Anda di halaman 1dari 36

Ishare

PATRON EDITORIAL …
Lion.Dr.K.S.Rangasamy, MJF The economic downturn
Founder & President woes have settled down. Good signs
ADVISORS are visible and the IT sector faces a

Kavithaa Srinivashaan, M.A.,M.B.A., new emerging recruiting phase.


Employers seek for right candidate
Executive Director
and not a candidate. They are in
Dr. N. Kannan, M.Sc., Ph.D.
need of employees who possess
Principal
multitasking skills. Since we are in
Prof.K.Natarajan, M.Sc.,M.Phil.,
dynamic forum, we have to meet
Director, Center for Information
the multilevel challenges. Hope,
Technology this book serves a droplet of filling
Mr. R. Pugazendi, M.Sc.,M.Phil.,M.E., your knowledge ocean. Please send
HOD, Department of Computer your comments, suggestions and
Science & Applications articles to the email id:
EDITORIAL TEAM ksrcas.ishare@gmail.com.

S.Sasikala, M.Sc., M.Phil., PGDPM &IR.,


By,
S.Ranichandra, M.Sc., MBA.,M.Phil.,
Editorial Board
S.Nithya., M.Sc(CS & IT).,
G.Anwar Basha., M.C.A.,
S.Maheswaran, III BCA ’A’.,
M.Karthikeyan, III B.Sc(CS) ’C’.,
& Office bearers of TRACE and ACAI
Ishare

CONTENTS
Articles
1. Windows 7 New Microsoft Release
2. Search Engine-Some Information
3. Who Invented the Internet
4. Forgotten Operating System
5. Key Punch Cards
6. How to Perform Special Searches
Tech Zone
7. Tech Tips
8. Placement Forum
9. HitBits
10. Jargons
11. Trojen Horse
12. Rainfinity Technology
Fun Zone
13. Funny Syntax Error
14. Who is Who , Twishing
Ishare

unauthorized access to the user's


Trojan Horse
computer system. The term is
Author
derived from the Trojan Horse story
in Greek mythology.
Purpose and operation
G.Anwar Basha, Lecturer,
CS Trojan horses are designed to allow
Article title a hacker remote access to a target
Trojen Horse
Article Description computer system. Once a Trojan
This article gives the details horse has been installed on a target
about the trojen horse malware
and some of its technical computer system, it is possible for a
description. hacker to access it remotely and
A "Trojan Horse" has come to mean
perform various operations. The
any trick that causes a target to
operations that a hacker can perform
invite a foe into a securely protected
are limited by user privileges on the
bastion or place, now often
target computer system and the
associated with "malware" computer
design of the Trojan horse.
programs presented as useful or
Operations that could be performed
harmless in order to induce the user
by a hacker on a target computer
to install and run them.
system include:
Trojan horse (computing)
• Use of the machine as part of
a Botnet (e.g. to perform
spamming or to perform
Distributed Denial-of-service
(DDoS) attacks)
• Data theft (e.g. passwords,
A Trojan horse (sometimes
credit card information, etc.)
shortened to trojan), is non-self-
• Installation of software
replicating malware that appears to
(including other malware)
perform a desirable function for the
• Downloading of files
user but instead facilitates
Ishare

• Uploading of files Trojan horse in the form of an


• Deletion of files ActiveX control)
• Modification of files • Email attachments
• Keystroke logging Also, there have been reports of
• Viewing the user's screen compilers that are themselves Trojan
• Wasting computer storage horses While compiling code to
space executable form, they include code
Trojan horses require interaction that causes the output executable to
with a hacker to fulfill their purpose, become a Trojan horse.
though the hacker need not be the Removal
individual responsible for Antivirus software is designed to
distributing the Trojan horse. In fact, detect and delete Trojan horses, as
it is possible for hackers to scan well as preventing them from ever
computers on a network using a port being installed. Although it is
scanner in the hope of finding one possible to remove a Trojan horse
with a Trojan horse installed, that manually, it requires a full
the hacker can then use to control understanding of how that particular
the target computer Trojan horse operates. In addition, if
Installation and distribution a Trojan horse has possibly been
Trojan horses can be installed used by a hacker to access a
through the following methods: computer system, it will be difficult
• Software downloads (e.g. a to know what damage has been done
Trojan horse included as part and what other problems have been
of a software application introduced. In situations where the
downloaded from a file security of the computer system is
sharing network) critical, it is advisable to simply
• Websites containing erase all data from the hard disk and
executable content (e.g. a reinstall the operating system and
required software.
Ishare

Unlike its predecessor, which


Author introduced a large number of new
features, Windows 7 is intended to
be a more focused, incremental
S.Maheswaran, III BCA A upgrade to the Windows line, with
Article title
Microsoft’s Invention the goal of being fully compatible
Article Description with applications and hardware with
This article provides the
details about Windows 7 the which Windows Vista is already
latest version of Microsoft. compatible. Presentations given by
Windows 7 is the latest version of Microsoft in 2008 focused on multi-
Microsoft Windows, a series of touch support, a redesigned
operating systems produced by Windows Shell with a new taskbar,
Microsoft for use on personal a home networking system called
computers, including home and Home Group, and performance
business desktops, laptops, improvements. Some applications
netbooks, tablet PCs and media that have been included with prior
center PCs. Windows 7 was released releases of Microsoft Windows,
to manufacturing on July 22, 2009, including Windows Calendar,
and general retail availability on Windows Mail, Windows Movie
October 22, 2009, less than three Maker, and Windows Photo Gallery,
years after the release of its will not be included in Windows 7;
predecessor, Windows Vista. some will instead be offered
Windows 7's server counterpart, separately as part of the free
Windows Server 2008 R2, was Windows Live Essentials suite.
released at the same time.
Ishare

