tag:blogger.com,1999:blog-7925516848024146542024-03-17T14:23:15.722+05:30IIITD: System ManagementThis blog is to provide a forum for students enrolled in Systems Management Course at IIIT-Delhi to have a meaningful discussion related to the course.Arjunhttp://www.blogger.com/profile/06279903523084188404noreply@blogger.comBlogger103125tag:blogger.com,1999:blog-792551684802414654.post-56322064880500788042010-11-14T17:39:00.008+05:302010-11-14T18:11:10.137+05:30Group Project: Setting Up a Data RepositoryHi all!<br />Our project was about setting up a Data Repository. Here's a short summary about it!<br /><span style="font-weight: bold;"><br />Concept of Version Control<br /><span style="font-weight: bold;"></span></span>It is the system in which source code of the software is maintained using versions. Many developers can work on the same project and the source code can be "version-ed" with, for example, numbers, so that different "versions" of the code are maintained. This can tremendously boost productivity of a project. <span style="font-weight: bold;"><span style="font-weight: bold;"></span><br /><br />Data Repositories with Client Server Model<br /></span>The data repositories we explored were based on the client server model. The repository (the central database of code) was stored on a server, and clients could connect to this server and download data/update data in the repository. So if I have to make some changes in the source code, I would connect to the repository, download the current, most recent version, make my changes, and "commit" my changes back in the repository, making my version now the "most recent".<span style="font-weight: bold;"><br /><br />Version Control Systems - CVS and SVN<br /></span><span>We covered arguably the two most popular version control systems. CVS - Concurrent versions system, first launched in 1990, quickly gained popularity. It had, however, certain drawbacks, which led to the birth of SVN in 2000. SVN (Subversion) was meant to be a successor to the widely successful CVS, making up for its drawbacks as well. Nowadays, SVN is the most used system, with development of CVS now discontinued.</span><span style="font-weight: bold;"><span style="font-weight: bold;"><br /><br />Softwares for our Demo<br /></span></span><span>We chose VisualSVN Server for setting up an SVN server + Apache server for access over the network, and chose TortoiseSVN as the client side software.</span><span style="font-weight: bold;"><span style="font-weight: bold;"><br />VisualSVN Server </span></span><span>was the most easy to use, configure and manage, server for Windows. It automatically set up Apache for use with the SVN server, which meant access over the network became very easy. It also has a really good interface for managing repositories and users, making the whole process a breeze.</span><span style="font-weight: bold;"><span style="font-weight: bold;"><br />TortoiseSVN</span></span><span> is the industry leading software when it comes to client-side SVN solutions. Its not an application in it self, rather it integrates itself in Windows Shell. All operations are available through "context" or "right-click" menus within windows. This way it blends powerful functionality with the easiest-to-use methods for SVN, till date.</span><span style="font-weight: bold;"><span style="font-weight: bold;"><br /></span></span><span>Both softwares were free as well, which hit the final nail in the coffin, for our decision to use them. </span><span style="font-weight: bold;"><span style="font-weight: bold;"><br /><br />Experience<br /></span></span><span>Working on this project was a unique experience. The concept was totally new to us, but the more we read about it, the more we thought that its a critical element of software development these days and it makes life very easy for programmers, especially in the multi-programmer environment. We decided to try and get this message across through our presentation, and I hope we succeeded in that. I ended up using SVN for developing my Introduction to Programming Project this semester, and I hope others found it useful as well!<br /><br />Thank you! </span><span style="font-weight: bold;"><span style="font-weight: bold;"><br /></span></span>Kshitizhttp://www.blogger.com/profile/03223397052447123041noreply@blogger.com39tag:blogger.com,1999:blog-792551684802414654.post-7043812395000623222010-11-10T23:03:00.002+05:302010-11-11T21:31:36.169+05:30Leading the LAB -an adventureAfter trying for so long , me and my partner Ayushi Aggarwal, finally got a chance to lead the lab session -11 . I was really excited as it was for the first time that I was leading a group .<div><br /><div>PREPARATION - Saturday training session held on 30th October 2010.It went off really well and all the group leaders did a pretty good job in explaining their parts. Training session took 2 long hours, but I thoroughly enjoyed while it lasted. Had it been any longer it would have acted as a sedative and I would have gone into deep sleep.The best part was the photo editing by Nikita and Shreyasi.</div><div><br /></div><div><div><div>One of the hurdles we faced was that we didn't have admin rights so we couldn't install softwares and I wasn't very clear about setting up an SVN server.</div></div></div><div><br /></div><div>Finally the day arrived and I utilised our lunch break to clear some doubts about the SVN server, well thanks to my partner for that!!We decided to keep image editing and video editing part at the end as it would have helped in keeping my group members interested till the end of the lab.</div><div><div><br /></div><div><br /></div></div><div>We covered the following topics in our lab:-</div><div><br /></div><div> a) <b>Image editing tool-PhotoImpact X3:-</b>As provided in the lab handout we inlcuded the basic tools like </div><div> 1 colouring tools such as bucket fill, linear gradient tool, colourize pen </div><div> 2 image insertion</div><div> 3 crop an image</div><div> 4 smudge</div><div> 5 blur</div><div> 6 <b>most interesting cloning</b></div><div><b> </b>Everybody patiently listened to this part!!</div><div><br /></div><div> b) <b>Video editing tool - Videopad:-</b> In this we taught the concept of splitting , effects , subtitles, narration regarding video and audio files.</div><div><br /></div><div> c) <b>Setting up an SVN server</b></div><div> d) <b>Remote connection to a machine:-</b> We taught how to establish remote connection in windows and in linux. We also gave the demo of remote connection with Teamviewer.</div><div><br /></div><div>After having given the lecture , I asked my group if they had any queries. Surprisingly not even a single question was raised, which made me wonder if it was because that they understood everything or nothing at all? Whatever the reason may be , I had a really nice experience.</div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; color: rgb(51, 51, 51); line-height: 20px; "><br /></span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; color: rgb(51, 51, 51); line-height: 20px; ">Thank You Sir for giving us such an opportunity .</span></div><div> </div></div>JYOTIKA DORAhttp://www.blogger.com/profile/16277001553846017321noreply@blogger.com2tag:blogger.com,1999:blog-792551684802414654.post-45115399194001013732010-11-10T22:25:00.000+05:302010-11-10T22:25:51.566+05:30Abhimanyu KhannaHey guys, all those who use nero and face a problem of max data limit. here is a simple tweak .<br />
<br />
<br />
How do I overburn a CD with Nero?<br />
<br />
Start Nero<br />
<br />
From the action-bar select File and select Preferences.<br />
In the Preferences window, select Expert Features(1) and check the Enable overburn disc-at-once(2).<br />
Choose a Maximum CD Length(3) and click OK(4) (*82:59:59 is the maximum value I suggest, but as you can see from the screen capture above I have set mine significantly higher. The reason is because I frequently use 99min 850 MB CD media).<br />
<br />
For a more accurate test you can use a nero tool called nero speed test to see how much a specific CD is capable of being overburned . get it here<br />
<br />
From the action-bar select File and select Write CD.<br />
<br />
<br />
<br />
A window will appear when you have exceeded expected length, click OK to start the overburn copy.<br />
<br />
Remember to set disk to burn Disc at Once, you cannot overburn in Track at Once Mode.Akshit Guptahttp://www.blogger.com/profile/14705727360452014571noreply@blogger.com1tag:blogger.com,1999:blog-792551684802414654.post-33870904200845542522010-11-10T22:10:00.000+05:302010-11-10T22:10:17.850+05:30Abhimanyu KhannaHi . i will be again using Akshit's account this time on how to make a simple keygen .This is something i tried out during my holidays in Octuber as part of my innovative assignment.<br />
<br />
<br />
<br />
Yea so basically this would be a tutorial. The keygen you would be making is a simple keygen, of a program called W3Filer 32 V1.1.3.<br />
W3Filer is a pretty good web downloader...<br />
I guess some of you might know the program.<br />
I`ll assume you know:<br />
A.How to use debugger (in this case, SoftIce).<br />
B.How to crack, generally (finding protection routines,patching them,etc...).<br />
C.How to use Disassembler (This knowledge can help).<br />
D.Assembly.<br />
E.How to code in Turbo Pascal ™.<br />
Tools you`ll need:<br />
A.SoftIce 3.00/01 or newer.<br />
B.WD32Asm. (Not a must).<br />
C.The program W3Filer V1.13 (if not provided in this package), can be found in<br />
www.windows95.com I believe.<br />
D.Turbo Pascal (ANY version).<br />
Well, enough blah blah, let's go cracking...<br />
Run W3Filer 32.<br />
A nag screen pops, and , demands registration (Hmm, this sux ;-)) Now,<br />
We notice this program has some kind of serial number (Mine is 873977046),<br />
Let's keep the serial in mind, I bet we`ll meet it again while we're on<br />
the debugger.<br />
Well, now, let's put your name and a dummy reg code...<br />
set a BP on GetDlgItemTextA, and, press OK.<br />
We pop inside GetDlgItemTextA, Lets find the registration routine...<br />
I`ll save you the work, the registration routine is this:<br />
:00404DB2 8D95A8FAFFFF lea edx, dword ptr [ebp+FFFFFAA8]<br />
:00404DB8 52 push edx ---> Your user name here.<br />
:00404DB9 E80B550000 call 0040A2C9 ---> Registration routine.<br />
:00404DBE 83C408 add esp, 00000008 ---> Dunno exactly what is it.<br />
:00404DC1 85C0 test eax, eax ---> Boolean identifier, 0 if<br />
:00404DC3 7D17 jge 00404DDC ---> registration failed, 1 if<br />
OK.<br />
Well, Let's enter the CALL 40A2C9, and see what's inside it:<br />
(Please read my comments in the code).<br />
* Referenced by a CALL at Addresses:<br />
|:00404DB9 , :00407F76<br />
|<br />
:0040A2C9 55 push ebp<br />
:0040A2CA 8BEC mov ebp, esp<br />
:0040A2CC 81C4B0FEFFFF add esp, FFFFFEB0<br />
:0040A2D2 53 push ebx<br />
:0040A2D3 56 push esi<br />
:0040A2D4 57 push edi<br />
:0040A2D5 8B5508 mov edx, dword ptr [ebp+08]<br />
:0040A2D8 8DB500FFFFFF lea esi, dword ptr [ebp+FFFFFF00]<br />
:0040A2DE 33C0 xor eax, eax<br />
:0040A2E0 EB16 jmp 0040A2F8<br />
* Referenced by a (U)nconditional or ©onditional Jump at Address:<br />
|:0040A2FB©<br />
|<br />
:0040A2E2 0FBE0A movsx ecx, byte ptr [edx] ----> Here Starts the<br />
interesting part.<br />
:0040A2E5 83F920 cmp ecx, 00000020 ----> ECX is the the current<br />
char in the user name, Hmm, 20h=' '...<br />
:0040A2E8 740D je 0040A2F7 ----> Let's see,<br />
:0040A2EA 8A0A mov cl, byte ptr [edx] ----> Generally, all this loop<br />
does, is copying<br />
the user name from<br />
[EDX], to [ESI], WITHOUT the spaces!<br />
(Keep this in mind! ).<br />
:0040A2EC 880C06 mov byte ptr [esi+eax], cl<br />
:0040A2EF 42 inc edx<br />
:0040A2F0 40 inc eax<br />
:0040A2F1 C6040600 mov byte ptr [esi+eax], 00<br />
:0040A2F5 EB01 jmp 0040A2F8<br />
* Referenced by a (U)nconditional or ©onditional Jump at Address:<br />
|:0040A2E8©<br />
|<br />
:0040A2F7 42 inc edx<br />
* Referenced by a (U)nconditional or ©onditional Jump at Addresses:<br />
|:0040A2E0(U), :0040A2F5(U)<br />
|<br />
:0040A2F8 803A00 cmp byte ptr [edx], 00<br />
:0040A2FB 75E5 jne 0040A2E2 ----------------> This is the loop , we got<br />
what it does,<br />
Let's continue tracing<br />
the code...<br />
:0040A2FD 56 push esi --------> The user name is pushed, in order<br />
to<br />
Upcase it's chars.<br />
* Reference To: USER32.CharUpperA, Ord:0000h<br />
|<br />
:0040A2FE E80F330000 Call User!CharUpper ---> After this, our name is in<br />
upper case.<br />
:0040A303 56 push esi -----> Our name in upper case here.<br />
* Reference To: cw3220mt._strlen, Ord:0000h<br />
|<br />
:0040A304 E86F300000 Call 0040D378 ---> This is the length of our name.<br />
:0040A309 59 pop ecx<br />
:0040A30A 8BC8 mov ecx, eax ---> ECX=Length.<br />
:0040A30C 83F904 cmp ecx, 00000004 ---> Length>=4 (MUST).<br />
:0040A30F 7D05 jge 0040A316 ---> Let's go to this address...<br />
:0040A311 83C8FF or eax, FFFFFFFF<br />
:0040A314 EB67 jmp 0040A37D<br />
* Referenced by a (U)nconditional or ©onditional Jump at Address:<br />
|:0040A30F©<br />
|<br />
:0040A316 33D2 xor edx, edx<br />
:0040A318 33C0 xor eax, eax<br />
:0040A31A 3BC8 cmp ecx, eax<br />
:0040A31C 7E17 jle 0040A335 ---> (Not important, just another useless<br />
checking).<br />
===================================================================================<br />
============ FROM HERE AND ON, THE IMPORTANT CODE, PAY ATTENTION ==================<br />
===================================================================================<br />
One thing before we continue, EDX = 00000000h as we enter to the next instructions.<br />
* Referenced by a (U)nconditional or ©onditional Jump at Address:<br />
