SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
1




October
2




             Infinitytech Magazine
                            Technically advance




                                                                                      Infinitytech.co.in
                                                                       Copyright@ 2009 infinitysoft.co.in
                                                                                        All right reserve
All text and context in this book solely owned by infinitysoft.co.in .Reproduction without permission in any form is illegal .




                                        Get your own free personalized copy of this book from
                                                                                   www.infinitysoft.co.in
3


                              Editor’s pen
                      Advantages     of    contract
                      programming     in   software
                      development industry
                      As we all know that programming
                      industry is getting tougher rapidly
                      and as a result of that the necessity
                      of freelance programmers and
                      contract programmers is being
                      sensed vastly. In a professional
                      software development firm, the
                      programmer’s expertise module
                      wise. Some times it is viewed that,
                      such programmers are unable to
                      work at different module in same
                      project.

                      Hence the concept of freelance
                      programming          or    contract
                      programming arises in recent
                      programming         arena.      These
                      contract programmers are really very
                      knowledgeable and have great
                      expertise in web programming as
                      well as the software development
                      industry.      These      freelance
                      programmers can judge the task
                      easily through their years of
  Shashwat Shriparv   expertise, and are in an faster able to
shashwat@cdactvm.in   solve the problems manner.

                      These freelance programmers may
                      follow single programming language
                      like PHP, Dot Net, Java        etc. but
                      their skills reside in interface design,
                      form processing, navigation main-
                      taining, error handling, database
                      handling, HTML development and
                      also visual representation makes
                      them famous in the software
                      development industry .
4




        Table of contents
  Editor speak
                 Devil facts

  Programmers Area

              Career Guide

  Know your hard disk

              Learn Linux

  Software of the month

Hardware/Software Problem

  Help Line
5




             Devil Fact

Cyber criminals Flock to the Internet
and to a Computer in Your Home or
Business…..
6




                                             Devil Fact
Organized       crime seems too be extremely active in the scam
known as "phishing" in which they send emails under the guise of
being a financial institution or other legitimate     organization. In
the email they ask unsuspecting victims to verify personal informa-
tion such as account numbers and passwords. They will target home
users who have become the weakest link and they target their vic-
tims much more closely than before, by tracking down full names
and         personal interests. They also skim social networking sites
and       personal websites where most people have left a       digital
footprint that can be mined .

Criminals are increasingly trying to trick citizens into giving them
their bank account details, according to a published survey which
showed such "phishing"        attempts almost doubled in the first six
months. Over 157,000 unique phishing messages were sent out
around the world in the first half of 2006, an increase of 81 percent
compared with the six-month period to end-December 2005. Each
message can go to           thousands or hundreds of thousands of
consumers, according to the bi-annual Internet Security Threat
Report from security software vendor Symantec.

Another trend in the first half of the year is that phishes have
become more sophisticated, dodging spam filters and other defense
mechanisms designed by provider sand software companies to keep
out the    criminals.

How much financial damage phishes have caused is unclear and
usually at an individual level, which is why phishing does not get the
same media attention as "denial of service attacks" aimed to take
out a specific website, or email worms which can shut down millions
of     computers in a digital equivalent of a carpet bombing. The
internet is still under fire from such attacks, taking about 6,110
different denial of service hits every a day, but unlike a few years
ago they cause less damage.

A successful 'denial of server' attack or worm can have ramifications
far beyond phishing. Worms have taken down electricity grids. That's
why critical infrastructure is now much more resilient. Information
technology managers are better prepared and networks are more
robust," Whitehouse said.
7




Increased focus on security, and a willingness from software compa-
nies to own up to their mistakes has dramatically cut down the time
that computers are at risk, Symantec found. For example, Internet Ex-
plorer, the world's most popular browser from Microsoft, has cut the
number of days in which hackers can exploit a security flaw to nine
days from 25 days six months earlier. Security holes in browsers from
Opera and Mozilla Firefox are patched within two days and one day re-
spectively.

Because cyber predators and other cybercriminals are becoming
smarter and more sophisticated in their operations, they are real
threats to your personal security and privacy. Your money, your com-
puter, your family, and your business are all at risk. These cybercrimi-
nals leave you with three choices:

1. Do nothing and hope their attacks, risks, and threats don’t occur on
your computer.

2. Do research and get training to protect yourself, your family, and
your business.

3. Get professional help to lockdown your system from all their attacks,
risks, and threats.

Remember When you say "No!" to hackers and spyware, everyone
wins! When you don't, we all lose!

                                                  Ratnakar Mishra
                                      ratnakar.mishra@preigo.com




                                                   Space for ads
8




   Programmers Area
By the programmers for the programmers…
9




                             “Customizable Web Pages”
      An universal approach to almost every webpage
I am mostly a man who wants to see the real implementation of
things, I mean there practical and real world implementation, in Geek
speaks ‘Encapsulation’ of the data. So most of my development are/
were based on the way a product or an application can ease the life of
the basic users, because ultimately they are the people who pro-
nounce the success and failure of a product in market, the more ‘User
friendly’ your product is, the more laymen usage of your product will
be.

Just a few weeks back I started off with a concept to be implemented
and deciphered soon, I will come to that later on. Now that concept
started off with an idea, rather say an “Psychological approach of con-
structing a social platform’. I studied blogs,feeds,reviews and videos
of people who actively are associated with this whole criticism of IT
and Web 2.0 arena.(By the way some really good Tech Blogs and por-
tals which can keep you Up to Date with the latest Geek stuffs and
happenings in this Web World are: www.techcrunch.com
www.webuser.co.uk www.networkcomputing.com
www.webopedia.com www.internet.com

Now the outcome of this ‘Research’ was that I get to know that now a
days people really want to get there things ‘Customized’ be it the skin
of their iPhone or having their Gmail theme and gadgets in place. But
there is restriction, I mean this whole customization of your personal
stuff is offered by very limited web players, the Giant Google of course
with there Gmail personalisation wherein a user can add gadgets from
Google Labs, customize the shortcut keys for saving drafts, adding a
label or be it choosing the background for their Gmail or theme per
seethe there is iGoogle,what more... up to a certain extent by Face-
book just that it allows you to “Hide/Show” certain posts/updates.
But still they have this “interface architecture” defined by them which
bounds you to the things which they want you to get displayed on
your profile, not something completely on your own. Let our imagina-
tion get wild, now think something like an ‘Compilation’ of web pages,
rather Web applications....on a SINGLE webpage......now you might
think I am suggesting you to create an web page of your own (By the
way pick up the last addition of this magazine to learn how to “Make
your own website in just days”),no my friend that’s where the fun
comes, you don’t need to make a page of your own, just imagine if you
10




can personalize each and every webpage that you see, be it some
news channel, some radio junction or any other social networking site
(Even if they don’t provide you with the liberty of customising the way
the profile looks),even wilder, imagine if you can merge the Updates
of your friends from Facebook,the latest Email notifications from
Gmail,recent RSS feeds from Sun’s website and the most watched
video on you tube for the day. Isn't that fun, now you may ask me that
what about the privacy issues, why will these sole owners of the
contents allow me to do so, the answer is Alias (Will get to that later).

It is maybe you can say, a wilder or a more creative form of iGoogle,
you can play around with things you want, shift the contents from one
side to another and the fact is it is not dependent upon the service
provider, say the links at the top of iGoogle ‘Web Images News Groups
Books Scholar Gmail’, but Google doesn’t allow you to change, modify
or move them around, do they no since that’s in there hand, what
services they want to provide to you.
Alias what I was talking about previously is a mere web space where
you can put all you want, the changes you want to see in your own
“Customizable webpage”. It can be achieved by using a proxy server.
Let me elaborate each aspect, tool and services and terms specifically
which shall be used in for this purpose.
What is a Proxy server: A proxy server has two purposes:
• To keep machines behind it anonymous (mainly for security)
• To speed up access to a resource (via caching). It is commonly used
to cache web pages from a web server
Firewall reasons : The proxy server is an additional layer of defence
and can protect against some OS and Web Server specific attacks.
However, it does not provide any protection to attacks against the web
application or service itself, which is generally considered the larger
threat.

