Saturday, July 26, 2008

Apple Safari Download

Safari is a web browser developed by Apple Inc. and included in Mac OS X. It was first released as a public beta on January 7, 2003,[1] and is the default browser in Mac OS X v10.3 and later. It is also the native browser on the Apple iPhone and iPod touch. Safari for Windows[2] was released on June 11, 2007.[3] Windows XP and Windows Vista are supported.
Since the release of Safari, its usage share has been steadily climbing. According to Net Applications, Safari's marketshare for May 2008 was 6.25%.[4]

Opera Browser Download


Opera is a web browser and Internet suite developed by the Opera Software company. Opera handles common Internet-related tasks such as displaying web sites, sending and receiving e-mail messages, managing contacts, IRC online chatting, downloading files via BitTorrent, and reading web feeds. Opera is offered free of charge for personal computers and mobile phones, but for other devices it must be paid for.
Features of Opera include tabbed browsing, page zooming, mouse gestures, and an integrated download manager. Its security features include built-in phishing and malware protection, strong encryption when browsing secure web sites, and the ability to easily delete private data such as cookies and browsing history by simply clicking a button.
Opera runs on a variety of personal computer operating systems, including Microsoft Windows, Mac OS X, Linux, FreeBSD, and Solaris.[2] Though evaluations of Opera have been largely positive, Opera has captured only a fraction of the worldwide personal computer browser market. It is currently the fourth most widely used web browser for personal computers, behind Internet Explorer, Firefox, and Safari.
Opera has a stronger market share, however, on mobile devices such as mobile phones, smartphones, and personal digital assistants. Editions of Opera are available for devices using the Symbian and Windows Mobile operating systems, as well as Java ME-enabled devices. In fact, approximately 40 million mobile phones have shipped with Opera pre-installed. Furthermore, Opera is the only web browser available for the Nintendo DS and Wii gaming systems. Some television set-top boxes use Opera as well, and Adobe licensed Opera technology for use in the Adobe Creative Suite.

Mozilla Firefox Download


Mozilla Firefox is a web browser descended from the Mozilla Application Suite, managed by the Mozilla Corporation. Firefox had 19.03% of the recorded usage share of web browsers as of June 2008, making it the second-most popular browser in current use worldwide, after Internet Explorer.[1]
To display web pages, Firefox uses the Gecko layout engine, which implements some current web standards plus a few features which are intended to anticipate likely additions to the standards.
Firefox includes tabbed browsing, a spell checker, incremental find, live bookmarking, a download manager, and an integrated search system that uses the user's desired search engine. Functions can be added through add-ons created by third-party developers,[2] the most popular of which include the NoScript JavaScript disabling utility, Tab Mix Plus customizer, FoxyTunes media player control toolbar, Adblock Plus ad blocking utility, StumbleUpon (website discovery), DownThemAll! download enhancer and Web Developer toolbar.[3]
Firefox runs on various versions of Microsoft Windows, Mac OS X, Linux, and many other Unix-like operating systems. Its current stable release is version 3.0.1, released on July 16, 2008.[4] Firefox's source code is free software, released under a tri-license GPL/LGPL/MPL


Features included with Firefox are tabbed browsing, spell checker, incremental find, live bookmarking, an integrated download manager, and an integrated search system that uses the user's desired search engine. The developers of Firefox aimed to produce a browser that "just surfs the web"[27] and delivers the "best possible browsing experience to the widest possible set of people."[28]
Users can customize Firefox with extensions and themes. Mozilla maintains an add-on repository at addons.mozilla.org with nearly 2000 add-ons in it as of September 2007.[2]
Firefox provides an environment for web developers in which they can use built-in tools, such as the Error Console or the DOM Inspector, or extensions, such as Firebug.
Firefox uses a sandbox security model,[36] and limits scripts from accessing data from other web sites based on the same origin policy.[37] It uses SSL/TLS to protect communications with web servers using strong cryptography when using the https protocol.[38] It also provides support for web applications to use smartcards for authentication purposes.[39]
The Mozilla Foundation offers a "bug bounty" to researchers who discover severe security holes in Firefox.[40] Official guidelines for handling security vulnerabilities discourage early disclosure of vulnerabilities so as not to give potential attackers an advantage in creating exploits.[41]
Because Firefox has fewer and less severe publicly known unpatched security vulnerabilities than Internet Explorer (see Comparison of web browsers), improved security is often cited as a reason to switch from Internet Explorer to Firefox.[42][dead links][43][44][45] The Washington Post reports that exploit code for critical unpatched security vulnerabilities in Internet Explorer was available for 284 days in 2006. In comparison, exploit code for critical security vulnerabilities in Firefox was available for 9 days before Mozilla shipped a patch to remedy the problem.[46]
A 2006 Symantec study showed that although Firefox had surpassed other browsers in the number of vendor-confirmed vulnerabilities that year through September, these vulnerabilities were patched far more quickly than those found in other browsers.[47] Symantec later clarified their statement, saying that Firefox still had fewer security vulnerabilities than Internet Explorer, as counted by security researchers.[48] As of July 18, 2008, Firefox 3 has zero security vulnerabilities unpatched according to Secunia.[49] Internet Explorer 7 has ten security vulnerabilities unpatched, the most severe of which was rated "moderately critical" by Secunia.[50]


