Search This Blog

Sunday, December 21, 2008

Indian Civil Service

The Indian Civil Service, popularly known by its acronym ICS, originated as the elite civil service of the Indian Government under British colonial rule in India, and continues in the contemporary Civil Services of India, though these are now organised differently.
Colonial Civil Service
Under the East India Company administrators of their controlled territories were engaged. These became the HEICS "Honourable East India Company Civil Servants"
There were two exclusive groups of civil servants during this formative stage of British rule in India. The higher employees who entered into "covenants" with the Company came to be known as "covenanted" servants, whereas those not signing such agreements came to be known as "uncovenanted" . The latter group generally filled the lower positions. This distinction between the covenanted and the uncovenanted virtually came to an end with the constitution of the Imperial Civil Service of India based on the recommendations of the Public Service Commission, 1886–87, though the phrase "covenanted" continued to be used of anyone in a salaried position with a long term contract — including "boxwallah" peddlers.
The name Imperial Civil Service was changed to Civil Service of India. However, the term Indian Civil Service (ICS) persisted. The acronym "ICS" continued to be used to denote the covenanted civil servants. The Provincial Civil Service was also constituted on the basis of the recommendations of the Aitchison Commission, and this Provincial Service consisted of two cadres, Provincial Civil Service and Subordinate Civil Service. Further developments took place as a result of the application of the scheme of cadre organization to the administrative departments. Thus, for example, the departments of Forest and Public Works had both the 'imperial, and 'provincial' branches. The basic pattern of the cadre system in the civil service was thus established following the recommendations of the Aitchison Commission. Gurusaday Dutt was the first Indian to stand first in the ICS examination, in 1905.
By 1934, the system of administration in India came gradually to consist of seven All India Services and five Central Departments, all under the control of the secretary of state, and three Central Departments under joint Provincial and Imperial control. The ICS and the Indian Police (Service) were in the 'transferred field', that is, the authority for the control of these services and for making appointments were transferred from the Secretary of State to the provincial governments. It seems relevant to mention that the All India and class I central services were designated as Central Superior Services as early as 1924 in the Lee Commission's report.
After the partition of India, the parts of the service was renamed Civil Service of Pakistan (CSP) in Pakistan while the Indian section retained the name Indian Civil Service.
Contemporary Indian Civil Service
In spite of relatively contemporary careers like management and IT holding sway over the country's youth, the Civil Services have still not lost the vast popularity enjoyed by them through the years, from the time of the British Raj.
The IAS or Indian Administrative Service replaced the ICS and the pre-independence structure of all-India services, provincial or state services and central or Union government services was retained.
The Constitution provides for more Civil Services branches to be set up by giving the power to the Rajya Sabha to resolve by a two-thirds majority to establish new all-India services or central services. The Indian Forest Service and the Indian Foreign Service are the two services set up under this constitutional provision.
Running the administration of a vast and diverse country like India requires efficient management of its natural, economic and human resources. That, precisely, is the responsibility of the civil services. The country is managed through a number of Central Government agencies in accordance with the policy directions given by the ministries.
The construction of the Civil Services follows a certain pattern. The All India Services, Central Services and State Services constitute the Civil Services.Today a number of coaching centers are providing civil service coaching,which concentrates mostly in Delhi and Trivandrum. Examinations for the state services are conducted by the individual states of India.
All India Services
  • Indian Administrative Service (IAS)
  • Indian Police Service (IPS)
  • Indian Forest Service (IFS)
Central Civil Services - Group "A"
  • Indian Revenue Service (IRS) - Income Tax
  • Indian Revenue Service (IRS) - Customs & Central Excise
  • Central Industrial Security Force (CISF)
  • Indian Audits & Accounts Service (IA&AS)
  • Indian Defence Accounts Service (IDAS)
  • Indian Defence Estate Service (IDES)
  • Indian Economic Service(IES)
  • Indian Ordnance Factory Services (IOFS)
  • Indian Post & Telecommunication Accounts and Finance Service (IP&TAFS)
  • Indian Railway Accounts Service (IRAS)
  • Indian Railway Traffic Service (IRTS)
  • Indian Information Service (IIS)
  • Indian Railway Personnel Service (IRPS)
  • Railways Protection Force (RPF)
Central Civil Services - Group "B"
  • Central Secretariat Service
  • Defence Secretariat Service
  • Union Territories Administrative Service
  • Union Territorries Police Service
State Services
  • State Civil/Administrativ e Service
  • State Police Service
  • State Forest Service
  • Public Works Department

