Lion.Dr.K.S.Rangasamy, MJF Founder & President

The economic downturn woes have settled down. Good signs are visible and the IT sector faces a new emerging recruiting phase. Employers seek for right candidate and not a candidate. They are in need of employees who possess multitasking skills. Since we are in dynamic forum, we have to meet the multilevel challenges. Hope, this book serves a droplet of filling your knowledge ocean. Please send your comments, suggestions and articles to the email id:

Kavithaa Srinivashaan, M.A.,M.B.A., Executive Director Dr. N. Kannan, M.Sc., Ph.D. Principal Prof.K.Natarajan, M.Sc.,M.Phil., Director, Center for Information

Technology Mr. R. Pugazendi, M.Sc.,M.Phil.,M.E., HOD, Department of Computer

Science & Applications

S.Sasikala, M.Sc., M.Phil., PGDPM &IR., S.Ranichandra, M.Sc., MBA.,M.Phil., S.Nithya., M.Sc(CS & IT)., G.Anwar Basha., M.C.A., S.Maheswaran, III BCA ’A’., M.Karthikeyan, III B.Sc(CS) ’C’., & Office bearers of TRACE and ACAI

By, Editorial Board


CONTENTS Articles 1. 2. 3. 4. 5. 6. Windows 7 New Microsoft Release Search Engine-Some Information Who Invented the Internet Forgotten Operating System Key Punch Cards How to Perform Special Searches Tech Zone 7. 8. 9. 10. 11. 12. Tech Tips Placement Forum HitBits Jargons Trojen Horse Rainfinity Technology Fun Zone 13. 14. Funny Syntax Error Who is Who , Twishing


Trojan Horse

unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology.

G.Anwar Basha, Lecturer, CS Article title Trojen Horse Article Description This article gives the details about the trojen horse malware and some of its technical description. A "Trojan Horse" has come to mean any trick that causes a target to invite a foe into a securely protected bastion or place, now often

Purpose and operation Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse. Operations that could be performed by a hacker on a target computer system include:

associated with "malware" computer programs presented as useful or harmless in order to induce the user to install and run them. Trojan horse (computing)

Use of the machine as part of a Botnet (e.g. to perform spamming or to perform

Distributed Denial-of-service (DDoS) attacks)

Data theft (e.g. passwords, credit card information, etc.)





shortened to trojan), is non-selfreplicating malware that appears to perform a desirable function for the user but instead facilitates




(including other malware)

Downloading of files

• • • • • •

Uploading of files Deletion of files Modification of files Keystroke logging Viewing the user's screen Wasting space computer storage

Trojan horse in the form of an ActiveX control) Email attachments

Also, there have been reports of compilers that are themselves Trojan horses While compiling code to executable form, they include code that causes the output executable to become a Trojan horse. Removal Antivirus software is designed to detect and delete Trojan horses, as well as preventing them from ever being installed. Although it is possible to remove a Trojan horse manually, it requires a full

Trojan horses require interaction with a hacker to fulfill their purpose, though the hacker need not be the individual responsible for

distributing the Trojan horse. In fact, it is possible for hackers to scan computers on a network using a port scanner in the hope of finding one with a Trojan horse installed, that the hacker can then use to control the target computer Installation and distribution Trojan horses can be installed through the following methods:

understanding of how that particular Trojan horse operates. In addition, if a Trojan horse has possibly been used by a hacker to access a computer system, it will be difficult to know what damage has been done and what other problems have been introduced. In situations where the security of the computer system is critical, it is advisable to simply

Software downloads (e.g. a Trojan horse included as part of a software application a file



sharing network)



erase all data from the hard disk and reinstall the operating system and required software.

executable content (e.g. a


Unlike Author




introduced a large number of new features, Windows 7 is intended to be a more focused, incremental

S.Maheswaran, III BCA A Article title Microsoft’s Invention Article Description This article provides the details about Windows 7 the latest version of Microsoft. Windows 7 is the latest version of Microsoft Windows, a series of operating systems produced by

upgrade to the Windows line, with the goal of being fully compatible with applications and hardware with which Windows Vista is already compatible. Presentations given by Microsoft in 2008 focused on multitouch support, a redesigned

Windows Shell with a new taskbar, a home networking system called Home Group, and performance

Microsoft for

use on


computers, including home and business desktops, laptops,

improvements. Some applications that have been included with prior releases of Microsoft Windows, including Windows Calendar,

netbooks, tablet PCs and media center PCs. Windows 7 was released to manufacturing on July 22, 2009, and general retail availability on October 22, 2009, less than three years after the release of its

Windows Mail, Windows Movie Maker, and Windows Photo Gallery, will not be included in Windows 7; some will instead be offered




Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time.

separately as part of the free Windows Live Essentials suite.

