tag:blogger.com,1999:blog-58902797888578853832024-02-08T10:51:48.614+05:30FromthesunA blog about ecommerce, online advertising, marketing, & money making.Anonymoushttp://www.blogger.com/profile/11268821733427039973noreply@blogger.comBlogger46110tag:blogger.com,1999:blog-5890279788857885383.post-77884257478071748852013-09-14T01:07:00.001+05:302015-09-13T16:47:58.871+05:30Domain Names<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;">The <em><a href="http://fromtheorisun.blogspot.in/2013/09/fundamentals-of-ip-address.html" target="_blank">dotted decimal notation system</a></em> was difficult to remember, & hence a new IP addressing system using words was evolved. In this system, an address such as <a href="http://www.amazon.com/">www.amazon.com</a> is called a domain name. Domain names are sets of words that are assigned to specific IP addresses, & these names can have two or more word groups separated by periods. Domain names are formed by the rules and procedures of '<em>domain name system</em>'. The extreme right part of the domain name is the most general, & each part of it becomes more specific as we move to the left from right. As an example, the domain name <a href="http://www.amazon.com/">www.amazon.com</a> contains 3 parts separated by periods. Starting at the right, the name 'com' indicates that the computer belongs to a company, the company is identified by the name 'amazon', & the word 'www' indicates that the computer is running software that makes it a part of the 'World Wide Web'. </span><br />
</div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Domain names are organized in subdomains or subordinate levels of DNS root domain, which is nameless. The rightmost part of the domain name is called a "<em>top level domain</em>",which include <em>generic top level domains, </em>such as com, edu, gov, net, info, mill, biz, name, pro, int, & org and the <em>country code top level domains, </em>such as uk, us, ca, au, & de. The <a href="http://www.icann.org/" target="_blank">Internet Corporation for Assigned Names & Numbers (ICANN)</a> is responsible for managing domain names, & coordinating with the IP address registrars. </span><br />
<a name='more'></a><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDnWI6Y5foRnEJpKjdbQtsL1oy-_4Rbi4WZJ-KFyzoS0pmIezhKQdczSnOL7X0Fh47B3ZVcmYR4UI-t4Mt75stap7jkQ1_kW5TJz5LFWCZxfFbbY7bG7hCIuy_hhG_Pzbb8EMAMcGYuzI/s1600/domain.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="245" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDnWI6Y5foRnEJpKjdbQtsL1oy-_4Rbi4WZJ-KFyzoS0pmIezhKQdczSnOL7X0Fh47B3ZVcmYR4UI-t4Mt75stap7jkQ1_kW5TJz5LFWCZxfFbbY7bG7hCIuy_hhG_Pzbb8EMAMcGYuzI/s1600/domain.png" width="320" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Domain Hierarchy</td></tr>
</tbody></table>
<br />
<br />
<span style="font-family: Georgia, "Times New Roman", serif;">Below the <em>top level domains</em> in the domain name hierarchy, are the <em>second level domain</em> names. These are the names directly to the left of top level domains. Next are the <em>third level domain names</em>, immediately to the left of <em>second level domain names</em>. There can be fourth & fifth level domain names, and so on, virtually with no limitations. The hierarchy of domains descend from right to left label in the name. Each label to the left specifies a subdomain of the domain to the right. In the complete domain name '<a href="http://www.amazon.com/">www.amazon.com</a>', 'amazon' is the subdomain of 'domain com', & 'www' is a label to create a subdomain of 'amazon.com'. This tree of labels may consist of 127 labels, & each label may contain 1 to 63 octets. The empty label is reserved for root node. The full domain name may not exceed a total length of 253 ASCII characters. A hostname is a domain name that has at least one associated IP address. The domain names '<a href="http://www.amazon.com'/">www.amazon.com'</a> & 'amazon.com' are valid hostnames, whereas, 'com' is not a hostname. Hostnames add restrictions on the characters allowed in the corresponding domain name. A valid hostname can be a valid domain name, but the vice versa is not true. </span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;">The right to use a <em>domain name</em> is delegated by <em>domain name registrars,</em> who are accredited to the ICANN. Further, each <em>top level domain</em> is maintained and serviced by an administrative organization operating a registry. This registry is responsible for maintaining the database of names registered with the <em>top level domain</em> it administers. The registry receives the registration information from each <em>domain name registrar</em> authorized to assign names in the corresponding <em>top level domain</em>, & publishes the information using <em>whois</em> protocol. <em>Whois</em> is a query and response protocol used for querying databases that stores the registered users or assignees of an internet resource, such as <em>domain name</em>.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><em>Domain names</em> are the foundations on which websites are built, & the qualitative domain names carry significant value, because of their online brand potential, advertising revenues, & search engine optimization.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;">The business of resale of registered <em>domain names</em> is known as domain aftermarket. Numerous factors decide the resale value of a registered <em>domain name</em>.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Network Effects</u>:</span> </div>
</div>
<a href="http://www.anrdoezrs.net/ri97kjspjr6CGDFC87687BEFG9G" onmouseout="window.status=' ';return true;" onmouseover="window.status='http://www.fatcow.com/fatcow/index.bml';return true;" target="_blank">
<img alt="FatCow Web Hosting: $88 Plan" border="0" src="http://www.lduhtrp.net/19108drvjpn8EIFHEA98A9DGHIBI" /></a>
<a href="http://www.kqzyfj.com/4k104tenkem17B8A732132BAAAAB" onmouseout="window.status=' ';return true;" onmouseover="window.status='http://www.justcloud.com';return true;" target="_blank">
<img alt="" border="0" src="http://www.lduhtrp.net/cb74ax0pvtEKOLNKGFEGFONNNNO" /></a></div>
<a href="http://www.jdoqocy.com/9377xdmjdl06A79621021824258" onmouseout="window.status=' ';return true;" onmouseover="window.status='http://ipage.com';return true;" target="_blank">Web Hosting by iPage - Affordable and E-Commerce Enabled</a><img border="0" src="http://www.tqlkg.com/sf105ax0pvtEKOLNKGFEGFMGIGJM" height="1" width="1" /><br />
<br />
<a href="http://www.dpbolvw.net/o665lnwtnvAGKHJGCBACCDCDJKG" onmouseout="window.status=' ';return true;" onmouseover="window.status='http://www.crystone.com/shared-web-hosting/';return true;" target="_blank">Crystone</a><img border="0" src="http://www.awltovhc.com/qn72bosgmk5BFCEB76577878EFB" height="1" width="1" />
<br />
<br />
<a href="http://www.dpbolvw.net/9o105biroiq5BFCEB76576EDC9A6" onmouseout="window.status=' ';return true;" onmouseover="window.status='http://www.littleoak.net';return true;" target="_blank">Web Hosting for Mac Users</a><img border="0" src="http://www.ftjcfx.com/38102r6Az42OUYVXUQPOQPXWVSTP" height="1" width="1" /><br />
<br />
<a href="https://www.blogger.com/%3Ca%20target=%22_blank%22%20href=%22https://www.amazon.in/gp/css/order-history/ref=as_li_ss_tl?ie=UTF8&camp=3626&creative=24822&linkCode=ur2&tag=fromthesun-21">Nihar</a><img src="https://ir-in.amazon-adsystem.com/e/ir?t=fromthesun-21&l=ur2&o=31" width="1" height="1" border="0" alt="" style="border:none !important; margin:0px !important;" />" target="_blank">Nihar</a><br />
<br />
</div>
<div class="blogger-post-footer"><iframe src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=26&l=ur1&category=computers_accesories&banner=1SKRXV416ZYVKCEGXQR2&f=ifr" width="468" height="60" scrolling="no" border="0" marginwidth="0" style="border:none;" frameborder="0"></iframe>
</div>Anonymoushttp://www.blogger.com/profile/11268821733427039973noreply@blogger.com5Cuttack, Odisha, India20.462521 85.88298950000000820.343507499999998 85.72162800000001 20.5815345 86.044351tag:blogger.com,1999:blog-5890279788857885383.post-73939932302486905382013-09-11T01:48:00.004+05:302013-09-11T01:48:39.115+05:30Fundamentals of IP Address<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;"><u>IP Address: </u></span><br />
<u><span style="font-family: Georgia;"></span></u><br />
<span style="font-family: Georgia;">This is a numerical label assigned to each device participating in a computer network that uses Internet Protocol for communication. The functions of IP address are to identify the host or network interface, & location address.</span><br />
<span style="font-family: Georgia, "Times New Roman", serif;"><u></u></span><br />
<span style="font-family: Georgia, "Times New Roman", serif;"><u>Internet Protocol Version 4</u>: (Standard: <a href="http://tools.ietf.org/html/rfc791" target="_blank">RFC 791</a>)</span><br />
<span style="font-family: Georgia, "Times New Roman", serif;"></span><br />