Friday, December 19, 2008

Frameworks Distribution

Frameworks Distribution


op Providers
PHP 30.3%
ASP.NET 23.9%
Shockwave Flash 22.8%
Adobe Dreamweaver 7.4%
J2EE 7.2%
Other 5.2%
Frontpage Extensions 5.1%
ASP.NET Ajax 2.9%
DAV 2.8%
Perl 2.2%

Blog and CMS Distribution

Blogs Distribution


Top Providers
WordPress 1.8%
MovableType 0.2%
Blogger 0%
TypePad 0%
Vox 0%
MySpace 0%
Other 0%


CMS Distribution


Top Providers
vBulletin 0.9%
Drupal 0.7%
Expression Engine 0.3%
MediaWiki 0.2%
Joomla! 0.2%
DotNetNuke 0.1%
Other 0.1%
Paperthin Common Spot 0.1%
Community Server 0%
Plone 0%


Advertising
Advertising Distribution
Top Providers
Other 16%
Google Adsense 13.9%
DoubleClick.Net 12.8%
Atlas 4.4%
Revenue Science 2.6%
Open AdStream 2.4%
Advertising.com 2.3%
Tacoda 2.2%
Openads/OpenX 2.1%
Vibrant Advertising 1.5%
Analytics Distribution
Top Providers
Google Analytics 49.7%
Quantcast Tracking 13.5%
Omniture SiteCatalyst 12.8%
Other 8.7%
Visual Sciences 2.8%
Web Trends 1.8%
SSL Google Analytics 1.8%
Coremetrics 1.7%
StatCounter 1.7%
Nielsen//NetRatings 1.5%

Top Web Servers Provider

Server Distribution


Apache 57.1%
IIS 6.0 23.5%
*nix 17.2%
Red Hat Enterprise Linux 6.7%
CentOS 3.9%
Other 2.7%
nginx 2.3%
Fedora 1.8%
Debian 1.7%
lighttpd 1.5%

Tuesday, December 9, 2008

The Ancient World

Before Writing

Billions of Years -- a scientific theory

Dinosaurs, Birds, and Survival -- 245 to 65 million years ago

Genes, Ageing and Evolution -- a theory natural selection and the lifespan of creatures

Biology, the Brain and History -- history versus biological determinism

Hunters, Gatherers, Farmers and Gods -- to 4001 BCE

Origins of War -- tribal raiding to empire

The Middle East and Africa

The Sumerians -- religious continuity, writing, conquest, a concept of sin and paradise

Africa and Egypt to 1750 BCE -- from south of the Sahara to civilization on the Nile

Sargon and the Vanishing Sumerians -- Mesopotamia, sin and the Amorites

Myths of Creation and a Great Flood -- literature surviving the Sumerians

Hammurabi : Babylon -- Hammurabi's conquests, dynasty and its fall to 1550

The Middle East to 1050 BCE -- Hyksos, Egyptians, Hittites, Hurrians and Aramaeans

From Abraham to David -- stories of Abraham, Moses and King David

Solomon, Prophets and Punishment to 640 BCE -- Israel to the "lost tribes" and the Assyrian Empire

Zoroastrians and Judaism to 400 BCE -- a Jewish state within the Persian Empire

Civilization in India

Ancient India and Hinduism to 1000 BCE -- lost civilization, invasion, conquest and caste

The Upanishads and India to 500 BCE -- new cities and attitudes

Jains and Buddhists to 450 BCE -- rebellion against Hinduism

Hindu Epic Literature -- the Ramayana and Mahabharata

The Maurya Empire and a Dark Age -- 320 BCE to 185 CE

The Gupta Empire and Hinduism -- to 550 CE

The Far East

The Shang and Zhou Dynasties -- to 1000 BCE on the North China plain

Confucius, Taoists and Change, to 260 BCE -- argument and war

The Qin and Han Dynasties -- 350 BCE to 306 CE

China and Korea, 300 to 500 CE -- Taoism, Buddhism, Confucianism, disintegration and rule by murder

