Pages


Welcomes you for the new dimension of career

Welcome for the new dimension of your academic, personal as well as career exposure. I am very glad to be a part of your each and every enthusiastic and energetic step towards your career. I request all the students of various discipline to watch it whenever you have time and give us your valuable feedback. I, on behalf of KSRCE, wish you to share your innovative creation of ideas or knowledge and do healthy discussion about it. The topic may be about bioinformatics, networking, data mining, career choices, Higher studies in abroad, Research, Placement activity, ... and so on.I request you for posting and the healthy discussion on any career oriented topic.
Some inspirational quotes for your life are

"Education is not preparation for life; education is life itself".
"The object of education is to prepare the young to educate themselves throughout their lives".
“Life is relationship"
"Twenty years from now you will be more disappointed by the things that you didn't do than by the ones you did do. So throw off the bowlines. Sail away from the safe harbor. Catch the trade winds in your sails. Explore. Dream. Discover."

Please mail at it.career.solution2010@gmail.com for posting new topic. - Adhithan.S.V.

Monday, August 16, 2010

KSRCE- Maareswari II MCA - secure a wireless network from hackers

The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.
In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:

1. Strategic antenna placement:

The first thing you have to do is to position the access point's antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can't obstruct its signals. Place it in a central location of the building.

2. Use WEP:
WEP stands for Wireless encryption protocol. It's a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.
3. Change the SSID, disable the broadcast of SSID:
SSID stands for service set identifier. It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.
4. Disable DHCP:
By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.
5. Disable or modify SNMP settings:
Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.
6. Utilize access lists:
For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers

A.Gowri II-MCA from KSRCE- How to Operate Mouse Pointer Without Mouse (Magic)

You have Mouse Problem ?? No Problem

I will give you suggestion

Press Left Alt + Left Shift + Num Lock Button + Ok

with the help of Numeric Keypad e.g ( Press and Hold the following Keys )
7 8 9

4 6

1 2 3


For Normal Click Press 5

Default
Left Alt + Left Shift + Num Lock

Maareswari - KSRCE-MCA-II Year Some facts about C

Learning a language is not all about learning the keywords and functions. It is more about learning about the history and philosophy surrounding its conception. Only then can one become a true programmer
and a true scholar.

History and traditions are what make us what we are.

So…here are some facts about C language:

* C was developed by Dennis Ritchie at Bell Telephone laboratories in 1972.
* It was named “C” because many its features came another language called “B” which itself came from another language called BCPL.
* There is a strong association between C and the UNIX operating system. Derivatives of UNIX like Linux, for example, are predominantly written in C.
* Many new languages like python, php, etc have been developed in C.
* C is still used extensively in systems programming, games and graphics, and in embedded systems.

kiruthika – II MCA, KSRCE-Microsoft Windows amazing facts( you cant say how it is happening)

MAGIC #1

An Indian discovered that nobody can create a FOLDER anywhere on the
computer which can be named as "CON". This is something pretty
cool...and unbelievable. .. At Microsoft the whole Team, couldn't
answer why this happened!
TRY IT NOW ,IT WILL NOT CREATE " CON " FOLDER


--------------------------------------------------------------------------------

MAGIC #2
For those of you using Windows, do the following:

1.) Open an empty notepad file
2.) Type "Bush hid the facts" (without the quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it.

is it just a really weird bug? Confused?

--------------------------------------------------------------------------------

MAGIC #3
microsoft crazy facts

This is something pretty cool and neat...and unbelievable. .. At
Microsoft the whole Team, including Bill Gates, couldn't answer why
this happened!

It was discovered by a Brazilian. Try it out yourself...

Open Microsoft Word and type

=rand (200, 99)

And then press ENTER


Comments plz...

Wednesday, August 4, 2010

Mr. Vijaya Kumar Sr. Lecturer sends forwarded mail - Coimbatore Institute of Technology, Workshop on Distributed Service Models

On behalf of Coimbatore Institute of Technology, Coimbatore, the Department of Computer Technology & Applications invites us for a two day workshop on “Distributed Service Models” at their institute between 3rd and 4th September 2010.

One of the latest innovations in Internet technology is the trend of offering everything viz., software, storage, processing power, bandwidth etc, as a service through Internet. With web services as base, cloud computing offers a pay-per-use model that has made this possible. The need for updating the knowledge in the recent technological developments is always felt among the community of faculty members.

