Social Icons

Tuesday, June 08, 2010

Prisoners all set to est BPO : A first from Cherlapally Central Jail

1. In a country where media,politicians,government, bureaucrats,actors,sportsman etc etc and most of the citizens are busy baking power and minting money,this is one news that could do HINDUSTAN proud.

2. In a bold & really unique experiment,likely to be the first of its kind in our country,there will soon be BPO units with the inmates as employees. This is a unique development and Cherlapally Central Jail in Hyderabad@Andhra Pradesh is the first prison throughout the country to have such a unique facility in its premises.These BPO units will have educated convicts serving out their terms. A public-private partnership was signed up between the prison authorities and the Bengaluru based IT firm, Radiant Infosystems.As many as 250 inmates will be enrolled in the BPO unit and they will be later shortlisted according to their qualifications. Most of the inmates are matriculates and graduates. The shortlisted inmates will then be given training by experts and then absorbed by the BPO company into their Jail unit. For starters, the convicts working there will not have any access to phones as in the case of a normal call centre. They will be mostly involved in bank-related data entry and transfer work.

3. "We found that large number of convicts are willing to work on computers. So, I thought these prisoners can made use of and they can be put on computer-based jobs," said Gopinath Reddy, Director General For Prisons, Andhra Pradesh.

4. This is really positive contribution I feel....although a percent of readers may tend to opine about QoS etc...but...worth a start and Idea....

Monday, June 07, 2010

XINGYUN : World's Fastest Computer

1. "Experts say one second of its work may take a whole day for a dual-core personal computer"

2. Such is the astonishing ..or I say beyond imagination power of this officially disclosed SUPERCOMPUTER named "Xingyun" from China that runs at more than one quadrillion (one thousand million million) calculations per second.

3. XINGYUN is now the server of ‘Dawn 6000’ which has been jointly developed by Dawning Information Industry Co. Ltd, Chinese Academy of Sciences Calculation Institution and the South China Supercomputing Centre. It has been developed for DNA sequencing and for cloud computing.

4. Perhaps there is no end to improvement.....tomorrow will come up with much much higher speeds then XINGYUN......wait and watch.....

Monday, May 31, 2010

SHADOWS IN THE CLOUD

1. First time I heard this term...i thought its abt some movie...some crime thriller or may be some novel or book...but when I actually came to know about this...it was exploring a whole new world....this is abt a 60 pg brief on how cyber security can compromise you and your organisation secrets....wonderfully compiled...easy to understand...easy english....gr88888 ...


3. Must read for IT Security enthusiasts!!

Tuesday, May 11, 2010

I M IN "CHIP"- MAY MONTH EDITION 2010

1. Don't get me wrong for those of you who read only I M IN "CHIP"...i m not inside the regular chip...but have been able to find space in MAY edition of the Chip - India's Most Trusted Guide To Gadgets And Technology.Scanned copy attached.


2. Thanks CHIP

Monday, May 03, 2010

EAVES DROPPING RISK : EMR

1. Imagine someone sitting in a van outside a person's house can read the EMR that is emanating from the user's laptop computer inside the house and reconstruct the information from the user's monitor on a different device. Different devices have different levels of susceptibility to Tempest radiation. A handheld calculator gives off a signal as much as a few feet away, and a computer's electromagnetic field can give off emissions up to half a mile away. The distance at which emanations can be monitored depends on whether or not there are conductive media such as power lines, water pipes or even metal cabinets in the area that will carry the signals further away from the original source.

2. This problem is not a new one; defence specialists have been aware of it for over twenty years.Information on the way in which this kind of "eavesdropping" can be prevented is not freely available. Equipment designed to protect military information will probably be three or four times more expensive than the equipment likely to be used for processing of non-military information.Until recently it was considered very difficult to reconstruct the data hidden in the radiated field, and it was therefore believed that eavesdropping on digital equipment could only be performed by professionals with access to very sophisticated detection and decoding equipment. As a result, digital equipment for processing information requiring medium or low level protection, such as private and business information, is not protected against eavesdropping of this kind.