improved performance on multi-core processors,
Minimum hardware requirements for Windows 7 Architecture Processor 32-bit 1 GHz processor Memory (RAM) Graphics Card DirectX 9 graphics processor with WDDM driver model 1.0 (For Aero) HDD space free 16 GB of disk 20 GB of disk 1 GB of RAM 32-bit 64-bit 1 GHz processor 2 GB of RAM 64-bit

improved DirectAccess,

boot and


kernel improvements. Windows 7 adds support for systems using multiple cards heterogeneous from different graphics vendors

(Heterogeneous Multi-adapter), a new version of Windows Media Center, a Gadget for Windows Media Center, improved media

available space

available space

Optical drive

DVD drive (only to install from DVD/CD Media)

features, the XPS Essentials Pack and Windows PowerShell being included, Calculator and a with redesigned multiline

Additional requirements to use certain features:

Bit Locker requires a USB flash drive to use BitLocker To Go.

capabilities including Programmer and Statistics modes along with unit conversion. Many new items have been added to the Control Panel, including ClearType Text Tuner, Display Color Calibration Wizard, Gadgets, Troubleshooting, Recovery, Workspaces

Windows XP Mode requires an additional 1 GB of RAM, an additional 15 GB of

available hard disk space, and a processor capable of

hardware virtualization with Intel VT or AMD-V enabled. Windows 7 includes a number of new features, such as advances in touch and handwriting recognition, support for virtual hard disks,

Center, Location and Other Sensors, Credential Manager, Biometric

Devices, System Icons, and Display. Windows Security Center has been renamed to Windows Action Center (Windows Health Center and

Windows Solution Center in earlier builds), which encompasses both security and maintenance of the computer. The default setting for User Account Control in Windows 7 has been criticized for allowing untrusted software to be launched with elevated privileges by task buttons. These buttons also enable the Jump Lists feature to allow easy access to common tasks. The revamped taskbar also allows the reordering of taskbar buttons. To the far right of the system clock is a small rectangular button that serves as the Show desktop icon. This button is part of the new feature in Windows 7 called Aero Peek. Hovering over this button makes all visible windows transparent for a quick look at the desktop. In touchenabled displays such as touch screens, tablet PCs, etc., this button is slightly wider to accommodate being pressed with a finger. Clicking this button minimizes all windows, and clicking it a second time restores them. Additionally, there is a feature named Aero Snap, that automatically maximizes a window when it is dragged to either the top or left/right edges of the screen. This also

exploiting a trusted application. Microsoft's engineer Windows Mark kernel


acknowledged the problem, but noted that there are other

vulnerabilities that do not rely on the new setting. Windows RAW 7 also image



viewing through the addition of WIC-enabled image decoders, which enables raw image thumbnails,

previewing and metadata display in Windows Explorer, plus full-size viewing and slideshows in Windows Photo Viewer and Window Media Center. The taskbar has seen the

biggest visual changes, where the Quick Launch toolbar has been replaced with pinning applications to the taskbar. Buttons for pinned applications are integrated with the

allows users to snap documents or files on either side of the screen to compare them. When a user moves windows that are maximized, the system restores their previous state

automatically. This functionality is also accomplished with keyboard shortcuts. Unlike in Windows Vista, window borders and the taskbar do not turn opaque when a window is maximized with Windows Aero applied. Instead, they remain sRGB, 24-bit sRGB, 30-bit sRGB, 30-bit with extended color gamut sRGB, and 48-bit scRGB. Microsoft is also implementing better support for Solid State Drives, including the new TRIM command, and Windows 7 will be able to identify a Solid State Drive uniquely. Microsoft is also planning to support USB 3.0 in For developers, Windows 7 includes a new networking API with support for building SOAP-based web a subsequent patch, although support would not be included in the initial release due to delays in the


services in native code (as opposed to .NET-based WCF web services), new features to shorten application install times, reduced

finalization of the standard. Internet Spades, Internet Backgammon and Internet Checkers, removed Vista, which were


Windows in

UAC prompts, simplified development installation and of packages, improved and



Windows 7. Windows 7 will include Internet Explorer 8 Windows Media Player

globalization support through a new Extended Linguistic Services API. At WinHEC 2008 Microsoft

12.Users will also be able to disable many more Windows components than was possible in Windows Vista. New additions components to this include list of

announced that color depths of 30bit and 48-bit would be supported in Windows 7 along with the wide color gamut scRGB (which for HDMI 1.3 can be converted and output as xvYCC). The video modes supported in Windows 7 are 16-bit


Explorer, Windows Media Player, Windows Media Center, Windows Search, and the Windows Gadget Platform. Windows 7 includes 13

additional sound schemes, titled Afternoon, Calligraphy, Characters, Cityscape, Delta, Festival, Garden, Heritage, Landscape, Quirky, Raga, Savanna, and Sonata. A new version of Virtual PC, Windows Virtual PC Beta is available for Windows 7 Professional, Enterprise, and How do you add text abbreviations to autocorrect in word 2007? 1. Open Microsoft Word 2007. Press on the Office symbol in the left top corner. 2. Go to the bottom and press on the Word Options button. See the screenshot below. 3. Word options will appear. Choose Proofing from the left menu. Now press on the AutoCorrect Options button as in the screenshot below. 4. The autocorrect options will appear. Go down to where it says replace. 5. Under that type in the desktop environment. The three application limit will be removed from Windows 7 Starter.

