Transcript

Ishare

EDITORIAL … The economic downturn

woes have settled down. Good signs

are visible and the IT sector faces a

new emerging recruiting phase.

Employers seek for right candidate

and not a candidate. They are in

need of employees who possess

multitasking skills. Since we are in

dynamic forum, we have to meet

the multilevel challenges. Hope,

this book serves a droplet of filling

your knowledge ocean. Please send

your comments, suggestions and

articles to the email id:

ksrcas.ishare@gmail.com.

By,

Editorial Board

PATRON

Lion.Dr.K.S.Rangasamy, MJF

Founder & President

ADVISORS

Kavithaa Srinivashaan, M.A.,M.B.A.,

Executive Director

Dr. N. Kannan, M.Sc., Ph.D.

Principal

Prof.K.Natarajan, M.Sc.,M.Phil.,

Director, Center for Information

Technology

Mr. R. Pugazendi, M.Sc.,M.Phil.,M.E.,

HOD, Department of Computer

Science & Applications EDITORIAL TEAM

S.Sasikala, M.Sc., M.Phil., PGDPM &IR.,

S.Ranichandra, M.Sc., MBA.,M.Phil.,

S.Nithya., M.Sc(CS & IT).,

G.Anwar Basha., M.C.A.,

S.Maheswaran, III BCA ’A’.,

M.Karthikeyan, III B.Sc(CS) ’C’.,

& Office bearers of TRACE and ACAI

Ishare

CONTENTS

Articles

1. Windows 7 New Microsoft Release

2. Search Engine-Some Information

3. Who Invented the Internet

4. Forgotten Operating System

5. Key Punch Cards

6. How to Perform Special Searches

Tech Zone

7. Tech Tips

8. Placement Forum

9. HitBits

10. Jargons

11. Trojen Horse

12. Rainfinity Technology

Fun Zone

13. Funny Syntax Error

14. Who is Who , Twishing

Ishare

Trojan Horse

A "Trojan Horse" has come to mean

any trick that causes a target to

invite a foe into a securely protected

bastion or place, now often

associated with "malware" computer

programs presented as useful or

harmless in order to induce the user

to install and run them.

Trojan horse (computing)

A Trojan horse (sometimes

shortened to trojan), is non-self-

replicating malware that appears to

perform a desirable function for the

user but instead facilitates

unauthorized access to the user's

computer system. The term is

derived from the Trojan Horse story

in Greek mythology.

Purpose and operation Trojan horses are designed to allow

a hacker remote access to a target

computer system. Once a Trojan

horse has been installed on a target

computer system, it is possible for a

hacker to access it remotely and

perform various operations. The

operations that a hacker can perform

are limited by user privileges on the

target computer system and the

design of the Trojan horse.

Operations that could be performed

by a hacker on a target computer

system include:

• Use of the machine as part of

a Botnet (e.g. to perform

spamming or to perform

Distributed Denial-of-service

(DDoS) attacks)

• Data theft (e.g. passwords,

credit card information, etc.)

• Installation of software

(including other malware)

• Downloading of files

Author

G.Anwar Basha, Lecturer,

CS Article title Trojen Horse Article Description This article gives the details about the trojen horse malware and some of its technical description.

Ishare

• Uploading of files

• Deletion of files

• Modification of files

• Keystroke logging

• Viewing the user's screen

• Wasting computer storage

space

Trojan horses require interaction

with a hacker to fulfill their purpose,

though the hacker need not be the

individual responsible for

distributing the Trojan horse. In fact,

it is possible for hackers to scan

computers on a network using a port

scanner in the hope of finding one

with a Trojan horse installed, that

the hacker can then use to control

the target computer

Installation and distribution Trojan horses can be installed

through the following methods:

• Software downloads (e.g. a

Trojan horse included as part

of a software application

downloaded from a file

sharing network)

• Websites containing

executable content (e.g. a

Trojan horse in the form of an

ActiveX control)

• Email attachments

Also, there have been reports of

compilers that are themselves Trojan

horses While compiling code to

executable form, they include code

that causes the output executable to

become a Trojan horse.

Removal Antivirus software is designed to

detect and delete Trojan horses, as

well as preventing them from ever

being installed. Although it is

possible to remove a Trojan horse

manually, it requires a full

understanding of how that particular

Trojan horse operates. In addition, if

a Trojan horse has possibly been

used by a hacker to access a

computer system, it will be difficult

to know what damage has been done

and what other problems have been

introduced. In situations where the

security of the computer system is

critical, it is advisable to simply

erase all data from the hard disk and

reinstall the operating system and

required software.

Ishare

Windows 7 is the latest version of

Microsoft Windows, a series of

operating systems produced by

Microsoft for use on personal

computers, including home and

business desktops, laptops,

netbooks, tablet PCs and media

center PCs. Windows 7 was released

to manufacturing on July 22, 2009,

and general retail availability on

October 22, 2009, less than three

years after the release of its

predecessor, Windows Vista.

Windows 7's server counterpart,

Windows Server 2008 R2, was

released at the same time.

Unlike its predecessor, which

introduced a large number of new

features, Windows 7 is intended to

be a more focused, incremental

upgrade to the Windows line, with

the goal of being fully compatible

with applications and hardware with

which Windows Vista is already

compatible. Presentations given by

Microsoft in 2008 focused on multi-

touch support, a redesigned

Windows Shell with a new taskbar,

a home networking system called

Home Group, and performance

improvements. Some applications

that have been included with prior

releases of Microsoft Windows,

including Windows Calendar,

Windows Mail, Windows Movie

Maker, and Windows Photo Gallery,

will not be included in Windows 7;

some will instead be offered

separately as part of the free

Windows Live Essentials suite.

