Saturday, July 26, 2008
Apple Safari Download
Since the release of Safari, its usage share has been steadily climbing. According to Net Applications, Safari's marketshare for May 2008 was 6.25%.[4]
Opera Browser Download

Features of Opera include tabbed browsing, page zooming, mouse gestures, and an integrated download manager. Its security features include built-in phishing and malware protection, strong encryption when browsing secure web sites, and the ability to easily delete private data such as cookies and browsing history by simply clicking a button.
Opera runs on a variety of personal computer operating systems, including Microsoft Windows, Mac OS X, Linux, FreeBSD, and Solaris.[2] Though evaluations of Opera have been largely positive, Opera has captured only a fraction of the worldwide personal computer browser market. It is currently the fourth most widely used web browser for personal computers, behind Internet Explorer, Firefox, and Safari.
Opera has a stronger market share, however, on mobile devices such as mobile phones, smartphones, and personal digital assistants. Editions of Opera are available for devices using the Symbian and Windows Mobile operating systems, as well as Java ME-enabled devices. In fact, approximately 40 million mobile phones have shipped with Opera pre-installed. Furthermore, Opera is the only web browser available for the Nintendo DS and Wii gaming systems. Some television set-top boxes use Opera as well, and Adobe licensed Opera technology for use in the Adobe Creative Suite.
Mozilla Firefox Download