Ultimate editions. It allows multiple Windows environments, including Windows XP Mode, to run on the same machine, requiring the use of Intel VT-x or AMD-V. Windows XP Mode runs Windows XP in a virtual machine and redirects displayed applications running in Windows XP to the Windows 7 desktop.

Furthermore Windows 7 supports the mounting of a virtual hard disk (VHD) as a normal data storage, and the bootloader delivered with

Windows 7 can boot the Windows system from a VHD. The Remote Desktop Protocol (RDP) of

Windows 7 is also enhanced to support real-time multimedia

abbreviation you want to use when you are typing in Word. I have written yt in this area.

application including video playback and 3D games. That means that Direct X 10 can be used in a remote

6. Now move to the right side and enter the word that will appear when the abbreviation is typed. I have entered You tube. 7. Therefore when I type yt and then press the space bar the word You tube will appear. 8. Now press the add button. 9. Keep entering more

abbreviations and words to match. Press add after each one. 10. Press ok when you are finished.

Article title: Tech Tips By, G. Manigandaprabhu II B.Sc(CS) ’B’

Ishare m/

5. Ask - Powered by Teoma

S.Sasikala, Lecturer, CS Article Title Search Engine Article Description This article gives details about the top 5 and semantic search engines and its excellent usage. TOP 5 ALTERNATIVE SEARCH



Gigablast has a huge index and some nice advanced search options,

although not terribly advanced. In addition the search engine provide directory search using The Open Directory, blog search and travel search. Factbites 2. Yahoo! Free Search Submit: 3. MSN Free Live Search Submit:

The Factbites search engine not just search for web sites that match your search term. They search the whole topic area. In this way it can return 4. AOL Search - Powered by Google Submit:

relevant results on your topic that

don’t necessarily mention the word you searched for. Exalead Exalead is a European search A semantics search engine attempts to make sense of search results based on context. It automatically identifies the concepts structuring the texts. For instance, if you search for “election” a semantic search engine might retrieve documents containing the words “vote”,

engine. It has some very handy advanced search options and a new way of presenting search results. The advanced features include search,

“campaigning” and “ballot”, even if the word “election” is not found in the source document. An important part of this process is disambiguation, both of the queries and of the content on the web. What this means is that the search engine — through natural language



stemming, phonetic search, and language field search. Snap Like Exalead, Snap wants to deliver visually enhanced search results. It gives you text on the left and web site previews on the right. In this way you don’t have to click through every search result to see what you’ll get, but have a chance to

processing — will know whether you are looking for a car or a big cat when you search for “jaguar”.

“look before you leap”.

When to use semantic search engines Semantic search has the power to enhance traditional web search, but it will not replace it. A large portion

TOP 5 SEMANTIC SEARCH ENGINES What is semantic search?

of queries are navigational and semantic search is not a replacement for these. Research queries, on the

other hand, will benefit from Cognition has a search business based on a semantic map, built over the past 24 years, which the company claims is the most Hakia Hakia is a general purpose semantic search engine, as opposed to comprehensive and complete

semantic search.

map of the English language available today. It is used in support of business analytics, machine translation, document search, context search, and much more

Powerset and Cognition, that search structured text like Wikipedia. SenseBot SenseBot is a web search engine that summarizes search results into one concise digest on the topic of your query. The search engine attempts to understand what the result pages are about. For this purpose it uses text mining to analyze Web pages and identify their key semantic concepts.

• • • •

Powerset Powerset is at present not a regular web search engine. It works best on smaller, relatively structured text. DeepDyve DeepDyve is a powerful,

• •

• • •

professional research tool available for free for the general public. Cognition

Out of paper on drive D: Press ESC to enter or Enter to escape REALITY.SYS corrupted. Reboot UNIVERSE [Y,n] ? The Earth is 98% full. Please delete anyone you can. The world is coming to an end-please log off. This copy of planet Earth has been unregistered for 4 billion years Track 0 bad?? Don't worry, there's lots of others Troubleshooting Shortcut #1: Shoot the trouble! Unknown Error on Unknown Device for Unexplainable Reason User Failure: Please Insert a Bootable Brain.

rather than for yourself are good evidence of your team attitude. Do not brag, just say it in a matter-ofAuthor fact tone. This is a key point. 3. How long would you expect to
M. Mohammad arif , II B.Sc(CS) B

Article title Interview Tips Article description This article helps to face the interview as what HR expected.

work for us if hired? Specifics here are not good.

Something like this should work: I'd like it to be a long time. Or As long as we both feel I'm doing a good job.

1. What kind of salary do you need? A loaded question. A nasty little game that you will probably lose if you answer first. So, do not answer it. Instead, say something like, That's a tough question. Can you tell me the range for this position? In most cases, the interviewer, taken off guard, will tell you. If not, say that it can depend on the details of the job. Then give a wide range. 2. Are you a team player?