They invite you, faculty members and research scholars from anywhere in the globe to avail this wonderful opportunity and get a first hand knowledge of the technology perspectives of distributed services. For more details pls contact me at vij370@gmail.com.

Please motivate and encourage your friends and colleagues to participate in the workshop and avail the benefit of the program.

Mr.Vijaya Kumar, Senior Lecturer posted invitation for global symphosium

Dear Friends,
This is the invitation mail I got from GRO( Global Right Organization) who invite us to participate in Sixth Annual International Global Symposium Meeting on Human Protection and Violence, from September 27th â013 October 1st 2010 at United States of America and from October 4th â013 8th 2010 at West Africa.

Dear friend

On behalf of the Global Right Organization (GRO), I Miss Madeline D.Peter, a member and staff of the International committee of Red Cross, I cordially invite you to participate in Sixth Annual International Global Symposium Meeting on Human Protection and Violence, from September 27th â013 October 1st 2010 at the 637 Place 14th Street, NWWashington, DC 10111, United States of America and from October 4th â013 8th 2010 at Rue 47 Vlu Ba Maline Ave, Dakar Senegal West Africa.

The Symposium Meeting attendees include; doctors, professors, teachers, pastors, students, managers and other professionals from various departments and staffs. Our may purpose of this event, is to show human Protection and how we can stop Violence from developing in our world, society, homes and in our individual lives.... The Symposium Meeting will be addressed by prominent speakers of the humanitarian industry who will engage through their interactive session to bring forth relevant humanitarian issues.

In our quest to invite people from various countries around the world, I went in search of professionals and NGO members on the Google address as a means of contacting people and organizations and there I picked your email ID, if you are interested to participate as an individual or would like to represent your country or organization, you may take the opportunity to contact the event secretariat for details and information regarding registration for the workshop.

After you have been fully registered for the workshop, you will be provided with air round trip tickets for both countries, accommodation here in Washington DC and visa processing for both countries. If you are a passport holder that will require a visa to enter into the United States, you are to inform the event secretariat when sending your passport information's for registration, as the organizing committee is fully responsible for all visa arrangements and traveling assistance.

I encourage you to share this invitation with anyone that will be interested in attending the Symposium meeting. You are to contact the event secretariat; (Mrs. Katherine Wage) by email: secretrydesk@ aim.com to get more information about registration for the Symposium meeting, if you need any folder assistant you can also write me on my email:madeline.peter@ globomail. com

Yours Faithfully
Miss Madeline D.Peter
Member of Global Right Organization (GRO)
Washington DC (U.S.A)

Mr.Vijaya Kumar, Senior Lecturer posted placement event at thesys

This is the mail I got from corporate delegate. Please refer and pass it to the needed peoples.
Hi,
Below opening is for THESYS technologies,
We are planning to recruit a batch of Fresher for Chennai location.
You can now start referring fresher, if they meet the below mandatory requirements,

Eligibility criteria:
B.E, MCA, M.Sc. IT - 70% and above.2009/2010 passed outs only
Good communication skills and attitude
Willingness to travel overseas
Acceptance of bond for 2 years.


Recommend that you advise the candidates to go thro' our company profile before they appear for the written test and interview.


Please send the resumes to vrajesh@thesys.co.in

Last date for receipt of resumes would be 6th August 2010
Regards,
Rajesh.V
Human Resources
Thesys Technologies (P) Ltd

KSRCE A.Gowri II-MCA Use a Firefox master password so only you can see your saved passwords

Any time you choose to have Mozilla Firefox save your passwords to easily log into a page the next time you visit it they're stored on your computer. All of these passwords are also visible to anyone who goes into the security options of Firefox. To help secure your password information from anyone else using Firefox or from anyone that could steal your computer follow the below steps to setup a Master Password.
1. Open Firefox and click Tools and then Options.
2. In the Options click the Security icon option.
3. Check the Use a master password.
4. Enter your master password and click ok.
To view Saved Passwords click the Saved Passwords... button and then click Show Passwords. If the master password has been setup properly you'll be prompt for a password before being able to view all saved passwords.
This is one of the many reasons to never choose the option to save the password when logging into someone else's computer. Other help with keeping yourself safe online can be found on document CH000507.