Author

S.Maheswaran, III BCA A

Article title Microsoft’s Invention Article Description This article provides the details about Windows 7 the latest version of Microsoft.

Ishare

Minimum hardware requirements for Windows

7

Architecture 32-bit 64-bit

Processor 1 GHz 32-bit

processor

1 GHz 64-bit

processor

Memory

(RAM)

1 GB of RAM 2 GB of RAM

Graphics

Card

DirectX 9 graphics processor with

WDDM driver model 1.0 (For

Aero)

HDD free

space

16 GB of

available disk

space

20 GB of

available disk

space

Optical drive DVD drive (only to install from

DVD/CD Media)

Additional requirements to use

certain features:

• Bit Locker requires a USB

flash drive to use BitLocker

To Go.

• Windows XP Mode requires

an additional 1 GB of RAM,

an additional 15 GB of

available hard disk space, and

a processor capable of

hardware virtualization with

Intel VT or AMD-V enabled.

Windows 7 includes a number of

new features, such as advances in

touch and handwriting recognition,

support for virtual hard disks,

improved performance on multi-core

processors, improved boot

performance, DirectAccess, and

kernel improvements. Windows 7

adds support for systems using

multiple heterogeneous graphics

cards from different vendors

(Heterogeneous Multi-adapter), a

new version of Windows Media

Center, a Gadget for Windows

Media Center, improved media

features, the XPS Essentials Pack

and Windows PowerShell being

included, and a redesigned

Calculator with multiline

capabilities including Programmer

and Statistics modes along with unit

conversion. Many new items have

been added to the Control Panel,

including ClearType Text Tuner,

Display Color Calibration Wizard,

Gadgets, Recovery,

Troubleshooting, Workspaces

Center, Location and Other Sensors,

Credential Manager, Biometric

Devices, System Icons, and Display.

Windows Security Center has been

renamed to Windows Action Center

(Windows Health Center and

Ishare

Windows Solution Center in earlier

builds), which encompasses both

security and maintenance of the

computer. The default setting for

User Account Control in Windows 7

has been criticized for allowing

untrusted software to be launched

with elevated privileges by

exploiting a trusted application.

Microsoft's Windows kernel

engineer Mark Russinovich

acknowledged the problem, but

noted that there are other

vulnerabilities that do not rely on the

new setting. Windows 7 also

supports Mac-like RAW image

viewing through the addition of

WIC-enabled image decoders, which

enables raw image thumbnails,

previewing and metadata display in

Windows Explorer, plus full-size

viewing and slideshows in Windows

Photo Viewer and Window Media

Center. The taskbar has seen the

biggest visual changes, where the

Quick Launch toolbar has been

replaced with pinning applications to

the taskbar. Buttons for pinned

applications are integrated with the

task buttons. These buttons also

enable the Jump Lists feature to

allow easy access to common tasks.

The revamped taskbar also allows

the reordering of taskbar buttons. To

the far right of the system clock is a

small rectangular button that serves

as the Show desktop icon. This

button is part of the new feature in

Windows 7 called Aero Peek.

Hovering over this button makes all

visible windows transparent for a

quick look at the desktop. In touch-

enabled displays such as touch

screens, tablet PCs, etc., this button

is slightly wider to accommodate

being pressed with a finger. Clicking

this button minimizes all windows,

and clicking it a second time restores

them. Additionally, there is a feature

named Aero Snap, that automatically

maximizes a window when it is

dragged to either the top or left/right

edges of the screen. This also

allows users to snap documents or

files on either side of the screen to

compare them. When a user moves

windows that are maximized, the

system restores their previous state

Ishare

automatically. This functionality is

also accomplished with keyboard

shortcuts. Unlike in Windows Vista,

window borders and the taskbar do

not turn opaque when a window is

maximized with Windows Aero

applied. Instead, they remain

transparent.

For developers, Windows 7 includes

a new networking API with support

for building SOAP-based web

services in native code (as opposed

to .NET-based WCF web services),

new features to shorten application

install times, reduced

UAC prompts, simplified

development of

installation packages,

and improved

globalization support through a new

Extended Linguistic Services API.

At WinHEC 2008 Microsoft

announced that color depths of 30-

bit and 48-bit would be supported in

Windows 7 along with the wide

color gamut scRGB (which for

HDMI 1.3 can be converted and

output as xvYCC). The video modes

supported in Windows 7 are 16-bit

sRGB, 24-bit sRGB, 30-bit sRGB,

30-bit with extended color gamut

sRGB, and 48-bit scRGB. Microsoft

is also implementing better support

for Solid State Drives, including the

new TRIM command, and Windows

7 will be able to identify a Solid

State Drive uniquely. Microsoft is

also planning to support USB 3.0 in

a subsequent patch, although support

would not be included in the initial

release due to delays in the

finalization of the standard. Internet

Spades, Internet Backgammon and

Internet Checkers, which were

removed from Windows

Vista, were restored in

Windows 7. Windows 7 will

include Internet Explorer 8

and Windows Media Player

12.Users will also be able to disable

many more Windows components

than was possible in Windows Vista.