The Ancient Japanese -- 300 BCE to 500 CE

Greeks, Alexander, Hellenism and Jews

Europe before 1000 BCE -- agriculture, the Mycenae Greeks, Minoans and a dark age

The Greeks to 480 BCE -- Homer, class rule and the birth of philosophy

Ancient Greeks, Democracy and Decline -- to the 300s BCE

Ideas from Anaxagoras to Aristotle -- 480 to 322 BCE

Alexander the Great -- 356 to 323 BCE

Alexander's Empire Disintegrates -- to 246 BCE

Hellenistic Societies to 222 BCE -- trade, diffusions, prosperity and misery

Cynics, Epicureans, Stoics and Skeptics -- 400 to 200 BCE

Jews, the Septuagint and Tradition -- to 200 BCE

Rome, Jews and Christians

The Rise of Rome -- 753 to 221 BCE

Roman Empire, Republic and Politics by Violence -- to 79 BCE

Judea and Civil War -- 150 to 63 BCE

From Republic to Emperor Augustus -- 73 BCE to 14 CE

Jews and Christians in Rome's Golden Age --- the Essenes, Jesus, and Christianity organizes

Family Rule from Tiberius to Nero -- 14 to 65 CE

Rome, from Golden Age to Political Chaos -- from prosperity to decay under the Severans

Rome's Decline and Christianity's Ascent -- to 306 CE

Rome's Christian Emperors -- to 410 CE

Augustine Influences Christianity -- to 420 CE

Remnants of the Roman Empire to 500 CE -- Rome disintegrates

Persia under the Sassanids

Ardashir and the Persians, to 241 CE -- Persian culture and the Sassanid Empire begins

Manichaeism, a Universalist Faith -- 210 to 276 CE, the Zoroastrian priesthood against religious innovation

The Sassanids to 500 CE -- Shapur the Great, war, weakness, communist revolution, and defeat

Africa, Oceania and America

The Americas to 1000 BCE -- and benefits prior to agriculture

Southeast Asia and Oceania to 1000 BCE -- migrations

Africa, Iron and Empire to 500 CE -- aggressions, migrations, iron and empire

The Americas, Southeast Asia and Oceania to 500 CE -- migrations, order, disorder and demise

Utilizing search engines - Google

Know how to get relevant information from web

Lets get right into it.

We will use Google .


Directories.
if you know what to find exactly , in which category , go straight to directory.google. com

Google's Advance Search.
  • xxxx" / will look for the exact phrase. (case in-sensitive)
  • -x / will search for something excluding a certain term
  • filetype:xxx / searches for a particular file extention (exe, mp3, etc)
  • -filetype:xxx / excludes a particular file extention
  • allinurl:x / term in the url
  • allintext:x / terms in the text of the page
  • allintitle:x / terms in the html title of that page
  • allinanchor: x / terms in the links
  • use OR, ~X, Or anything which you can think of.
  • use $10..$30 , these 2 period will act as a numeric range, this will work with rate, weight, size, anything that has any numeric attribute.
  • Use Wild cards (Use when want to filter existing results)

NOW THE REAL STUFF
:
Want free music? Free games? Free software? Free movies? God bless FTP! Try this search:


intitle:"Index of music" "rolling stones" mp3
Assuming SOMEONE made an FTP and uploaded it, you'll find it. look how you can search FTP / directory browsing only sites.
  • ntitle:"Index of music" "kandisa" mp3
  • intitle:"Index of música" "kandisa" mp3
  • intitle:"Index of musica" "kandisa" mp3
  • intitle:"Index of music" "kandisa" *
To generalize the search use
intitle:"index of *" "kandisa" mp3 <-- BANG! (and thats without searching for spelling errors) Also try inurl:ftp
Same way, search for ebooks, games, movies, SW, anything that may be on an FTP site.
how did I find all these... thanks to Google : intitle:"index of" "google hacks" ebook

