Monday, 30 September 2013

Great Pyramids of Giza

The Great Pyramid of Giza

About Great Pyramids of Giza

The Great Pyramids of Giza  The Great Pyramids of Giza The Great Pyramids of Giza  The Great Pyramids of Giza (also known as the Pyramid of Khufu or the Pyramid of Cheops) is the oldest and largest of the three pyramids in the Giza Necropolis bordering what is now El Giza, Egypt. It is the oldest of the Seven Wonders of the Ancient World, and the only one to remain largely intact. Egyptologists believe that the pyramid was built as a tomb for fourth dynasty Egyptian Pharaoh Khufu(Cheops in Greek) over a 10 to 20-year period concluding around 2560 BCE. Initially at 146.5 meters (481 feet), the Great Pyramid was the tallest man-made structure in the world for over 3,800 years. Originally, the Great Pyramid was covered by casing stones that formed a smooth outer surface; what is seen today is the underlying core structure.
Some of the casing stones that once covered the structure can still be seen around the base. There have been varying scientific and alternative theories about the Great Pyramid's construction techniques. Most accepted construction hypotheses are based on the idea that it was built by moving huge stones from a quarry and dragging and lifting them into place.

Sunday, 29 September 2013

Capital Punishment According To Ethical Theories

Capital Punishment According To Ethical Theories

The Ethical Theories of Punishment:

Following are different approaches of capital punishment:
Vengeance
Retribution
Deterrence
Incapacitation

Vengeance :

Vengeance is a raw, human emotion that is normal in family members of murder victims, but it can never be used to justify a public policy given that policies are supposed to be based on reason and empirical science.  Additionally, the state is technically/legally the victim when a crime occurs and is incapable of feeling vengeance.  A careful analysis of the entire Bible, taking the whole Bible in its historical context, does not provide a mandate for capital punishment, even for murderers.

Retribution :

Retribution is a state sponsored rational response to criminality that is justified given that the state is the victim when a crime occurs.  The government is justified in pursuing justice when it is harmed in order to re-balance the scales of justice that were tilted to the benefit of the offender when he or she broke the law.  In reality, however, the death penalty does not generally achieve retribution because it is so rarely applied to murderers.

Deterrence:

Deterrence is the notion that by administering punishment to offenders, the state can cause fear in both the offender and in others (general deterrence) so that they will not want to commit crimes in the future.  Obviously, capital punishment cannot achieve special or specific deterrence because once the offender is dead, he or she cannot be afraid of future punishment.  The available scientific evidence with regard to general deterrence suggests that the death penalty is not a deterrent to murder and cannot be for the simple reason that the most important element of punishment is missing -- certainty.  Punishment must be certain in order to deter, whereas the administration of the death penalty is so rarely applied and so unlikely to be applied to any individual that to even suggest that the death penalty is a general deterrent is a very weak claim.

Incapacitation: 

Incapacitation means taking away a person's freedom so that he or she cannot commit another crime.  The typical form of incapacitation is incarceration (in a jail, prison, etc.).  The ultimate form of incarceration is death.  As with retribution, this is a legitimate justification for the administration of punishment because the primary responsibility of government is to protect its citizens from harm, and one of the goals of our justice systems is to reduce criminality.  Unless you believe in reincarnation, you will agree that the death penalty achieves these objectives, but only for those few that we execute.  Like with retribution, we generally do not meet this objective simply for the fact that the death penalty is so rarely applied (less than 2% of aggravated murderers are sentenced to death and FAR LESS than 1% of all killers are sentenced to death).

Right or wrong:

The Death Penalty is a controversial issue because there are people that state the Death Penalty is wrong and good in some way.

According to first school of thought:

Capital punishment is favourable according to one side of the mirror. Some perspective factors are given as:

Human Rights

It is wrong as it spoils human rights. A unique facet of the modern debate about capital punishment is the characterization of the death penalty as a human rights issue, rather than a debate about the proper punishment of criminals. Modern opposition to the death penalty is seen as a reaction to the political history of the 20th century.

Execution of the innocent

The most common and most cogent argument against capital punishment is that sooner or later, innocent people will get killed, because of mistakes or flaws in the justice system.

According to Ethics:

Right Theory

Rights of one person implies the duties of another person, it is called correlativity of rights and duties. British Philosopher John Locke argued that the law of nature mandate that we should not harm any one’s life, health, liberty because these are our natural rights given to us by God.
Everyone has an inalienable human right to life, even those who commit murder; sentencing a person to death and executing them violates that right. As capital punishment is against human rights. Everyone has a right to live and it is our duty to prevent the rights of other. Moreover, moral values also restrict capital punishment. We could not practice the power of controlling one’s time of death. Survival of an individual is his prior right. We have to save our cardinal values by giving the right of life.