|:0040A333©<br />
|<br />
:0040A31E 0FBE1C06 movsx ebx, byte ptr [esi+eax] ---> EBX <--- char in user<br />
name, offset EAX.<br />
:0040A322 C1E303 shl ebx, 03 -----> Hmm, it shl's the char by 03h...<br />
(Remember that).<br />
:0040A325 0FBE3C06 movsx edi, byte ptr [esi+eax] ---> Now EDI <--- Char in<br />
user name , offset EAX.<br />
:0040A329 0FAFF8 imul edi, eax -----> It multiplies the char by the<br />
offset in user name! (Remember that).<br />
:0040A32C 03DF add ebx, edi -----> Adds the result to EBX (That was<br />
Shelled (Ding Dong =)).<br />
:0040A32E 03D3 add edx, ebx -----> EDX=EDX+EBX!!! - This is the CORE<br />
of this registration routine!!!<br />
:0040A330 40 inc eax -----> Increase EAX by one (next char).<br />
:0040A331 3BC8 cmp ecx, eax<br />
:0040A333 7FE9 jg 0040A31E ----> If ECX<EAX then, we leave the<br />
loop.<br />
* Referenced by a (U)nconditional or ©onditional Jump at Address:<br />
|:0040A31C©<br />
|<br />
:0040A335 A120674100 mov eax, dword ptr [00416720] ---> HMMMMMM, What's in<br />
here?????<br />
:0040A33A C1F803 sar eax, 03 ---------> WAIT! Please type in SIce '?<br />
EAX'<br />
Does this number in EAX look<br />
familiar to us? ;-)<br />
If you still don`t understand,<br />
than, It's<br />
our SERIAL NUMBER! (PLEASE, take<br />
your time, and check by<br />
yourself - don`t trust me!). OK,<br />
so now we know,<br />
That it SHR's EAX by 03 (SAR is<br />
almost identical to SHR).<br />
:0040A33D 03D0 add edx, eax ---------> Hmm, it adds the result from the<br />
loop, the serial number shr'd by 03h<br />
:0040A33F 52 push edx -------> Let's continue. (At this point, I<br />
can tell you , the reg number, is<br />
in EDX - only that the reg number<br />
is in HEX --> That's how you enter it).<br />
* Possible StringData Ref from Data Obj ->"%lx"<br />
|<br />
:0040A340 685EF54000 push 0040F55E<br />
:0040A345 8D95B0FEFFFF lea edx, dword ptr [ebp+FFFFFEB0]<br />
:0040A34B 52 push edx<br />
* Reference To: USER32.wsprintfA, Ord:0000h<br />
|<br />
:0040A34C E8E5320000 Call 0040D636 -------> This one, does HEX2STR (Takes<br />
the value from EDX, and turns it to an hex string).<br />
:0040A351 83C40C add esp, 0000000C<br />
:0040A354 8D8DB0FEFFFF lea ecx, dword ptr [ebp+FFFFFEB0] -----> type 'd ecx' -<br />
THIS is the reg number! That's enough for us, the rest of<br />
the code, is<br />
just for comparing the correct reg code with ours.<br />
:0040A35A 51 push ecx<br />
* Reference To: USER32.CharLowerA, Ord:0000h<br />
|<br />
:0040A35B E8B8320000 Call 0040D618<br />
:0040A360 8D85B0FEFFFF lea eax, dword ptr [ebp+FFFFFEB0]<br />
:0040A366 50 push eax<br />
:0040A367 FF750C push [ebp+0C]<br />
* Reference To: cw3220mt._strcmp, Ord:0000h<br />
|<br />
:0040A36A E875300000 Call 0040D3E4<br />
:0040A36F 83C408 add esp, 00000008<br />
:0040A372 85C0 test eax, eax<br />
:0040A374 7405 je 0040A37B<br />
:0040A376 83C8FF or eax, FFFFFFFF<br />
:0040A379 EB02 jmp 0040A37D<br />
* Referenced by a (U)nconditional or ©onditional Jump at Address:<br />
|:0040A374©<br />
|<br />
:0040A37B 33C0 xor eax, eax<br />
* Referenced by a (U)nconditional or ©onditional Jump at Addresses:<br />
|:0040A314(U), :0040A379(U)<br />
|<br />
:0040A37D 5F pop edi<br />
:0040A37E 5E pop esi<br />
:0040A37F 5B pop ebx<br />
:0040A380 8BE5 mov esp, ebp<br />
:0040A382 5D pop ebp<br />
:0040A383 C3 ret<br />
Making the actual Keygen<br />
~~~~~~~~~~~~~~~~~~~~~~~~<br />
Now, after I've explained how does the program calculate the registration<br />
code, you can either write your own keymaker, without looking at my code, or<br />
look at my code (in Turbo Pascal - sorry for all you C lovers ;-) Next time).<br />
That's it, here's the source of my keygen:<br />
------------------- Cut here ---------------------------------------------<br />
Program W3FilerKeygen;<br />
var<br />
Key,SerialNum,EB,ED,digit:Longint;<br />
I,x:Byte;<br />
Name,KeyHex:String;<br />
begin<br />
Writeln(' W3Filer32 V1.1.3 Keymaker');<br />
writeln('Cracked by ^pain^ ''97 / Rebels!');<br />
Write('Your Name:'); { Read the name }<br />
readln(Name);<br />
Write('Serial Number:');<br />
readln(SerialNum); {Yes, we need the serial number for the calculation!}<br />
Key:=0;<br />
x:=0;<br />
For I:=1 to length(Name) do<br />
begin<br />
Name[I]:=upcase(Name[i]);<br />
If Name[I]<>' ' then begin<br />
eb:=ord(Name[I]) shl 3; {EB = Name[I] Shl 03h}<br />
Ed:=ord(Name[I]); {ED = Name[I]}<br />
ed:=ed*(x); {ED=ED*Offset}<br />
inc(x);<br />
eb:=eb+ed; {Add ED to EB}<br />
Key:=Key+EB; {Add EB to KEY}<br />
end;<br />
end;<br />
Key:=Key+(SerialNum shr 3); { Add SerialNum shr 03h to Key}<br />
{ From here, this is just HEX2STRING --> I`m quite sure it's<br />
Self explaintory, else - go and learn number bases again! ;-)}<br />
KeyHex:='';<br />
repeat<br />
digit:=Key mod 16;<br />
key:=key div 16;<br />
If digit<10 then KeyHex:=Chr(Digit+ord('0'))+KeyHex;<br />
If digit>10 then KeyHex:=Chr(Digit-10+ord('a'))+KeyHex;<br />
until key=0;<br />
writeln('Your Key:',KeyHex);<br />
writeln(' Enjoy!');<br />
end.<br />
<br />
<br />
<br />
<br />
:) abhimanyu khannaAkshit Guptahttp://www.blogger.com/profile/14705727360452014571noreply@blogger.com5tag:blogger.com,1999:blog-792551684802414654.post-87402583519998870852010-11-10T22:07:00.001+05:302010-11-10T22:07:02.126+05:30Abhimanyu KhannaHey guys , its me Abhimanyu again . I would be covering on how to modify exe files in this blog.<br />
<br />
<br />
So yea here it is<br />
<br />
How to modify *.exe files<br />
<br />
1) Don't try to modify a prog by editing his source in a dissasembler.Why?<br />
Cause that's for programmers and assembly experts only.<br />
<br />
try to view it in hex you'll only get tons of crap you don't understand.<br />
First off, you need Resource Hacker(last version). It's a resource editor-<br />
very easy to use, You can download it at h**p://www.users.on.net/johnson/resourcehacker/<br />
<br />
2) Unzip the archive, and run ResHacker.exe. You can check out the help file too<br />
<br />
<br />
3) You will see that the interface is simple and clean. Go to the menu FileOpen or press Ctrl+O to open a file. Browse your way to the file you would like to edit. You can edit *.exe, *.dll, *.ocx, *.scr and *.cpl files, but this tutorial is to teach you how to edit *.exe files, so open one.<br />
<br />
4) In the left side of the screen a list of sections will appear.<br />
The most common sections are<br />
-String table;<br />
-RCData;<br />
-Dialog;<br />
-Cursor group;<br />
-Bitmap;<br />
-WAV.<br />
*Icon: You can wiew and change the icon(s) of the program by double-clicking the icon section,chossing the icon, right-clicking on it an pressing "replace resource". After that you can choose the icon you want to replace the original with.<br />
*String table: a bunch of crap, useful sometimes, basic programming knowladge needed.<br />
*RCData: Here the real hacking begins. Modify window titles, buttons, text, and lots more!<br />
*Dialog:Here you can modify the messages or dialogs that appear in a program. Don't forget to press "Compile" when you're done!<br />
*Cursor group: Change the mouse cursors used in the program just like you would change the icon.<br />
*Bitmap: View or change images in the programs easy!<br />
*WAV:Change the sounds in the prog. with your own.<br />
<br />
<br />
5) In the RCData,Dialog,Menu and String table sections you can do a lot of changes. You can modify or translate the text change links, change buttons, etc.<br />
<br />
<br />
TIP: To change a window title, search for something like: CAPTION "edit this".<br />
TIP: After all operations press the "Compile Script" button, and when you're done editing save, your work @ FileSave(Save as).<br />
TIP: When you save a file,the original file will be backed up by default and renamed to Name_original and the saved file will have the normal name of the changed prog.<br />
TIP: Sometimes you may get a message like: "This program has a non-standard resource layout... it has probably been compressed with an .EXE compressor." That means that Resource Hacker can't modify it because of it's structure.<br />
<div><br />
</div>Akshit Guptahttp://www.blogger.com/profile/14705727360452014571noreply@blogger.com1tag:blogger.com,1999:blog-792551684802414654.post-1618423185169315462010-11-10T22:04:00.000+05:302010-11-10T22:04:37.856+05:30Abhimanyu KhannaHi again guys, this is me abhimanyu again , i am sorry i have to use Akshit's account because due to some reason none of my email and blog accounts have been able to accept the invitation.<br />
<br />
I thought i will cover basics about spyware .I have also provided some spyware removal tool links this time . so here it goes<br />
<br />
<br />
There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.<br />
<br />
What is spy-ware?<br />
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.<br />
<br />
Known spywares<br />
There are thousands out there, new ones are added to the list everyday. But here are a few:<br />
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.<br />
<br />
How to check if a program has spyware?<br />
The is this Little site that keeps a database of programs that are known to install spyware.<br />
<br />
Check Here: http://www.spywareguide.com/product_search.php<br />
<br />
If you would like to block pop-ups (IE Pop-ups).<br />
There tons of different types out there, but these are the 2 best, i think.<br />
<br />
Try: Google Toolbar (http://toolbar.google.com/) This program is Free<br />
Try: AdMuncher (http://www.admuncher.com) This program is Shareware<br />
<br />
If you want to remove the "spyware" try these.<br />
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free<br />
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.<br />
<br />
Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free<br />
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.<br />
<br />
Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware<br />
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.<br />
<br />
Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware<br />
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.<br />
The best scanner out there, and updated all the time.<br />
<br />
Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware<br />
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.<br />
<br />
<br />
If you would like to prevent "spyware" being install.<br />
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free<br />
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.<br />
<br />
Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free<br />
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.<br />
<br />
Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free<br />
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.<br />
<br />
Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free<br />
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.<br />
<br />
If you would like more Information about "spyware".<br />
Check these sites.<br />
http://www.spychecker.com/<br />
http://www.spywareguide.com/<br />
http://www.cexx.org/adware.htm<br />
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml<br />
http://www.thiefware.com/links/<br />
http://simplythebest.net/info/spyware.html<br />
<br />
Usefull tools...<br />
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free<br />
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.<br />
<br />
----------------------------------------------------------------------------<br />
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended<br />
<br />
Free Virus Scan<br />
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.<br />
http://defender.veloz.com// - 15k<br />
<br />
<br />
Finding . is a Click Away at 2020Search.com<br />
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!<br />
http://www.2020search.com// - 43k<br />
<br />
<br />
Download the BrowserVillage Toolbar.<br />
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!<br />
http://www.browservillage.com/ - 36kAkshit Guptahttp://www.blogger.com/profile/14705727360452014571noreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-67212139667386959022010-11-10T21:59:00.001+05:302010-11-10T21:59:46.252+05:30Abhimanyu Khanna<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><span class="Apple-style-span" style="font-size: small;">Hi guys . I would be covering all about proxies in this blog .</span></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><span class="Apple-style-span" style="font-size: small;">so</span></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><br />
</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 5pt; margin-left: 0cm; margin-right: 0cm; margin-top: 5pt;"><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><span style="color: black; font-family: 'Times New Roman', serif;"><span class="Apple-style-span" style="font-size: small;">What is a P</span></span><span style="color: black; font-family: 'Times New Roman', serif; font-size: 10pt;">roxy Server?<br />
A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. I know many are looking for IP Maskers or Scramblers, but honestly, it aint real easy for the simple fact that any website that you visit needs your IP to send the info packets too. If its scrambled, you will get alot of errors and crazy redirects :P My solution? Read on........... for a good list of Proxy servers try here&gt;&gt; http://www.multiproxy.org/<br />
<br />
Why do I need to use proxy servers?<br />
Transfer speed improvement. Proxy servers accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately.<br />
Security and privacy. Anonymous proxy servers that hide your IP address thereby saving you from vulnerabilities concerned with it.<br />
