CSE Snaps

Mobile Dreams Wear the World(6th sense) Microsoft Sql Server 1 5


Better Safe Than Sorry Cloud Computing

11 13

Wireless LAN Security


Google’s Web Browser Computer Security Virtuality Puzzles Microsoft Simplifier Secret of maths Tips & Tricks Comp-Confusion Student’s Activities Staff Activities

17 18 20
24 24 24 25 27 28 29 34

Chancellor’s Message Vice Chancellor’s Message Registrar Message COE’s Message Director’s Message

October 2010


I am very much delighted to hear that Computer Science Engineering Department is starting an association. I am sure the activities of the association will help improving the organizational skills and leadership qualities of student which are essential for their career development. I am very confident that the association of Computer Science will reach greater heights in the years to come. I wish them to have a grand success in all their moves and I wish that these steps shall bring them a drastic change in their career growth.

Dr. Ishari K.Ganesh


October 2010


I am very much delighted to learn that the department of computer science and Engineering is inaugurating their Association. The IT education has transformed our country and economy and the benefits of IT revolution has reached the common man. Vels University strives hard to impart quality education to the students so that, they have the required competencies to meet the changing needs of this nation. The activities of the association must facilitate the students to acquire organizational skills and bring change in their perception and attitudes. The eMagazine to be published to mark this occasion should reflect the student’s talents and their abilities. I would like to congratulate and appreciate the students and the faculty of CSE for their efforts and I wish them all the best


October 2010


I am much pleased to note that the department of Computer Science Engineering is inaugurating the Department Association on 14-102010. The usage of computers has increased drastically in these days, computers playing a role in almost every industrial sector and also in various branches of society. They are presently the backbone of every industry that currently exists. Computers have transformed the lives of billions around the world in every possible way. No field is left out without computers, whether it is medicine, e-governance, managing laws of department activities, computers have become essential. I wish all the very best for the inauguration of the department’s association and success in implementing innovative ideas for the development of the world.

Dr. P. Govindarajan


October 2010


I am very glad to see that the Department of Computer Science is Inaugurating the Department Association on 14.10.2010. The present human generation is associated mostly with the computer usages which makes easy in day life like banking, accounting, ticketing, E-mailing, chatting, conduct of online Examination and E-governance etc., Most of the peoples relied on the computers for various matter and considered to be a very essential for the human being. In this connection, I wish all the very best for the inauguration of Department Association and success in implementing the new invents in the Computer Education.


October 2010

I am very much pleased to note that the students of Computer Science Engineering, Vels University are coming out with an e-journal. The knowledge one acquires in college has to be harnessed in real life for the betterment of self and humanity. In other words, the students should acquire the skill of presenting & utilizing their knowledge, they get during their stay in VELS UNIVERSITY fully & properly. In that way, this journal that they intend to publish on regular basis will definitely give them an opportunity to sharpen their deliverance skills. At this juncture, I request each and every student to utilize this forum fully. I wish the students and staff of Department of Computer Science Engineering all the very Best in their endeavor.

God Bless You All.

Prof. P. Thiagarajan


October 2010

Mobile -DREAMs......
By V.vinoth, D.Ashokkumar, NitinGoswami, K.Gautam(3rd yr, CSE) Windows phone 7 is the latest version of windows mobile in development by Microsoft, scheduled for release by October 2010. Microsoft’s idea of the Smartphone is very different from their competitors, traditionally smart phones were devices that did not have touch screens and were intended to be used by one hand ,but today’s smart phones push the boundaries of technology , Microsoft plans to push it even further .
The minimum requirements for phone 7 was revealed recently

  
But Microsoft has their work cut out for them to address copy-paste and multi-tasking while also spreading the word about their new mobile OS, which is something they have not been able to do in the past with Zune HD, Windows Mobile, and other technology. They seem to be doing pretty well with the Xbox, so maybe Phone7 teams should probably be looking at that team for help.

Capacitive Touch: 4 or more contact points Sensors: A-GPS, Accelerometer, Compass, Light, Proximity Camera: 5 megapixels or more, Camera with a flash and dedicated camera button Multimedia: Common detailed specs, Codec acceleration Memory: 256 MB, 8 GB Flash or more GPU: DirectX 9 acceleration Processor: ARMv7 Cortex/Scorpion or better 2 screen sizes: 480×800 WVGA, 480×320 HVGA Keyboard: Optional

     

Five specific hardware buttons required: Start, back, search (a dedicated Bing button), camera button, and power -- no more, no less From the minimum requirements we can clearly understand that Microsoft is clearly targeting only the high end market for Phone 7.

The basic facts
Windows Phone 7 Series is the successor to Microsoft's line of Windows Mobile phone operating systems. It's based on the Windows CE 6 kernel, like the Zune HD, while current versions of Windows Mobile are based on Windows CE 5. Microsoft announced the new OS at Mobile World Congress 2010 in Barcelona, and says that the first handsets to run it are supposed to be released by the end of this year. The visual and underlying differences in the operating system are almost too numerous to mention, including a completely (and we do mean completely) upended user interface, an emphasis on fingerbased touch screen input, deep social networking integration, fully branded and expansive Zune and Xbox components, and extremely strict hardware requirements for partners. A couple familiar touchstones from the past include plans for Outlook and Office support, as well as licensing to a wide variety of third party hardware vendors -despite the name change; Microsoft still isn't building any phones itself


October 2010


The tile function of the screen replaces the icon displays seen on the iPhone and the Android with living breathing tiles. Just picking up the phone you can see what is going on in your world without opening any app. I know we can have push notifications on the iPhone and alerts on the Android but they both require some element of effort. The push notifications don’t always hang around on your iPhone and on the Nexus I have to slide the thing down and then read through the various bits. This delivery of information is just one example of how Microsoft are looking to fully innovate with this phone, not just deliver a version of what the market is used to.

Hub Strategy
The Hub strategy is the core for Windows Phone 7 and it makes a lot of sense. So, I will have a music hub in the shape of the Zune app. But this app is not restricted to content I have uploaded to, or bought in Zune, but all the music content on my ‘phone. On my iPhone I have many music apps, each with different content. I have to remember where my music is before I can play it. With the 7 I can access my music in the various apps, or I can have a centralized hub of music. Take the hub strategy across to other content, like business documents and Office becomes the business hub. This strategy gives me the best of both worlds, I can use my preferred app or I can find it in the main hub. Smart.

Apps, Lots of Apps
None of the applications designed for Windows mobile will work on WP7. Sorry Windows Mobile developers, it's for the best. Deep down, we all knew a clean break was the only way Windows Phone wasn't going to get stuck in the same loop. Apps will have some standardized interface elements, like the app bar on the bottom for common commands.. It’s all about the apps. Some of the biggest names in Apps. Seismic, Four

square, Shazam, the Associated Press –are all bringing apps to the 7. So, we don’t need to worry about not having the big names you are used to. It looks like they are already lining up to come on board.
“To catch the reader's attention, place an interesting sentence or quote from the story here.”

Quality Apps
The demonstrations all looked awesome with plenty of depth, functionality and interaction. These apps were developed in 3 weeks running the new Silverlight platform announced yesterday.

Try before you buy
Forget this lite/pro app business. You get to download the app as a trial. The functionality for the trial is core to the new Silverlight toolbox, so it is down to the app developers to decide the best way for the

The Zune Phone!
Microsoft's vision of Zune is finally clear with Windows Phone 7. It's an app, just like iPod is on the iPhone, though the Zune Marketplace is integrated with it into the music + video hub, not separated into its own little application. It's just like the Zune HD,. But you get third-party stuff like Pandora, too, built-in here., there will be an FM radio in every phone 2

trial. Some apps may be fully functional but on a limited trial time. Other apps may have limited functionality or the first few levels of a game


October 2010



The 7 will have full capability to support not just Exchange accounts but all other major email providers as well. So, you don’t need to have an Exchange account to be using this for email. However, if you do have exchange, this will be a boon. Remember, the iPhone has Exchange support but the Android does not offer Active Sync. The 7 will offer multiple exchange account sync which will also be good for business users. Let us not forget there are still a lot more people running Exchange emails than Gmail or Apple Mail. Blackberry, are you paying attention?