Wednesday, November 26, 2008

20 Best Websites To Download Free EBooks

I understand that reading is the most simplest way for human to derive and constructing meaning in order to gain a particular knowledge from a source. This tendency has been digitized when books evolve into digital media equivalent – E-Books.
It would be nice if we’re able to download free e-book and take it with us. That’s why we’ve again crawled deep into the Internet to compile this list of 20 places to download free e-books for your use. Full list after jump.
  1. FreeBookSpot

    FreeBookSpot is an online source of free ebooks download with 4485 FREE E-BOOKS in 96 categories which up to 71,97 GB.
    You can search and download free books in categories like scientific, engineering, programming, fiction and many other books. No registration is required to download free e-books.
  2. 4eBooks

    4eBooks has a huge collection of computer programming ebooks. Each downloadable ebook has a short review with a description. You can find over thousand of free ebooks in every computer programming field like .Net, Actionscript, Ajax, Apache and etc.
  3. Free-eBooks

    Free-eBooks is an online source for free ebook downloads, ebook resources and ebook authors. Besides free ebooks, you also download free magazines or submit your own ebook.
    You need to become a Free-EBooks.Net member to access their library. Registration is free.
  4. ManyBooks

    ManyBooks provides free ebooks for your PDA, iPod or eBook Reader. You can randomly browse for a ebook through the most popular titles, recommendations or recent reviews for visitors. There are 21,282 eBooks available here and they’re all free!
  5. GetFreeEBooks

    GetFreeEBooks is a free ebooks site where you can download free books totally free. All the ebooks within the site are legal downloadable free ebooks.
  6. FreeComputerBooks

    FreeComputerBooks consists of a huge collection of free online Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials. It is very well categorized by topics, with 12 top level categories, and over 150 sub-categories.
  7. FreeTechBooks

    FreeTechBooks lists free online computer science, engineering and programming books, textbooks and lecture notes, all of which are legally and freely available over the Internet. Throughout FreeTechBooks, other terms are used to refer to a book, such as ebook, text, document, monogram or notes.
  8. Scribd

    Scribd, the online document sharing site which supports Word, Excel, PowerPoint, PDF and other popular formats. You can download a document or embed it in your blog or web page.
  9. Globusz

    Globusz is a unique ePublishing house, specializing in free eBook downloads. They also provide an excellent Star Rating Showcase for new and evolving authors.
  10. KnowFree

    KnowFree is a web portal where users are able to exchange freely e-books, video training and other materials for educational purposes and self-practice.
  11. OnlineFreeEBooks

    OnlineFreeEBooks provides links to various ebooks (mostly in pdf) spanning in 9 big categories which are: Automotive Ebooks, Business Ebooks, Engineering Ebooks, Gadget Ebooks, Hardware Ebooks, Health & Medical Ebooks, Hobbies Ebooks, Programming & Technology Ebooks, Sport & Martial Art Ebooks.
  12. MemoWare

    MemoWare has a unique collection of thousands of documents (databases, literature, maps, technical references, lists, etc.) specially formatted to be easily added to your PalmOS device, Pocket PC, Windows CE, EPOC, Symbian or other handheld device.
  13. BluePortal

  14. OnlineComputerBooks

    OnlineComputerBooks contains details about free computer books, free ebooks, free online books and sample chapters related to Information Technology, Computer Science, Internet, Business, Marketing, Maths, Physics and Science which are provided by publishers or authors.
  15. SnipFiles

    SnipFiles offers you free ebooks and software legally by brought or attained PLR, resale or master rights to all the products on their page.
  16. BookYards

    BookYards is a web portal in which books, education materials, information, and content will be freely to anyone who has an internet connection.
  17. The Online Books Page

    The Online Books Page is a Listing over 30,000 free books on the Web.
  18. AskSam Ebooks

    AskSam Ebooks has a collection of free e-books like Shakespeare, and assorted legal & governmental texts.
  19. Baen Free Library


    Baen Free Library is an online library of downloadable science fiction novels.
  20. eBookLobby

