Pages


Welcomes you for the new dimension of career

Welcome for the new dimension of your academic, personal as well as career exposure. I am very glad to be a part of your each and every enthusiastic and energetic step towards your career. I request all the students of various discipline to watch it whenever you have time and give us your valuable feedback. I, on behalf of KSRCE, wish you to share your innovative creation of ideas or knowledge and do healthy discussion about it. The topic may be about bioinformatics, networking, data mining, career choices, Higher studies in abroad, Research, Placement activity, ... and so on.I request you for posting and the healthy discussion on any career oriented topic.
Some inspirational quotes for your life are

"Education is not preparation for life; education is life itself".
"The object of education is to prepare the young to educate themselves throughout their lives".
“Life is relationship"
"Twenty years from now you will be more disappointed by the things that you didn't do than by the ones you did do. So throw off the bowlines. Sail away from the safe harbor. Catch the trade winds in your sails. Explore. Dream. Discover."

Please mail at it.career.solution2010@gmail.com for posting new topic. - Adhithan.S.V.

Friday, February 25, 2011

Saravanan- II MCA B sec how to create invisible folder........?

Create invisible folder in windows & xp by using follwing tricks. The folder will not be hidden but will be invisible to eyes, as it’ll be same as background & it’s icon is like that.

Steps are below:-
1)Right Click on the desktop.Make a new folder
2)Now rename the folder to a unnamed one (to do this u have to hold ALT key and type 0160 or hold on Alt key and type 255(numlock should be on & use numpads ) ).
3)Now u have a folder with out a name.
4)Right click on the folder>properties>customize. Click on change icon.
5)Scroll a bit, u should find some empty spaces,(empty or blank iconimage) Click on any one of them. Press ok.

Monday, February 7, 2011

Saravanan- II MCA B sec - without folder name create a new folder

To Create a folder without any Name to your system,Do the Following.

1.Create a Folder.
2.Right Click on the folder and click rename.
3.Press alt+255 while performing the second step.
4.Click outside the folder.
5.Now ,a Folder without name has been created on your Desktop.

KIRUTHIKA:IIMCA::import foreign disk


Import a foreign disk:
When you move a dynamic disk from one computer to another this dynamic disk is flagged in Disk Manager" as a foreign disk. In order to access this foreign disk you must import it first.

To Import the Foreign Disk on Windows XP:
Click Start
Control Panel
Administrative Tools
Computer Management
Disk Management
Right click on the Foreign Disk
Select "Import Foreign Disk"

What if the "Import Foreign Disk" option is not present.
If you right click on the foreign disk and the "Import Foreign Disk" is not present, this can happen because the dynamic disk was from a Windows XP Pro machine and the new machine has Windows XP Home installed. Windows XP Home cannot read dynamic disks as they do not have a normal partition table.

Convert to Basic Disk:
To make the disk accessible to the new machine you will need to convert it to a basic disk. However this process will destroy the data on the disk.

What to do
In this is the case you will need to put the disk back into the original machine and then remove all the data or the most valuable data to another location such as writable DVD another hard disk drive present on the old machine USB thumb drive / memory disk tape back another machine on your network (if you have one) then you can convert it to a basic disk in the new machine and put the
data back on it.

KIRUTHIKA:IIMCA::The Importance of Internet Security


In the computer industry, Internet security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.

Internet security can be achieved through following steps.

ISP
Your Internet service provider (ISP) should be your first line of defense. If you have a choice, choose an ISP that offers online virus, spam and content filters. This will reduce, but not eliminate, the amount of spam and the number of infected emails that you receive. The content filter is to protect your kids. If you do not have a choice or want to keep your current ISP, consider using an online email service that offers virus and spam filters. For more information, see our Broadband page.
A variety of Privacy Software is available to clean your browser, stop spam, trip up phishing, filter content for kids, catch web bugs, manage cookies, and block banner, pop-up and pop-under ads. These are routers, firewalls, anti-virus, anti-spyware and registry cleaner. For more information, see our Privacy, Anti-Spam and
Anti-Phishing pages.
Routers
Routers provide the security from internet using Network Address Translation technique. Network Address Translation (NAT) typically has the effect of preventing connections from being established inbound into a computer, whilst permitting connections out. For a small home network, software NAT can be used on the computer with the Internet connection, providing similar behavior to a router and similar levels of security, but for a lower cost and lower complexity.
Firewalls
A
firewall blocks all "roads and cars" through authorized ports on your computer, thus restricting unfettered access. A stateful firewall is a more secure form of firewall, and system administrators often combine a proxy firewall with a packet-filtering firewall to create a highly secure system. Most home users use a software firewall. These types of firewalls can create a log file where it records all the connection details (including connection attempts) with the PC.
Anti-virus
Some people or companies with malicious intentions write programs like computer viruses, worms, Trojan horses and Spyware. These programs are all characterized as being unwanted software that installs automatically on your computer through deception.
Trojan horses are simply programs that conceal their true purpose or include a hidden functionality that a user would not want.
Worms are characterized by having the ability to replicate themselves and viruses are similar except that they achieve this by adding their code onto third party software. Once a virus or worm has infected a computer, it would typically infect other programs (in the case of viruses) and other computers.
Viruses also slow down system performance and cause strange system behavior and in many cases do serious harm to computers, either as deliberate, malicious damage or as unintentional side effects.
In order to prevent damage by viruses and worms, users typically install antivirus software, which runs in the background on the computer, detecting any suspicious software and preventing it from running.
Some malware that can be classified as Trojans with a limited payload are not detected by most antivirus software and may require the use of other software designed to detect other classes of malware, including Spyware.
Anti-Spyware
Spyware is software that runs on a computer without the explicit permission of its user. It often gathers private information from a user's computer and sends this data over the Internet back to the software manufacturer.