If Microsoft's got an ace-in-hole with Windows Phone 7, it's Xbox Live. Gamers have talked about a portable Xbox for years—this is the most logical way to do it. The N-Gage was ahead of its time. The DS and PSP are the past. The iPhone showed us that the future of mobile gaming was going to be on your phone, and now that just got a lot more interesting. The potential's there, and hopefully the games will be plentiful and awesome enough to meet it. Forget Flight Control, how about full on XBOX action on your phone? The graphics look up to it and the game levels, credits and achievements will be recorded against your live profile. This cross performance works on a number of levels. Not only will you be able to continue playing your XBOX games on the phone (we don’t know right now if you can play all of them) but also that it remembers you across platforms so you can pick up where you left off when at home in front of your XBOX. In a sense, this is what Sony has been trying to achieve with the PSP/PS3 hook up, but with all the other mobile bits added. If the 7 can be an awesome entertainment platform as well as the business platform of Microsoft’s heritage, this could be amazing.

1. 2.

Smooth transitional user interface Informative lock screen and auto- hidden top status bar

3. 4. 5.

Good Office integration and support Bing search page and functionality Easy setup for Google, Windows Live, Yahoo! Mail, and others

6. 7. 8. 9.

Functional QWERTY keyboard Cool camera software Tell me voice search Powerful Outlook email, calendar, and contacts client

10. Zune HD functionality


October 2010

Over the air Sync : Mesh
A piece of interface that's shockingly not there: A desktop syncing app. If anyone would be expected to tie their phone to a desktop, you'd think it'd be Microsoft, but they're actually moving forward here. All of your contacts and info sync over the air. The only thing you'll be syncing through your computer is music and videos, which is mercifully done via the Zune desktop client's Microsoft’s plans to sync your life across channels and platforms seems a little ahead of its time but with the 7, finally everything comes into place. Music, work, games, contacts all come of age in one place. What we forget is that Microsoft has all the component parts to serve my digital life. Email, Search, Gaming, Music. Until now some of those have been a bit crap, the Zune didn’t really inspire, don’t get me started on Vista and pre Bing, search wasn’t too hot either. Roll forward a year and Windows plans are coming together. With the phone the potential Centre of my digital universe I tend to gravitate to the platform that gives me the greatest experience to hook them all together. The iPhone gets better but doesn’t perfectly integrate my Google life. Nor does Android completely – Gmail, Google apps yes but other accounts like Google Finance still don’t hook up. Microsoft is the sleeping giant. Historically not as good looking as Apple, and not as fast as Google. The phone 7 is the show piece if not the Centre piece of their empire which will help them back on the path to greatness. Of course we assume that Microsoft can get the hardware right. We have seen some great things, beautiful graphics, great games but will the hardware be up to it? Multi tasking is not coming which is probably a smart reason to manage the hardware drain. No doubt they will be working hard to find the right partners to deliver the best handset possible. A glitch in the hardware could be the undoing of such great potential. Until we start to see handsets in the wild, I will remain with my view that this is the iPhone Killer.

We have assumed here that Microsoft can get the hardware right. We have seen some great things, beautiful graphics, and great games but will the hardware be up to it? Multi tasking is not coming which is probably a smart reason to manage the hardware drain. No doubt they will be working hard to find the right partners to deliver the best handset possible. A glitch in the hardware could be the undoing of such great potential. Until we start to see handsets in the wild, we can safely assume that this is the iPhone Killer.

The two most obvious glaring issues are the lack of copy-paste and the limited multi-tasking. You can already select a word and use the cursor so it shouldn’t be that much effort for Microsoft to get some developers locked into a room to figure out copy-paste on WP7 Just like the previous versions of the iPhone, you can have native apps running in the background so you could listen to Zune HD streaming content while surfing the web and receiving emails on the go. There are several other areas that need work, such as the games in Xbox Live, Twitter support, 3rd party apps, and more. However, the OS is quite refined and consistent and I think people are going to be quite happy with it when it rolls out later this year.



October 2010

By C.Saravanan, N.Veeramani(3rd yr,CSE)

   

Sixth Sense is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information. It was developed by Pranav Mistry, a PhD student in the Fluid Interfaces Group at the MIT Media Lab. Sixth Sense bridges the gap by bringing intangible, digital information out into the tangible world, and allowing us to interact with this information via natural hand Sixth Sense comprises a pocket projector, a mirror and a camera. The hardware components are coupled in a pendant like mobile wearable device

The hardware components are coupled in a pendant like mobile wearable device.      Camera Projector Mirror Mobile Component Colored Markers

   Captures an object in view and tracks the user’s hand gestures It sends the data to smart phone It acts as a digital eye, connecting you to the world of digital information 

The projector projects visual information enabling surfaces and physical objects to be used as interfaces The project itself contains a battery inside, with 3 hours of battery life.

A tiny LED projector displays data sent from the smart phone on any surface in view–object, wall, or person.


October 2010
W E A R U R W O R L D ( 6 th S E N S E )

The usage of the mirror is significant as the projector dangles pointing downwards from the neck.

A Web-enabled smart phone in the user’s pocket processes the video data Other software searches the Web and interprets the hand gestures

   It is at the tip of the user’s fingers . Marking the user’s fingers with red, yellow, green, and blue tape helps the webcam recognize gestures. The movements and arrangements of these makers are interpreted into gestures that act as interaction instructions for the projected application interfaces.


 

The hardware that makes Sixth Sense work is a pendant like mobile wearable interface It has a camera, a mirror and a projector and is connected wirelessly to a Bluetooth smart phone that can slip comfortably into one’s pocket


October 2010

   

The camera recognizes individuals, images, pictures, gestures one makes with their hands Information is sent to the Smartphone for processing The downward-facing projector projects the output image on to the mirror Mirror reflects image on to the desired surface Thus, digital information is freed from its confines and placed in the physical world.


    Portable Supports multi-touch and multi-user interaction Cost effective It is an open source

http://www.freshcreation.com/entry/sixth_sense_technology/ http://theviewspaper.net/sixth-sense-technology-will-revolutionize-the-world/ http://www.ted.com/talks/pattie_maes_demos_the_sixth_sense.html http://gizmodo.com/5167790/sixth-sense-technology-may-change-how-we-look-at-the-world-forever http://boingboing.net/2009/11/12/sixth-sense-technolo.html


October 2010

By Mallica(3rd yr., CSE)

Microsoft SQL Server is a relational model database server produced by Microsoft. Its primary query languages are T-SQL and ANSI SQL.
The current version of SQL Server, SQL Server 2008 was released (RTM) on August 6, 2008 and aims to make data management self-tuning, self organizing, and self maintaining with the development of SQL Server Always On technologies, to provide near-zero downtime. SQL Server 2008 also includes support for str uc tur ed a nd se mistructured data, including digital media formats for pictures, audio, video and other multimedia data. In current versions, such multimedia data can be stored as BLOBs (binary large objects), but they are generic bit streams. Intrinsic awareness of multimedia data will allow specialized functions to be performed on them. SQL Server 2008 can be a data storage backend for different varieties of data: XML, email, time/calendar, file, document, spatial, etc. as well as perform search, query, analysis, sharing, and synchronization across all data types. SQL Server includes better compression features, which also helps in improving scalability. It enhanced the indexing algorithms and introduced the notion of filtered indexes. It also includes Resource Governor that allows reserving resources for certain users or workflows. It also includes capabilities for transparent encryption of data (TDE) as well as compression of backups SQL Server 2008 supports the ADO.NET Entity Framework and the reporting tools, replication, and data definition will be built around the Entity Data Model. SQL Server Reporting Services will gain charting capabilities from the integration of the data visualization products from Dundas Data Visualization Inc., which was acquired by Microsoft. On the management side, SQL Server 2008 includes the Declarative Management Framework which allows configuring policies and constraints, on the entire database or certain tables. The version of SQL Server Management Studio included with SQL Server 2008 supports IntelliSense for SQL queries against a SQL Server 2008 Database Engine. SQL Server 2008 also makes the databases available via Windows PowerShell providers and management functionality available as Cmdlets, so that the server and all the running instances can be managed from Windows PowerShell.