Mozilla Firefox supports many web standards, including HTML, XML, XHTML, SVG 1.1 (partial),[29] CSS (with extensions[30]), ECMAScript (JavaScript), DOM, MathML, DTD, XSLT, XPath, and PNG images with alpha transparency.[31] Firefox also supports standards proposals created by the WHATWG such as client-side storage,[32][33] and canvas element.[34]
Firefox passes the Acid2 standards-compliance test from version 3.0.[35] Firefox 3.0 does not pass the Acid3 test; it scores 71/100 and does not render the image correctly.

Thursday, June 5, 2008

Computer Virus

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, to refer to many different types of malware (a portmanteau of the words malicious and software) and adware (a portmanteau of the words advertisement and software) programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Meanwhile viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless. Worms and Trojans may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when executed. In general, a worm does not actually harm either the system's hardware or software, while at least in theory, a Trojan's payload may be capable of almost any type of harm if executed. Some can't be seen when the program is not running, but as soon as the infected code is run, the Trojan horse kicks in. That is why it is so hard for people to find viruses and other malware themselves and why they have to use spyware programs and registry processors.
Most personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.
Some malware is programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Other malware programs are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these less sinister malware programs can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, much malware is bug-ridden, and these bugs may lead to system crashes and data loss. Many CiD programs are programs that have been downloaded by the user and pop up every so often. This results in slowing down of the computer, but it is also very difficult to find and stop the problem.

  • Worms : A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Many worms have been created which are only designed to spread, and don't attempt to alter the systems they pass through. However, as the Morris worm and Mydoom showed, the network traffic and other unintended effects can often cause major disruption. A "payload" is code designed to do more than spread the worm - it might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a "zombie" under control of the worm author - Sobig and Mydoom are examples which created zombies. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website's address.[1] Spammers are therefore thought to be a source of funding for the creation of such worms,[2][3] and worm writers have been caught selling lists of IP addresses of infected machines.[4] Others try to blackmail companies with threatened DoS attacks.[5]
Backdoors can be exploited by other malware, including worms. Examples include Doomjuice, which spreads using the backdoor opened by Mydoom, and at least one instance of malware taking advantage of the rootkit and backdoor installed by the Sony/BMG DRM software utilized by millions of music CDs prior to late 2005.

  • Trojan Horse : In the context of computing and software, a Trojan horse, or simply trojan, is a piece of software which appears to perform a certain action but in fact performs another such as transmitting a computer virus. Contrary to popular belief, this action, usually encoded in a hidden payload, may or may not be actually malicious, but Trojan horses are notorious today for their use in the installation of backdoor programs. Simply put, a Trojan horse is not a computer virus. Unlike such malware, it does not propagate by self-replication but relies heavily on the exploitation of an end-user (see Social engineering). It is instead a categorical attribute which can encompass many different forms of codes. Therefore, a computer worm or virus may be a Trojan horse. The term is derived from the classical story of the Trojan Horse.
    In the field of computer architecture, 'Trojan Horse' can also refer to security loopholes that allow kernel code to access anything for which it is not authorized.