Sometimes you may encounter problems while accessing to web server when server administrator restricted access from your IP or even from wide IP range (for example restricting access from certain countries or geographical regions). So you try to access those pages using an anonymous proxy server.<br />
<br />
What is a public proxy server?<br />
It is a proxy server which is free and open for everybody on the Internet. Unfortunately most of them are not anonymous.<br />
Free service trying to provide list of public HTTP proxy servers. Usually provide small list of proxies with low percent of functioning servers due to hosting restrictions on CPU time (they simply can't allow themselves to check many proxies every second especially in parallel).<br />
<br />
The Solution?<br />
When using an anonymous proxy server you don’t give a anybody chance to find out your IP address to use it in their own interests. ;) If there is a need to make an (inner) proxy connect to the outside world via another (outer) proxy server, you can use the same environment variables as are used to redirect clients to the proxy to make inner proxy use the outer one:<br />
http_proxy<br />
ftp_proxy<br />
gopher_proxy<br />
wais_proxy<br />
E.g. your (inner) proxy server's startup script could look like this:<br />
#!/bin/sh<br />
http_proxy=http://outer.proxy.server:8082/<br />
export http_proxy<br />
/usr/etc/httpd -r /etc/inner-proxy.conf -p 8081<br />
<br />
This is a little ugly, so there are also the following directives in the configuration file:<br />
http_proxy http://outer.proxy.server/<br />
ftp_proxy http://outer.proxy.server/<br />
gopher_proxy http://outer.proxy.server/<br />
wais_proxy http://outer.proxy.server/</span><span style="font-family: 'Times New Roman', serif; font-size: 12pt;"><o:p></o:p></span></div><div><span style="color: black; font-family: 'Times New Roman', serif; font-size: 10pt;"><br />
</span></div></div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0cm;"></div>Akshit Guptahttp://www.blogger.com/profile/14705727360452014571noreply@blogger.com1tag:blogger.com,1999:blog-792551684802414654.post-16466503778223737532010-11-10T21:55:00.000+05:302010-11-10T21:55:33.303+05:30Abhimanyu KhannaHi guys . I would be covering all about Proxies in this blog.<br />
<br />
<br />
<br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: 5.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;"><span style="color: black; font-family: "Times New Roman","serif"; font-size: 10.0pt;">What is a Proxy Server?<br />
A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. I know many are looking for IP Maskers or Scramblers, but honestly, it aint real easy for the simple fact that any website that you visit needs your IP to send the info packets too. If its scrambled, you will get alot of errors and crazy redirects :P My solution? Read on........... for a good list of Proxy servers try here>> http://www.multiproxy.org/<br />
<br />
Why do I need to use proxy servers?<br />
Transfer speed improvement. Proxy servers accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately.<br />
Security and privacy. Anonymous proxy servers that hide your IP address thereby saving you from vulnerabilities concerned with it. <br />
Sometimes you may encounter problems while accessing to web server when server administrator restricted access from your IP or even from wide IP range (for example restricting access from certain countries or geographical regions). So you try to access those pages using an anonymous proxy server. <br />
<br />
What is a public proxy server?<br />
It is a proxy server which is free and open for everybody on the Internet. Unfortunately most of them are not anonymous.<br />
Free service trying to provide list of public HTTP proxy servers. Usually provide small list of proxies with low percent of functioning servers due to hosting restrictions on CPU time (they simply can't allow themselves to check many proxies every second especially in parallel). <br />
<br />
The Solution?<br />
When using an anonymous proxy server you don’t give a anybody chance to find out your IP address to use it in their own interests. ;) If there is a need to make an (inner) proxy connect to the outside world via another (outer) proxy server, you can use the same environment variables as are used to redirect clients to the proxy to make inner proxy use the outer one: <br />
http_proxy <br />
ftp_proxy <br />
gopher_proxy <br />
wais_proxy <br />
E.g. your (inner) proxy server's startup script could look like this: <br />
#!/bin/sh<br />
http_proxy=http://outer.proxy.server:8082/<br />
export http_proxy<br />
/usr/etc/httpd -r /etc/inner-proxy.conf -p 8081<br />
<br />
This is a little ugly, so there are also the following directives in the configuration file: <br />
http_proxy http://outer.proxy.server/ <br />
ftp_proxy http://outer.proxy.server/ <br />
gopher_proxy http://outer.proxy.server/ <br />
wais_proxy http://outer.proxy.server/ </span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;"><o:p></o:p></span></div><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;"><br />
</div>Akshit Guptahttp://www.blogger.com/profile/14705727360452014571noreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-2964026230014109182010-11-10T21:53:00.000+05:302010-11-10T21:53:22.351+05:30Abhimanyu KhannaHi guys , all of you who use Yahoo chat this blog would be really useful for you . here are few commands for the Yahoo Chat.<br />
<br />
<br />
<br />
<div align="center" class="MsoNormal" style="line-height: normal; margin-bottom: 5.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-align: center; text-autospace: none;"><span style="color: silver; font-family: "Times New Roman","serif"; font-size: 12.0pt;">Yahoo Chat Commands:</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;"><o:p></o:p></span></div><div align="center" class="MsoNormal" style="line-height: normal; margin-bottom: 5.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 5.0pt; mso-layout-grid-align: none; mso-pagination: none; text-align: center; text-autospace: none;"><span style="font-family: "Times New Roman","serif"; font-size: 10.0pt;"><br />
/join [room] go to what ever room you wish<br />
<br />
/invite [buddys name] sends invitation request<br />
<br />
/tell [user] [message] private messages a friend<br />
<br />
/follow [user] follows a friend<br />
<br />
/stopfollow [user] stop following someone<br />
<br />
/stopfollow [yourname] to stop them from following you<br />
<br />
/goto [user] enters the room the user is in<br />
<br />
/away [off] turn your private messages back on<br />
<br />
/think [message] (type this to think what you want<br />
<br />
/ignore [list] list everyone who you are ignoring<br />
<br />
/ignore add [user] add someone to your ignoring list<br />
<br />
/ignore [add all] ignores everything going on</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt;"><o:p></o:p></span></div><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;"><br />
</div>Akshit Guptahttp://www.blogger.com/profile/14705727360452014571noreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-27802521464542818632010-11-10T21:45:00.001+05:302010-11-10T21:46:47.125+05:30Abhimanyu Khanna<span class="Apple-style-span" style="font-size: small;">Hi everyone. This is me Abhimanyu again . I thought about writing of tearing firewalls apart.</span><br />
<div><span class="Apple-style-span" style="font-size: small;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">A firewall is basically something that protects the network from the Internet. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">It is derived from the concept of </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">firewalls used in vehicles which is a barrier made of fire resistant material </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">protecting the vehicle in case of </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">fire. Anyway a firewall is best described as a software or hardware or both </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Hardware and Software packet </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">filter that allows only selected packets to pass through from the Internet to </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">your private internal network. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">A firewall is a system or a group of systems which guard a trusted network( The </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Internal Private Network </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">from the untrusted network (the Internet.) To understand how a firewall works, </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">firstly we need to understand </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">how exactly data is transferred on the Internet. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">NOTE: The following is a very weird, short and incomplete description of the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">TCP\IP protocol, I have just </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">given a general idea of the whole data transmission process so that everyone can </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">understand firewalls. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">The TCP\IP suite is responsible for successful transfer of data across a network </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">both the Internet and the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Intranet. The TCP\IP suite is a collection of protocols which are inter-related </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">and interdependent and act as a </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">set of rules according to which data is transferred across the network. A protocol </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">can be defined as a language </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">or a standard which is followed while transfer of data takes place. Lets go </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">through a brief explanation of how </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">data is transferred across a network following the various components of the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">TCP\IP suite. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">The whole process of data transmission begins when a user starts up an Internet </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">application like the email </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">client or a FTP client. The user types an email in his client and in this way </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">provides data to be </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">transferred. The email client is said to be a part of the application layer of </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the TCP\IP stack. Now this </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">application layer (email client) provides data (the email itself) which has to be </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">transferred to the Transmission </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">control protocol or TCP which constitutes the Transfer Layer of TCP\IP. TCP breaks </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">down the data i.e. the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">email into smaller chunks called packets and hands over the responsibility to the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Internet Protocol or IP </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">which forms the invisible network layer. This Internet Protocol adds some various </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">info to each packet to </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">ensure that the packet knows for which computer it is meant for and which port </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">or application it is going to </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">meet and from where it has come. An IP datagram contains: </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">1. A header which contains the Source and Destination IP, Time to live info and </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">also the protocol </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">used. There is also a header checksum present. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">2. Remaining part contains the data to be transferred. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">You do not need to understand all this in detail but just remember that TCP </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">breaks data into smaller packets </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">and IP adds the source and destination IP's to the packets. When the data reaches </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the other server IP hands </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the packets to TCP again which re assembles the packets. Port numbers are also </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">used to ensure that the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">packets know to which application it need to go to. So, basically we can conclude </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">that a successful </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">transmission of data across a network relies on the source and destination IP </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">and also the ports. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">A firewall too relies on the source and destination IP and also the ports to </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">control the packet transfer between </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the untrusted network and the trusted network. Firewalls can be classified into 3 </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">types: </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">1. Packet Filter Firewalls </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">2. Application proxy Firewalls </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">3. Packet Inspection Firewalls </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Packet Filter Firewalls </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">They are the earliest and the most criticized firewalls, which nowadays are not </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">easily found. They are usually </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Hardware based i.e. Router Based (a router is a piece of device which connects two </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">networks together.) </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Whenever a Packet Filter Firewall receives a packet for permission to pass </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">through, it compares the header </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">information i.e. the source and destination IP address, and port number with a </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">table of predefined access </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">control rules If the header information matches, then the packet is allowed to </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">pass else the packet is </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">dropped or terminated. They are not popular due to the fact that they allow </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">direct contact between the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">untrusted system and the trusted private system. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">To understand such firewalls lets take the example of the secretary that sits in </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">your office. This kind of </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">secretary allows only those people who have an appointment to pass but if you </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">convince her that her boss </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">wants to meet her then she would allow you to pass. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Such Firewalls can be fooled by using techniques like IP Spoofing in which we </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">can change the source </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">IP such that the firewall thinks that the packet has come from a trusted system </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">which is among the list of </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">systems which have access through the firewall. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Application proxy Firewalls </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">The shortcomings of the packet filter firewalls are addressed by the new type of </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">firewalls developed by </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the DARPA. It was widely believed that the earlier type of firewalls were not </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">secure enough as they allowed </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the untrusted systems to have a direct connection with the trusted systems. This </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">problem was solved with </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the use of Proxy servers as firewalls. A proxy server which is used as a </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">firewall are called application proxy </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">servers. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">This kind of a proxy firewall examines what application or service (running on </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">ports) a packet is meant for </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">and if that particular service is available only then is the packet allowed to </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">pass through and if the service is </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">unavailable then the packet is discarded or dropped by the firewall. Once this </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">is done, the firewall extracts </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the data and delivers it to the appropriate service. There is not direct </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">connection between the untrusted </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">systems with the trusted systems as the original data sent by the untrusted </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">system is dropped by the firewall </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">and it personally delivers the data. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Let's again take the example of a secretary. Such a secretary would take a gift </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">or something else for you </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">only if you are available in the office and it would not allow the visitor to </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">deliver the thing but would personally </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">deliver it to you. Although they are somewhat slower, they are much more </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">secure as they do not allow </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">a direct contact between an untrusted network and a trusted network. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Packet Inspection Firewalls </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">It can be also known as an extension of the Packet Filter Firewall. It not only </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">verifies the source and </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">destination IP's and ports, it also takes into consideration or verifies that </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">content of the data before passing it </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">through. There are two ways in which this kind of a firewall verifies the data to </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">be passed: </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">State and Session. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">In case of state inspection, an incoming packet is allowed to pass through only </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">if there is a matching </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">outward bound request for this packet. This means that the incoming packet is </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">allowed to pass through only </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">if the trusted server had requested for it or had sent an invitation for it. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">In case of session filtering, the data of the incoming is not verified, but </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">instead the network activity is traced </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">and once a trusted system ends the session, no further packets from that system </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">pertaining to that session </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">are allowed to pass through. This protects against IP spoofing to a certain </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">extend. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Such firewalls can also be configured beforehand to act according to pre defined </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">rules when it is attacked. It </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">can also be configured to disconnect from the Internet in case of an attack. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">All along you will come across many Firewalls on various systems, basically a </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">firewall can be established </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">or setup in two ways: </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">1. Dual-homed gateway </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">2. Demilitarized zone (DMZ) </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">In a dual homed gateway firewall, there is a single firewall with 2 connections, </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">one for the trusted network </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">and the other for the untrusted network. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">In the case of a Demilitarized Firewall or a DMZ there are two firewalls, each </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">with two connections, but there </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">is a slight difference in the case of a DMZ setup. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">In the case of a DMZ setup, there are two firewalls, the first having two </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">connections, one leading to the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">untrusted network and the other leading to the host systems like the email </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">server or the FTP server etc. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">These host systems can be accessed from the untrusted network. These host systems </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">are connected with the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">internal private trusted systems through another firewall. Thus there is no </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">direct contact between the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">untrusted network and the trusted internal network. The area or region between </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the two firewalls is termed as </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the demilitarized zone. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">In the case of a Dual Homed Gateway the untrusted network is connected to the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">host systems (email </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">and FTP servers etc) through a firewall and these host systems are connected to </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the internal private </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">network. There is no second firewall between the host systems and the internal </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">private trusted network. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">The basic structure of the DMZ setup declares it to be a more secure system as </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">even if an attacker gets </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">through the first firewall, he just reaches the host systems, while the internal </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">network is protected by another </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">firewall. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Do Firewalls provide enough Security for my Network? </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">The answer is a simple no. There is no such thing that a firewall is enough to </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">fulfill or satisfy all your </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">security concerns. Yes it does protect the trusted systems from the untrusted </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">ones, but they are definitely </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">not enough for all your security needs. We need to protect our systems to secure </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the company data. The </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">most common methods used to break into networks are brute force password </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">cracking and social </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">engineering. A firewall in no way can prevent such occurrences. </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">There are other ways in which attackers can steal or destroy company data. Phone </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Tapping and the use of </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">spy gadgets has become a common occurance.Although providing safety to the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">network to a large extend, a </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">firewall is still not able to protect the company data from Viruses and Trojans, </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">although some firewalls do </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">provide for scanning everything being downloaded, the rate at which new HTML, </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Java and other viruses are </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">propping up, it is becoming very difficult for firewalls to detect all </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">viruses. Anyway firewalls provide no </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">physical protection to the networks. It also provides no protection from fire, </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">tornados etc.Yet another </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">shortcoming is the fact that if the attacker is able to break into a trusted </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">system which is provided access by </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">the firewall, then he can easily gain access to the data at your network, as the </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">firewall will think that he is </span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">actually the trusted party. </span></span><br />
