The document provides a timeline of 53 years of hard drive development from 1956 to 2009, highlighting major milestones such as IBM shipping the first hard drive in 1956 holding 5MB, the introduction of thin film heads in 1979 allowing higher storage capacities, and Hitachi announcing a 1-terabyte hard disk drive in 2009. The timeline chronicles innovations in hard drive technology that have led to dramatic increases in storage capacity and reductions in size over the past five decades.
Intelligent Microcontent: At the Point of Content Convergence | Rob HannaLavaConConference
Content distilled down to appropriate chunks of information in the form of intelligent microcontent take on a new life when they are made available to the enterprise for consumption and reintegration across different business functions. The silos all but disappear when content is rendered to microcontent that is classed, focused, structured, and contextualized. This microcontent then can flow freely across product, marketing, training, and support documentation. Attend to learn more about this transformational opportunity.
Presentation from the launch of Reading UTC http://www.utcreading.co.uk/ and http://www.sourcewire.com/news/76755/microsoft-hosts-utc-reading-taster-event
This approach mainly based on examines how many differences do exist between BlackBerry OS and new BlackBerry OS based on QNX OS. It highlights whether one techniques provide more easy implementation, investigation and handling or not, what common differences examiners may encounter and what they should as concept be involved to forensic handling with these platforms because a Playbook OS is completely a new approach.
http://hakin9.org/dont-be-mocked-secure-your-system-0512-2/
Client Cert Deployment Models and Hardware Tokens/Smart CardsEd Dodds
8:45 Monday, January 23rd, 2012!
Joe St Sauver, Ph.D.!
joe@internet2.edu / joe@uoregon.edu!
InCommon Certificate Program Manager and !
Internet2 Nationwide Security Programs Manager!
http://pages.uoregon.edu/joe/client-cert-models/!
To Bot or Not: How Bots can Support Collaboration in Software Engineering (I...Margaret-Anne Storey
Abstract and video link below)
Presented at ICGSE 2016: Conference on Global Software Engineering (http://www.ics.uci.edu/~icgse2016/2_0cfp.html)
Video link: https://www.youtube.com/watch?v=BsgnLwPMqWM&feature=youtu.be&list=PLcm9UtazJCOLBwPaaHNn_htAjPAXIdRGr
Abstract:
Software development stakeholders require a constellation of tools to support their communication, collaboration and coordination activities. But poor tool integration can lead to gaps in knowledge flow, or worse, to an overabundance of shared communication and information. The software development community is witnessing the rise of "social bots" to integrate diverse development and communication tools and to address the challenge of information overload. A bot is a conversational user interface that can automate rote or tedious tasks. It may fetch or share information, extract and analyze data, detect and monitor events and activities in communication and social media, connect developers with each other or with other tools, or it may provide feedback on individual and collaborative development tasks. Some bots are emerging as important team members, providing support for individual and team task management and for the automation of dev-ops and customer support. However, the rapid adoption of bots and the platforms that support them brings possible drawbacks. Designing effective platforms for bots is challenging and bots may introduce alienation among stakeholders or lead to other technical challenges. In this talk, I will discuss the emerging role of bots in software development and describe some of the advantages and challenges that may lie ahead.
This is my dissertation paper in which I present an approach towards developing interactive applications and propose a way this can be accomplished in a clean and maintainable way.
Intelligent Microcontent: At the Point of Content Convergence | Rob HannaLavaConConference
Content distilled down to appropriate chunks of information in the form of intelligent microcontent take on a new life when they are made available to the enterprise for consumption and reintegration across different business functions. The silos all but disappear when content is rendered to microcontent that is classed, focused, structured, and contextualized. This microcontent then can flow freely across product, marketing, training, and support documentation. Attend to learn more about this transformational opportunity.
Presentation from the launch of Reading UTC http://www.utcreading.co.uk/ and http://www.sourcewire.com/news/76755/microsoft-hosts-utc-reading-taster-event
This approach mainly based on examines how many differences do exist between BlackBerry OS and new BlackBerry OS based on QNX OS. It highlights whether one techniques provide more easy implementation, investigation and handling or not, what common differences examiners may encounter and what they should as concept be involved to forensic handling with these platforms because a Playbook OS is completely a new approach.
http://hakin9.org/dont-be-mocked-secure-your-system-0512-2/
Client Cert Deployment Models and Hardware Tokens/Smart CardsEd Dodds
8:45 Monday, January 23rd, 2012!
Joe St Sauver, Ph.D.!
joe@internet2.edu / joe@uoregon.edu!
InCommon Certificate Program Manager and !
Internet2 Nationwide Security Programs Manager!
http://pages.uoregon.edu/joe/client-cert-models/!
To Bot or Not: How Bots can Support Collaboration in Software Engineering (I...Margaret-Anne Storey
Abstract and video link below)
Presented at ICGSE 2016: Conference on Global Software Engineering (http://www.ics.uci.edu/~icgse2016/2_0cfp.html)
Video link: https://www.youtube.com/watch?v=BsgnLwPMqWM&feature=youtu.be&list=PLcm9UtazJCOLBwPaaHNn_htAjPAXIdRGr
Abstract:
Software development stakeholders require a constellation of tools to support their communication, collaboration and coordination activities. But poor tool integration can lead to gaps in knowledge flow, or worse, to an overabundance of shared communication and information. The software development community is witnessing the rise of "social bots" to integrate diverse development and communication tools and to address the challenge of information overload. A bot is a conversational user interface that can automate rote or tedious tasks. It may fetch or share information, extract and analyze data, detect and monitor events and activities in communication and social media, connect developers with each other or with other tools, or it may provide feedback on individual and collaborative development tasks. Some bots are emerging as important team members, providing support for individual and team task management and for the automation of dev-ops and customer support. However, the rapid adoption of bots and the platforms that support them brings possible drawbacks. Designing effective platforms for bots is challenging and bots may introduce alienation among stakeholders or lead to other technical challenges. In this talk, I will discuss the emerging role of bots in software development and describe some of the advantages and challenges that may lie ahead.