Performance Data Collector
Performance Data Collector is one of the new features that’s accompanied from SQL Server 2008. It’s very hard to get performance data from necessary inputs. We will get the data from Perfmon (system monitor), profiler, DMV etc and correlating this data is very hard, implementing the same process or scripts across your environment is also time consuming one. To Overcome this MS has added Performance data collector feature in SQL 2008. In a Nutshell performance data collector will collect performance data (integrating all your data from your server), upload it in centralized management data warehouse (MDW) in relational format and finally allows you to see reports in graphical format. By using this feature you are getting the data in standard format and storing it in relational format, so it will be easy to correlate the data. Moreover it will allow the data to be stored in centralized server so you can query the single server to see reports of all your server in single location


October 2010

    
This feature is available in the following editions of SQL 2008 and SQL 2008 R2 Datacentres (only for R2) Enterprise Standard Web Workgroup

Data Collector
Before we stepping into configuring Data collector service, we need to configure a centralized server to store these data. Let’s configure the centralized server no Connect to the server, Expand Management folder and right click on “Data Collection” and click on “Configure Management Data Warehouse

Initialization Process

Configuring Centralized Server for Data Collector

Click next on the welcome screen

In this window you have the option for configuring the centralized server. Select “ Create or upgrade a management data warehouse “ option and click “next”

In this window it will choose your local server as centralized server and you have the option to select the database. Either you can use the existing database or you can create a new one. To create new database click on new button, a new database creation window will be popped up.

In this window you will be providing necessary permissions to the logins to view or modify data. You can click on individual login and select the role for that login and click ok. It’s not mandatory to set the permissions now you can also set it later.


October 2010

Role Name mdw_admin mdw_reader mdw_writer

Role Description Has both reader and writer permissions Provides read access only to view reports Provides permission to modify and upload data to MDW

At last it will show the summary description , if you find everything correct then click on finish to configure the centralized data warehouse server. Version Details Captured

Configuring Data collector in instance Connect to the server, expand management folder and right click on “Data Warehouse” as shown above. Now it’s time to configure data collector at instance level since centralized server is configured and ready to accept data. Pass the welcome screen. Select "Set up data collection” in this window to configure data collector. It will capture the following details into the DB

SQL Server 2008

  

Disk Usage Query Statistics Server Activity Disk Usage Query Statistics Server Activity Utility Information

SQL Server 2008 R2

   

Once information is provided you will be shown with the summary details of the configuration you have chosen. If you found it’s correct just click on Finish button In this window select the centralized server and the data warehouse db. In this case it’s SAGARLAPTOP and Data Collection database. You can find one more option here and it’s cache directory, this will allow the data to be cached to the folder and uploading it later. Data collector works in two modes as follows

Reference SQL SERVER 2005 students guide—NIIT


-By K.Gautam(3rd yr,CSE)

So you have finally worked your way past all the Network jargons of Ip addresses, SSIDs, access points…etc. and got your Wi-Fi network up and running, now you may think you are in the clear but you are far from it unless you have set up some sort of security on your wireless network. So here is a list of a few techniques that hackers use to get into your wireless network, and how to safeguard yourself.

1. Sniffing
This is the most simple of all the attacks, simply put an unsecured wireless network can be easily intercepted and the attacker can easily obtain almost all of your information. This is mainly caused by people with “This won’t happen to me” attitude.

The solution: The simplest attack has the simplest solution; just make sure you secure your network with some sort of encryption and a password.


So you’ve setup your Wi-Fi network you may notice that the computer no longer asks which network to connect to , it just automatically connects .This very convenient feature is the basis of the spoofing attack . Hackers often attack a wireless network by simply creating a new network with a stronger wireless signal and a copied SSID (Access point name) in the same area as a legitimate network. This causes unsuspecting computers to automatically connect to the spoofed network instead of the real one.

3. Encryption Cracking
Conclusion This the most difficult attack , hackers try to crack your wireless network password by a combination of different techniques ,and as encryption keys become more advanced, hackers also increase their skills and develop new tools for penetrating even well protected wireless networks. There are numerous ways to crack a wireless network’s encryption, but even simplistic methods can work. The website WPA Cracker, for example, can be used to hit a network with a brute force dictionary attack that simply throws random words at a secured wireless network to try and crack it. This method can take a long time, and sometimes requires luck on the hacker’s part, but it is often effective

These are the most common methods for hacking into a wireless network, but there are other methods too, And new methods are being found everyday so it’s very difficult to be a 100% safe. That is the bad news; the good news is that unless you happen to be the CEO of a multi-billion dollar Company or the Chief Minister of a state you are very unlikely to be the target of such a sophisticated attempt to hack into your system. But still it’s better to be safe than sorry, so simple steps like using a long encryption key can solve most security situations.

The first step in protecting yourself from this kind of attack is to use WPA encryption or a combination of WPA & AES. WEP, the older encryption technology, has been completely de-constructed by hackers and is now considered quite easy to crack. The second step is to use a long and completely random password / encryption key , these are really hard to remember but are very hard and take a long time to crack. References :
Makeuseof.com Lifehacker.com Wikipedia.org engadget.com


October 2010

By Nitin Goswami (3rd yr., CSE)


loud computing is a model

the internet. Cloud computing providers delivers a common online application which are accessed by other web services. The major cloud service provider Microsoft, Google, sales force ,IBM etc.

for enabling convenient ,on demand network access to a shared pool of resources, such as networks, storage, Applications and services that can be rapidly provisioned and released with minimal management effort or service provider. Cloud computing provides a new supplement , consumption and delivery model for it services based on internet. The term cloud is used as a metaphor for

Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over application programming interfaces, usually web services.

Need for cloud computing

Key features
Agility improves with users' ability to rapidly and inexpensively reprovision technological infrastructure resources. Cost is claimed to be greatly reduced and capital expenditure is converted to operational expenditure. This ostensibly lowers barriers to entry, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained with usage-based options and fewer IT skills are required for implementation (in-house).

To gain a competitive business edge ,small and medium scale enterprises ,which have a work force of 10 to 15 employees or more need to have an it infrastructure that is scalable ,reliable and efficient as that of large scale enterprises. Smes face various issues in terms of cost and knowledge for setting up such a large enterprise network. Therefore ,both smes and large enterprises came up with the solution of new concept of cloud computing.in cloud computing the customer need not have to invest in the physical infrastructure instead they can consume the resources as a service on demand. They can pay only on the usage basis.

Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using (e.g., PC, mobile). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere .

Multi-tenancy enables sharing of resources and costs across a large pool of users thus allowing for:  Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)  Peak-load capacity increases (users need not engineer for highest possible load-levels) Utilization and efficiency improvements for systems that are often only 10–20% utilized. 13

October 2010

Service providers

It offers various cloud computing services that come in form of Google app, which is a saas cloud computing service. Google app provides a fully integrated application environment that enables a user to host their own web application. Google provides following web applications likeGmail for messaging
Caption describing picture or graphic

Gtalk for instant messaging and voice over internet Google docs for document sharing

Reliability is improved if multiple redundant sites are used, which makes well designed cloud computing suitable for business continuity and disaster recovery. Nonetheless, many major cloud computing services have suffered outages, and IT and business managers can at times do little when they are affected.

Scalability via dynamic ("on-demand") provisioning of resources on a fine-grained, self-service basis near real-time, without users having to engineer for peak loads. Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface. One of the most important new methods for overcoming performance bottlenecks for a large class of applications is data parallel programming on a distributed data grid. Maintenance cloud computing applications are easier to maintain, since they don't have to be installed on each user's computer. They are easier to support and to improve since the changes reach the clients instantly. Metering cloud computing resources usage should be measurable and should be metered per client and application on daily, weekly, monthly, and annual basis. This will enable clients on choosing the vendor cloud on cost and reliability (QoS)


October 2010


MS has developed windows azure platform (azure) which is an internet-scale cloud services platform. Subscribing to azure ,a user need not buy the software / applications for developing the customized applications for its customers, thereby reduces the cost. Microsoft also offers cloud applications ready for use by customers such as windows live, Microsoft dynamics, other online services.

Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than under traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. Providers typically log accesses, but accessing the audit logs themselves can be difficult or impossible. Furthermore, the

complexity of security is greatly increased when data is distributed over a wider area and / or number of devices.

Cloud Computing Models

Software as Service
The saas model enables a user to use the software or application as a service on demand by using the internet.

Infrastructure as a service
The iaas model enables a user to use it infrastructure such as hardware, storage, networking as a service. The various service that are provided by iaas are amazon ec2,gogrid etc.

Growth of cloud computing
The paas model enables a user to use a hosting environment for their applications. The various services that are provided by the paas model are AppExchange, Facebook, amazon web services ,windows azure platform and Google app engine.

Platform as a service
Thus ,cloud computing is an emerging technology which is increasing in present scenario that will enable user ,small scale enterprises as well as large scale enterprise to attain a huge profit in terms of cost and infrastructure. Hats why cloud computing is being called as

Next generation computing
Reference: Cloud computing – next generation computing environment student guide.