A proxy server that passes requests and replies unmodified is usually
called a gateway or sometimes tunnelling proxy. So we will modify
this aspect in which the proxy server DOES manipulate or modify the
content that the user wants. That why it is better to call it as a
‘Content Proxy’ with customizable user content
1.This content proxy shall receive a request from the client (A client is
a user which sends a request for a webpage), then it forwards this
request on the behalf of the user to a thing called Scaper which
extracts the ‘DOM’ of a webpage by fetching a webpage from global
server.
11




2.This fetched DOM is then sent to the content proxy to get
manipulated,the content proxy has its rules and configuration for
manipulating the webpage.It may provide a GUI to the user so as to
what manipulation and addition user wants,this gives the scope of this
application to diversify enormously, since there is no end to what sort
of customizations users wants to see in their webpage.
3 After the manipulations the webpage is then sent by the content
proxy to the user,as fully customized one,but specifically for a user in
its own session.

Now don’t get worried due to all those heavy and alien terms if you
happen to be unaware of them,read below,I shall explain them:
What is a Scraper:
A web scaper is a application or a software which extracts useful
information out of sites,at the back end and then it can form a totally
new Scraper site on which there is content gathered and compiled
onto it.Like those sites which are especially meant for advertising in
which there is no original content,you may call a search engine as a
Scraping site using bots for scraping the www for data.In our case we
use the scraper to extract and fetch the webpage from the www.
What is DOM:
A DOM typically elaborated as Document Object Model is the
description of how a webpage is stored displayed/rendered as an
HTML page. Objects under the DOM (also sometimes called
"Elements") may be specified and addressed according to the syntax
and rules of the programming language used to manipulate them.
That's one of our purpose in the entire flow, to manipulate the DOM,it
can be achieved easily by Javascript.


                        url                                         Request.htm
     The scraping
    engine,it shall            DOM process-
    take care of all           ing, manipula-
    the parsing and
                       DOM     tions, rules,                   Request*.htm (The
    scraping to be                                             ‘changed’ webpage as de-



                                    Content Proxy
                              (Since it filters the request)

                                                               Amar Deep Gupta
                                                          caustic576@gmail.com
12




                        Algorithms As A Technology
Think      computer were infinitely fast and computer memory was
free. Would you have any reason to study algorithms? The answer is
yes. Of course computers may be fast, they are not infinitely fast.
And memory may be cheap, but it is not free. Computing time is
therefore a bounded resources and so is space in memory. These re-
sources should be used wisely, and algorithms that are efficient in
terms of time or space will help do so. Total system performance
depends on choosing efficient algorithms as much as on choosing
fast hardware. Just as rapid advances are being made in other com-
puter technologies, they are being made in algorithms as well.
                       Analyzing an algorithm has come to mean pre-
dicting the resources. Occasionally, resources such as memory, com-
munication bandwidth, or computer hardware are of primary con-
cern, but most often it is computational time that we want to meas-
ure.
                      The number of steps an algorithm requires to
solve a specific problem is denoted as the computational time or run-
ning time of the algorithm. The notion of a step refers to an underly-
ing machine model. The machine must be able to execute a single
step in constant time.
                       In general, the computational time depends on
the size of the problem and on the respective input.
                     Example: The computational time of a sorting al-
gorithm grows if the length of the input sequence grows. If the input
sequence is presorted, compared to an unsorted sequence possibly
less steps are sufficient.
                       In order to evaluate an algorithm independently
of the input, the notion of time complexity is introduced. The time
complexity T(n) is a function of the problem size n. The value of T(n)
is the running time of the algorithm in the worst case, i.e. the maxi-
mum number of steps it requires with an arbitrary input.
                       Sometimes the behavior on the average case is
considered, i.e. the mean number of steps required with a large num-
ber of random inputs.
                       Example: The sorting algorithm insertion sort
has a worst case time complexity of T(n) = n—(n-1)/2 comparison-
exchange steps to sort a sequence of n data elements.
Often, it is not necessary to know the exact value of T(n), but only an
upper bound can be estimated.
                                                    Ashok kumar
                                              MCA B7(ER&DCI-IT)
13
14




           Timeline : 53 Years of Hard Drives
Over the past five decades, hard drives have come a long way. Travel
through time with us as we chronicle 50 milestones in hard-drive de-
velopment--from product firsts to new technologies, and everything in
between.

            1956 : IBM ships the first hard drive in the RAMAC 305
            system. The drive holds 5MB of data at $10,000 a mega-
            byte. The system is as big as two       refrigerators and
            uses 50 24-inch platters.
1961: IBM invents heads for disk drives that "fly" on
a cushion of air or on "air bearings." The IBM 1301
Disk Storage Unit, with its larger capacity, flexibility
and speed, greatly expanded the operational capabil-
ity of the IBM 7000 series of computers (7070, 7094,
7080 and 7090).

                1973: IBM announces the 3340, the first modern
                "Winchester" hard drive, which has a sealed assembly,
                lubricated spindles, and low-mass heads.

1979: IBM's 3370 use seven 14-inch platters to store
571MB, the first drive to use thin-film heads.

               1979: Seagate introduces the ST-506 drive and interface,
               which is then used in all early microcomputer imple-
               mentation

                1991 : IBM introduces the 0663 Corsair, the first disk
                drive with thin film magneto resistive (MR) Heads. It
                has eight 3.5-inch platters and stores 1GB. (The MR
                head was first introduced on an IBM tape drive in
                1984.)

1998: IBM announces its Micro drive, the smallest hard
drive to date. It fits 340MB on a single 1-inch platter.
15




2006 : Seagate releases the Barracuda 7200.10,
at 750GB the         largest hard drive to date.



                        2009:   Hitachi Global Storage
                        Technologies announcement of a
                        1-terabyte hard disk drive. The
                        drive ships in the first quarter of
                        2007. The drive, called the Desk
                        star 7K1000.

2009 : Hitachi Global Storage Technologies Inc.
launches the world's first 2TB(Tera Byte), 7200
RPM hard disk drive, the Deskstar 7K2000.The



                          By the end of the 20th century, internal drives
                          became the system of choice for computers run-
                          ning Windows, while external hard drives re-
                          mained popular for much longer on the Apple
                          Macintosh and other professional workstations
                          which offered external SCSI ports. Apple made
                          such interfaces available by default from 1986
                          and 1998. The addition of USB and Firewire in-
                          terfaces to standard personal computers led
                          such drives to become commonplace in the PC
                          market as well.
                                                        Rakesh Kumar
                                                   (MCA B8 ER&DCI-IT)
Linux revolution

      Visit

Infinitysoft.co.in
16




        Changing Career - Things to Remember
Doing the 'right job' has become
very important these days. As a re-
sult, people are observed making
mid-career moves every now and
then. It is no longer considered ta-
boo to shift jobs even if one may
have spent a decent amount of
time in a certain job. What is more
important for an individual is to en-
joy what he does rather than
spending an inordinate amount of
time in a job he does not like do-
ing?

As a result, changing career be-
comes imperative for a large num-
ber of people every year. In the
last few decades, it is true that the
choice of careers has expanded be-
yond imagination. One is no longer
left with just a few conven-
tional career choices of being a
doctor or a teacher or a banker. In-

up that offer the combination of good money as well as a satisfying
work profile. Before one embarks on a decision to change careers, it is
essential to consider some points.

1. Decide Which Career To Opt For: There are a whole lot of resources
available on the internet or in books that talk about the various career
choices in the job market. Before deciding on which career to opt for,
one should conduct adequate research about the new job. This would
be important to ensure that once one changes his/her career to a new
field, it doesn't come across as an unpleasant experience.