4. Have you ever had to fire anyone? How did you feel about that? This is serious. Do not make light of it or in any way seem like you like to fire people. At the same time, you will do it when it is the right thing to do. When it comes to the

organization versus the individual who has created a harmful situation, you will protect the organization. Remember firing is not the same as layoff 5. or reduction is your in force.

You are, of course, a team player. Be sure to have examples ready. Specifics that show you often



towards work?

perform for the good of the team

The interviewer is not looking for a long or flowery dissertation here. Do you have strong feelings that the job gets done? Yes. That's the type of answer that works best here. Short and positive, showing a benefit to the organization. 6. If you had enough money to retire right now, would you? 10. Tell me about a suggestion you Answer yes if you would. But since you need to work, this is the type of work you prefer. Do not say yes if you do not mean it. 7. Have you ever been asked to leave a position? If you have not, say no. If you have, be honest, brief and avoid saying negative things about the people or organization involved. Have a good one ready. Be sure and use a suggestion that was accepted and was then considered successful. One related to the type of work applied for is a real plus. Get ready for the campus interview. Wipro is nearby.. have made. 9. Why should we hire you? Point out how your assets meet what the organization needs. Do not mention any other candidates to make a comparison. discussed. Give a little advance thought to this relationship.

Author T.Vinodhini II-BCA-C Article title Birth of Internet. Article Description This article gives the details about history of Internet.

8. Explain how you would be an asset to this organization. You should be anxious for this question. It gives you a chance to highlight your best points as they relate to the position being

A single person did not create the Internet that we know and use today. Below is a listing of several different people who've helped Crocker, Jeff Rulifson, and Ron Stoughton. In the meeting the group discussed solving issues related to getting hosts to communicate with each other. In December 1968 Elmer Shapiro with SRI released a report "A Study of Computer Network Design Parameters." Based on this work and earlier work done by Paul Baran, Thomas Marill and others; Lawrence Roberts and Barry

contribute and develop the Internet. IDEA: The initial idea is credited as being Leonard Kleinrock's after he

published his first paper entitled "Information Flow in Large

Communication Nets" on May 31, 1961.

Wessler helped to create the final version of the Interface Message

In 1962 J.C.R. Licklider becomes the first Director of IPTO and gave his vision of a galactic network. In addition to the ideas from Licklider and Kleinrock, Robert Taylor helped create the idea of the network, which later became ARPANET. Initial creation: The Internet as we know it today first started being developed in the late 1960's. In the summer of 1968 the Network Working Group

Processor (IMP) specifications. Bolt Beranek and Newman, Inc. (BBN) was later awarded the contract to design and build the IMP sub network. Introduction of the Internet to the general public UCLA puts out a press release introducing the public to the Internet on July 3, 1969. First network equipment August 29, 1969 the first network switch and the first piece of network equipment called "IMP", which is short for (Interface Message

(NWG) held its first meeting chaired by Elmer Shapiro with the Stanford Research attendees: Institute Steve (SRI) Carr, with Steve

Processor) is sent to UCLA and on

September 2, 1969 the first data moves from UCLA host to the switch. The first distributed message On Friday October 29, 1969 the first Internet message was sent from computer science Professor Leonard KleinRock's laboratory at UCLA, after the second piece of network equipment was installed at SLI. This connection not only enabled the first transmission to be made but is also considered to be the first Internet backbone. The first message to be distributed was "LO", which was an attempt at "LOGIN" by Charley S. Kline to log into the SLI computer from UCLA. However, the message was unable to be completed because the SLI system crashed. Shortly after the crash the issue was resolved and he was able to log into the computer. E-mail is developed Ray Tomlinson introduces network e-mail in 1972, the first messaging system to send messages across a network to other users. TCP is developed 1983 and is still the primary protocol used for the Internet. DNS is introduced Paul Mockapetris and Jon Postel introduce DNS in 1984. HTML Vinton Cerf and Robert Kahn design TCP during 1973 and later publish it with the help of Yogen Dalal and Carl Sunshine in December of 1974 in RFC 675. Ethernet is conceived Bob Metcalfe develops Ethernet idea in 1973. TCP/IP is created In 1978 TCP splits into TCP/IP driven by Danny Cohen, David Reed, and John Shoch to support real-time traffic. This allows the creation of UDP. TCP/IP is later standardized into ARPANET in

In 1990 Tim Berners-Lee develops HTML, which makes a huge

contribution to how we navigate and view the Internet today. WWW Tim Berners-Lee introduces WWW to the public on August 6, 1991. Author Muruganandham.N, III BCA- "B". Article Title Forgotten Operating System Article Description This article provides information regarding the past OS used, which are not in use now-a-days.

