tag:blogger.com,1999:blog-71980814583956558382024-03-12T20:01:19.041-07:00SEEzer - Aravindhan's BLOGArvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.comBlogger37125tag:blogger.com,1999:blog-7198081458395655838.post-82213342879424953492011-05-17T06:09:00.000-07:002011-05-17T06:09:24.475-07:00Apple iPod Touch 4G Giveaway at Dailytut<a href="http://www.tech2hell.com/2011/05/apple-ipod-touch-4g-giveaway-at-dailytut/">Apple iPod Touch 4G Giveaway at Dailytut</a><br /><br /><h6 class="uiStreamMessage" ft="{"type":"msg"}"><span class="messageBody">a real time give away!!! So dont wait move on and catch them all!!!!<br /><br />Cheers!!!<br /><br />Share it pls!!!<br /></span></h6>Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-3177760401104846662010-06-10T10:20:00.000-07:002010-06-10T10:26:49.022-07:00Social Media -A brief view<strong>Social media</strong> in my view it terms to be a typical platform which brought in together a wide majority of people so that they may share their views on a pubic manner. In reality you might be organizing any grand parties to gather people round the town, but incase if it grew to cover whole world then social media does that job for you. <br />
<br />
Social Media, The term symbolizes many factors but on a whole it’s known to be a medium used to share the users view to everyone round the world. There is no any special reason for the emergence of social media but though a global answer for this is the need of people. The world has embraced the new tools that help thousands interact each day no matter where they are. There are so many merits that come with social media and this is undeniable. However, what many forget are the down sides. All good things will have flaws and the following are insights into the disadvantages of social media. Statistics have shown that young people form the bulk of the fan base when it comes to social media outlets. However, those who are in all kinds of businesses are also avoiding users to further their cause. Let’s discuss about both the high flyers and pitfalls as a detailed sketch.<br />
<br />
So where did the word media raised up. It’s been brought up in different parts of the world in different ways in different forms and serving different culture only with a common notification as information exchange. They were in together called as traditional media. Commonly they include news papers, television, radios and all such mass mediums.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioPd9hGjV-KsQJnLzrPFgFUiSkywM1DANYoGX5enjXnj4KX8z2UbOTjlZU2-ryPc5LzApHet1ywxfTygBLmsVsS_OE1KRNEfL7MITPvuspAOzRjPv5oEwS8GUgzu5Kgkr3hIRh4kmR_Lw/s1600/social-media-icons.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" qu="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioPd9hGjV-KsQJnLzrPFgFUiSkywM1DANYoGX5enjXnj4KX8z2UbOTjlZU2-ryPc5LzApHet1ywxfTygBLmsVsS_OE1KRNEfL7MITPvuspAOzRjPv5oEwS8GUgzu5Kgkr3hIRh4kmR_Lw/s320/social-media-icons.jpg" /></a></div><br />
<strong>RECENT STATISTICS:</strong><br />
<br />
Socialnomics, this past week, released some staggering statistics on the current impact of Social Media. Erik Qualman has done a fine job of compiling the data and its presentation. I think you'd agree with me how amazing some of these statistics are. A few of these include:<br />
<br />
1. 1 out of 8 couples married in the U.S. last year met via social media <br />
<br />
2. Years to Reach 50 millions Users: Radio (38 Years), TV (13 Years), Internet (4 Years), iPod (3 Years)…Facebook added 100 million users in less than 9 months…iPhone applications hit 1 billion in 9 months.<br />
<br />
3. If Facebook were a country it would be the world’s 4th largest between the United States and Indonesia<br />
<br />
Also, a few interesting facts concerning education:<br />
<br />
1. 2009 US Department of Education study revealed that on average, online students out performed those receiving face-to-face instruction <br />
<br />
2. 1 in 6 higher education students are enrolled in online curriculum <br />
<br />
3. Generation Y and Z consider e-mail passé…In 2009 Boston College stopped distributing e-mail addresses to incoming freshmen <br />
<br />
Social media communities enable all types of companies from a simple free lancing unit to a big scale enterprise to connect with their customers in an impactful way. They are a global phenomenon happening in all markets and almost all industries. Here the term global phenomenon refers to the attribute of being published on net as well been watched by millions of users following them. Basically Show and event planners should keep in mind that by allowing exhibitors and attendees to interact with your brand, the opportunity for growth and engagement is tremendous. <br />
<br />
For event handlers:<br />
<br />
In the event industry, social media initiates organizations to build relationships, favorably position their brand and allow for the possibility of an care, support, and exciting experience with their customers. These include social networks, micro-blogs, blogs, podcasts, forums, social review sites, photo/video sharing, discussion boards, widgets and RSS feeds. Forty-eight percent of adults have a MySpace or Facebook account page and over the past few months, approximately five million people joined Twitter each month. The number of adult Twitter users is projected to grow from 12.1 million in 2009 to 18.1 million in 2010. Additionally, women 55+ is the fastest growing demographic for Facebook, reinforcing that it is not just Generations X and Y benefiting from social media usage.<br />
<br />
Show organizers:<br />
<br />
Utilizing a social medium correctly and effectively offers a significant opportunity for show management organizations to communicate with their exhibitors and attendees where they are and where the greatest opportunities for engagement exist. For instance I have got selected to an International conference on computer applications (ICCA) and I was been in touch with them using a social media like FBK.<br />
<br />
<strong>A Perfect Platform to move with:</strong><br />
<br />
An impactful social media plan should always include a listening strategy. In the social media world, listening is just as important as speaking. Listening and speaking is gradually Writing and understanding the Comments received. It is critical to know what is being said about your brand and who is saying it to develop a smart way to respond. There are several social media listening tools that aggregate the data you receive and help you make better sense of it. Some include Google alerts, Twendz, Technorati and Lexicon that allow you to observe how much your key word is being discussed on Twitter and Facebook, as well as monitoring rising links and top blogs.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0KSGLkfjxQjkRgdG-yJTjsw10j5K46gfGBLPBOUf1DygPMZtrgSOTfvjnzq_KY4hlRfQ1duTVaFTcAf70EMRa7Zg7gJO-9Cmrs-DmAVtTn63e4LVwe3GgHbSe0A-5k8cwcT6FJ6KjUUU/s1600/social-media-icons.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" qu="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0KSGLkfjxQjkRgdG-yJTjsw10j5K46gfGBLPBOUf1DygPMZtrgSOTfvjnzq_KY4hlRfQ1duTVaFTcAf70EMRa7Zg7gJO-9Cmrs-DmAVtTn63e4LVwe3GgHbSe0A-5k8cwcT6FJ6KjUUU/s320/social-media-icons.gif" /></a></div><br />
<br />
<br />
Some steps to support fresher’s:<br />
<br />
• Various advertising opportunities<br />
<br />
• Discussion boards allowing open/moderated conversations<br />
<br />
• Introductions/common interest engines that allow participants to share contact information prior to or throughout the show<br />
<br />
• Interactive session track pickers that allow attendees to choose the speaker, topic and schedules<br />