improved performance on multi-core


processors, improved boot
Minimum hardware requirements for Windows
7 performance, DirectAccess, and
Architecture 32-bit 64-bit kernel improvements. Windows 7
Processor 1 GHz 32-bit 1 GHz 64-bit
adds support for systems using
processor processor
Memory 1 GB of RAM 2 GB of RAM
multiple heterogeneous graphics
(RAM) cards from different vendors
Graphics DirectX 9 graphics processor with (Heterogeneous Multi-adapter), a
Card WDDM driver model 1.0 (For
Aero)
new version of Windows Media
HDD free 16 GB of 20 GB of Center, a Gadget for Windows
space available disk available disk
Media Center, improved media
space space
Optical drive DVD drive (only to install from
features, the XPS Essentials Pack
DVD/CD Media) and Windows PowerShell being
Additional requirements to use included, and a redesigned
certain features: Calculator with multiline
• Bit Locker requires a USB capabilities including Programmer
flash drive to use BitLocker and Statistics modes along with unit
To Go. conversion. Many new items have
• Windows XP Mode requires been added to the Control Panel,
an additional 1 GB of RAM, including ClearType Text Tuner,
an additional 15 GB of Display Color Calibration Wizard,
available hard disk space, and Gadgets, Recovery,
a processor capable of Troubleshooting, Workspaces
hardware virtualization with Center, Location and Other Sensors,
Intel VT or AMD-V enabled. Credential Manager, Biometric
Windows 7 includes a number of Devices, System Icons, and Display.
new features, such as advances in Windows Security Center has been
touch and handwriting recognition, renamed to Windows Action Center
support for virtual hard disks, (Windows Health Center and
Ishare

Windows Solution Center in earlier task buttons. These buttons also


builds), which encompasses both enable the Jump Lists feature to
security and maintenance of the allow easy access to common tasks.
computer. The default setting for The revamped taskbar also allows
User Account Control in Windows 7 the reordering of taskbar buttons. To
has been criticized for allowing the far right of the system clock is a
untrusted software to be launched small rectangular button that serves
with elevated privileges by as the Show desktop icon. This
exploiting a trusted application. button is part of the new feature in
Microsoft's Windows kernel Windows 7 called Aero Peek.
engineer Mark Russinovich Hovering over this button makes all
acknowledged the problem, but visible windows transparent for a
noted that there are other quick look at the desktop. In touch-
vulnerabilities that do not rely on the enabled displays such as touch
new setting. Windows 7 also screens, tablet PCs, etc., this button
supports Mac-like RAW image is slightly wider to accommodate
viewing through the addition of being pressed with a finger. Clicking
WIC-enabled image decoders, which this button minimizes all windows,
enables raw image thumbnails, and clicking it a second time restores
previewing and metadata display in them. Additionally, there is a feature
Windows Explorer, plus full-size named Aero Snap, that automatically
viewing and slideshows in Windows maximizes a window when it is
Photo Viewer and Window Media dragged to either the top or left/right
Center. The taskbar has seen the edges of the screen. This also
biggest visual changes, where the allows users to snap documents or
Quick Launch toolbar has been files on either side of the screen to
replaced with pinning applications to compare them. When a user moves
the taskbar. Buttons for pinned windows that are maximized, the
applications are integrated with the system restores their previous state
Ishare

automatically. This functionality is sRGB, 24-bit sRGB, 30-bit sRGB,


also accomplished with keyboard 30-bit with extended color gamut
shortcuts. Unlike in Windows Vista, sRGB, and 48-bit scRGB. Microsoft
window borders and the taskbar do is also implementing better support
not turn opaque when a window is for Solid State Drives, including the
maximized with Windows Aero new TRIM command, and Windows
applied. Instead, they remain 7 will be able to identify a Solid
transparent. State Drive uniquely. Microsoft is
also planning to support USB 3.0 in
For developers, Windows 7 includes
a subsequent patch, although support
a new networking API with support
would not be included in the initial
for building SOAP-based web
release due to delays in the
services in native code (as opposed
finalization of the standard. Internet
to .NET-based WCF web services),
Spades, Internet Backgammon and
new features to shorten application
Internet Checkers, which were
install times, reduced
removed from Windows
UAC prompts, simplified
Vista, were restored in
development of
Windows 7. Windows 7 will
installation packages,
include Internet Explorer 8
and improved
and Windows Media Player
globalization support through a new
12.Users will also be able to disable
Extended Linguistic Services API.
many more Windows components
At WinHEC 2008 Microsoft
than was possible in Windows Vista.
announced that color depths of 30-
New additions to this list of
bit and 48-bit would be supported in
components include Internet
Windows 7 along with the wide
Explorer, Windows Media Player,
color gamut scRGB (which for
Windows Media Center, Windows
HDMI 1.3 can be converted and
Search, and the Windows Gadget
output as xvYCC). The video modes
Platform. Windows 7 includes 13
supported in Windows 7 are 16-bit
Ishare