New additions to this list of

components include Internet

Explorer, Windows Media Player,

Windows Media Center, Windows

Search, and the Windows Gadget

Platform. Windows 7 includes 13

Ishare

additional sound schemes, titled

Afternoon, Calligraphy, Characters,

Cityscape, Delta, Festival, Garden,

Heritage, Landscape, Quirky, Raga,

Savanna, and Sonata. A new version

of Virtual PC, Windows Virtual PC

Beta is available for Windows 7

Professional, Enterprise, and

Ultimate editions. It allows multiple

Windows environments, including

Windows XP Mode, to run on the

same machine, requiring the use of

Intel VT-x or AMD-V. Windows XP

Mode runs Windows XP in a virtual

machine and redirects displayed

applications running in Windows XP

to the Windows 7 desktop.

Furthermore Windows 7 supports

the mounting of a virtual hard disk

(VHD) as a normal data storage, and

the bootloader delivered with

Windows 7 can boot the Windows

system from a VHD. The Remote

Desktop Protocol (RDP) of

Windows 7 is also enhanced to

support real-time multimedia

application including video playback

and 3D games. That means that

Direct X 10 can be used in a remote

desktop environment. The three

application limit will be removed

from Windows 7 Starter.

How do you add text abbreviations

to autocorrect in word 2007?

1. Open Microsoft Word 2007.

Press on the Office symbol in

the left top corner.

2. Go to the bottom and press on

the Word Options button.

See the screenshot below.

3. Word options will appear.

Choose Proofing from the left

menu. Now press on the

AutoCorrect Options button

as in the screenshot below.

4. The autocorrect options will

appear. Go down to where it

says replace.

5. Under that type in the

abbreviation you want to use

when you are typing in Word.

I have written yt in this area.

Ishare

6. Now move to the right side

and enter the word that will

appear when the abbreviation

is typed. I have entered You

tube.

7. Therefore when I type yt and

then press the space bar the

word You tube will appear.

8. Now press the add button.

9. Keep entering more

abbreviations and words to

match. Press add after each

one.

10. Press ok when you are

finished.

Article title: Tech Tips

By, G. Manigandaprabhu

II B.Sc(CS) ’B’

Ishare

TOP 5 SEARCH ENGINES IN

THE UNITED STATES (THE

MAJORS) BY RANK

1. Google

Free Submit:

http://www.google.com/

2. Yahoo! Search

Free Submit:

http://submit.search.yaho

o.com/

3. MSN Live Search

Free Submit:

http://search.msn.com/

4. AOL Search - Powered by

Google Submit:

https://adwords.google.co

m/

5. Ask - Powered by Teoma

http://static.wc.ask.com/

TOP 5 ALTERNATIVE SEARCH

ENGINES

Gigablast

Gigablast has a huge index and some

nice advanced search options,

although not terribly advanced. In

addition the search engine provide

directory search using The Open

Directory, blog search and travel

search.

Factbites

The Factbites search engine not just

search for web sites that match your

search term. They search the whole

topic area. In this way it can return

relevant results on your topic that

Author

S.Sasikala,

Lecturer, CS Article Title

Search Engine Article Description This article gives details about the top 5 and semantic search engines and its excellent usage.

Ishare

don’t necessarily mention the word

you searched for.

Exalead

Exalead is a European search

engine. It has some very handy

advanced search options and a new

way of presenting search results.

The advanced features include

truncation, proximity search,

stemming, phonetic search, and

language field search.

Snap

Like Exalead, Snap wants to deliver

visually enhanced search results. It

gives you text on the left and web

site previews on the right. In this

way you don’t have to click through

every search result to see what

you’ll get, but have a chance to

“look before you leap”.

TOP 5 SEMANTIC SEARCH

ENGINES

What is semantic search?

A semantics search engine attempts

to make sense of search results

based on context. It automatically

identifies the concepts structuring

the texts. For instance, if you search

for “election” a semantic search

engine might retrieve documents

containing the words “vote”,

“campaigning” and “ballot”, even if

the word “election” is not found in

the source document.

An important part of this process is

disambiguation, both of the queries

and of the content on the web. What

this means is that the search engine

— through natural language

processing — will know whether

you are looking for a car or a big cat

when you search for “jaguar”.

When to use semantic search

engines

Semantic search has the power to

enhance traditional web search, but

it will not replace it. A large portion

of queries are navigational and

semantic search is not a replacement

for these. Research queries, on the

Ishare

other hand, will benefit from

semantic search.

Hakia

Hakia is a general purpose semantic

search engine, as opposed to

Powerset and Cognition, that search

structured text like Wikipedia.

SenseBot

SenseBot is a web search engine that

summarizes search results into one

concise digest on the topic of your

query. The search engine attempts to

understand what the result pages are

about. For this purpose it uses text

mining to analyze Web pages and

identify their key semantic concepts.

Powerset

Powerset is at present not a regular

web search engine. It works best on

smaller, relatively structured text.

DeepDyve

DeepDyve is a powerful,

professional research tool available

for free for the general public.

Cognition

Cognition has a search business

based on a semantic map, built

over the past 24 years, which the

company claims is the most

comprehensive and complete

map of the English language

available today. It is used in

support of business analytics,

machine translation, document

search, context search, and much

more

• Out of paper on drive D: • Press ESC to enter or Enter

to escape • REALITY.SYS corrupted.

Reboot UNIVERSE [Y,n] ? • The Earth is 98% full.

Please delete anyone you can.

• The world is coming to an end-please log off.

• This copy of planet Earth has been unregistered for 4 billion years

• Track 0 bad?? Don't worry, there's lots of others

• Troubleshooting Shortcut #1: Shoot the trouble!

• Unknown Error on Unknown Device for Unexplainable Reason

• User Failure: Please Insert a Bootable Brain.

Ishare

1. What kind of salary do you

need?