<span style="font-family: Georgia, "Times New Roman", serif;">This protocol uses a 32 bit number to identify computers connected to the internet. Computers do all the internal calculations using a <em>binary number system</em> in which each digit is either a 0 or a 1, corresponding to a state of either OFF or ON. IP Version 4 allows more than 4 billion different addresses, as 2³² = 4, 294,967,296. When a router breaks a message into packets before sending it onto the internet, the router marks each packet with both the source & destination IP addresses of the message. Each IP address appears as 4 numbers separated by periods specified under the <em>dotted decimal notation system</em>, & each of the 4 numbers is an 8 bit number. In networking applications, an 8 bit number is called an octet, & in binary, an octet can have values from 00000000 to 11111111, & the decimal equivalents of these binary numbers are 0 and 255 respectively. As each of the 4 parts of a dotted decimal number can range from 0 to 255, IP addresses range from 0.0.0.0 (32 zeros in binary) to 255.255.255.255 (32 ones in binary).</span><br />
<a name='more'></a><span style="font-family: Georgia;">IP4 is a connectionless protocol to be used on packet switched networks, & it operates on a <em>best effort delivery model</em>, wherein it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects along with data integrity are taken care of by an upper layer transport protocol, called as <em>Transmission Control Protocol</em>.</span><br />
<span style="font-family: Georgia;"><u></u></span><br />
<span style="font-family: Georgia;"><u>Internet Protocol Version 6</u>: (Standard: <a href="http://tools.ietf.org/html/rfc2460" target="_blank">RFC 2460</a>)</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;">The limited addressing capacity of 'Internet Protocol Version 4' created the new internet protocol version called 'Internet Protocol Version 6'. Though the IP4 and IP6 are not directly compatible to each other, network engineers have devised ways and means to run both protocols simultaneously on interconnected networks. The advantage of IP6 is that it uses a 128 bit number for addresses, & hence the number of available addresses in IP6 is ₂¹²⁸ = 34 followed by 37 zeros, which is billion times more than the address space of IP4. The IP6 notation uses 8 groups of 16 bits. Each group is expressed as 4 hexadecimal digits & the groups are separated by colons, & hence this is called '<em>colon hexadecimal system</em>'. Hexadecimal numbering system uses 16 digits, viz. 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,&f. </span><br />
<span style="font-family: Georgia;">An example is: AB17:0000:2222:0000:3434:CD56:F9889:76D2, & to save space, the zeros can be omitted to: AB17:2222:3434:CD56:F9889:76D2.</span><br />
<span style="font-family: Georgia;">IP6 is an internet layer protocol for packet switched networks and provides end to end data transmission across multiple IP networks, adhering to the design principles of IP4.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>IP Address Allocation</u>:</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia, "Times New Roman", serif;">The IP address management tasks were originally with "<a href="http://www.iana.org/" target="_blank">Internet Assigned Numbers Authority (IANA)</a>", which then delegated the allocation of IP address blocks to (1) <a href="https://www.arin.net/resources/index.html" target="_blank">American Registry for Internet Numbers</a> for USA, Canada, Antarctica, & some parts of Carribbean, (2) <a href="http://en.wikipedia.org/wiki/AfriNIC" target="_blank">African Network Information Center</a> for Africa, (3) <a href="http://www.apnic.net/" target="_blank">Asia-Pacific Network Information Center</a> for Asia, Australia, New Zealand & adjacent countries, (4) <a href="http://www.lacnic.net/en/web/portal/inicio" target="_blank">Latin America & Carribbean Network Information</a> Center for Latin America & parts of Carribbean, & (5) <a href="http://www.ripe.net/" target="_blank">Reseaux IP Europeens Network Coordination Center</a> for Europe, Russia, Middle East, & Central Asia. </span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>IP Address Subnetting</u>:</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;">As the demand for IP addresses increased due to use of mobiles, tablets, laptops, & other wireless devices, techniques to stretch the supply of IP addresses were devised, & the best out of all was <em>subnetting</em>. Three IP4 address ranges have been reserved for private networks, & these are not routed through the internet, & thus their use need not be coordinated with IP address registry. If required, these private networks typically connect to the internet through <em>network address translation</em>. Morefully, in subnetting, a computer called <em>network address translation</em> converts those private IP addresses to normal IP addresses when it forwards packets to the internet from those computers.</span><br />
<span style="font-family: Georgia, "Times New Roman", serif;"> </span></div>
</div>
<a href="http://www.amazon.com/gp/product/B003TU8G4U/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B003TU8G4U&linkCode=as2&tag=fromthesun-20">BQ888A - HP StorageWorks P4500 G2 Network Storage Server - 14.40 TB (24 x 600 GB) - RJ-45 Network, iSCSI</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B003TU8G4U" height="1" style="border: currentColor !important; margin: 0px !important;" width="1" /><br />
<br />
<a href="http://www.amazon.com/gp/product/B0038SZ628/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B0038SZ628&linkCode=as2&tag=fromthesun-20">Storageworks P2000 G3 Fc/iscsi Dual Combo Controller with sff Chassis</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B0038SZ628" height="1" style="border: currentColor !important; margin: 0px !important;" width="1" />
<br />
<br />
</div>
<div class="blogger-post-footer"><iframe src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=26&l=ur1&category=computers_accesories&banner=1SKRXV416ZYVKCEGXQR2&f=ifr" width="468" height="60" scrolling="no" border="0" marginwidth="0" style="border:none;" frameborder="0"></iframe>
</div>Anonymoushttp://www.blogger.com/profile/11268821733427039973noreply@blogger.com0Cuttack, Odisha, India20.462521 85.88298950000000820.343507499999998 85.72162800000001 20.5815345 86.044351tag:blogger.com,1999:blog-5890279788857885383.post-5908280980310599352013-09-09T18:34:00.003+05:302013-09-09T20:21:19.023+05:30Introduction to Networks<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;">Internet uses packet switching technology to move data between two points. On a packet-switched network, files and email messages are broken down into small pieces or packets, that are electronically labeled with their origins, sequences, & destination addresses. Packets travel from one computer to another along the interconnected networks untill they reach their destinations. Each packet can take a different path through the interconnected networks, & the packets may arrive out of order. The destination computer collects the packets & reassembles the original file or email message from the pieces in each packet.</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Routers</u>: When an individual packet travels from one network to another, the computers through which the packet travels determine the best possible route for getting the packet to its destination. The computers that decide how best to forward each packet are called routers or gateway computers. The programs on routers that determine the best possible path on which to send each packet are called routing algorithms.The routing algorithms use the information they have stored in routing tables. This information includes (1)list of connections that lead to particular groups of other routers, (2)rules that specify which connections to use first, & (3)rules for handling instances of heavy packet traffic and network congestion.</span><br />
<a name='more'></a><span style="font-family: Georgia, "Times New Roman", serif;">Individual networks use a variety of rules and standards for creating packets within their networks. The network devices that transmit packets from one part of a network to another are called hubs, switches, & bridges. </span><br /></div>
<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtrVb73OdOWY5BTlJtw68Fef_NghsPyMIVxGzOdsKKH1U5bvERYHl5p9zPtGEA7H5YsQw1S6wBOAyofplsAY9kpc029ZEFZr7JwlsDmhanPhRhbp_4lNDkhfgPfZLp1YDdiNnrl20JrlU/s1600/network+devices.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtrVb73OdOWY5BTlJtw68Fef_NghsPyMIVxGzOdsKKH1U5bvERYHl5p9zPtGEA7H5YsQw1S6wBOAyofplsAY9kpc029ZEFZr7JwlsDmhanPhRhbp_4lNDkhfgPfZLp1YDdiNnrl20JrlU/s320/network+devices.png" height="320" width="278" /></a></div>
<br />