additional sound schemes, titled desktop environment. The three


Afternoon, Calligraphy, Characters, application limit will be removed
Cityscape, Delta, Festival, Garden, from Windows 7 Starter.
Heritage, Landscape, Quirky, Raga,
Savanna, and Sonata. A new version
of Virtual PC, Windows Virtual PC
Beta is available for Windows 7
Professional, Enterprise, and
How do you add text abbreviations
Ultimate editions. It allows multiple
to autocorrect in word 2007?
Windows environments, including
Windows XP Mode, to run on the 1. Open Microsoft Word 2007.
same machine, requiring the use of Press on the Office symbol in
Intel VT-x or AMD-V. Windows XP the left top corner.
Mode runs Windows XP in a virtual 2. Go to the bottom and press on
machine and redirects displayed the Word Options button.
applications running in Windows XP See the screenshot below.
to the Windows 7 desktop. 3. Word options will appear.
Furthermore Windows 7 supports Choose Proofing from the left
the mounting of a virtual hard disk menu. Now press on the
(VHD) as a normal data storage, and AutoCorrect Options button
the bootloader delivered with as in the screenshot below.
Windows 7 can boot the Windows 4. The autocorrect options will
system from a VHD. The Remote appear. Go down to where it
Desktop Protocol (RDP) of says replace.
Windows 7 is also enhanced to 5. Under that type in the
support real-time multimedia abbreviation you want to use
application including video playback when you are typing in Word.
and 3D games. That means that I have written yt in this area.
Direct X 10 can be used in a remote
Ishare

6. Now move to the right side


and enter the word that will
appear when the abbreviation
is typed. I have entered You
tube.
7. Therefore when I type yt and
then press the space bar the
word You tube will appear.
8. Now press the add button.
9. Keep entering more
abbreviations and words to
match. Press add after each
one.
10. Press ok when you are
finished.

Article title: Tech Tips


By,
G. Manigandaprabhu
II B.Sc(CS) ’B’
Ishare

https://adwords.google.co
m/

Author 5. Ask - Powered by Teoma

S.Sasikala,
Lecturer, CS
Article Title
Search Engine
Article Description
This article gives details
about the top 5 and semantic
search engines and its excellent http://static.wc.ask.com/
usage.
TOP 5 ALTERNATIVE SEARCH

TOP 5 SEARCH ENGINES IN ENGINES


THE UNITED STATES (THE
Gigablast
MAJORS) BY RANK
Gigablast has a huge index and some
1. Google nice advanced search options,
Free Submit: although not terribly advanced. In
http://www.google.com/ addition the search engine provide
directory search using The Open
2. Yahoo! Search
Directory, blog search and travel
Free Submit:
search.
http://submit.search.yaho
o.com/ Factbites

3. MSN Live Search The Factbites search engine not just

Free Submit: search for web sites that match your

http://search.msn.com/ search term. They search the whole


topic area. In this way it can return
4. AOL Search - Powered by relevant results on your topic that
Google Submit:
Ishare

don’t necessarily mention the word A semantics search engine attempts


you searched for. to make sense of search results
based on context. It automatically
Exalead
identifies the concepts structuring
Exalead is a European search
the texts. For instance, if you search
engine. It has some very handy
for “election” a semantic search
advanced search options and a new
engine might retrieve documents
way of presenting search results.
containing the words “vote”,
The advanced features include
“campaigning” and “ballot”, even if
truncation, proximity search,
the word “election” is not found in
stemming, phonetic search, and
the source document.
language field search.
An important part of this process is

Snap disambiguation, both of the queries

Like Exalead, Snap wants to deliver and of the content on the web. What

visually enhanced search results. It this means is that the search engine

gives you text on the left and web — through natural language

site previews on the right. In this processing — will know whether

way you don’t have to click through you are looking for a car or a big cat

every search result to see what when you search for “jaguar”.

you’ll get, but have a chance to


“look before you leap”. When to use semantic search
engines
Semantic search has the power to
enhance traditional web search, but
it will not replace it. A large portion
TOP 5 SEMANTIC SEARCH of queries are navigational and
ENGINES semantic search is not a replacement
for these. Research queries, on the
What is semantic search?
Ishare

other hand, will benefit from Cognition has a search business


semantic search. based on a semantic map, built
over the past 24 years, which the
company claims is the most
Hakia comprehensive and complete
Hakia is a general purpose semantic map of the English language
search engine, as opposed to available today. It is used in
Powerset and Cognition, that search support of business analytics,
structured text like Wikipedia. machine translation, document
SenseBot search, context search, and much
SenseBot is a web search engine that more
summarizes search results into one
concise digest on the topic of your
query. The search engine attempts to
understand what the result pages are • Out of paper on drive D:
• Press ESC to enter or Enter
about. For this purpose it uses text to escape
• REALITY.SYS corrupted.
mining to analyze Web pages and
Reboot UNIVERSE [Y,n] ?
identify their key semantic concepts. • The Earth is 98% full.
Please delete anyone you
can.
• The world is coming to an
Powerset
end-please log off.
Powerset is at present not a regular • This copy of planet Earth
has been unregistered for 4
web search engine. It works best on billion years
smaller, relatively structured text. • Track 0 bad?? Don't worry,
there's lots of others
DeepDyve • Troubleshooting Shortcut
#1: Shoot the trouble!
DeepDyve is a powerful, • Unknown Error on Unknown
professional research tool available Device for Unexplainable
Reason
for free for the general public. • User Failure: Please Insert a
Bootable Brain.
Cognition
Ishare

rather than for yourself are good


evidence of your team attitude. Do
not brag, just say it in a matter-of-
Author
fact tone. This is a key point.