This is my dissertation paper in which I present an approach towards developing interactive applications and propose a way this can be accomplished in a clean and maintainable way.
A recap of interesting points and quotes from the May 2024 WSO2CON opensource application development conference. Focuses primarily on keynotes and panel sessions.
Here are top 9 predictions for the future of programming: 1.Cloud native 2. IoT security 3.Video Content will continue to dominate the Web 4.Data is important
This "IT Outsourcing 101" eBook is a concise summary from the bestselling book on the subject, "Software without Borders" and provides you the essential steps required in initiating and organizing the process to find and evaluate offshore software development options
Predicted! Top Software Development Trends for 2021Pixel Crayons
Read the full blog here: http://bit.ly/3pLF0Nq
Connect with us through:
Contact us : https://bit.ly/2IpPX7w
Facebook : https://www.facebook.com/PixelCrayons
Twitter : https://twitter.com/pixelcrayons
LinkedIn : https://www.linkedin.com/company/pixelcrayons
Instagram : https://www.instagram.com/pixelcrayons/
Pinterest : https://in.pinterest.com/pixelcrayons/
Web Development SEO Expate BD LTD 1 01.02.2023 .pdfSeo Expate BD LTD
Welcome to
Getting Started with Website Development
Even though the term "web development" typically refers to web markup and coding, website development encompasses all related development tasks, such as client-side scripting, server-side scripting, server and network security configuration, ecommerce development, and content management system (CMS) development.
In this video, we'll go over the principles of web programming, how to create a website and further resources for people who want to learn more or pursue a career in development.
Continue reading or use the chapter links to traverse the manual to learn more about constructing websites.
What makes web development crucial?
The Internet will always be around. In reality, it has developed into a global portal and the primary tool for obtaining information, communicating, learning, and having fun. As of 2021, 4.66 billion individuals on the planet were online, or more than half.
The industry of web development is growing quickly, which is not surprising considering the explosive growth of Internet users. Compared to most other technology professions, web development jobs are expected to grow by 13% between now and 2030.
Learn about the advantages of utilizing CMS Hub to build an optimized website that connects to the whole marketing suite and Hub Spot CRM data.
In the part that follows, we'll go over the principles of web development and provide solutions.
Data Security in Fintech App Development: How PHP Can HelpNarola Infotech
Narola Infotech is a PHP development company with more than 17 years of experience. Our 350+ IT experts have worked with over 1500 clients around the world in every major industry. In fact, our clients have appreciated our efforts and results over the years.
Do you want to build a secure and functional fintech platform? Feel free to contact us at any time, and our experts will get back to you to discuss your dream project.
A recap of interesting points and quotes from the May 2024 WSO2CON opensource application development conference. Focuses primarily on keynotes and panel sessions.
Here are top 9 predictions for the future of programming: 1.Cloud native 2. IoT security 3.Video Content will continue to dominate the Web 4.Data is important
This "IT Outsourcing 101" eBook is a concise summary from the bestselling book on the subject, "Software without Borders" and provides you the essential steps required in initiating and organizing the process to find and evaluate offshore software development options
Predicted! Top Software Development Trends for 2021Pixel Crayons
Read the full blog here: http://bit.ly/3pLF0Nq
Connect with us through:
Contact us : https://bit.ly/2IpPX7w
Facebook : https://www.facebook.com/PixelCrayons
Twitter : https://twitter.com/pixelcrayons
LinkedIn : https://www.linkedin.com/company/pixelcrayons
Instagram : https://www.instagram.com/pixelcrayons/
Pinterest : https://in.pinterest.com/pixelcrayons/
Web Development SEO Expate BD LTD 1 01.02.2023 .pdfSeo Expate BD LTD
Welcome to
Getting Started with Website Development
Even though the term "web development" typically refers to web markup and coding, website development encompasses all related development tasks, such as client-side scripting, server-side scripting, server and network security configuration, ecommerce development, and content management system (CMS) development.
In this video, we'll go over the principles of web programming, how to create a website and further resources for people who want to learn more or pursue a career in development.
Continue reading or use the chapter links to traverse the manual to learn more about constructing websites.
What makes web development crucial?
The Internet will always be around. In reality, it has developed into a global portal and the primary tool for obtaining information, communicating, learning, and having fun. As of 2021, 4.66 billion individuals on the planet were online, or more than half.
The industry of web development is growing quickly, which is not surprising considering the explosive growth of Internet users. Compared to most other technology professions, web development jobs are expected to grow by 13% between now and 2030.
Learn about the advantages of utilizing CMS Hub to build an optimized website that connects to the whole marketing suite and Hub Spot CRM data.
In the part that follows, we'll go over the principles of web development and provide solutions.
Data Security in Fintech App Development: How PHP Can HelpNarola Infotech
Narola Infotech is a PHP development company with more than 17 years of experience. Our 350+ IT experts have worked with over 1500 clients around the world in every major industry. In fact, our clients have appreciated our efforts and results over the years.
Do you want to build a secure and functional fintech platform? Feel free to contact us at any time, and our experts will get back to you to discuss your dream project.