A loaded question. A nasty little

game that you will probably lose if

you answer first. So, do not answer

it. Instead, say something like,

That's a tough question. Can you tell

me the range for this position? In

most cases, the interviewer, taken

off guard, will tell you. If not, say

that it can depend on the details of

the job. Then give a wide range.

2. Are you a team player?

You are, of course, a team player.

Be sure to have examples ready.

Specifics that show you often

perform for the good of the team

rather than for yourself are good

evidence of your team attitude. Do

not brag, just say it in a matter-of-

fact tone. This is a key point.

3. How long would you expect to

work for us if hired?

Specifics here are not good.

Something like this should work: I'd

like it to be a long time. Or As long

as we both feel I'm doing a good job.

4. Have you ever had to fire

anyone? How did you feel about

that?

This is serious. Do not make light of

it or in any way seem like you like

to fire people. At the same time, you

will do it when it is the right thing to

do. When it comes to the

organization versus the individual

who has created a harmful situation,

you will protect the organization.

Remember firing is not the same as

layoff or reduction in force.

5. What is your philosophy

towards work?

Author

M. Mohammad arif , II B.Sc(CS) B Article title Interview Tips Article description This article helps to face the interview as what HR expected.

Ishare

The interviewer is not looking for a

long or flowery dissertation here. Do

you have strong feelings that the job

gets done? Yes. That's the type of

answer that works best here. Short

and positive, showing a benefit to

the organization.

6. If you had enough money to

retire right now, would you?

Answer yes if you would. But since

you need to work, this is the type of

work you prefer. Do not say yes if

you do not mean it.

7. Have you ever been asked to

leave a position?

If you have not, say no. If you have,

be honest, brief and avoid saying

negative things about the people or

organization involved.

8. Explain how you would be an

asset to this organization.

You should be anxious for this

question. It gives you a chance to

highlight your best points as they

relate to the position being

discussed. Give a little advance

thought to this relationship.

9. Why should we hire you?

Point out how your assets meet what

the organization needs. Do not

mention any other candidates to

make a comparison.

10. Tell me about a suggestion you

have made.

Have a good one ready. Be sure and

use a suggestion that was accepted

and was then considered successful.

One related to the type of work

applied for is a real plus. Get ready

for the campus interview. Wipro is

nearby..

WHO INVENTED THE

INTERNET?

Author

T.Vinodhini II-BCA-C

Article title Birth of Internet. Article Description This article gives the details about history of Internet.

Ishare

A single person did not create

the Internet that we know and use

today. Below is a listing of several

different people who've helped

contribute and develop the Internet.

IDEA:

The initial idea is credited as being

Leonard Kleinrock's after he

published his first paper entitled

"Information Flow in Large

Communication Nets" on May 31,

1961.

In 1962 J.C.R. Licklider becomes

the first Director of IPTO and gave

his vision of a galactic network. In

addition to the ideas from Licklider

and Kleinrock, Robert Taylor helped

create the idea of the network, which

later became ARPANET.

Initial creation:

The Internet as we know it today

first started being developed in the

late 1960's. In the summer of 1968

the Network Working Group

(NWG) held its first meeting chaired

by Elmer Shapiro with the Stanford

Research Institute (SRI) with

attendees: Steve Carr, Steve

Crocker, Jeff Rulifson, and Ron

Stoughton. In the meeting the group

discussed solving issues related to

getting hosts to communicate with

each other. In December 1968 Elmer

Shapiro with SRI released a report

"A Study of Computer Network

Design Parameters." Based on this

work and earlier work done by Paul

Baran, Thomas Marill and others;

Lawrence Roberts and Barry

Wessler helped to create the final

version of the Interface Message

Processor (IMP) specifications. Bolt

Beranek and Newman, Inc. (BBN)

was later awarded the contract to

design and build the IMP sub

network.

Introduction of the Internet to the

general public

UCLA puts out a press release

introducing the public to the Internet

on July 3, 1969.

First network equipment

August 29, 1969 the first network

switch and the first piece of network

equipment called "IMP", which is

short for (Interface Message

Processor) is sent to UCLA and on

Ishare

September 2, 1969 the first data

moves from UCLA host to the

switch.

The first distributed message

On Friday October 29, 1969 the first

Internet message was sent from

computer science Professor Leonard

KleinRock's laboratory at UCLA,

after the second piece of network

equipment was installed at SLI. This

connection not only enabled the first

transmission to be made but is also

considered to be the first Internet

backbone.

The first message to be distributed

was "LO", which was an attempt at

"LOGIN" by Charley S. Kline to log

into the SLI computer from UCLA.

However, the message was unable to

be completed because the SLI

system crashed. Shortly after the

crash the issue was resolved and he

was able to log into the computer.

E-mail is developed

Ray Tomlinson introduces network

e-mail in 1972, the first messaging

system to send messages across a

network to other users.

TCP is developed

Vinton Cerf and Robert Kahn design

TCP during 1973 and later publish it

with the help of Yogen Dalal and

Carl Sunshine in December of 1974

in RFC 675.

Ethernet is conceived

Bob Metcalfe develops Ethernet idea

in 1973.

TCP/IP is created

In 1978 TCP splits into TCP/IP

driven by Danny Cohen, David

Reed, and John Shoch to support

real-time traffic. This allows the

creation of UDP. TCP/IP is later

standardized into ARPANET in

1983 and is still the primary protocol

used for the Internet.

DNS is introduced

Paul Mockapetris and Jon Postel

introduce DNS in 1984.

HTML

Ishare

In 1990 Tim Berners-Lee develops

HTML, which makes a huge

contribution to how we navigate and

view the Internet today.