Second school of thought:

Capital punishment is due and right as it is a controversial issue and shows both phases of morality. 

Consequentialist theory:

An action is morally right if the consequences of that action are more favourable than unfavourable.
 Consequentialist theory is a general normative theory that bases the moral evaluation of acts, rules, institutions, etc. Solely on the goodness of their consequences, where the standard of goodness employed is a standard of non-moral goodness.

Capital Punishment In the Light of Islam

Life is sacred, according to Islam and most other world faiths. But how can one hold life sacred, yet still support capital punishment? The Qur'an answers, "...Take not life, which God has made sacred, except by way of justice and law. Thus does He command you, so that you may learn wisdom" (6:151).
The key point is that one may take life only "by way of justice and law." In Islam, therefore, the death penalty can be applied by a court as punishment for the most serious of crimes. Ultimately, one's eternal punishment is in God's hands, but there is a place for punishment in this life as well. The spirit of the Islamic penal code is to save lives, promote justice, and prevent corruption and tyranny.

What is Intercultural Communication

Intercultural Communication Definition

Intercultural communication is the process of sending and receiving messages between people whose cultural background could lead them to interpret verbal and non verbal signs differently. Different people have different cultural backgrounds, because they belong to different cultures and with that they also have different verbal and non verbal signs. These signs in one culture could create hassles in other culture. 
Intercultural Communication

Management Skills

Robert Katz has identified three essential management skills: technical, human, and conceptual.

1. Technical Skills

• The ability to apply specialized knowledge or expertise. All jobs require some specialized
expertise, and many people develop their technical skills on the job.

2. Human Skills

• The ability to work with, understand, and motivate other people, both individually and in
groups, describes human skills.
Many people are technically proficient but interpersonally incompetent

3. Conceptual Skills

1. The mental ability to analyze and diagnose complex situations
2. Decision making, for example, requires managers to spot problems, identify alternatives
that can correct them, evaluate those alternatives, and select the best one.

Modern Judaism

Ultimately, it was the Halakah (the law) that divided Judaism in the 19th cent. The Orthodox hold both the written law (Scriptures) and the oral laws (commentaries on the legal portions of the Scriptures) as authoritative, derived from God, while the Reform do not see them as authoritative in any absolute sense, but binding only in their ethical content. While Orthodox Jews maintain the traditional practices, Reform Jews perform only those rituals that they believe can promote and enhance a Jewish, God-oriented life. In 1999, however, leaders of American Reform Judaism reversed century-old teachings by encouraging but not enforcing the observance of many traditional rituals."historical school," or Conservative movement, attempts to formulate a middle position between Orthodox and Reform, maintaining most of the traditional rituals but recognizing the need to make changes in accordance with overriding contemporary considerations. Conservative Jews believe that the history of Judaism proves their basic assumptions: that tradition and change have always gone hand in hand and that what is central to Judaism and has remained constant throughout the centuries is the people of Israel (and their needs), neither the fundamentalism of Orthodoxy nor what they consider the abandonment of traditions by Reform. The related Reconstruction’s movement of Mordechai M. Kaplan holds Judaism to be a human-centered rather than a God-centered religious civilization.