October 2010

Wireless LAN Security

By Monika(3rd yr,CSE)

MAC Filtering
In computer networking, MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control methodology whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and white lists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a white list entry for each device that he or she would use to access the network. While giving a wireless network some additional protection, MAC Filtering can be circumvented by scanning a valid MAC (via airodump-ng) and then changing the own MAC into a validated one. This can be done in the Windows Registry or by using command line tools on a Linux platform.









and WLANs in particular, involves the need for security. Many early access points could not discern whether or not a particular user had authorization to access the network. Although this problem reflects issues that have long troubled many types of wired networks (it has been possible in the past for individuals to plug computers into randomly available Ethernet jacks and get access to a local network), this did not usually pose a significant problem, since many organizations had reasonably good physical security. However, the fact that radio signals bleed outside of buildings and across property lines makes physical security largely irrelevant to Piggy backers. Such corporate issues are covered in wireless security.

Security Options
There are three principal ways to secure a wireless network. For closed networks (like home users and organizations) the most common way is to configure access restrictions in the access points. Those restrictions may include encryption and checks on MAC address. Another option is to disable ESSID broadcasting, making the access point difficult for outsiders to detect. Wireless Intrusion Prevention Systems can be used to provide wireless LAN security in this network model. For commercial providers, hotspots, and large organizations, the preferred solution is often to an open and unencrypted, but completely isolated wireless network. The users will at first have no access to the Internet nor to any local network resources. Commercial providers usually forward all web traffic to a captive portal which provides for payment and/or authorization. Another solution is to require the users to connect securely to a privileged network using VPN. Wireless networks are less secure than wired ones; in many offices intruders can easily visit and hook up their own computer to the wired network without problems, gaining access to the network, and it's also often possible for remote intruders to gain access to the network through backdoors like Back Orifice. One general solution may be end-to-end encryption, with independent authentication on all resources that shouldn't be available to the public.

www.wardrive.net www.sans.org/reading_room/../wireless-lan-security-issues-solutions_1009


October 2010

Google’s Web Browser
By V.Vinoth, D.Ashok kumar(3rd yr,CSE)

the web browser from Google is touted to be the fastest web browser . It is based on the open source Chromium project . It uses the Web kit Layout engine and the V8 JavaScript engine . The first public stable release was on 11 December 2008. Today chrome is the third most widely used web browser after Firefox.


Chrome was assembled from 25 different code libraries from Google and third parties such as Mozilla's Netscape Portable Runtime, Network Security Services, NPAPI, as well as SQLite and a number of other open-source projects. The JavaScript virtual machine was considered a sufficiently important project to be split off. Chrome was one of the first browsers to include support for HTML 5.

Tabs and Stability
Chrome is a process based web browser, i.e. each tab open as an individual process, so if one of the tabs crash the whole widow does not crash and the other tabs can remain working

Incognito Mode:
Chrome is one of the few browsers in which the private browsing mode is totally separate from the normal mode operation. Both windows can be simultaneously used and they operate separately. Incognito is the private browsing mode, where all records like history, downloads , etc. are not saved not beyond the current session.

Chrome will show you a warning message when visiting a site that is suspected of containing malware or phishing. A phishing attack takes place when someone masquerades as someone else to trick you into sharing personal or other sensitive information with them, usually through a fake website. Malware, on the other hand, is software installed on your machine often without your knowledge, and is designed to harm your computer or potentially steal information from your computer. Sandboxing helps prevent malware from installing itself on the computer or using what happens in one browser tab to affect what happens in another. The sandbox adds an additional layer of protection to your browser by protecting against malicious web pages that try to leave programs on your computer, monitor your web activities, or steal private information from your hard drive Automatic web page translation Starting with Google Chrome 4.1 the application added a built-in translation bar using Google Translate. Translation is currently available for 52 languages

Reference :
http://www.google.com/chrome . http://chrome.blogspot.com/ http://en.wikipedia.org/wiki/ Google_Chrome

Omni bar
This is one of the best features if chrome , instead of having a separate box for searching and for the URL , chrome combines both for usability and speed.


October 2010

Computer Security
By Akash Goswami(3rd yr,CSE)

It is a dangerous world, even for the computers that sit in our offices. Bad things can happen. Some bad things happen because computers are pieces of machinery. Parts can break, wear out, choke on dust and dirt, or simply quit working for mysterious reasons. That’s why the smart computer user frequently backs up all the critical data on the hard drives. Programs can be reinstalled, but membership lists, financial records, congregation council minutes, and other data have to be saved in several places to avoid disaster. Computers are pieces of machinery, and they will fail.

Viruses Spam and More
But there are other threats to church computers. Consider this. Your church council secretary rushes in one hour before the monthly meeting. “I didn’t have time to print out the minutes,” he says, pulling a floppy disk out of his pocket. “And I need to make one final correction.” He inserts the disk into the church’s computer and finishes the work so that the council can have the corrected minutes. The next morning the office secretary turns on the computer. The disk drives whirr and whirr, but nothing comes up on the screen. Or she boots the computer, calls up the monthly income report and the computer shuts down, displaying the dreaded “blue screen of death” with the message “unable to retrieve

BX316.dll. Fatal operation error.” A virus has wormed its way from the council secretary’s disk to the church’s computer. Here’s another problem scenario. This time the disk inserted by the council secretary isn’t infected. But after saving the minutes, he decides to do a little web surfing while waiting for the printout. He checks the trash pickup days at the town’s Web site, then follows a link about recycling. This leads him to a couple of additional sites. Then he signs off, after sending a quick e-mail to a colleague at work about tomorrow’s luncheon meeting. Before long, the church’s e-mail inbox is crammed with spam; strange, offensive, and unwanted missives from places with weird names. One more horror story. The financial secretary checks the spread sheet showing the income for

the past month and leaves the computer on. Someone else walks by and finds the giving records of members displayed on the screen. The temptation is strong to scroll through and see just whether Mrs. Hobson is as generous as she says she is. Casual use of church computers can destroy information, get the church on spammers’ lists, and create pastoral problems.


October 2010

How to Protect
It is not hard to protect church computers from most of these problems. Access to the computers must be restricted. Secretaries and others authorized to use the church computers should be required to sign on with passwords and instructed not to let anyone else use their password. “Drop-in” use by church officers or members should be prohibited, unless the church has a separate computer for that purpose, not linked with any critical office machine. Computers that are online should be protected with a “firewall” that offers some protection against known viruses and “worms” that hide in e-mail and on internet sites. Norton Utilities® and similar programs can keep out many viruses; but the programs must be purchased, installed, and maintained to keep the list of virus infections updated. This usually requires an annual subscription. If it is necessary to insert a “foreign” disk in a church computer, it should be scanned by Reference:
http://en.wikipedia.org/wiki/Computer_security http://www.unixtools.com/security.html http://communications-solutions.com/security/computer-security-guide

an anti-virus program first to make sure it is not infected. Everyone who uses church computers should be instructed to avoid casual Web surfing. Build a list of necessary sites — the ELCA and synod Web sites, local agencies, and other places useful to the congregation’s work and known to be safe to visit. Enforce the no-surfing policy. There are numerous stories about occasions when people embarrassed themselves, their employers, and their churches by inappropriate use of the computer. You might want to install a filter or program that monitors online usage to spot potential problems. Access to critical and confidential data should be protected by a double password, and all authorized users should be instructed on how to access the data without inadvertently leaving it open to others. If churches use “servers” to store data and make it accessible from several sites, you might need the advice of a computer specialist to protect the

server from unauthorized use. There is a dark side to computer security, for it means that we have to think about whether church computer users will do unacceptable or dangerous things. We don’t like to operate on the basis of suspicion. But the goal of computer security is to protect the church’s equipment and data and preserve the confidentiality of necessary records. Churches should develop a policy on who uses their computers and for what reasons. This can protect data from viruses and other encroachments and avoid the serious problems that can occur if someone uses the church computer for unauthorized purposes


October 2010

By sumit banerjee (be.cse.3rd yr)

Application of VR The range of possible VR application is vast and varied. Here are just a few example of projects carried out recently in development at the CRVM Industrial application -Design studies -computer Aided design -Ergonomic validation Research application -Behavioral sciences: modeling human behavior by manipulating sensory information. -psycho-pharmacological research Teaching Applications -Teaching and learning aids: visualization and virtual exploration of our solar system, virtual reconstruction and visits of ancient architectural sites. -scientific visualization Therapeutic application -Cyber-therapy: treatment of phobias, depression, anxiety where patient are kept in virtual environment to relax there brain. -Motor-therapy through sport: Virtual squash where the ball speed is matched to the patient’s disability.