    Free ebooks in eBookLobby are divided into different categories. Categorys range from business, art, computing and education. Select the category appropriate to the e-book you’re looking for.
More Free eBook resources
  1. PlanetPDF - A small collection of classic novels all in PDF format.
  2. DailyLit - Read books online by daily email and RSS feed.
  3. Wikibooks - Wikibooks is a Wikimedia community for creating a free library of educational textbooks that anyone can edit.
  4. Dwalin - Free novels in text format.
  5. Project Gutenberg - Free ebooks from producers.
  6. Adobe Free eBooks - In Adobe’s Free eBooks area, you can download, unlock, and read electronic books on your personal computer or reading device.
  7. Alive & Free - A page of links to some recent books from living authors available free online.
  8. Franklin - Thousands of free titles in text and HTML file formats.
  9. Read Easily - An ebook online library which has been designed to provide you an adaptive reading experience!
  10. PDFbooks - This new site offers around 4,700 downloadable public domain e-books.
  11. Witguides - An online source for a wide range of useful e-books that are completely free with no need to sign-up or buy anything.
  12. Diesel eBooks -Offer free ebooks formatted for both Microsoft Reader and Mobipocket.
  13. Free eBook Miners -
    Free eBooks for your education, research or amusement.
  14. Planet eBook -
    Free classic literature to download and share.
  15. e-Library - Plenty of free ebooks available for download.

Thursday, November 6, 2008

How To Stop A Hangover Headache?

Many people are of the view that such pills can avoid the problem of the hangover but it is not true as these pills upset the digestive system and causes hangover problem in the next day. There is foods list that you need to take if you want to save yourself from the problem of the hangover before it happens. You need to take one banana; one can of V-8, 8 strawberries, two tablespoons of honey, 1 cup orange juice, 1 table spoon salt and a small amount of nutmeg. You blend all these things in a grinder and drink it before consuming alcohol. This shake is like magic and helps you to avoid the problem of a hangover.

Thursday, October 16, 2008

All you need to prepare for an Interview @ Microsoft

Click here for Microsoft Interview Questions Guide Website.

This web-site is organized into the following sections:

  • Microsoft Interview Process
  • HR Questions
  • Technical Questions
  • Puzzles/Riddles
  • Resume Tips and Template
  • Discuss
  • Question to Interviewer
  • Interview Tips

Microsoft releases Visual Studio plug-in to detect XSS in .NET code

XSSDetect is a static code analysis tool that helps identify Cross-Site Scripting security flaws found within Web applications. It is able to scan compiled managed assemblies (C#, Visual Basic .NET, J#) and analyze dataflow paths from sources of user-controlled input to vulnerable outputs. It also detects whether proper encoding or filtering has been applied to the data and will ignore such "sanitized" paths.

Difference between focusing on problems and focusing on solutions

Case 1 :
When NASA began the launch of astronauts into space, they found out that the pens wouldn't work at zero gravity (ink won't flow down to the writing surface). To solve this problem, it took them one decade and $12 million. They developed a pen that worked at zero gravity, upside down, underwater, in practically any surface including crystal and in a temperature range from below freezing to over 300 degrees C. And what did the Russians do...?? They used a pencil.

Case 2 :
One of the most memorable case studies on Japanese management was the case of the empty soapbox, which happened in one of Japan's biggest cosmetics companies. The company received a complaint that a consumer had bought a soapbox that was empty. Immediately the authorities isolated the problem to the assembly line, which transported all the packaged boxes of soap to the delivery department. For some reason, one soapbox went through the assembly line empty. Management asked its engineers to solve the problem. Post-haste, the engineers worked hard to devise an X-ray machine with high-resolution monitors manned by two people to watch all the soapboxes that passed through the line to make sure they were not empty. No doubt, they worked hard and they worked fast but they spent a whoopee amount to do so.

But when a rank-and-file employee in a small company was posed with the same problem, he did not get into complications of X-rays, etc., but instead came out with another solution. He bought a strong industrial electric fan and pointed it at the assembly line. He switched the fan on, and as each soapbox passed the fan, it simply blew the empty boxes out of the line.

The above 2 cases might be good examples for Root Cause Analysis(Find & remediate the root cause instead of addressing the symptoms)

Integrated Application Security into Software Development Life Cycle

With today, I had completed integrating security in standard SDLC to prevent security bugs from appearing in released applications. SEI CMMI Version 1.1, Maturity Level 5 Process has been updated with security tests/tools/guidelines/templates to ensure application security is adequately covered and controls are effective throughout the development process. Following is the breif summary outlined here.