Amiga OS Year created: 1985 Company: Commodore What happened? Ars Technica put it best when in 2005, it wrote: "The Amiga

computer was a machine ahead of its time. When it was released in 1985, its color screen (4096 colors in HAM mode!), four-channel sampled stereo sound, preemptive

multitasking GUI, and custom chips to accelerate both sound and





Macintosh seem antiquated and the PC positively Paleolithic. Steve Jobs was reported about to the be extremely but Arthur Year created: 1987 Company: Acorn Computers Ltd What happened? Developed in five months, Arthur was supposed to be a shortterm scab, but it stuck around until the RISC OS was developed in 1989. That operating system is still in use, but we don't know anyone who uses it. Desktop Linux Year created: ~1996 Company: Linux desktops are open source. What happened? 2010 is almost certain to be the year of desktop Linux. Just like 2009. And 2008. And… Inferno (operating system) Year created: 1996 Company: Bell Labs What happened? It's an open source operating system, so there are versions of it still out there. But they don't work above the basement floor. XTS-400 Year created: 1992



fortunately for him and Apple, Commodore had absolutely no idea what they were doing." BeOS Year created: 1991 Company: Be Inc. What happened? Apple offered to buy Be Inc for $125 million in 1995, but CEO Jean-Louis Gassée wanted $200 million. Apple bought Steve Jobs's NeXT instead, and Palm acquired the company's assets for $11 million in 2001. OS/2 Year created: 1985 Company: IBM What happened? Microsoft and IBM joined to create OS/2 in 1985, but when Windows 3 became a huge hit, the partnership unraveled in 1990. Though no longer supported by IBM, the operating system still runs on many ATMs today.

Company: BAE Systems What happened? Valued for their security, this operating system and its successors are still used in military technology. Palm OS (also known as Garnet OS) Year created: 1996 Company: Palm Inc. What happened? In 2002, Palm spun the OS out as its own company. Innovation pretty much ended there and what was once a very strong pioneering OS for PDAs, couldn't keep up when it came to the Web and multimedia. UIQ (formerly known as User Interface Quartz) Year created: 1998 Company: Ericsson What happened? UIQ went into bankruptcy this year after the Symbian Foundation chose to base future user-interfaces on the S60 OS. Program spindle for IBM 026 or 029 card punch. For repeated data entry with a fixed card format, the card punch could be set up to skip certain columns, wait for key input, or duplicate information from the Author Muruganandham.N, III BCA- "B". Article Title Keypunch Card Article Description This article provides that full details about the punching card system.

previous card. Program cards were punched on the same keypunch, removed, wrapped around the drum, and inserted in the keypunch above the punch position. Control by the card could be enabled and disabled by the operator with a lever.

(shown in the table to the left of the keys) required both a '12' and a '1' punch.

Punch card chad - a jar of 'holes' punched from cards on an IBM '029' punch. These are rectangular in shape, have the color of the card, and usually bear the small printed column number that was punched out from the card.

How to perform 'Special Searches'
Here are some good tips to help you search google like an expert 1. Explicit Phrase: Lets say you are looking for content about internet marketing. Instead of just typing internet marketing into the Google search box, you will likely be better off searching explicitly for the phrase. To do this, simply enclose the search phrase within double quotes. Example: “internet marketing” 2. Exclude Words: Lets say you want to search for content about internet marketing, but you want to

Manual card punch from Wright Line. Numeric digits could be inserted directly from the keys. Alphabetic and special characters required 2 or 3 holes obtained by pressing all needed keys while holding down the 'S' key at bottom until finished. For example an A

exclude any results that contain the term advertising. To do this, simply use the “-“ sign in front of the word you want to exclude. Example Search: internet marketing -advertising 3. Site Specific Search: Often, you want to search a specific website for

content that matches a certain phrase. Even if the site doesn’t support a built-in search feature, you can use Google to search the site for your term. Simply use the all the terms specified in the search. If you are looking for any one of one or more terms to match, then you can use the OR operator. (Note: The OR has to be capitalized). Example: internet marketing OR advertising 7. Phone Listing: Let’s say

“” modifier. Example: “internet marketing” m 4. Similar Words and Synonyms: Let’s say you are want to include a word in your search, but want to include results that contain similar words or synonyms. To do this, use the “~” in front of the word. Example: “internet marketing” ~professional 5. Specific Document Types: If you’re looking to find results that are of a specific type, you can use the modifier “filetype:”. For

someone calls you on your mobile number and you don’t know how it is. If all you have is a phone number, you can look it up on Google using the

phonebook feature. Example: phonebook:617-5551212 (note: the

provided number does not work – you’ll have to use a real number to get any results). 8. Area Code Lookup: If all you need to do is to look-up the area code for a phone number, just enter the 3-digit area code and Google will tell you where it’s from. Example: 617 9. Numeric Ranges: This is a rarely used, but highly useful tip. Let’s say

example, you might want to find only PowerPoint presentations

related to internet marketing. Example: filetype:ppt 6. This OR That: By default, when you do a search, Google will include “internet marketing”

you want to find results that contain any of a range of numbers. You can do this by using the X..Y modifier (in case this is hard to read, what’s between the X and Y are two periods. This type of search is useful for years (as shown below), prices or anywhere where you want to 13. Searching for URLs containing certain words. Use the “inurl:word” modifier. Example site: inurl: google tools