The word virtual refers to not being real it’s the presentation of reality or imagination. Previously it was only the part of people’s thinking but as the development of the technology virtuality took the wide part in creation & development of what that really exist in world or only in imagination.

Virtual reality (VR) it’s a term or technology that basically defined as computerized simulated environment that can simulate places in the real as well as imaginary worlds. Two major aspects of VR are: 1) Visualization is immersive, since the goal is to give the User the sensation of being really in virtual world. 2) The user is able to interact in “real-time” with this environment. User can interact with a virtual environment either through the use of standard input devices such as a keyboard and mouse or through multimodal devices such as

Terms supporting virtual reality
There are many devices that are use for virtual sensation like 3D visualization, holography, virtual caves, etc.

3D visualization
The 3D visualization can be more easily understand by taking 3D films in account. A 3D film or S3D (stereoscopic 3D) film is a motion picture that enhances the illusion of depth perception. Derived from stereoscopic photography, a special motion picture camera system is used to record the images as seen from two perspectives and special projection hardware and/or eyewear are use to provide the illusion of depth when viewing.


October 2010


Technique used in 3D view
Anaglyph images were the earliest method of presenting theatrical 3D. Now polarization system is used to present a stereoscopic motion picture, here two images are projected superimposed onto the same screen through different polarizing filters. The viewer wears eyeglasses which also contain a pair of polarizing filters oriented differently. As each filter passes only that light which is similarly polarized and blocks the light polarized differently each eye sees a different image. Since no head tracking is involved, the entire audience can view the stereoscopic images at the same time

New system without glasses
There is increasing emergence of new 3D viewing systems which do not require the use of special viewing glasses. They are referred to As Auto stereoscopic LCD displays.

A lifelike visual display is created by projectors positioned outside the cave and controlled by physical movements from a seer inside the cave. Stereoscopic LCD shutter glasses convey a 3D image. The computers rapidly generate a pair of images, one for each of the user’s eye. The glasses are synchronized with the projectors so that each eye only sees the correct image.

It is a technique that allows the light scattered from an object to be recorded and later reconstructed so that it appears as if the object is in the same position relative to recording medium as it was when recorded. The image changes as the position and orientation of the viewing system changes in exactly the same way as if the object were still present, thus making the recorded image appears three dimensional. It has a wide range of application.

VR caves
It is an immersive virtual reality environment where the projectors are directed to three, four, five or six of the walls of a roomsized cube where a viewer contemplates perception, reality and illusion.


The caves are currently being used in a variety of fields. -many engineering companies use CAVEs to enhance product development. -prototype of parts can be created and tested -Factory layout can be simulated -In gaming

Visual effect
Visual effects (commonly shortened to Visual F/X or VFX) are the various processes by which imagery is created and/or manipulated outside the context of a live action shoot. Visual effects often involve the integration of live-action footage and computer generated imagery (CGI) in order to create environments which look realistic, but would be dangerous, costly, or simply impossible to capture on film. They have become increasingly common in big-budget films, and have also recently become accessible to the amateur filmmaker with the introduction of affordable animation and compositing software.


October 2010


Chroma key compositing
Chroma key compositing (or Chroma keying) is a technique for compositing two images or frames together in which a color (or a small color range) from one image is removed (or made transparent), revealing another image behind it. This technique is also referred to as color keying, color-separation overlay (CSO; primarily by the BBC), green screen, and blue screen. It is commonly used for weather forecast broadcasts, wherein the presenter appears to be standing in front of a large map, but in the studio it is actually a large blue or green background. The meteorologist stands in front of a blue screen, and then different weather maps are added on those parts in the image where the color is blue. If the meteorologist himself wears blue clothes, his clothes will become replaced with the background video. This also works for green screens, since blue and green are considered the colors least like skin tone. This technique is also used in the entertainment industry, the iconic theatre shots in Mystery Science Theater 3000, for example

Virtual world
A virtual world is a genre of online community that often takes the form of a computerbased simulated enviro nment , t h ro u gh which users can interact with one another and use and create objects .Virtual worlds are intended for its users to inhabit and interact, and the term today has become largely synonymous with interactive 3D virtual environments, where the users take the form of avatars visible to others graphically. These avatars are usually depicted as textual, two-dimensional, or three-dimensional graphical representations, although other forms are possible (auditory and touch sensations for example). Some, but not all, virtual worlds allow for multiple users. The computer accesses a computer-simulated world and presents perceptual stimuli to the user, who in turn can manipulate elements of the modeled world and thus experien ces telepresence to a certain degree. Such modeled worlds may appear similar to the real world or instead depict fantasy worlds. The model world may simulate rules based on the real world or some hybrid fantasy world. Example rules are gravity, topography, locomotion, real -time actions, and communication. Communication between users has ranged from text, graphical icons, visual gesture, sound, and rarely, forms using touch, voice command, and balance senses. Massively multiplayer online games commonly depict a world very similar to the real world, with real world rules and real-time actions, and communication. Players create a character to travel between buildings, towns, and even worlds to carry out business or leisure activities. Communication is usually textual, with real-time voice communication using VOIP also possible. Virtual worlds are not limited to games but, depending on the degree of immediacy presented, can encompass computer conferencing and text based chat rooms. Sometimes, emoticons or 'smiles' are available, to show feeling or facial expression. Emoticons often have a keyboard shortcut. Edward Castro nova is an economist who has argued that "synthetic worlds" is a better term for these cyberspaces, but this term has not been widely adopted. A lifelike visual display is created by projectors positioned outside the cave and controlled by physical movements from a seer inside the

cave. Stereoscopic LCD shutter glasses convey a 3D image. The computers rapidly generate a pair of images, one for each of the user’s eye. The glasses are synchronized with the projectors so that each eye only sees the correct image.


October 2010


Virtual world concepts
One perception of virtual worlds requires an online persistent world, active and available 24 hours a day and seven days a week, to qualify as a true virtual world. Although this is possible with smaller virtual worlds, especially those that are not actually online, no massively multiplayer game runs all day, every day. All the online games listed above include downtime for maintenance that is not included as time passing in the virtual world. While the interaction with other participants is done in real-time, time consistency is not always maintained in online virtual worlds. For example, Ever Quest time passes faster than real-time despite using the same calendar and time units to present game time. As virtual world is a fairly vague and inclusive term, the example). Massively multiplayer online real-life games or MMORLGs, the user can edit and alter their avatar at will, allowing them to play a more dynamic role, or multiple roles.

above can generally be divided along a spectrum ranging from: Massively multiplayer online role -playing games or MMORPGs where the user playing a specific character is a main feature of the game (World Of War craft for

Virtual worlds are well-known as being fantasy spaces sealed off from the real world, but more careful analysis reveals that the boundaries between the real and virtual worlds are quite porous. Reference :
http://virtualityconference.it/ http://en.wikipedia.org/wiki/Virtual_reality

Do You Know?
1. The human heart creates enough pressure while pumping to squirt blood 30 feet. 2. On average people fear spiders more than they do death. 3. The strongest muscle in the body is the TONGUE. 4. it’s impossible to sneeze with your eyes open. 5. Americans on the average eat 18 acres of pizza every day. 6. Did you know that you are more likely to be killed by a champagne cork than by a poisonous spider? 7. Right-handed people live, on average, nine years longer than left-handed people do. 8. In ancient Egypt, Priests plucked EVERY hair from their bodies, including their eyebrows and eyelashes. 9. The dot on top of the letter 'i' is called a tittle. 10. A "hairbreadth away" is 1/48 of an inch. 11. The word four has four letters. In the English language there is no other number whose number of letters is equal to its value. 12. The king of hearts is the only king without a moustache. 13. No piece of square dry paper can be folded more than 7 times in half. 14. A crocodile cannot stick its tongue out.