3. How long would you expect to


M. Mohammad arif , II B.Sc(CS) B
work for us if hired?
Article title
Interview Tips
Article description Specifics here are not good.
This article helps to face the Something like this should work: I'd
interview as what HR expected.
like it to be a long time. Or As long
as we both feel I'm doing a good job.

1. What kind of salary do you 4. Have you ever had to fire


need? anyone? How did you feel about
A loaded question. A nasty little that?
game that you will probably lose if
This is serious. Do not make light of
you answer first. So, do not answer
it or in any way seem like you like
it. Instead, say something like,
to fire people. At the same time, you
That's a tough question. Can you tell
will do it when it is the right thing to
me the range for this position? In
do. When it comes to the
most cases, the interviewer, taken
organization versus the individual
off guard, will tell you. If not, say
who has created a harmful situation,
that it can depend on the details of
you will protect the organization.
the job. Then give a wide range.
Remember firing is not the same as
2. Are you a team player? layoff or reduction in force.
You are, of course, a team player. 5. What is your philosophy
Be sure to have examples ready. towards work?
Specifics that show you often
perform for the good of the team
Ishare

The interviewer is not looking for a discussed. Give a little advance


long or flowery dissertation here. Do thought to this relationship.
you have strong feelings that the job
9. Why should we hire you?
gets done? Yes. That's the type of
answer that works best here. Short Point out how your assets meet what
and positive, showing a benefit to the organization needs. Do not
the organization. mention any other candidates to
make a comparison.
6. If you had enough money to
retire right now, would you?
10. Tell me about a suggestion you
Answer yes if you would. But since have made.
you need to work, this is the type of
Have a good one ready. Be sure and
work you prefer. Do not say yes if
use a suggestion that was accepted
you do not mean it.
and was then considered successful.
7. Have you ever been asked to One related to the type of work
leave a position? applied for is a real plus. Get ready
for the campus interview. Wipro is
If you have not, say no. If you have,
nearby..
be honest, brief and avoid saying
negative things about the people or WHO INVENTED THE
organization involved.
INTERNET?

8. Explain how you would be an Author

asset to this organization. T.Vinodhini


II-BCA-C
You should be anxious for this Article title
Birth of Internet.
question. It gives you a chance to Article Description
highlight your best points as they This article gives the details
about history of Internet.
relate to the position being
Ishare

A single person did not create Crocker, Jeff Rulifson, and Ron
the Internet that we know and use Stoughton. In the meeting the group
today. Below is a listing of several discussed solving issues related to
different people who've helped getting hosts to communicate with
contribute and develop the Internet. each other. In December 1968 Elmer
IDEA: Shapiro with SRI released a report
The initial idea is credited as being "A Study of Computer Network
Leonard Kleinrock's after he Design Parameters." Based on this
published his first paper entitled work and earlier work done by Paul
"Information Flow in Large Baran, Thomas Marill and others;
Communication Nets" on May 31, Lawrence Roberts and Barry
1961. Wessler helped to create the final
version of the Interface Message
In 1962 J.C.R. Licklider becomes Processor (IMP) specifications. Bolt
the first Director of IPTO and gave Beranek and Newman, Inc. (BBN)
his vision of a galactic network. In was later awarded the contract to
addition to the ideas from Licklider design and build the IMP sub
and Kleinrock, Robert Taylor helped network.
create the idea of the network, which Introduction of the Internet to the
later became ARPANET. general public
Initial creation: UCLA puts out a press release
The Internet as we know it today introducing the public to the Internet
first started being developed in the on July 3, 1969.
late 1960's. In the summer of 1968 First network equipment
the Network Working Group August 29, 1969 the first network
(NWG) held its first meeting chaired switch and the first piece of network
by Elmer Shapiro with the Stanford equipment called "IMP", which is
Research Institute (SRI) with short for (Interface Message
attendees: Steve Carr, Steve Processor) is sent to UCLA and on
Ishare

September 2, 1969 the first data Vinton Cerf and Robert Kahn design
moves from UCLA host to the TCP during 1973 and later publish it
switch. with the help of Yogen Dalal and
The first distributed message Carl Sunshine in December of 1974
On Friday October 29, 1969 the first in RFC 675.
Internet message was sent from Ethernet is conceived
computer science Professor Leonard Bob Metcalfe develops Ethernet idea
KleinRock's laboratory at UCLA, in 1973.
after the second piece of network TCP/IP is created
equipment was installed at SLI. This In 1978 TCP splits into TCP/IP
connection not only enabled the first driven by Danny Cohen, David
transmission to be made but is also Reed, and John Shoch to support
considered to be the first Internet real-time traffic. This allows the
backbone. creation of UDP. TCP/IP is later
The first message to be distributed standardized into ARPANET in
was "LO", which was an attempt at
"LOGIN" by Charley S. Kline to log
into the SLI computer from UCLA.
However, the message was unable to
be completed because the SLI
system crashed. Shortly after the
crash the issue was resolved and he
was able to log into the computer.
E-mail is developed 1983 and is still the primary protocol
Ray Tomlinson introduces network used for the Internet.
e-mail in 1972, the first messaging DNS is introduced
system to send messages across a Paul Mockapetris and Jon Postel
network to other users. introduce DNS in 1984.
TCP is developed HTML
Ishare

In 1990 Tim Berners-Lee develops


HTML, which makes a huge
contribution to how we navigate and
view the Internet today.
WWW
Tim Berners-Lee introduces WWW
to the public on August 6, 1991. Author
Muruganandham.N,
III BCA- "B".
Article Title
Forgotten Operating System
Article Description
This article provides
information regarding the past
OS used, which are not in use
now-a-days.