WWW

Tim Berners-Lee introduces WWW

to the public on August 6, 1991.

Amiga OS

Year created: 1985

Company: Commodore

What happened?

Ars Technica put it best when in

2005, it wrote: "The Amiga

computer was a machine ahead of its

time. When it was released in 1985,

its color screen (4096 colors in

HAM mode!), four-channel sampled

stereo sound, preemptive

multitasking GUI, and custom chips

to accelerate both sound and

graphics made the year-old

Author

Muruganandham.N, III BCA- "B".

Article Title Forgotten Operating System Article Description This article provides information regarding the past OS used, which are not in use now-a-days.

Ishare

Macintosh seem antiquated and the

PC positively Paleolithic. Steve Jobs

was reported to be extremely

worried about the Amiga, but

fortunately for him and Apple,

Commodore had absolutely no idea

what they were doing."

BeOS

Year created: 1991

Company: Be Inc.

What happened?

Apple offered to buy Be Inc

for $125 million in 1995, but CEO

Jean-Louis Gassée wanted $200

million. Apple bought Steve Jobs's

NeXT instead, and Palm acquired

the company's assets for $11 million

in 2001.

OS/2

Year created: 1985

Company: IBM

What happened?

Microsoft and IBM joined to create

OS/2 in 1985, but when Windows 3

became a huge hit, the partnership

unraveled in 1990. Though no

longer supported by IBM, the

operating system still runs on many

ATMs today.

Arthur

Year created: 1987

Company: Acorn Computers Ltd

What happened?

Developed in five months,

Arthur was supposed to be a short-

term scab, but it stuck around until

the RISC OS was developed in

1989. That operating system is still

in use, but we don't know anyone

who uses it.

Desktop Linux

Year created: ~1996

Company: Linux desktops are open

source.

What happened?

2010 is almost certain to be

the year of desktop Linux. Just like

2009. And 2008. And…

Inferno (operating system)

Year created: 1996

Company: Bell Labs

What happened?

It's an open source operating

system, so there are versions of it

still out there. But they don't work

above the basement floor.

XTS-400

Year created: 1992

Ishare

Company: BAE Systems

What happened?

Valued for their security, this

operating system and its successors

are still used in military technology.

Palm OS (also known as Garnet

OS)

Year created: 1996

Company: Palm Inc.

What happened?

In 2002, Palm spun the OS

out as its own company. Innovation

pretty much ended there and what

was once a very strong pioneering

OS for PDAs, couldn't keep up when

it came to the Web and multimedia.

UIQ (formerly known as User

Interface Quartz)

Year created: 1998

Company: Ericsson

What happened?

UIQ went into bankruptcy this

year after the Symbian Foundation

chose to base future user-interfaces

on the S60 OS.

Program spindle for IBM 026 or 029

card punch. For repeated data entry

with a fixed card format, the card

punch could be set up to skip certain

columns, wait for key input, or

duplicate information from the

previous card. Program cards were

punched on the same keypunch,

removed, wrapped around the drum,

and inserted in the keypunch above

the punch position. Control by the

card could be enabled and disabled

by the operator with a lever.

Author

Muruganandham.N, III BCA- "B".

Article Title Keypunch Card Article Description This article provides that full details about the punching card system.

Ishare

Punch card chad - a jar of 'holes'

punched from cards on an IBM '029'

punch. These are rectangular in

shape, have the color of the card,

and usually bear the small printed

column number that was punched

out from the card.

Manual card punch from Wright

Line. Numeric digits could be

inserted directly from the keys.

Alphabetic and special characters

required 2 or 3 holes obtained by

pressing all needed keys while

holding down the 'S' key at bottom

until finished. For example an A

(shown in the table to the left of the

keys) required both a '12' and a '1'

punch.

How to perform 'Special Searches'

Here are some good tips to help you

search google like an expert

1. Explicit Phrase: Lets say you are

looking for content about internet

marketing. Instead of just typing

internet marketing into the Google

search box, you will likely be better

off searching explicitly for the

phrase. To do this, simply enclose

the search phrase within double

quotes.

Example: “internet marketing”

2. Exclude Words: Lets say you

want to search for content about

internet marketing, but you want to

exclude any results that contain the

term advertising. To do this, simply

use the “-“ sign in front of the word

you want to exclude.

Example Search: internet marketing

-advertising

3. Site Specific Search: Often, you

want to search a specific website for

Ishare

content that matches a certain

phrase. Even if the site doesn’t

support a built-in search feature, you

can use Google to search the site for

your term. Simply use the

“site:somesite.com” modifier.

Example: “internet marketing”

site:www.businessmarketingsite.co

m

4. Similar Words and Synonyms:

Let’s say you are want to include a

word in your search, but want

to include results that contain

similar words or synonyms. To

do this, use the “~” in front of

the word.

Example: “internet marketing”

~professional

5. Specific Document Types:

If you’re looking to find results that

are of a specific type, you can use

the modifier “filetype:”. For

example, you might want to find

only PowerPoint presentations

related to internet marketing.

Example: “internet marketing”

filetype:ppt

6. This OR That: By default, when

you do a search, Google will include

all the terms specified in the search.

If you are looking for any one of one

or more terms to match, then you

can use the OR operator. (Note: The

OR has to be capitalized).

Example: internet marketing OR

advertising

7. Phone Listing: Let’s say

someone calls you on your mobile

number and you don’t know how it

is. If all you have is a phone number,

you can look it up on

Google using the

phonebook feature.

Example:

phonebook:617-555-

1212 (note: the

provided number does

not work – you’ll have

to use a real number to get any

results).