To display web pages, Firefox uses the Gecko layout engine, which implements some current web standards plus a few features which are intended to anticipate likely additions to the standards.
Firefox includes tabbed browsing, a spell checker, incremental find, live bookmarking, a download manager, and an integrated search system that uses the user's desired search engine. Functions can be added through add-ons created by third-party developers,[2] the most popular of which include the NoScript JavaScript disabling utility, Tab Mix Plus customizer, FoxyTunes media player control toolbar, Adblock Plus ad blocking utility, StumbleUpon (website discovery), DownThemAll! download enhancer and Web Developer toolbar.[3]
Firefox runs on various versions of Microsoft Windows, Mac OS X, Linux, and many other Unix-like operating systems. Its current stable release is version 3.0.1, released on July 16, 2008.[4] Firefox's source code is free software, released under a tri-license GPL/LGPL/MPL
Users can customize Firefox with extensions and themes. Mozilla maintains an add-on repository at addons.mozilla.org with nearly 2000 add-ons in it as of September 2007.[2]
Firefox provides an environment for web developers in which they can use built-in tools, such as the Error Console or the DOM Inspector, or extensions, such as Firebug.
The Mozilla Foundation offers a "bug bounty" to researchers who discover severe security holes in Firefox.[40] Official guidelines for handling security vulnerabilities discourage early disclosure of vulnerabilities so as not to give potential attackers an advantage in creating exploits.[41]
Because Firefox has fewer and less severe publicly known unpatched security vulnerabilities than Internet Explorer (see Comparison of web browsers), improved security is often cited as a reason to switch from Internet Explorer to Firefox.[42][dead links][43][44][45] The Washington Post reports that exploit code for critical unpatched security vulnerabilities in Internet Explorer was available for 284 days in 2006. In comparison, exploit code for critical security vulnerabilities in Firefox was available for 9 days before Mozilla shipped a patch to remedy the problem.[46]
A 2006 Symantec study showed that although Firefox had surpassed other browsers in the number of vendor-confirmed vulnerabilities that year through September, these vulnerabilities were patched far more quickly than those found in other browsers.[47] Symantec later clarified their statement, saying that Firefox still had fewer security vulnerabilities than Internet Explorer, as counted by security researchers.[48] As of July 18, 2008, Firefox 3 has zero security vulnerabilities unpatched according to Secunia.[49] Internet Explorer 7 has ten security vulnerabilities unpatched, the most severe of which was rated "moderately critical" by Secunia.[50]
Firefox passes the Acid2 standards-compliance test from version 3.0.[35] Firefox 3.0 does not pass the Acid3 test; it scores 71/100 and does not render the image correctly.
Thursday, June 5, 2008
Computer Virus
Most personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.
Some malware is programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Other malware programs are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these less sinister malware programs can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, much malware is bug-ridden, and these bugs may lead to system crashes and data loss. Many CiD programs are programs that have been downloaded by the user and pop up every so often. This results in slowing down of the computer, but it is also very difficult to find and stop the problem.
- Worms : A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Many worms have been created which are only designed to spread, and don't attempt to alter the systems they pass through. However, as the Morris worm and Mydoom showed, the network traffic and other unintended effects can often cause major disruption. A "payload" is code designed to do more than spread the worm - it might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a "zombie" under control of the worm author - Sobig and Mydoom are examples which created zombies. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website's address.[1] Spammers are therefore thought to be a source of funding for the creation of such worms,[2][3] and worm writers have been caught selling lists of IP addresses of infected machines.[4] Others try to blackmail companies with threatened DoS attacks.[5]
Backdoors can be exploited by other malware, including worms. Examples include Doomjuice, which spreads using the backdoor opened by Mydoom, and at least one instance of malware taking advantage of the rootkit and backdoor installed by the Sony/BMG DRM software utilized by millions of music CDs prior to late 2005.
- Trojan Horse : In the context of computing and software, a Trojan horse, or simply trojan, is a piece of software which appears to perform a certain action but in fact performs another such as transmitting a computer virus. Contrary to popular belief, this action, usually encoded in a hidden payload, may or may not be actually malicious, but Trojan horses are notorious today for their use in the installation of backdoor programs. Simply put, a Trojan horse is not a computer virus. Unlike such malware, it does not propagate by self-replication but relies heavily on the exploitation of an end-user (see Social engineering). It is instead a categorical attribute which can encompass many different forms of codes. Therefore, a computer worm or virus may be a Trojan horse. The term is derived from the classical story of the Trojan Horse.
In the field of computer architecture, 'Trojan Horse' can also refer to security loopholes that allow kernel code to access anything for which it is not authorized.
Charles Babbage
Babbage arrived at Trinity College, Cambridge in October 1810. He had read extensively in Leibniz, Joseph Louis Lagrange, Thomas Simpson, and Lacroix and was seriously disappointed in the mathematical instruction available at Cambridge. In response, he, John Herschel, George Peacock, and several other friends formed the Analytical Society in 1812. Babbage, Herschel and Peacock were also close friends with future judge and patron of science Edward Ryan. Ultimately, Babbage and Ryan married sisters.[7]
In 1812 Babbage transferred to Peterhouse, Cambridge. He was the top mathematician at Peterhouse, but failed to graduate with honors. He instead received an honorary degree without examination in 1814.
Part of Babbage's difference engine, assembled after his death by Babbage's son, using parts found in his laboratory.