2. Tailoring the Resume: Once one decides on a new career avenue, it
is important to tailor the existing resume to match the skill sets that
the new career demands. One would also need to customize the cover-
ing letter with regard to the specific company one applies.
17




3. Skill Enhancement: Although one's skills might be usable to a large
extent in the new career, there are times when changing careers re-
quires certain skills to be enhanced as well. One might, for example,
shift from sales to marketing which would require familiarity with mar-
keting concepts. In such cases, one should either sign up for a short
refresher course or take a brief sabbatical to get a specialized degree
from a college before getting employment.

4. Employing Patience: It is important to note that the path for chang-
ing careers is strewn with rocks and stones, so patience is a virtue that
needs to be adopted. It is easy to get frustrated when one fails to get a
positive response from potential employers. However, one should not
lose patience but keep on applying till one gets the job of his/her choice.

In addition to the things listed above that discuss what one "should"
do; there are a number of things to beware of. A random list of 'don'ts'
is:

- Do not confuse changing jobs with changing careers. Changing ca-
reers is a major decision and should be taken only after sufficient re-
search and thought has gone into it.

- Changing careers only for money is a bad idea. In most cases, people
fail to realize that there is a cost to pay for a higher compensation in
the form of more travel or longer working hours.

- Changing careers to a new one without making a realistic assessment
of one's skills and strengths might be disastrous.

                                                   Shailendra Kumar
                                           shailendra.eie@gmail.com
18




                                       Desktop go to die…!
               In this fast-changing technological world, sometimes
               you are faced with some difficult choices. For instance,
               your current computer has matured to the ripe old age
               of six months and has been deemed obsolete. Now it's
               time to purchase a new computer and the question is,
               "Should I buy a laptop or a desktop?" so there laptop
               has some advantage over desktop .

Mobility - Well, sure, it's the big one. If you need to work remotely, a
laptop is the way to go. Remember that a 3G card from your cell phone
provider can give you high-speed internet access in most urban areas.

Upgrades - Speaking of upgrades, it's more difficult to upgrade a lap-
top. In some cases, it's impossible: Sure, you can pop in a new hard
drive later, but adding a second hard drive means plugging in an exter-
nal disk that will be cumbersome to tote around with you.

Storage - One of the major places where lap-
tops and desktops differ is in how much hard
drive space they offer. Laptops use physically
smaller drives, which can only offer so much
storage space. Though larger drives are avail-
able, 100GB is still common on a laptop, while
500GB desktop drives are seen all the time
(again, bigger drives can be had). This is a
huge difference and it seems to be expanding,
not contracting. If you have very large storage
needs, desktop is your best bet.

Price - Expect to pay $300 to $500 more for a comparably equipped
laptop (though this varies widely).

Peripherals - Remember that when you're in the office, you can always
plug in an external mouse, keyboard, and monitor to your laptop.
19




I obviously can't make the buying
decision for you, but I'll reiterate
my computer plan in case you
haven't seen it before. I use both:
a moderately-priced laptop is with
me on a daily basis, syncing up
with an inexpensive desktop that
works as a print and file server.
The desktop works as a machine
for my daily backups, has plenty of
storage for stuff I don't need to
take with me on the road (or to
other rooms of the house), has
two printers hooked up to it,
accepts incoming faxes, and
otherwise stands as a backup in
case something fails on my laptop.
My laptop, however, is where I do
most of my work.
Sure I could get by with just a notebook PC, but having both makes
things so much easier.
                                              Shivendra Kumar
                                              MCA B8 Er&Dci-IT




                                                 Infinitysoft.co.in
                                           Every thing is different
20




                                                              Nikesh Arora
      President, Global Sales Operations and Business Development in Google
Nikesh Arora oversees all revenue and cus-
tomer operations, as well as marketing and
partnerships. Since joining Google in 2004,
he has held several positions with the
company. Most recently, he led Google's
global direct sales operations. He also
developed and managed the company's
operations in the European, Middle Eastern
and African markets and was responsible
for creating and expanding strategic
partnerships in those regions for the benefit
of Google's growing number of users and
advertisers. This will make him the
top-ranking (4th Position) Indian in Google.
With a background as an analyst, Nikesh's main areas of focus
have been consulting, IT, marketing and finance. Prior to joining
Google, he was chief marketing officer and a member of the man-
agement board at T-Mobile. While there he spearheaded all prod-
uct development, terminals, brand and marketing activities of T-
Mobile Europe. In 1999, he started working with Deutsche Tele-
kom and founded T-Motion PLC, a mobile multimedia subsidiary of
T-Mobile International. Prior to joining Deutsche Telekom, Nikesh
held management positions at Putnam Investments and Fidelity
Investments in Boston.
Nikesh holds a master's degree from Boston College and an MBA
from Northeastern University, both of which were awarded with
distinction. He also holds the CFA designation. In 1989, Nikesh
graduated from the Institute of Technology in Varanasi, India with
a bachelor's degree in electrical engineering.

                                                    Rajeev Ranjan
                                               rranjan@cdactvm.in
21




I remember whenever I've had to Interview for a position in the past
the bit I always looked least forward to was the stage where the
Interviewer asks me questions. The majority of which were easy to
answer as its very clear what information the Interviewer was look-
ing for, but there were always the odd tough Interview Questions
thrown in to throw me out. Those coupe of tough Interview questions
were always difficult to answer as it was never clear what informa-
tion the Interviewer was looking for.

I've since been working in recruitment for some time and have been
the Interviewer asking those tough Interview questions on many
occasions. Its clear that many candidates still don't know what I'm
looking to hear from them. So I thought I'd cover some of the tough
Interview Questions and ways to answer them.

Interview Questions: What are your weaknesses?
State a weakness but turn it into a positive: "At times I've been
considered too much of a perfectionist, I use to get irritated if I felt
someone else’s work on the project was below company standard,
I've since learnt that I can't affect other peoples work so channel my
energies into making my work as high a standard as possible"

Interview Questions: How have you managed to attend an Interview
in works time?

"I didn't want to deceive my current employers, so I asked them if I
could take an unpaid day of leave to attend to a personal matter"
22




Interview Questions: How do you feel about carrying out repetitive or
mundane work?

"I appreciate every position has an element of repetitiveness but I
take all aspects of my job seriously whether they are repetitive or not
and always give 100%."

Interview Questions: How do you handle Criticism?

"At some point we all make mistakes, I'm always happy to take on
constructive criticism as this will help me perform better."

Interview Questions: How long would it be before you would expect to
be promoted?

"I couldn’t give a time scale, I would want to prove myself and
demonstrate my value to the company, I appreciate that promotion is
a reward, not a right"

Interview Questions: What sort of people do you find it difficult to
work with?

"I am a very amiable person and very team orientated, If I were to
find it difficult to work with someone, it would be someone whose
standards doesn't reach that of the team.

Answering Tough Interview Questions well, will set you apart from
other candidates                                 Padmakar Mishra
applying for the same
position
                            padmakar.mishra2010@gmail.com


  Wait for next issue


  Infinitysoft.co.in
23




                                                              VIRUS
Computer viruses are programs that have been pur-
posely designed to interfere with the regular operation
of a computer. Depending on its nature and capabilities,
a virus may cause minor or major interruption to the
smooth functioning of a computer. They may just slow
down your computer, or repeatedly cause meaningless
message to appear on your monitor, freeze your
computer or bring up cascading windows on your
screen, cause screen blinking, record data without a
commend from you, corrupt or delete data, revive deleted data, pick
up e-mail addresses from your address book and local files and start
sending e-mails on its own, and even damage vital system files.

Computer viruses can be several types:
Worms: worms are self-replicating computer programs, similar to
computer viruses. Worms can spread rapidly from one computer to
another when documents are exchanged.
            A copy of the worm passes through the network to
another machine that has a specific security hole. it then copies itself
to the new machine, and then start replicating from there.

Trojan horses: Trojan horses are programs that claim to perform a
particular function but which in fact do something different. For
example, they could infect your computer with a virus your files.