SDLC Process Requirements & Engineering Management Architecture & Design * Coding & Unit Testing Integration & Testing
Entry Criteria Business Requirements Security requirements Threat model White Box test results
Constraints & assumptions High Level Architecture/Design Document
Use cases
High Level/Low Level Architecture, Design Documents
Activities Determine application risk rank Create threat model Security development/coding guidelines/best practices Automated Application Assessment
Identify key compliance objectives Review/modify security requirements White Box Review & Host review Manual/Automated penetration testing
Define secure integration with external systems Architecture & Design Review Static code analyzer
Deliverables Security test strategy Threat model
Security integrated into the development process Security requirements in all defined components White Box Review Report & Sign off Black Box Review Report & Sign Off
Predictive Risk Ranking Architecture & Design Review Report
Tools Security consultant Threat Model Tool Static Code Analyzer Automated security tool
Security Requirements Review Checklist Architecture & Design Review Checklist Security Development Guidelines
Exit Test strategy approved No Sev 1 & Sev 2 issues exists No Sev 1 & Sev 2 issues exists No Sev 1 & Sev 2 issues exists
Responsibility Project Team & Security Team Project Team & Security Team Project Team & Security Team Project Team & Security Team

Wednesday, October 15, 2008

Cross-site scripting

Introduction

Websites today are more complex than ever, containing a lot of dynamic content making the experience for the user more enjoyable. Dynamic content is achieved through the use of web applications which can deliver different output to a user depending on their settings and needs. Dynamic websites suffer from a threat that static websites don't, called "Cross Site Scripting" (or XSS dubbed by other security professionals). Currently small informational tidbits about Cross Site Scripting holes exist but none really explain them to an average person or administrator. This FAQ was written to provide a better understanding of this emerging threat, and to give guidance on detection and prevention.


"What is Cross Site Scripting?"

Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this link from another website, instant message, or simply just reading a web board or email message. Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods) so the request is less suspicious looking to the user when clicked on. After the data is collected by the web application, it creates an output page for the user containing the malicious data that was originally sent to it, but in a manner to make it appear as valid content from the website. Many popular guestbook and forum programs allow users to submit posts with html and javascript embedded in them. If for example I was logged in as "john" and read a message by "joe" that contained malicious javascript in it, then it may be possible for "joe" to hijack my session just by reading his bulletin board post. Further details on how attacks like this are accomplished via "cookie theft" are explained in detail below.


Introduction

Websites today are more complex than ever, containing a lot of dynamic content making the experience for the user more enjoyable. Dynamic content is achieved through the use of web applications which can deliver different output to a user depending on their settings and needs. Dynamic websites suffer from a threat that static websites don't, called "Cross Site Scripting" (or XSS dubbed by other security professionals). Currently small informational tidbits about Cross Site Scripting holes exist but none really explain them to an average person or administrator. This FAQ was written to provide a better understanding of this emerging threat, and to give guidance on detection and prevention.


"What is Cross Site Scripting?"

Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this link from another website, instant message, or simply just reading a web board or email message. Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods) so the request is less suspicious looking to the user when clicked on. After the data is collected by the web application, it creates an output page for the user containing the malicious data that was originally sent to it, but in a manner to make it appear as valid content from the website. Many popular guestbook and forum programs allow users to submit posts with html and javascript embedded in them. If for example I was logged in as "john" and read a message by "joe" that contained malicious javascript in it, then it may be possible for "joe" to hijack my session just by reading his bulletin board post. Further details on how attacks like this are accomplished via "cookie theft" are explained in detail below.


"What does XSS and CSS mean?"

Often people refer to Cross Site Scripting as CSS. There has been a lot of confusion with Cascading Style Sheets (CSS) and cross site scripting. Some security people refer to Cross Site Scripting as XSS. If you hear someone say "I found a XSS hole", they are talking about Cross Site Scripting for certain.

Often people refer to Cross Site Scripting as CSS. There has been a lot of confusion with Cascading Style Sheets (CSS) and cross site scripting. Some security people refer to Cross Site Scripting as XSS. If you hear someone say "I found a XSS hole", they are talking about Cross Site Scripting for certain.

