2. In Sweden,Professor Paolo Macchiarini and his team has successfully done the first man-made organ transplantation in the history of medicine.Name the organ.
3. Robert L. Crippen, a retired Navy captain of USA is being remembered for what?
by Admin · 0
Ethical Hacking!! The term sounds interesting.. right?. Of course it is an interesting and important area in today's security vulnerable computer world. Ethical Hacking is just the opposite of hacking and is the use of specially developed programs to find the loop holes in a computer program. The job of both hackers and ethical hackers are the same - crack the system. But the purpose is different. The former is illegal,without permission and meant for destroying the computer system or network whereas later is legal,with permission and done to make the system more resistant to vulnerabilities.
For example if I run a project worth 100 million dollars,it is my responsibility to make sure than none others in the world can break my system.I can sure this with the help of ethical hackers.They can easily figure out the security vulnerabilities in my project so that I can fix my issues before it moves to production.An ethical hacker tries to penetrate network or computer system using the same methods as a hacker.
For example if I run a project worth 100 million dollars,it is my responsibility to make sure than none others in the world can break my system.I can sure this with the help of ethical hackers.They can easily figure out the security vulnerabilities in my project so that I can fix my issues before it moves to production.An ethical hacker tries to penetrate network or computer system using the same methods as a hacker.
Terms associated with Ethical hacking
Penetration testing : A method of measuring the security of a computer system or network by simulating an attack from a malicious source.Through penetration testing we could identify improper system configurations,hardware or software flaws,operational illnesses etc.
Penetration testing : A method of measuring the security of a computer system or network by simulating an attack from a malicious source.Through penetration testing we could identify improper system configurations,hardware or software flaws,operational illnesses etc.
White hat : Term used to refer an ethical hacker.
Notable White hats
1. Stephen Wozniak : He is well known for being the co founder of Apple.
2. Kevin Mitnick : Founder of Mitnick Security Consulting company.He started as a black hat and was sentenced to jail for 5 years for hacking multiple systems of the Digital Equipment Corporation
Black hat : Term used to refer a hacker.
A "Notable" Black hat
Jonathan James : Hacked the Defense Threat Reduction Agency (DTRA) of the Department of Defense, NASA, at the age of 15.
Ethical hacking is a highly paid profession due to its security significance and it is a known fact that to be a good white hat you should be a great black hat!!
by Admin · 0
IBM - International Business Machines - celebrates its 100th birthday this year.The company's earlier name was Computing-Tabulating-Recording Company as it was primarily focused on building scales, time-recording devices and tabular machines.The visionary CEO, Mr Watson who lead the company from 1914 to 1956 changes the name to IBM in 1924. Afterwards the story of IBM is truly international. From punch cards to s/360,from tabulators to teraflops,IBM dominated the entire software and hardware industry of the world till 1990s.Almost all hardware products known to us from the computer industry were innovated by IBM - electric tabulators, typewriters, DRAM, hard disk drives, bar codes, magnetic-stripe cards- the list is endless.
by Admin · 0
ZionEyez - a social media company, is developing the latest innovation in personal video recording technology. Its new pair of eyeglasses embeds a 720p HD video camera,designed to record live video data. It also includes an 8GB flash memory. After recording you can transfer the data via Bluetooth or Micro USB to a computer or wirelessly transfer to most of the iPhones or Android devices. If you are installing their smart phone and tablet app - EyeZ - you can wirelessly broadcast the video in real time to your preferred social networking sites like facebook or orkut.
by Admin · 0
MS office 2010 celebrates its first birthday in a grand manner today.Office 2010 is the fastest-selling version of Office ever. Business customers are adopting Office 2010 five times faster than they deployed Office 2007. Office 2010 was launched a year ago with social networking and online collaboration tools, including Office Web Apps, the web-based versions of the Office programs.Nearly 50 million people worldwide use Office Web Apps to view, edit, and share their documents from anywhere with a browser and an Internet connection.
Google Docs is the major competitor for MS Office's Web Apps in the market.By this numbers Microsoft has surpassed the challenges of Google Docs successfully.
by Admin · 0
Internet giant google has just came with another breaking news today.Now googling can be done by talking to your computer!!.To add on you can also trigger a search by dropping an image in the search box.Both features will be rolling out over the next few days
Alan Eustace, senior vice president of knowledge at Google has said it well - "Search is at the core of our business and the investment levels are continuing and increasing." Voice input for search is an existing feature for Android Smart phones.Google plans to integrate this feature to its newest version of Chrome browser for PCs and laptops. Your computer must have an attached microphone to make use of this feature.
Alan Eustace, senior vice president of knowledge at Google has said it well - "Search is at the core of our business and the investment levels are continuing and increasing." Voice input for search is an existing feature for Android Smart phones.Google plans to integrate this feature to its newest version of Chrome browser for PCs and laptops. Your computer must have an attached microphone to make use of this feature.
by Admin · 0
Apple's fifth major release of their operating system,iOS 5 was previewed to the public on June 6, 2011. Sudden after the preview, Microsoft VP in charge of Windows Phone development, Joe Belfiore tweeted that he was flattered that iOS was borrowing some of the ideas his team came up with.
These are some of the new features added to iOS5 which are already available for Windows7 users from day one.
1.Non intrusive pop-up notifications feature has similarities with that of Windows Phone7. New notifications show in a notification bar which appears at the top of the screen every time a notification is received; SMS, missed phone calls and regular notifications from every 3rd party app.
by Admin · 0
Subscribe to:
Comments (Atom)




