In the meeting the group
discussed solving issues related to
getting hosts to communicate with
each other. In December 1968 Elmer
Shapiro with SRI released a report
"A Study of Computer Network
Design Parameters." Based on this
work and earlier work done by Paul
Baran, Thomas Marill and others;
Lawrence Roberts and Barry
Wessler helped to create the final
version of the Interface Message
Processor (IMP) specifications. Bolt
Beranek and Newman, Inc. (BBN)
was later awarded the contract to
design and build the IMP sub
network.
Introduction of the Internet to the
general public
UCLA puts out a press release
introducing the public to the Internet
on July 3, 1969.
First network equipment
August 29, 1969 the first network
switch and the first piece of network
equipment called "IMP", which is
short for (Interface Message
Processor) is sent to UCLA and on
Ishare
September 2, 1969 the first data
moves from UCLA host to the
switch.
The first distributed message
On Friday October 29, 1969 the first
Internet message was sent from
computer science Professor Leonard
KleinRock's laboratory at UCLA,
after the second piece of network
equipment was installed at SLI. This
connection not only enabled the first
transmission to be made but is also
considered to be the first Internet
backbone.
The first message to be distributed
was "LO", which was an attempt at
"LOGIN" by Charley S. Kline to log
into the SLI computer from UCLA.
However, the message was unable to
be completed because the SLI
system crashed. Shortly after the
crash the issue was resolved and he
was able to log into the computer.
E-mail is developed
Ray Tomlinson introduces network
e-mail in 1972, the first messaging
system to send messages across a
network to other users.
TCP is developed
Vinton Cerf and Robert Kahn design
TCP during 1973 and later publish it
with the help of Yogen Dalal and
Carl Sunshine in December of 1974
in RFC 675.
Ethernet is conceived
Bob Metcalfe develops Ethernet idea
in 1973.
TCP/IP is created
In 1978 TCP splits into TCP/IP
driven by Danny Cohen, David
Reed, and John Shoch to support
real-time traffic. This allows the
creation of UDP. TCP/IP is later
standardized into ARPANET in
1983 and is still the primary protocol
used for the Internet.
DNS is introduced
Paul Mockapetris and Jon Postel
introduce DNS in 1984.
HTML
Ishare
In 1990 Tim Berners-Lee develops
HTML, which makes a huge
contribution to how we navigate and
view the Internet today.
WWW
Tim Berners-Lee introduces WWW
to the public on August 6, 1991.
Amiga OS
Year created: 1985
Company: Commodore
What happened?
Ars Technica put it best when in
2005, it wrote: "The Amiga
computer was a machine ahead of its
time. When it was released in 1985,
its color screen (4096 colors in
HAM mode!), four-channel sampled
stereo sound, preemptive
multitasking GUI, and custom chips
to accelerate both sound and
graphics made the year-old
Author
Muruganandham.N, III BCA- "B".
Article Title Forgotten Operating System Article Description This article provides information regarding the past OS used, which are not in use now-a-days.
Ishare
Macintosh seem antiquated and the
PC positively Paleolithic. Steve Jobs
was reported to be extremely
worried about the Amiga, but
fortunately for him and Apple,
Commodore had absolutely no idea
what they were doing."
BeOS
Year created: 1991
Company: Be Inc.
What happened?
Apple offered to buy Be Inc
for $125 million in 1995, but CEO
Jean-Louis Gassée wanted $200
million. Apple bought Steve Jobs's
NeXT instead, and Palm acquired
the company's assets for $11 million
in 2001.
OS/2
Year created: 1985
Company: IBM
What happened?
Microsoft and IBM joined to create
OS/2 in 1985, but when Windows 3
became a huge hit, the partnership
unraveled in 1990. Though no
longer supported by IBM, the
operating system still runs on many
ATMs today.
Arthur
Year created: 1987
Company: Acorn Computers Ltd
What happened?
Developed in five months,
Arthur was supposed to be a short-
term scab, but it stuck around until
the RISC OS was developed in
1989. That operating system is still
in use, but we don't know anyone
who uses it.
Desktop Linux
Year created: ~1996
Company: Linux desktops are open
source.