Top Enterprise Software Development TrendsJane Brewer
This document provides a detailed list of the top enterprise software development trends that will define software development over the next decade and how your organization can best take advantage of them. https://bit.ly/3gBl0OO
This article serves as a beginner's guide to website design and development, addressing the challenges and providing resources to make the process easier. It highlights the accessibility of web development services in Lahore and explains the fundamental concepts, including types of websites, coding languages, and the importance of cybersecurity. By understanding these basics, beginners can confidently embark on their web development journey and create a website tailored to their needs.
The most effective development service is available to Pakistan.pptConnect Solutions
A website's creation can be intimidating for those who are new to the field. With the right knowledge, it can be simple and enjoyable. This article will go over the basics of web development, and provide several useful resources to get started. The development of websites was once the sole responsibility of those with a high-tech background and had the ability to code. Today, thanks to advancements in the tools to build websites and platforms, anyone who is looking to create websites can design websites. In this video tutorial, we'll take you through the basic principles of web development to assist you in creating a website that is suitable for your personal or business needs.
Hire Trusted Website Hackers – We, at EvolutionHackers have got you covered with the Top Website Hackers to meet your requirements. Visit for more info!
#LibreOffice is a #free and powerful #officesuite, and a successor to #OpenOffice.org (commonly known as #OpenOffice).
Its clean interface and feature-rich tools help you unleash your #creativity and enhance your #productivity. #LibreOffice includes several applications that make it the most versatile #Free and #OpenSource office suite on the market: #Writer (#wordprocessing), Calc (#spreadsheets), Impress (presentations), #Draw (vector graphics and #flowcharts), Base (#databases), and #Math (#formula editing).
#LibreOffice is #community-driven and #developed #software, and is a project of the #nonprofit #organization, The #Document #Foundation. #LibreOffice is free and #opensource software, originally based on #OpenOffice.org (commonly known as OpenOffice), and is the most actively developed OpenOffice.org successor project.
#LibreOffice is developed by users who, just like you, believe in the principles of #FreeSoftware and in sharing their work with the world in non-restrictive ways.
This office suite can easily replace costly paid option available. If you need a good office suite which is easily and freely available you can for sure give a try and.
It has following features/components for making your work easy and cost free and vendor independent:
Writer – word processor
Calc – spreadsheet
Impress – presentations
Draw – diagrams
Base – database
Math – formula editor
Charts
Better #collaboration
#Sharingdocuments and edits with other users have been enhanced and well tracked, to make modifications more clear.
Work faster in Calc
Working with #Spreadsheet has the new #Bash-like autocompletion feature helps you to input data in a snap.
#Barcodes and borders
We can now insert #barcodes into your #documents with just a few clicks
For Full information about the release you can visit if your are interested.
https://wiki.documentfoundation.org/ReleaseNotes/7.3
If you need any help you can reach out here
https://twitter.com/libreoffice
https://blog.documentfoundation.org/
https://www.facebook.com/libreoffice.org
https://twitter.com/AskLibreOffice
What Next :
#LibreOffice 7.4 – is next major release in August, you can try installing and test it and help the developers to find if any bug or issue or need any improvement.
Let's install and explore.
We will now install it in #Ubuntu and explore this a bit
#SystemArchitecture Series: #Kerberos Architecture Component and communication flow #architecture
#Kerberos is a ticketing-based #authentication #system, based on the use of #symmetric keys. #Kerberos uses tickets to provide #authentication to resources instead of #passwords. This eliminates the threat of #password stealing via #networksniffing. One of the biggest benefits of #Kerberos is its ability to provide single sign-on (#SSO). Once you log into your #Kerberos environment, you will be automatically logged into other applications in the environment.
To help provide a secure environment, #Kerberos makes use of Mutual #Authentication. In Mutual #Authentication, both the #server and the #client must be authenticated. The client knows that the server can be trusted, and the server knows that the client can be trusted. This #authentication helps prevent man-in-the-middle attacks and #spoofing. #Kerberos is also time sensitive. The tickets in a #Kerberosenvironment must be renewed periodically or they will expire.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
2. 2
Infinitytech Magazine
Technically advance
Infinitytech.co.in
Copyright@ 2009 infinitysoft.co.in
All right reserve
All text and context in this book solely owned by infinitysoft.co.in .Reproduction without permission in any form is illegal .
Get your own free personalized copy of this book from
www.infinitysoft.co.in
3. 3
Editor’s pen
Advantages of contract
programming in software
development industry
As we all know that programming
industry is getting tougher rapidly
and as a result of that the necessity
of freelance programmers and
contract programmers is being
sensed vastly. In a professional
software development firm, the
programmer’s expertise module
wise. Some times it is viewed that,
such programmers are unable to
work at different module in same
project.
Hence the concept of freelance
programming or contract
programming arises in recent
programming arena. These
contract programmers are really very
knowledgeable and have great
expertise in web programming as
well as the software development
industry. These freelance
programmers can judge the task
easily through their years of
Shashwat Shriparv expertise, and are in an faster able to
shashwat@cdactvm.in solve the problems manner.
These freelance programmers may
follow single programming language
like PHP, Dot Net, Java etc. but
their skills reside in interface design,
form processing, navigation main-
taining, error handling, database
handling, HTML development and
also visual representation makes
them famous in the software
development industry .
4. 4
Table of contents
Editor speak
Devil facts
Programmers Area
Career Guide
Know your hard disk
Learn Linux
Software of the month
Hardware/Software Problem
Help Line
5. 5
Devil Fact
Cyber criminals Flock to the Internet
and to a Computer in Your Home or
Business…..