<br />
• Attendee meet-ups or “tweetups”, ”retweets”, that can faster professional networking<br />
<br />
• Real time messaging and audience response during the event via mobile is highly great application to cope up on, Twitter walls, streaming videos or blogs.<br />
<br />
<br />
<br />
<strong>SOCIAL MEDIA TOOLS:</strong><br />
<br />
<strong>• Online Social Communities:</strong> Global social networking sites such as Facebook, Twitter and LinkedIn provide an open forum for users to create group pages, share information and establish new connections.<br />
<br />
<strong>Credits</strong>: These communities help people to publish their instant view on the things they see new and anything it might me, irresponsible to where ever they might be round the world.Consider setting up discussion boards on Facebook or LinkedIn for attendees to share best practices and relevant content. Also, specific Twitter event pages, set up by a hash tag provides an excellent channel for real-time announcements and event promotions that engage attendees and exhibitors.<br />
<br />
<strong>• Video Distribution Channels:</strong> One of the best-known video distribution sites is YouTube(<a href="http://www.youtube.com/">http://www.youtube.com/</a>). This is where one can upload videos at no cost for anyone to see.Additionally, Flickr is another image and video hosting website to share photographs and is also used widely by bloggers as a photo repository. Similar to YouTube, MetaCafe also started satisfying users on a high scale.<br />
<br />
<strong>Credits:</strong> These video distributing channels perform as such they will be hosting a task based utility. In that aspect these mediums carry all the corresponding videos that can be uploaded by any authenticated user and tend to be published as results when someone trying to search those hits. This acts as a pre-pruning site for viewing video presentations, Tutorials, media guides etc. on an brief manner.<br />
<br />
<br />
•<strong> Blogs (web logs):</strong> Online journals typically written by an individual or a group. Typically, the entries are dated with the most recent on top, and there is usually an opportunity for readers to make comments. There are millions of blogs. Technorati (www.technorati.com) is an Internet search engine for seeking out blogs in multiple industries and allows for your comments to be posted on your favorite blogs. <br />
<br />
<strong>Credits:</strong> Most positive side of blogs are they used for marketing, On-line money making schemas, And self developing the art of writing their views similar to maintaining sites. Bloggers do concentrate on their work to be prelude by some other visitors.<br />
<br />
<br />
<strong>• Widgets:</strong> Custom widgets can be created for your desktop to develop real-time information, as well as industry and association news. Most widgets can include pop-ups of important dates (registration, move in dates, early order deadlines, etc), as well as a countdown counter for the show date.<br />
<br />
<strong>Credits:</strong> Widgets reinforce brand recognition, value and top of mind recall. Day to day updates on all the gadgets and current trends and some many will be provided via various applications.<br />
<br />
<br />
PITFALLS:<br />
<br />
Secondly, the risks that may be involved in undertaking certain laws in social media practices should be considered. Show management organizations should understand that the social media forum can be open for negative comments and complaints to be posted. Simply showing their dissatisfaction about the products similar to spams might add disgrace to the enterprise. They should be prepared for such instances and how best to manage and respond. This can be by making an acknowledgement of the issue and repairing the problem or to start a discussion or dialogue around the issue to bring both perspectives to light. Some of these negative comments can provide valuable customer insights. This policy should center on listening and establishing a dialogue, and not selling your product or service. This is mostly because it really is for the people. Bringing every kind of social group together in one place and letting them interact is really a big thing indeed. Everything about it lies on the advantages and disadvantages of social networking, and what it can do for you.<br />
<br />
<br />
<br />
Here are the advantages that can be more than enough for you to want to join in.<br />
<br />
Less Costs:<br />
<br />
Definitely, it’s cheaper to use online social networking for both personal and business use because most of it is usually free. While personal use is rather simple for anyone, the business functions are underestimated by many. In a social networking site, you can scout out potential customers and target markets with just a few clicks and keystrokes, adding a boost to your usual advertisements and promotional strategies. It lets you learn about their likes and dislikes, which is tremendous. Whether on a budget or not it makes no difference, if you want to fine tune your business then this is the way to go.<br />
<br />
Builds Credibility:<br />
<br />
You definitely can gain the customers confidence if you can connect to them on both a personal and professional level. Despite having to do a bit of work, it definitely pays off as you can be tapped for an offer if someone catches the tit-bits of your products or services. Just like promoting the accessories via internet to attract customers round the world.<br />
<br />
Connections:<br />
<br />
You are friends with people who have other friends, and so on. There is huge potential in such a common situation. By using a social networking site, you can do what you can and get connected with these people to form a web of connections that can give you leverage if you play your cards right. It is important to give as well as you receive, then they will most likely stick with you. These connections are definitely valuable in the long run.<br />
<br />
This sounds very enticing indeed. Similar to two faces of a coin, there are some disadvantages though?<br />
<br />
Lack of Anonymity:<br />
<br />
The methodology of putting out information about your name, location, age, gender, and many other types of information that you may not want to let others know. Most people would say be careful, but no one can be certain at any given time. As long as people can know who you exactly are, then some can find ways to do you in by interrupting in your privacies by chance.<br />
<br />
Scams and Harassment:<br />
<br />
There is a potential for failure of security in both personal and business context. While many sites apply certain measures to keep any of these cases of harassment, cyber-stalking, online scams, and identity theft to an absolute minimum scale.<br />
<br />
Time Consuming:<br />
<br />
Majorly bloggers got arrested to this defect. If this is not your kind of thing that it would just be a waste of time for you. Because blogging is an art and you must be committed to it. The key to social networking is that it is supposed to be fun, whether you are just doing it for kicks or clicking around for business purposes. That should be reasonable enough for anyone, but there are those people who don’t see the point. They lag behind showing interest towards a face to face conversation with his friend rather then having live chat with him.It can be a disadvantage though for them.<br />
<br />