What happened?
2010 is almost certain to be
the year of desktop Linux. Just like
2009. And 2008. And…
Inferno (operating system)
Year created: 1996
Company: Bell Labs
What happened?
It's an open source operating
system, so there are versions of it
still out there. But they don't work
above the basement floor.
XTS-400
Year created: 1992
Ishare
Company: BAE Systems
What happened?
Valued for their security, this
operating system and its successors
are still used in military technology.
Palm OS (also known as Garnet
OS)
Year created: 1996
Company: Palm Inc.
What happened?
In 2002, Palm spun the OS
out as its own company. Innovation
pretty much ended there and what
was once a very strong pioneering
OS for PDAs, couldn't keep up when
it came to the Web and multimedia.
UIQ (formerly known as User
Interface Quartz)
Year created: 1998
Company: Ericsson
What happened?
UIQ went into bankruptcy this
year after the Symbian Foundation
chose to base future user-interfaces
on the S60 OS.
Program spindle for IBM 026 or 029
card punch. For repeated data entry
with a fixed card format, the card
punch could be set up to skip certain
columns, wait for key input, or
duplicate information from the
previous card. Program cards were
punched on the same keypunch,
removed, wrapped around the drum,
and inserted in the keypunch above
the punch position. Control by the
card could be enabled and disabled
by the operator with a lever.
Author
Muruganandham.N, III BCA- "B".
Article Title Keypunch Card Article Description This article provides that full details about the punching card system.
Ishare
Punch card chad - a jar of 'holes'
punched from cards on an IBM '029'
punch. These are rectangular in
shape, have the color of the card,
and usually bear the small printed
column number that was punched
out from the card.
Manual card punch from Wright
Line. Numeric digits could be
inserted directly from the keys.
Alphabetic and special characters
required 2 or 3 holes obtained by
pressing all needed keys while
holding down the 'S' key at bottom
until finished. For example an A
(shown in the table to the left of the
keys) required both a '12' and a '1'
punch.
How to perform 'Special Searches'
Here are some good tips to help you
search google like an expert
1. Explicit Phrase: Lets say you are
looking for content about internet
marketing. Instead of just typing
internet marketing into the Google
search box, you will likely be better
off searching explicitly for the
phrase. To do this, simply enclose
the search phrase within double
quotes.
Example: “internet marketing”
2. Exclude Words: Lets say you
want to search for content about
internet marketing, but you want to
exclude any results that contain the
term advertising. To do this, simply
use the “-“ sign in front of the word
you want to exclude.
Example Search: internet marketing
-advertising
3. Site Specific Search: Often, you
want to search a specific website for
Ishare
content that matches a certain
phrase. Even if the site doesn’t
support a built-in search feature, you
can use Google to search the site for
your term. Simply use the
“site:somesite.com” modifier.
Example: “internet marketing”
site:www.businessmarketingsite.co
m
4. Similar Words and Synonyms:
Let’s say you are want to include a
word in your search, but want
to include results that contain
similar words or synonyms. To
do this, use the “~” in front of
the word.
Example: “internet marketing”
~professional
5. Specific Document Types:
If you’re looking to find results that
are of a specific type, you can use
the modifier “filetype:”. For
example, you might want to find
only PowerPoint presentations
related to internet marketing.
Example: “internet marketing”
filetype:ppt
6. This OR That: By default, when
you do a search, Google will include
all the terms specified in the search.
If you are looking for any one of one
or more terms to match, then you
can use the OR operator. (Note: The
OR has to be capitalized).
Example: internet marketing OR
advertising
7. Phone Listing: Let’s say
someone calls you on your mobile
number and you don’t know how it
is. If all you have is a phone number,
you can look it up on
Google using the
phonebook feature.
Example:
phonebook:617-555-
1212 (note: the
provided number does
not work – you’ll have
to use a real number to get any
results).
8. Area Code Lookup: If all you
need to do is to look-up the area
code for a phone number, just enter
the 3-digit area code and Google
will tell you where it’s from.