Saturday, 28 September 2013

History of the world

The history of the world is the history of humanity, beginning with the Paleolithic Era. Distinct from the history of Planet Earth (which includes early geologic history and pre human biological eras), world history comprises the study of archeological and written records, from ancient times on. Ancient recorded history begins with the invention of writing. However, the roots of civilization reach back to the period before the invention of writing. Prehistory begins in the Paleolithic Era, or "Early Stone Age," which is followed by the Neolithic Era, or New Stone Age, and the Agricultural Revolution (between 8000 and 5000 BCE) in the Fertile Crescent. 
History of the world
 The Neolithic Revolution marked a change in human history, as humans began the systematic husbandry of plants and animals. Agriculture advanced, and most humans transitioned from a nomadic to a settled lifestyle as farmers in permanent settlements. Nomadic continued in some locations, especially in isolated regions with few domestic cable plant species; but the relative security and increased productivity provided by farming allowed human communities to expand into increasingly larger units, fostered by advances in transportation.
As farming developed, grain agriculture became more sophisticated and prompted a division of labor to store food between growing seasons. Labor divisions then led to the rise of a leisured upper class and the development of cities. The growing complexity of human societies necessitated systems of writing and accounting. Many cities developed on the banks of lakes and rivers; as early as 3000 BCE some of the first prominent, well-developed settlements had arisen in Mesopotamia, on the banks of Egypt's River Nile, and in the Indus River valley. Similar civilizations probably developed along major rivers in China, but archaeological evidence for extensive urban construction there is less conclusive.
The history of the Old World (particularly Europe and the Mediterranean) is commonly divided into Ancient history (or "Antiquity"), up to 476 CE; the Postclassical Era (or "Middle Ages"), from the 5th through 15th centuries, including the Islamic Golden Age (c. 750 CE – c. 1258 CE) and the early European Renaissance (beginning around 1300 CE); the Early Modern period, from the 15th century to the late 18th, including the Age of Enlightenment; and the Late Modern period, from the Industrial Revolution to the present, including Contemporary History. The ancient Near East, ancient Greece, and ancient Rome figure prominently in the period of Antiquity. In the history of Western Europe, the fall in 476 CE of Romulus Augustulus, by some reckonings the last western Roman emperor, is commonly taken as signaling the end of Antiquity and the start of the Middle Ages. By contrast, Eastern Europe saw a transition from the Roman Empire to the Byzantine Empire, which did not decline until much later. In the mid-15th century, Johannes Gutenberg's invention of modern printing, employing movable type, revolutionized communication, helping end the Middle Ages and usher in the Scientific Revolution. By the 18th century, the accumulation of knowledge and technology, especially in Europe, had reached a critical mass that brought about the Industrial Revolution.

Pre-History:

What Is Email Bombing?

As the Internet becomes a more ubiquitous part of our everyday social lives and commercial transactions, its abuse at the hands of cyber-criminals only increases. Using sophisticated tools, hackers, criminals and con artists frequently disrupt Internet operations on social and commercial sites. One way in which these parties attack websites and disrupt operations is through email bombing.

What do mean by threatening email?

Email is used to communicate through the Internet, and though it is the preferred choice of communication for many today, it has its pitfalls. One would be that if an email is lost, you may never know it. Another is spam, and though that is annoying, it is often not threatening. However, there may come a time when an email does come into your inbox that threatens you in some way. When that happens, you have to know what to do about it.

Friday, 27 September 2013

Difference Between Hackers & Crackers

The differences between hackers and crackers can be difficult to nail down. The exact definition of each, as well as questions of which are good and which are not, depend on who you ask and who you believe. Crackers are, according to hackers, unskilled and malicious whereas crackers believe that the differences are largely generational

Hackers

According to Chad Perrin of Tech Republic, a hacker is a person with a "strong interest in how things work." Hackers, says Perrin, are individuals who like to create, modify and tinker out of pure enjoyment. According to hacker Phillip S. Tellis, some of the early and best-known hackers included Steve Jobs of Apple Computers and Bill Gates of Microsoft. He states that all current computer security systems are a result of the work of hackers.

Thursday, 26 September 2013

Cybercrime

What Is a Crime?

A crime occurs when someone breaks the law by an overt act, omission or neglect that can result in punishment. A person who has violated a law, or has breached a rule, is said to have committed a criminal offense.

What  is cyberspace?

A metaphor for describing the non-physical terrain created by computer systems. Online systems, for example, create a cyberspace within which people can communicate with one another (via e-mail), do research, or simply window shop. Like physical space, cyberspace contains objects (files, mail messages, graphics, etc.) and different modes of transportation and delivery. Unlike real space, though, exploring cyberspace does not require any physical movement other than pressing keys on a keyboard or moving a mouse.
Cybercrime
Some programs, particularly computer games, are designed to create a special cyberspace, one that resembles physical reality in some ways but defies it in others. In its extreme form, called virtual reality, users are presented with visual, auditory, and even tactile feedback that makes cyberspace feel real.Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures. In effect, cyberspace can be thought of as the interconnection of human beings through computers and telecommunication, without regard to physical geography.

What is this Cyber crime?

We read about it in newspapers very often. Let's look at the dictionary Definition of Cybercrime:

Wednesday, 25 September 2013

Ipad Mini WiFi‏

Ipad Mini WiFi‏ Specification And Design

GENERAL (Ipad Mini WiFi )

2G Network N/A

SIM No (Ipad Mini WiFi )

Announced 2012, October
Status Available. Released 2012, November

BODY (Ipad Mini WiFi )

Dimensions 200 x 134.7 x 7.2 mm (7.87 x 5.30 x 0.28 in)
Weight 308 g (10.86 oz)

DISPLAY (Ipad Mini WiFi )

Type LED-backlit IPS LCD capacitive touchscreen, 16M colors
Size 768 x 1024 pixels, 7.9 inches (~162 ppi pixel density)
Multitouch Yes
Protection Oleophobic coating


Ipad Mini WiFi‏

Tuesday, 24 September 2013

Samsung Galaxy Note 10.1,

PhoneSamsung Galaxy Note 10.1 2014 Edition‏

16 or 32GB or 64 internal memory variants available. The selection of Processor will be different by markets.