6. 6
Devil Fact
Organized crime seems too be extremely active in the scam
known as "phishing" in which they send emails under the guise of
being a financial institution or other legitimate organization. In
the email they ask unsuspecting victims to verify personal informa-
tion such as account numbers and passwords. They will target home
users who have become the weakest link and they target their vic-
tims much more closely than before, by tracking down full names
and personal interests. They also skim social networking sites
and personal websites where most people have left a digital
footprint that can be mined .
Criminals are increasingly trying to trick citizens into giving them
their bank account details, according to a published survey which
showed such "phishing" attempts almost doubled in the first six
months. Over 157,000 unique phishing messages were sent out
around the world in the first half of 2006, an increase of 81 percent
compared with the six-month period to end-December 2005. Each
message can go to thousands or hundreds of thousands of
consumers, according to the bi-annual Internet Security Threat
Report from security software vendor Symantec.
Another trend in the first half of the year is that phishes have
become more sophisticated, dodging spam filters and other defense
mechanisms designed by provider sand software companies to keep
out the criminals.
How much financial damage phishes have caused is unclear and
usually at an individual level, which is why phishing does not get the
same media attention as "denial of service attacks" aimed to take
out a specific website, or email worms which can shut down millions
of computers in a digital equivalent of a carpet bombing. The
internet is still under fire from such attacks, taking about 6,110
different denial of service hits every a day, but unlike a few years
ago they cause less damage.
A successful 'denial of server' attack or worm can have ramifications
far beyond phishing. Worms have taken down electricity grids. That's
why critical infrastructure is now much more resilient. Information
technology managers are better prepared and networks are more
robust," Whitehouse said.
7. 7
Increased focus on security, and a willingness from software compa-
nies to own up to their mistakes has dramatically cut down the time
that computers are at risk, Symantec found. For example, Internet Ex-
plorer, the world's most popular browser from Microsoft, has cut the
number of days in which hackers can exploit a security flaw to nine
days from 25 days six months earlier. Security holes in browsers from
Opera and Mozilla Firefox are patched within two days and one day re-
spectively.
Because cyber predators and other cybercriminals are becoming
smarter and more sophisticated in their operations, they are real
threats to your personal security and privacy. Your money, your com-
puter, your family, and your business are all at risk. These cybercrimi-
nals leave you with three choices:
1. Do nothing and hope their attacks, risks, and threats don’t occur on
your computer.
2. Do research and get training to protect yourself, your family, and
your business.
3. Get professional help to lockdown your system from all their attacks,
risks, and threats.
Remember When you say "No!" to hackers and spyware, everyone
wins! When you don't, we all lose!
Ratnakar Mishra
ratnakar.mishra@preigo.com
Space for ads
8. 8
Programmers Area
By the programmers for the programmers…
9. 9
“Customizable Web Pages”
An universal approach to almost every webpage
I am mostly a man who wants to see the real implementation of
things, I mean there practical and real world implementation, in Geek
speaks ‘Encapsulation’ of the data. So most of my development are/
were based on the way a product or an application can ease the life of
the basic users, because ultimately they are the people who pro-
nounce the success and failure of a product in market, the more ‘User
friendly’ your product is, the more laymen usage of your product will
be.
Just a few weeks back I started off with a concept to be implemented
and deciphered soon, I will come to that later on. Now that concept
started off with an idea, rather say an “Psychological approach of con-
structing a social platform’. I studied blogs,feeds,reviews and videos
of people who actively are associated with this whole criticism of IT
and Web 2.0 arena.(By the way some really good Tech Blogs and por-
tals which can keep you Up to Date with the latest Geek stuffs and
happenings in this Web World are: www.techcrunch.com
www.webuser.co.uk www.networkcomputing.com
www.webopedia.com www.internet.com
Now the outcome of this ‘Research’ was that I get to know that now a
days people really want to get there things ‘Customized’ be it the skin
of their iPhone or having their Gmail theme and gadgets in place. But
there is restriction, I mean this whole customization of your personal
stuff is offered by very limited web players, the Giant Google of course
with there Gmail personalisation wherein a user can add gadgets from
Google Labs, customize the shortcut keys for saving drafts, adding a
label or be it choosing the background for their Gmail or theme per
seethe there is iGoogle,what more... up to a certain extent by Face-
book just that it allows you to “Hide/Show” certain posts/updates.
But still they have this “interface architecture” defined by them which
bounds you to the things which they want you to get displayed on
your profile, not something completely on your own. Let our imagina-
tion get wild, now think something like an ‘Compilation’ of web pages,
rather Web applications....on a SINGLE webpage......now you might
think I am suggesting you to create an web page of your own (By the
way pick up the last addition of this magazine to learn how to “Make
your own website in just days”),no my friend that’s where the fun
comes, you don’t need to make a page of your own, just imagine if you
10. 10
can personalize each and every webpage that you see, be it some
news channel, some radio junction or any other social networking site
(Even if they don’t provide you with the liberty of customising the way
the profile looks),even wilder, imagine if you can merge the Updates
of your friends from Facebook,the latest Email notifications from
Gmail,recent RSS feeds from Sun’s website and the most watched
video on you tube for the day. Isn't that fun, now you may ask me that
what about the privacy issues, why will these sole owners of the
contents allow me to do so, the answer is Alias (Will get to that later).
It is maybe you can say, a wilder or a more creative form of iGoogle,
you can play around with things you want, shift the contents from one
side to another and the fact is it is not dependent upon the service
provider, say the links at the top of iGoogle ‘Web Images News Groups
Books Scholar Gmail’, but Google doesn’t allow you to change, modify
or move them around, do they no since that’s in there hand, what
services they want to provide to you.
