To make faceboook search easier:
1)open book
2)facepinch
These two helps us to find the updates in facebook,find persons,pages,goup etc in facebook..
Note:you dont need to have a facebook account if use these facebook search engines.
If you want to search more than one thing in facebook
ie.page or group or people at a time means:
use: groupname|person|page name in search box
Friday, October 29, 2010
Tuesday, October 19, 2010
Saturday, October 16, 2010
CAPTCHA
Completely Automated Public Turing test to tell Computers and Human Apart..
It s kind of word verification test... to differentiate human and computers.
Reason for having CAPTCHA:
- To prevent 1)malicious attacks
2)Spammers
- To avoid automated software bots..
(Automated software bots-computer automatically created huge no. of large requests to server which in turn cause, degrade the server quality)
Various forms of CAPTCHA:
- It is distorted or randomly stretched characters ..
- It is rely on images also, four images present in that three of them contain animal picture, one contain flower. We have to choose it.
- Another audio challenge which contains some sound with noisy effect..
Human beings only able to identify patterns of CAPTCHA
Pros:
One Artificial intelligence algorithm is found until to train the real intelligence to machine to break
CAPTCHA
Applications of CAPTCHA:
1)Online polls
2)Registration forms
3)Free account creation process in Gmail,Ymail,hotmail etc
Labels:
CAPTCHA
Saturday, October 9, 2010
Protecting the folder in PC
It is necessary to protect the important folder in pc when more than one user using the system..
4 ways to protect:
1.Hiding the folder
2.Lock folder tools
3.System security tools
4.Coding
Now, we are going to see how to hide our folder by locking code with help of batch file
- Batch file should be in folder location
- Locking the folder code
- Open the notepad just type
ren folder name folder name .
{21EC2020-3AEA-1069-A2DD-08002B30309D}
- Save it as “lock.bat”,then double-click folder to lock
Unlock the folder:
- Open the notepad and type ren folder name
.{21EC2020-3AEA-1069-A2DD-08002B30309D}folder name
- Save it as “key.bat”,then double-click the folder to unlock it
Labels:
folder tips
Removal of trojan horse
Trojans
- Trojans is a kind of spyware...employed by hackers..
- Popularly called as “root-kits”..
- It is collection of programs that allows the hacker to make a massive deep intrusion access the administrative control of the computer..
Hacker may crack the password with aid of root kit...and take entire control of the system..
Trojan remover Software..:
- UnHackMe is a Trojan remover to detect and remove the hidden/invisible Trojans..
- It is suitable for windows operating systems
Labels:
Anti-virus
Popular viruses used by Hackers:
Most probably hackers recently employing the “conficker” virus:
Effects of the Conficker:
- Able to attack nearly 15 million computers
- It collects user’s password, other personal information including bank account..
>>Once It is installed in pc then, it starts downloading files from internet from a “boss” server..
>>Infected systems form a network it will communicate with each other, start updating, evolve itself etc..
Other viruses used by hackers are:
1.Downadup,
2.kido
Solution to protect the pc from Conficker:
To download the patch fro Microsoft in addition to anti-virus software..
follow the link:
Labels:
Ethical hacking
service oriented architecture
It is the collection of services..
Function
Services communicate with each other for data transferring or two or more services coordinayiong some activity..
E,g:
DCOM or ORB(object request broker) based on the CORBA specification
Service
The term ‘service’ is a function with well-defined, self-contained, not to depend on either context or state of the other services
E,g web service..
- Service is the end point of a connection..
- A service has an underlying computer systems that supports the connection offered
Web service description language:(WSDL)
- It is a format for web service interface..
- It describes the port and its association bound to a specific network addresses..
It consists of
1.definition
2.Operations
3.Services binding
Definition
It consists of both data type and message definition …
It is based on XML vocabularies…
Xml namespace to identify uniquely Xml element names in definitions, operations and service binding
IT is an agreement either with an organization or between organization
With an organization—no need of industry –wide vocabulary terms
Between organization –we need of industry –wide vocabulary terms
Now OMG- Interface Description language (IDl) replace XML vocabularies..
It provide formats in addition to vocabularies,,
Operations:
It describes action for messages that are supported by wa web service..
4 types of operations:
1.One-way message:
Request-responnse:
2.Solicit response:
3.Notification
Operations are grouped into port types..
Port types defines set of operation that are supported by a web services..
Service binding:
- It involves binding port type with port..A port is designed by associated specific network addresses port types..
- Collection of ports describe the service..
*It can be done by SOAP (recently)
Other forms includes .NET
- JAVA Message service (JMS) or web sphere MQ
- CORBA Internet inter ORB protocol(IIOP)
- DCOM
Labels:
soa
Subscribe to:
Comments (Atom)