Thursday 19 February 2015

Term of the day – “Internet of Things”


Internet of things (IOT) is an umbrella term used to refer all devices that are connected over the Internet . These include PC’s , mobile devices , tablets , etc. Beside computers , these also includes appliances such as micro-ovens , refrigerators , etc . These devices are also called “smart devices” as they can communicate with each other . IOT must be enabled for wireless communication to connect to wired media . Generally these devices use Bluetooth to connect amongst themselves .
Besides communicating and connecting over internet , IOT devices are also with an array of sensors , that can help in multi-faceted applications of the same .

Monday 9 February 2015

Term Of the Day – Dynamic URL


an Example of setting up Dynamic URL .
Dynamic URL refers to links that are generated as a result of queries from databases and are very different from static URLs . While the content of pages generated of static URL doesn't changes until the HTML code has been changed by the user , the content of dynamic URL pages are customized as per the query contents required by the user . The page is generally a database template filled with display based on  database query results . Any website with a dynamic URL has an associated
database which fills in most contents of the web page .

The parameters of a dynamically defined URL can be manually generated or can be automated . For instance , some websites track user’s IP address location and suitably decide on display options such as offers and language , etc. It is a highly convenient method to cater to individual user’s choice .

Monday 2 February 2015

Term Of The Day – Conficker !!


Conficker is a virus worm , that is directed to infect systems with  Microsoft Windows 2000 / 7/8 , etc. Operating system . This was first detected in 2003 , when it affected the French Navy computer network to such extents that it had to ground several of it’s fleet for being unable to download flight data . Since then , Conficker has appeared and re-appeared in over 200 countries , each time more powerful with added malware protection tools implanted in itself .

The virus’s unknown authors are believed to be tracking anti-malware websites and law enforcement authorities , and to be plugging the virus’ loopholes . Ever Since , five variants of Conficker have appeared , each powerful than the later .

Possible effects of Conficker on an infested system are :

  • Modification of System settings .
  •  Killing anti-malware software .
  • Termination / disablement of windows service such as Firewall , Defender , etc .
  • Resetting system restore points .
  • Deleting Back-up
  • Checking for internet connectivity and downloading arbitrary files
  • System used as a peer in seeding further the current or higher Conficker brethen .