Charles Babbage


Charles Babbage, FRS (26 December 1791 London, England18 October 1871 Marylebone, London, England)[2] was an English mathematician, philosopher, inventor and mechanical engineer who originated the concept of a programmable computer. Parts of his uncompleted mechanisms are on display in the London Science Museum. In 1991 a perfectly functioning difference engine was constructed from Babbage's original plans. Built to tolerances achievable in the 19th century, the success of the finished engine indicated that Babbage's machine would have worked. Nine years later, the Science Museum completed the printer Babbage had designed for the difference engine, an astonishingly complex device for the 19th century. Babbage is credited with inventing the first mechanical computer that eventually led to more complex designs.
His father's money allowed Charles to receive instruction from several schools and tutors during the course of his elementary education. Around the age of eight he was sent to a country school in Alphington near Exeter to recover from a life-threatening fever. His parents ordered that his "brain was not to be taxed too much" and Babbage felt that "this great idleness may have led to some of my childish reasonings." For a short time he attended King Edward VI Grammar School in Totnes, South Devon, but his health forced him back to private tutors for a time.[6] He then joined a 30-student Holmwood academy, in Baker Street, Enfield, Middlesex under Reverend Stephen Freeman. The academy had a well-stocked library that prompted Babbage's love of mathematics. He studied with two more private tutors after leaving the academy. Of the first, a clergyman near Cambridge, Babbage said, "I fear I did not derive from it all the advantages that I might have done." The second was an Oxford tutor from whom Babbage learned enough of the Classics to be accepted to Cambridge.
Babbage arrived at Trinity College, Cambridge in October 1810. He had read extensively in Leibniz, Joseph Louis Lagrange, Thomas Simpson, and Lacroix and was seriously disappointed in the mathematical instruction available at Cambridge. In response, he, John Herschel, George Peacock, and several other friends formed the Analytical Society in 1812. Babbage, Herschel and Peacock were also close friends with future judge and patron of science Edward Ryan. Ultimately, Babbage and Ryan married sisters.[7]
In 1812 Babbage transferred to Peterhouse, Cambridge. He was the top mathematician at Peterhouse, but failed to graduate with honors. He instead received an honorary degree without examination in 1814.



Babbage sought a method by which mathematical tables could be calculated mechanically, removing the high rate of human error. Three different factors seem to have influenced him: a dislike of untidiness; his experience working on logarithmic tables; and existing work on calculating machines carried out by Wilhelm Schickard, Blaise Pascal, and Gottfried Leibniz. He first discussed the principles of a calculating engine in a letter to Sir Humphry Davy in 1822.

Part of Babbage's difference engine, assembled after his death by Babbage's son, using parts found in his laboratory.
Babbage's engines were among the first mechanical computers, although they were not actually completed, largely because of funding problems and personality issues. He directed the building of some steam-powered machines that achieved some success, suggesting that calculations could be mechanized. Although Babbage's machines were mechanical and unwieldy, their basic architecture was very similar to a modern computer. The data and program memory were separated, operation was instruction based, the control unit could make conditional jumps and the machine had a separate I/O unit.



Analytical engine
Main article: Analytical engine
Soon after the attempt at making the difference engine crumbled, Babbage started designing a different, more complex machine called the Analytical Engine. The engine is not a single physical machine but a succession of designs that he tinkered with until his death in 1871. The main difference between the two engines is that the Analytical Engine could be programmed using punch cards, an idea unheard of in his time. He realized that programs could be put on similar cards so the person had only to create the program initially, and then put the cards in the machine and let it run. The analytical engine was also proposed to use loops of Jacquard's punched cards to control a mechanical calculator, which could formulate results based on the results of preceding computations. This machine was also intended to employ several features subsequently used in modern computers, including sequential control, branching, and looping, and would have been the first mechanical device to be Turing-complete.
Ada Lovelace, an impressive mathematician and one of the few people who fully understood Babbage's ideas, created a program for the Analytical Engine. Had the Analytical Engine ever actually been built, her program would have been able to calculate a sequence of Bernoulli numbers. Based on this work, Lovelace is now widely credited with being the first computer programmer.[20] In 1979, a contemporary programming language was named Ada in her honour. Shortly afterward, in 1981, a satirical article by Tony Karp in the magazine Datamation described the Babbage programming language as the "language of the future".[21]

[edit] Modern adaptations
While the abacus and mechanical calculator have been replaced by electronic calculators using microchips, the recent advances in MEMS and nanotechnology have led to recent high-tech experiments in mechanical computation. The benefits suggested include operation in high radiation or high temperature environments.
These modern versions of mechanical computation were highlighted in the magazine The Economist in its special "end of the millennium" black cover issue in an article entitled Babbage's Last Laugh . The article highlighted work done at University of California Berkeley by Ezekiel Kruglick. In this Doctoral Dissertationthe researcher reports mechanical logic cells and architectures sufficient to implement the Babbage Analytical engine (see above) or any general logic circuit. Carry-shift digital adders and various logic elements are detailed as well as modern analysis on required performance for microscopic mechanical logic.