<span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
<span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
<span class="Apple-style-span" style="font-family: Verdana;"><span class="Apple-style-span" style="font-size: small;">Abhimanyu Khanna</span></span></div>Akshit Guptahttp://www.blogger.com/profile/14705727360452014571noreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-32624288989095475062010-11-10T21:42:00.000+05:302010-11-10T21:42:29.557+05:30Abhimanyu KhannaHi again guys, i decided to write about about Batch File Programming,<div><br />
</div><div> Batch file programming is nothing but the Windows version of Unix Shell <div>Programming. Let's start by understanding what happens when we give a DOS </div><div>command. DOS is basically a file called command.com</div><div>It is this file (command.com) which handles all DOS commands that you give at the </div><div>DOS prompt---such as COPY, DIR, DEL etc. These commands are built in with the </div><div>Command.com file. (Such commands which are built in are called internal </div><div>commands.).DOS has something called external commands too such as FORMAT, </div><div>UNDELETE, BACKUP etc.</div><div><br />
</div><div>So whenever we give a DOS command either internal or external, command.com </div><div>either straightaway executes the command (Internal Commands) or calls an external </div><div>separate program which executes the command for it and returns the </div><div>result (External Commands.)</div><div><br />
</div><div>So why do I need Batch File Programs? Say you need to execute a set of commands </div><div>over and over again to perform a routine task like Backing up Important Files, </div><div>Deleting temporary files(*.tmp, .bak , ~.* etc)</div><div>then it is very difficult to type the same set of commands over and over </div><div>again. To perform a bulk set of same commands over and over again, Batch files </div><div>are used. Batch Files are to DOS what Macros are to Microsoft Office and are used </div><div>to perform an automated predefined set of tasks over and over again.</div><div><br />
</div><div><br />
</div><div>So how do I create batch files? To start enjoying using Batch files, you need to </div><div>learn to create Batch files. Batch files are basically plain text files </div><div>containing DOS commands. So the best editor to write your commands in would be </div><div>Notepad or the DOS Editor (EDIT) All you need to remember is that a batch file </div><div>should have the extension .BAT(dot bat)Executing a batch file is quite simple </div><div>too. For example if you create a Batch file and save it with the filename </div><div>batch.bat then all you need to execute the batch file is to type:</div><div><br />
</div><div>C:\windows>batch.bat</div><div><br />
</div><div>So what happens when you give a Batch file to the command.com to execute? </div><div>Whenever command.com comes across a batch file program, it goes into batch </div><div>mode. In the batch mode, it reads the commands from the batch file line by </div><div>line. So basically what happens is, command.com opens the batch file and reads </div><div>the first line, then it closes the batch file. It then executes the command and </div><div>again reopens the batch file and reads the next line from it. Batch files are </div><div>treated as Internal DOS commands.</div><div>********************</div><div><br />
</div><div>Hacking Truth: While creating a batch file, one thing that you need to keep in </div><div>mind is that the filename of the batch file should not use the same name as a </div><div>DOS command. For example, if you create a batch file by the name dir.bat and then </div><div>try to execute it at the prompt, nothing will happen.</div><div>This is because when command.com comes across a command, it first checks to see </div><div>if it is an internal command. If it is not then command.com checks if it a .COM, </div><div>.EXE or .BAT file with a matching filename.</div><div>All external DOS commands use either a .COM or a .EXE extension, DOS never </div><div>bothers to check if the batch program exits.</div><div><br />
</div><div>******************</div><div><br />
</div><div>Now let's move on to your first Batch file program. We will unlike </div><div>always(Normally we begin with the obligatory Hello World program) first take up </div><div>a simple batch file which executes or launches a .EXE program. Simply type the </div><div>following in a blank text file and save it with a .BAT extension.</div><div>C:</div><div>cd windows</div><div>telnet</div><div>Now let's analyze the code, the first line tells command.com to go to the C:</div><div>Next it tells it to change the current directory to Windows. The last line tells it to </div><div>launch the telnet client. You may contradict saying that the full filename is </div><div>telnet.exe. Yes you are right, but the .exe extension is automatically added by </div><div>command.com. Normally we do not need to change the drive and the directory as </div><div>the Windows directory is the default DOS folder. So instead the bath file </div><div>could simply contain the below and would still work.</div><div><br />
</div><div>telnet</div><div><br />
</div><div>Now let's execute this batch file and see what results it shows. Launch </div><div>command.com (DOS) and execute the batch file by typing:</div><div><br />
</div><div>C:\WINDOWS>batch_file_name</div><div>You would get the following result:</div><div>C:\WINDOWS>scandisk</div><div>And Scandisk is launched. So now the you know the basic functioning of Batch </div><div>files, let' move on to Batch file commands.</div><div><br />
</div><div><br />
</div><div>So thats it for now, although batch file programming is a huge topic and it really cant be covered in a single blog , but i hope you all got the idea.</div></div><div><br />
</div><div><br />
</div><div><br />
</div><div>Abhimanyu khanna</div>Akshit Guptahttp://www.blogger.com/profile/14705727360452014571noreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-72854983278747431582010-11-10T21:33:00.000+05:302010-11-10T21:33:24.498+05:30Hi . This is me Abhimanyu writing an blog from Akshit account as i have not been able to accept the invitation from my account . Since i have not lead a lab session till now so i write this article about using databases in PHP<br />
<br />
<br />
<br />
<div class="para" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left; text-indent: 12px;">The first thing we need to do is connect to the database.</div><div class="center" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;"><pre class="example" style="background-color: #ebebeb; border-bottom-color: rgb(0, 0, 0); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(0, 0, 0); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(0, 0, 0); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(0, 0, 0); border-top-style: solid; border-top-width: 1px; margin-left: auto; margin-right: auto; padding-bottom: 3px; padding-left: 3px; padding-right: 3px; padding-top: 3px; text-align: left; width: 500px;">mysql_connect("somehost", "username", "password") or die ("Can't connect!");
</pre></div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;">This will try to connect to the database on somehost and login with “username” as the username and “password” as the password. If it can't, it will output an error message saying that it can't connect. For your own code be sure to change somehost to your host (most of the times it's localhost, ask your admin), username to your username (duh), and password to your password. Another way to connect to a database is to open a persistent connection. To do this, use the <span class="function" style="color: grey; font-weight: bold;">mysql_pconnect</span> function and pass it the same arguments as <span class="function" style="color: grey; font-weight: bold;">mysql_connect</span>. Why open a persistent connection? When you call <span class="function" style="color: grey; font-weight: bold;">mysql_pconnect</span>, instead of going out and opening a connection to the database, it sees if one is already open, if it is, the script will use it. Also, when the script has finished executing, the connection to the database will not automatically be closed like it is when using <span class="function" style="color: grey; font-weight: bold;">mysql_connect</span>. This way the connection can be used later on. Using a persistent connection is a good idea if your scripts constantly need to connect to the database.</div><div class="para" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left; text-indent: 12px;">After we have opened a connection to the database, we then select a database.</div><div class="center" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;"><pre class="example" style="background-color: #ebebeb; border-bottom-color: rgb(0, 0, 0); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(0, 0, 0); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(0, 0, 0); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(0, 0, 0); border-top-style: solid; border-top-width: 1px; margin-left: auto; margin-right: auto; padding-bottom: 3px; padding-left: 3px; padding-right: 3px; padding-top: 3px; text-align: left; width: 500px;">mysql_select_db("database_name") or die("Can't select database!");
</pre></div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;">This will try to select the database named “database_name” (for your own code change it to the name of your database). If it can't select the database, it will output and error. Once you're actually connected to a database, you will want to query a table in the database to get whatever you want done. A query looks like this:</div><div class="center" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;"><pre class="example" style="background-color: #ebebeb; border-bottom-color: rgb(0, 0, 0); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(0, 0, 0); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(0, 0, 0); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(0, 0, 0); border-top-style: solid; border-top-width: 1px; margin-left: auto; margin-right: auto; padding-bottom: 3px; padding-left: 3px; padding-right: 3px; padding-top: 3px; text-align: left; width: 500px;">mysql_query("Some query");
</pre></div><div class="para" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left; text-indent: 12px;">Common queries are <span class="term" style="color: grey; font-style: italic;">SELECT</span> and <span class="term" style="color: grey; font-style: italic;">INSERT</span> For full documentation go to the mysql web site (<a href="http://www.mysql.com/" style="color: #003f7f; text-decoration: underline;" target="_blank" title="Click to visit the MySQL website (link opens in a new browser window).">http://www.mysql.com</a>). Another common php function is <span class="function" style="color: grey; font-weight: bold;">mysql_num_rows</span>; if it isn't obvious this gets the number of rows from a query. Here is an example of how it can be used with <span class="function" style="color: grey; font-weight: bold;">mysql_query</span>:</div><div class="center" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;"><pre class="example" style="background-color: #ebebeb; border-bottom-color: rgb(0, 0, 0); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(0, 0, 0); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(0, 0, 0); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(0, 0, 0); border-top-style: solid; border-top-width: 1px; margin-left: auto; margin-right: auto; padding-bottom: 3px; padding-left: 3px; padding-right: 3px; padding-top: 3px; text-align: left; width: 500px;"><?php
$result= mysql_query("SELECT * FROM some_table");
$number_of_rows= @mysql_num_rows($result);
if ($number_of_rows == 0)
{
echo "Sorry there are no rows";
}
else {
echo "Yes! we found some rows!";
}
?>