<span style="font-family: Georgia;">Routers are used to connect one network to another. When packets leave a network to travel on the internet, they must be translated into a standard format, & this translation function is usually made by the routers. When an online company launches its website, it must connect at least one router of internet to the other routers of the company, & that make up the internet access. The following figure shows a router-based internet architecture.</span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSoINZmvdVXYmftHUm-58GoYhld0sG9Kvqw1j47r8uwdNd6R9GgGuJav8J-cXMsrjfSFVuO5ipo5nRzQJ2TI7TdQ7RoKRAvl84ckj0-rqldbPQvG9BkgPDBaWKuOrE8PACF9Bf-uJ9mNw/s1600/HAIR.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSoINZmvdVXYmftHUm-58GoYhld0sG9Kvqw1j47r8uwdNd6R9GgGuJav8J-cXMsrjfSFVuO5ipo5nRzQJ2TI7TdQ7RoKRAvl84ckj0-rqldbPQvG9BkgPDBaWKuOrE8PACF9Bf-uJ9mNw/s320/HAIR.jpg" height="251" width="320" /></a></div>
<span style="font-family: Georgia, "Times New Roman", serif;">The internet has routers that handle packet traffic along the main connecting points of it. These routers and the telecom lines connecting them are collectively called as the backbone of the internet. These routers are actually very large computers that can each handle more than 50 million packets per second. A router connected to the internet has always more than one path to which it can direct a packet. This multiple packet paths create a degree of redundancy in the internet system that allows it to keep moving packets even if one or more of the routers or connecting lines fail.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Protocols</u>: A protocol is a set of rules for formatting, ordering, & error-checking data sent across a network. Current internet architecture includes (1)the use of a common protocol for all computers connected in the internet, & (2)basic rules for data handling. These data handling rules are: (a) <a href="http://fromtheorisun.blogspot.in/2012/08/internet-technologies-i.html" target="_blank">LANs or WANs</a> should not require any internal changes to be connected to the network, (b) data packets that do not arrive at their destinations must be retransmitted from their source network, (c) routers should act as receive-forward devices, & they cannot retain data they handle, & (d) zero global control should exist over the network. Each LAN or WAN can use its own protocols for packet traffic within the private network, but must use a router to transmit packets onto the internet in its standard format. </span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>TCP/IP</u>: Vinton Cerf & Robert Kahn developed 'Transmission Control Protocol', & 'Internet Protocol', which are the rules that govern internet data handling, & how network connections are established and terminated. The TCP controls the disassembly of a file or message or data into packets before it is transmitted over the internet, & it controls the reassembly of those packets into their original formats when they reach their destinations. The IP specifies the addressing details for each packet, labeling each with the packet's origination and destination addresses. </span><br />
<span style="font-family: Georgia;"></span> </div>
</div>
<a href="http://www.amazon.com/gp/product/B009LL9VDG/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B009LL9VDG&linkCode=as2&tag=fromthesun-20">Samsung Chromebook (Wi-Fi, 11.6-Inch)</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B009LL9VDG" height="1" style="border: currentColor !important; margin: 0px !important;" width="1" /><br />
<br />
<a href="http://www.amazon.com/gp/product/B00450DVDY/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00450DVDY&linkCode=as2&tag=fromthesun-20">Brother HL-2270DW Compact Laser Printer with Wireless Networking and Duplex</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B00450DVDY" height="1" style="border: currentColor !important; margin: 0px !important;" width="1" />
<br />
<br />
<br />
</div>
<div class="blogger-post-footer"><iframe src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=26&l=ur1&category=computers_accesories&banner=1SKRXV416ZYVKCEGXQR2&f=ifr" width="468" height="60" scrolling="no" border="0" marginwidth="0" style="border:none;" frameborder="0"></iframe>
</div>Anonymoushttp://www.blogger.com/profile/11268821733427039973noreply@blogger.com1Cuttack, Odisha, India20.462521 85.88298950000000820.343507499999998 85.72162800000001 20.5815345 86.044351tag:blogger.com,1999:blog-5890279788857885383.post-48830169001563963402013-09-07T09:50:00.001+05:302013-09-14T14:31:36.839+05:30Review: Internet Encryption<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;">The program that transforms normal text, called plain text, into cipher text (the unintelligible string of characters) is called an encryption program. It is the process of encoding data in such a way that only authorized users can read it. Here the data or information is encrypted using an encryption algorithm, making it an unreadable ciphertext. The process is usually accomplished with the use of an encryption key, which specifies the <em>modus operandi</em> of the data encoding. The authorized users can decode the ciphertext using decryption algorithm, which requires a secret decryption key. There are two types keys used in present encryption system.</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Private Key</u>: Here the encryption and decryption keys are the same. The communicating users must agree on a secret key before starting communication. It can be difficult to distribute new keys to authorized users in each transaction, while maintaining security and control over the keys. The main disadvantage of private keys is that they do not scale well in very large environments such as the internet. Here, <em>x</em> individual internet clients would require (<em>x</em>(<em>x</em>-1))/2 private key pairs.</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Public Key</u>: This is a latest technological development, & here the key is meant for anyone to use and encrypt the data/message. However, the receiving user has access to the decryption key, & is capable of reading the encrypted data. <a href="http://www.symantec.com/index.jsp" target="_blank">Symantec Corporation</a>'s 'Pretty Good Privacy (PGP)' is a data encryption & decryption algorithm, & is very often used for signing, encrypting, & decrypting texts, emails, files, directories, & whole disk partitions to increase the security of email communications. PGP follows OpenPGP standard <a href="http://tools.ietf.org/html/rfc4880" target="_blank">RFC 4880</a> for data encryption & decryption.</span></div>
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><a name='more'></a></span><span style="font-family: Georgia;"><div style="text-align: justify;">
Public key systems provide several advantages over private key encryption methods. The combination of keys required to provide private messages between enormous number of people is very small. If <em>x</em> people want to share secret information with one another, then only <em>x</em> unique public key pairs are required. Each user's public key can be posted anywhere, & does not require any special handling methods. Further, the public key systems make implementation of Digital Signature possible for additional security.The encryption is based on the fact that, it is very difficult to find out the factors of a number in comparison to figure out the multiplication of these two numbers. A computer can multiply two prime numbers very easily, but it cannot revert the result so easily. <br />
<br />
Thus the public key encryption system generates large numbers using numbers that only the authorized user or his/her computer knows. The large number can be published online and used to encrypt a message using specific algorithm. In effect, the large number is a digital lock which the authorized user make available to anyone, so they can secure messages in the receiving end. Only the authorized user holds the key to the lock, and hence it does not matter how many copies out there. </div>
</span><br />