Adware is software that runs on a computer without the owner's consent, much like Spyware. However, instead of taking information, it typically runs in the background and displays random or targeted pop-up advertisements. In many cases, this slows the computer down and may also cause software conflicts. That’s why security products like anti-spyware and registry cleaner are vital for this kind of treat.

KIRUTHIKA.G::IIMCA::How to Cleanup Your Registry and Ensure Computer Efficiency

The Approach to the Computer Registry's Cleanup

Is the alarming blue screen being perpetually displayed on the computer, or is the machine simply loading up slowly and crashing recurrently? This is what normally occurs to a majority of computer users, thus necessitating you as the user to learn how to clean up the registry. Below are three reasons which commonly attribute to the loosening up of the computer in addition to its display of errors.

Errors of the Computer Registry

In most cases, computer troubles slow down the speed of the computer and are caused by the presence of errors in the registry of the computer. The computer’s registry records determine the manner with which the hardware and applications work, while the probability that errors are present in the computer registry are significantly higher, especially for those users ascertained as having made use of their computers for relatively one year. It is ideally necessary to acquire the competence regarding how to clean up your registry to ensure that it works and is in a favorable condition. The number of scanning software for registries is significantly high and all that is required is downloading a single one and proceeding to clear the registry out.

Adware and Spyware

Computers with a constant internet connection stand a higher chance of having adware and spyware on them. Adware and spyware are programs that infect computers via online sites when users are browsing them. An assortment of spyware is capable of doing harm on a computer, but their most common purpose is destroying whatever the user is currently doing. This information proceeds to be submitted again to the key website, while the individual remains clueless in regard to what occurred. In such a case, all that you require to know is how to cleanup your registry. This generally necessitates downloading the cleaner software for the spyware and working the software. Remember to compare software before downloading like we talked about in the article "compare registry fix software". The spyware should be removed from the computer to ensure that the computer is capable of working faster.

Viruses

A majority of computer troubles are attributed to this reason, despite their presence not being common. If a computer user has cause to believe that a particular computer has a virus infection, it is imperative for you to know how to cleanup your registry and additionally find the appropriate computer anti-virus software. Running the virus scan ensures that the documents are scanned especially those that the user has derived from the Internet. This is inclusive of files such as the game or song transfers as well as the email attachments.
One significant thing that the user should never attempt doing is making an effort of individually clear out the computer’s registry. This can adversely lead to serious complications including failure of the system to reboot. Such a case will for instance require a registry cleaner for the computer to work effectively again. To ensure a perfect completion of the work, the use of a registry cleaner is recommended as well as having knowledge on how to clean up your registry.

KIRUTHIKA.G::IIMCA::Software Firewall - Types of Firewall


A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).

A firewall's function within a network is similar to firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.

Without proper configuration, a firewall can often become worthless. Standard
internet security practices dictate a "default-deny" firewall rule set, in which the only network connections which are allowed are the ones that have been explicitly allowed. Unfortunately, such a configuration requires detailed understanding of the network applications and endpoints required for the organization's day-to-day operation. Many businesses lack such understanding, and therefore implement a "default-allow" rule set, in which all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely.
Types of firewalls
There are several classifications of firewalls depending on where the communication is taking place, where the communication is intercepted and the state that is being traced.
Network layer and packet filters
Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply. The term packet filter originated in the context of BSD operating systems.
Application-layer Firewall
Application-layer firewalls work on the application level of the TCP/IP stack i.e., all browser traffic, or all telnet or ftp traffic and may intercept all packets traveling to or from an application. They block other packets usually dropping them without acknowledgement to the sender. In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines.
ProxiesFirewall
A proxy device may act as a firewall by responding to input packets, (connection requests, for example) in the manner of an application, whilst blocking other packets. Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall.
Network address translation
Firewalls often have network address translation (NAT) functionality, and the hosts protected behind a firewall commonly have addresses in the "private address range", as defined in RFC 1918. Firewalls often have such functionality to hide the true address of protected hosts. Originally, the NAT function was developed to address the limited number of IPv4 routable addresses that could be used or assigned to companies or individuals as well as reduce both the amount and therefore cost of obtaining enough public addresses for every computer in an organization. Hiding the addresses of protected devices has become an increasingly important defense against network reconnaissance.

A firewall is dedicated security software running on computer. While a registry cleaner find and delete tracking programs that install them self through internet pages, a firewall inspects network traffic passing through it, and denies or permits passage based on a set of rules.