Now there’s something to really think about. Nothing is without a blemish, but those of social networking shouldn’t really be that much of a concern regarding your safety. Everything will go well as long as you go along without making any big mistakes. You can take advantage of the Internet phenomenon that continues up to this day.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com1tag:blogger.com,1999:blog-7198081458395655838.post-27191479178819523282010-06-05T22:22:00.000-07:002010-06-10T10:21:14.901-07:00Apple iPhonesHello friends...! completed the semester on a high rage with a low range of hope.... Anyhow happy to see you all back. Today its been sunday, casually after saturday night parties, and a night long wide sleep everyone might expect something crispy... so here it is. A very great news to all mobile buyers by this week. Yes everyone's dream towards apple iphone has came true due to the price discount on U.S. The major reason behind this is the intrevension of 4G,which lead all top class mobile companies started lowering the prices.....<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLCy6rMLZH0xBvNJyEQ2NTBgtjgP0PmN1W4b04gHlhUah81GzwOt5SXAacdzpeG4L5IE9gtwBxodBg2SChRhTipINBXfxPCierZiwyfD4VUaphwX76viOTjPFlK5JqCK-tsWQPpTT91Kg/s1600/apple.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" gu="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLCy6rMLZH0xBvNJyEQ2NTBgtjgP0PmN1W4b04gHlhUah81GzwOt5SXAacdzpeG4L5IE9gtwBxodBg2SChRhTipINBXfxPCierZiwyfD4VUaphwX76viOTjPFlK5JqCK-tsWQPpTT91Kg/s320/apple.JPG" /></a></div><br />
What's 4G is that just an improvisation of 3G, the answer is NO its atmost alteration to be made on a simple 3 technology.By the time that 4G is deployed, the process of IPv4 address exhaustion is expected to be in its final stages. Therefore, in the context of 4G, IPv6 support is essential in order to support a large number of wireless-enabled devices. By increasing the number of IP addresses, IPv6 removes the need for Network Address Translation (NAT), a method of sharing a limited number of addresses among a larger group of devices, although NAT will still be required to communicate with devices that are on existing IPv4 networks.<br />
<br />
So be fast to catch your dreams at lowest price... then what were you waiting for...! make a rush on quick call to your friends, relatives at U.S and order an iphone.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-9590515018749693382010-05-13T10:05:00.000-07:002010-05-13T10:05:12.086-07:00Line Following RobotHi friends.....! back again and this time going to proceed with my dreams. Please dont think on such manner like wet dreams, i can say this as my passion and a seasonal interest too. A Line following robot, Look how energetic while saying the name since. These robo's are perfect movers with the environmental knoweledge.<br />
They just dont follow the lines but if you made them follow a line for once the next time it would perform with a tremendous torque take a look at this... <br />
<br />
<a href="http://www.youtube.com/watch?v=4XiRxNkZleY">http://www.youtube.com/watch?v=4XiRxNkZleY</a><br />
<br />
If you started learning the taste of it it will be treating with atmost all the flavours you think off.<br />
So thinking why i'm speakin about this, surely i will say the thing is most recently i've started tasting this concept so my words will be of beginers botique. But i 've set a goal as to built a Line follower robot by my own. So i make this as a open public statement by which it would drive me to fullfill my dream.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCcpymiSxL-WwHl0MKzAxxjt2GxLTbAOCdlYf5dhhf7fy0ATI4FiB7P60CDaKitadPkJ_Yo9VeJHtsaG9Cn7dGDAQj-wcgo2BIBRbkyrzjEA-wIVQ4zD1Sh8Ri6AAPGzgXxlo3GNYyPC8/s1600/Linef1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCcpymiSxL-WwHl0MKzAxxjt2GxLTbAOCdlYf5dhhf7fy0ATI4FiB7P60CDaKitadPkJ_Yo9VeJHtsaG9Cn7dGDAQj-wcgo2BIBRbkyrzjEA-wIVQ4zD1Sh8Ri6AAPGzgXxlo3GNYyPC8/s320/Linef1.jpg" wt="true" /></a></div>Mr.Public.... This is Aryan, And i will Keep my Promises. (Thanks to SRK)Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com2tag:blogger.com,1999:blog-7198081458395655838.post-72810179430990081872010-05-12T09:18:00.000-07:002010-05-13T10:07:12.792-07:00Sixth SenseHai friends...! once again, after a small wide gap reporting to you, is your arvind. And now bringing you the new concept, Oops....! not new but evergreen fresh concept sixth sense. Starting from many hollywod movies to hit indian movies like Krish and the most recent flip IRON MAN2 sixth sense plays an untied role.<br />
<br />
In India Pranav Mistry is the guy made this more popular to even wider distances.I can't really describe Sixth Sense in a line. Sure, it is a system that projects information about what surrounds you over objects' surfaces and blah blah blah......<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYhoXDU13VOKuJlJrFW4nMAXAFGWlSSe6oLc8PyhyphenhyphenhnV8ARjk4CSqmSlOjlzDMEReTHFJVMfhj5sx5YrXYV5OhDSj38qy51e_lO5cHkm4Qirlf5yiShgh2iwpwytyz1h-cRWyQypHuPUQ/s1600/2247719_f520.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYhoXDU13VOKuJlJrFW4nMAXAFGWlSSe6oLc8PyhyphenhyphenhnV8ARjk4CSqmSlOjlzDMEReTHFJVMfhj5sx5YrXYV5OhDSj38qy51e_lO5cHkm4Qirlf5yiShgh2iwpwytyz1h-cRWyQypHuPUQ/s320/2247719_f520.jpg" wt="true" /></a></div><br />
<br />
But simply and Basically, Sixth Sense is a mini-projector coupled with a camera and a cellphone—which acts as the computer and your connection to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures, like in the infamous Minority Report.<br />
<br />
<br />
However, instead of requiring you to be in front of a big screen like Tom Cruise, Sixth Sense can do its magic and a lot more everywhere. If you watch small kids who were got addicted to cartoon epic like, Pokemon, Bayblade, Avatar etc.... they used to perform as their hero's while playin with each other. They will be shouting something as thinking the were imaginarily playing cartoonised. This thought sprouted virtual reality and more enhanced Sixth sense.<br />
Now what actually happens on the process...... The camera recognizes objects around you instantly, with the micro-projector overlaying the information on any surface, including the object itself or your hand. Then, you can access or manipulate the information using your fingers. Need to make a call? Extend your hand on front of the projector and numbers will appear for you to click. Need to know the time? Draw a circle on your wrist and a watch will appear. Want to take a photo? Just make a square with your fingers, highlighting what you want to frame, and the system will make the photo which you can later organize with the others using your own hands over the air. <br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtc9JY4-SwBJQmSEeTAMPcGTyB1GxvVpWLf45zbrxG0hgNP0E29OcCUtUzoxBVl_r52f4XiBA6rnpdpcuEO9U3BPkTOkkn2ubGUnXc_NVcWVDXH6eWg38P7uuc1dxZfpf-rERIf0bvkQs/s1600/minority-report.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtc9JY4-SwBJQmSEeTAMPcGTyB1GxvVpWLf45zbrxG0hgNP0E29OcCUtUzoxBVl_r52f4XiBA6rnpdpcuEO9U3BPkTOkkn2ubGUnXc_NVcWVDXH6eWg38P7uuc1dxZfpf-rERIf0bvkQs/s320/minority-report.jpg" wt="true" /></a></div>But those are just novelty applications. The true power of Sixth Sense lies on its potential to connect the real world with the Internet, and overlaying the information on the world itself. Imagine you are at the supermarket, thinking about what brand of soap is better. Or maybe what wine you should get for tonight's dinner. Just look at objects, hold them on your hands, and Sixth Sense will show you if it's good or bad, or if it fits your preferences or notArvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-41380036617016645832010-04-18T09:49:00.000-07:002010-04-18T09:49:24.843-07:00Shoulder SurfingHi friends...! After a day break with stress happy to catch you back and nw jumping directly to the info....<br />