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;">Encryption is also used for transit data protection over networks, mobile phones, wireless systems, bluetooth devices, & bank ATMs. Encryption along with technologies like Message Authentication Code (MAC), & Digital Signature are necessary for protecting integrity & authenticity of data. Encryption and Digital Signature must be applied at the message creation time to avoid hacking.</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Message Authentication Code</u>: A MAC algorithm or a keyed hash function accepts a secret key, & an arbitrary length of message as input, & outputs a tag or MAC. The MAC value protects the data integrity and authenticity by allowing users (who possess the secret key) to detect any changes to the message content. Even if a hacker has access to an abstract machine which possesses the secret key & generates MACs for messages (designed by the hacker), the hacker cannot get the other messages without performing infeasible amounts of computation. </span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia, "Times New Roman", serif;"><u>Digital Signature</u>: These are commonly used for software distribution, financial transactions etc. where it is important to detect forgery or tampering. Digital signatures employ public key algorithm for data sent through a non-secure channel, & it gives impression to the receiver that data has been sent from the authentic claimed sender.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;">A lot of internet users come across this data encryption & decryption process unknowingly, while using Skype for Video Chat or Apple's iMessage or shopping online or donating funds online or Blackberry's messaging and email systems. If a hacker breaks that encryption, simply he will burn you in a jungle. If a hacker can figure out the facors of the big number generated in the encryption and decryption system, he/she will crack the locking arrangement. A key's strength is calculated by the number of digital bits it uses, & the encryption methodology. A 40 bit key encoded with a RC4 algorithm could be cracked in moments. Today, commonly 256 or more bit key is used in the encryption system, which will take thousands of years to crack. Hackers have started to use the power of modern graphics processing units to crack passwords. The latest hacking software can manage 8 billion guesses per second & crack passwords upto 55 characters long.</span><br />
</div>
</div>
<a href="http://www.amazon.com/gp/product/B00AZISVYO/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00AZISVYO&linkCode=as2&tag=fromthesun-20">Brand New +++ Dell Precision Workstation T7600</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B00AZISVYO" height="1" style="border: currentColor !important; margin: 0px !important;" width="1" />
<br />
<br />
<br />
<a href="http://www.amazon.com/gp/product/B00EZW6BIE/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00EZW6BIE&linkCode=as2&tag=fromthesun-20">DELL WS T5500 2 X INTEL XEON 6C X5690 3.46GHz 16GB RAM 1 X 300GB HDD QUADRO 6000</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B00EZW6BIE" height="1" style="border: currentColor !important; margin: 0px !important;" width="1" />
<br />
<br />
<br />
</div>
<div class="blogger-post-footer"><iframe src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=26&l=ur1&category=computers_accesories&banner=1SKRXV416ZYVKCEGXQR2&f=ifr" width="468" height="60" scrolling="no" border="0" marginwidth="0" style="border:none;" frameborder="0"></iframe>
</div>Anonymoushttp://www.blogger.com/profile/11268821733427039973noreply@blogger.com1Cuttack, Odisha, India20.462521 85.88298950000000820.343507499999998 85.72162800000001 20.5815345 86.044351tag:blogger.com,1999:blog-5890279788857885383.post-13693550934960905992013-08-31T01:25:00.000+05:302013-09-14T13:03:33.124+05:30Product Review: Amazon's Top Watch<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="color: black; font-family: Georgia;"><span style="color: #b4a7d6; font-size: large;"><u><strong>Watches</strong></u></span>:</span><br />
<span style="font-family: Georgia;"></span><br />
<div style="text-align: justify;">
<span style="font-family: Georgia;">Expensive collectible watches, valued for their incredible feat of expert engineering workmanship and aesthetic appeal, often have mechanical movements powered by springs, & provide additional features such as timers, altimeter, moon phase, slide rule bezel, chronographs, GPS technology, & heat-rate monitoring capabilities that work in tandem in addition to simple time keeping. While shopping a watch, whatever the price or style, the brand name can play an important role in determining the right watch. Brand choice can be highly subjective, & will vary from person to person. Finally it comes down to how you perceive a brand, & what it represents, as well as what it speaks to your sensibilities - high style or horological history, modern or traditional, collectible or affordable. </span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Automatic or mechanical watches are made up of 130 or more parts that work in tandem to tell the time, & these timepieces have no batteries. Automatic movements mark the passage of time by a series of gear mechanisms, & are wound by the movement of your wrist as you wear it. Self-winding (automatic) watches utilize kinetic energy, the swinging of your arm, to provide energy to an oscillating rotor to keep the watch ticking. If you do not wear the watch consistently, for about 8-10 hours a day, you can keep the watch powered with a watch winder. Always refer the Owner's Manual.</span><br />
<a name='more'></a><br />
</div>
<div style="text-align: justify;">
<span style="color: red; font-family: Georgia, "Times New Roman", serif; font-size: large;"><u><a href="http://www.amazon.com/gp/product/B008B9JWK6/ref=as_li_qf_sp_asin_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B008B9JWK6&linkCode=as2&tag=fromthesun-20"><span style="color: red; font-size: x-large;">Zenith Defy Xtreme Tourbillon Men's Automatic Watch</span></a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B008B9JWK6" height="1" style="border: currentColor !important; margin: 0px !important;" width="1" />
</u></span><span style="color: black; font-family: Georgia;"><u> </u></span></div>
<div style="text-align: justify;">
<u><span style="font-family: Georgia;"></span></u> </div>
<div style="text-align: justify;">
<a href="http://www.amazon.com/gp/product/B008B9JWK6/ref=as_li_qf_sp_asin_il?ie=UTF8&camp=1789&creative=9325&creativeASIN=B008B9JWK6&linkCode=as2&tag=fromthesun-20" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://ws-na.amazon-adsystem.com/widgets/q?_encoding=UTF8&ASIN=B008B9JWK6&Format=_SL110_&ID=AsinImage&MarketPlace=US&ServiceVersion=20070822&WS=1&tag=fromthesun-20" /></a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B008B9JWK6" height="1" style="border: currentColor !important; margin: 0px !important;" width="1" />
</div>
<div style="text-align: justify;">
<span style="color: black; font-family: Georgia;"><u></u></span> </div>
<div style="text-align: justify;">
<span style="color: black; font-family: Georgia;"><u>Product Specifications</u>:</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Brand or Seller or Collection name: <a href="http://www.amazon.com/s/?_encoding=UTF8&camp=1789&creative=390957&field-brandtextbin=Zenith&linkCode=ur2&node=377110011&tag=fromthesun-20" target="_blank">Zenith</a><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" /></span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Part Number: 96-0528-4035-21-M528,</span><br />
<span style="font-family: Georgia;">ASIN: B008B9JWK6,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Shape: Round,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Dial window material: Anti reflective sapphire (Most expensive & durable crystal, 3 times harder than mineral crystals & 20 times harder than acrylic crystals),</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Display type: Circle,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Clasp: Fold-Over clasp with hidden double push-button,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Case: Black Titanium; Diameter -47mm , & </span><span style="font-family: Georgia;">Thickness - 20 mm(Millimeters).</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Band/Bracelet: Material - Rose Gold, & Black Titanium; </span><span style="font-family: Georgia;">Band Length -8 inches; </span><span style="font-family: Georgia;">Band Width -23 mm; & </span><span style="font-family: Georgia;">Band Color - Black,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Dial Color: Black,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Bezel Material: Rose Gold,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Movement: Swiss Mechanical Automatic & Self Winding,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Water Resistant Depth: 1000 meters.</span><br />
<span style="font-family: Georgia;"><u></u></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Basic Price</u>:</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">List Price:<strike> $205,000.00 USD,</strike></span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Current Price: $112,750.00 USD,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><span style="color: red;">Savings: $92,250.00 USD, i.e. 45%</span>.</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Inventory Position</u>: Only 02 left in <a href="http://www.amazon.com/s/?_encoding=UTF8&camp=1789&creative=390957&field-keywords=&linkCode=ur2&tag=fromthesun-20&url=search-alias%3Dwatches" target="_blank">Amazon</a><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" /> Store.</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Buying Choice</u>:</span><br />
<span style="font-family: Georgia;"></span><br />
<div style="text-align: justify;">