15. The ant can lift 50 times its own weight, can pull 30 times its own weight and always falls over on its right side when intoxicated. 16. Polar bears are left handed. 17. The catfish has over 27,000 taste buds, that makes the catfish rank #1 for animal having the most taste buds. 18. The flea can jump 350 times its body length, that is like a human jumping the length of a football field. 19. Butterflies taste with their feet. 20. It is impossible to sneeze and keep ones eye's open at the same time. 21. Elephants are the only animals that can't jump. 22. A cat's urine glows under a black light. 23. An ostrich's eye is bigger than it's brain. 24. Cockroaches can change course as many as 25 times in one second, making them the most nimble animals known. 25. Mosquitoes do not bite. They stab. A mosquito has no jaws, hence when attacking a victim; it pierces it with its long proboscis and sucks the blood up through its nasal tube. 26. Starfishes haven't got brains.

By Monika (1st yr,CSE)

October 2010


-by Mallica(3rd yr,CSE)

Can you find four numbers such that the sum of every two and sum of all four may be perfect squares? 2. A cubic object 3"*3"*3" is painted blue on all the outside cubic surfaces ,including the top and bottom .if the cube is cut into 27 cubes of 1"*1"*1".how many 1" cubes do have any painted surfaces? 3. How can you make a total of 1,000 by using sixteen 4's? 4. The shape shown in sketch below is a square attached to half of another similar square ,divided diagonally:

5. How will you write 31 using only digit 3 five times? 6. A man decided to drive through the city and on the first day he did only 7 miles. On the last day he did 51 miles ,increasing his journey 4 miles each day. How many days did he travel and how far? 7. Which would you say is heavier, a pound of cotton or a pound of gold? 8. There is a number which is very peculiar, this number is three times the sum of its digits .Can you find the number? 9. There is a number ,the second digit of which is smaller than its first digit by 4,and if the number was divided by the digit's sum ,the quotient would be 7. What will be the number? 10. There is a number which is greater than the aggregate of its third, tenth and twelth parts by 58.Find the number?

Nine-tenths of a gig, Biggest ever seen, God, this program is big-MS Word 15! Comes on ten CDs, And requires--damn! Word is fine, but jeez-60 megs of RAM?! Oh! Microsoft, Microsoft, Bloat ware all the way! I'm installing Word Since breakfast yesterday! Oh! Microsoft, Microsoft, Moderation, please. Guess you hadn't noticed: Four-gig drives don't grow on trees!

The Simplifier
Chorus:Am happy that you came into my life, You made my world very bright; I don’t think I can ever live with out you, Because you’re the backbone of my life; Stanza 1:You may not be the greatest by looks, But you are the most stunning creation; You may not be as strong as the Hercules, But you can solve the Herculean problems; Stanza 2:You are the Centre point of my work; You are a citizen of the world; Every one loves you very much, As you simplify the problems of their world; Stanza 3:These days you’ve even started to think by yourself, Scaling new heights every now and then; I know it’s not hard to compete with you, But now I am in love with you; - Venkateshwar.R (3rd yr, CSE)

-by NitinGoswami(3rd yr, CSE)


October 2010

Secret of Fast Maths

By NitinGoswami(3rd yr,CSE)

(Lea rn how to ca lcu lat e f ast er tha n t he spe edin g c alc ula tor )

"Is there an easy way to calculate ? "
I am sure you must have asked this question at least once in your life . Have you ever wondered why some people are so good at number crunching while others find it difficult to add even single di gits correct ly or without straining their mind.

Just Relax and Cheer Up !!
Today I am about to tell you the Secret of Fast er Maths. I will teach you some of the Easy Calculation Tricks of fast er Math. It's a well known fact that the Human Brain i s v ery similar to a computer.

B ra i n Mind

=Hardware of computer. Comparable to CPU. =Software. Comparable to an Operatin g System (like windows XP, Linux or whichever you find best) Our mind needs various drivers ( programs ) to run its various faculties. Those are stored in our memory. Some brains come right out of the pack with correct p rograms in stalled. Thus they can crunch the numbers at optimum speed. Now you must be getting eager to ask " What about the brain that didn't come with the right program installed ? " Relax !! The solution is very easy. You just have to update the brain once . That's it.

Tips for fast Mathematics
Quick Square If you need to square a 2 digit number ending in 5, you can do so very easily with this trick. Multiply the first digit by itself + 1, and put 25 on the end. That is all! 252 = (2x(2+1)) & 25 2x3=6 625 Multiply by 9 This one is simple – to multiple any number between 1 and 9 by 9 hold both hands in front of your face – drop the finger that corresponds to the number you are multiplying (for example 9×3 – drop your third finger) – count the fingers before the dropped finger (in the case of 9×3 it is 2) then count the numbers after (in this case 7) – the answer is 27. Multiply up to 19x19 in you head This is a useful bit of mental arithmetic that is worth remembering, it allows you multiply up to 19 x 19 without the use of a calculator or paper and pencil. For example consider 19 x 17. Imagine the larger number on the top row and take the last digit of the lower number ie. 7 and add it to 19. 19 + 7 =26. Multiply the 26 x 10 = 260.Take the unit digits (9 x 7) = 63 and add them to the 260 260 + 63 = 323.

Multiplication of Larger Numbers

This trick allows you to multiply large numbers together by using simple multiplication and additions. To take a simple example, if we want to multiply 26 by 72. We write the numbers down in the normal way. 26 72 Each of the numbers can be thought of being in one of four cells arranged in a square.

2 7

6 2

The first step is to multiply the digits in the first column. (6 x 2 = 12) If there it is greater than 9 remember the value of the tens digits. In this case write down the 2 and remember the 1. Multiply the two diagonals and add them together. So from the top left to the bottom right and the bottom left and top right. (2 x 2) + (6 x 7) = 4 + 42 = 46. Add the from the last stage = 47. So we write the 7 and remember the 4. Finally we multiply the right hand column. (2 x 7) = 14 and add the 4 from the last step. = 18. Our answer is then 1872.


October 2010

Assorted Multiplication Rules
Multiply by 5: Multiply by 10 and divide by 2. Multiply by 6: Sometimes multiplying by 3 and then 2 is easy. Multiply by 9: Multiply by 10 and subtract the original number. Multiply by 12: Multiply by 10 and add twice the original number. Multiply by 13: Multiply by 3 and add 10 times original number. Multiply by 14: Multiply by 7 and then multiply by 2 Multiply by 15: Multiply by 10 and add 5 times the original number, as above. Multiply by 16: You can double four times, if you want to. Or you can multiply by 8 and then by 2. Multiply by 17: Multiply by 7 and add 10 times original number. Multiply by 18: Multiply by 20 and subtract twice the original number (which is obvious from the first step). Multiply by 19: Multiply by 20 and subtract the original number. Multiply by 24: Multiply by 8 and then multiply by 3. Multiply by 27: Multiply by 30 and subtract 3 times the original number (which is obvious from the first step). Multiply by 45: Multiply by 50 and subtract 5 times the original number (which is obvious from the first step). Multiply by 90: Multiply by 9 (as above) and put a zero on the right. Multiply by 98: Multiply by 100 and subtract twice the original number. Multiply by 99: Multiply by 100 and subtract the original number.

Number magic:
Trick 1: Number below 10 Step1: Think of a number below 10. Step2: Double the number you have thought. Step3: Add 6 with the getting result. Step4: Half the answer, that is divide it by 2. Step5: Take away the number you have thought from the answer, that is, subtract the answer from the number you have thought. Answer: 3 Trick 2: Any Number Step1: Think of any number. Step2: Subtract the number you have thought with 1. Step3: Multiply the result with 3. Step4: Add 12 with the result. Step5: Divide the answer by 3. Step6: Add 5 with the answer. Step7: Take away the number you have thought from the answer, that is, subtract the answer from the number you have thought. Answer: 8 Trick 3: Any Number Step1: Think of any number. Step2: Multiply the number you have thought with 3. Step3: Add 45 with the result. Step4: Double the result. Step5: Divide the answer by 6. Step6: Take away the number you have thought from the answer, that is, subtract the answer from the number you have thought. Answer: 15 Trick 4: Same 3 Digit Number Step1: Think of any 3 digit number, but each of the digits must be the same as. Ex: 333, 666. Step2: Add up the digits. Step3: Divide the 3 digit number with the digits added up. Answer: 37 Trick 5: 2 Single Digit Numbers Step1: Think of 2 single digit numbers. Step2: Take any one of the number among them and double it. Step3: Add 5 with the result. Step4: Multiply the result with 5. Step5: Add the second number to the answer. Step6: Subtract the answer with 4. Step7: Subtract the answer again with 21. Answer: 2 Single Digit Numbers. Trick 6: 1, 2, 4, 5, 7, 8 Step1: Choose a number from 1 to 6. Step2: Multiply the number with 9. Step3: Multiply the result with 111. Step4: Multiply the result by 1001. Step5: Divide the answer by 7. Answer: All the above numbers will be present. Trick 7: 1089 Step1: Think of a 3 digit number. Step2: Arrange the number in descending order. Step3: Reverse the number and subtract it with the result. Step4: Remember it and reverse the answer mentally. Step5: Add it with the result, you have got. Answer: 1089 Trick 8: x7x11x13 Step1: Think of a 3 digit number. Step2: Multiply it with x7x11x13. Ex: Number: 456, Answer: 456456 Trick 9: x3x7x13x37 Step1: Think of a 2 digit number. Step2: Multiply it with x3x7x13x37. Ex: Number: 45, Answer: 454545