Macro    viruses: Macro viruses use commends called macros
embedded in other software to infect and spread to other files viewed
by that software. For example. Microsoft word and Excel have macros
viruses can spread by exploiting these commands.

Boot Sector Viruses: Boot sector viruses are an older type of virus
and are not so common today. They used to infect computers’ startup
programs, so that the virus would become active as soon as the
computer started up.

Backdoor Trojans: Backdoor Trojans are programs that allow other
computer users to remotely control your computer via a local area
network or the internet.
                                                 Ravindra Bohra
                                       ravi_bohra80@yahoo.com
24
25




Speeding up your hard drive to get faster file transfer by using 32-bit
transfers on your hard drive:

1. Just add the line to a boot up script.

    hdparm -c3 /dev/hdX

2. If you use SuSE or other distros based on SYS V.

    /sbin/init.d/boot.local

  should work for you.
3 This enables 32-bit transfer on your hard drive. On some systems
  it can improve
  transfer performance by 75%.
  To test your performance gain, type:

    hdparm -t -T /dev/hdX

More DOS-like commands:

     Many people are moving to Linux these days because windows
XP onwards OS needs very large scale amount of resources but they
are typing DOS commands on Linux that look fine but cause errors.
The command "cd.." in DOS is perfectly valid, but in Linux, the valid
command is “cd ..” (any parameter for that command must be sepa-
rated from the command by a space). The same goes for "cd/" and
"cd~". A quick fix is here.

1 Use your favorite text editor in your home directory to edit the file
".bashrc".

The period is there on purpose, this hides the file from normal ls
display.

2   Add the lines:

          alias cd/="cd /"
          alias cd~="cd ~"
          alias cd..="cd .."
26




3 And I usually add these...

     alias md="mkdir"

     alias rd="rmdir -i"

     alias rm="rm -i"

 Here “alias” is a powerful tool, and can be used in the .bashrc script
as well as from the command line. You can, if you want to spend the
time, create your own group of shell commands to suit how you
work. As long as you put them in your .bashrc file, they'll be there
every time you log in. Note that if you frequently log in as root, you
might want to copy /home/username/.bashrc to /root/.bashrc to
keep yourself same.

More swap with a swap file:
      You installed a new Linux system, but forgot to set enough
swap space for your needs. Do you need to repartition and reinstall?
No, the swap utilities on Linux allow you to make a real file and use it
as swap space.
The trick is to make a file and then tell the swapon program to use it.
Here's how to create, for example, a 64 megs swap file on your root
partition (of course make sure you have at least 64 megs free):

     dd if=/dev/zero of=/swapfile bs=1024 count=65536

This will make a 64 megs (about 67 millions bytes) file on your hard
drive. You now need to initialize it:

     mkswap /swapfile 65536

     sync
And you can then add it to your swap pool:

     swapon /swapfile

With that you have 64 megs of swap added. Don't forget to add the
swapon command to your startup files so the command will be re-
peated at each reboot.


                                                  VINEET PRATAP
                                         pratap.vineet@gmail.com
27




But how ...




     Fix-it
28




The following error message can occur during the WinXP upgrade
process:

“An unexpected error (768) occurred at line 5118 in <drive let-
ter>xpclientbasebootsetupsetup .c Press any key to con-
tinue.”

When you press any key as instructed, the following error message
appears: “A problem has been detected and      windows has been
shutdown to prevent damage to your computer. PROC-
ESS1_INITIALIZATION_FAILED”Huh? Again, the Microsoft Knowl-
edge Base comes to the rescue. The root cause     triggering this er-
ror message is a software program (namely Roxio’s GoBack) that is
incompatible with WinXP. To resolve the problem, disable GoBack
when WinXP restarts by pressing the space bar at the GoBack boot
menu, pressing d to disable and pressing y to confirm. Once Go-
Back is disabled, cancel the WinXP setup process and uninstall Go-

Error Message: “Fatal System Error: 0x000000a0
(0x00000002,0x00070124, 0x00000000,0x00000000)”

Translation: If you happen to own a Microsoft Sidewinder Game Pad
Pro (not the joystick model), you may experience a unique problem.
If you just happen to be running WinXP (as opposed to any other
operating system) and you decide to unplug the USB (Universal Se-
rial Bus) cable while WinXP is starting up, you will see the fatal
system error and a blue screen, preventing you from accessing your
Desktop.

Solution: Microsoft is working on a fix for this error, but at press
time it is still unresolved. Fortunately, the workaround is rather
simple. Just make sure you don’t unplug
the Sidewinder cable when the system is                  Saket kumar
starting .                                     saket.dhabbu@gmail.com

WHICH PATH IS SUITABLE FOR YOU
             VISIT
        Infinitysoft.co.in
29




                                     First Look software
                                                    Panda cloud antivirus

                                       Panda has released a free
                                       anti-Virus offering that resides
                                       mostly off the host system and
                                       in the cloud. Using 'Collective
                                       Intelligence',    along     with
                                       distributed computing and a
                                       global and community-based
                                       platform, Panda has said this
                                       new     offering   is   entirely
                                       different from what it's created
                                       in   the    past.  So,   has   it
                                       succeeded?

Starting off
Light    Panda Cloud Antivirus protects you while you browse, play or
work and you won’t even notice it. It is extremely light as all the work
is done in the cloud.

Secure Panda Cloud Antivirus provides you with the fastest protec-
tion against the newest viruses thanks to its cloud-scanning from
PandaLabs’ servers

Easy    Panda Cloud Antivirus is truly install and forget. Don’t worry
about updates, configuration or complicated decisions ever again.
                                               Anurag Shankar
                                 anuragshankar2005@gmail.com
30




Ask...
31




  "If you have any questions, please
  feel free to ask" or " We would be
  happy to answer any questions you
                have"

         Send your query mails at:

          ratnakar.erdci@gmail.com
      infinitytechmagazine@gmail.com
    infinitytechmagazine@rediffmail.com
   infinitytechmagazine@yahoomail.com

     Join our communities and group at:
      http://groups.yahoo.com/group/
             infinitytechmagazine
  infinitytechmagazine@yahoogroups.com
 http://www.orkut.co.in/Community.aspx?
                cmm=49916804

Join these groups to receive the magazine
          directly to your mail box.




             infinitysoft.co.in

Weitere ähnliche Inhalte

Andere mochten auch (9)

Allocation strategies
Allocation strategiesAllocation strategies
Allocation strategies
 
Cost estamition
Cost estamitionCost estamition
Cost estamition
 
H base
H baseH base
H base
 
Hadoop Installation
Hadoop InstallationHadoop Installation
Hadoop Installation
 
Captchas
CaptchasCaptchas
Captchas
 
Inventory system
Inventory systemInventory system
Inventory system
 
Configure h base hadoop and hbase client
Configure h base hadoop and hbase clientConfigure h base hadoop and hbase client
Configure h base hadoop and hbase client
 
Hbase interact with shell
Hbase interact with shellHbase interact with shell
Hbase interact with shell
 
H base development
H base developmentH base development
H base development
 

Ähnlich wie Infinitytech New

Web Development SEO Expate BD LTD 1 01.02.2023 .pdf
Web Development SEO Expate BD LTD 1 01.02.2023 .pdfWeb Development SEO Expate BD LTD 1 01.02.2023 .pdf
Web Development SEO Expate BD LTD 1 01.02.2023 .pdf
Seo Expate BD LTD
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
Service2Media
 
COMPUTER APPLICATION PROJECT ON
COMPUTER APPLICATION PROJECT ON COMPUTER APPLICATION PROJECT ON
COMPUTER APPLICATION PROJECT ON
Jitender Suryavansh
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
Heidi Maestas
 

Ähnlich wie Infinitytech New (20)

9 Predictions for the Future of Programming.pdf
9 Predictions for the Future of Programming.pdf9 Predictions for the Future of Programming.pdf
9 Predictions for the Future of Programming.pdf
 
Fearless IT Outsourcing
Fearless IT OutsourcingFearless IT Outsourcing
Fearless IT Outsourcing
 