Shoulder surfing, This is quite funnier to hear and its meaning directly makes a meaning as hanging onto someone's shoulders and browse. Its actual meaning does the same but in different view for that better tke an example, <br />
<br />
With respect to your home, a family member may be curious to see what information you have stored on the computer. A member of the family may also be nosy and want to know the user names or passwords to websites or accounts you might access via the Internet. In the comfort of your own home you may be less likely to think that one of your family members may be a shoulder surfer; however, it may very well be the case. <br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHpzjw1kEgTcu3SWjPXLUBw7vj5osSIgqvfqXMeoTZIrZb6Tw_2vfzLZh8Lbr0OMd8-2sVbMp0b4fgbDPBp72X0oru1ZWGznjdsg1p2_zzRccS46I8ck0gPQXvKV1EYLASPsI20pszyXs/s1600/ist2_9702029-asian-man-looking-over-shoulder-surfing-copying-caucasian-woman.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHpzjw1kEgTcu3SWjPXLUBw7vj5osSIgqvfqXMeoTZIrZb6Tw_2vfzLZh8Lbr0OMd8-2sVbMp0b4fgbDPBp72X0oru1ZWGznjdsg1p2_zzRccS46I8ck0gPQXvKV1EYLASPsI20pszyXs/s320/ist2_9702029-asian-man-looking-over-shoulder-surfing-copying-caucasian-woman.jpg" wt="true" /></a></div>At your place of employment you might even be at risk. Co-workers might be curious as to the activities you engage in on your computer. If their jobs require that they do different tasks then you, they may want to learn how you do your job. They may want to look at the programs you utilize to perform your job. Even worse, they may want to check your e-mail accounts. These are all possible motives of the shoulder surfer who may just be around the corner near all the walls.<br />
<br />
So just be aware about your surroundings before get down to any job......<br />
The most enthralling lines i got remind always is " Desire, Ignorance & Inequality were Trinity of bondage"<br />
Please dont misbehave orelse dont let misbehaviour.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-2324903096760553912010-04-17T05:48:00.000-07:002010-04-17T05:50:04.127-07:00WAR DRIVINGHai friends...! happy to catch you all back and now a simple feature about your day to day activities.<br />
This would be most probably known to all you guys be the caption makes the difference....<br />
Yes, wardriving its nothing but searching a WI-FI network in moving vehicle. Most of the attackers would use their GPS unit to track the exact location where they can get the Internet access. Basically a Laptop is enough for this action and nowadays most of the built-in configuration possess the wi-fi stimulators in it.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuXDzd6NYKiKuleu75cgJV7YCZukwQsu0OZ0DUdyFChqyakUTKcp2NsnQ18qSaizUAAjOIKKM_XRMhz3g-rg3EtmPCIz5W5paO8acoMR5OnxIMgNLt1BdSsMZHkoRmhAlYVfpEUaIFXI4/s1600/mn-wardriving18__0498944934.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuXDzd6NYKiKuleu75cgJV7YCZukwQsu0OZ0DUdyFChqyakUTKcp2NsnQ18qSaizUAAjOIKKM_XRMhz3g-rg3EtmPCIz5W5paO8acoMR5OnxIMgNLt1BdSsMZHkoRmhAlYVfpEUaIFXI4/s320/mn-wardriving18__0498944934.jpg" wt="true" /></a></div><br />
Commonly atackers will be using Netstumbler to identify SSID and other network details before connecting t the wireless network. A better example for this is.... In movies like DIE HARD4 , a young lad helping Bruce wills will tend to perform war driving using his I-pad.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-23659374958829778142010-04-07T09:23:00.000-07:002010-04-07T09:25:49.107-07:00DECCAN-TRIPHi friends.....! I dnt know what exactly to say but i should, yes i'm moving to warrangal in Andra pradesh. To express frankly i'm almost flying because i gonna board first time to central Andra moreover closer to Hyderabad.<br />
<br />
God i have forgotten to say the purpose of going there. Actually i'm going for a project presentation at TECHNOPLEXUS 2K10 KAKATIYA UNIVERSITY, Warrangal.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrFHWSABjMuQN2u6xs8uAs6H3Lb6I7tVWwyQvKOj9z3ZSZl_Ux4M0DH-i4aNx1KN637I4Mp94IYWj_WF7nOmJ_pDanTdgEv1rpjVfz_1aepMTKKApwwPQJFBvexcm3FpZ9NPalULQiB4M/s1600/11129528.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" nt="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrFHWSABjMuQN2u6xs8uAs6H3Lb6I7tVWwyQvKOj9z3ZSZl_Ux4M0DH-i4aNx1KN637I4Mp94IYWj_WF7nOmJ_pDanTdgEv1rpjVfz_1aepMTKKApwwPQJFBvexcm3FpZ9NPalULQiB4M/s320/11129528.jpg" /></a></div>Then nothing to say more but i'm sure about after return i will be sharing more experience with all you guys so bye for now...!Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-21032741743144030172010-04-05T07:01:00.000-07:002010-04-05T07:01:30.731-07:00MPLSHai friends happy to catch you all back.... And now i'm back with an new stuff, MPLS.<br />
Itz quite new to all those hear first but the cnceptual ideas on it were quite intresting.<br />
MPLS - Multi Protocol Label Switching. This mechanism is quite obviously based on telecommunicattion network and further done on the cases as the transfer is between two network nodes.<br />
<br />
Eventually the functioning will be of MPLS-labeled packets are switched after a label lookup/switch instead of a lookup into the IP table.When an <strong>unlabeled packet</strong> enters the ingress router and needs to be passed on to an MPLS tunnel, the router first determines the forwarding equivalence class (FEC) the packet should be in, and then inserts one or more labels in the packet's newly-created MPLS header. The packet is then passed on to the next hop router for this tunnel.<br />
<br />
<br />
When a<strong> labeled packet</strong> is received by an MPLS router, the topmost label is examined. Based on the contents of the label a swap, push (impose) or pop (dispose) operation can be performed on the packet's label stack. Routers can have prebuilt lookup tables that tell them which kind of operation to do based on the topmost label of the incoming packet so they can process the packet very quickly.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_3_TVXZD7ymMGoIt3EUEntuC8Mjx9ZlT9DztJH5cXo652S7x-RH6CfvcHIM2opJm5-svlI6ZyD4m4XVyKG2QdkyXogUTsx94Nlqc8ZK_QfL7-zQXAFQpi3wOllEBShlBTyHWf1ZdhBaA/s1600/img-mpsl-ip-vpn.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" nt="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_3_TVXZD7ymMGoIt3EUEntuC8Mjx9ZlT9DztJH5cXo652S7x-RH6CfvcHIM2opJm5-svlI6ZyD4m4XVyKG2QdkyXogUTsx94Nlqc8ZK_QfL7-zQXAFQpi3wOllEBShlBTyHWf1ZdhBaA/s320/img-mpsl-ip-vpn.png" /></a></div>A number of different technologies were previously deployed with essentially identical goals, such as frame relay and ATM. MPLS technologies have evolved with the strengths and weaknesses of ATM in mind. Many network engineers agree that ATM should be replaced with a protocol that requires less overhead, while providing connection-oriented services for variable-length frames. MPLS is currently replacing some of these technologies in the marketplace. It is highly possible that MPLS will completely replace these technologies in the future, thus aligning these technologies with current and future technology needs.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-14834188584597104552010-03-23T08:27:00.000-07:002010-03-23T08:27:50.833-07:00Input Validation attackHi friends ....! Happy to catch yu all back once again, and now with a better topic to discuss. Yes, Input validation attack. This is a mode of attack which will be handled by the hacker involved as sending unusual input in the hope of confusing the application.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWxt1GR2eTkpjd1XmM7tSM4yvPyg3Ho-3SqE6_ToSxwN8Z_eh4tn3BsQY3nYjxaAmnveGeqJXeQQS5iIFVonjMp7TTEpFSQ7xB1mF4Cgaja2lWemi1NHu2T5UtDtyw5c1DYVOChHeqUPw/s1600-h/WCS_XSS.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWxt1GR2eTkpjd1XmM7tSM4yvPyg3Ho-3SqE6_ToSxwN8Z_eh4tn3BsQY3nYjxaAmnveGeqJXeQQS5iIFVonjMp7TTEpFSQ7xB1mF4Cgaja2lWemi1NHu2T5UtDtyw5c1DYVOChHeqUPw/s320/WCS_XSS.jpg" vt="true" /></a></div>Now let us see some cunter measures for Input validation attack....<br />