</pre></div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;">Now you may be wondering why I put the @ sign before <span class="function" style="color: grey; font-weight: bold;">mysql_num_rows</span>. In php, the @ sign suppress errors; I put it in front of <span class="function" style="color: grey; font-weight: bold;">mysql_num_rows</span> so that if there are no rows, MySQL will not output a bunch of errors. So when would <span class="function" style="color: grey; font-weight: bold;">mysql_num_rows</span> be useful? Well, you could use it for an authentication script which searchs the database for a username and password and if it doesn't find any (i.e. if no rows are returned), it tells the user that the username, or password, are not correct.</div><div class="para" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left; text-indent: 12px;">Another really useful function is <span class="function" style="color: grey; font-weight: bold;">mysql_fetch_array</span>, because it gets the rows and puts them in an array that contains the name of the rows. That way instead of having to access each row by number you can do it by name! For example, let's say that our database looked like this:</div><div class="center" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;"><table align="center" border="1" cellpadding="2" cellspacing="0" class="example" style="font-size: 12px; text-align: left; width: 200px;" summary="Table of flags"><tbody>
<tr class="exampletop" style="background-color: #ebebeb;"><td>User</td><td>Password</td></tr>
<tr class="example"><td>John</td><td>afasdfadsfdsf</td></tr>
<tr class="example"><td>Billy</td><td>tla;jrjealjwqsldajf</td></tr>
<tr class="example"><td>Mitch</td><td>pqrtupipripewir</td></tr>
</tbody></table></div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;">We would use the following code to get the users' names and output them:</div><div class="center" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;"><pre class="example" style="background-color: #ebebeb; border-bottom-color: rgb(0, 0, 0); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(0, 0, 0); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(0, 0, 0); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(0, 0, 0); border-top-style: solid; border-top-width: 1px; margin-left: auto; margin-right: auto; padding-bottom: 3px; padding-left: 3px; padding-right: 3px; padding-top: 3px; text-align: left; width: 500px;"><?php
echo "The users in this database are: <br>";
$result= mysql_query("SELECT * FROM some_table");
while ($row= mysql_fetch_array($result))
{
$username= $row["User"];
echo "$username<br>";
}
?>
</pre></div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;">This will output all the usernames in a database; you can add error checking if you like. The while statement is read “while there are rows that satisfy the query, put the contents of the row from the column ‘User’ into the variable ‘username,’ and print the usernames (each on a new line) to an HTML page.”</div><div class="para" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left; text-indent: 12px;">Now let's cover a couple of functions that actually work with the database. The first is <span class="function" style="color: grey; font-weight: bold;">mysql_create_db</span>, don't you just love how the functions are named you can figure out what they do just by looking at the function name, this one obviously creates a database. Here's how to use it:</div><div class="center" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;"><pre class="example" style="background-color: #ebebeb; border-bottom-color: rgb(0, 0, 0); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(0, 0, 0); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(0, 0, 0); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(0, 0, 0); border-top-style: solid; border-top-width: 1px; margin-left: auto; margin-right: auto; padding-bottom: 3px; padding-left: 3px; padding-right: 3px; padding-top: 3px; text-align: left; width: 500px;"><?php
echo "I am going to try to create a database...<br>";
if (mysql_create_db("test_database"))
{
echo "Hooray, I've created the database!<br>";
}
else {
echo "Darn couldn't create the database! because: ";
echo "mysql_error() <br>";
}
?>
</pre></div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;">You can see I used a new function, <span class="function" style="color: grey; font-weight: bold;">mysql_error</span>, you don't really need to know too much about it, all it does is return the error string sent by MySQL. Now since we learned how to create a database, how's about we learn to delete one. To do that use the <span class="function" style="color: grey; font-weight: bold;">mysql_drop_db</span>, here is how to use it:</div><div class="center" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;"><pre class="example" style="background-color: #ebebeb; border-bottom-color: rgb(0, 0, 0); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(0, 0, 0); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(0, 0, 0); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(0, 0, 0); border-top-style: solid; border-top-width: 1px; margin-left: auto; margin-right: auto; padding-bottom: 3px; padding-left: 3px; padding-right: 3px; padding-top: 3px; text-align: left; width: 500px;"><?php
echo "I am going to try to delete a database...<br>";
$result= mysql_drop_db("test_database");
if (!$result)
{
echo "Darn couldn't I couldn't delete the database!<br>";
}
else {
echo "Hooray, I've deleted the database<br>";
}
?>
</pre></div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;">You can see that the syntax is very similar to that of <span class="function" style="color: grey; font-weight: bold;">mysql_create_db</span>, just pop the name of the database you want to delete into the function.</div><div class="para" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left; text-indent: 12px;">The next two items aren't functions, rather they are queries that you can use to manage an existing table. The following query will insert data into a database:</div><div class="center" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;"><pre class="example" style="background-color: #ebebeb; border-bottom-color: rgb(0, 0, 0); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(0, 0, 0); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(0, 0, 0); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(0, 0, 0); border-top-style: solid; border-top-width: 1px; margin-left: auto; margin-right: auto; padding-bottom: 3px; padding-left: 3px; padding-right: 3px; padding-top: 3px; text-align: left; width: 500px;"><?php
echo "I am going to try to insert data into a table...<br>";
$result= mysql_query("INSERT INTO test_database (username, password) VALUES
(Rahim, adfjaldadfsdaf)");
if (!$result)
{
echo "Darn couldn't I couldn't delete the database!<br>";
}
else {
echo "Hooray, I've deleted the database<br>";
}
?>
</pre></div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;">This query should be pretty obvious, it inserts the data defined in between the parentheses into the rows. Just a little note to remember, the order in which you write out the column names is the order your data will be entered (i.e. a row with the contents Rahim will be entered under username, not password since we wrote username then pasword, if it was reveresd Rahim would be put under password).</div><div class="para" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left; text-indent: 12px;">The next query we've already gone over, I'm just going to add to it; after I'm done you should be able to use it to help create a simple search engine (upcomming tutorial)! For the sake of brevity I'll remove all the extra php stuff and just show you the “meat” of the code.</div><div class="center" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;"><pre class="example" style="background-color: #ebebeb; border-bottom-color: rgb(0, 0, 0); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(0, 0, 0); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(0, 0, 0); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(0, 0, 0); border-top-style: solid; border-top-width: 1px; margin-left: auto; margin-right: auto; padding-bottom: 3px; padding-left: 3px; padding-right: 3px; padding-top: 3px; text-align: left; width: 500px;">$result= mysql_query("SELECT name FROM some_table WHERE name=Joe AND
lastname=Sixpack OR lastname=Becker ORDER BY lastname LIMIT 20");
</pre></div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;">Now I know that looks like a long query, but it's not really all that bad. What it's pretty much saying is: “Get me the name from some_table where the name is Joe and the lastname is Sixpack or Becker, oh and by the way while your at it, put it in alphabetical order by the lastname; oh and one last thing, just get the first 20 results please.” MySQL has lots of other filters that you can add on to the SELECT statement, I highly suggest you download the MySQL documentation and give it a perusing.</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;"><br />
</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;"><br />
</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;"><br />
</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;"><br />
</div><div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; text-align: left;">Abhimanyu khanna</div>Akshit Guptahttp://www.blogger.com/profile/14705727360452014571noreply@blogger.com1tag:blogger.com,1999:blog-792551684802414654.post-39636886085945518522010-11-10T21:23:00.002+05:302010-11-10T21:42:08.296+05:30Being a teacher for the first time!!Well, Leading a lab session was not an easy task.<div>I did the lab leading with Anulima Chaudhary.</div><div>Now we realized that how difficult it is for our TAs to tech us during labs.</div><div><br /></div><div>The first most difficult task for us was to decide the sequence in which the topics will be taught and the second most difficult task was to decide what all we need to cover in each subtopic and till what extent. It was not easy to clear everybody's doubts. But we finally managed to do it.</div><div><br /></div><div>The topics that we covered were </div><div><b>Creating Web Sites: </b>We first needed to set a server for which we used xampp to set up a local host. Then we finally used two web site making tools like Wordpress and Joomla. The best about these softwares was that we don't need any programming while using them. </div><div><b>Wire Shark: </b>It's a spy kind of software. It captures your data packets from the net and then we can decode it so that we know about what the user accessed at that time. </div><div><b>Folder Guard: </b>It's a software which can set password protection for any of your folder.</div><div><b>P2P:</b>In it we covered lime wire through which friends can tranfer data among themselves.</div><div>Next, we taught about how we can connet two computers using R-45 cross cables and transfer data in windows to windows , windows to linux and linux to linux.</div><div><br /></div><div>Over all it was a nice experience. All the project groups who trained us for leading this lab session were very helpful. I also enjoyed leading the lab session with Anulima Chaudhary. </div><div><br /></div><div>Ayushi Goyal (2010025)</div><div><br /></div>Ayushi Goyalhttp://www.blogger.com/profile/15185669902491977450noreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-87612237418160144102010-11-10T21:19:00.009+05:302010-11-10T22:14:17.771+05:30Group Project on PC Troubleshooting"A lot happens when you stand up and promise yourself that you will do it however tough it is",<div> that is how I will describe my project.</div><div>When we(I and my group partners Jatin and Aishwarya) took up this project, we thought this was not going to be too tough,at least the name can make anybody believe that but things happen when they are least expected.</div><div>Troubleshooting in Windows was not too tough but the challenge began when we went on to Linux. We simply could not find anything to troubleshoot in Linux. It took days research and sleepless nights to get something meaningful and presentable. </div><div>Now, since a lot of you guys had a query or another about kernel I would explain what a linux kernel is.</div><div>A Kernel is not particularly made for Linux, it can be for any OS. It is basically just a medium between the software and the hardware of a computer. It contains some codes that allow your software to communicate with your hardware. Mostly it contains the drivers for your hardware and a process management system that determines what application will interact with the hardware at what point of time.</div><div>For more information on kernel visit <a href="http://en.wikipedia.org/wiki/Kernel_(computing)">http://en.wikipedia.org/wiki/Kernel_(computing)</a></div><div><br /></div><div>In Linux this kernel determines what drivers you are running for your hardware. So, if you install some new hardware to your computer it may or may not happen that the OS recognizes the hardware. If it doesn't, that you have an option of upgrading the kernel. You just have to be careful that you download the correct upgrade for your version of Kernel. </div><div><br /></div><div>Then the other confusing part of the log files comes. The log files that are stored in \var\log are not always meant to be understood as they contain some words that we are not well acquainted to right now. We are just required to deduce which were the processes that failed when an error occurred, then we need to find the possible reason that could have caused the problem. We all know that a problem becomes simpler if we can break it into smaller parts and that is what is happening over here. While trying to troubleshoot a problem you just need to find out which are the log files which would contain the logs related to that software or hardware and go through its latest records, and that may well solve your problem.</div><div><br /></div><div>I hope, I was able to solve your queries to as much extent as possible.