October 2010

-By v.vignesh pandian (2nd yr, CSE)

Boot Winxp Fast
Follow the following steps: 1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\ 2. From the Start menu, select "Run..." & type "gpedit.msc". 3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window. 4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open". 5. Click "OK", "Apply" & "OK" once again to exit. 6. From the Start menu, select "Run..." & type "devmgmt.msc". 7. Double click on "IDE ATA/ATAPI controllers" 8. Right click on "Primary IDE Channel" and select "Properties". 9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK". 10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9. 11. Reboot your computer.

How to see hidden files ,using dos?
solution: at command prompt just type dir /ah if the list is too long u can use dir /ah/p/w

How to backup registry?
solution: Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state.

How to kill microsoft instant messenger?
solution: This will remove Microstufts Instant Messenger (MSN). This wotked in WinXP Pro, but may work on others.... So, go to START-->RUN copy and paste the following: QUOTE RunDll32 advpack.dll,LaunchINFSection %windir% \INF\msmsgs.inf,BLC.Remove Clink ok. No more msn process lwink.gif.

How to Export Registry Keys?
Click Start, and then click Run. In the Open box, type regedit, and then click OK. On the File menu, click Export. In the Save in box, select the boxs at the bottom the bottom according to weather you want to export all or only selected branches of the registry. Next select a location in which to save the backup .reg file. In the File name box, type a file name, and then click Save.

How to fix corrupted files in xp?
solution: + Place the xp cd in your cd/dvd drive + Go to start + run + type in 'sfc /scannow' (without the ') Now it should all load, and fix all your corrupted file on windows XP :)==


October 2010


1..The smallest nos are: a=10430,b=3970,c=2114,d=386 a+b=10430+3970=14400=1202 a+c=10430+2114=12544=1122 a+d=10430+386=10816=1042 b+c=3970+2114=6084=782 b+d=3970+386=4356=662 c+d=2114+386=2500=502 a+b+c+d=10430+3970+2114+386=16900=1302 2. Only one box in the very centre of the stack will not suffer the strokes of paintbrush, where as all the other 26 boxes will have atleast painted one side of the boxes.

3 5 7 on 8 9 the most widely accessed network a tasty snack used to collect data about a user a web page a service that allows individuals with accounts to send messages to each other a service that lets you upload and download files from one computer to another using the internet a security system which keeps out unwanted users and viruses a network that is used by an organization and can only be accessed by certain people an elarged form on the intranet that gives more levels of access to authorized peoples a service which collects data about consumers for marketing purposes illegally copying/ distributing programs

1 for example: http:// www.hwdsb.on.ca/ 2 the ettiquette that is followed when using a network 4 the terms of service that state the safety of your personal info. 6 the transmitting and receiving of data 10 a service that allows you to log on to another server 11 a service which handles the passing of pages between the web 13 a person in which goes into other files and accounts without the permission of the user 16 a bug in the computer that can destroy files and data

3. This can be solved as444+444+44+44+4+4+4+4+4+4

4. Divide the fig in 12 equal triangles as shown below-

12 14 15 17 18

5. 33+33+3/3

-By V.K.Preeti(3rd yr,CSE)

6 . 384 miles in 12 days. 7. A pound of cotton is heavier than a pound of gold. Because cotton is 16 ounces and gold is 12 ounce 8. The number is 27. 2+7=9,9*3=27 9. The number is 84 10. The number is 120.


October 2010

Vels University School of Engineering Department of computer science Engineering
Student’s participation in symposium/workshop/seminar (2010-2011)

Preeti V.K

Year & Events participatSection ed
III Year Contraption

Deus Ex Machina (Velammal Engineering College) Orbitce 2K10(SSN College) Drestein(Saveetha Engineering College) Dresteing(Saveetha Engineering College) A.M.S College of Engineering Drestein(Saveetha Engineering College) Drestein(Saveetha Engineering College)


Prizes won

Ist 01.09.10

Junkyard wars,Adzap,Dumb c,Treasure hunt. Contraption



v.vignesh pandian vignesh pandian, Ajay Benny II Year

Code Obfuscation, Reconstromania Treasure hunt Adzab





K.Gautham V.Vinoth D.Ashok Kumar D.Ashok Kumar, V.Vinoth, K.Devarajan K.Gautham, S.Mallica, Nitin Goswami Nitin Goswami Mallica

III year III Year

Photoshop Answer the sphinx, d-bug, photoshop

09.09.10 08.09.10

Ist --

III Year

.Net Live

Microsoft(Summer Camp) Organised by Microsoft Chennai

III Year

Microsoft Student Partner

Cleared Two levels, Conducted by Microsoft Chennai


October 2010

S.Barath kumar M.Jothi bash D.Dinesh P.Chandru N.Veeramani G.Praveen kumar S.Santosh kumar

Year & section
II year cse

Events participat- Date ed
Coding , debugging Coding Coding Coding Coding ,Gaming Coding ,Gaming Coding , debugging 10-08-09 & 11-08-09

Technocracy -09 (National level symposium) Satyabama university, Chennai

Prizes won

II year CSE

10-08-09 & 11-08-09 03-03-10

K.Gautam Vinod Ashok Venkateswar Preethi K.Gautam V.Vinoth Gautam kumar S.Mallica Nitin Goswami Devarajan Ashok kumar Vinoth vetrivel Preethi Monika Sinha Akash Goswami


Debugging, Adzap, Gaming Real-time Engineering Microsoft Dreams Park Yathra

Technocracy -09 (National level symposium) Satyabama university, Chennai Meenakshi Sundararajan Engineering College Anand institute of higher Technology Saveetha Dental College





K.Gautam V.Vinodh Nitin Goswami Vijayakumar Nitesh Ranjan Vijay Vignesh Jageerthan NiginRaj Harshit dubey Lokesh


ICT Awareness Camp Gaming Paper Presentation Treasure Hunt Computer skills Paper Presentation 09-04-10 09-04-10 09-04-10 09-04-10

Science City Chennai Anna university Symposium Pravesha 20x Pravesha 20x Pravesha 20x Pravesha 20x Sakthi mariamman Engg III I III


October 2010

Vels University School of Engineering Department of computer science Engineering
Student’s participation in symposium/Conference/Workshop/Seminar (July 2009-April 2010)

Name K.Gautam V.Vinoth Nitin Goswami Vijayakumar Nitesh Ranjan Vijay Vignesh Jageerthan NiginRaj Harshit dubey Lokesh

Year & section II CSE

Events participated ICT Awareness Camp Gaming Paper Presentation Treasure Hunt Computer skills Paper Presentation Paper Presenation

Date 17.03.10 to 19.03.10

venue Science City Chennai Anna university Symposium Pravesha 20x Pravesha 20x Pravesha 20x Pravesha 20x Sakthi mariamman Engg

Prizes won Seminar


I III ----III ---

09-04-10 09-04-10 09-04-10 09-04-10 10-04-10


October 2010

Vels University School of Engineering Department of computer science Engineering
Student’s participation in symposium/Conference/Workshop/Seminar ( July 2010-Till Date )

Preeti V.K

Year & Section
III Year

Events participated
Contraption Junkyard wars,Adzap,Dumb c,Treasure hunt. Contraption

Deus Ex Machina(Velammal Engineering College) Orbitce 2K10(SSN College) Drestein(Saveetha Engineering College)


Prizes won

01.09.10 08.09.10 08.09.10 16.09.10 09.09.10 08.09.10 Ist --Ist --

v.vignesh pandian vignesh pandian, Ajay Benny K.Gautham V.Vinoth D.Ashok Kumar D.Ashok Kumar, V.Vinoth, K.Devarajan K.Gautham, S.Mallica, Nitin Goswami Nitin Goswami Mallica Gautam