Example: 617
9. Numeric Ranges: This is a rarely
used, but highly useful tip. Let’s say
Ishare
you want to find results that contain
any of a range of numbers. You can
do this by using the X..Y modifier
(in case this is hard to read, what’s
between the X and Y are two
periods. This type of search is useful
for years (as shown below), prices or
anywhere where you want to
provide a series of numbers.
Example: president 1940..1950
10. Stock (Ticker Symbol): Just
enter a valid ticker symbol as your
search term and Google will give
you the current financials and a
quick thumb-nail chart for the stock.
Example: GOOG
11. Calculator: The next time you
need to do a quick calculation,
instead of bringing up the Calculator
applet, you can just type your
expression in to Google.
Example: 48512 * 1.02
12. Word Definitions: If you need
to quickly look up the definition of a
word or phrase, simply use the
“define:” command.
Example: define:plethora
13. Searching for URLs containing
certain words. Use the “inurl:word”
modifier.
Example site: googleutilities.com
inurl: google tools
First iPhone worm detected
F-Secure, the IT security solutions company,
has claimed that it has detected the first
iPhone worm called Ikee. “It is only able to
infect devices that have been ‘jailbroken’ by
their owners. Jailbreaking removes iPhone’s
protection mechanisms, allowing users to run
any software they want,” Mr Chia Wing Fei,
Senior Response Manager of F-Secure
Security Labs, said here in a press release.
Affected users would fine that their iPhone
wallpaper has been altered to a picture of Rick
Astley (of Rickroll fame) and the message
‘Ikee is never going to give you up’. The
worm targets the users who have jailbroken
their phone, but have not changed their default
root login password.
Information given by,
Prof. K. Natarajan , Director,
Center for Information Technology
Ishare
Information given by,
Prof. K. Natarajan , Director,
Center for Information Technology
Yahoo! Asked to explain IGNOU online Exam Crash
In the wake of the collapse of its online
entrance exam for engineering
programmers, IGNOU today asked
Yahoo! To submit a report explaining
what went wrong.
IGNOU, which offers distance
education to over 18 lakh students,
failed to conduct the online entrance on
Saturday as the system collapsed
minutes after the exam started. The
university was using the server of
Yahoo! for this test.
“We have asked for the log which will
be examined to find out how the online
testing crashed,” Exam Coordinator,
Prof Shiv Kumar Vyas, said.
Now, classrooms in your Pocket
Students of IGNOU can look forward to
download their study course contents
and get SMS alerts through mobiles. On
Oct-29 the university signed a MoU
with Ericsson India Pvt. Ltd(EIL).
Students of IGNOU will soon get 3G
mobile services at nominal rates. It will
be only Rs.20 or Rs.25. It is economical
too. It is a state-of-the-art technology
being used to connect the remote area
learners.
Students will get SMS alerts and can
downloading files likes assignments and
video clips.
The university is also implementing the
latest Information and Communication
Technologies(ICTs) aimed at reaching
out to the un-reached in the rural areas
across the country.
Ishare
Cyrix: A microprocessor manufacturer. They produce an Intel 486 equivalent - the
Cy486SLC and a Pentium equivalent - the Cyrix 6x86.
DirectX: A Microsoft programming interface standard, first included with Windows 95.
DirectX gives (games) programmers a standard way to gain direct access to enhanced
hardware features under Windows 95 instead of going via the Windows 95 GDI.
DivX: Video compression is a patent-pending software technology that compresses digital
video so it can be downloaded over DSL or cable modems in a relatively short time with no
reduced visual quality.
Dot Matrix Printer: A kind of printer with a vertical column of up to 48 small closely packed
needles or "pins" each of which can be individually forced forwards to press an ink ribbon
against the paper. The print head is repeatedly scanned across the page and different
combinations of needles activated at each point.
Dpi: (Dots Per Inch) A measure of resolution for printers, scanners and displays.
Dual In-Line: Small circuit boards carrying memory integrated circuits, with signal and
power pins on both sides of the board, in contrast to single-in-line memory modules (SIMM).
Emulation: One system is said to emulate another when it performs in exactly the same way,
though perhaps not at the same speed. A typical example would be emulation of one computer
by (a program running on) another.