Predicted! Top Software Development Trends for 2021
Predicted! Top Software Development Trends for 2021Predicted! Top Software Development Trends for 2021
Predicted! Top Software Development Trends for 2021
 
How to become a Software Engineer Carrier Path for Software Developer
How to become a Software Engineer Carrier Path for Software DeveloperHow to become a Software Engineer Carrier Path for Software Developer
How to become a Software Engineer Carrier Path for Software Developer
 
Web Development SEO Expate BD LTD 1 01.02.2023 .pdf
Web Development SEO Expate BD LTD 1 01.02.2023 .pdfWeb Development SEO Expate BD LTD 1 01.02.2023 .pdf
Web Development SEO Expate BD LTD 1 01.02.2023 .pdf
 
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptxEthical hacking - Skills.pptx
Ethical hacking - Skills.pptx
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Data Security in Fintech App Development: How PHP Can Help
Data Security in Fintech App Development: How PHP Can HelpData Security in Fintech App Development: How PHP Can Help
Data Security in Fintech App Development: How PHP Can Help
 
It career paths
It career pathsIt career paths
It career paths
 
COMPUTER APPLICATION PROJECT ON
COMPUTER APPLICATION PROJECT ON COMPUTER APPLICATION PROJECT ON
COMPUTER APPLICATION PROJECT ON
 
It planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbookIt planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbook
 
CAREER IN I.T.
CAREER IN I.T.CAREER IN I.T.
CAREER IN I.T.
 
Top Enterprise Software Development Trends
Top Enterprise Software Development TrendsTop Enterprise Software Development Trends
Top Enterprise Software Development Trends
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?
 
The Guide to Website Development for Beginners.pdf
The Guide to Website Development for Beginners.pdfThe Guide to Website Development for Beginners.pdf
The Guide to Website Development for Beginners.pdf
 
The most effective development service is available to Pakistan.ppt
The most effective development service is available to Pakistan.pptThe most effective development service is available to Pakistan.ppt
The most effective development service is available to Pakistan.ppt
 
Email hacker
Email hackerEmail hacker
Email hacker
 
The most efficient development tool is now available in Pakistan.pdf
The most efficient development tool is now available in Pakistan.pdfThe most efficient development tool is now available in Pakistan.pdf
The most efficient development tool is now available in Pakistan.pdf
 

Mehr von Shashwat Shriparv

LibreOffice 7.3.pptx
LibreOffice 7.3.pptxLibreOffice 7.3.pptx
LibreOffice 7.3.pptx
Shashwat Shriparv
 

Mehr von Shashwat Shriparv (20)

Learning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptxLearning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptx
 
LibreOffice 7.3.pptx
LibreOffice 7.3.pptxLibreOffice 7.3.pptx
LibreOffice 7.3.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Suspending a Process in Linux.pptx
Suspending a Process in Linux.pptxSuspending a Process in Linux.pptx
Suspending a Process in Linux.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Command Seperators.pptx
Command Seperators.pptxCommand Seperators.pptx
Command Seperators.pptx
 
Upgrading hadoop
Upgrading hadoopUpgrading hadoop
Upgrading hadoop
 
Hadoop migration and upgradation
Hadoop migration and upgradationHadoop migration and upgradation
Hadoop migration and upgradation
 
R language introduction
R language introductionR language introduction
R language introduction
 
Hive query optimization infinity
Hive query optimization infinityHive query optimization infinity
Hive query optimization infinity
 
H base introduction & development
H base introduction & developmentH base introduction & development
H base introduction & development
 
Hbase
HbaseHbase
Hbase
 
My sql
My sqlMy sql
My sql
 
Apache tomcat
Apache tomcatApache tomcat
Apache tomcat
 
Linux 4 you
Linux 4 youLinux 4 you
Linux 4 you
 
Introduction to apache hadoop
Introduction to apache hadoopIntroduction to apache hadoop
Introduction to apache hadoop
 
Next generation technology
Next generation technologyNext generation technology
Next generation technology
 
Java interview questions
Java interview questionsJava interview questions
Java interview questions
 
C# interview quesions
C# interview quesionsC# interview quesions
C# interview quesions
 
I pv6
I pv6I pv6
I pv6
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Infinitytech New