<ul><li>Application should be subjected to every possible future situation that can encounter by security perspective </li>
<li>Programmers are supposed to understand the importance of giving attention to security aspects,while they develop the application.</li>
<li>Adopting a protective approach is best in practice. It is more affective, cheaper, easier and faster tool to look for and remove any loopholes in input validation in the stages of development.</li>
<li>Keeping your program very simple helps you to test it against loopholes and input validation vulnerabilities.</li>
<li>Restricted user and file access should be implemented in all kinds of application environments.</li>
<li>There should be proper separation between trusted and untrusted data.Trusted data should never be allowed spill over the understand memory spaces.</li>
<li>Keep in mind that any applications should not be allowed to other access trusted applications.</li>
<li>Most common buffer overflow attacks can be avoided by applying above measures.Buffer overflow are one of the lethal weapon for hackers and it is a widely used type of net attacks.</li>
<li>If you spill out special characters like quotation marks, slash, semicolon, backslash etc., from user input , URL parameters and cookies it will make it harder for attacker to implement such attack ans also SQL injection attacks.</li>
</ul><br />
<div></div>Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-42181337696629548442010-03-15T08:54:00.000-07:002010-03-15T08:54:38.276-07:00Buffer Overflow attack<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_AaUEdAAj8yaxXGgCfwSQ79SLJPxCzVU39exft9dje1kra0CHvFihty58aKDBR4EhV9v6lAt2guQyELZ4Suk0qqR7bN4Ekm8j3ugxUrgyG2p3E_k7kcANWSQp0R4T9wCIN1ytjcNJahc/s1600-h/hack1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_AaUEdAAj8yaxXGgCfwSQ79SLJPxCzVU39exft9dje1kra0CHvFihty58aKDBR4EhV9v6lAt2guQyELZ4Suk0qqR7bN4Ekm8j3ugxUrgyG2p3E_k7kcANWSQp0R4T9wCIN1ytjcNJahc/s320/hack1.png" vt="true" /></a></div>Hi friends....! and now i'm back with a good stuff oops...! You have to decide itz worth okay lets start up.<br />
Buffer overflows are a favorite exploit for hackers. The vast majority of Microsoft's available patches fix unchecked buffer problems. A buffer overflow is an exploit that takes advantage of a program that is waiting on a user's input. There are two main types of buffer overflow attacks, stack based and heap based. <br />
<br />
<br />
Heap-based attacks flood the memory space reserved for a program, but the difficulty involved with performing such an attack is mostly rare.<br />
<br />
Stack-based attack involves with the size previously assigned while coding, the programmer one who develops the code must reserve a specific amount of space for the stack. If the user's input is longer than the amount of space reserved for it within the stack, then the stack will overflow.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-18358937638583517032010-03-13T08:38:00.000-08:002010-03-15T06:16:32.813-07:00IPL fever starts...<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivgrfIcqAQnZAUhd10UQCIhzxT5qRZemFTXTr5oMesdk8SujSRBAyyQyknU1otLw-3NyPur09TSb2Fe0hvHSaY5jvatjq_WdqggWEZxePOiSYbd9a4zAcuJXy2Xs5fkG64s1GnddO2vBA/s1600-h/IPL_Chennai_Super_Kings11.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivgrfIcqAQnZAUhd10UQCIhzxT5qRZemFTXTr5oMesdk8SujSRBAyyQyknU1otLw-3NyPur09TSb2Fe0hvHSaY5jvatjq_WdqggWEZxePOiSYbd9a4zAcuJXy2Xs5fkG64s1GnddO2vBA/s320/IPL_Chennai_Super_Kings11.jpg" vt="true" /></a></div>YoYo....! Atlast the long wait have been ended and the long thirst have been quinched up with juicy flavour.<br />
Yeah the DLF IPL season 3 has been inagurated awesomely yesterday and powerpcked matches begins.<br />
Alright so watz being the hidden news....? <br />
Yes Im the supporter of CHENNAI SUPER KINGS lead by Dhoni and decorated by the star ambassador VIJAY - Prince of tamilnadu.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzehx6F03EckeO_VT4QeDfcYXMg2Zo0W5FGnycIdAvHhdWzkrg4Xyp_9kpZjkUgYUkm0-61hSqwPxviKVCQWDdaCfzmCc5NDii0yUU9mlNvoUVyzFlziBa8cweuWfsQjniKLMxQMR31Jk/s1600-h/12hayden.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzehx6F03EckeO_VT4QeDfcYXMg2Zo0W5FGnycIdAvHhdWzkrg4Xyp_9kpZjkUgYUkm0-61hSqwPxviKVCQWDdaCfzmCc5NDii0yUU9mlNvoUVyzFlziBa8cweuWfsQjniKLMxQMR31Jk/s320/12hayden.jpg" vt="true" /></a></div><br />
<br />
<br />
<br />
And the special about this IPL 2010 is Hayden - the strong crusador of CSK gonna play with the MAngooSE bat for the first time in INDIA. The speciality of the bat is it had been designed absolutely for attacking players in T20 cricket.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-44164026821912183902010-03-08T07:07:00.000-08:002010-03-08T07:07:38.119-08:00CAPTCHA - a brief viewHi...! Every one let us see about the most credential aspect "CAPTCHA". This is the one you find during the user side verifiction code and you will be typing the text in an enumerated like form on a specified section.<br />
Okay, we will discuss about types of CAPTCHA and its necessity below<br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMFpkTZGAXMG-lQOiq-24yB3oW3EXGTkVzWwWcd_zmC-tlFm8HFZltY7GFKt2L0bVH_CPMchLwp05akLLT7EyKq7i_qJFvfhVLDMxNCXJOpcx_b-Puf5VTatsHQjf6v2cka8L2Fse8S60/s1600-h/captcha_banner.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" kt="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMFpkTZGAXMG-lQOiq-24yB3oW3EXGTkVzWwWcd_zmC-tlFm8HFZltY7GFKt2L0bVH_CPMchLwp05akLLT7EyKq7i_qJFvfhVLDMxNCXJOpcx_b-Puf5VTatsHQjf6v2cka8L2Fse8S60/s320/captcha_banner.jpg" /></a></div>Basically CAPTCHA’s are divided into 3 types Early, Improved, Modern.<br />
<br />
<br />
Whereas Modern CAPTCHA’s include following types, <br />
<br />
• Animated CAPTCHAs <br />
<br />
• 3D CAPTCHA <br />
<br />
• ASCII art <br />
<br />
• Reverse CAPTCHA <br />
<br />
CAPTCHA is quite commonly necessary to stop BOT’s intrusion moreover computer access to the human prior sites. As per security analysis it is must because as said previously to stop the BOT’s intrusion on some high defined logical reasoning access which would take more time for an unauthorized user the BOT’s makes them easier.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-88084142556251483872010-03-01T05:21:00.000-08:002010-03-08T07:12:57.276-08:00Techiez'10<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdYLU9-CAmTq55-uKXRguOmgPwkukQLLahFuedO6d1gxQ9UunR0UddcBy49mnlbskIQnxbGh5Vll3YuceYnkFxFRqf6PCWbaAAvkiHSoZFQkU1Bu322zh9cPhVeC6olDCVkCsNDrwPv-0/s1600-h/finalfinal.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" kt="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdYLU9-CAmTq55-uKXRguOmgPwkukQLLahFuedO6d1gxQ9UunR0UddcBy49mnlbskIQnxbGh5Vll3YuceYnkFxFRqf6PCWbaAAvkiHSoZFQkU1Bu322zh9cPhVeC6olDCVkCsNDrwPv-0/s320/finalfinal.jpg" /></a></div><br />
Hi ...! friends happy to see you all back. This time i have returned with an invitation for all of you.<br />
Yes, A national level symposium is going to be held on 11-12 of march 2010 by our department of computer science. The poster is displayed and you can register for the various events make sure yu onna smack each and every part with a big bang.<br />
<br />