Amiga OS
Year created: 1985
Company: Commodore
What happened?
Ars Technica put it best when in
2005, it wrote: "The Amiga
computer was a machine ahead of its
time. When it was released in 1985,
its color screen (4096 colors in
HAM mode!), four-channel sampled
stereo sound, preemptive
multitasking GUI, and custom chips
to accelerate both sound and
graphics made the year-old
Ishare

Macintosh seem antiquated and the Arthur


PC positively Paleolithic. Steve Jobs Year created: 1987
was reported to be extremely Company: Acorn Computers Ltd
worried about the Amiga, but What happened?
fortunately for him and Apple, Developed in five months,
Commodore had absolutely no idea Arthur was supposed to be a short-
what they were doing." term scab, but it stuck around until
BeOS the RISC OS was developed in
Year created: 1991 1989. That operating system is still
Company: Be Inc. in use, but we don't know anyone
What happened? who uses it.
Apple offered to buy Be Inc Desktop Linux
for $125 million in 1995, but CEO Year created: ~1996
Jean-Louis Gassée wanted $200 Company: Linux desktops are open
million. Apple bought Steve Jobs's source.
NeXT instead, and Palm acquired What happened?
the company's assets for $11 million 2010 is almost certain to be
in 2001. the year of desktop Linux. Just like
OS/2 2009. And 2008. And…
Year created: 1985 Inferno (operating system)
Company: IBM Year created: 1996
What happened? Company: Bell Labs
Microsoft and IBM joined to create What happened?
OS/2 in 1985, but when Windows 3 It's an open source operating
became a huge hit, the partnership system, so there are versions of it
unraveled in 1990. Though no still out there. But they don't work
longer supported by IBM, the above the basement floor.
operating system still runs on many XTS-400
ATMs today. Year created: 1992
Ishare

Company: BAE Systems


What happened?
Valued for their security, this
operating system and its successors
are still used in military technology.
Palm OS (also known as Garnet Author
OS) Muruganandham.N,
Year created: 1996 III BCA- "B".
Article Title
Company: Palm Inc.
Keypunch Card
What happened? Article Description
This article provides that full
In 2002, Palm spun the OS
details about the punching card
out as its own company. Innovation system.
pretty much ended there and what
was once a very strong pioneering
OS for PDAs, couldn't keep up when
it came to the Web and multimedia.
UIQ (formerly known as User
Program spindle for IBM 026 or 029
Interface Quartz)
card punch. For repeated data entry
Year created: 1998
with a fixed card format, the card
Company: Ericsson
punch could be set up to skip certain
What happened?
columns, wait for key input, or
UIQ went into bankruptcy this
duplicate information from the
year after the Symbian Foundation
previous card. Program cards were
chose to base future user-interfaces
punched on the same keypunch,
on the S60 OS.
removed, wrapped around the drum,
and inserted in the keypunch above
the punch position. Control by the
card could be enabled and disabled
by the operator with a lever.
Ishare

(shown in the table to the left of the


keys) required both a '12' and a '1'
punch.

How to perform 'Special


Searches'
Punch card chad - a jar of 'holes'
punched from cards on an IBM '029' Here are some good tips to help you
punch. These are rectangular in search google like an expert
shape, have the color of the card, 1. Explicit Phrase: Lets say you are
and usually bear the small printed looking for content about internet
column number that was punched marketing. Instead of just typing
out from the card. internet marketing into the Google
search box, you will likely be better
off searching explicitly for the
phrase. To do this, simply enclose
the search phrase within double
quotes.
Example: “internet marketing”
2. Exclude Words: Lets say you
want to search for content about
internet marketing, but you want to
Manual card punch from Wright exclude any results that contain the
Line. Numeric digits could be term advertising. To do this, simply
inserted directly from the keys. use the “-“ sign in front of the word
Alphabetic and special characters you want to exclude.
required 2 or 3 holes obtained by Example Search: internet marketing
pressing all needed keys while -advertising
holding down the 'S' key at bottom 3. Site Specific Search: Often, you
until finished. For example an A want to search a specific website for
Ishare

content that matches a certain all the terms specified in the search.
phrase. Even if the site doesn’t If you are looking for any one of one
support a built-in search feature, you or more terms to match, then you
can use Google to search the site for can use the OR operator. (Note: The
your term. Simply use the OR has to be capitalized).
“site:somesite.com” modifier. Example: internet marketing OR
Example: “internet marketing” advertising
site:www.businessmarketingsite.co 7. Phone Listing: Let’s say
m someone calls you on your mobile
4. Similar Words and Synonyms: number and you don’t know how it
Let’s say you are want to include a is. If all you have is a phone number,
word in your search, but want you can look it up on
to include results that contain Google using the
similar words or synonyms. To phonebook feature.
do this, use the “~” in front of Example:
the word. phonebook:617-555-
Example: “internet marketing” 1212 (note: the
~professional provided number does
5. Specific Document Types: not work – you’ll have
If you’re looking to find results that to use a real number to get any
are of a specific type, you can use results).
the modifier “filetype:”. For 8. Area Code Lookup: If all you
example, you might want to find need to do is to look-up the area
only PowerPoint presentations code for a phone number, just enter
related to internet marketing. the 3-digit area code and Google
Example: “internet marketing” will tell you where it’s from.
filetype:ppt Example: 617
6. This OR That: By default, when 9. Numeric Ranges: This is a rarely
you do a search, Google will include used, but highly useful tip. Let’s say
Ishare