II Year III year III Year

Code Obfuscation, Reconstromania Treasure hunt Adzab Photoshop Answer the sphinx, d-bug, photoshop

Dresteing(Saveetha Engineering College) A.M.S College of Engineering Drestein(Saveetha Engineering College) Drestein(Saveetha Engineering College)

III Year

.Net Live

Microsoft(Summer Camp) Organised by Microsoft Chennai Cleared Two levels, Conducted by Microsoft ,Chennai Seventh Sense SRM University Seventh Sense SRM University Seventh Sense SRM University Seventh Sense SRM University


Microsoft Student Partner Black hole Weblogic

23.09.10 23.09.10

I prize

Nitin,mallica, vinoth,Monika Vels CSE Team


Treasure Hunt Overall winners

23.09.10 23.09.10

I prize III Prize (Have won more than Rs.10,000)


October 2010

Vels University School of Engineering Department of computer science Engineering
Student’s participation in symposium/Conference/Workshop/Seminar (July 2009-April 2010)

Students Participation in Sports related Activities

NAME Shalini Sowmya Nisha Sreevidhya Khusboo Ravishankar Naresh Prasanth Divyan

EVENT Throwball Throwball Throwball Throwball Throwball Basket ball Basket ball Basketball,Volleyball Basketball,Volley ball

VENUE Vels university Vels university Vels university Vels university Vels university Vels university Vels university Vels University Vels University


October 2010

Vels University School of Engineering Department of Computer Science Engineering Journal and conference Publications

International journals – Referred
 N.Bhalaji, P.Gurunathan, Dr.A.Shanmugam, “Study of unicast Manet Routing Protocols under Variable bit rate scenario” to appear in International journal of Recent Trends in Engineering, Volume 3, May 2010. ISSN 1797-9617. (INSPEC, EBSCO, DBLP, ULRICH, EI Compendex, Google) N.Bhalaji, Dr.A.Shanmugam “Reliable Routing against selective packet drop attack in DSR based MANET” in Journal of Software, Vol. 4, No. 6, August 2009. pp 536-543. ISSN 1796-217X.(INSPEC,EBSCO,DBLP,ULRICH,EI Compendex, Google Scholar) N.Bhalaji.et.al “Trust Enhanced Dynamic source routing protocol for Adhoc networks” in Proceedings of WASET, Volume 37, January 2009, pp 1074-1079. ISSN 2070-3740. (ISI, Scirus, EBSCO,ULRICH,EI Compendex, DOAJ, Google) N.Bhalaji, Sinchan, Dr.A.Shanmugam “A novel routing technique against Packet dropping attack in Adhoc networks” in Journal of Computer science, USA Volume 4(7), 2008. pp 538-544. ISSN 1549-3636. (IETISI,EBSCO,Scopus,Ulrich,Cabell,DOAJ) N.Bhalaji.et.al “Extended Dynamic Source Routing Protocol for the Non Co-operating nodes in Mobile Adhoc Networks”, in proceedings of WASET, November 2006, Venice, Italy. pp 249-254. ISSN 1307-6884. (Later was published in International Journal of Applied Mathematics and Computer Sciences, Volume 3, 2006. pp 12-17. ISSN 1307-6906. (ISI, Scirus, EBSCO,ULRICH,EI Compendex, DOAJ, Google) N.Bhalaji.et.al “Direct Trust Estimated on demand Protocol for secure routing in Mobile Adhoc Networks”, in International Journal of Computer science and security, Volume 1(5)2008. pp 6-12. ISSN 1985-1553. (DOAJ, Google) N.Bhalaji, Dr.A.Shanmugam “Improved DSR Protocol for the Malicious Nodes in Mobile Adhoc Networks”, In Asian Journal of Information Technology, Volume 7(8), 2008. pp 350-355. ISSN 1682-3915. (ASCI,DOAJ,Google)

 

 

Book Series- Springer (LNCS-CCIS)
 N. Bhalaji, Dr.A.Shanmugam “A Trust Based Technique To Isolate Non-forwarding Nodes In DSR Based Mobile Adhoc Networks” CNSA-2010), July 23-25, Chennai, Communications in Computer and information science, Springer-Verilag, Volume (90),pp.123-131, ISSN: 1865-0929(Print), 1865-0937(Online), DOI: 10.1007/978-3-642-14478-3, ISBN:978-3-642-14477-6 (Print) 978-3-642-14478-3 (Online) (ISI Proceedings, SCOPUS) N. Bhalaji, P.Gurunathan Dr.A.Shanmugam “Performance comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for mobile Adhoc Networks” CNSA-2010), July 23-25, Chennai, Communications in Computer and information science, Springer-Verilag, Volume (90),pp 114-122, ISSN: 1865-0929(Print), 1865-0937(Online), DOI: 10.1007/9783-642-14478-3,ISBN: 978-3-642-14477-6 (Print) 978-3-642-14478-3 (Online) (ISI Proceedings, SCOPUS) N. Bhalaji.et.al “Trust based approach to combat cooperative blackhole attack in Manet” BAIP-2010, March26-27, Trivandrum, Communications In Computer and Information Science, Springer-Verilag, Berlin Heidelberg Volume (70),


October 2010

 

pp 468-474. SCOPUS)

ISSN: 1865-0929(Print), 1865-0937(Online), DOI: 10.1007/978-3-642-12214-9, (ISI Proceedings,

N.Bhalaji, Nandini SundaraRaman, “Natural Disaster Impact Assessment Using Genetic Algorithm” BAIP-2010, March26-27, Trivandrum, Communications In Computer and Information Science, Volume (70) Springer-Verilag, Berlin Heidelberg, pp 521-526. ISSN: 1865-0929(Print), 1865-0937(Online), DOI: 10.1007/978-3-642-12214-9 (ISI Proceedings, SCOPUS)

International conferences - IEEE/ACM
 N.Bhalaji, A.Shanmugam “Association between nodes to Combat Blackhole attack in DSR based MANET” in Proceedings of the Sixth IFIP-IEEE WOCN, April 28-30, 2009, Cairo, pp.403-407,ISBN:978-1-4244-4704-,DOI:10.1109/ wocn.2009.5010 579. (indexed in ACM) N.Bhalaji and A.Shanmugam “Trust Enhanced Extended Dynamic source routing protocol for Adhoc networks” in Proceedings of IEEE-International conference on Emerging trends in computer science, Kamaraj College of engineering and technology, Virudhunagar. , January’09 pp 87-90.(sponsored by IEEE )

International conference- Google
 T. Peer Meera Labbai, N. Bhalaji and V. Rajamani, “Secured on Demand Routing Protocol Against the Critical Nodes in Manet”, International Conference on Global Computing and Communications (ICOGCAC'09), Hindustan Institute of Technology and Science, Chennai. Dec. 09-11, 2009. Pp.10-12. Arun Raaza, N. Bhalaji, AlokV.Kanakeri and P. KrishnaChaitanya “Applications of Beam Steering Antenna in Maritime Communication”, International Conference on Global Computing and Communications (ICOGCAC'09), Hindustan Institute of Technology and Science, Chennai.Dec. 09-11, 2009.Pp.1-3. V.Narasimha Raghavan, N.Bhalaji “ Decentralized Model for Dynamic Creation of Replicas in an Unreliable Peer to Peer System” in Proceedings of 4th International Conference on Computer Science and its Application June 27-30,2006, California,USA.

National Conferences
  N.Bhalaji, Satish babu, Saravanakumar “An Approach towards Resisting Cooperative Blackhole attack in DSR based MANET” in NCCAIT, St.Joseph’s College of Engineering. March 11, 2009. Pp 7-12. N.Bhalaji, S.Karthick, T.Peer meera labbai, “New reliable routing mechanisms by using trust estimation in mobile adhoc network” in NCRTIT’09, Kamaraj College of Engg. And Technology, March 27, 2009. Pp 47 – 52.


October 2010

Vels University School of Engineering Department of Computer science Engineering Staff participation in symposium/Conference/Workshop/Seminar (2009-2010)


Name of the Program
Contemporary Microsoft Technologies

Organized By
ICTACT Academy

April 2’2010



Chair International Conference BAIP 2010 Oracle Training International conference CNSA 2010 Academia Meeting


March 25,262010


Kathiravan N.Bhalaji


July 23’2010 July 25-27’2010

Chennai Chennai

I.Balaji A.Saritha C.Rajesh Kannan


August 14’2010