Babbage's engines were among the first mechanical computers, although they were not actually completed, largely because of funding problems and personality issues. He directed the building of some steam-powered machines that achieved some success, suggesting that calculations could be mechanized. Although Babbage's machines were mechanical and unwieldy, their basic architecture was very similar to a modern computer. The data and program memory were separated, operation was instruction based, the control unit could make conditional jumps and the machine had a separate I/O unit.
Main article: Analytical engine
Soon after the attempt at making the difference engine crumbled, Babbage started designing a different, more complex machine called the Analytical Engine. The engine is not a single physical machine but a succession of designs that he tinkered with until his death in 1871. The main difference between the two engines is that the Analytical Engine could be programmed using punch cards, an idea unheard of in his time. He realized that programs could be put on similar cards so the person had only to create the program initially, and then put the cards in the machine and let it run. The analytical engine was also proposed to use loops of Jacquard's punched cards to control a mechanical calculator, which could formulate results based on the results of preceding computations. This machine was also intended to employ several features subsequently used in modern computers, including sequential control, branching, and looping, and would have been the first mechanical device to be Turing-complete.
Ada Lovelace, an impressive mathematician and one of the few people who fully understood Babbage's ideas, created a program for the Analytical Engine. Had the Analytical Engine ever actually been built, her program would have been able to calculate a sequence of Bernoulli numbers. Based on this work, Lovelace is now widely credited with being the first computer programmer.[20] In 1979, a contemporary programming language was named Ada in her honour. Shortly afterward, in 1981, a satirical article by Tony Karp in the magazine Datamation described the Babbage programming language as the "language of the future".[21]
[edit] Modern adaptations
While the abacus and mechanical calculator have been replaced by electronic calculators using microchips, the recent advances in MEMS and nanotechnology have led to recent high-tech experiments in mechanical computation. The benefits suggested include operation in high radiation or high temperature environments.
These modern versions of mechanical computation were highlighted in the magazine The Economist in its special "end of the millennium" black cover issue in an article entitled Babbage's Last Laugh . The article highlighted work done at University of California Berkeley by Ezekiel Kruglick. In this Doctoral Dissertationthe researcher reports mechanical logic cells and architectures sufficient to implement the Babbage Analytical engine (see above) or any general logic circuit. Carry-shift digital adders and various logic elements are detailed as well as modern analysis on required performance for microscopic mechanical logic.
Wednesday, June 4, 2008
Dan Bricklin
Monday, May 12, 2008
Australian Information Industry Association
ICT is a driving force behind the Australian economy, contributing 4.6 per cent of the nation’s Gross Domestic Product[1]. This powerful industry is led by AIIA - which has 450 plus member companies that generate combined annual revenues of more than $40 billion, employ 100,000 Australians and export more than $2 billion in goods and services each year.
AIIA’s member companies include some of the most well recognised ICT companies in Australia and the world - such as Microsoft, IBM and Hewlett-Packard, as well as many rising stars. AIIA’s membership captures all sectors of the ICT industry, ranging from hardware and software services to multinational companies and local small-to-medium sized enterprises.
AIIA sets the strategic direction of the ICT industry, influences public policy, engages industry stakeholders and provides member companies with business productivity tools, advisory services and market intelligence to accelerate their business growth.
Canadian Information Processing Society
Each province has a provincial bodies that administers the legislation or regulation establishing the self-regulating professional body. This consists of the following bodies:
CIPS Alberta
CIPS British Columbia
CIPS Manitoba
CIPS New Brunswick
CIPS Nova Scotia
CIPS Ontario
CIPS Saskatchewan
In Québec, CIPS is partnered with the Fédération de l'informatique du Québec (FIQ). CIPS is the Canadian member organisation of the International Federation for Information Processing (IFIP). IFIP works on establishing international standards for information technology and software engineering. CIPS is also a member of South East Asia Regional Computer Confederation (SEARCC).
Information Technology
Today, the term information technology has ballooned to encompass many aspects of computing and technology, and the term is more recognizable than ever before. The information technology umbrella can be quite large, covering many fields. IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems. When computer and communications technologies are combined, the result is information technology, or "infotech". Information Technology (IT) is a general term that describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information. Presumably, when speaking of Information Technology (IT) as a whole, it is noted that the use of computers and information are associated.
Sunday, May 11, 2008
Grace Murray
Military WomanIn 1943, she joined the U.S. Navy Reserve as a pioneer. She had to work with Howard Aiken on the Harvard Mark I Calculator, also known as the IBM ASCC (Automatic Sequence Controlled Calculator).One of the first programmers to accomplish this task. Significance:Hopper showed that women, young or old, can do the impossible even if you feel like giving up. She also made the first calculator (with help), which is one of the greatest accomplishments in mankind. Not only did she do this accomplishment, but did other accomplishments as well. At that time,(1930s and 1940s) women were to follow what their husband did and hope their husbands would come home from work or war. Instead, she joined the US navy and became a US Navy officer, one of the first programmer of the Harvard Mark I calculator, and a professor of mathematics at a university before these other jobs. She received many awards that is amazing even today for anyone. She died on January 1, 1992, but will be remembered as "Amazing Grace".
Wednesday, March 5, 2008
Paul Allen

Friday, February 29, 2008
Guy Kawasaki
William Hewlett

Wednesday, January 30, 2008
My Games Zone
More About Me

मेरा नाम सुशांत सिक्का है और मेरी वेबसाइट sikkadimension.wetpaint.com है ।