Phone Samsung Galaxy Note 10.1 

Samsung Galaxy Note 10.1 2014 Edition
Manufacturer Samsung Galaxy Note 10.1
Samsung Galaxy Note 10.1, 

Status Samsung Galaxy Note 10.1

Coming Soon
Available in India
Yes

Samsung Galaxy Note 10.1 Price, 

Price (Indian Rupees)
Expected Price:Rs.39990
Place : Chennai Delhi Kolkata Mumbai
Price (USD)
Expected Price: $888.67 approx
Description Samsung Galaxy Note 10.1
Galaxy Note 10.1 is an Android tablet which runs on the latest Android 4.3 and it supports S-Pen interface. It comes with 1.9 GHz Exynos Octa Core Processor / 2.3 GHz Qualcomm Snapdragon 800 Processor and 3GB of RAM.
Samsung Galaxy Note 10.1 2014 Edition Specifications
Collapse All Sections
Samsung Galaxy Note 10.1 2014

Network Samsung Galaxy Note 10.1

Technology / Frequency Bands GSM : 850/900/1800/1900 MHz HSDPA :900/1900/2100 MHz
Battery Samsung Galaxy Note 10.1
Type Li - Ion
Capacity 8220 mAh
Standby -
Talktime -
Built
Dimensions 243.1x171.4x7.9 mm
Weight 535 g
Form Factor bar
Colors Black, White

Display Samsung Galaxy Note 10.1 Specification And Design

Samsung Galaxy Note 10.1 2014

Monday, 23 September 2013

What is Management And Four Functions of Management
Ther are four management functions. The Management is the process of planning, organizing, leading, and controlling an organization’s human, financial, and material resources to increase its effectiveness.
 Four Functions of Management
Planning:
In planning, managers establish their organization’s strategy, in other words, how best to allocate and use resources to achieve organizational goals. Much uncertainty and risk surround the decisions of managers during planning, and an understanding of organizational behavior can improve the quality of decision making, increase success, and lower risk.

Sunday, 22 September 2013

Organizational Behavior

What Is Organizational Behavior? 

Definition of Organizational Behavior:

Organizational Behavior is a field of study that investigates the impact that individuals, groups and structure have on behavior within organizations, for the purpose of applying such knowledge toward improving an organization’s effectiveness.
An organization is a collection of people who work together to achieve a wide variety of goals, both goals of the various individuals in the organization and goals of the organization as a whole. Organizations exist to provide goods and services that people want.

Saturday, 21 September 2013

MashUp
What are Web mashups and what technology makes them possible?

A web mashup is a Web page or application that uses and combines data, presentation or functionality from two or more sources to create new services. The term implies easy, fast integration, frequently using open APIs and data sources to produce enriched results that were not necessarily the original reason for producing the raw source data.
Mashups composition tools are usually simple enough to be used by end-users. They generally do not require programming skills, they rather support visual wiring of GUI widgets, services and components together. Therefore, these tools contribute to a new vision of the Web, where users are able to contribute.
Web mashups combine the capabilities of two or more online applications to create a hybrid that provides more customer value than the original sources alone.
With Application Programming Interfaces (APIs), programmers are able to get the tools needed to pull data from different websites and combine it with other information to make an entirely new Web service. As a result, the web is becoming a collection of capabilities instead of being collection of pages. It is allows programmers to create new services quickly and inexpensively.

Why would Google and others allow their software to be combined with other software?

In May 2007, Google introduced Google gears, an open source toolkit that allows users to easily integrate Google applications such as web search, chat, maps, calendars, scheduling, and advertising into web sites.
For large web players, such as Google, Yahoo, Microsoft and others who create plug-in program modules, mashups enable them to distribute their brand names across the web at no cost. Frequently, advertising opportunities will result. For example Google AdSense advertising can be placed into our website to display web ads with just a few lines of code.

What is the potential benefit to consumers?

- to create a better user experience
- To gain business insight and allows them to do their job more efficiently. The example given is IBM Mashup Center which allows employees and customers (even those people with non technical background) to create mashups by remixing information from different sources, such as spreadsheets, dAtabases, applications and unstructured text from an email, video and audio.