you want to find results that contain 13. Searching for URLs containing
any of a range of numbers. You can certain words. Use the “inurl:word”
do this by using the X..Y modifier modifier.
(in case this is hard to read, what’s Example site: googleutilities.com
between the X and Y are two inurl: google tools
periods. This type of search is useful
First iPhone worm detected
for years (as shown below), prices or
anywhere where you want to
provide a series of numbers.
Example: president 1940..1950
10. Stock (Ticker Symbol): Just
F-Secure, the IT security solutions company,
enter a valid ticker symbol as your has claimed that it has detected the first
search term and Google will give iPhone worm called Ikee. “It is only able to
you the current financials and a infect devices that have been ‘jailbroken’ by
their owners. Jailbreaking removes iPhone’s
quick thumb-nail chart for the stock.
protection mechanisms, allowing users to run
Example: GOOG
any software they want,” Mr Chia Wing Fei,
11. Calculator: The next time you
Senior Response Manager of F-Secure
need to do a quick calculation, Security Labs, said here in a press release.
instead of bringing up the Calculator Affected users would fine that their iPhone

applet, you can just type your wallpaper has been altered to a picture of Rick
Astley (of Rickroll fame) and the message
expression in to Google.
‘Ikee is never going to give you up’. The
Example: 48512 * 1.02
worm targets the users who have jailbroken
12. Word Definitions: If you need
their phone, but have not changed their default
to quickly look up the definition of a root login password.
word or phrase, simply use the Information given by,
“define:” command. Prof. K. Natarajan , Director,
Center for Information Technology
Example: define:plethora
Ishare

Yahoo! Asked to explain IGNOU online Now, classrooms in your Pocket


Exam Crash

Students of IGNOU can look forward to


download their study course contents
and get SMS alerts through mobiles. On
Oct-29 the university signed a MoU
In the wake of the collapse of its online
with Ericsson India Pvt. Ltd(EIL).
entrance exam for engineering
Students of IGNOU will soon get 3G
programmers, IGNOU today asked
mobile services at nominal rates. It will
Yahoo! To submit a report explaining
be only Rs.20 or Rs.25. It is economical
what went wrong.
too. It is a state-of-the-art technology
IGNOU, which offers distance
being used to connect the remote area
education to over 18 lakh students,
learners.
failed to conduct the online entrance on
Students will get SMS alerts and can
Saturday as the system collapsed
downloading files likes assignments and
minutes after the exam started. The
video clips.
university was using the server of
The university is also implementing the
Yahoo! for this test.
latest Information and Communication
“We have asked for the log which will
Technologies(ICTs) aimed at reaching
be examined to find out how the online
out to the un-reached in the rural areas
testing crashed,” Exam Coordinator,
across the country.
Prof Shiv Kumar Vyas, said.

Information given by,


Prof. K. Natarajan , Director,
Center for Information Technology
Ishare

Cyrix: A microprocessor manufacturer. They produce an Intel 486 equivalent - the


Cy486SLC and a Pentium equivalent - the Cyrix 6x86.
DirectX: A Microsoft programming interface standard, first included with Windows 95.
DirectX gives (games) programmers a standard way to gain direct access to enhanced
hardware features under Windows 95 instead of going via the Windows 95 GDI.
DivX: Video compression is a patent-pending software technology that compresses digital
video so it can be downloaded over DSL or cable modems in a relatively short time with no
reduced visual quality.
Dot Matrix Printer: A kind of printer with a vertical column of up to 48 small closely packed
needles or "pins" each of which can be individually forced forwards to press an ink ribbon
against the paper. The print head is repeatedly scanned across the page and different
combinations of needles activated at each point.
Dpi: (Dots Per Inch) A measure of resolution for printers, scanners and displays.
Dual In-Line: Small circuit boards carrying memory integrated circuits, with signal and
power pins on both sides of the board, in contrast to single-in-line memory modules (SIMM).
Emulation: One system is said to emulate another when it performs in exactly the same way,
though perhaps not at the same speed. A typical example would be emulation of one computer
by (a program running on) another.
FDisk: An MS-DOS utility program which prepares a hard disk so that it can be used as a
boot disk and file systems can be created on it. OS/2, NT, Windows 95, Linux, and other Unix
versions all have this command or something similar.

Article title: Jargons


By,
M.Jagadeesh,
III BCA C
Ishare

Rainfinity's technology blocks for creating reliable


distributed applications using off-
Author
the-shelf hardware. The focus of
the research was on high-
performance, fault-tolerant and
portable clustering technology for
M.Jagadeesh,
III BCA ‘C’ space-borne computing. Two
Article Title important assumptions were made,
Rainfinity's technology
Article Description and these two assumptions reflect
This article discusses about the the differentiations between RAIN
Rainfinity's technology which is
an unique project in networking. and a number of existing solutions
both in the industry and in
Rainfinity's technology originated academia:
in a research project at the 1. The most general share-nothing
California Institute of Technology model is assumed. There is no
(Caltech), in collaboration with shared storage accessible from all
NASA's Jet Propulsion Laboratory computing nodes. The only way
and the Defense Advanced for the computing nodes to share
Research Projects Agency state is to communicate via a
(DARPA). The name of the network. This differentiates RAIN
original research project was technology from existing back-end
RAIN, which stands for Reliable server clustering solutions such as
Array of Independent Nodes. The SUNcluster, HP MC Serviceguard
goal of the RAIN project was to or Microsoft Cluster Server.
identify key software building 2. The distributed application is
Ishare