Aswell as myself is concerned iam the paperpresentation head and so your perstigious innovations and delihtsome presentation skills are welcomed over a red carpet harmony. Then i assure, all you gonna experience an ossom presence over here moving you all without booooring at any cost.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-90513243367570527862010-02-18T06:53:00.000-08:002010-03-08T07:14:14.241-08:00Poison Ivy<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwiN6XHnqBjWXpTTnMI1OZqIC6SteIZ5kx7EvVDMXHzy2UPUYkyVZaIti0Nkf9ZDUa6CaSw6pUVtZpsU4-s0XJJQAcTdxf9rbCDmF8xs-Be75_kIV7jZUZlOMAKeiOh_VJi0ZeS6Ynod8/s1600-h/poisonivy1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ct="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwiN6XHnqBjWXpTTnMI1OZqIC6SteIZ5kx7EvVDMXHzy2UPUYkyVZaIti0Nkf9ZDUa6CaSw6pUVtZpsU4-s0XJJQAcTdxf9rbCDmF8xs-Be75_kIV7jZUZlOMAKeiOh_VJi0ZeS6Ynod8/s320/poisonivy1.png" /></a></div>Hi friends happy to catch you all again and asusual back with a new concept. Yes, today you gonna see about RAT. This not the thing that disturbs usally at all home and not the thing chased by TOM every time, rather this concept threw an idea of poison ivy mechanism. What is poison ivy...?<br />
<br />
The methodology of administrating a remote system using the free ports available is the basic outline. To get closer to this idea need to use some technical terms so catch out gooaling habit mean while...<br />
<br />
RATs that utilize reverse connection have a few major advantages, such as the ones listed below.<br />
<br />
Outgoing connections generally are less treating, and are less likely to be detected or blocked by a firewall, such as a router.<br />
<br />
Since the victim's computer is connecting to the remote administrator, he or she will not need to know the victim's IP address in order to connect.<br />
<br />
The remote administrator does not need to know to which or how many computers the RAT is being installed on, which allows for mass-distribution.<br />
<br />
If mass-distributed, it is much easier to keep track of the computers the RAT is installed on, since they are all "calling home" by connecting to the remote administrator.<br />
<br />
RAT Trojan Horses<br />
<br />
Many trojans and backdoors now have remote administration capabilities allowing an individual to control the victim's computer. Many times, a file called the server must be opened on the victim's computer before the trojan can have access to it. These are generally sent through email, P2P file sharing software, and in internet downloads. They are usually disguised as a legitimate program or file. Many server files will display a fake error message when opened, to make it seem like it didn't open. Some will also kill antivirus and firewall software. RAT trojans can generally do the following:<br />
<br />
<br />
<br />
Download, upload, delete, and rename files<br />
<br />
Format drives<br />
<br />
Open CD-ROM tray<br />
<br />
Drop viruses and worms<br />
<br />
Log keystrokes, keystroke capture software<br />
<br />
Hack passwords, credit card numbers<br />
<br />
Hijack homepage<br />
<br />
View screen<br />
<br />
View, kill, and start tasks in task manager<br />
<br />
Hide desktop icons, taskbar and files<br />
<br />
Print text<br />
<br />
Play sounds<br />
<br />
Randomly move and click mouse<br />
<br />
Record sound with a connected microphone<br />
<br />
Record video with a connected webcam<br />
<br />
Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack. They usually do disruptive things like flip the screen upside-down, open the CD-ROM tray, and swap mouse buttons. However, they can be quite hard to remove.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-70023795232998861182010-02-16T08:15:00.000-08:002010-02-16T08:15:39.133-08:00Placement CO-Ordinator<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpvwO7HMay6dWFLnrlTfnof6wd8K2ZgC9QAGoYray38HCrcQ5nPL4e038W1VzC_P8XHgSt0MkXscu-OPz-ihkFxmuYyb-fDGKr0HO8zn6NaX5WYQpYqM8Z4JdU-r1DMVxfgBjP9oMhIUI/s1600-h/100_1397.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ct="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpvwO7HMay6dWFLnrlTfnof6wd8K2ZgC9QAGoYray38HCrcQ5nPL4e038W1VzC_P8XHgSt0MkXscu-OPz-ihkFxmuYyb-fDGKr0HO8zn6NaX5WYQpYqM8Z4JdU-r1DMVxfgBjP9oMhIUI/s320/100_1397.JPG" /></a></div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><br />
</div>Hi friends...! hope all of you were moving on with some typical tid-bits i have threwn last week and i have another intersting news to share with you all.... I had been selected as my department placement coordinator for our batch(2011). I feel proud to hire this title as well as i feel that this is an crrect judiciary for my efforts past 2 years.<br />
<br />
So.., being one among you i stretch my gratitude to all and the faculty's encouraged me on all my actions and once again thank u one and all...<br />
<br />
keep in touch...Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com1tag:blogger.com,1999:blog-7198081458395655838.post-12232501888412927452010-02-15T08:48:00.000-08:002010-02-15T08:48:05.957-08:00Port Scan<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGEAe8OIxgrHvBmOSv-S1fsTkoCbliGG7hOrU_G9haZwW3vsCrLgQdhYnD_WCO-9uRBwZAq9WVSLs-xXKrhS_cvkmdBTVhQrnHbCAEMH2oh5IqfrYOtA26dOGP6_U4RkcJ2JDmlbKWdGA/s1600-h/plugins.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ct="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGEAe8OIxgrHvBmOSv-S1fsTkoCbliGG7hOrU_G9haZwW3vsCrLgQdhYnD_WCO-9uRBwZAq9WVSLs-xXKrhS_cvkmdBTVhQrnHbCAEMH2oh5IqfrYOtA26dOGP6_U4RkcJ2JDmlbKWdGA/s320/plugins.gif" /></a></div>Scanning, as a method for discovering exploitable communication channels, has been around for ages. The idea is to probe as many listeners as possible, and keep track of the ones that are receptive or useful to your particular need. Much of the field of advertising is based on this paradigm, and the "to current resident" brute force style of bulk mail is an almost perfect parallel to what we will discuss. Just stick a message in every mailbox and wait for the responses to trickle back. <br />
<br />
<br />
Scanning entered the h/p world along with the phone systems. Here we have this tremendous global telecommunications network, all reachable through codes on our telephone. Millions of numbers are reachable locally, yet we may only be interested in 0.5% of these numbers, perhaps those that answer with a carrier. <br />
<br />
The logical solution to finding those numbers that interest us is to try them all. Thus the field of "wardialing" arose. Excellent programs like Toneloc were developed to facilitate the probing of entire exchanges and more. The basic idea is simple. If you dial a number and your modem gives you a CONNECT, you record it. Otherwise the computer hangs up and tirelessly dials the next one. <br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpnBwl4jop7OwzRLjZ1iVkJVb-Y_eDU8nzLK1l0IRIcN8VYUH5T8dYwpqfMELm9pLbDJq6lJ_7RLgVVvnefwiEo2bE0tgwlkjfKTFXTmzA2wOS2m0f4qw5yxYEC8i6eoDcUEjCdJiuuEE/s1600-h/nmapterm.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ct="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpnBwl4jop7OwzRLjZ1iVkJVb-Y_eDU8nzLK1l0IRIcN8VYUH5T8dYwpqfMELm9pLbDJq6lJ_7RLgVVvnefwiEo2bE0tgwlkjfKTFXTmzA2wOS2m0f4qw5yxYEC8i6eoDcUEjCdJiuuEE/s320/nmapterm.gif" /></a></div><br />
While wardialing is still useful, we are now finding that many of the computers we wish to communicate with are connected through networks such as the Internet rather than analog phone dialups. Scanning these machines involves the same brute force technique. We send a blizzard of packets for various protocols, and we deduce which services are listening from the responses we receive (or don't receive). <br />
<br />
Some of the techniques are:<br />
TCP connect() scanning <br />
TCP SYN scanning <br />
TCP FIN scanning <br />