Thursday, 19 September 2013

Benefits of Encryption

 1. Encryption Helps Move to the Cloud


Everyone is concerned about moving sensitive data to the cloud, and most organizations perceive that the cloud is not as safe as their own data center. If your data is in the cloud, it’s not only possible that strangers might see it, but your data could be sitting on the same storage as your competitors. Imagine how much that treasure chest could be worth?

Encryption can make it possible to leverage the benefits of infrastructure as a service, while still ensuring the privacy of your data. You should ensure data is encrypted in flight, while in use, and at rest in storage. By retaining control of your encryption keys, you’re still in control, even when data has left your building. If the service provider makes copies of your VMs, only encrypted data is copied. And at all times, you determine when to deliver, or revoke, the keys.

2.  When You Own the Keys, You Can Easily Decommission/Deprovision


Would you put your jewels in a safe and give a stranger the key? Would you have your data encrypted in the cloud and have the cloud service provider own the keys? Probably not the most secure option.

Organizations want to take advantage of the cloud for its cost and flexibility. Part of this value is the ability to spin up or decommission servers, as business needs change. But what happens if you want to leave your service provider? You want to be sure you can get your data back, but you also want to make sure you’re not leaving sensitive data behind. How many copies or backups of your VMs has your service provider created so that they can achieve their operational uptime SLA’s? It’s simply impractical for a CSP to retrieve and delete every copy if you decide to leave.

3.  Encryption Helps Achieve Secure Multi-Tenancy in the Cloud


In virtualized cloud environments, multi-tenancy is what drives costs down and increases flexibility. Why dedicate one enterprise-level server to one workload when it can serve many? While virtualization is not new and organizations have taken advantage of its virtues for years, having your VMs and applications running on the same physical servers as other departments or organizations raises some security concerns.

Not only do virtualized servers become richer targets, but if those machines are running in a public cloud infrastructure, you have limited control over who ‘shares’ your hardware. And while strides have been made solving many of the network segmentation issues, another major security challenge still exists: what happens to your data within the storage fabric? If you encrypt data before it enters the cloud, and retain control of the encryption keys, you can ensure your data is safe, regardless of its neighbors.

Monday, 16 September 2013

What is a DDoS Attack?

DDoS stands for “Distributed Denial of Service.” A DDoS attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. Unlike a Denial of Service (DoS) attack, in which one computer and one internet connection is used to flood targeted resource with packets, a DDoS attack uses many computers and many Internet connections.
DDoS attacks can be broadly divided three types. The first, Application Layer DDoS Attacks include Slowloris, Zero-day DDoS attacks, DDoS attacks that target Apache, Windows or OpenBSD vulnerabilities and more. Comprised of seemingly legitimate and innocent requests, the goal of these attacks is to crash the web server, and the magnitude is measured in Requests per second.
The second type of DDoS attack, Protocol DDoS Attacks, include SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. This type of attack consumes actual server resources, or those of intermediate communication equipment, such as firewalls and load balancers, and is measured in Packets per second.
The third type of DDoS attack is generally considered to most dangerous. Volume-based DDoS Attacks include UDP floods, ICMP floods, and other spoofed-packet floods. The volume-based attack’s goal is to saturate the bandwidth of the attacked site, and magnitude is measured in Bits per second.

Why are botnets used in ddos attacks?

Some of the most common tools for which Botnet used in DDoS attack and these are easily downloaded from multiple online sources, and include:
SlowLoris – especially dangerous to hosts running Apache, dhttpd, Tomcat and GoAhead WebServer, Slowloris is a highly-targeted attack, enabling one web server to take down another server, without affecting other services or ports on the target network.
Qslowloris - uses Qt libraries to execute the methods used by Slowloris, offering a graphical user interface that makes the program highly easy to use.
Apache Killer - utilizes an exploit in the Apache OS first discovered by a Google security engineer. Apache Killer pings a server, tells the server to break up whatever file is transferred into a vast number of tiny chunks, using the "range" variable. When the server tries to comply with this request, it runs out of memory, or encounters other errors, and crashes.
There are also many tools for testing server readiness to withstand Botnet DDoS attacks, such as:
DDoSim, which can be used in a laboratory environment to simulate a DDoS attack, and helps measure the capacity of a given server to handle application-specific DDOS attacks, by simulating multiple zombie hosts with random IP addresses that create TCP connections.
PyLoris is a scriptable tool for testing a service's level of vulnerability to a particular class of Denial of Service (DoS) attack.
Tor's Hammer is a slow post dos testing tool written in Python. It can also be run through the Tor network to be anonymized.

