Showing posts with label Miscellaneous. Show all posts
Showing posts with label Miscellaneous. Show all posts

Friday, June 15, 2012

What is GIS ?


"Geographic information" mainly deals with the information about places on the earth's surface,knowledge about where something is or what is at a given location.
Role of GI in GIS-
-->  Geographic information is GIS resolution which varies depending on the availability of the data and requirement of the specific project.
-->  Geographic information are often relatively static like natural features and many features of human origin don't change rapidly and can be map on paper. 

Thursday, June 14, 2012

What is Cloud Computing and advantage of cloud


Cloud Computing is an emerging concept that contain technological capabilities like software, hardware and data
services. commonly maintained off premises that are delivered  on demand as a services. The services are provided the software ,platform and infrastructure .The cloud computing uses a shared architecture ans supports the ability to dynamically scale up and quickly scale down,offering cloud consumers high reliability,quick response times and the flexibility to handle traffic fluctuation and demand.
                                                  The biggest advantages of cloud computing  Creating virtual technology which allows cloud service provider t convert one server into many virtual machines , thereby eliminating client-server computing with single purpose systems. this technology is also called virtualization . 

Wednesday, May 30, 2012

The difference between the FileSystemApplicationContext and ClassPathXmlApplicationContext


FileSystemApplicationContext  will look for <filename.xml> in a specified Location within the  file  system.
ClassPathXmlApplicationContext  will look for <filename.xml> in classpath(include all JARs).

Monday, October 10, 2011

How to worms are infects to networks what are the steps are used to infect network?



Worms are a particularly dangerous type of hostile code. They replicate themselves by independently exploiting vulnerabilities in networks. Worms almost always slow down networks.
   Hackers and Attackers use five basic phases of attack, regardless of whether a worm or virus is employed-
1.           Probe -The goal is to find computers that can be subverted. Internet Control Message Protocol (ICMP) ping scans are used to map networks. Then the application scans and identifies operating systems and vulnerable software. Hackers can obtain passwords using social engineering, dictionary attack, brute-force attack, or network sniffing.

Saturday, October 8, 2011

An Intresting story about Trojan Horse



The term Trojan Horse originated from Greek mythology. Greek warriors offered the people of Troy (Trojans) a giant hollow horse as a gift. The Trojans brought the giant horse into their walled city, unaware that it contained many Greek warriors. At night, after most Trojans were asleep, the warriors burst out of the horse and overtook the city.A Trojan Horse in the world of computing is malware that carries out malicious operations under the guise of a desired function. A virus or worm could carry a Trojan Horse. A Trojan Horse contains hidden, malicious code that exploits the privileges of the user that runs it. Games can often have a Trojan Horse attached to them. When running the game, the game works, but in the background, the Trojan Horse has been installed on the user's system and continues running after the game has been closed.

Thursday, October 21, 2010

Hello World !


HAPPY BLOGGING !


 

Site Status

Man Behind Technical Today

Hello, I am Navin Bansal. I am a student of MCA in Rajsthan Institute of Engineering and Technology and owner of this blog. I share my view and ideas among people.