Wednesday, June 4, 2008

Dan Bricklin

Dan Bricklin is known for co-creating the VisiClac spreadsheets program. He was born in Philadelphia, Pennsylvania on July 16th, 1951. He Attended the Akiba Hebrew Academy during high school years. He went to college at the Massachusetts Institute of Technology, Where he recieved his Bachelor of Science degree in electrical engineering and computer science. He later got his Master of Business Administration from Harvard University in 1979. After getting out of Harvard University, he co-founded Software Arts Inc. and began to sell VisiCalc software, which was the first spreadsheet software of its time for personal computers. In 1985, he lift Software Arts Inc. to found Software Gardens. He then co-founded the Slate Corporation in 1990. He soon returned to Software Gardens in 1994 when the Slate Corporation closed down. In 1995, he founded the Trellix corporation, which was later bought by Interland, which is now Web.com.

Monday, May 12, 2008

Australian Information Industry Association

The Australian Information Industry Association (AIIA) is the peak body representing the information and communications technology (ICT) industry in Australia.
ICT is a driving force behind the Australian economy, contributing 4.6 per cent of the nation’s Gross Domestic Product[1]. This powerful industry is led by AIIA - which has 450 plus member companies that generate combined annual revenues of more than $40 billion, employ 100,000 Australians and export more than $2 billion in goods and services each year.
AIIA’s member companies include some of the most well recognised ICT companies in Australia and the world - such as Microsoft, IBM and Hewlett-Packard, as well as many rising stars. AIIA’s membership captures all sectors of the ICT industry, ranging from hardware and software services to multinational companies and local small-to-medium sized enterprises.
AIIA sets the strategic direction of the ICT industry, influences public policy, engages industry stakeholders and provides member companies with business productivity tools, advisory services and market intelligence to accelerate their business growth.

Canadian Information Processing Society

The Canadian Information Processing Society (C.I.P.S) is the Information Technology professional society in Canada. The society certifies and regulates the Information Systems Professional (I.S.P) designation in most provinces. The society also performs accreditation of computer science and software engineering programs at Canadian universities. CIPS is responsible for defining the Canadian IT Body of Knowledge.
Each province has a provincial bodies that administers the legislation or regulation establishing the self-regulating professional body. This consists of the following bodies:
CIPS Alberta
CIPS British Columbia
CIPS Manitoba
CIPS New Brunswick
CIPS Nova Scotia
CIPS Ontario
CIPS Saskatchewan
In Québec, CIPS is partnered with the Fédération de l'informatique du Québec (FIQ). CIPS is the Canadian member organisation of the International Federation for Information Processing (IFIP). IFIP works on establishing international standards for information technology and software engineering. CIPS is also a member of South East Asia Regional Computer Confederation (SEARCC).

Information Technology

Information Technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware." IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.
Today, the term information technology has ballooned to encompass many aspects of computing and technology, and the term is more recognizable than ever before. The information technology umbrella can be quite large, covering many fields. IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems. When computer and communications technologies are combined, the result is information technology, or "infotech". Information Technology (IT) is a general term that describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information. Presumably, when speaking of Information Technology (IT) as a whole, it is noted that the use of computers and information are associated.

Sunday, May 11, 2008

Grace Murray

Grace Murray Hopper was born on December 9, 1906 in New York. She later attended Hartridge in New Jersey. In 1934, she got her Ph.D in mathematics at Yale University and at Vassar, she taught mathematics and become a associate professor. She was very interested in mathematics obviously.
Military WomanIn 1943, she joined the
U.S. Navy Reserve as a pioneer. She had to work with Howard Aiken on the Harvard Mark I Calculator, also known as the IBM ASCC (Automatic Sequence Controlled Calculator).One of the first programmers to accomplish this task. Significance:Hopper showed that women, young or old, can do the impossible even if you feel like giving up. She also made the first calculator (with help), which is one of the greatest accomplishments in mankind. Not only did she do this accomplishment, but did other accomplishments as well. At that time,(1930s and 1940s) women were to follow what their husband did and hope their husbands would come home from work or war. Instead, she joined the US navy and became a US Navy officer, one of the first programmer of the Harvard Mark I calculator, and a professor of mathematics at a university before these other jobs. She received many awards that is amazing even today for anyone. She died on January 1, 1992, but will be remembered as "Amazing Grace".

Wednesday, March 5, 2008

Paul Allen


Paul Allen was Born January 21, 1953 in Seattle, Washington. Paul's parents where Kenneth S. Allen, an associate director of University of Washington libraries and his mom was Faye G. Allen. Paul and Bill Gates formed the the multi billion dollar company Microsoft . He is the fifth richest man in America he is worth about 18 billion dollars. He is also the founder and chairman of Vulcan Inc. , and also chairman of Charter Communications. Paul also owns the Seattle Sea Hawks and the Portland Trail Blazers. In 2007 Time Magazine listed Paul under the 100 most Influential People in The World. Paul went to Lakeside School, a private school in Seattle, where he met Bill Gates which also and common interest in computers as Paul did. Paul attended Washington State University, and was a member in Phi Kappa Theta Fraternity. But after two years he dropped out of school to go to work. Paul later convinced Bill Gates to drop out of Harvard University so they could create Microsoft.Inc his later years He was diagnosed with Hodgkin's disease.