Alias what I was talking about previously is a mere web space where
you can put all you want, the changes you want to see in your own
“Customizable webpage”. It can be achieved by using a proxy server.
Let me elaborate each aspect, tool and services and terms specifically
which shall be used in for this purpose.
What is a Proxy server: A proxy server has two purposes:
• To keep machines behind it anonymous (mainly for security)
• To speed up access to a resource (via caching). It is commonly used
to cache web pages from a web server
Firewall reasons : The proxy server is an additional layer of defence
and can protect against some OS and Web Server specific attacks.
However, it does not provide any protection to attacks against the web
application or service itself, which is generally considered the larger
threat.
A proxy server that passes requests and replies unmodified is usually
called a gateway or sometimes tunnelling proxy. So we will modify
this aspect in which the proxy server DOES manipulate or modify the
content that the user wants. That why it is better to call it as a
‘Content Proxy’ with customizable user content
1.This content proxy shall receive a request from the client (A client is
a user which sends a request for a webpage), then it forwards this
request on the behalf of the user to a thing called Scaper which
extracts the ‘DOM’ of a webpage by fetching a webpage from global
server.
11. 11
2.This fetched DOM is then sent to the content proxy to get
manipulated,the content proxy has its rules and configuration for
manipulating the webpage.It may provide a GUI to the user so as to
what manipulation and addition user wants,this gives the scope of this
application to diversify enormously, since there is no end to what sort
of customizations users wants to see in their webpage.
3 After the manipulations the webpage is then sent by the content
proxy to the user,as fully customized one,but specifically for a user in
its own session.
Now don’t get worried due to all those heavy and alien terms if you
happen to be unaware of them,read below,I shall explain them:
What is a Scraper:
A web scaper is a application or a software which extracts useful
information out of sites,at the back end and then it can form a totally
new Scraper site on which there is content gathered and compiled
onto it.Like those sites which are especially meant for advertising in
which there is no original content,you may call a search engine as a
Scraping site using bots for scraping the www for data.In our case we
use the scraper to extract and fetch the webpage from the www.
What is DOM:
A DOM typically elaborated as Document Object Model is the
description of how a webpage is stored displayed/rendered as an
HTML page. Objects under the DOM (also sometimes called
"Elements") may be specified and addressed according to the syntax
and rules of the programming language used to manipulate them.
That's one of our purpose in the entire flow, to manipulate the DOM,it
can be achieved easily by Javascript.
url Request.htm
The scraping
engine,it shall DOM process-
take care of all ing, manipula-
the parsing and
DOM tions, rules, Request*.htm (The
scraping to be ‘changed’ webpage as de-
Content Proxy
(Since it filters the request)
Amar Deep Gupta
caustic576@gmail.com
12. 12
Algorithms As A Technology
Think computer were infinitely fast and computer memory was
free. Would you have any reason to study algorithms? The answer is
yes. Of course computers may be fast, they are not infinitely fast.
And memory may be cheap, but it is not free. Computing time is
therefore a bounded resources and so is space in memory. These re-
sources should be used wisely, and algorithms that are efficient in
terms of time or space will help do so. Total system performance
depends on choosing efficient algorithms as much as on choosing
fast hardware. Just as rapid advances are being made in other com-
puter technologies, they are being made in algorithms as well.
Analyzing an algorithm has come to mean pre-
dicting the resources. Occasionally, resources such as memory, com-
munication bandwidth, or computer hardware are of primary con-
cern, but most often it is computational time that we want to meas-
ure.
The number of steps an algorithm requires to
solve a specific problem is denoted as the computational time or run-
ning time of the algorithm. The notion of a step refers to an underly-
ing machine model. The machine must be able to execute a single
step in constant time.
In general, the computational time depends on
the size of the problem and on the respective input.
Example: The computational time of a sorting al-
gorithm grows if the length of the input sequence grows. If the input
sequence is presorted, compared to an unsorted sequence possibly
less steps are sufficient.
In order to evaluate an algorithm independently
of the input, the notion of time complexity is introduced. The time
complexity T(n) is a function of the problem size n. The value of T(n)
is the running time of the algorithm in the worst case, i.e. the maxi-
mum number of steps it requires with an arbitrary input.
Sometimes the behavior on the average case is
considered, i.e. the mean number of steps required with a large num-
ber of random inputs.
Example: The sorting algorithm insertion sort
has a worst case time complexity of T(n) = n—(n-1)/2 comparison-
exchange steps to sort a sequence of n data elements.
Often, it is not necessary to know the exact value of T(n), but only an
upper bound can be estimated.
Ashok kumar
MCA B7(ER&DCI-IT)
14. 14
Timeline : 53 Years of Hard Drives
Over the past five decades, hard drives have come a long way. Travel
through time with us as we chronicle 50 milestones in hard-drive de-
velopment--from product firsts to new technologies, and everything in
between.
1956 : IBM ships the first hard drive in the RAMAC 305
system. The drive holds 5MB of data at $10,000 a mega-
byte. The system is as big as two refrigerators and
uses 50 24-inch platters.
1961: IBM invents heads for disk drives that "fly" on
a cushion of air or on "air bearings." The IBM 1301
Disk Storage Unit, with its larger capacity, flexibility
and speed, greatly expanded the operational capabil-
ity of the IBM 7000 series of computers (7070, 7094,
7080 and 7090).