FDisk: An MS-DOS utility program which prepares a hard disk so that it can be used as a
boot disk and file systems can be created on it. OS/2, NT, Windows 95, Linux, and other Unix
versions all have this command or something similar.
Article title: Jargons
By, M.Jagadeesh,
III BCA C
Ishare
Rainfinity's technology
Rainfinity's technology originated
in a research project at the
California Institute of Technology
(Caltech), in collaboration with
NASA's Jet Propulsion Laboratory
and the Defense Advanced
Research Projects Agency
(DARPA). The name of the
original research project was
RAIN, which stands for Reliable
Array of Independent Nodes. The
goal of the RAIN project was to
identify key software building
blocks for creating reliable
distributed applications using off-
the-shelf hardware. The focus of
the research was on high-
performance, fault-tolerant and
portable clustering technology for
space-borne computing. Two
important assumptions were made,
and these two assumptions reflect
the differentiations between RAIN
and a number of existing solutions
both in the industry and in
academia:
1. The most general share-nothing
model is assumed. There is no
shared storage accessible from all
computing nodes. The only way
for the computing nodes to share
state is to communicate via a
network. This differentiates RAIN
technology from existing back-end
server clustering solutions such as
SUNcluster, HP MC Serviceguard
or Microsoft Cluster Server.
2. The distributed application is
Author
M.Jagadeesh, III BCA ‘C’
Article Title Rainfinity's technology Article Description This article discusses about the Rainfinity's technology which is an unique project in networking.
Ishare
not an isolated system. The
distributed protocols interact
closely with existing networking
protocols so that a RAIN cluster is
able to interact with the
environment. Specifically,
technological modules were
created to handle high-volume
network-based transactions. This
differentiates it from traditional
distributed computing projects
such as Beowulf.
In short, the RAIN project
intended to marry distributed
computing with networking
protocols. It became obvious that
RAIN technology was well-suited
for Internet applications. During
the RAIN project, key components
were built to fulfill this vision. A
patent was filed and granted for
the RAIN technology. Rainfinity
was spun off from Caltech in 1998,
and the company has exclusive
intellectual property rights to the
RAIN technology. After the
formation of the company, the
RAIN technology has been further
augmented, and additional patents
have been filed.
The guiding concepts that shaped
the architecture are as follows:
1. Network Applications
The architecture goals for
clustering data network
applications are different from
clustering data storage
applications. Similar goals apply in
the telecom environment that
provides the Internet backbone
infrastructure, due to the nature of
applications and services being
clustered.
2. Shared-Nothing
The shared-storage cluster is the
most widely used for database and
application servers that store
persistent data on disks. This type
of cluster typically focuses on the
availability of the database or
application service, rather than
performance. Recovery from
Ishare
failover is generally slow, because
restoring application access to
disk-based data takes minutes or
longer, not seconds. Telecom
servers deployed at the edge of the
network are often diskless, keeping
data in memory for performance
reasons, and tolerate low failover
time. Therefore, a new type of
share-nothing cluster with rapid
failure detection and recovery is
required. The only way for the
shared-nothing cluster to share is
to communicate via the network.
3. Scalability
While the high-availability cluster
focuses on recovery from
unplanned and planned
downtimes, this new type of
cluster must also be able to
maximize I/O performance by load
balancing across multiple
computing nodes. Linear
scalability with network
throughput is important. In order
to maximize the total throughput,
load load-balancing decisions must
be made dynamically by
measuring the current capacity of
each computing node in real-time.
Static hashing does not guarantee
an even distribution of traffic.
4. Peer-to-Peer
A dispatcher-based, master-slave
cluster architecture suffers from
scalability by introducing a
potential bottleneck. A peer-to-
peer cluster architecture is more
suitable for latency-sensitive data
network applications processing
short lived sessions. Hybrid
architecture should be considered
to offset the need for more control
over resource management. For
example, a cluster can assign
multiple authoritative computing
nodes that process traffic in the
round-robin order for each
network interface that is clustered
to reduce the overhead of traffic
forwarding
Ishare
Who is Who in Computer?
Who is Who in Computer? Sabeer Bhatia borned in Chandigarh, India and co-founded first free email service site
Hotmail.com with Jack Smith.