Paul co-founded Microsoft in Albuquerque, New Mexico, and in 1975 Paul began selling a BASIC programming system. In 1980, Paul made a deal for Microsoft to buy a operating system called 86-DOS for about 50,000 dollars. After a Dispute With Microsoft and IBM, Microsoft won a contract to make the finished program for a operating system of IBM'snewest PC. This is what created the foundation for Microsoft and started its growth. Microsoft Is the most well known operating system in the world.


This significant because this is the most well known operating system in the world for PC. Without the operating system our computers their will be no other operating system to replace it. Also Microsoft Office helps out with spreadsheets and with whatever work you might need. Basically without Microsoft their would be no use of PC's. Also they have came out wth a mp3/mp4 called zune

Friday, February 29, 2008

Guy Kawasaki

Guy was born in Honolulu, Hawaii in 1954. Guy's family lived in the ghetto part of Honolulu called Kalihi Valley. They weren’t rich, his mother and father wanted Guy and his sister to get the best education and have the best possible life. Guy's mother was a housewife, and father was a fireman, real estate broker, state senator, and government official.He went to Lolani High School and graduated 1972. He then went to Stanford University where he graduated in 1976.After Standfrord he went to UC Davis because his parents wanted him to become a doctor or lawyer or some high paying jobs. When He was done with UC Davis he went to another University, UCLA, he then enrolled in the MBA program. It all started when he met his roomate Mike Boich, Mike got Guy a job at Apple, he then created softwares and hardwares for the Macintosh and went head up against IBMHe is currently CEO of Garage Technology Ventures, a venture capital firm which specializes in high-technology startup firms located in Silicon Valley, California.

William Hewlett


William Reddington Hewlett was the co-founder, with David Packard, of the Hewlett-Packard Company (HP). He was born on May 20, 1913 in Ann Arbor, Michigan and moved to San Francisco, California at the age of 3 years. A son of a professor in medicine at the University of Michigan and later, at Stanford University. William "Bill" Hewlett attended Lowell High School and was accepted at Stanford University as a favor for his late father, Albion Hewlett, who had died prematurely of a brain tumor in 1925. The young Hewlett received a B.A. in 1934 and an electrical engineering degree in 1939: He received his master's degree from Massachusetts Institute of Technology (MIT) in 1936. He was a member of the Kappa Sigma Fraternity during his time at Stanford and MIT. In 1936, Hewlett attended classes taught by Fred Terman, who is also considered as one of the founders of the Silicon valley. He met partner Dave Packard while both were in undergraduate school at Stanford.In August of 1937 Hewlett and Packard began discussing forming a company. While in graduate school Hewlett developed the design for the product that later launched the Hewlett Packard Company(HP)- the model HP200A Audio Oscillator. On January 1, 1939, Hewlett-Packard Company is formally incorporated and in the same year he married Flora Lamson, and the couple eventually had five children. He served as an army officer during the World War II and was named vice-president of the newly established Hewlett-Packard upon his return to civilian life. He became president of HP from 1964 to 1977 and served as CEO from 1968 to 1978, he was succeeded by John A. Young. He remained of the executive committee until 1983 and then served as vice chairman of the board until 1987. In 1966, he and his wife founded the William and Flora Hewlett Foundation.On January 12, 2001, William Hewlett died because of a heart failure.

Wednesday, January 30, 2008

My Games Zone

My games zone includes only two games that I made using Visual Basic 6.0 when I was 11 .... The first game I made was a racing game which includes money and many other features like increasing speed of your car using nitroboosters , etc .... My second game was a fighting game and it is even greater !!!

More About Me


I am Sushant Sikka and I am very fond of Computers and Internet .... I have made my games and systems using Visual Basic 6.0 .... My role model is Bill Gates and my dream holiday spot is Silicon Valley ..... My site is http://sikkadimension.wetpaint.com/ , it has polls ,videos , games , rss feeds , widgets ,qoutes and much more ......I love Garfield and cars .... My favourite brands are Lamborghini and Rolls Royce ........ this is all about me and my world of technology and computers ....

मेरा नाम सुशांत सिक्का है और मेरी वेबसाइट sikkadimension.wetpaint.com है ।