1973: IBM announces the 3340, the first modern
"Winchester" hard drive, which has a sealed assembly,
lubricated spindles, and low-mass heads.
1979: IBM's 3370 use seven 14-inch platters to store
571MB, the first drive to use thin-film heads.
1979: Seagate introduces the ST-506 drive and interface,
which is then used in all early microcomputer imple-
mentation
1991 : IBM introduces the 0663 Corsair, the first disk
drive with thin film magneto resistive (MR) Heads. It
has eight 3.5-inch platters and stores 1GB. (The MR
head was first introduced on an IBM tape drive in
1984.)
1998: IBM announces its Micro drive, the smallest hard
drive to date. It fits 340MB on a single 1-inch platter.
15. 15
2006 : Seagate releases the Barracuda 7200.10,
at 750GB the largest hard drive to date.
2009: Hitachi Global Storage
Technologies announcement of a
1-terabyte hard disk drive. The
drive ships in the first quarter of
2007. The drive, called the Desk
star 7K1000.
2009 : Hitachi Global Storage Technologies Inc.
launches the world's first 2TB(Tera Byte), 7200
RPM hard disk drive, the Deskstar 7K2000.The
By the end of the 20th century, internal drives
became the system of choice for computers run-
ning Windows, while external hard drives re-
mained popular for much longer on the Apple
Macintosh and other professional workstations
which offered external SCSI ports. Apple made
such interfaces available by default from 1986
and 1998. The addition of USB and Firewire in-
terfaces to standard personal computers led
such drives to become commonplace in the PC
market as well.
Rakesh Kumar
(MCA B8 ER&DCI-IT)
Linux revolution
Visit
Infinitysoft.co.in
16. 16
Changing Career - Things to Remember
Doing the 'right job' has become
very important these days. As a re-
sult, people are observed making
mid-career moves every now and
then. It is no longer considered ta-
boo to shift jobs even if one may
have spent a decent amount of
time in a certain job. What is more
important for an individual is to en-
joy what he does rather than
spending an inordinate amount of
time in a job he does not like do-
ing?
As a result, changing career be-
comes imperative for a large num-
ber of people every year. In the
last few decades, it is true that the
choice of careers has expanded be-
yond imagination. One is no longer
left with just a few conven-
tional career choices of being a
doctor or a teacher or a banker. In-
up that offer the combination of good money as well as a satisfying
work profile. Before one embarks on a decision to change careers, it is
essential to consider some points.
1. Decide Which Career To Opt For: There are a whole lot of resources
available on the internet or in books that talk about the various career
choices in the job market. Before deciding on which career to opt for,
one should conduct adequate research about the new job. This would
be important to ensure that once one changes his/her career to a new
field, it doesn't come across as an unpleasant experience.
2. Tailoring the Resume: Once one decides on a new career avenue, it
is important to tailor the existing resume to match the skill sets that
the new career demands. One would also need to customize the cover-
ing letter with regard to the specific company one applies.
17. 17
3. Skill Enhancement: Although one's skills might be usable to a large
extent in the new career, there are times when changing careers re-
quires certain skills to be enhanced as well. One might, for example,
shift from sales to marketing which would require familiarity with mar-
keting concepts. In such cases, one should either sign up for a short
refresher course or take a brief sabbatical to get a specialized degree
from a college before getting employment.
4. Employing Patience: It is important to note that the path for chang-
ing careers is strewn with rocks and stones, so patience is a virtue that
needs to be adopted. It is easy to get frustrated when one fails to get a
positive response from potential employers. However, one should not
lose patience but keep on applying till one gets the job of his/her choice.
In addition to the things listed above that discuss what one "should"
do; there are a number of things to beware of. A random list of 'don'ts'
is:
- Do not confuse changing jobs with changing careers. Changing ca-
reers is a major decision and should be taken only after sufficient re-
search and thought has gone into it.
- Changing careers only for money is a bad idea. In most cases, people
fail to realize that there is a cost to pay for a higher compensation in
the form of more travel or longer working hours.
- Changing careers to a new one without making a realistic assessment
of one's skills and strengths might be disastrous.
Shailendra Kumar
shailendra.eie@gmail.com
18. 18
Desktop go to die…!
In this fast-changing technological world, sometimes
you are faced with some difficult choices. For instance,
your current computer has matured to the ripe old age
of six months and has been deemed obsolete. Now it's
time to purchase a new computer and the question is,
"Should I buy a laptop or a desktop?" so there laptop
has some advantage over desktop .
Mobility - Well, sure, it's the big one. If you need to work remotely, a
laptop is the way to go. Remember that a 3G card from your cell phone
provider can give you high-speed internet access in most urban areas.
Upgrades - Speaking of upgrades, it's more difficult to upgrade a lap-
top. In some cases, it's impossible: Sure, you can pop in a new hard
drive later, but adding a second hard drive means plugging in an exter-
nal disk that will be cumbersome to tote around with you.
Storage - One of the major places where lap-
tops and desktops differ is in how much hard
drive space they offer. Laptops use physically
smaller drives, which can only offer so much
storage space. Though larger drives are avail-
able, 100GB is still common on a laptop, while
500GB desktop drives are seen all the time
(again, bigger drives can be had). This is a
huge difference and it seems to be expanding,
not contracting. If you have very large storage
needs, desktop is your best bet.
Price - Expect to pay $300 to $500 more for a comparably equipped
laptop (though this varies widely).
Peripherals - Remember that when you're in the office, you can always
plug in an external mouse, keyboard, and monitor to your laptop.
