Google
Blog Search Engine -Search Engine and Directory of blogs. Looking for blogs? Find them on BlogSearchEngine.com

Thursday, February 17, 2011

Monitoring Your Health With Your Mobile Phone

Mobile heart monitoring system that allows to view your electrocardiogram on an Android Mobile phone. The innovation is a low-power interface that transmits signals from a wireless ECG (electrocardiogram or heart monitoring)-sensor system to an android mobile phone.
Read more

China Grabs Supercomputing Leadership Spot in Latest Ranking of World’s Top 500 Supercomputers

Takeover of the top spot by the Chinese Tianhe-1A system at the National Supercomputer Center in Tianjin is confirmed, achieving a performance level of 2.57 petaflop/s (quadrillions of calculations per second).
Read more

Enterprise resource planning (ERP)

Enterprise resource planning (ERP) integrates internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, etc. ERP systems automate this activity with an integrated software application. Its purpose is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders.
Read more

IPv4 Internet address system reaches its END

Having recognised the problems that would be caused by the exhaustion of the IPv4 address, IPv6 will provide enough addresses for Internet growth for the foreseeable future and enable the Internet to grow in new directions.
Read more

Wednesday, October 12, 2005

Virtual Office

Have you wish for a system that lets your files follow you everywhere ???

Well I found out that Novell's iFolder allows you to access, organize, and manage your files from anywhere, anytime. iFolder also provides worry-free security, ensuring that all your files are always safe, secure and up to date.

In addition to that they have the email features called Email OutSourcing. Ever wondered why there is a need to spend thousand of dollars buying expensive email license, Spend another thousand of dollars to have someone maintaining the system.
We could rent a email server today that runs on Linux without have to worry about licensing and support.

Constant Replicator Consolidates data to a central server for simplified backups. The remote servers can be securely transfer file or data to central server over long distances and existing networks.

It looks very pratical and cost worthy, click on Virtual Office and have a first hand look on the system.
Virtual Office
For demo purpose use username=demo and password=demo123.

Tuesday, August 16, 2005

Phishing, Zombie & Botnets

PHISHING
Phishing is a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses. These authentic-looking messages are designed to fool recipients into divulging personal data such as account numbers and passwords, credit card numbers and Social Security numbers.

ZOMBIE
Comprised of zombied PC's secretly under the control of attackers, these botnets are used to infect others, churn out spam, host phishing sites, and do other nasty things to the rest of us. Meantime, every keystroke entered on the zombie PC could be logged and sent to the attackers - potentially revealing login credentials, credit card details, and other sensitive information.

BOTNETS
A hacker kicked off the assault by typing a simple command into an internet chat room. That command awakened dormant software “bots” that had been planted in tens of thousands of PCs around the world with the help of computer viruses.
When the bots read the command in an internet chat room they were monitoring, they began firing a blizzard of page requests at the servers hosting the company sites. Result: the servers effectively got tongue-tied trying to service the requests, and had to go offline until the attack ceased.

MY 2cents worth ADVISE
Patch the Exploit...

Wednesday, August 10, 2005

Security and Privacy Issues

Confidentiality, integrity, authenticity and privacy is perhaps the most important aspect of computer security for everyday Internet users.
Security becoming more complex and it is crucial to the protection of critical computing and communication infrastructure.
Various approach need to be taken to address the problems, ranging from purely technical issues (e.g., intrusion detection, network security, etc) to ethical.

Some general tips that I can recommend as follows:-
* Apply vendor-supplied software patches in a timely manner
* Disable features/services that are not explicitly required
* Install anti-virus software and keep it up to date
* Use caution when opening email attachments and following URLs


Below are some utility software for detection:-

MWAV, is a free scanning tool only scans for viruses, however, it does not have the capability to clean it.

VIEWTCP is a free network monitoring tool to monitor various ports on your PC and the remote network addresses suspicious applications are accessing. Click on the icon to download.

Monday, August 08, 2005

About Free Software

What is this free software talk all about?

Well according to the Free Software Foundation:-
Free software is a matter of freedom: people should be free to use software in all the ways that are socially useful. Software differs from material objects--such as chairs, sandwiches, and gasoline--in that it can be copied and changed much more easily. These possibilities make software as useful as it is; we believe software users should be able to make use of them.

Some 4000 over free software packages available @
http://directory.fsf.org/GNU/
If you require more informations on free software get the Free Software Magazine @ www.freesoftwaremagazine.com

Saturday, July 30, 2005

Open Office

Open Office is similar to Microsoft Office an office suite which runs on multi-platform and it's multi-lingual.

The Open Office Suite founded by Sun Microsystem gives you everything you'd expect in office software. The components are:-

Writer - you can create dynamic documents.
Impress - for your powerful presentations.
Calc - your all purpose spreadsheet.
Base - new way to access databases.
Math - create equations and formulae for your documents.
Draw - a powerful graphics package.

Download available @ www.openoffice.org/

Monday, May 09, 2005

Greatest Engineering Achievements of the 20th Century

Have you ever thought about the remarkable technological achievements of the 20th. century?
I bounced into a website developed by the National Academy of Engineering of United States of America who has identified those achievements and acknowledged them.
A very informational and resourceful site for both student and adults.

www.greatachievements.org