Tim Berners-Lee is the inventor of the World Wide Web and Director of the World Wide Web Consortium (W3C).
Larry Page is co-founder of the Google internet search engine, now Google Inc.
Sergey Brin is co-founder of the Google internet search engine, now Google Inc. He co-founded google with Larry Page.
Charles Babbage is known as the father of computer.
Larry Wall is the inventor of Perl, rn,patch, and many other wonderful things. He is the language designer for Perl 6, and has staked out the perl5 to perl6 translator as his own project.
Rasmus Lerdorf is father of PHP.Here is Rasmus pictured in the ship's exotic Greek ballroom at the conclusion of an hour's question and answer session.
James Gosling is a famous software developer, best known as the father of the Java programming language.
Dennis Ritchie is an American computer scientist notable for his influence on ALTRAN, B, BCPL, C, Multics, and Unix.
Bjarne Stroustrup designed and implemented the C++ programming language. He is the College of Engineering Professor in Computer Science at Texas A&M University.
Bill Gates founded Micorsoft with Paul Allen
Michael Dell Michael Saul Dell (born February 23, 1965, in Houston, Texas) is an American businessman and the founder and CEO of Dell, Inc.
Ishare
Chen, Peter
The originator of the Entity-Relationship Model (ER Model), which serves as the foundation of many systems analysis and design methodologies, computer-aided software engineering (CASE) tools, and repository systems including IBM's Repository Manager/MVS and DEC's CDD/Plus. The UML modeling language has its roots in the ER model. Dr. Chen is a Fellow of the IEEE, the ACM, and the AAAS. Since 1994, Dr. Chen has been doing research and teaching on Internet/Web, Java, XML, data warehousing, e-commerce (B2B and B2C), and Internet security.
Codd, Edgar
Codd originated the relational approach to database management in a series of research papers he began in 1970. His paper, "A Relational Model of Data for Large Shared Data Banks," was a seminal paper in a continuing series of papers. Codd built upon this, and in doing so has provided the impetus for widespread research into numerous related areas, including database languages, query subsystems, database semantics, locking and recovery, and inferential subsystems.
Cox, Alan
Building on the work of Linus Torvalds for the Linux operating system, Cox is responsible for much of the code in the Linux kernel, including networking and SMP. He has handled the latter-day 2.0 releases, and serves as one of the primary conduits for patches into the current development kernels. Cox is also responsible for bringing Linux to the Macintosh 68K.
Cray, Seymour
1925(b.)-1996(d.) Regarded as the father of supercomputing. He began his career as a computer scientist working on UNIVAC I. In 1957 Cray helped found Control Data Corp., where he designed the CDC 6600 and the CDC 7600, large-scale computers notable for their high processing speeds. Cray left the company in 1972 to begin Cray Research Inc., where he designed multiprocessor computers allowing simultaneous (parallel) processing. His company's first supercomputer, the Cray-1, came out in 1976 and could perform 240 million calculations per second. Cray also developed an innovative cooling system, using Freon to combat the intense heat of the Cray 1. The Cray Y-MP, introduced in 1988, was capable of 2.6 billion calculations per second.
Ishare
The idea of luring someone to reveal private information is nothing new. Twishing works the same way. A short public message like “see what they're saying about you on xyzblog" followed by a link can direct the unwitting Twitter user to a blog that looks like Twitter, but is actually a site operated by the fraudster, who then seeks to gain personal information. Twitter recently changed its look, which will likely deter twishing for at least a while. But fraudsters are always looking for the next scam. This is very similar to fraudsters who misrepresent themselves as
being from a large financial institution while sending out millions of official e-mails trying to trick legitimate account holders into revealing personal account information. While most of these e-mails will go to people who have no banking relationship with the financial institution, the
phishing e-mail will reach some legitimate account holders. The e-mail will ask account holders to resend their account information – often with the threat of suspending the account if they don’t. Some of the telltale signs that a phishing e-mail is a fraud are typos, poor grammar or incomplete information in the phishing message. But the message limitations of Twitter make it easy to overlook such details. Twitter users will use
Twishing: Beware of the Latest ID Scam
chat and text message abbreviations (e.g., “u" for “you") and grammatical rules are largely ignored. So the hints aren’t as obvious.