8. Area Code Lookup: If all you

need to do is to look-up the area

code for a phone number, just enter

the 3-digit area code and Google

will tell you where it’s from.

Example: 617

9. Numeric Ranges: This is a rarely

used, but highly useful tip. Let’s say

Ishare

you want to find results that contain

any of a range of numbers. You can

do this by using the X..Y modifier

(in case this is hard to read, what’s

between the X and Y are two

periods. This type of search is useful

for years (as shown below), prices or

anywhere where you want to

provide a series of numbers.

Example: president 1940..1950

10. Stock (Ticker Symbol): Just

enter a valid ticker symbol as your

search term and Google will give

you the current financials and a

quick thumb-nail chart for the stock.

Example: GOOG

11. Calculator: The next time you

need to do a quick calculation,

instead of bringing up the Calculator

applet, you can just type your

expression in to Google.

Example: 48512 * 1.02

12. Word Definitions: If you need

to quickly look up the definition of a

word or phrase, simply use the

“define:” command.

Example: define:plethora

13. Searching for URLs containing

certain words. Use the “inurl:word”

modifier.

Example site: googleutilities.com

inurl: google tools

First iPhone worm detected

F-Secure, the IT security solutions company,

has claimed that it has detected the first

iPhone worm called Ikee. “It is only able to

infect devices that have been ‘jailbroken’ by

their owners. Jailbreaking removes iPhone’s

protection mechanisms, allowing users to run

any software they want,” Mr Chia Wing Fei,

Senior Response Manager of F-Secure

Security Labs, said here in a press release.

Affected users would fine that their iPhone

wallpaper has been altered to a picture of Rick

Astley (of Rickroll fame) and the message

‘Ikee is never going to give you up’. The

worm targets the users who have jailbroken

their phone, but have not changed their default

root login password.

Information given by,

Prof. K. Natarajan , Director,

Center for Information Technology

Ishare

Information given by,

Prof. K. Natarajan , Director,

Center for Information Technology

Yahoo! Asked to explain IGNOU online Exam Crash

In the wake of the collapse of its online

entrance exam for engineering

programmers, IGNOU today asked

Yahoo! To submit a report explaining

what went wrong.

IGNOU, which offers distance

education to over 18 lakh students,

failed to conduct the online entrance on

Saturday as the system collapsed

minutes after the exam started. The

university was using the server of

Yahoo! for this test.

“We have asked for the log which will

be examined to find out how the online

testing crashed,” Exam Coordinator,

Prof Shiv Kumar Vyas, said.

Now, classrooms in your Pocket

Students of IGNOU can look forward to

download their study course contents

and get SMS alerts through mobiles. On

Oct-29 the university signed a MoU

with Ericsson India Pvt. Ltd(EIL).

Students of IGNOU will soon get 3G

mobile services at nominal rates. It will

be only Rs.20 or Rs.25. It is economical

too. It is a state-of-the-art technology

being used to connect the remote area

learners.

Students will get SMS alerts and can

downloading files likes assignments and

video clips.

The university is also implementing the

latest Information and Communication

Technologies(ICTs) aimed at reaching

out to the un-reached in the rural areas

across the country.

Ishare

Cyrix: A microprocessor manufacturer. They produce an Intel 486 equivalent - the

Cy486SLC and a Pentium equivalent - the Cyrix 6x86.

DirectX: A Microsoft programming interface standard, first included with Windows 95.

DirectX gives (games) programmers a standard way to gain direct access to enhanced

hardware features under Windows 95 instead of going via the Windows 95 GDI.

DivX: Video compression is a patent-pending software technology that compresses digital

video so it can be downloaded over DSL or cable modems in a relatively short time with no

reduced visual quality.

Dot Matrix Printer: A kind of printer with a vertical column of up to 48 small closely packed

needles or "pins" each of which can be individually forced forwards to press an ink ribbon

against the paper. The print head is repeatedly scanned across the page and different

combinations of needles activated at each point.

Dpi: (Dots Per Inch) A measure of resolution for printers, scanners and displays.

Dual In-Line: Small circuit boards carrying memory integrated circuits, with signal and

power pins on both sides of the board, in contrast to single-in-line memory modules (SIMM).

Emulation: One system is said to emulate another when it performs in exactly the same way,

though perhaps not at the same speed. A typical example would be emulation of one computer

by (a program running on) another.

FDisk: An MS-DOS utility program which prepares a hard disk so that it can be used as a

boot disk and file systems can be created on it. OS/2, NT, Windows 95, Linux, and other Unix

versions all have this command or something similar.

Article title: Jargons

By, M.Jagadeesh,

III BCA C

Ishare

Rainfinity's technology

Rainfinity's technology originated

in a research project at the

California Institute of Technology

(Caltech), in collaboration with

NASA's Jet Propulsion Laboratory

and the Defense Advanced

Research Projects Agency

(DARPA). The name of the

original research project was

RAIN, which stands for Reliable

Array of Independent Nodes. The

goal of the RAIN project was to

identify key software building

blocks for creating reliable

distributed applications using off-

the-shelf hardware. The focus of

the research was on high-

performance, fault-tolerant and

portable clustering technology for

space-borne computing. Two

important assumptions were made,

and these two assumptions reflect

the differentiations between RAIN

and a number of existing solutions

both in the industry and in

academia:

1. The most general share-nothing

model is assumed. There is no

shared storage accessible from all

computing nodes. The only way

for the computing nodes to share

state is to communicate via a

network. This differentiates RAIN

technology from existing back-end

server clustering solutions such as

SUNcluster, HP MC Serviceguard

or Microsoft Cluster Server.