One quarter of all computers part of a botnet

The World Economic Forum takes place this week in Davos, Switzerland, and leaders around the world gather to discuss issues like the Iraq war, global climate change, and globalization—along with the incredible prevalence of botnets.
The BBC's Tim Weber, who was in the audience of an Internet panel featuring Vint Cerf, Michael Dell, John Markoff of the New York Times, and Jon Zittrain of Oxford, came away most impressed by the botnet statistics. Cerf told his listeners that approximately 600 million computers are connected to the Internet, and that 150 million of them might be participants in a botnet—nearly all of them unwilling victims. Weber remarks that "in most cases the owners of these computers have not the slightest idea what their little beige friend in the study is up to."

If Cerf's estimate is accurate, that's one quarter of all machines connected to the Internet. So is the Internet doomed?

Well, you're reading this, so no, not yet. But the botnet menace is no phantom, and it has been growing in strength for years. In September 2006, security research firm Arbor Networks announced that it was now seeing botnet-based denial of service attacks capable of generating an astonishing 10-20Gbps of junk data. The company notes that when major attacks of this sort began, ISPs often do exactly what the attacker wants them to do: take the target site offline.
What is it that keeps the "botherders" so fascinated with amassing large flocks like modern-day, digital shepherds? Money. Once millions of "little beige friends" have been compromised with bot software, the creators can then use or rent the network to deliver spam, denial of service attacks, and log passwords and usernames.
All of these uses can be lucrative if you know the right wrong people. Several months ago, Wired published a great story about the extended botnet attack on Blue Security that captures the shadowy nature of the botnet world. Even after weeks of attacks and public tauntings from the spammer behind them, neither the security firm nor its ISPs could fully halt the attacks or identify the person who was launching them. In the end, Blue Security folded.
Botnets have been behind a significant increase in spam in recent months, and some security vendors have warned that these networks are now large enough to pose a potential threat to major government networks (at least those which operate or are connected to the public Internet).
It can be difficult to locate and prosecute botnet operators. Blue Security officials believed that their antagonist was in Russia, but American teenagers have also been involved in the practice, and several have been prosecuted. Two were sentenced last year to 57 and 37 months in jail, respectively—sentences designed to send a message that the government is serious about the issue.

How To Build A Botnet?What is Botnet?

How To Build A Botnet?What is a Botnet?

Sometimes referred to as a “zombie army,” a Botnet is a group of Internet-connected computers, each of which has been maliciously taken over, usually with the assistance of malware like Trojan Horses. Generally without the knowledge of the computers’ rightful owners, these machines are remotely controlled by an external source via standard network protocols, and often used for malicious purposes, most commonly for DDoS attacks.

Botnet Definition

Botnet is the generic name given to any collection of compromised PCs controlled by an attacker remotely. Botnets generally are created by a specific attacker or small group of attackers using one piece of malware to infect a large number of machines.

Sunday, 15 September 2013

LG's Optimus GJ‏

LG's Optimus GJ‏ 

Waterproof smartphones have become a growing trend this year, and it is slowly turning into a feature that is not so much a bonus as it is a requirement. Enter LG's Optimus GJ. The device is IPX7- certified to withstand submersion of up to one meter for 30 minutes, complete with a removable back panel and a robust 1.5GHz quad-core Krait CPU. Sony was the first to give a flagship the IP dust- and-water proofing treatment in the Xperia Z, and Samsung, not to be outdone, quickly responded with a rugged version of its own Galaxy S4 - the Galaxy S4 Active. LG is not to be outdone either. LG Optimus GJ official images Besides an awkward model name, the LG Optimus GJ has got the same internals and Android build as the LG Optimus G, which means that the user experience is, for the most part, identical. Unfortunately, the GJ had to shed its LTE, NFC and FM antennas as well as some of its internal storage to get the waterproofing trick to work, but LG has made up for that by adding a microSD card slot and a beefier battery.LG's Optimus GJ‏. Let's take a closer look at the key features of the LG Optimus GJ: 
LG's Optimus GJ‏

Key features LG's Optimus GJ‏:

Quad-band GSM/GPRS/EDGE support, dual-band 3G with HSPA 4.7" 16M-color 720p True HD-IPS Plus LCD touchscreen Android OS v4.1.2 Jelly Bean; LG Optimus UI 3.0 Quad-core 1.5 GHz Krait CPU, 2 GB RAM, Adreno 320 GPU 13 MP autofocus camera with LED flash, geotagging, Intelligent Auto, image stabilization, Time catch shot, smart shutter and VR panoramas 1080p video recording @ 30fps with continuous autofocus and stereo sound; 1.3 MP front-facing camera, 720p video recording 16GB of built-in storage; microSD card slot MHL-enabled microUSB port, USB host support Independent content output over MHL (Dual Screen Dual Play), Miracast protocol support Bluetooth v4.0 Wi-Fi a/b/g/n, Wi-Fi Direct and DLNA GPS with A-GPS Standard 3.5 mm audio jack Voice dialing Multi-tasking with mini-apps and optional app window transparency (QSlide) Accelerometer and proximity sensor Active noise cancellation with a dedicated mic User-replaceable 2,280mAh Li-Po battery  
Encryption

What is Encryption and How it Works?

Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.

The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearrange the data bits in digital signals.

In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key is an algorithm that undoes the work of the encryption algorithm. Alternatively, a computer can be used in an attempt to break the cipher. The more complex the encryption algorithm, the more difficult it becomes to eavesdrop on the communications without access to the key.
Process of Encryption
Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization. The stronger the cipher -- that is, the harder it is for unauthorized people to break it -- the better, in general. However, as the strength of encryption/decryption increases, so does the cost.

In recent years, a controversy has arisen over so-called strong encryption. This refers to ciphers that are essentially unbreakable without the decryption keys. While most companies and their customers view it as a means of keeping secrets and minimizing fraud, some governments view strong encryption as a potential vehicle by which terrorists might evade authorities.

Saturday, 14 September 2013

HTC One Mini‏

HTC One Mini‏ Specification and Design

Key Features HTC One Mini‏ 

Premium aluminum unibody Quad-band GSM/GPRS/EDGE support; 3G with HSPA; LTE 4.3" 16M-color 720p Super LCD2 capacitive touchscreen with 342ppi pixel density; Gorilla Glass 3 Android OS v4.2.2 Jelly Bean with Sense UI 5.0 Qualcomm Snapdragon 400 chipset: dual-core 1.4 GHz Krait 300 CPU, 1 GB RAM, Adreno 305 GPU 4 MP autofocus "UltraPixel" camera with 1/3'' sensor size, 2µm pixel size; LED flash 1080p video recording @ 30fps with HDR mode, continuous autofocus and stereo sound HTC Zoe 1.6MP front-facing camera, 720p video recording Wi-Fi a/b/g/n, Wi-Fi Direct and DLNA; Wireless TV out GPS with A-GPS, GLONASS 16GB of built-in storage Bluetooth v4.0 Standard 3.5 mm audio jack Accelerometer and proximity sensor Active noise cancellation with dedicated mic Front-mounted stereo speakers with BoomSound tech Class-leading audio output 1,800mAh Li-Po battery 
HTC One Mini‏
Asus Transformer Pad Infinity

Asus Transformer Pad Infinity (2013)‏ Specification And Design

HARDWARE (Asus Transformer Pad Infinity)

DISPLAY (Asus Transformer Pad Infinity)

Screen size (diagonal) 10.1 inches Technology IPS LCD Resolution (X) 2560 px Resolution (Y) 1600 px Touchscreen type Capacitive Multi touch Yes SOFTWARE Operating system Android

PROCESSOR  (Asus Transformer Pad Infinity)

CPU brand Nvidia CPU family Tegra 4 CPU model T40X Clock speed 1.9 GHz Cores 4 GPU Brand Nvidia MEMORY RAM size 2 GB

Thursday, 12 September 2013

Disadvantages of Monopolistic Competition

1. They Can be Wasteful -- Liable of Excess Capacity-Monopolistic Competition

A negative factor of firms that are in monopolistic competition is that they don't produce enough output to efficiently lower the average cost and benefit from economies of scale. As if they were to do this (as from the graph)[4405] they are reducing their 'economic profits', as a result of the marginal revenue being less than that of the marginal cost. Moreover, the funding and expense that goes into packaging, marketing and advertising can deemed extremely wasteful on some levels.

2. Allocatively Inefficient -Monopolistic Competition

Compared with perfect competition, it can be shown that such firms (particularly from the video above) that there is an element of allocation efficiency as the price is above that of the marginal cost curve -- less so in the long run, due to more competition.
Disadvantages of Monopolistic Competition
As the demand curve is one which is downward sloping this then implies the price has to be greater than the marginal cost for a monopolistically competitive firm. Hence it is allocatively inefficient as not enough of the product gets produced for society to benefit -- they want more, however this would force the company to lose money.

3. Higher Prices -Monopolistic Competition

Another drawback of a monopolistic competition, is that as a result of firms having 'some market power', they can extenuate a mark-up on the marginal cost of revenue. Compared to a perfectly competitive firm, who have their price equal to their marginal cost.
Disadvantages of Monopolistic Competition

Monopolistic Competition

The model of monopolistic competition describes a common market structure in which firms have many competitors, but each one sells a slightly different product. Monopolistic competition as a market structure was first identified in the 1930s by American economist Edward Chamberlin, and English economist Joan Robinson.