</div><div>BEST OF LUCK FOR EXAMS</div><div> </div>Soumyavardhan Singhhttp://www.blogger.com/profile/07968385821049510653noreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-73653020292649805582010-11-10T20:44:00.005+05:302010-11-10T21:14:08.967+05:30Google Chrome Operating System<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpy4EagE0W-bP7CpUQdGEFFlFTpHCNVlIYag0vHl2x0CvZgtsMuwrYdLUneeY3Z9x8LfzP3gAXfLOropdy24IoL0QD4cxw1X6ZwHUUPPPHK0VmIq7_WWJZmsyZG7g5s6YH0pKiUzuKOPw/s1600/images.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 270px; height: 187px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpy4EagE0W-bP7CpUQdGEFFlFTpHCNVlIYag0vHl2x0CvZgtsMuwrYdLUneeY3Z9x8LfzP3gAXfLOropdy24IoL0QD4cxw1X6ZwHUUPPPHK0VmIq7_WWJZmsyZG7g5s6YH0pKiUzuKOPw/s320/images.jpg" alt="" id="BLOGGER_PHOTO_ID_5537946162913345154" border="0" /></a><br /><span style="font-family:trebuchet ms;">Google Chrome OS is an up coming LINUX-based, open source, lightweight operating system(and will be available to use at no cost) that will initially be made for netbooks. It is expected to be launched in the year 2011 before windows launches its new operating system.Google Chrome OS is being created for people who spend most of their time on the web, and is being designed to power computers ranging from laptops to full-size desktop systems.All web-based applications will automatically work and new applications can be written using your favorite web technologies. And of course, these apps will run not only on Google Chrome OS, but on any standards-based browser on Windows, Mac and Linux thereby giving developers the largest user base of any platform.Google is working with companies like Acer, Adobe, ASUS, HP, Lenovo, Qualcomm, Texas Instruments, and Toshiba(some more companies may be involved but i have no idea about them).</span> <span style="font-family:trebuchet ms;"><br />The image on the right shows a screenshot of the awaited Google Chrome OS.Though it looks more like the chrome browser but it has applications on the bottom like the dock in MAC and most of these are web based applications.( As wriiten a few lines above-</span><span style="font-family:trebuchet ms;">Google Chrome OS is being created for people who spend most of their time on the web</span><span style="font-family:trebuchet ms;">).<br />Some of the biggest question marks till date:</span> <span style="font-family:trebuchet ms;"><br />1. Will Google Chrome OS replace Ubuntu?</span> <span style="font-family:trebuchet ms;"><br />2. Will this release affect Microsoft on a large scale?</span> <span style="font-family:trebuchet ms;"><br />3. Last but not the least - Will it come up to our expectations with the brand name of GOOGLE?</span>Sahilhttp://www.blogger.com/profile/09112108255308831621noreply@blogger.com1tag:blogger.com,1999:blog-792551684802414654.post-7790445932745318092010-11-10T20:31:00.002+05:302010-11-10T20:37:31.023+05:30Windows Phone 7 vs. AndroidI read the article on windows phone 7 and Android on following link:<br /><br />http://www.zdnet.com/blog/cell-phones/windows-phone-7-vs-android-can-you-choose-just-one/5024<br /><br />I found it interesting and hope you will also like itUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-82662543832577967482010-11-10T18:45:00.002+05:302010-11-10T18:46:08.696+05:30LEADING THE LAB SESSIONLab 10 was led by me and Ayushi Goyal. It was a really good experience,though i was very nervous in the beginning.<br />Our lab included the following topics:<br />1.Creating local host on machine using xampp<br />2.P2P networking<br /><ul><li> connecting two laptops via P2P and then sharing files(both in windows and linux)</li></ul><ul><li> connecting two or more than two laptops at a time</li></ul><ul><li> messaging over LAN <br /></li></ul> 3. Creating websites using Joomla and Wordpress tools on a local machine<br />4. Wireshark<br />5. Folder gaurd<br />Initially we thought that we wont be able to cover all the topics in 2 hrs duration since creating websites was very time consuming. Our lab started by installing the required softwares in each pc which consumed our lot of time. But with proper time management we managed to cover all the topics within time.<br />Through this session my knowledge on these topics definitely got enhanced and i finally know how to create a website which i always wanted to learn. Since it was my first experience so was a little nervous but at the end enjoyed a lot :)<br /><br />Anulima Choudhary<br />2010018Anulimahttp://www.blogger.com/profile/04733519156214682535noreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-79505629969890953342010-11-10T18:24:00.001+05:302010-11-10T18:24:47.043+05:30Leading the Lab Session..<span class="Apple-style-span" style="font-family: 'trebuchet ms', verdana, arial, sans-serif; border-collapse: collapse; color: rgb(51, 51, 51); line-height: 18px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; "><span class="Apple-style-span" style="font-size: medium;">We know that we are later than late but as some wise person has said"its never too late to learn", here we are , finally, sharing our Lab Session leading experience.. As usual we both kept on delaying our lab session leading but one fine day we decided to take on this heavy task and the main motivation behind it was Aditi's Group Project presentation due in the same week. So, it was the best time for us as we had our hands on atleast some part of the topics we had to cover.<br />It was in the first presentation week and we were damn nervous about it as we had undergone training by our peers only and had no guidance from our TAs.<br />The topics we had to cover were:Enabling and disabling Firewall in Windows and Ubuntu.Setting up a Wireless router and its basic utilities.Types of internet securities.WEP hacking.Well, as our group members would be already aware our lab session was almost a mess, mainly because whatever we had to teach was quite simple and already known to most of them or their projects were already on these topics. Some of our intelligent (they think so) peers tried creating nuissance in lab by changing SSID and password of the router we had setup.But our overall experience was good. Since it was our very first experience ....so....we enjoyed a lot...:)<br />Aditi Lal 2010005<br />Aishwarya Jain 2010007</span></span>aditihttp://www.blogger.com/profile/13429208318856614853noreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-91216396913095448382010-11-10T16:57:00.003+05:302010-11-10T17:38:46.892+05:30SMART PHONES<span style="font-weight: bold;"> SMART PHONES<br /></span>Smart phones are nothing but a multi utility mobile phones. Apart from making calls you can also get additional features as it runs on a complete operating system like functionality. they are actually pda's(personal digital assisstance) with various functionalities like colour screens, audio capability, web browser, portable media player.It also allows to install additional mobile applications.<br /><br /> some of the smart phones that came initially were:<br />1 PSION ORGANISER 2 (1984)<br /><ul><li> was 8 bit processer</li><li>9V battery, lasted for several months</li><li>develop own applications(opl language)</li></ul>memory extensions, plug in module<br />2 IBM SIMON( in 1994)<br /><ul><li> touchscreen</li><li>PIM, data communication</li></ul><ul><li>first real smartphone</li></ul>nokia N-95 came in 2007<br />it had various features like -:<br /><ul><li>QVGA display</li><li>5mpixel camera</li><li>integrated gps</li><li>usb, radio, tv out, etc</li></ul><br />3 SYMBIAN OS<img src="file:///tmp/moz-screenshot-1.jpg" alt="" /><img src="file:///tmp/moz-screenshot-2.jpg" alt="" /><br /><ul><li>mobile phone manufacturers such as 'sony ericsson. panasonic, seimens,nokia,samsung etc' are shareholders of it.</li><li>mainly touchscreen interface(+ combinations)</li><li>it is hte biggest selling operating system at present.<br /></li></ul><br /><br /><br /><br /><br /><br /><img src="file:///tmp/moz-screenshot-3.jpg" alt="" /><br /><img src="file:///tmp/moz-screenshot.jpg" alt="" />prachi agarwalhttp://www.blogger.com/profile/09416210404440238624noreply@blogger.com7tag:blogger.com,1999:blog-792551684802414654.post-3746183255943747702010-11-09T23:17:00.001+05:302010-11-09T23:20:07.034+05:30Virus threats in computer<p class="MsoNormal"><span style="font-size:12.0pt;mso-bidi-font-family:Calibri; mso-bidi-theme-font:minor-latin">The virus attacks on computer have been there since long time and most of us have faced it at some point of time. Starting with the basic definition a virus in computers can be <span class="apple-style-span"><span style="color:black">a program or programming code that replicates by being copied to computer</span></span><span class="apple-converted-space"><span style="color:black"> </span></span><span class="apple-style-span"><span style="color:black">boot sector</span></span><span class="apple-converted-space"><span style="color:black"> </span></span><span class="apple-style-span"><span style="color:black">or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on an external drive or CD. The immediate source is downloaded file you've received is usually unaware that it contains a virus.</span></span> <o:p></o:p></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt"><span style="font-size:12.0pt;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin">The common symptoms of a computer infected by virus are mainly seen by reduced performance; unknown operations working in the back ground, task manager do not work properly, cases of computer as well as operating system crashes increase significantly. The symptoms depend upon the sources code of the attacking virus. The performance is greatly reduced. Many operations which are unknown to the user run in the computer, windows task manager is disabled .Disk space gets reduced suddenly. Many other unwanted messages are displayed. <o:p></o:p></span></p> <p class="MsoListParagraph" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;line-height:115%"><span style="font-size:12.0pt;line-height: 115%;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt"><span style="font-size:12.0pt;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin">Though there are hundreds of antivirus software available but most of them are either paid antivirus or only their trial versions are available. Of all the antivirus we have <span style="mso-spacerun:yes"> </span>tried, we found that Norton internet security 2010 in paid version and AVG and Panda antivirus are best free versions on the basis of their capability to clean up <span style="mso-spacerun:yes"> </span>the system and the load it puts on computer.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt"><span style="font-size:12.0pt;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt"><span style="font-size:12.0pt;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin">Types of antivirus includes cloud antivirus which is able to send programs or documents to a network cloud where it uses multiple antivirus Or we can put <span style="mso-spacerun:yes"> </span>in Network Firewalls which </span><span style="font-size:12.0pt;mso-fareast-font-family:"Times New Roman";mso-bidi-font-family: Calibri;mso-bidi-theme-font:minor-latin;color:black">prevent unknown programs and Internet processes from accessing the system protected. However, they are not antivirus systems as such and thus make no attempt to identify or remove anything. </span><span style="font-size:12.0pt;mso-bidi-font-family:Calibri; mso-bidi-theme-font:minor-latin">Other options include Online Scanning and editing registry.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt"><span style="font-size:12.0pt;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt"><span style="font-size:12.0pt;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin">However, antivirus decreases system’s performance and operational speed.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt"><span style="font-size:12.0pt;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt"><span style="font-size:12.0pt;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin">In subsequent years major threat will be from network viruses. It is now only in the earliest state of developments. This type of<span style="mso-spacerun:yes"> </span>virus make their first faint attempts to spread their code by themselves via Microsoft Mail and using FTP, but the best is yet to come.<o:p></o:p></span></p>shubhamhttp://www.blogger.com/profile/15847068180887685289noreply@blogger.com1tag:blogger.com,1999:blog-792551684802414654.post-9366854106478514442010-11-09T23:14:00.001+05:302010-11-09T23:14:57.209+05:30Virus threats in computers<span xmlns=''><p><span style='font-size:12pt'>The virus attacks on computer have been there since long time and most of us have faced it at some point of time. Starting with the basic definition a virus in computers can be <span style='color:black'>a program or programming code that replicates by being copied to computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on an external drive or CD. The immediate source is downloaded file you've received is usually unaware that it contains a virus.</span><br /> </span></p><p><span style='font-size:12pt'>The common symptoms of a computer infected by virus are mainly seen by reduced performance; unknown operations working in the back ground, task manager do not work properly, cases of computer as well as operating system crashes increase significantly. The symptoms depend upon the sources code of the attacking virus. The performance is greatly reduced. Many operations which are unknown to the user run in the computer, windows task manager is disabled .Disk space gets reduced suddenly. Many other unwanted messages are displayed. <br /></span></p><p style='margin-left: 36pt'><br /> </p><p><span style='font-size:12pt'>Though there are hundreds of antivirus software available but most of them are either paid antivirus or only their trial versions are available. Of all the antivirus we have tried, we found that Norton internet security 2010 in paid version and AVG and Panda antivirus are best free versions on the basis of their capability to clean up the system and the load it puts on computer.