First iPhone worm detected

provide a series of numbers. Example: president 1940..1950 10. Stock (Ticker Symbol): Just enter a valid ticker symbol as your search term and Google will give you the current financials and a quick thumb-nail chart for the stock. Example: GOOG 11. Calculator: The next time you need to do a quick calculation, instead of bringing up the Calculator applet, you can just type your expression in to Google. Example: 48512 * 1.02 12. Word Definitions: If you need to quickly look up the definition of a word or phrase, simply use the “define:” command. Example: define:plethora
F-Secure, the IT security solutions company, has claimed that it has detected the first iPhone worm called Ikee. “It is only able to infect devices that have been ‘jailbroken’ by their owners. Jailbreaking removes iPhone’s protection mechanisms, allowing users to run any software they want,” Mr Chia Wing Fei, Senior Response Manager of F-Secure

Security Labs, said here in a press release. Affected users would fine that their iPhone wallpaper has been altered to a picture of Rick Astley (of Rickroll fame) and the message ‘Ikee is never going to give you up’. The worm targets the users who have jailbroken their phone, but have not changed their default root login password. Information given by, Prof. K. Natarajan , Director, Center for Information Technology


Yahoo! Asked to explain IGNOU online Exam Crash

Now, classrooms in your Pocket

Students of IGNOU can look forward to download their study course contents and get SMS alerts through mobiles. On In the wake of the collapse of its online entrance exam for engineering Oct-29 the university signed a MoU with Ericsson India Pvt. Ltd(EIL). Students of IGNOU will soon get 3G mobile services at nominal rates. It will be only Rs.20 or Rs.25. It is economical offers distance too. It is a state-of-the-art technology being used to connect the remote area learners. Students will get SMS alerts and can downloading files likes assignments and video clips. The university is also implementing the latest Information and Communication Technologies(ICTs) aimed at reaching out to the un-reached in the rural areas across the country.

programmers, IGNOU today asked Yahoo! To submit a report explaining what went wrong. IGNOU, which

education to over 18 lakh students, failed to conduct the online entrance on Saturday as the system collapsed

minutes after the exam started. The university was using the server of Yahoo! for this test. “We have asked for the log which will be examined to find out how the online testing crashed,” Exam Coordinator, Prof Shiv Kumar Vyas, said.

Information given by, Prof. K. Natarajan , Director, Center for Information Technology


Cyrix: A microprocessor manufacturer. They produce an Intel 486 equivalent - the Cy486SLC and a Pentium equivalent - the Cyrix 6x86. DirectX: A Microsoft programming interface standard, first included with Windows 95. DirectX gives (games) programmers a standard way to gain direct access to enhanced hardware features under Windows 95 instead of going via the Windows 95 GDI. DivX: Video compression is a patent-pending software technology that compresses digital video so it can be downloaded over DSL or cable modems in a relatively short time with no reduced visual quality. Dot Matrix Printer: A kind of printer with a vertical column of up to 48 small closely packed needles or "pins" each of which can be individually forced forwards to press an ink ribbon against the paper. The print head is repeatedly scanned across the page and different combinations of needles activated at each point. Dpi: (Dots Per Inch) A measure of resolution for printers, scanners and displays. Dual In-Line: Small circuit boards carrying memory integrated circuits, with signal and power pins on both sides of the board, in contrast to single-in-line memory modules (SIMM). Emulation: One system is said to emulate another when it performs in exactly the same way, though perhaps not at the same speed. A typical example would be emulation of one computer by (a program running on) another. FDisk: An MS-DOS utility program which prepares a hard disk so that it can be used as a boot disk and file systems can be created on it. OS/2, NT, Windows 95, Linux, and other Unix versions all have this command or something similar.

Article title: Jargons By, M.Jagadeesh, III BCA C


Rainfinity's technology





distributed applications using offthe-shelf hardware. The focus of the research was on highand

performance, M.Jagadeesh, III BCA ‘C’ Article Title Rainfinity's technology Article Description This article discusses about the Rainfinity's technology which is an unique project in networking. Rainfinity's technology originated in a research project at the California Institute of Technology (Caltech), in collaboration with NASA's Jet Propulsion Laboratory and the Defense Projects The name Advanced Agency of the was


portable clustering technology for space-borne computing. Two

important assumptions were made, and these two assumptions reflect the differentiations between RAIN and a number of existing solutions both in the industry and in academia: 1. The most general share-nothing model is assumed. There is no shared storage accessible from all computing nodes. The only way for the computing nodes to share state is to communicate via a network. This differentiates RAIN technology from existing back-end server clustering solutions such as SUNcluster, HP MC Serviceguard or Microsoft Cluster Server.