3. The EMR that is emitted by electric devices contains the information that the device is displaying or storing or transmitting. With equipment designed to intercept and reconstruct the data, it is possible to steal information from unsuspecting users by capturing the EMR signals. The U.S. government originally began studying this phenomenon in order to prevent breaches in military security. The government was using the technology to their advantage during WWII and realized that they needed to protect themselves against others using the same tactics against them. The name Tempest, or Tempest radiation originated with the U.S. military in the 1960s as the name of the classified study of what was at the time called "compromising emanations."

4. Today the phenomenon is more commonly referred to as van Eck phreaking, named after Wim van Eck, the Dutch computer scientist who brought it to general attention in 1985 when he published his paper "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?," in which he demonstrated that the screen content of a video display unit could be reconstructed at a distance using low-cost home-built equipment - a TV set with its sync pulse generators replaced with manually controlled oscillators.

5. Van Eck phreaking is a major security concern in an age of increasing pervasive computing. High-security government agencies are protecting themselves by constructing safe rooms that through the use of metallic shielding block the EMR from emanating out of the room or by grounding the signals so that they cannot be intercepted. It is possible, though costly, for individual users to shield their home computer systems from EMR leakage.


Thursday, April 15, 2010

Computer EASTER EGGs

1. Whats an easter egg post doing here? Well even this has an IT context.In the computer world this refers to an un documented lineament that is in a program that the makers of that program placed in the program for additional fun and credits. Easter Eggs are in no way destructive to any software or hardware within the computer and are usually meant for fun. For example an interesting computing easter egg is given below

- Type "=rand(200,99)"(without quotes) into the MS word and watch as around 567 pages get filled with random text!!

2. Thanks http://www.computerhope.com & Digit magazine subscriber edition.

Wednesday, April 07, 2010

Thursday, April 01, 2010

HOW TO HYPER LINK IN COMMENTs AT BLOGGER?

1. I was recently commenting at a blogpost and wanted 2 place a hyperlink..but could not find any option while right clicking or from any where.Thus googled and found this simple two step procedure here

Wednesday, March 31, 2010

DATA RECOVERY FROM RAM?

1. If any one can just throw some light or post a link to any matter that exists on the web pertaining to limitations/possibilities of recovery of data from RAM inside a computer?

2. Thanks.


Sunday, March 28, 2010

WiFi at home : Take precautions

1. Accessing WiFi at home is no more limited to tech geeks as the simple configuration has made it accessible to even a layman who hardly has any know how of how it works and what are the dangers floating around if he goes with the default settings.The two year back case of a hacker emailing from an open WiFi account in Mumbai reflects the deep dangers associated with such mishaps.Following are a set of desirable config changes any WiFi account holder at home and office whould take care of while configuring.....

Step 1: Change the default password

Step: 2: Change the default IP address

Step 3: Disable the DHCP service

DHCP (Dynamic Host Configuration Protocol) enables remote computers connected to the router to obtain an IP address and join the network without needing to know the IP and router address information. This is a simple and effective way of keeping intruders away. As far as possible, set up the computers on your network with static IP addresses. If you still want to use DHCP to make your own configuration easier, restrict the number of DHCP IP users to the number of computers on your network. For example, if you have five laptops running on the network, limit the DHCP IP addresses to 5 from the default 50.

Step 4: Restrict the network mode

Step 5: Change the default SSID

Step 6: Opt for WPA2 or PSK security over WEP

Step 7: Enable the MAC Filter

Step 8: Use the router’s firewall

Step 9: Use Internet Access Policies

Step 10: Disable remote administration

Step 11: Switch off the router when not in use

Step 12: Disconnect the Internet when not needed

Step 13: Position your router carefully

Step 14: Update the router firmware

Step 15: Scan for signal leaks from time to time

2. Also check out here.Thanks http://www.freealldown.com
Powered By Blogger