2. The distributed application is

Author

M.Jagadeesh, III BCA ‘C’

Article Title Rainfinity's technology Article Description This article discusses about the Rainfinity's technology which is an unique project in networking.

Ishare

not an isolated system. The

distributed protocols interact

closely with existing networking

protocols so that a RAIN cluster is

able to interact with the

environment. Specifically,

technological modules were

created to handle high-volume

network-based transactions. This

differentiates it from traditional

distributed computing projects

such as Beowulf.

In short, the RAIN project

intended to marry distributed

computing with networking

protocols. It became obvious that

RAIN technology was well-suited

for Internet applications. During

the RAIN project, key components

were built to fulfill this vision. A

patent was filed and granted for

the RAIN technology. Rainfinity

was spun off from Caltech in 1998,

and the company has exclusive

intellectual property rights to the

RAIN technology. After the

formation of the company, the

RAIN technology has been further

augmented, and additional patents

have been filed.

The guiding concepts that shaped

the architecture are as follows:

1. Network Applications

The architecture goals for

clustering data network

applications are different from

clustering data storage

applications. Similar goals apply in

the telecom environment that

provides the Internet backbone

infrastructure, due to the nature of

applications and services being

clustered.

2. Shared-Nothing

The shared-storage cluster is the

most widely used for database and

application servers that store

persistent data on disks. This type

of cluster typically focuses on the

availability of the database or

application service, rather than

performance. Recovery from

Ishare

failover is generally slow, because

restoring application access to

disk-based data takes minutes or

longer, not seconds. Telecom

servers deployed at the edge of the

network are often diskless, keeping

data in memory for performance

reasons, and tolerate low failover

time. Therefore, a new type of

share-nothing cluster with rapid

failure detection and recovery is

required. The only way for the

shared-nothing cluster to share is

to communicate via the network.

3. Scalability

While the high-availability cluster

focuses on recovery from

unplanned and planned

downtimes, this new type of

cluster must also be able to

maximize I/O performance by load

balancing across multiple

computing nodes. Linear

scalability with network

throughput is important. In order

to maximize the total throughput,

load load-balancing decisions must

be made dynamically by

measuring the current capacity of

each computing node in real-time.

Static hashing does not guarantee

an even distribution of traffic.

4. Peer-to-Peer

A dispatcher-based, master-slave

cluster architecture suffers from

scalability by introducing a

potential bottleneck. A peer-to-

peer cluster architecture is more

suitable for latency-sensitive data

network applications processing

short lived sessions. Hybrid

architecture should be considered

to offset the need for more control

over resource management. For

example, a cluster can assign

multiple authoritative computing

nodes that process traffic in the

round-robin order for each

network interface that is clustered

to reduce the overhead of traffic

forwarding

Ishare

Who is Who in Computer?

Who is Who in Computer? Sabeer Bhatia borned in Chandigarh, India and co-founded first free email service site

Hotmail.com with Jack Smith.

Tim Berners-Lee is the inventor of the World Wide Web and Director of the World Wide Web Consortium (W3C).

Larry Page is co-founder of the Google internet search engine, now Google Inc.

Sergey Brin is co-founder of the Google internet search engine, now Google Inc. He co-founded google with Larry Page.

Charles Babbage is known as the father of computer.

Larry Wall is the inventor of Perl, rn,patch, and many other wonderful things. He is the language designer for Perl 6, and has staked out the perl5 to perl6 translator as his own project.

Rasmus Lerdorf is father of PHP.Here is Rasmus pictured in the ship's exotic Greek ballroom at the conclusion of an hour's question and answer session.

James Gosling is a famous software developer, best known as the father of the Java programming language.

Dennis Ritchie is an American computer scientist notable for his influence on ALTRAN, B, BCPL, C, Multics, and Unix.

Bjarne Stroustrup designed and implemented the C++ programming language. He is the College of Engineering Professor in Computer Science at Texas A&M University.

Bill Gates founded Micorsoft with Paul Allen

Michael Dell Michael Saul Dell (born February 23, 1965, in Houston, Texas) is an American businessman and the founder and CEO of Dell, Inc.

Ishare

Chen, Peter

The originator of the Entity-Relationship Model (ER Model), which serves as the foundation of many systems analysis and design methodologies, computer-aided software engineering (CASE) tools, and repository systems including IBM's Repository Manager/MVS and DEC's CDD/Plus. The UML modeling language has its roots in the ER model. Dr. Chen is a Fellow of the IEEE, the ACM, and the AAAS. Since 1994, Dr. Chen has been doing research and teaching on Internet/Web, Java, XML, data warehousing, e-commerce (B2B and B2C), and Internet security.

Codd, Edgar

Codd originated the relational approach to database management in a series of research papers he began in 1970. His paper, "A Relational Model of Data for Large Shared Data Banks," was a seminal paper in a continuing series of papers. Codd built upon this, and in doing so has provided the impetus for widespread research into numerous related areas, including database languages, query subsystems, database semantics, locking and recovery, and inferential subsystems.

Cox, Alan

Building on the work of Linus Torvalds for the Linux operating system, Cox is responsible for much of the code in the Linux kernel, including networking and SMP. He has handled the latter-day 2.0 releases, and serves as one of the primary conduits for patches into the current development kernels. Cox is also responsible for bringing Linux to the Macintosh 68K.