Research (DARPA). original



RAIN, which stands for Reliable Array of Independent Nodes. The goal of the RAIN project was to identify key software building

2. The distributed application is

not an isolated system. The RAIN technology has been further augmented, and additional patents have been filed. The guiding concepts that shaped the architecture are as follows:




closely with existing networking protocols so that a RAIN cluster is able to interact with the

environment. technological

Specifically, modules were 1. The Network architecture data Applications goals for

created to handle high-volume network-based transactions. This differentiates it from traditional distributed computing projects



applications are different from clustering data storage

such as Beowulf. In short, to the RAIN project

applications. Similar goals apply in the telecom environment that

intended computing

marry with

distributed networking

provides the Internet backbone infrastructure, due to the nature of applications and services being clustered.

protocols. It became obvious that RAIN technology was well-suited for Internet applications. During the RAIN project, key components were built to fulfill this vision. A patent was filed and granted for the RAIN technology. Rainfinity was spun off from Caltech in 1998, and the company has exclusive intellectual property rights to the RAIN technology. After the

2. Shared-Nothing The shared-storage cluster is the most widely used for database and application servers that store

persistent data on disks. This type of cluster typically focuses on the availability of the database or application service, rather than performance. Recovery from

formation of the company, the

failover is generally slow, because restoring application access to disk-based data takes minutes or longer, not seconds. Telecom load load-balancing decisions must be made dynamically by

measuring the current capacity of each computing node in real-time. Static hashing does not guarantee an even distribution of traffic.

servers deployed at the edge of the network are often diskless, keeping data in memory for performance reasons, and tolerate low failover time. Therefore, a new type of share-nothing cluster with rapid failure detection and recovery is required. The only way for the shared-nothing cluster to share is to communicate via the network.

4. Peer-to-Peer A dispatcher-based, master-slave cluster architecture suffers from scalability by introducing a

potential bottleneck. A peer-topeer cluster architecture is more suitable for latency-sensitive data network applications processing

3. Scalability While the high-availability cluster focuses unplanned on recovery and from planned





architecture should be considered to offset the need for more control over resource management. For example, a cluster can assign multiple authoritative computing nodes that process traffic in the round-robin order for each

downtimes, this new type of cluster must also be able to maximize I/O performance by load balancing computing scalability across nodes. with multiple Linear network

network interface that is clustered to reduce the overhead of traffic forwarding

throughput is important. In order to maximize the total throughput,


Who is Who in Computer?

Who is Who in Computer?
Sabeer Bhatia borned in Chandigarh, India and co-founded first free email service site with Jack Smith. Tim Berners-Lee is the inventor of the World Wide Web and Director of the World Wide Web Consortium (W3C). Larry Page is co-founder of the Google internet search engine, now Google Inc. Sergey Brin is co-founder of the Google internet search engine, now Google Inc. He cofounded google with Larry Page. Charles Babbage is known as the father of computer. Larry Wall is the inventor of Perl, rn,patch, and many other wonderful things. He is the language designer for Perl 6, and has staked out the perl5 to perl6 translator as his own project. Rasmus Lerdorf is father of PHP.Here is Rasmus pictured in the ship's exotic Greek ballroom at the conclusion of an hour's question and answer session. James Gosling is a famous software developer, best known as the father of the Java programming language. Dennis Ritchie is an American computer scientist notable for his influence on ALTRAN, B, BCPL, C, Multics, and Unix. Bjarne Stroustrup designed and implemented the C++ programming language. He is the College of Engineering Professor in Computer Science at Texas A&M University. Bill Gates founded Micorsoft with Paul Allen Michael Dell Michael Saul Dell (born February 23, 1965, in Houston, Texas) is an American businessman and the founder and CEO of Dell, Inc.


Chen, Peter

The originator of the Entity-Relationship Model (ER Model), which serves as the foundation of many systems analysis and design methodologies, computer-aided software engineering (CASE) tools, and repository systems including IBM's Repository Manager/MVS and DEC's CDD/Plus. The UML modeling language has its roots in the ER model. Dr. Chen is a Fellow of the IEEE, the ACM, and the AAAS. Since 1994, Dr. Chen has been doing research and teaching on Internet/Web, Java, XML, data warehousing, ecommerce (B2B and B2C), and Internet security. Codd originated the relational approach to database management in a series of research papers he began in 1970. His paper, "A Relational Model of Data for Large Shared Data Banks," was a seminal paper in a continuing series of papers. Codd built upon this, and in doing so has provided the impetus for widespread research into numerous related areas, including database languages, query subsystems, database semantics, locking and recovery, and inferential subsystems.

Codd, Edgar

Building on the work of Linus Torvalds for the Linux operating system, Cox is responsible for much of the code in the Linux kernel, including networking Cox, Alan and SMP. He has handled the latter-day 2.0 releases, and serves as one of the primary conduits for patches into the current development kernels. Cox is also responsible for bringing Linux to the Macintosh 68K. 1925(b.)-1996(d.) Regarded as the father of supercomputing. He began his career as a computer scientist working on UNIVAC I. In 1957 Cray helped found Control Data Corp., where he designed the CDC 6600 and the CDC 7600, large-scale computers notable for their high processing speeds. Cray left the company in 1972 to begin Cray Research Inc., where he designed Cray, multiprocessor computers allowing simultaneous (parallel) processing. His Seymour company's first supercomputer, the Cray-1, came out in 1976 and could perform 240 million calculations per second. Cray also developed an innovative cooling system, using Freon to combat the intense heat of the Cray 1. The Cray Y-MP, introduced in 1988, was capable of 2.6 billion calculations per second.