<span style="font-family: Georgia;">(p) <a href="https://www.blogger.com/" target="_blank"><a href="http://www.amazon.com/gp/search/?ie=UTF8&bbn=6358539011&camp=1789&creative=390957&linkCode=ur2&me=A1CTGHB8137E0T&qid=1377922735&rh=i%3Amerchant-items%2Cn%3A!378516011%2Cn%3A6358539011%2Cp_89%3AZenith&rnid=2528832011&tag=fromthesun-20" target="_blank">LUXI Watches</a><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" />: </a></span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;">Luxi continues to be the market leader in selling luxurious watches. This New York based company is associated with <a href="http://www.amazon.com/s/?_encoding=UTF8&camp=1789&creative=390957&field-keywords=&linkCode=ur2&tag=fromthesun-20&url=search-alias%3Dwatches" target="_blank">Amazon</a><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" />to sell internationally acclaimed watches. </span><br />
<br />
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><a href="http://www.amazon.com/gp/aag/details/?ie=UTF8&asin=B008B9JWK6&camp=1789&creative=390957&linkCode=ur2&seller=A1CTGHB8137E0T&sshmPath=shipping-rates&tag=fromthesun-20" target="_blank">Shipping Information</a><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" />: All orders are shipped as soon as possible. Shipping is preferably made through UPS, FedEx, or USPS, & the item will be fully insured during transit. For this item, <span style="font-family: Georgia, "Times New Roman", serif;">shipping cost will be FREE. </span> </span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u><a href="http://www.amazon.com/gp/aag/details/?ie=UTF8&asin=B008B9JWK6&camp=1789&creative=390957&isAmazonFulfilled=&isCBA=&linkCode=ur2&marketplaceID=ATVPDKIKX0DER&orderID=&seller=A1CTGHB8137E0T&sshmPath=shipping-rates&tag=fromthesun-20#tax" target="_blank">Taxes</a><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" /><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" /></u>: Items shipped within New York state will be charged sales tax @ 8.625%, & sales tax is not applicable in other parts of the USA. </span><span style="font-family: Georgia;">Sales tax will be charged on items shipped to Canada @5.000% , to China @17.000%, to India @ 12.500%, & to UK @ 17.500%.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u><a href="http://www.amazon.com/gp/product/B008B9JWK6/ref=as_li_ss_tl?ie=UTF8&camp=1789&creative=390957&creativeASIN=B008B9JWK6&linkCode=as2&tag=fromthesun-20">Special Offers</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B008B9JWK6" height="1" style="border: currentColor !important; margin: 0px !important;" width="1" /></u>: (Does not apply to orders placed with 1-Click) Save 13% on all Zenith watches offered by Luxi when you purchase 1 or more. Enter code <span style="color: red;">ZENITH13</span> at checkout. <u>Offer valid for limited time</u>. </span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Cost of the Watch</u>:</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;">In New York State: $112,750.00 - $14658.00 + $8460.00 = <span style="color: #b45f06;">$106,552.00</span></span><br />
<span style="font-family: Georgia;">In other parts of the USA: $112,750.00 - $14658.00 = <span style="color: red;">$98,092.00</span></span><br />
<span style="font-family: Georgia;">In Canada: $112,750.00 - $14658.00 + $4905.00 = <span style="color: magenta;">$102,997.00</span></span><br />
<span style="font-family: Georgia;">In China: $112,750.00 - $14658.00 + $16676.00 = <span style="color: #4c1130;">$114,768.00</span></span><br />
<span style="font-family: Georgia;">In UK: $112,750.00 - $14658.00 + $17166.00 = <span style="color: lime;">$115,258.00</span></span><br />
<span style="font-family: Georgia;">In India: $112,750.00 - $14658.00 = $ 98,092.00 + Vat @12.50% + Customs Basic Duty @10% + Addl Duty (CVD) @ 12% + Customs Cess @3% = <complete id="goog_70120785"> $98,092.00 + $12262.00 + $9809.00 + $12948.00 + $7.70 = <span style="color: magenta;">$133,119.00</span>.</complete></span><br />
<span style="font-family: Georgia;"><complete></complete></span><br />
<span style="font-family: Georgia;"><complete>The watch is NOT available in <a href="http://www.amazon.in/?_encoding=UTF8&camp=3626&creative=24822&linkCode=ur2&tag=fromthesun-21" target="_blank">Amazon.in</a><img alt="" border="0" height="1" src="https://ir-in.amazon-adsystem.com/e/ir?t=fromthesun-21&l=ur2&o=31" style="border: currentColor !important; margin: 0px !important;" width="1" /><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" /></complete></span><br />
<span style="font-family: Georgia;"><complete></complete></span><br />
<span style="font-family: Georgia;"><u><a href="http://www.amazon.com/gp/aag/details/?ie=UTF8&asin=B008B9JWK6&camp=1789&creative=390957&isAmazonFulfilled=&isCBA=&linkCode=ur2&marketplaceID=ATVPDKIKX0DER&orderID=&seller=A1CTGHB8137E0T&sshmPath=shipping-rates&tag=fromthesun-20#aag_shipping" target="_blank">Warranty</a><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" /></u>: (1) Protected by 02 years warranty from the date of purchase, (2) 100% genuine & authentic with manufacturer's serial number, (3) shipped in its original box with its original packing & owner's manual.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Luxi's Privacy & Security</u>: Purchase with Luxi is absolutely SAFE by using Secure Socket Layer (SSL) encryption technology to protect you against loss, misuse, or alteration of your user information. In addition, Luxi uses an internet fraud protection screening system to protect your identity & details of your credit card transactions.</span><br />
<br />
<span style="font-family: Georgia;">The user information is retained only for as long as necessary to process the transaction, & once the transaction is processed, user's credit card details and verification information are removed from the server. </span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Luxi Customer Care</u>: </span><span style="font-family: Georgia;"><a href="mailto:customerservice@luxi.com">customerservice@luxi.com</a></span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Strong Recommendation</u>: <span style="color: red;"><a href="http://www.amazon.com/gp/aag/main/?ie=UTF8&asin=&camp=1789&creative=390957&isAmazonFulfilled=&isCBA=&linkCode=ur2&marketplaceID=ATVPDKIKX0DER&orderID=&seller=A1CTGHB8137E0T&tag=fromthesun-20" target="_blank"><span style="color: red;">BUY</span></a><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" /></span></span></div>
</div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">(q) <a href="http://www.amazon.com/Luxury-Watches/b/?_encoding=UTF8&camp=1789&creative=390957&linkCode=ur2&node=405574011&pf_rd_i=B008B9JWK6&pf_rd_m=ATVPDKIKX0DER&pf_rd_p=1537026082&pf_rd_r=1K7XCXBWP031WJZ17E6V&pf_rd_s=hero-quick-promo&pf_rd_t=201&tag=fromthesun-20" target="_blank">Luxury Watch Store, Amazon</a><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" />: </span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;">You can purchase this collectible watch from <a href="http://www.amazon.com/Luxury-Watches/b/?_encoding=UTF8&camp=1789&creative=390957&linkCode=ur2&node=405574011&pf_rd_i=B008B9JWK6&pf_rd_m=ATVPDKIKX0DER&pf_rd_p=1537026082&pf_rd_r=09VXYB0BEWGV063QWCPE&pf_rd_s=hero-quick-promo&pf_rd_t=201&tag=fromthesun-20" target="_blank">Amazon's </a><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" />luxury watch store, but the price will be equal to the current basic price with FREE shipping. All other terms & conditions are same as luxi's except the special offer.</span> </div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" />(r) <a href="http://www.amazon.com/gp/aag/main/?ie=UTF8&asin=B008B9JWK6&camp=1789&creative=390957&isAmazonFulfilled=0&isCBA=&linkCode=ur2&marketplaceID=ATVPDKIKX0DER&orderID=&seller=A22BLB7UFADSL5&tag=fromthesun-20" target="_blank">Ashford watches</a>:<img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" /></span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;">You can also purchase this watch via Ashford Watches, but the price will be equal to the current basic price with FREE shipping. All other terms & conditions are same as Luxi's except the special offer. </span></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span><br /></div>
<div style="text-align: justify;">
<a href="http://www.amazon.com/Zenith-Xtreme-Tourbillon-Automatic-96-0528-4035-21-M528/product-reviews/B008B9JWK6/?_encoding=UTF8&camp=1789&creative=390957&linkCode=ur2&showViewpoints=1&tag=fromthesun-20" target="_blank"><span style="font-family: Georgia, "Times New Roman", serif;">Customer Reviews</span></a><span style="font-family: Georgia, "Times New Roman", serif;"><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" />
<u></u>:</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span><br /></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">Many customers have expressed their satisfaction in purchasing this product from <a href="http://www.amazon.com/s/?_encoding=UTF8&camp=1789&creative=390957&field-keywords=&linkCode=ur2&tag=fromthesun-20&url=search-alias%3Dwatches" target="_blank">Amazon</a><img alt="" border="0" height="1" src="https://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=ur2&o=1" style="border: currentColor !important; margin: 0px !important;" width="1" />. </span></div>
<div style="text-align: justify;">