Cray, Seymour

1925(b.)-1996(d.) Regarded as the father of supercomputing. He began his career as a computer scientist working on UNIVAC I. In 1957 Cray helped found Control Data Corp., where he designed the CDC 6600 and the CDC 7600, large-scale computers notable for their high processing speeds. Cray left the company in 1972 to begin Cray Research Inc., where he designed multiprocessor computers allowing simultaneous (parallel) processing. His company's first supercomputer, the Cray-1, came out in 1976 and could perform 240 million calculations per second. Cray also developed an innovative cooling system, using Freon to combat the intense heat of the Cray 1. The Cray Y-MP, introduced in 1988, was capable of 2.6 billion calculations per second.

Ishare

The idea of luring someone to reveal private information is nothing new. Twishing works the same way. A short public message like “see what they're saying about you on xyzblog" followed by a link can direct the unwitting Twitter user to a blog that looks like Twitter, but is actually a site operated by the fraudster, who then seeks to gain personal information. Twitter recently changed its look, which will likely deter twishing for at least a while. But fraudsters are always looking for the next scam. This is very similar to fraudsters who misrepresent themselves as

being from a large financial institution while sending out millions of official e-mails trying to trick legitimate account holders into revealing personal account information. While most of these e-mails will go to people who have no banking relationship with the financial institution, the

phishing e-mail will reach some legitimate account holders. The e-mail will ask account holders to resend their account information – often with the threat of suspending the account if they don’t. Some of the telltale signs that a phishing e-mail is a fraud are typos, poor grammar or incomplete information in the phishing message. But the message limitations of Twitter make it easy to overlook such details. Twitter users will use

Twishing: Beware of the Latest ID Scam

chat and text message abbreviations (e.g., “u" for “you") and grammatical rules are largely ignored. So the hints aren’t as obvious.

Ishare

However, some of the basic steps to protect one’s identity work to protect against twishing just as they do against phishing:

• Don’t provide personal information online • If a message looks suspicious, it probably is • Be cautious in opening “retweeted" items. The last sender

may not be aware of the malicious nature of the message.

Article(who is who,Twishing) by, S.Nithya,

Lecturer, CS Dept

The Vice-Chancellor, Periyar University ,Salem-11

The Registrar, Periyar University ,Salem

The Controller of Examination, Periyar University ,Salem-11

The HOD, Department of Computer Science, Periyar University ,Salem-11

The Principal, Government Arts College for Women, Salem-8

The Principal, Government Arts College for Women , Krishnagiri

The Principal, Government Arts & Science College (W), Burgur,

Kirshnagiri

The Principal, J.K.K Nataraja College of Arts & Science

The Principal, M.G.R College of Arts & Science

The Principal, Sengunthar Arts & Science College

Ishare

The Principal, Muthayammal College of Arts & Science

The Principal, PEE GEE College of Arts &, Science

The Principal, Harur Muthu Arts & Science College for Women

The Principal, Vivekanandha College of Arts & Sciences (W)

The Principal, Mahendra Arts & Science college

The Principal, Selvam Arts & Science college

The Principal, St.Joseph's College of Arts & Science for (W)

The Principal, Vysya College of Arts &, Science

The Principal, NKR Government Arts College for Women

The Principal, Arignar Anna Government Arts College

The Principal, Salem Sowdeswari College

The Principal, P.G.P College of Arts & Science

The Principal, Attur Arts & Science College

The Principal, SSM College of Arts & Science

The Principal, Government Arts College Salem

The Principal, Government Arts College Men

The Principal, Government Arts College, Dharmapuri

The Principal, Gobi Arts and Science College (Autonomous)

The Principal, Sri Kandhan College of Arts & Science

The Principal, Sri Ganesh College of Arts & Science

The Principal, Jairam Arts & Science College

The Principal, Sri Balamurugan College of Arts & Science

The Principal, Rabindharanath Tagore College of Arts & Science for

Women

The Principal, Sri Sakthikailash College for Women

The Principal, PSG College of Arts and Science

The Secretary, PSG College of Arts and Science

The Principal, Kongunadu Arts and Science College(Autonomous)

The Principal, Vivekanandha College for Women

The Principal, Sri Vidhya Mandir Arts & Science College

AAAccchhhiiieeevvveeerrrsss AAArrrccchhhiiivvveeesss

We welcome your valuable comments, suggestions & articles to

Ishare, Department of Computer Science & Applications (UG) K.S.R College of Arts and Science, Tiruchengode-637215

Phone: 04288 -274741(4), Mail : ksrcas.ishare@gmail.com

International Conference Mr.R.Pugazendi, M.Sc., M.Phil., M.E., HOD, Department of Computer science and

applications has Presented a research paper entitled “Mobile Agents – A Solution for Network

Monitoring” in the international conference on Advances in Recent Technologies in

Communication and Computing(ARTcom’2009) which is organized by Association of Computer

Electronics and Electrical Engineers(ACEEE) – a division of engineers network – and

Technically Co-sponsored by the IEEE-Computational Intelligence Society held at Kottyam,

Kerala from 27’Oct to 28’Oct 2009. The paper has been published in IEEE Xplore and IEEE CS

Digital Library.

EXTENSION ACTIVITY “Service is our Motto”

K.S.RANGASAMY COLLEGE OF ARTS AND SCIENCE DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS

Certificate Course on Office Automation and Web Design Government Boys Higher Secondary School, Tiruchengode

Schedule

We welcome your valuable comments, suggestions & articles to Ishare, Department of Computer Science & Applications (UG)

K.S.R College of Arts and Science, Tiruchengode-637215 Phone: 04288 -274741(4), Mail : ksrcas.ishare@gmail.com

Practical Examination is going to be conducted by

Mr. M. Arul Prabhu Mr. V.Harikrishanan

On Date : 01.11.2009

top related