  • 2. 2 Infinitytech Magazine Technically advance Infinitytech.co.in Copyright@ 2009 infinitysoft.co.in All right reserve All text and context in this book solely owned by infinitysoft.co.in .Reproduction without permission in any form is illegal . Get your own free personalized copy of this book from www.infinitysoft.co.in
  • 3. 3 Editor’s pen Advantages of contract programming in software development industry As we all know that programming industry is getting tougher rapidly and as a result of that the necessity of freelance programmers and contract programmers is being sensed vastly. In a professional software development firm, the programmer’s expertise module wise. Some times it is viewed that, such programmers are unable to work at different module in same project. Hence the concept of freelance programming or contract programming arises in recent programming arena. These contract programmers are really very knowledgeable and have great expertise in web programming as well as the software development industry. These freelance programmers can judge the task easily through their years of Shashwat Shriparv expertise, and are in an faster able to shashwat@cdactvm.in solve the problems manner. These freelance programmers may follow single programming language like PHP, Dot Net, Java etc. but their skills reside in interface design, form processing, navigation main- taining, error handling, database handling, HTML development and also visual representation makes them famous in the software development industry .
  • 4. 4 Table of contents Editor speak Devil facts Programmers Area Career Guide Know your hard disk Learn Linux Software of the month Hardware/Software Problem Help Line
  • 5. 5 Devil Fact Cyber criminals Flock to the Internet and to a Computer in Your Home or Business…..
  • 6. 6 Devil Fact Organized crime seems too be extremely active in the scam known as "phishing" in which they send emails under the guise of being a financial institution or other legitimate organization. In the email they ask unsuspecting victims to verify personal informa- tion such as account numbers and passwords. They will target home users who have become the weakest link and they target their vic- tims much more closely than before, by tracking down full names and personal interests. They also skim social networking sites and personal websites where most people have left a digital footprint that can be mined . Criminals are increasingly trying to trick citizens into giving them their bank account details, according to a published survey which showed such "phishing" attempts almost doubled in the first six months. Over 157,000 unique phishing messages were sent out around the world in the first half of 2006, an increase of 81 percent compared with the six-month period to end-December 2005. Each message can go to thousands or hundreds of thousands of consumers, according to the bi-annual Internet Security Threat Report from security software vendor Symantec. Another trend in the first half of the year is that phishes have become more sophisticated, dodging spam filters and other defense mechanisms designed by provider sand software companies to keep out the criminals. How much financial damage phishes have caused is unclear and usually at an individual level, which is why phishing does not get the same media attention as "denial of service attacks" aimed to take out a specific website, or email worms which can shut down millions of computers in a digital equivalent of a carpet bombing. The internet is still under fire from such attacks, taking about 6,110 different denial of service hits every a day, but unlike a few years ago they cause less damage. A successful 'denial of server' attack or worm can have ramifications far beyond phishing. Worms have taken down electricity grids. That's why critical infrastructure is now much more resilient. Information technology managers are better prepared and networks are more robust," Whitehouse said.
  • 7. 7 Increased focus on security, and a willingness from software compa- nies to own up to their mistakes has dramatically cut down the time that computers are at risk, Symantec found. For example, Internet Ex- plorer, the world's most popular browser from Microsoft, has cut the number of days in which hackers can exploit a security flaw to nine days from 25 days six months earlier. Security holes in browsers from Opera and Mozilla Firefox are patched within two days and one day re- spectively. Because cyber predators and other cybercriminals are becoming smarter and more sophisticated in their operations, they are real threats to your personal security and privacy. Your money, your com- puter, your family, and your business are all at risk. These cybercrimi- nals leave you with three choices: 1. Do nothing and hope their attacks, risks, and threats don’t occur on your computer. 2. Do research and get training to protect yourself, your family, and your business. 3. Get professional help to lockdown your system from all their attacks, risks, and threats. Remember When you say "No!" to hackers and spyware, everyone wins! When you don't, we all lose! Ratnakar Mishra ratnakar.mishra@preigo.com Space for ads
  • 8. 8 Programmers Area By the programmers for the programmers…
  • 9. 9 “Customizable Web Pages” An universal approach to almost every webpage I am mostly a man who wants to see the real implementation of things, I mean there practical and real world implementation, in Geek speaks ‘Encapsulation’ of the data. So most of my development are/ were based on the way a product or an application can ease the life of the basic users, because ultimately they are the people who pro- nounce the success and failure of a product in market, the more ‘User friendly’ your product is, the more laymen usage of your product will be. Just a few weeks back I started off with a concept to be implemented and deciphered soon, I will come to that later on. Now that concept started off with an idea, rather say an “Psychological approach of con- structing a social platform’. I studied blogs,feeds,reviews and videos of people who actively are associated with this whole criticism of IT and Web 2.0 arena.(By the way some really good Tech Blogs and por- tals which can keep you Up to Date with the latest Geek stuffs and happenings in this Web World are: www.techcrunch.com www.webuser.co.uk www.networkcomputing.com www.webopedia.com www.internet.com Now the outcome of this ‘Research’ was that I get to know that now a days people really want to get there things ‘Customized’ be it the skin of their iPhone or having their Gmail theme and gadgets in place. But there is restriction, I mean this whole customization of your personal stuff is offered by very limited web players, the Giant Google of course with there Gmail personalisation wherein a user can add gadgets from Google Labs, customize the shortcut keys for saving drafts, adding a label or be it choosing the background for their Gmail or theme per seethe there is iGoogle,what more... up to a certain extent by Face- book just that it allows you to “Hide/Show” certain posts/updates. But still they have this “interface architecture” defined by them which bounds you to the things which they want you to get displayed on your profile, not something completely on your own. Let our imagina- tion get wild, now think something like an ‘Compilation’ of web pages, rather Web applications....on a SINGLE webpage......now you might think I am suggesting you to create an web page of your own (By the way pick up the last addition of this magazine to learn how to “Make your own website in just days”),no my friend that’s where the fun comes, you don’t need to make a page of your own, just imagine if you
  • 10. 10 can personalize each and every webpage that you see, be it some news channel, some radio junction or any other social networking site (Even if they don’t provide you with the liberty of customising the way the profile looks),even wilder, imagine if you can merge the Updates of your friends from Facebook,the latest Email notifications from Gmail,recent RSS feeds from Sun’s website and the most watched video on you tube for the day. Isn't that fun, now you may ask me that what about the privacy issues, why will these sole owners of the contents allow me to do so, the answer is Alias (Will get to that later). It is maybe you can say, a wilder or a more creative form of iGoogle, you can play around with things you want, shift the contents from one side to another and the fact is it is not dependent upon the service provider, say the links at the top of iGoogle ‘Web Images News Groups Books Scholar Gmail’, but Google doesn’t allow you to change, modify or move them around, do they no since that’s in there hand, what services they want to provide to you. Alias what I was talking about previously is a mere web space where you can put all you want, the changes you want to see in your own “Customizable webpage”. It can be achieved by using a proxy server. Let me elaborate each aspect, tool and services and terms specifically which shall be used in for this purpose. What is a Proxy server: A proxy server has two purposes: • To keep machines behind it anonymous (mainly for security) • To speed up access to a resource (via caching). It is commonly used to cache web pages from a web server Firewall reasons : The proxy server is an additional layer of defence and can protect against some OS and Web Server specific attacks. However, it does not provide any protection to attacks against the web application or service itself, which is generally considered the larger threat. A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunnelling proxy. So we will modify this aspect in which the proxy server DOES manipulate or modify the content that the user wants. That why it is better to call it as a ‘Content Proxy’ with customizable user content 1.This content proxy shall receive a request from the client (A client is a user which sends a request for a webpage), then it forwards this request on the behalf of the user to a thing called Scaper which extracts the ‘DOM’ of a webpage by fetching a webpage from global server.
  • 11. 11 2.This fetched DOM is then sent to the content proxy to get manipulated,the content proxy has its rules and configuration for manipulating the webpage.It may provide a GUI to the user so as to what manipulation and addition user wants,this gives the scope of this application to diversify enormously, since there is no end to what sort of customizations users wants to see in their webpage. 3 After the manipulations the webpage is then sent by the content proxy to the user,as fully customized one,but specifically for a user in its own session. Now don’t get worried due to all those heavy and alien terms if you happen to be unaware of them,read below,I shall explain them: What is a Scraper: A web scaper is a application or a software which extracts useful information out of sites,at the back end and then it can form a totally new Scraper site on which there is content gathered and compiled onto it.Like those sites which are especially meant for advertising in which there is no original content,you may call a search engine as a Scraping site using bots for scraping the www for data.In our case we use the scraper to extract and fetch the webpage from the www. What is DOM: A DOM typically elaborated as Document Object Model is the description of how a webpage is stored displayed/rendered as an HTML page. Objects under the DOM (also sometimes called "Elements") may be specified and addressed according to the syntax and rules of the programming language used to manipulate them. That's one of our purpose in the entire flow, to manipulate the DOM,it can be achieved easily by Javascript. url Request.htm The scraping engine,it shall DOM process- take care of all ing, manipula- the parsing and DOM tions, rules, Request*.htm (The scraping to be ‘changed’ webpage as de- Content Proxy (Since it filters the request) Amar Deep Gupta caustic576@gmail.com