Fragmentation scanning <br />
TCP reverse ident scanning<br />
FTP bounce attackArvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-36633972673663342532010-02-15T08:41:00.001-08:002010-02-15T08:41:25.347-08:00Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-60835150507263861112010-02-14T07:45:00.000-08:002010-02-14T07:46:56.717-08:00Save Our Tigers<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPq4o107LAmHHFaJHzHEvfBnK0XsV5OYIZo_8u0CSI2X7TWIpRcjAXM6ZY3cfHLKLlEktFqj2WLiIjpIFXSu6ixAIQsiAj1oJDh8RZhDgCdLjG-PkjCCSNWNpfLGI31pjhPjYYymJ05FE/s1600-h/saveourtigers.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ct="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPq4o107LAmHHFaJHzHEvfBnK0XsV5OYIZo_8u0CSI2X7TWIpRcjAXM6ZY3cfHLKLlEktFqj2WLiIjpIFXSu6ixAIQsiAj1oJDh8RZhDgCdLjG-PkjCCSNWNpfLGI31pjhPjYYymJ05FE/s320/saveourtigers.jpg" /></a></div>'Can you help me find my mother, she has left me alone for hunting'-says a two months old cub. He is hungry, scared to make a loud roar and helpless to search his mother. He is trembling with fear and begging to save him out from becoming an orphan.' This is the cry of every cub!<br />
<br />
<br />
Today, our India is left with only 1411 Tigers and their existence is under threat. 'Save Our Tiger' -the recently launched television commercial by AIRCEL has framed a mission to preserve our wildlife heritage.<br />
<br />
The zeal with which the Project Tiger was initiated in 1972, by the then Prime Minister Indira Gandhi, has deviated from its ambition. The most recent Tiger Task Force headed by Prime Minister of India Manmohan Singh in 2005 has also brought red alert to all poaching networks. But, all legal practices resulted in vain. As of now, out of the 40, 000 population of tigers in the last century, only a mere lives are left.<br />
<br />
The Global Tiger Workshop conducted on 2009 highlighted the main cause for the sharp declination in the tiger population. Excessive poaching for illegal trade, habitat loss and fragmentation are major reason behind the plight of this wild animals. The production of traditional medicine is nothing new in this world. But, it's not a good deal to make curing processes at the expense of precious lives. Way back, in 1991, Chinese authorities have disclosed the export of tiger bone medicines, that included 15079 cartoons of tablets, 5250 kg of liquid syrups and 31500 bottles of wine.<br />
<br />
Add to this, a most recent study organized by WWF(World Wild Fund) in 2010, stressed on the effect of climate change on the Royal Bengal Tiger. It has been estimated that by 2070, the sea-level will rise to 11.2 inches above 2000 levels and may gulp the entire mangrove forest, of Sunderban National Park (West Bengal). The iconic species is under the spell of greenhouse effect and the world's largest population are likely to disappear by the end of this century.<br />
<br />
In this era, number of issues are popping up with or without concern. We, human-beings are the only species to fight against any odds. Lets not cut down the wild habitat and build dream-like houses for ourself. Lets be responsible and put on best effort to help maintain our earth's ecological balance. The heart-touching visual ends up with question mark on our mind. But, can we afford to leave the issue without support? Its high time to hear the cry of our national animal and let them live. 'Save Our Tigers' - Their end indicates the beginning of our end.<br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><br />
</div>Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-74213693548166868362010-02-14T07:43:00.001-08:002010-02-14T07:43:35.662-08:00Check out #Title: #<br/>Link: http://gotaf.socialtwist.com/redirect?l=631142928010913064031Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-23077865660144964232010-02-13T09:13:00.000-08:002010-02-15T05:16:52.084-08:00Anti-Valentines Day<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmoXxj90k4ahMyRH_eHGZQJdg-2ombOeVYUIYWGi5XpaRNScdiGbP4Pjx89KsNsxTNrIvhC87nxdl5iAgPhmTF7_RRxIVn2YxUT4dN9cj4okzRUgg0ObqHR7MfuD1Nb5X-sDiPApyU6BQ/s1600-h/cupidshot.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmoXxj90k4ahMyRH_eHGZQJdg-2ombOeVYUIYWGi5XpaRNScdiGbP4Pjx89KsNsxTNrIvhC87nxdl5iAgPhmTF7_RRxIVn2YxUT4dN9cj4okzRUgg0ObqHR7MfuD1Nb5X-sDiPApyU6BQ/s320/cupidshot.jpg" /></a></div><br />
Hi friends...! The label might be horrorsome for the new readers but what to do guys world's majority of humans were broken hearted so this is for them alone.... Its my duty to give some tips to activate this movement. So just rock on with the following inovations... <br />
<div class="txtd" id="txtd_743943" style="word-wrap: break-word;"><ul><li>Make mixed tapes or cds of "Un-love songs" to play in the background. </li>
<li>Serve broken heart shaped cookies or heart shaped cookies coloured black with black paste food colouring.</li>
<li>Set up different "Stations" with tables, chairs and materials for activities.</li>
</ul><ul><li>Activity Ideas #1- Make anti-valentines from black paper, scrapbooking and craft supplies. Find anti love quotes and provide them to your teens to use in their cards. </li>
<li>Activity Ideas #2- Get some blank tank tops or t-shirts, fabric paint and fabric markers and have the kids decoarate the shirts with slogans that encourage independance.</li>
<li>Activity Ideas #3- Set up a computer and log onto the site(there is also one at www.despair.com) and let the kids design their own angry candy heart message jpegs.</li>
<li>Activity Ideas #4- Colour copy the covers of romance novels, mount them on cardboard and display them with markers for the teens to "vandelize." (Draw devil ears or moustaches, etc). </li>
<li>Activity Ideas #5- Get some old faded flowers from a flower store and pour them out onto the floor. Let the teens jump on them and squish them with their feet. (Needless to say, not on carpet!)</li>
<li>Activity Ideas #6- Make a heart shaped pinata and smash the heck out of it!</li>
</ul><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAQMB-Cm1nqVWFJvWj4HGbhPo5aGPYD-fSYtZwnvHNtc4Ro_3VpRpp-0PBfjemgbx43aoSv-tyT9-w2BjohrGADTLFZdNP1m0hffzZb9SjoAOSvII3K7v_JjfCS2TRWT-Ro69Fk1hBiRs/s1600-h/emocd.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAQMB-Cm1nqVWFJvWj4HGbhPo5aGPYD-fSYtZwnvHNtc4Ro_3VpRpp-0PBfjemgbx43aoSv-tyT9-w2BjohrGADTLFZdNP1m0hffzZb9SjoAOSvII3K7v_JjfCS2TRWT-Ro69Fk1hBiRs/s320/emocd.gif" /></a></div>Suggestions for music tracks>>>><br />
<br />
<br />
<b>Track list:</b><br />
Love Stinks - J Geils Band<br />
Piece of My Heart - Janis Joplin<br />
Don't Think Twice, It's Alright - Bob Dylan<br />
Smile - Lily Allen<br />
Love Hurts - Nazareth<br />
You're Breaking My Heart - Harry Nilsson<br />
Dead Flowers - Rolling Stones<br />
Get Gone - Fiona Apple<br />
I Will Survive - Gloria Gaynor<br />
You Oughta Know - Alanis Morissette<br />
Idiot Wind - Bob Dylan<br />
Tainted Love - Soft Cell<br />
I'm Not In Love - 10cc<br />
No More 'I Love Yous' - Annie Lennox<br />
I'm Looking Through You - The Beatles<br />
Love Bites - Def Leppard<br />
Funeral For A Friend (Love Lies Bleeding) - Elton John<br />
Love on the Rocks - Neil Diamond<br />
Hide Your Love Away - Oasis (Beatles cover)<br />
The Crying Game - Boy George<br />
The Thrill Is Gone - B.B. King<br />
I Hope You're Happy Now - Elvis Costello<br />
Used To Love Her - Guns N' Roses<br />
Lovin', Touchin', Squeezin' - Journey<br />
You're So Vain - Carly Simon<br />
Irreplaceable - Beyonce<br />
Goodbye To Love - The Carpenters<script type="text/javascript">
<!--
google_ad_host = "pub-6958755572607374";
google_ad_client = "ca-pub-8266868394100031";
google_alternate_ad_url = "http://hubpages.com/google_adsense_script.html";
