This Presentation explains the concept of Data Structure Types in Data Structure
Saturday, August 3, 2013
Data Structure - Need of Data Structure
This Presentation explains the concept of Need of Data Structure
Thursday, August 1, 2013
Essential Networking Notes -- Set-1
- Topic 1- OSI Model - PDF Format
- Topic 2 - TCP IP - PDF Format
- Topic 3 - osi vs tcp - PDF Format
- Topic 4 - Transmission - PDF Format
- Topic 5 -PSTN & Multiplexing - PDF Format
- Topic 6 - Switching - PDF Format
- Topic 7 - Transmission Media (Guided) - PDF Format
- Topic 8 - Transmission Media (Unguided) - PDF Format
- Topic 9 - Error Detection - PDF Format
- Topic 10 - Error Correction - PDF Format
- Topic 11 - Framing - PDF Format
- Topic 12 - Flow Control Protocols - PDF Format
- Topic 13 - Channel Allocation ALOHA & CSMA - PDF Format
- Topic 14 - Collision Free & Wireless Protocols - PDF Format
- Topic 15 - IEEE 802.3 - PDF Format
- Topic 16 - IEEE 802.4 - PDF Format
- Topic 17- IEEE 802.5 - PDF Format
- Topic 18 - ISDN - PDF Format
Windows 8 and Security Updates
Like earlier versions of the operating system, Windows 8 can check to see if software updates for your computer are available from Microsoft — and then install them for you so you don't have to remember to do it yourself.
Security updates and other software patches deemed important or critical are typically installed automatically when Microsoft pushes them out. (The company often releases the updates on the second Tuesday of each month, but it can happen as needed).
But even if you have the automatic updates option turned on, not all the software Microsoft sends you will install itself. Certain types of updates, including fresh versions of programs that have new user agreements or terms of service statements, require your attention because you are asked to read the legal fine print — or at least click the Agree button — before you can install the software.
Click here to read complete article
Security updates and other software patches deemed important or critical are typically installed automatically when Microsoft pushes them out. (The company often releases the updates on the second Tuesday of each month, but it can happen as needed).
But even if you have the automatic updates option turned on, not all the software Microsoft sends you will install itself. Certain types of updates, including fresh versions of programs that have new user agreements or terms of service statements, require your attention because you are asked to read the legal fine print — or at least click the Agree button — before you can install the software.
Click here to read complete article
New Zealand PM's website Hacked
WELLINGTON: The hacktivist group Anonymous on Tuesday briefly crashed New Zealand Prime Minister John Key's website in protest at plans to allow the country's intelligence agency to spy on local residents.
A group identifying itself as Anonymous NZ posted a clip on YouTube saying it had attacked Key's website www.johnkey.co.nz and 12 others linked to the ruling National Party to show its opposition to "a despicable piece of legislation."
"John Key make no mistake the majority of New Zealanders oppose this bill," it said.
"Due to your own arrogance and your unwillingness to listen to the people we have decided to take direct action."
Key's website was operating normally by Tuesday afternoon and the prime minister condemned the hackers.
"(It's) pretty juvenile behaviour in my view," he told Radio New Zealand. "These people are obviously doing something that's both illegal and inappropriate. They're trying to make their own political point, but their point's wrong."
New Zealand's intelligence service, the Government Communications Security Bureau (GCSB), is currently barred from spying on New Zealand citizens or residents.
Key argues the restriction should be removed so it can cooperate more closely with agencies such as the police and military in an increasingly complex cybersecurity environment.
The bill is currently before parliament and expected to pass by a single vote, although groups ranging from the Law Society to internet giants Facebook and Google have raised concerns about the proposal.
Click here to read complete article
Indian develops technology to make software unhackable
WASHINGTON: A unique system has been designed by researchers that will encrypt software in order to make it impervious to reverse-engineering.
UCLA computer science professor Amit Sahaiand a team of researchers have developed a system which will only allow someone to use a programme as intended, while preventing any deciphering of the code behind it.
This is known as software obfuscation in computer science and it is the first time it has been accomplished.
Sahai said that the new system puts up an iron wall making it impossible for an adversary to reverse-engineer the software without solving mathematical problems that take hundreds of years to work out on today's computers.
Click here to read original ARTICLE
Subscribe to:
Posts (Atom)
BP Profile as Homepage version 1.1 - updated for Wordpress 4.1 and Buddypress 2.1.1
After pointing out by John Clause, I have just updated the plugin for Wordpress 4.1 and Buddypress 2.1.1. Now enjoy the facebook function...
-
With all the texting that people do these days, it’s naturally taken a messaging app to re-introduce the act of using our voices to commun...
-
One of the more powerful, and probably least used, set of keyboard shortcuts involves the Windows Logo key, which is common on most keyboar...
-
After pointing out by John Clause, I have just updated the plugin for Wordpress 4.1 and Buddypress 2.1.1. Now enjoy the facebook function...