Internet bots

Internet bots, also known as web robots, WWW robots or simply bots, are software applications that run automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. The largest use of bots is in web spidering, in which an automated script fetches, analyses and files information from web servers at many times the speed of a human. Each server can have a file called robots.txt, containing rules for the spidering of that server that the bot is supposed to obey.

In addition to their uses outlined above, bots may also be implemented where a response speed faster than that of humans is required (e.g., gaming bots and auction-site robots) or less commonly in situations where the emulation of human activity is required, for example chat bots.

Bots are also being used as organization and content access applications for media delivery. Webot.com is one recent example of utilizing bots to deliver personal media across the web from multiple sources. In this case the bots track content updates on host computers and deliver live streaming access to a browser based logged in user.

These chatterbots may allow people to ask questions in plain English and then formulate a proper response. These bots can often handle many tasks, including reporting weather, zip-code information, sports scores, converting currency or other units, etc. Others are used for entertainment, such as SmarterChild on AOL Instant Messenger and MSN Messenger and Jabberwacky on Yahoo! Messenger. Another popular AIM bot is FriendBot

An additional role of IRC bots may be to lurk in the background of a conversation channel, commenting on certain phrases uttered by the participants (based on pattern matching). This is sometimes used as a help service for new users, or for censorship of profanity.

AOL Instant Messenger has now introduced a feature that allows you to make a screen name into a bot. This new feature removes the rate limit on the screen name, however it is now limited in the amount of instant messages that can be sent and received.

Tuesday, October 7, 2008

between http:// and https:/

The main difference between http:// and https:// is It's all about keeping you secure

HTTP stands for HyperText Transport Protocol, which is just a fancy way of saying it's a protocol (a language, in a manner of speaking) for information to be passed back and forth between web servers and clients.

The important thing is the letter S which makes the difference between HTTP and HTTPS.

The S (big surprise) stands for "Secure".

If you visit a website or webpage, and look at the address in the web browser, it will likely begin with the following: http://.

This means that the website is talking to your browser using the regular 'unsecure' language. In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the website. If you fill out a form on the website, someone might see the information you send to that site.

This is why you never ever enter your credit card number in an http website!

But if the web address begins with https://, that basically means your computer is talking to the website in a secure code that no one can eavesdrop on.

You understand why this is so important, right?

If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https://.

If it doesn't, there's no way you're going to enter sensitive information like a credit card number!

Backup your computer

It’s an essential task for any computer user, but it’s also pretty intimidating for most. Here’s a simple guide to backing up the data on your computer
There are many reasons why you should back up your computer—possibiliti es of hard disk corruption or crash due to malicious programs or technical faults, accidents such as fires or thefts, and so on. However, for most users, a ‘backup’ is either inessential or too technical. It needn’t be either of these; here are guidelines you could follow to make backing up a routine task.

What to back up
You should back up data that cannot be replaced easily, balancing this with the need to keep backup sizes within reasonable control. If you have hundreds of gigabytes of music, it may not be possible to back up all of it within reasonable costs.

You could decide to back up your work-related files, Internet downloads that you’ve paid for, photographs, music that you’ve purchased from the Internet, any financial records, your Outlook Address Book and so on.

Once you decide what you would like to backup, you can estimate the amount of storage space you would need for this. The estimate should also include the possibility of data growth in future. The amount of storage space you need will help you decide where you would create your backups.

Where to back up
A backup should ideally be created on a separate hard disk or at least a separate hard-disk partition. You could also take backups on Zip drives, CDs or DVDs, or even USB pen drives. Remember that taking backups is a regular task, so you need adequate space for them. If you decide to backup to removable media like CDs or DVDs, remember to buy RW disks, so that you can update your backups by erasing the older ones and burning the new ones.

Another way of taking backups is to do it online. Here, you connect to a website, such as Xdrive, which gives you a backup utility that creates your backup, compresses it, encrypts it, and then transfers it to a third-party location. You can connect to this location to view or update your backups, when your system information or data changes. Online backups have the advantage that your data is stored in two separate locations—your PC and a remote location.