<strong><em><span style="color: magenta; font-family: Georgia;"></span></em></strong> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">(a) One customer during October 2012, referred this product as a magnificent piece of modern technology. The customer visited the Zenith factory in Iceland, before purchasing 02 pieces of this product. During spot verification, it was ascertained that the watch required at least 03 years to manufacture, & more than 378 people including engineers, physicists, mathematicians etc. were engaged in that manufacturing process. The customer imagined the </span><span style="font-family: Georgia;">case of the watch is made out of a mix of <a href="http://en.wikipedia.org/wiki/Unobtanium" target="_blank">Unobtainium</a> (extremely rare, costly & impossible material) & <a href="http://en.wikipedia.org/wiki/T-Rex" target="_blank">T-Rex wisdom tooth</a> (extremely hard material), as it is light but strong enough to withstand 12000 atmospheric pressure or 176,352 pounds per square inch of pressure. The mechanical system of the watch is running on a bar (size: 2/16 th x 1/32 th of an inch) of Plutonium 238 that has a life of 88 years. The watch cools itself down by absorbing water from the body through the bracelet, which contains thousands of micro-bonding cells that attach to the pores on contact, & pull water to the surface of the skin to be absorbed by the bracelet. So, you have to drink at least 10 gallons of water per day to avoid dehydration. </span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">(b) Another customer who purchased this watch during June 2013 stated this watch to be budget-friendly. The quality of the watch is realistically adequate. The watch is replaceable, & hence the customer uses it as her secondary, & she is using the same while playing racquetball, diving into the pool, & spelunking. Her friends, acquaintances, & business partners are constantly complimenting this product. </span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Amazon's Best Watches for Your Wife/Girlfriend/Fiancee</u> :</span><br />
</div>
</div>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=8&l=as1&asins=B000HAEF9U&ref=qf_sp_asin_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=A100FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe><iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=8&l=as1&asins=B007ECK0KW&ref=qf_sp_asin_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=A100FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe><br />
<br />
<br />
<span style="font-family: Georgia, "Times New Roman", serif;"><u>Click the links below to know Amazon's Collectible Tourbillon Watches</u>:</span><br />
<span style="font-family: Georgia;"></span> </div>
<a href="http://www.amazon.com/gp/product/B00946LMWQ/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00946LMWQ&linkCode=as2&tag=fromthesun-20">Millage Flying Tourbillon (3826) Collection</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B00946LMWQ" height="1" style="border: currentColor !important; margin: 0px !important;" width="1" />
<br />
<br />
<a href="http://www.amazon.com/gp/product/B001N0B9G0/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B001N0B9G0&linkCode=as2&tag=fromthesun-20">Zenith Academy Tourbillon Chronograph Men's Automatic Watch 18-1260-4005-02-C505</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B001N0B9G0" height="1" style="border: currentColor !important; margin: 0px !important;" width="1" />
<br />
<br />
<br />
</div>
<div class="blogger-post-footer"><iframe src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=26&l=ur1&category=computers_accesories&banner=1SKRXV416ZYVKCEGXQR2&f=ifr" width="468" height="60" scrolling="no" border="0" marginwidth="0" style="border:none;" frameborder="0"></iframe>
</div>Anonymoushttp://www.blogger.com/profile/11268821733427039973noreply@blogger.com3Cuttack, Odisha, India20.462521 85.88298950000000820.343507499999998 85.72162800000001 20.5815345 86.044351tag:blogger.com,1999:blog-5890279788857885383.post-958584861458830952013-08-29T00:10:00.000+05:302013-09-08T19:29:24.794+05:30Twitter's New Feature Around Embedded Tweets<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCMpZDhIJD5cNAAOU98vbnh9TkLLxaWhufUNmwD5lXwTFtjoC_DfYtxGwOhBhleE4E1Z_m_tB3rNGv2DiidOoyEdXJzycE2Ma4EZRSBYAtTNeN_adfQpPu6ckeVphQYmpVRc1x3pwG_zQ/s1600/images.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCMpZDhIJD5cNAAOU98vbnh9TkLLxaWhufUNmwD5lXwTFtjoC_DfYtxGwOhBhleE4E1Z_m_tB3rNGv2DiidOoyEdXJzycE2Ma4EZRSBYAtTNeN_adfQpPu6ckeVphQYmpVRc1x3pwG_zQ/s1600/images.jpg" height="200" width="200" /></a></div>
<br />
<span id="goog_819383637"></span><span id="goog_819383638"></span><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;">Recently Twitter unveiled a new feature that </span><span style="font-family: Georgia, "Times New Roman", serif;">adds related headlines to the embedded tweets </span><span style="font-family: Georgia, "Times New Roman", serif;">in order to help tell the story behind the tweet. You will see a new "related headlines" section on the permalink page of tweets that have been embedded in websites. It lists and links to websites where the tweet was embedded, making it easier to discover stories that provide more context. Embedded tweets remain as they have been, but on the timeline of the twitter users who originally tweeted them, the related headlines will be displayed.</span> </div>
<a name='more'></a><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP1B0R3njqiqnTNWThQD2nSgLd0uOP077MU8sTq2znJdEvGnThB4kOKeTC0lGVLKKXWjFKgYNlQdgcO8TyCNdb6PMKoUa7WPXa-OSPeYI4EpS2XjOOrrlXDd-Rc65oBZdoEAibEIm1pkk/s1600/twit+feature+1.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP1B0R3njqiqnTNWThQD2nSgLd0uOP077MU8sTq2znJdEvGnThB4kOKeTC0lGVLKKXWjFKgYNlQdgcO8TyCNdb6PMKoUa7WPXa-OSPeYI4EpS2XjOOrrlXDd-Rc65oBZdoEAibEIm1pkk/s1600/twit+feature+1.png" height="179" width="320" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Twitter's New Feature Around Embedded Tweets</td></tr>
</tbody></table>
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;">In addition to the above, the new feature could help publishers drive clicks to articles & help to expand the ranks of their followers. It is a great feature, & people will love it, because users and their publications will get a rise in visitors. Individual tweeters will feel that they will draw much recognition, & followers by this feature. Now the price of this feature is FREE, but Twitter may monetize this in future. </span><br />
<span style="font-family: Georgia, "Times New Roman", serif;"> </span><br />
<span style="font-family: Georgia, "Times New Roman", serif;"></span></div>
</div>
<a href="http://www.amazon.com/gp/product/B00BAH6COK/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00BAH6COK&linkCode=as2&tag=fromthesun-20">NA 4/0-250 WELDING CABLE [Office Product]</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B00BAH6COK" height="1" style="border: none !important; margin: 0px !important;" width="1" />
<br />
<br />
<a href="http://www.amazon.com/gp/product/B002ZX1XDS/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B002ZX1XDS&linkCode=as2&tag=fromthesun-20">Georgia Pacific Acclaim Folded Paper Towel, 9-1/4 x 9-1/2 - 4,000 per Carton (White)</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B002ZX1XDS" height="1" style="border: none !important; margin: 0px !important;" width="1" />
<br />
<br />
<br />
</div>
<div class="blogger-post-footer"><iframe src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=26&l=ur1&category=computers_accesories&banner=1SKRXV416ZYVKCEGXQR2&f=ifr" width="468" height="60" scrolling="no" border="0" marginwidth="0" style="border:none;" frameborder="0"></iframe>
</div>Anonymoushttp://www.blogger.com/profile/11268821733427039973noreply@blogger.com0Cuttack, Odisha, India20.462521 85.88298950000000820.343507499999998 85.72162800000001 20.5815345 86.044351tag:blogger.com,1999:blog-5890279788857885383.post-15688000463602428102013-08-28T13:29:00.000+05:302013-09-08T19:27:42.282+05:30Ecommerce Language for Small Business Owners<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Curated Commerce</u>: This refers to creating unique product lines that provides customers with a distinct collection of products. In online shopping, the demand for personalization is a vital driving factor. Marketing techniques viz. email marketing is very often used to showcase unique product lines to customers depending on the personal taste & purchase history. </span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Ecommerce Hosting</u>: This depicts a type of website hosting platform exclusively meant for ecommerce firms, which differs from a standard website hosting platform in many functionalities, such as, database support, SSL, shopping cart software, payment processing services, & security.</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Electronic Data Interchange</u>: This refers to the exchange of data between companies through networks. This is an easy but important mechanism for companies to buy, sell, & trade information, as the number of internet users is increasing rapidly.</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><a name='more'></a></span><br />