not an isolated system. The RAIN technology has been further


distributed protocols interact augmented, and additional patents
closely with existing networking have been filed.
protocols so that a RAIN cluster is The guiding concepts that shaped
able to interact with the the architecture are as follows:
environment. Specifically,
technological modules were 1. Network Applications
created to handle high-volume The architecture goals for
network-based transactions. This clustering data network
differentiates it from traditional applications are different from
distributed computing projects clustering data storage
such as Beowulf. applications. Similar goals apply in
In short, the RAIN project the telecom environment that
intended to marry distributed provides the Internet backbone
computing with networking infrastructure, due to the nature of
protocols. It became obvious that applications and services being
RAIN technology was well-suited clustered.
for Internet applications. During
the RAIN project, key components 2. Shared-Nothing
were built to fulfill this vision. A The shared-storage cluster is the
patent was filed and granted for most widely used for database and
the RAIN technology. Rainfinity application servers that store
was spun off from Caltech in 1998, persistent data on disks. This type
and the company has exclusive of cluster typically focuses on the
intellectual property rights to the availability of the database or
RAIN technology. After the application service, rather than
formation of the company, the performance. Recovery from
Ishare

failover is generally slow, because load load-balancing decisions must


restoring application access to be made dynamically by
disk-based data takes minutes or measuring the current capacity of
longer, not seconds. Telecom each computing node in real-time.
servers deployed at the edge of the Static hashing does not guarantee
network are often diskless, keeping an even distribution of traffic.
data in memory for performance
reasons, and tolerate low failover 4. Peer-to-Peer
time. Therefore, a new type of A dispatcher-based, master-slave
share-nothing cluster with rapid cluster architecture suffers from
failure detection and recovery is scalability by introducing a
required. The only way for the potential bottleneck. A peer-to-
shared-nothing cluster to share is peer cluster architecture is more
to communicate via the network. suitable for latency-sensitive data
network applications processing
3. Scalability short lived sessions. Hybrid
While the high-availability cluster architecture should be considered
focuses on recovery from to offset the need for more control
unplanned and planned over resource management. For
downtimes, this new type of example, a cluster can assign
cluster must also be able to multiple authoritative computing
maximize I/O performance by load nodes that process traffic in the
balancing across multiple round-robin order for each
computing nodes. Linear network interface that is clustered
scalability with network to reduce the overhead of traffic
throughput is important. In order forwarding
to maximize the total throughput,
Ishare

Who is Who in Computer?

Who is Who in Computer?


Sabeer Bhatia borned in Chandigarh, India and co-founded first free email service site
Hotmail.com with Jack Smith.

Tim Berners-Lee is the inventor of the World Wide Web and Director of the World
Wide Web Consortium (W3C).

Larry Page is co-founder of the Google internet search engine, now Google Inc.

Sergey Brin is co-founder of the Google internet search engine, now Google Inc. He co-
founded google with Larry Page.

Charles Babbage is known as the father of computer.

Larry Wall is the inventor of Perl, rn,patch, and many other wonderful things. He is the
language designer for Perl 6, and has staked out the perl5 to perl6 translator as his own
project.

Rasmus Lerdorf is father of PHP.Here is Rasmus pictured in the ship's exotic Greek
ballroom at the conclusion of an hour's question and answer session.

James Gosling is a famous software developer, best known as the father of the Java
programming language.

Dennis Ritchie is an American computer scientist notable for his influence on ALTRAN,
B, BCPL, C, Multics, and Unix.

Bjarne Stroustrup designed and implemented the C++ programming language. He is the
College of Engineering Professor in Computer Science at Texas A&M University.

Bill Gates founded Micorsoft with Paul Allen

Michael Dell Michael Saul Dell (born February 23, 1965, in Houston, Texas) is an
American businessman and the founder and CEO of Dell, Inc.
Ishare

The originator of the Entity-Relationship Model (ER Model), which serves as


the foundation of many systems analysis and design methodologies,
computer-aided software engineering (CASE) tools, and repository systems
Chen, including IBM's Repository Manager/MVS and DEC's CDD/Plus. The UML
Peter modeling language has its roots in the ER model. Dr. Chen is a Fellow of the
IEEE, the ACM, and the AAAS. Since 1994, Dr. Chen has been doing
research and teaching on Internet/Web, Java, XML, data warehousing, e-
commerce (B2B and B2C), and Internet security.
Codd originated the relational approach to database management in a series
of research papers he began in 1970. His paper, "A Relational Model of Data
for Large Shared Data Banks," was a seminal paper in a continuing series of
Codd,
papers. Codd built upon this, and in doing so has provided the impetus for
Edgar
widespread research into numerous related areas, including database
languages, query subsystems, database semantics, locking and recovery, and
inferential subsystems.
Building on the work of Linus Torvalds for the Linux operating system, Cox
is responsible for much of the code in the Linux kernel, including networking
Cox, Alan and SMP. He has handled the latter-day 2.0 releases, and serves as one of the
primary conduits for patches into the current development kernels. Cox is
also responsible for bringing Linux to the Macintosh 68K.
1925(b.)-1996(d.) Regarded as the father of supercomputing. He began his
career as a computer scientist working on UNIVAC I. In 1957 Cray helped
found Control Data Corp., where he designed the CDC 6600 and the CDC
7600, large-scale computers notable for their high processing speeds. Cray
left the company in 1972 to begin Cray Research Inc., where he designed
Cray,
multiprocessor computers allowing simultaneous (parallel) processing. His
Seymour
company's first supercomputer, the Cray-1, came out in 1976 and could
perform 240 million calculations per second. Cray also developed an
innovative cooling system, using Freon to combat the intense heat of the Cray
1. The Cray Y-MP, introduced in 1988, was capable of 2.6 billion
calculations per second.
Ishare

Twishing: Beware of the Latest ID Scam

The idea of luring someone to reveal private information is nothing


new. Twishing works the same way. A short public message like
“see what they're saying about you on xyzblog" followed by a link
can direct the unwitting Twitter user to a blog that looks like
Twitter, but is actually a site operated by the fraudster, who then
seeks to gain personal information. Twitter recently changed its
look, which will likely deter twishing for at least a while. But
fraudsters are always looking for the next scam.