  • 12. 12 Algorithms As A Technology Think computer were infinitely fast and computer memory was free. Would you have any reason to study algorithms? The answer is yes. Of course computers may be fast, they are not infinitely fast. And memory may be cheap, but it is not free. Computing time is therefore a bounded resources and so is space in memory. These re- sources should be used wisely, and algorithms that are efficient in terms of time or space will help do so. Total system performance depends on choosing efficient algorithms as much as on choosing fast hardware. Just as rapid advances are being made in other com- puter technologies, they are being made in algorithms as well. Analyzing an algorithm has come to mean pre- dicting the resources. Occasionally, resources such as memory, com- munication bandwidth, or computer hardware are of primary con- cern, but most often it is computational time that we want to meas- ure. The number of steps an algorithm requires to solve a specific problem is denoted as the computational time or run- ning time of the algorithm. The notion of a step refers to an underly- ing machine model. The machine must be able to execute a single step in constant time. In general, the computational time depends on the size of the problem and on the respective input. Example: The computational time of a sorting al- gorithm grows if the length of the input sequence grows. If the input sequence is presorted, compared to an unsorted sequence possibly less steps are sufficient. In order to evaluate an algorithm independently of the input, the notion of time complexity is introduced. The time complexity T(n) is a function of the problem size n. The value of T(n) is the running time of the algorithm in the worst case, i.e. the maxi- mum number of steps it requires with an arbitrary input. Sometimes the behavior on the average case is considered, i.e. the mean number of steps required with a large num- ber of random inputs. Example: The sorting algorithm insertion sort has a worst case time complexity of T(n) = n—(n-1)/2 comparison- exchange steps to sort a sequence of n data elements. Often, it is not necessary to know the exact value of T(n), but only an upper bound can be estimated. Ashok kumar MCA B7(ER&DCI-IT)
  • 13. 13
  • 14. 14 Timeline : 53 Years of Hard Drives Over the past five decades, hard drives have come a long way. Travel through time with us as we chronicle 50 milestones in hard-drive de- velopment--from product firsts to new technologies, and everything in between. 1956 : IBM ships the first hard drive in the RAMAC 305 system. The drive holds 5MB of data at $10,000 a mega- byte. The system is as big as two refrigerators and uses 50 24-inch platters. 1961: IBM invents heads for disk drives that "fly" on a cushion of air or on "air bearings." The IBM 1301 Disk Storage Unit, with its larger capacity, flexibility and speed, greatly expanded the operational capabil- ity of the IBM 7000 series of computers (7070, 7094, 7080 and 7090). 1973: IBM announces the 3340, the first modern "Winchester" hard drive, which has a sealed assembly, lubricated spindles, and low-mass heads. 1979: IBM's 3370 use seven 14-inch platters to store 571MB, the first drive to use thin-film heads. 1979: Seagate introduces the ST-506 drive and interface, which is then used in all early microcomputer imple- mentation 1991 : IBM introduces the 0663 Corsair, the first disk drive with thin film magneto resistive (MR) Heads. It has eight 3.5-inch platters and stores 1GB. (The MR head was first introduced on an IBM tape drive in 1984.) 1998: IBM announces its Micro drive, the smallest hard drive to date. It fits 340MB on a single 1-inch platter.
  • 15. 15 2006 : Seagate releases the Barracuda 7200.10, at 750GB the largest hard drive to date. 2009: Hitachi Global Storage Technologies announcement of a 1-terabyte hard disk drive. The drive ships in the first quarter of 2007. The drive, called the Desk star 7K1000. 2009 : Hitachi Global Storage Technologies Inc. launches the world's first 2TB(Tera Byte), 7200 RPM hard disk drive, the Deskstar 7K2000.The By the end of the 20th century, internal drives became the system of choice for computers run- ning Windows, while external hard drives re- mained popular for much longer on the Apple Macintosh and other professional workstations which offered external SCSI ports. Apple made such interfaces available by default from 1986 and 1998. The addition of USB and Firewire in- terfaces to standard personal computers led such drives to become commonplace in the PC market as well. Rakesh Kumar (MCA B8 ER&DCI-IT) Linux revolution Visit Infinitysoft.co.in
  • 16. 16 Changing Career - Things to Remember Doing the 'right job' has become very important these days. As a re- sult, people are observed making mid-career moves every now and then. It is no longer considered ta- boo to shift jobs even if one may have spent a decent amount of time in a certain job. What is more important for an individual is to en- joy what he does rather than spending an inordinate amount of time in a job he does not like do- ing? As a result, changing career be- comes imperative for a large num- ber of people every year. In the last few decades, it is true that the choice of careers has expanded be- yond imagination. One is no longer left with just a few conven- tional career choices of being a doctor or a teacher or a banker. In- up that offer the combination of good money as well as a satisfying work profile. Before one embarks on a decision to change careers, it is essential to consider some points. 1. Decide Which Career To Opt For: There are a whole lot of resources available on the internet or in books that talk about the various career choices in the job market. Before deciding on which career to opt for, one should conduct adequate research about the new job. This would be important to ensure that once one changes his/her career to a new field, it doesn't come across as an unpleasant experience. 2. Tailoring the Resume: Once one decides on a new career avenue, it is important to tailor the existing resume to match the skill sets that the new career demands. One would also need to customize the cover- ing letter with regard to the specific company one applies.
  • 17. 17 3. Skill Enhancement: Although one's skills might be usable to a large extent in the new career, there are times when changing careers re- quires certain skills to be enhanced as well. One might, for example, shift from sales to marketing which would require familiarity with mar- keting concepts. In such cases, one should either sign up for a short refresher course or take a brief sabbatical to get a specialized degree from a college before getting employment. 4. Employing Patience: It is important to note that the path for chang- ing careers is strewn with rocks and stones, so patience is a virtue that needs to be adopted. It is easy to get frustrated when one fails to get a positive response from potential employers. However, one should not lose patience but keep on applying till one gets the job of his/her choice. In addition to the things listed above that discuss what one "should" do; there are a number of things to beware of. A random list of 'don'ts' is: - Do not confuse changing jobs with changing careers. Changing ca- reers is a major decision and should be taken only after sufficient re- search and thought has gone into it. - Changing careers only for money is a bad idea. In most cases, people fail to realize that there is a cost to pay for a higher compensation in the form of more travel or longer working hours. - Changing careers to a new one without making a realistic assessment of one's skills and strengths might be disastrous. Shailendra Kumar shailendra.eie@gmail.com
  • 18. 18 Desktop go to die…! In this fast-changing technological world, sometimes you are faced with some difficult choices. For instance, your current computer has matured to the ripe old age of six months and has been deemed obsolete. Now it's time to purchase a new computer and the question is, "Should I buy a laptop or a desktop?" so there laptop has some advantage over desktop . Mobility - Well, sure, it's the big one. If you need to work remotely, a laptop is the way to go. Remember that a 3G card from your cell phone provider can give you high-speed internet access in most urban areas. Upgrades - Speaking of upgrades, it's more difficult to upgrade a lap- top. In some cases, it's impossible: Sure, you can pop in a new hard drive later, but adding a second hard drive means plugging in an exter- nal disk that will be cumbersome to tote around with you. Storage - One of the major places where lap- tops and desktops differ is in how much hard drive space they offer. Laptops use physically smaller drives, which can only offer so much storage space. Though larger drives are avail- able, 100GB is still common on a laptop, while 500GB desktop drives are seen all the time (again, bigger drives can be had). This is a huge difference and it seems to be expanding, not contracting. If you have very large storage needs, desktop is your best bet. Price - Expect to pay $300 to $500 more for a comparably equipped laptop (though this varies widely). Peripherals - Remember that when you're in the office, you can always plug in an external mouse, keyboard, and monitor to your laptop.
  • 19. 19 I obviously can't make the buying decision for you, but I'll reiterate my computer plan in case you haven't seen it before. I use both: a moderately-priced laptop is with me on a daily basis, syncing up with an inexpensive desktop that works as a print and file server. The desktop works as a machine for my daily backups, has plenty of storage for stuff I don't need to take with me on the road (or to other rooms of the house), has two printers hooked up to it, accepts incoming faxes, and otherwise stands as a backup in case something fails on my laptop. My laptop, however, is where I do most of my work. Sure I could get by with just a notebook PC, but having both makes things so much easier. Shivendra Kumar MCA B8 Er&Dci-IT Infinitysoft.co.in Every thing is different