Twishing: Beware of the Latest ID Scam
The idea of luring someone to reveal private information is nothing new. Twishing works the same way. A short public message like “see what they're saying about you on xyzblog" followed by a link can direct the unwitting Twitter user to a blog that looks like Twitter, but is actually a site operated by the fraudster, who then seeks to gain personal information. Twitter recently changed its look, which will likely deter twishing for at least a while. But fraudsters are always looking for the next scam. This is very similar to fraudsters who misrepresent themselves as being from a large financial institution while sending out millions of official e-mails trying to trick legitimate account holders into revealing personal account information. While most of these e-mails will go to people who have no banking relationship with the financial institution, the phishing e-mail will reach some legitimate account holders. The email will ask account holders to resend their account information – often with the threat of suspending the account if they don’t. Some of the telltale signs that a phishing e-mail is a fraud are typos, poor grammar or incomplete information in the phishing message. But the message limitations of Twitter make it easy to overlook such details. Twitter users will use chat and text message abbreviations (e.g., “u" for “you") and grammatical rules are largely ignored. So the hints aren’t as obvious.

However, some of the basic steps to protect one’s identity work to protect against twishing just as they do against phishing:
• • •

Don’t provide personal information online If a message looks suspicious, it probably is Be cautious in opening “retweeted" items. The last sender may not be aware of the malicious nature of the message. Article(who is who,Twishing) by, S.Nithya, Lecturer, CS Dept

The Vice-Chancellor, Periyar University ,Salem-11 The Registrar, Periyar University ,Salem The Controller of Examination, Periyar University ,Salem-11 The HOD, Department of Computer Science, Periyar University ,Salem-11 The Principal, Government Arts College for Women, Salem-8 The Principal, Government Arts College for Women , Krishnagiri The Principal, Government Arts & Science College (W), Burgur, Kirshnagiri The Principal, J.K.K Nataraja College of Arts & Science The Principal, M.G.R College of Arts & Science The Principal, Sengunthar Arts & Science College

The Principal, Muthayammal College of Arts & Science The Principal, PEE GEE College of Arts &, Science The Principal, Harur Muthu Arts & Science College for Women The Principal, Vivekanandha College of Arts & Sciences (W) The Principal, Mahendra Arts & Science college The Principal, Selvam Arts & Science college The Principal, St.Joseph's College of Arts & Science for (W) The Principal, Vysya College of Arts &, Science The Principal, NKR Government Arts College for Women The Principal, Arignar Anna Government Arts College The Principal, Salem Sowdeswari College The Principal, P.G.P College of Arts & Science The Principal, Attur Arts & Science College The Principal, SSM College of Arts & Science The Principal, Government Arts College Salem The Principal, Government Arts College Men The Principal, Government Arts College, Dharmapuri The Principal, Gobi Arts and Science College (Autonomous) The Principal, Sri Kandhan College of Arts & Science The Principal, Sri Ganesh College of Arts & Science The Principal, Jairam Arts & Science College The Principal, Sri Balamurugan College of Arts & Science The Principal, Rabindharanath Tagore College of Arts & Science for Women The Principal, Sri Sakthikailash College for Women The Principal, PSG College of Arts and Science The Secretary, PSG College of Arts and Science The Principal, Kongunadu Arts and Science College(Autonomous) The Principal, Vivekanandha College for Women The Principal, Sri Vidhya Mandir Arts & Science College

Achievers Archives

International Conference
Mr.R.Pugazendi, M.Sc., M.Phil., M.E., HOD, Department of Computer science and applications has Presented a research paper entitled “Mobile Agents – A Solution for Network Monitoring” in the international conference on Advances in Recent Technologies in

Communication and Computing(ARTcom’2009) which is organized by Association of Computer Electronics and Electrical Engineers(ACEEE) – a division of engineers network – and Technically Co-sponsored by the IEEE-Computational Intelligence Society held at Kottyam, Kerala from 27’Oct to 28’Oct 2009. The paper has been published in IEEE Xplore and IEEE CS Digital Library.

We welcome your valuable comments, suggestions & articles to Ishare, Department of Computer Science & Applications (UG) K.S.R College of Arts and Science, Tiruchengode-637215 Phone: 04288 -274741(4), Mail :

EXTENSION ACTIVITY “Service is our Motto”

Government Boys Higher Secondary School, Tiruchengode
Practical Examination is going to be conducted by Mr. M. Arul Prabhu Mr. V.Harikrishanan On

Date : 01.11.2009

We welcome your valuable comments, suggestions & articles to Ishare, Department of Computer Science & Applications (UG) K.S.R College of Arts and Science, Tiruchengode-637215 Phone: 04288 -274741(4), Mail :