19. 19
I obviously can't make the buying
decision for you, but I'll reiterate
my computer plan in case you
haven't seen it before. I use both:
a moderately-priced laptop is with
me on a daily basis, syncing up
with an inexpensive desktop that
works as a print and file server.
The desktop works as a machine
for my daily backups, has plenty of
storage for stuff I don't need to
take with me on the road (or to
other rooms of the house), has
two printers hooked up to it,
accepts incoming faxes, and
otherwise stands as a backup in
case something fails on my laptop.
My laptop, however, is where I do
most of my work.
Sure I could get by with just a notebook PC, but having both makes
things so much easier.
Shivendra Kumar
MCA B8 Er&Dci-IT
Infinitysoft.co.in
Every thing is different
20. 20
Nikesh Arora
President, Global Sales Operations and Business Development in Google
Nikesh Arora oversees all revenue and cus-
tomer operations, as well as marketing and
partnerships. Since joining Google in 2004,
he has held several positions with the
company. Most recently, he led Google's
global direct sales operations. He also
developed and managed the company's
operations in the European, Middle Eastern
and African markets and was responsible
for creating and expanding strategic
partnerships in those regions for the benefit
of Google's growing number of users and
advertisers. This will make him the
top-ranking (4th Position) Indian in Google.
With a background as an analyst, Nikesh's main areas of focus
have been consulting, IT, marketing and finance. Prior to joining
Google, he was chief marketing officer and a member of the man-
agement board at T-Mobile. While there he spearheaded all prod-
uct development, terminals, brand and marketing activities of T-
Mobile Europe. In 1999, he started working with Deutsche Tele-
kom and founded T-Motion PLC, a mobile multimedia subsidiary of
T-Mobile International. Prior to joining Deutsche Telekom, Nikesh
held management positions at Putnam Investments and Fidelity
Investments in Boston.
Nikesh holds a master's degree from Boston College and an MBA
from Northeastern University, both of which were awarded with
distinction. He also holds the CFA designation. In 1989, Nikesh
graduated from the Institute of Technology in Varanasi, India with
a bachelor's degree in electrical engineering.
Rajeev Ranjan
rranjan@cdactvm.in
21. 21
I remember whenever I've had to Interview for a position in the past
the bit I always looked least forward to was the stage where the
Interviewer asks me questions. The majority of which were easy to
answer as its very clear what information the Interviewer was look-
ing for, but there were always the odd tough Interview Questions
thrown in to throw me out. Those coupe of tough Interview questions
were always difficult to answer as it was never clear what informa-
tion the Interviewer was looking for.
I've since been working in recruitment for some time and have been
the Interviewer asking those tough Interview questions on many
occasions. Its clear that many candidates still don't know what I'm
looking to hear from them. So I thought I'd cover some of the tough
Interview Questions and ways to answer them.
Interview Questions: What are your weaknesses?
State a weakness but turn it into a positive: "At times I've been
considered too much of a perfectionist, I use to get irritated if I felt
someone else’s work on the project was below company standard,
I've since learnt that I can't affect other peoples work so channel my
energies into making my work as high a standard as possible"
Interview Questions: How have you managed to attend an Interview
in works time?
"I didn't want to deceive my current employers, so I asked them if I
could take an unpaid day of leave to attend to a personal matter"
22. 22
Interview Questions: How do you feel about carrying out repetitive or
mundane work?
"I appreciate every position has an element of repetitiveness but I
take all aspects of my job seriously whether they are repetitive or not
and always give 100%."
Interview Questions: How do you handle Criticism?
"At some point we all make mistakes, I'm always happy to take on
constructive criticism as this will help me perform better."
Interview Questions: How long would it be before you would expect to
be promoted?
"I couldn’t give a time scale, I would want to prove myself and
demonstrate my value to the company, I appreciate that promotion is
a reward, not a right"
Interview Questions: What sort of people do you find it difficult to
work with?
"I am a very amiable person and very team orientated, If I were to
find it difficult to work with someone, it would be someone whose
standards doesn't reach that of the team.
Answering Tough Interview Questions well, will set you apart from
other candidates Padmakar Mishra
applying for the same
position
padmakar.mishra2010@gmail.com
Wait for next issue
Infinitysoft.co.in
23. 23
VIRUS
Computer viruses are programs that have been pur-
posely designed to interfere with the regular operation
of a computer. Depending on its nature and capabilities,
a virus may cause minor or major interruption to the
smooth functioning of a computer. They may just slow
down your computer, or repeatedly cause meaningless
message to appear on your monitor, freeze your
computer or bring up cascading windows on your
screen, cause screen blinking, record data without a
commend from you, corrupt or delete data, revive deleted data, pick
up e-mail addresses from your address book and local files and start
sending e-mails on its own, and even damage vital system files.
Computer viruses can be several types:
Worms: worms are self-replicating computer programs, similar to
computer viruses. Worms can spread rapidly from one computer to
another when documents are exchanged.
A copy of the worm passes through the network to
another machine that has a specific security hole. it then copies itself
to the new machine, and then start replicating from there.
Trojan horses: Trojan horses are programs that claim to perform a
particular function but which in fact do something different. For
example, they could infect your computer with a virus your files.
Macro viruses: Macro viruses use commends called macros
embedded in other software to infect and spread to other files viewed
by that software. For example. Microsoft word and Excel have macros
viruses can spread by exploiting these commands.
Boot Sector Viruses: Boot sector viruses are an older type of virus
and are not so common today. They used to infect computers’ startup
programs, so that the virus would become active as soon as the
computer started up.