  • 20. 20 Nikesh Arora President, Global Sales Operations and Business Development in Google Nikesh Arora oversees all revenue and cus- tomer operations, as well as marketing and partnerships. Since joining Google in 2004, he has held several positions with the company. Most recently, he led Google's global direct sales operations. He also developed and managed the company's operations in the European, Middle Eastern and African markets and was responsible for creating and expanding strategic partnerships in those regions for the benefit of Google's growing number of users and advertisers. This will make him the top-ranking (4th Position) Indian in Google. With a background as an analyst, Nikesh's main areas of focus have been consulting, IT, marketing and finance. Prior to joining Google, he was chief marketing officer and a member of the man- agement board at T-Mobile. While there he spearheaded all prod- uct development, terminals, brand and marketing activities of T- Mobile Europe. In 1999, he started working with Deutsche Tele- kom and founded T-Motion PLC, a mobile multimedia subsidiary of T-Mobile International. Prior to joining Deutsche Telekom, Nikesh held management positions at Putnam Investments and Fidelity Investments in Boston. Nikesh holds a master's degree from Boston College and an MBA from Northeastern University, both of which were awarded with distinction. He also holds the CFA designation. In 1989, Nikesh graduated from the Institute of Technology in Varanasi, India with a bachelor's degree in electrical engineering. Rajeev Ranjan rranjan@cdactvm.in
  • 21. 21 I remember whenever I've had to Interview for a position in the past the bit I always looked least forward to was the stage where the Interviewer asks me questions. The majority of which were easy to answer as its very clear what information the Interviewer was look- ing for, but there were always the odd tough Interview Questions thrown in to throw me out. Those coupe of tough Interview questions were always difficult to answer as it was never clear what informa- tion the Interviewer was looking for. I've since been working in recruitment for some time and have been the Interviewer asking those tough Interview questions on many occasions. Its clear that many candidates still don't know what I'm looking to hear from them. So I thought I'd cover some of the tough Interview Questions and ways to answer them. Interview Questions: What are your weaknesses? State a weakness but turn it into a positive: "At times I've been considered too much of a perfectionist, I use to get irritated if I felt someone else’s work on the project was below company standard, I've since learnt that I can't affect other peoples work so channel my energies into making my work as high a standard as possible" Interview Questions: How have you managed to attend an Interview in works time? "I didn't want to deceive my current employers, so I asked them if I could take an unpaid day of leave to attend to a personal matter"
  • 22. 22 Interview Questions: How do you feel about carrying out repetitive or mundane work? "I appreciate every position has an element of repetitiveness but I take all aspects of my job seriously whether they are repetitive or not and always give 100%." Interview Questions: How do you handle Criticism? "At some point we all make mistakes, I'm always happy to take on constructive criticism as this will help me perform better." Interview Questions: How long would it be before you would expect to be promoted? "I couldn’t give a time scale, I would want to prove myself and demonstrate my value to the company, I appreciate that promotion is a reward, not a right" Interview Questions: What sort of people do you find it difficult to work with? "I am a very amiable person and very team orientated, If I were to find it difficult to work with someone, it would be someone whose standards doesn't reach that of the team. Answering Tough Interview Questions well, will set you apart from other candidates Padmakar Mishra applying for the same position padmakar.mishra2010@gmail.com Wait for next issue Infinitysoft.co.in
  • 23. 23 VIRUS Computer viruses are programs that have been pur- posely designed to interfere with the regular operation of a computer. Depending on its nature and capabilities, a virus may cause minor or major interruption to the smooth functioning of a computer. They may just slow down your computer, or repeatedly cause meaningless message to appear on your monitor, freeze your computer or bring up cascading windows on your screen, cause screen blinking, record data without a commend from you, corrupt or delete data, revive deleted data, pick up e-mail addresses from your address book and local files and start sending e-mails on its own, and even damage vital system files. Computer viruses can be several types: Worms: worms are self-replicating computer programs, similar to computer viruses. Worms can spread rapidly from one computer to another when documents are exchanged. A copy of the worm passes through the network to another machine that has a specific security hole. it then copies itself to the new machine, and then start replicating from there. Trojan horses: Trojan horses are programs that claim to perform a particular function but which in fact do something different. For example, they could infect your computer with a virus your files. Macro viruses: Macro viruses use commends called macros embedded in other software to infect and spread to other files viewed by that software. For example. Microsoft word and Excel have macros viruses can spread by exploiting these commands. Boot Sector Viruses: Boot sector viruses are an older type of virus and are not so common today. They used to infect computers’ startup programs, so that the virus would become active as soon as the computer started up. Backdoor Trojans: Backdoor Trojans are programs that allow other computer users to remotely control your computer via a local area network or the internet. Ravindra Bohra ravi_bohra80@yahoo.com
  • 24. 24
  • 25. 25 Speeding up your hard drive to get faster file transfer by using 32-bit transfers on your hard drive: 1. Just add the line to a boot up script. hdparm -c3 /dev/hdX 2. If you use SuSE or other distros based on SYS V. /sbin/init.d/boot.local should work for you. 3 This enables 32-bit transfer on your hard drive. On some systems it can improve transfer performance by 75%. To test your performance gain, type: hdparm -t -T /dev/hdX More DOS-like commands: Many people are moving to Linux these days because windows XP onwards OS needs very large scale amount of resources but they are typing DOS commands on Linux that look fine but cause errors. The command "cd.." in DOS is perfectly valid, but in Linux, the valid command is “cd ..” (any parameter for that command must be sepa- rated from the command by a space). The same goes for "cd/" and "cd~". A quick fix is here. 1 Use your favorite text editor in your home directory to edit the file ".bashrc". The period is there on purpose, this hides the file from normal ls display. 2 Add the lines: alias cd/="cd /" alias cd~="cd ~" alias cd..="cd .."
  • 26. 26 3 And I usually add these... alias md="mkdir" alias rd="rmdir -i" alias rm="rm -i" Here “alias” is a powerful tool, and can be used in the .bashrc script as well as from the command line. You can, if you want to spend the time, create your own group of shell commands to suit how you work. As long as you put them in your .bashrc file, they'll be there every time you log in. Note that if you frequently log in as root, you might want to copy /home/username/.bashrc to /root/.bashrc to keep yourself same. More swap with a swap file: You installed a new Linux system, but forgot to set enough swap space for your needs. Do you need to repartition and reinstall? No, the swap utilities on Linux allow you to make a real file and use it as swap space. The trick is to make a file and then tell the swapon program to use it. Here's how to create, for example, a 64 megs swap file on your root partition (of course make sure you have at least 64 megs free): dd if=/dev/zero of=/swapfile bs=1024 count=65536 This will make a 64 megs (about 67 millions bytes) file on your hard drive. You now need to initialize it: mkswap /swapfile 65536 sync And you can then add it to your swap pool: swapon /swapfile With that you have 64 megs of swap added. Don't forget to add the swapon command to your startup files so the command will be re- peated at each reboot. VINEET PRATAP pratap.vineet@gmail.com
  • 27. 27 But how ... Fix-it
  • 28. 28 The following error message can occur during the WinXP upgrade process: “An unexpected error (768) occurred at line 5118 in <drive let- ter>xpclientbasebootsetupsetup .c Press any key to con- tinue.” When you press any key as instructed, the following error message appears: “A problem has been detected and windows has been shutdown to prevent damage to your computer. PROC- ESS1_INITIALIZATION_FAILED”Huh? Again, the Microsoft Knowl- edge Base comes to the rescue. The root cause triggering this er- ror message is a software program (namely Roxio’s GoBack) that is incompatible with WinXP. To resolve the problem, disable GoBack when WinXP restarts by pressing the space bar at the GoBack boot menu, pressing d to disable and pressing y to confirm. Once Go- Back is disabled, cancel the WinXP setup process and uninstall Go- Error Message: “Fatal System Error: 0x000000a0 (0x00000002,0x00070124, 0x00000000,0x00000000)” Translation: If you happen to own a Microsoft Sidewinder Game Pad Pro (not the joystick model), you may experience a unique problem. If you just happen to be running WinXP (as opposed to any other operating system) and you decide to unplug the USB (Universal Se- rial Bus) cable while WinXP is starting up, you will see the fatal system error and a blue screen, preventing you from accessing your Desktop. Solution: Microsoft is working on a fix for this error, but at press time it is still unresolved. Fortunately, the workaround is rather simple. Just make sure you don’t unplug the Sidewinder cable when the system is Saket kumar starting . saket.dhabbu@gmail.com WHICH PATH IS SUITABLE FOR YOU VISIT Infinitysoft.co.in
  • 29. 29 First Look software Panda cloud antivirus Panda has released a free anti-Virus offering that resides mostly off the host system and in the cloud. Using 'Collective Intelligence', along with distributed computing and a global and community-based platform, Panda has said this new offering is entirely different from what it's created in the past. So, has it succeeded? Starting off Light Panda Cloud Antivirus protects you while you browse, play or work and you won’t even notice it. It is extremely light as all the work is done in the cloud. Secure Panda Cloud Antivirus provides you with the fastest protec- tion against the newest viruses thanks to its cloud-scanning from PandaLabs’ servers Easy Panda Cloud Antivirus is truly install and forget. Don’t worry about updates, configuration or complicated decisions ever again. Anurag Shankar anuragshankar2005@gmail.com
  • 31. 31 "If you have any questions, please feel free to ask" or " We would be happy to answer any questions you have" Send your query mails at: ratnakar.erdci@gmail.com infinitytechmagazine@gmail.com infinitytechmagazine@rediffmail.com infinitytechmagazine@yahoomail.com Join our communities and group at: http://groups.yahoo.com/group/ infinitytechmagazine infinitytechmagazine@yahoogroups.com http://www.orkut.co.in/Community.aspx? cmm=49916804 Join these groups to receive the magazine directly to your mail box. infinitysoft.co.in