This is very similar to fraudsters who misrepresent themselves as


being from a large financial
institution while sending out
millions of official e-mails
trying to trick legitimate
account holders into revealing
personal account information.
While most of these e-mails
will go to people who have no
banking relationship with the
financial institution, the
phishing e-mail will reach some legitimate account holders. The e-
mail will ask account holders to resend their account information –
often with the threat of suspending the account if they don’t.

Some of the telltale signs that a phishing e-mail is a fraud are typos,
poor grammar or incomplete information in the phishing message.
But the message limitations of Twitter make it easy to overlook such
details. Twitter users will use chat and text message abbreviations
(e.g., “u" for “you") and grammatical rules are largely ignored. So
the hints aren’t as obvious.
Ishare

However, some of the basic steps to protect one’s identity work to


protect against twishing just as they do against phishing:

• Don’t provide personal information online


• If a message looks suspicious, it probably is
• Be cautious in opening “retweeted" items. The last sender
may not be aware of the malicious nature of the
message.

Article(who is who,Twishing) by, S.Nithya,

Lecturer, CS Dept

The Vice-Chancellor, Periyar University ,Salem-11


The Registrar, Periyar University ,Salem
The Controller of Examination, Periyar University ,Salem-11
The HOD, Department of Computer Science, Periyar University ,Salem-11
The Principal, Government Arts College for Women, Salem-8
The Principal, Government Arts College for Women , Krishnagiri
The Principal, Government Arts & Science College (W), Burgur,
Kirshnagiri
The Principal, J.K.K Nataraja College of Arts & Science
The Principal, M.G.R College of Arts & Science
The Principal, Sengunthar Arts & Science College
Ishare

The Principal, Muthayammal College of Arts & Science


The Principal, PEE GEE College of Arts &, Science
The Principal, Harur Muthu Arts & Science College for Women
The Principal, Vivekanandha College of Arts & Sciences (W)
The Principal, Mahendra Arts & Science college
The Principal, Selvam Arts & Science college
The Principal, St.Joseph's College of Arts & Science for (W)
The Principal, Vysya College of Arts &, Science
The Principal, NKR Government Arts College for Women
The Principal, Arignar Anna Government Arts College
The Principal, Salem Sowdeswari College
The Principal, P.G.P College of Arts & Science
The Principal, Attur Arts & Science College
The Principal, SSM College of Arts & Science
The Principal, Government Arts College Salem
The Principal, Government Arts College Men
The Principal, Government Arts College, Dharmapuri
The Principal, Gobi Arts and Science College (Autonomous)
The Principal, Sri Kandhan College of Arts & Science
The Principal, Sri Ganesh College of Arts & Science
The Principal, Jairam Arts & Science College
The Principal, Sri Balamurugan College of Arts & Science
The Principal, Rabindharanath Tagore College of Arts & Science for
Women
The Principal, Sri Sakthikailash College for Women
The Principal, PSG College of Arts and Science
The Secretary, PSG College of Arts and Science
The Principal, Kongunadu Arts and Science College(Autonomous)
The Principal, Vivekanandha College for Women
The Principal, Sri Vidhya Mandir Arts & Science College
Achievers Archives

International Conference

Mr.R.Pugazendi, M.Sc., M.Phil., M.E., HOD, Department of Computer science and

applications has Presented a research paper entitled “Mobile Agents – A Solution for Network

Monitoring” in the international conference on Advances in Recent Technologies in

Communication and Computing(ARTcom’2009) which is organized by Association of Computer

Electronics and Electrical Engineers(ACEEE) – a division of engineers network – and

Technically Co-sponsored by the IEEE-Computational Intelligence Society held at Kottyam,

Kerala from 27’Oct to 28’Oct 2009. The paper has been published in IEEE Xplore and IEEE CS

Digital Library.

We welcome your valuable comments, suggestions & articles to


Ishare, Department of Computer Science & Applications (UG)
K.S.R College of Arts and Science, Tiruchengode-637215
Phone: 04288 -274741(4), Mail : ksrcas.ishare@gmail.com
EXTENSION ACTIVITY
“Service is our Motto”
K.S.RANGASAMY COLLEGE OF ARTS AND SCIENCE
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS
Certificate Course on Office Automation and Web Design
Government Boys Higher Secondary School, Tiruchengode
Schedule

Practical Examination is
going to be conducted by
Mr. M. Arul Prabhu
Mr. V.Harikrishanan
On
Date : 01.11.2009

We welcome your valuable comments, suggestions & articles to


Ishare, Department of Computer Science & Applications (UG)
K.S.R College of Arts and Science, Tiruchengode-637215
Phone: 04288 -274741(4), Mail : ksrcas.ishare@gmail.com

Anda mungkin juga menyukai