Definition:

Many small businesses operate under conditions of monopolistic competition, including independently owned and operated high-street stores and restaurants. In the case of restaurants, each one offers something different and possesses an element of uniqueness, but all are essentially competing for the same customers.

Advantages of Monopolistic Competition

Wednesday, 11 September 2013

Monopolistic Competition

Monopolistic Competition

The model of monopolistic competition describes a common market structure in which firms have many competitors, but each one sells a slightly different product. Monopolistic competition as a market structure was first identified in the 1930s by American economist Edward Chamberlin, and English economist Joan Robinson.
Monopolistic Competition Curve
Many small businesses operate under conditions of monopolistic competition, including independently owned and operated high-street stores and restaurants. In the case of restaurants, each one offers something different and possesses an element of uniqueness, but all are essentially competing for the same customers.

Characteristics of Monopolistic Competition:

Monopolistic competitive markets exhibit the following characteristics:
(1) Each firm makes independent decisions about price and output, based on its product, its market, and its costs of production.
(2) Knowledge is widely spread between participants, but it is unlikely to be perfect. For example, diners can review all the menus available from restaurants in a town, before they make their choice. Once inside the restaurant, they can view the menu again, before ordering. However, they cannot fully appreciate the restaurant or the meal until after they have dined.
(3) The entrepreneur has a more significant role than in firms that are perfectly competitive because of the increased risks associated with decision making.
(4) There is freedom to enter or leave the market, as there are no major barriers to entry or exit.
(5) A central feature of monopolistic competition is that products are differentiated.

There are four main Types of differentiation:

(a) Physical product differentiation, where firms use size, design, colour, shape, performance, and features to make their products different. For example, consumer electronics can easily be physically differentiated.
(B) Marketing differentiation, where firms try to differentiate their product by distinctive packaging and other promotional techniques. For example, breakfast cereals can easily be differentiated through packaging.
(c) Human capital differentiation, where the firm creates differences through the skill of its employees, the level of training received, distinctive uniforms, and so on.

Monopolistic Competition

Tuesday, 10 September 2013

DEFINITION OF DIVERSITY:

“Otherness or those human qualities that are different from our own and outside to which we belong, yet present in other individuals and groups”

INTRODUCTION TO DIVERSITY:

People constitute differences among the term diversity. These differences are from life experiences which are faced, as our place of education and where we live. Marital status, career path or level of income can define different perspectives. These factors differentiate one individual from the other in a diverse world.Diversity deals with occurring differences among different classes in accordance with age, class, civilisation, physical and conceptual ability, spiritual practise, and other human characteristics. Diversity in workplace creates openings for both workers and employers which generates more proceeds.
About Diversity/ What is Diversity?

Monday, 9 September 2013

HOW TO GIVE A GOOD PRESENTATION?

HOW TO GIVE A GOOD PRESENTATION

There are five easiest ways are posted there, which are comfortably guide you for presentation. What should be done for giving impressive presentation? What are the previous planning before conferring presentation. My previous topic was What Is Diversity. And today our topic is related to PRESENTATION. These all quires are resolved in this post.

TIPS OF PRESENTATION:

There are some beneficial tips for presentation preparation and improvement in presentation skills.

1.APPEARANCE:

The first thing is your appearance. Because the audience notices your appearance first that have you done proper business dressing? Have you sense of colour scheme? These all things are very important  for charming appearance. Because appearance  is a basic thing which reveals your personality. Therefore, this is very important to select proper dress with suitable colour.

2. BODY LANGUAGE:

Second thing is your body language. That your posture, gesture and your facial expressions. Whether are you confused or not? These all things are very meaningful during presentation. Because a confidence is the key of success and this confidence a person can show through his body language.  In this stage your eye contact is also be noticeable.So, stand tall and expend your chest, and maintain eye contact with your audience. 

Dont be Confuse

Sunday, 8 September 2013

INTERNATIONAL MONETARY FUND

Saturday, 7 September 2013

What Is Diversity?

Diversity includes all the contents and characteristics that define people as individuals and differentiate them from each other. The word diversity absorbs a variety of components in it. These components define the scope of diversity how it affects the environment. The major factor is of culture that varies from region to region. As we consider the business context, it changes from organization to organization. To interact with different culture we need a basic grasp of culture differences which we may encounter. In business organization all legal, ethical, social differences are held clear.
Diversity

    Blogger news

    About

    this blog reveals education , knowledge sharing on multi topics