Backdoor Trojans: Backdoor Trojans are programs that allow other
computer users to remotely control your computer via a local area
network or the internet.
Ravindra Bohra
ravi_bohra80@yahoo.com
25. 25
Speeding up your hard drive to get faster file transfer by using 32-bit
transfers on your hard drive:
1. Just add the line to a boot up script.
hdparm -c3 /dev/hdX
2. If you use SuSE or other distros based on SYS V.
/sbin/init.d/boot.local
should work for you.
3 This enables 32-bit transfer on your hard drive. On some systems
it can improve
transfer performance by 75%.
To test your performance gain, type:
hdparm -t -T /dev/hdX
More DOS-like commands:
Many people are moving to Linux these days because windows
XP onwards OS needs very large scale amount of resources but they
are typing DOS commands on Linux that look fine but cause errors.
The command "cd.." in DOS is perfectly valid, but in Linux, the valid
command is “cd ..” (any parameter for that command must be sepa-
rated from the command by a space). The same goes for "cd/" and
"cd~". A quick fix is here.
1 Use your favorite text editor in your home directory to edit the file
".bashrc".
The period is there on purpose, this hides the file from normal ls
display.
2 Add the lines:
alias cd/="cd /"
alias cd~="cd ~"
alias cd..="cd .."
26. 26
3 And I usually add these...
alias md="mkdir"
alias rd="rmdir -i"
alias rm="rm -i"
Here “alias” is a powerful tool, and can be used in the .bashrc script
as well as from the command line. You can, if you want to spend the
time, create your own group of shell commands to suit how you
work. As long as you put them in your .bashrc file, they'll be there
every time you log in. Note that if you frequently log in as root, you
might want to copy /home/username/.bashrc to /root/.bashrc to
keep yourself same.
More swap with a swap file:
You installed a new Linux system, but forgot to set enough
swap space for your needs. Do you need to repartition and reinstall?
No, the swap utilities on Linux allow you to make a real file and use it
as swap space.
The trick is to make a file and then tell the swapon program to use it.
Here's how to create, for example, a 64 megs swap file on your root
partition (of course make sure you have at least 64 megs free):
dd if=/dev/zero of=/swapfile bs=1024 count=65536
This will make a 64 megs (about 67 millions bytes) file on your hard
drive. You now need to initialize it:
mkswap /swapfile 65536
sync
And you can then add it to your swap pool:
swapon /swapfile
With that you have 64 megs of swap added. Don't forget to add the
swapon command to your startup files so the command will be re-
peated at each reboot.
VINEET PRATAP
pratap.vineet@gmail.com
28. 28
The following error message can occur during the WinXP upgrade
process:
“An unexpected error (768) occurred at line 5118 in <drive let-
ter>xpclientbasebootsetupsetup .c Press any key to con-
tinue.”
When you press any key as instructed, the following error message
appears: “A problem has been detected and windows has been
shutdown to prevent damage to your computer. PROC-
ESS1_INITIALIZATION_FAILED”Huh? Again, the Microsoft Knowl-
edge Base comes to the rescue. The root cause triggering this er-
ror message is a software program (namely Roxio’s GoBack) that is
incompatible with WinXP. To resolve the problem, disable GoBack
when WinXP restarts by pressing the space bar at the GoBack boot
menu, pressing d to disable and pressing y to confirm. Once Go-
Back is disabled, cancel the WinXP setup process and uninstall Go-
Error Message: “Fatal System Error: 0x000000a0
(0x00000002,0x00070124, 0x00000000,0x00000000)”
Translation: If you happen to own a Microsoft Sidewinder Game Pad
Pro (not the joystick model), you may experience a unique problem.
If you just happen to be running WinXP (as opposed to any other
operating system) and you decide to unplug the USB (Universal Se-
rial Bus) cable while WinXP is starting up, you will see the fatal
system error and a blue screen, preventing you from accessing your
Desktop.
Solution: Microsoft is working on a fix for this error, but at press
time it is still unresolved. Fortunately, the workaround is rather
simple. Just make sure you don’t unplug
the Sidewinder cable when the system is Saket kumar
starting . saket.dhabbu@gmail.com
WHICH PATH IS SUITABLE FOR YOU
VISIT
Infinitysoft.co.in
29. 29
First Look software
Panda cloud antivirus
Panda has released a free
anti-Virus offering that resides
mostly off the host system and
in the cloud. Using 'Collective
Intelligence', along with
distributed computing and a
global and community-based
platform, Panda has said this
new offering is entirely
different from what it's created
in the past. So, has it
succeeded?
Starting off
Light Panda Cloud Antivirus protects you while you browse, play or
work and you won’t even notice it. It is extremely light as all the work
is done in the cloud.
Secure Panda Cloud Antivirus provides you with the fastest protec-
tion against the newest viruses thanks to its cloud-scanning from
PandaLabs’ servers
Easy Panda Cloud Antivirus is truly install and forget. Don’t worry
about updates, configuration or complicated decisions ever again.
Anurag Shankar
anuragshankar2005@gmail.com
31. 31
"If you have any questions, please
feel free to ask" or " We would be
happy to answer any questions you
have"
Send your query mails at:
ratnakar.erdci@gmail.com
infinitytechmagazine@gmail.com
infinitytechmagazine@rediffmail.com
infinitytechmagazine@yahoomail.com
Join our communities and group at:
http://groups.yahoo.com/group/
infinitytechmagazine
infinitytechmagazine@yahoogroups.com
http://www.orkut.co.in/Community.aspx?
cmm=49916804
Join these groups to receive the magazine
directly to your mail box.
infinitysoft.co.in