google_ad_width = 468;
google_ad_height = 15;
google_ad_format = "468x15_0ads_al";
google_ad_type = "text_image";
google_ad_channel = "";
google_color_border = "FFFFFF";
google_color_bg = "FFFFFF";
google_color_link = "0000CC";
google_color_url = "333333";
google_color_text = "333333";
google_ui_features = "rc:0";
//-->
</script><script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript">
</script><script>
google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad);
</script> </div>Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-40893712386251406052010-02-12T04:41:00.000-08:002010-02-13T09:15:09.482-08:00Dictionary Attack<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWC4cMNrBt3Ky5y2HkGwvk4O9avUDphaf1qndpNk8N7687JS5RqWk-C3qoppRdF_LA0-OWHBbJnGYpbe5mczB1btcbSk2GUdQI7jkGEaSxfU7EUGeYr9YjaAYx2KkUYfJstNzapqNnTXY/s1600-h/quickbooks_password-118051-1.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5437340803615921330" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWC4cMNrBt3Ky5y2HkGwvk4O9avUDphaf1qndpNk8N7687JS5RqWk-C3qoppRdF_LA0-OWHBbJnGYpbe5mczB1btcbSk2GUdQI7jkGEaSxfU7EUGeYr9YjaAYx2KkUYfJstNzapqNnTXY/s320/quickbooks_password-118051-1.jpg" style="display: block; height: 286px; margin: 0px auto 10px; text-align: center; width: 320px;" /></a><br />
Normally the word hacking terms different on different places. I used to say this because mostely teen'agers were attracted by this word. Okay lets jump back to the business, Hacking is not all about cracking but also some thing breaking or tracking.Pity tough to understand it seems ok hacking is all about knowingly or unknowingly intruding into your own system or some others. What is the relation between the hacking and dictionary, attack....<br />
I would like to ellaborate a common scenario, usally account holders on any of the mail system will be provided with an username and a password. But accidentally your password might be lost or misused or even sometimes you might feel that "My password is quite insecure, I need to change this" for all these options surely you must know your password for editing even. I have seen many of my friends had lost their account due to their carelessness. During those circumstances we would normally go for a DICTIONARY ATTACK. The word itself summarises what is what. Yes its an software available freely on site...just google it , and it possess a large number of words combinations for some of the usually used passwords. Make use of it and better avail your password from others sight and rock on....Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-33247703930945300542010-02-07T07:29:00.000-08:002010-02-07T07:45:29.521-08:00FOSS a mind blowing Xperience<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4JdDxMouayTBvQIyCdKiu-_2ToVq7CbT6oH_X5Kp_eBy4rv21xracYA0w3ACSaq2bPNwvnZeSKosjlU_VyzJdpTsY1kgAJx9sR2EcE3w4xkfLcAJCht2c00TOMiFrfhUnwURaMNLTR-4/s1600-h/100_1374.JPG"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4JdDxMouayTBvQIyCdKiu-_2ToVq7CbT6oH_X5Kp_eBy4rv21xracYA0w3ACSaq2bPNwvnZeSKosjlU_VyzJdpTsY1kgAJx9sR2EcE3w4xkfLcAJCht2c00TOMiFrfhUnwURaMNLTR-4/s320/100_1374.JPG" alt="" id="BLOGGER_PHOTO_ID_5435528032855909042" border="0" /></a><br />Gone with a high expectation and got a double triple mazza right there at NIT calicut campus. Spending about 3 days on a heaven without being recognizing where we are will be surely an un-avoidable scenario on my life diary.<br /><br />Now its time to say about for what cause we gone there. Actually FOSS meet an national level movement for improving open source software with a big bang to the mass audience, none but general computer users. As a part of it we, the developing brains of India in the field of information technology have no other go than developing our verdict towards the open source.<br /><br />So it has begun the era of open source we were pulled off towards the sorts of carrer developing strategies without no other choice. The world is awaitening for such kinds of users who will be given privilege to edit, alter and use the application on his own. And now what are you waiting for just kid-up and make a move on towards mere future.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-5900018814966750792010-02-03T08:57:00.000-08:002010-02-03T09:14:26.852-08:00FOSSmeet at calicut days awaiting for...<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii4MLcOm7B6zmatp_qq6OZActDW0dDaTd0wLZemzfYhB-lugoBdpWe8K-noM83ZCFLbewlvFDSoEZw8t-dh3A7Z7Qf-Ni7u7U61uiQltfSawBS12ZBNVpBwzmRFPvFcaFLOz9kU-SDchY/s1600-h/nit+calicut.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii4MLcOm7B6zmatp_qq6OZActDW0dDaTd0wLZemzfYhB-lugoBdpWe8K-noM83ZCFLbewlvFDSoEZw8t-dh3A7Z7Qf-Ni7u7U61uiQltfSawBS12ZBNVpBwzmRFPvFcaFLOz9kU-SDchY/s320/nit+calicut.jpg" alt="" id="BLOGGER_PHOTO_ID_5434066533476714370" border="0" /></a><br />This is gonna be our first experience on such a big fest of life time. Yes its the FOSSmeet'10 at calicut, Kerela.Though me and my buddies have attended a number of technical symposium and national level tech fest like Aarush conducted by SRM university this one is the first participation of my team over other state.<br /><br />With the same eagerness and anxiety of my readers myself too wanna see what's going to be happened there, how the arrangements will be, who are the deligates gonna visit and an entire visual treat we might be spending there all these stuffs made me a finger bittening mannerism while writting this article itself .<br /><br />So, friends as per my hero VIVEKANANDA's quote "More you wait , Much you gain" i request you all to wait for some time and we will be hopefully moving by tommorow night and spending 3 days at calicut [feb 5-7] and on a sudden i return my first and foremost job is to upload the great experience we had there.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0tag:blogger.com,1999:blog-7198081458395655838.post-40366083777924140232010-02-02T04:30:00.000-08:002010-02-03T09:17:45.545-08:00Mozilla Firefox Campus Rep<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvCz46cra5PolNE1Oq3c0dyyn4ZsPYgnpS6FMxkAJI8b_lt0R31g_Ch6aN86-u3GRz3nyJ4lZFnblyX2n0ihQlT3y5GRDmdlMm57ojfBnAEcvWFBX7JafQ3_0mBsJrbcxGM2Eqhfz9YWA/s1600-h/mozilla-campus-reps.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 300px; height: 221px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvCz46cra5PolNE1Oq3c0dyyn4ZsPYgnpS6FMxkAJI8b_lt0R31g_Ch6aN86-u3GRz3nyJ4lZFnblyX2n0ihQlT3y5GRDmdlMm57ojfBnAEcvWFBX7JafQ3_0mBsJrbcxGM2Eqhfz9YWA/s320/mozilla-campus-reps.png" alt="" id="BLOGGER_PHOTO_ID_5433625616190862994" border="0" /></a><br />Hi friends im not only glad to say this but also on greater excitement because ARAVINDHAN P none but me has been selected as " MOZILLA FIREFOX CAMPUS REP" a prestigious post to hire. I hope everyone of u might be happy with my efforts and i wanna say this to get a high support from your side so please listen to me.<br /><br />To enhance my status on this program i need to conduct many number of conferences, sessions,<br />marketing so and so. I need your hands to shine on this events because you were going to be my audience and you gonna be the participants on all the events which is made to be forwarded by me and my team.<br /><br />There is no special criteria to join, so every one of them were pleasefully welcomed from my side to join this community. While saying about events it will be just like this "I came, I see, I conquered"<br />You need not to be a high level programmer, or a geek on networks and database administration. Be cool to participate and hopefully take back some goodies.Arvindhan Aryanhttp://www.blogger.com/profile/09592482323318087738noreply@blogger.com0