<span style="font-family: Georgia;"></span><span style="font-family: Georgia, "Times New Roman", serif;"><u>Abandonment</u>: This is a term which interprets the phrase "a visitor leaves a web page without completing his/her desired actions". Examples include visitors who add items to their shopping cart, but exit without any purchase, & visitors who leave the web page abruptly without signing up for a free newsletter or any software.</span><br />
<br />
<span style="font-family: Georgia;"><u>Credit Card Interchange</u>: This is a process where, all the entities involved in a credit card transaction meets.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Ecommerce Remarketing</u>: This is a marketing strategy, viz. automated email marketing system to woo the visitors who abandoned the website without completing their desired actions.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Mcommerce</u>: There is a growing trend of using networks interfaced with wireless devices, i.e. laptops, mobiles, & handhelds etc. Techniques used to complete the online transactions made by the visitors through these wireless devices can be called as mcommerce. Also this term refers to the design & develop of ecommerce websites meant for these devices.</span><br />
<br />
<span style="font-family: Georgia;"><u>Tcommerce</u>:</span> <span style="font-family: Georgia, "Times New Roman", serif;">This is a strategy focussing on designing & developing of ecommerce tools for tablets in order to improve the browsing & shopping experience.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Merchant Account</u>: Setting up a mechant account involves you, your banker, & a 3rd party processor to arrange a foolproof mechanism for accepting or receiving payments.</span><br />
<br />
<span style="font-family: Georgia;"><u>Payment Gateway</u>:</span> <span style="font-family: Georgia, "Times New Roman", serif;">This is an automated service for money transaction between shopper & merchant. 3rd party processors process, verify, & accept or decline credit card transactions on behalf of the merchant via secured internet connections using internationally approved system of computer processes.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>PCI - DSS</u>: This is a standard that all organizations including online retailers must follow, while storing, processing, & transmitting the credit card data of their customers. The Data Security Standard (DSS) was developed & maintained by <a href="https://www.pcisecuritystandards.org/" target="_blank">Payment Card Industry Security Standards Council</a> (PCI SSC). To be PCI complaint, the online companies must use (a) a firewall between the wireless network & the card holder's data environment, (b) use the latest security & authentication system such as, WPA/WPA2 (a wireless encryption standard), (c) change default settings for wired privacy keys, & (d) use a network intrusion detection system.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Secure Sockets Layer (SSL)</u>: This is an internet protocol developed by <a href="http://isp.netscape.com/" target="_blank">Netscape</a> to transmit encrypted private data between a client & a server. This uses a cryptographic system that uses 2 keys, one is public, known to everyone, & the other is private, known only to the recipient of the data, such as credit card information.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><u>Social Shopping</u>: This refers to customers who use social networking media to share their latest purchases, deals, discounts, & product reviews etc. </span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"> </span></div>
</div>
<a href="http://www.amazon.com/gp/product/B00CPD46M8/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00CPD46M8&linkCode=as2&tag=fromthesun-20">OEM ZTE Li3716tp3h594650 Battery for U970 Grand X V970 U930 N970 U795</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B00CPD46M8" height="1" style="border: none !important; margin: 0px !important;" width="1" />
<br />
<br />
<a href="http://www.amazon.com/gp/product/B00AFP1WXE/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00AFP1WXE&linkCode=as2&tag=fromthesun-20">Apple iPhone 5 32GB - White - Rose Gold and Black Diamonds Luxury Mobile Phone</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B00AFP1WXE" height="1" style="border: none !important; margin: 0px !important;" width="1" />
<br />
<br />
<br />
</div>
<div class="blogger-post-footer"><iframe src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=26&l=ur1&category=computers_accesories&banner=1SKRXV416ZYVKCEGXQR2&f=ifr" width="468" height="60" scrolling="no" border="0" marginwidth="0" style="border:none;" frameborder="0"></iframe>
</div>Anonymoushttp://www.blogger.com/profile/11268821733427039973noreply@blogger.com0Cuttack, Odisha, India20.462521 85.88298950000000820.343507499999998 85.72162800000001 20.5815345 86.044351tag:blogger.com,1999:blog-5890279788857885383.post-53153997076865040652013-08-27T18:35:00.000+05:302013-09-08T19:23:07.789+05:30Avoid Facebook Scams<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="font-family: Georgia, "Times New Roman", serif;"><u>Introduction</u>:</span><br />
<span style="font-family: Georgia;"></span><br />
<div style="text-align: justify;">
<span style="font-family: Georgia;"><a href="https://www.facebook.com/" target="_blank">Facebook</a> has approximately 1.06 billion monthly active users, as on Dec' 2012(Source: <a href="http://news.cnet.com/8301-1023_3-57566550-93/facebook-by-the-numbers-1.06-billion-monthly-active-users/" target="_blank">cNet</a>), & this number is increasing @25% per month, as more and more people go online & create facebook profiles. Therefore it is presumably correct that infiltration occurs in the social arena for '<a href="http://en.wikipedia.org/wiki/Phishing" target="_blank">phishing</a> scams', '<a href="http://en.wikipedia.org/wiki/Email_spam" target="_blank">malicious spams</a>', & '<a href="http://en.wikipedia.org/wiki/Malicious_software" target="_blank">malware</a>'. While working online, scams & spams are unavoidable, but we have to take precautionary measures to avoid these nuisances in order to protect both our privacy & computer system. </span></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJtWDEUW31-brtw4iPCd7JPW1eg8lufqcdTaVPuplSnEgPfGRR7h_tgC-YnclRjbXWbbSWwudCGuSeOHvgfCLWeQryL8tvqXOBh2KN8Fk-cSRKLaUH_C73lI-q4fzi8Ogr9XxBBVBeVYU/s1600/mark-zuckerberg-facebook-1187_610x407.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJtWDEUW31-brtw4iPCd7JPW1eg8lufqcdTaVPuplSnEgPfGRR7h_tgC-YnclRjbXWbbSWwudCGuSeOHvgfCLWeQryL8tvqXOBh2KN8Fk-cSRKLaUH_C73lI-q4fzi8Ogr9XxBBVBeVYU/s1600/mark-zuckerberg-facebook-1187_610x407.jpg" height="213" width="320" /></a></div>
<span style="font-family: Georgia, "Times New Roman", serif;"><u></u></span><br />
<span style="font-family: Georgia, "Times New Roman", serif;"><u><a name='more'></a>Spam Description</u></span><span style="font-family: Georgia, "Times New Roman", serif;">:</span><br />
<br />
<span style="font-family: Georgia;"></span><br />
<div style="text-align: justify;">
<span style="font-family: Georgia;">Some entities, may be known to you will persuade you to install & share an app in your facebook wall. If you authorize the app to enter your wallpost & share the same to reach your friend, the spam message will move quickly through the facebook profiles, & the process continues endlessly. Many of these messages are designed to trick facebook users into cutting & pasting malicious code into the address bar of the web browser or by clicking an embedded link (url shortner link) that takes you off facebook, where you could become a potential victim to malicious malware and phishing scams. Facebook does not have adequate security control system to eradicate or detect such type of malicious acts, before it becomes rampant in the entire social medium. </span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Tips</u>:</span></div>
<ul>
<li><div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;">Look into the message carefully. Is it of the same weight as other messages sent by your friend previously? Suppose your professional friend send you a typical message: "Oh! Look at the Video", along with some other unnecessary characters, chances are that it was not sent by your friend, & you must not click it.</span></div>
</li>
<li><div style="text-align: justify;">
<span style="font-family: Georgia;">If an unconventional message appears multiple times in your newsfeed, it may be a spam.</span></div>
</li>
<li><div style="text-align: justify;">
<span style="font-family: Georgia;">Be careful about the installation of apps. </span></div>
</li>
<li><div style="text-align: justify;">
<span style="font-family: Georgia;">Be wary about the short links posted to your walls by your friends, usually who never posts anything or who posts intermittently.</span></div>
</li>
<li><div style="text-align: justify;">