<br /></span></p><p><br /> </p><p><span style='font-size:12pt'>Types of antivirus includes cloud antivirus which is able to send programs or documents to a network cloud where it uses multiple antivirus Or we can put in Network Firewalls which <span style='color:black'>prevent unknown programs and Internet processes from accessing the system protected. However, they are not antivirus systems as such and thus make no attempt to identify or remove anything. </span>Other options include Online Scanning and editing registry.<br /></span></p><p><br /> </p><p><span style='font-size:12pt'>However, antivirus decreases system's performance and operational speed.<br /></span></p><p><br /> </p><p><span style='font-size:12pt'>In subsequent years major threat will be from network viruses. It is now only in the earliest state of developments. This type of virus make their first faint attempts to spread their code by themselves via Microsoft Mail and using FTP, but the best is yet to come.</span></p></span>shubhamhttp://www.blogger.com/profile/15847068180887685289noreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-56511935937499409202010-11-09T22:27:00.002+05:302010-11-09T22:29:16.311+05:30Leading the lab session... my experience..<div>well, we finally got an oppurtinity to lead a lab session. and now, with full conviction i can say that teaching is not (Capitalised) easy.</div><div><br /></div><div>I could go rambling on about the problems we faced but if you really are reading this i assume you're not expecting a complaint letter... lol..</div><div><br /></div><div>My part in the lab was pretty elaborate and since the students were more interested in ''just watching the demo" i gave the demo and tried to make it as clear as it could be. This was made easier by the fact that i was covering windows utilities like Disk Cleanup and Disk Defragmenter which everyone was familiar with. Also i had to cover Prezi which is pretty easy to use and really amazing in fact. So all i would wanna say is that though my part was not so complicated but due to Diwali and the subsequent quagmire it caused in our coordination it did prove somewhat a task to gather enough knowledge that is needed to lead a lab session resulting in our last minute preparations.</div><div><br /></div><div>The thing is that we DID lead the lab session thanks to Dr. Amarjeet sir for providing this opportunity.</div><div><br /></div><div>Mithil Gupta</div><div>2010049</div><div><br /></div>Mithilhttp://www.blogger.com/profile/07453780293448193076noreply@blogger.com0tag:blogger.com,1999:blog-792551684802414654.post-72717571608320130282010-11-09T20:02:00.000+05:302010-11-09T20:02:16.322+05:30Data Compression and a few Software involved....<div class="MsoNormal"></div><div class="MsoNormal"> Though the project seemed easy, but we were in a dilemma as to what we should cover in our project as we thought everyone is already aware of data compression and can use archives without the need of our demos.</div><div class="MsoNormal"> But, we suddenly had this idea of comparing different softwares and look at new features that these softwares provide. These included:</div><ul style="margin-top: 0in;" type="disc"><li class="MsoNormal">Brief description of the tools used- WinRAR , BitZipper , 7-zip</li>
<li class="MsoNormal">Backup </li>
<li class="MsoNormal">Batch tool</li>
<li class="MsoNormal">Making SFX files</li>
<li class="MsoNormal">Securing archives with passwords</li>
</ul><div class="MsoNormal">I and my partners Jyotika and Shruti then took up 3 different software after going through features of many archives. After choosing 3 such software, we used to literally argue that whose archive was the best. And while debating we actually did a lot of comparisons, came up with new features that we had never heard of.</div><div class="MsoNormal">(Jyotika n Shruti ended up teasing me because we concluded that BitZipper had lost the race)<b>;-)</b></div><div class="MsoNormal"><b><br />
</b></div><div class="MsoNormal">Practical stuff was interesting. The main challenge was to sit for hours after college and compile our search to make one SINGLE presentation!</div><div class="MsoNormal">But, we eventually succeeded in finishing the presentation in time.</div><div class="MsoNormal"><b>Though our coordination during presentation wasn’t up to the mark (due to lack of time, we couldn’t rehearse it that well with the projector), but still I feel that our presentation was good. All of us had worked equally on it, were well aware of everything present in the slides and answered all the questions that we were asked in class. </b></div><div class="MsoNormal"><br />
</div><div class="MsoNormal">I’d like to thank Jyotika Dora and Shruti Kapur who are equally responsible for the success of this project. I’m proud to have such hard working partners who obeyed all my instructions, are intelligent and didn't mind when I screamed at them.<b>:)</b></div><div class="MsoNormal">Thank You Sir for providing us with an opportunity to learn to work as a team and gain knowledge at the same time!</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div>SaKsHihttp://www.blogger.com/profile/15446146566055854212noreply@blogger.com3tag:blogger.com,1999:blog-792551684802414654.post-58966237375775133792010-11-09T19:51:00.002+05:302010-11-09T20:28:47.270+05:30Leading The Lab... :)I should first apologize for posting my blog late as i led the 9 th lab session and this week is the i think 12 week so i am 3 weeks late. :(<div><br /><div><span class="Apple-tab-span" style="white-space:pre"> </span>I led my lab with Sakshi and she had informed me about leading the lab session just 2 days before the training session, so i had to rush directly from the airport.</div><div><span class="Apple-tab-span" style="white-space:pre"> </span>I personally thought that the topics that were chosen for the 9th lab session were pretty interesting, and it was a nice experience learning them during the training session. Now moving on to whatever was covered during the labs.</div><div><span class="Apple-tab-span" style="white-space:pre"> </span>First topic was D<b>ata recovery from mistakenly deleted files</b> the tool that was to be used for data recovery was 'PC inspector' which is quite handy tool as far as the data recovery from PD's is concerned, it took some time as the software had to be provided by PD's to everyone personally also doubts on the topic and the whole concept of data recovery were almost endless.</div><div><span class="Apple-tab-span" style="white-space:pre"> </span>Next topic that we got training for was <b>Shredding in ubuntu </b>this was another topic that was pretty interesting and discussed during the training and the lab because when we got to know that there are numerous softwares that work on recovering even the shredded files there was a discussion on how actually might the data be stored on the memory devices that we have. </div><div><span class="Apple-tab-span" style="white-space:pre"> </span>Next came <b>LateX </b>this was the only one topic that we all found a little boring (no offence :)) </div><div>because it was a totally new language and some programming had to be done in it, the syntax had to be referred again and again as it was a new language and we hadn't yet got the hang of it.But i also found it quite interesting as it was one interface in which we could create the text documents of different formats under one software.</div><div><span class="Apple-tab-span" style="white-space:pre"> </span>Next was <b>Web crawling </b>this was another interesting topic as the idea of having a backup of the whole website in your PC without doing much was nice, also it would extract the information that you ask for during the crawling and you can just refer to it whenever you want to even when you are offline. One bad point web crawlers banned on google :( and many people wanted to try out using the web crawlers on google.</div><div><span class="Apple-tab-span" style="white-space:pre"> </span>last topic that was covered in the lab was <b>backing up data </b>this was pretty easy and useful topic, there is already an inbuilt utility provided by the Microsoft people on our windows, so many students had already explored it on their own and the remaining found it pretty easy to understand and use.</div><div><span class="Apple-tab-span" style="white-space:pre"> </span>This was my first attempt at teaching a group of people something and it was not that easy, the experience was worthwhile and different, and i am glad that i had the opportunity to experience something different :):)</div></div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-792551684802414654.post-75265918374913773142010-11-09T19:27:00.014+05:302010-11-09T20:24:45.249+05:30Displax : The Multi-Touch Film<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy6MaVlQJKCp_wbLl_2mWtDDq-seiFJYQJTYaVw7nHU5h3QCmgh4MKjagffPOhroCmvTWq6wXdoi-KQBzVUze_jNAd41c3B-vEDWHXjKFJZS5udBIoVJQP2K6rO5oHbPc25mAKbe5vZpo/s1600/displax-screen.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy6MaVlQJKCp_wbLl_2mWtDDq-seiFJYQJTYaVw7nHU5h3QCmgh4MKjagffPOhroCmvTWq6wXdoi-KQBzVUze_jNAd41c3B-vEDWHXjKFJZS5udBIoVJQP2K6rO5oHbPc25mAKbe5vZpo/s320/displax-screen.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5537563377771458082" /></a><br /><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div> </div><div><br /></div><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLf9hQ0XjNF1KM2-8nHRf_U3Cw-W1nG1JgW8TuB3zh5Akra4fof0ZMnzlklYbllSiHyk-1Q3eSnu18Hyuh2qhkH4cDPXoCuXABL36IjMIKCozPkOY3rDaFO1bKP_fv1xAbuztYmGtIwuI/s1600/skin3.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 218px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLf9hQ0XjNF1KM2-8nHRf_U3Cw-W1nG1JgW8TuB3zh5Akra4fof0ZMnzlklYbllSiHyk-1Q3eSnu18Hyuh2qhkH4cDPXoCuXABL36IjMIKCozPkOY3rDaFO1bKP_fv1xAbuztYmGtIwuI/s320/skin3.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5537562671290455170" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEHmtsbxOUNPdcn_ZOJ1zuBXfy7_dvoYkfVxuTHPYM1tTb0rzdXigy51h1P9eGsdOpemwFGTpbfDMVRcrLAaxg8IO3XBCCyN-tC8swRH_aJqg_3q71qbdX47xMKSNQT8PKX6cypH40plk/s1600/multitoe-multitouch-floor-display.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 174px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEHmtsbxOUNPdcn_ZOJ1zuBXfy7_dvoYkfVxuTHPYM1tTb0rzdXigy51h1P9eGsdOpemwFGTpbfDMVRcrLAaxg8IO3XBCCyN-tC8swRH_aJqg_3q71qbdX47xMKSNQT8PKX6cypH40plk/s320/multitoe-multitouch-floor-display.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5537562669281187362" /></a><br /><div style="text-align: center;"><span class="Apple-style-span" ><u><br /></u></span></div><br /><div style="text-align: center;"><br /></div><div style="text-align: center;"><span class="Apple-style-span" ><u><br /></u></span></div><br /><div>With technology progressing day by day, now we have a new addition every day. Recently DISPLAX, a portugal based company has started mrketing about there latest futuristic project i.e. Multitouch screen.It can be applied on any non-metal surface.</div><div><br /></div><div>DISPLAX multitouch technology converts any non-conducting surface into an interactive multitouch surface. </div><div><br /></div><div>The skin is actually made up of thinner than paper polymer film.</div><div><br /></div><div>It can be stuck on or below a glass,plastic or wood with a thickness under 15mm, So that it can now respond to touch and airflow.</div><div> </div><div>It can detect upto 16 fingers simultaneously on a 50 inch screen.</div><div>Can be as small as 35 cm and as long as 3v meters in diagonal and thinner than paper(100 microns)</div><div><br /></div><div>Can be applied on transparent surface also and it doesnot hinder the display also.</div><div><br /></div><div>It can detect air-movement by measuring the intensity and direction of air flow.</div><div><br /></div><div>It has an array of nanowiress embedded in the film which recognizes your digits or pointed breadth, and it then passes information along to a microcontroller and software suite that transforms the inputs into reactions on your system.</div><div><br /></div><div>Each time a finger is placed on the screen or a user blows onto the surface, a small electrical disturbance is detected allowing the micro-processor controller to pinpoint the movement or direction to the air flow.</div><div><br /></div><div>Hardware that it contains is Multitouch controller and nanowired polymer film.</div><div>In softwares it has firmwares,softwares and control panel.</div><div><br /></div><div>It's light weight (300g). Hence easily portable and easy to install.</div><div><br /></div><div>It's very durable too.</div><div><br /></div><div>After all this one can easily think of the changes and add ons this technology can bring to today's world.</div><div>Imagine a shop fully touch screen showing you displays and menus to buy items and also displaying advertisements.</div><div>It can be helpful in the field of telecoms etc.</div><div>The company says that the technology will also be available for LCD manufacturers, audiovisual integrators and gaming platforms.</div><div><br /></div><div>This technology will be another big break through. Eagerly waiting for it.</div><div>Might get launched in the latter half of 2011.</div><div><br /></div><div>What are your views on this new technology?</div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div>Ayushi Goyalhttp://www.blogger.com/profile/15185669902491977450noreply@blogger.com1