CD-RWs and DVD-RWs are relatively inexpensive. Moreover, a CD-RW can store up to 700 MB of data, while a DVD-RW can store a few GB. However, you need to check that your PC comes with the appropriate drive for the media you want to use. Otherwise, you’ll need to invest in the drive as well. Most USB drives can hold up to 2 GB of data and are not too expensive, but due to their small size, are easy to misplace. Zip drives and disks are relatively expensive, but usually come with backup software that helps in taking backups.

How to back up
There are many ways of taking backups. Windows XP and Vista come with backup utilities. In Windows XP, this is available under Start > All Programs > Accessories > System Tools. In Windows Vista, go to Start > Control Panel > System and Maintenance > Back up your computer.

If you don’t have the backup utility in Windows, you can install it from the CD. Apart from the Windows utilities, you can also use any of the numerous free backup utilities that are available online. Only remember to download these from trusted sites, such as download.com.

Backup utilities take you through the process of backing up—choosing what to back up, where to back up, creating the backup, usually with compression so that more data can be stored. You can also create a backup schedule with the utility.

If the data you want to backup is not too large in size, you can create manual backups. Go to the folder that you want to backup, copy it and paste it to the location or disc where you want to create the backup.

You can also create an image of your hard disk by using utilities meant for this, so that your system can be restored to its current state in case of a crash. Several free utilities are available for this as well.

You’ll need to backup regularly, especially those parts of your essential data that change frequently. You can do this manually if the data isn’t too large or use the backup utility all over again.

CPU inside the Keyboard

CPU inside the Keyboard
mic in a keayboard


inside pc


Westerner V/S Asian ::: comparision

Blue --> Westerner

Red -->
Asian

Opinion

http://www.nilandnilu.uni.cc/

B:
Talk to the point
R:
Talk around the circle, especially if different opinions

Way of Life

http://www.nilandnilu.uni.cc/

B:
individualism, think of himself or herself.

R:
enjoy gathering with family and friends, solving their problems, and know each other's business (keh poh).

Punctuality

http://www.nilandnilu.uni.cc/

B: on time.

R: in time.


Contacts

http://www.nilandnilu.uni.cc/

B:
Contact to related person only

R:
Contact everyone everywhere, business very successful.

Anger

Error! Filename not specified.

B:
Show that I am angry.

R:
I am angry, but still smiling... (beware!)

Queue when Waiting

http://www.nilandnilu.uni.cc/

B:
Queuing in an orderly manner

R:
Queuing?! What's that?

Sundays on the Road

http://www.nilandnilu.uni.cc/

B:
Enjoy weekend relaxing peacefully.

R:
Enjoy weekend in crowded places, like going to the mall.

Party

http://www.nilandnilu.uni.cc/

B:
Only gather with their own group.

R:
All focus on the one activity that is hosted by the CEO .

In the restaurant

http://www.nilandnilu.uni.cc/

B:
Talk softly and gently in the restaurant.

R:
Talk and laugh loudly like their own the restaurant .

Travelling

http://www.nilandnilu.uni.cc/

B:
Love sightseeing and enjoy the scenery.

R:
Taking picture is the most important, scenery is just for the background.

Handling of Problems

Error! Filename not specified.


B:
Take any steps to solve the problems.


R:
Try to avoid conflicts, and if can, don't leave any trail.


Three meals a day

http://www.nilandnilu.uni.cc/

B:
Good meal for once a day is sufficed.

R:
At least 3 good meals a day.

Transportation

http://www.nilandnilu.uni.cc/

B:
Before drove cars, now cycling for environmental protection.

R:
Before no money and rode a bike, now got money and drive a car .

Elderly in day to day life

http://www.nilandnilu.uni.cc/

B:
When old, there is snoopy for companionship.

R:
When old, guarantee will not be lonely, as long as willing to baby-sit the grandkids.

Moods and Weather

http://www.nilandnilu.uni.cc/

B:
The logic is, rain is pain.

R:
The more the rain, more prosperity .

The Boss

http://www.nilandnilu.uni.cc/

B:
The boss is part of the team.

R:
The boss is a Fierce god.

What's Trendy

http://www.nilandnilu.uni.cc/

B:
Healthy Asian cuisine
R:
Expensive Western cuisine.

The Child

http://www.nilandnilu.uni.cc/

B:
The kid is going to be independent and make his/her own living.

R:
Work, live and all for the kids, the centre of life.