Ishare
However, some of the basic steps to protect one’s identity work to protect against twishing just as they do against phishing:
• Don’t provide personal information online • If a message looks suspicious, it probably is • Be cautious in opening “retweeted" items. The last sender
may not be aware of the malicious nature of the message.
Article(who is who,Twishing) by, S.Nithya,
Lecturer, CS Dept
The Vice-Chancellor, Periyar University ,Salem-11
The Registrar, Periyar University ,Salem
The Controller of Examination, Periyar University ,Salem-11
The HOD, Department of Computer Science, Periyar University ,Salem-11
The Principal, Government Arts College for Women, Salem-8
The Principal, Government Arts College for Women , Krishnagiri
The Principal, Government Arts & Science College (W), Burgur,
Kirshnagiri
The Principal, J.K.K Nataraja College of Arts & Science
The Principal, M.G.R College of Arts & Science
The Principal, Sengunthar Arts & Science College
Ishare
The Principal, Muthayammal College of Arts & Science
The Principal, PEE GEE College of Arts &, Science
The Principal, Harur Muthu Arts & Science College for Women
The Principal, Vivekanandha College of Arts & Sciences (W)
The Principal, Mahendra Arts & Science college
The Principal, Selvam Arts & Science college
The Principal, St.Joseph's College of Arts & Science for (W)
The Principal, Vysya College of Arts &, Science
The Principal, NKR Government Arts College for Women
The Principal, Arignar Anna Government Arts College
The Principal, Salem Sowdeswari College
The Principal, P.G.P College of Arts & Science
The Principal, Attur Arts & Science College
The Principal, SSM College of Arts & Science
The Principal, Government Arts College Salem
The Principal, Government Arts College Men
The Principal, Government Arts College, Dharmapuri
The Principal, Gobi Arts and Science College (Autonomous)
The Principal, Sri Kandhan College of Arts & Science
The Principal, Sri Ganesh College of Arts & Science
The Principal, Jairam Arts & Science College
The Principal, Sri Balamurugan College of Arts & Science
The Principal, Rabindharanath Tagore College of Arts & Science for
Women
The Principal, Sri Sakthikailash College for Women
The Principal, PSG College of Arts and Science
The Secretary, PSG College of Arts and Science
The Principal, Kongunadu Arts and Science College(Autonomous)
The Principal, Vivekanandha College for Women
The Principal, Sri Vidhya Mandir Arts & Science College
AAAccchhhiiieeevvveeerrrsss AAArrrccchhhiiivvveeesss
We welcome your valuable comments, suggestions & articles to
Ishare, Department of Computer Science & Applications (UG) K.S.R College of Arts and Science, Tiruchengode-637215
Phone: 04288 -274741(4), Mail : ksrcas.ishare@gmail.com
International Conference Mr.R.Pugazendi, M.Sc., M.Phil., M.E., HOD, Department of Computer science and
applications has Presented a research paper entitled “Mobile Agents – A Solution for Network
Monitoring” in the international conference on Advances in Recent Technologies in
Communication and Computing(ARTcom’2009) which is organized by Association of Computer
Electronics and Electrical Engineers(ACEEE) – a division of engineers network – and
Technically Co-sponsored by the IEEE-Computational Intelligence Society held at Kottyam,
Kerala from 27’Oct to 28’Oct 2009. The paper has been published in IEEE Xplore and IEEE CS
Digital Library.
EXTENSION ACTIVITY “Service is our Motto”
K.S.RANGASAMY COLLEGE OF ARTS AND SCIENCE DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS
Certificate Course on Office Automation and Web Design Government Boys Higher Secondary School, Tiruchengode
Schedule
We welcome your valuable comments, suggestions & articles to Ishare, Department of Computer Science & Applications (UG)
K.S.R College of Arts and Science, Tiruchengode-637215 Phone: 04288 -274741(4), Mail : ksrcas.ishare@gmail.com
Practical Examination is going to be conducted by
Mr. M. Arul Prabhu Mr. V.Harikrishanan
On Date : 01.11.2009
top related