<span style="font-family: Georgia;">Always verify the urls before clicking it. If a url indicates to redirect you to YouTube, then you cleverly move the mouse cursor over the link without clicking it, & you will know the details of the original link in the footer of your browser.</span></div>
</li>
<li><div style="text-align: justify;">
<span style="font-family: Georgia;">If you click a link to find unnecessary characters or texts or videos, then remove the link from your wall, without clicking any further.</span></div>
</li>
</ul>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Enable Dislike Button</u>:</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;">A scam circulated among the facebook users about enabling a 'Dislike' button. This scam was propagated in order to fulfill the people's desire about a 'Dislike' button. Messages claiming to offer a 'Dislike' button opposite to 'Like' button, but replacing the 'Share' button appeared lower down alongside 'Link' & 'Comment' was likely to fool some users into believing it genuine. Scammers cracked the facebook security to do the job. Clicking on the link was not only forwarded the fake message 'facebook Dislike button' to all your online friends, but also run obfuscated javascript on your computer system. </span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNbt9qu3PBYm6oGzVf_EcP4QcT97PVx_kRBnnq_F_t-SD3mwE5xUpj4GMD209MtynjfunM9Xrzyewall-dwQvsuDSm46uKW5PsN7l32UyuvtELRvue25VG9AfXcK0km6a97iDwOq5pLm0/s1600/fb-dislike-button.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNbt9qu3PBYm6oGzVf_EcP4QcT97PVx_kRBnnq_F_t-SD3mwE5xUpj4GMD209MtynjfunM9Xrzyewall-dwQvsuDSm46uKW5PsN7l32UyuvtELRvue25VG9AfXcK0km6a97iDwOq5pLm0/s320/fb-dislike-button.jpg" height="68" width="320" /></a></div>
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;"><u></u></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;"><u>Remove the Malicious App</u>:</span> </div>
<div style="text-align: justify;">
<ul>
<li><span style="font-family: Georgia, "Times New Roman", serif;">If you have installed the app without knowing details of it, make sure to delete the post of your wall in order to prevent others to see & 'Like' the message for unnecessary spreading of the same. </span></li>
<li><span style="font-family: Georgia, "Times New Roman", serif;">Remove the app from your facebook account, & revoke the access or authorization given to the app by you.</span></li>
</ul>
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia, "Times New Roman", serif;"><u>Track Facebook Scams</u>:</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;">Here is a list of websites to track the latest facebook scams, & find their details.</span><br />
<span style="font-family: Georgia;"></span><br />
<span style="font-family: Georgia;"><a href="http://facecrooks.com/facecrooks-home-page" target="_blank">Facecrooks</a>,</span><br />
<span style="font-family: Georgia;"><a href="https://www.facebook.com/Facecrooks" target="_blank">Facecrook Facebook Page</a>,</span><br />
<span style="font-family: Georgia;"><a href="https://www.facebook.com/SophosSecurity" target="_blank">Sophos Facebook Page</a>,</span><br />
<span style="font-family: Georgia;"><a href="http://nakedsecurity.sophos.com/" target="_blank">Naked Security Blog</a>.</span><br />
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;"></span> </div>
</div>
</div>
<a href="http://www.amazon.com/gp/product/B001UKRDVS/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B001UKRDVS&linkCode=as2&tag=fromthesun-20">Honeywell Ademco 944WH-M Magnet Only for 944WH</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B001UKRDVS" height="1" style="border: none !important; margin: 0px !important;" width="1" /><br />
<br />
<a href="http://www.amazon.com/gp/product/B00DXMTA26/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00DXMTA26&linkCode=as2&tag=fromthesun-20">Enterasys Networks - DSHSS7-U-LIC - Dragonhostsensorswlic(unlimited)</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B00DXMTA26" height="1" style="border: none !important; margin: 0px !important;" width="1" />
<br />
<br />
<br />
<br />
</div>
<div class="blogger-post-footer"><iframe src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=26&l=ur1&category=computers_accesories&banner=1SKRXV416ZYVKCEGXQR2&f=ifr" width="468" height="60" scrolling="no" border="0" marginwidth="0" style="border:none;" frameborder="0"></iframe>
</div>Anonymoushttp://www.blogger.com/profile/11268821733427039973noreply@blogger.com0Cuttack, Odisha, India20.462521 85.88298950000000820.343507499999998 85.72162800000001 20.5815345 86.044351tag:blogger.com,1999:blog-5890279788857885383.post-67455717164899691442013-08-26T18:26:00.000+05:302013-09-08T19:21:01.029+05:30How many plug-ins can you add to your personal computer?<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div style="text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 12pt; line-height: 115%;">Theoretically, one personal computer can be connected to 127
<a href="http://en.wikipedia.org/wiki/USB" target="_blank">USB</a> (Universal Serial Bus) devices. But practically it is somewhat different. Let us have a look into
it. As per the USB specifications, all devices are controlled by a host
controller, & this chip has a 7-bit wide address field, & thus it
should be able to recognize 128 addresses. Since the controller itself uses the
address ‘0’, a total of 127 addresses remain open for plug-in of other USB
devices. The USB architecture comprises of the host controller, hubs, &
actual USB peripherals, & host controllers are designed to be connected to
hubs, & other USB devices. Each device has at least one function, &
each function is assigned an individual address. In order to connect 127
devices to a personal computer, we will need a lot of hubs, & each of which
will be connected to these available addresses. <o:p></o:p></span></div>
<div style="text-align: justify;">
<a name='more'></a><span style="font-family: "Georgia","serif"; font-size: 12pt; line-height: 115%;">A USB pen drive only needs one address for mass storage
functions, while, multifunction printers require several addresses, one each
for print, scan, fax, & other features.<span style="mso-spacerun: yes;">
</span></span><br />
<div style="text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 12pt; line-height: 115%;"><span style="mso-spacerun: yes;"></span><o:p></o:p></span> </div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgX0MGHiV8vMNy92ndZhl-DT_wzdhTy4d6n5RpoiEbaPEd-0PMHLcWcCuFqqTl_53ga86-WGEem1MKa6u0MFzoK8pvUQTJoob8EwY4uBAvKCfPAqIk0HEZ6Wtsg29KGds37_D-qH0iPBCc/s1600/usb+1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgX0MGHiV8vMNy92ndZhl-DT_wzdhTy4d6n5RpoiEbaPEd-0PMHLcWcCuFqqTl_53ga86-WGEem1MKa6u0MFzoK8pvUQTJoob8EwY4uBAvKCfPAqIk0HEZ6Wtsg29KGds37_D-qH0iPBCc/s1600/usb+1.jpg" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7LUo1Kh-WgjzWhkzdK8_XDPCDjPIK7-czyWA5cXvegKnpfKgLHYj6lC8bf4DNxd7YiAEc91yAfDWrLKNlo_VuXFf4wzw4B_q7QSEUb1MkxC-LjUk7O07ZGnveI6Pz_ApDklNVTI_2muY/s1600/usb+hierar.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7LUo1Kh-WgjzWhkzdK8_XDPCDjPIK7-czyWA5cXvegKnpfKgLHYj6lC8bf4DNxd7YiAEc91yAfDWrLKNlo_VuXFf4wzw4B_q7QSEUb1MkxC-LjUk7O07ZGnveI6Pz_ApDklNVTI_2muY/s1600/usb+hierar.jpg" /></a></div>
<div style="text-align: justify;">
</div>
<div class="separator" style="clear: both; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 12pt; line-height: 115%;">Further, each device is allowed to pull current between
100mA and 500mA at about 5V from the controller, which will cut off, if it
reaches its maximum capacity. Hence for example, the power consumption of 127
pen drives will be around 60W in toto. A hub that wants to host many USB
devices has to feed current from its own power supply. Thus, with common
bus-powered 4-port hubs, one will never be able to connect 127 devices
together. <o:p></o:p></span></div>
<div style="text-align: justify;">
</div>
<div class="MsoNormal" style="margin: 0in 0in 10pt; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 12pt; line-height: 115%;">Windows has a maximum of 25 drive letters available for new
drives/devices to be assigned. Over and above this, drives will remain
unrecognized even in the Disk Manager. In Windows 7, one can easily mount new
disks as <a href="http://en.wikipedia.org/wiki/NTFS" target="_blank">NTFS</a> (New Technology File System) folders rather than as a logical drive. <o:p></o:p></span></div>
<div style="text-align: justify;">
</div>
<div class="MsoNormal" style="margin: 0in 0in 10pt; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 12pt; line-height: 115%;">In a laboratory experiment, one personal computer was
connected to 97 pen drives through 15 hubs, where each hub had two controllers,
& each controller received one address. Here all the 127 addresses were
consumed, but the experiment was fruitless as it did not yield any desired
practical result.</span></div>
</div>
</div>
<a href="http://www.amazon.com/gp/product/B000H825B2/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B000H825B2&linkCode=as2&tag=fromthesun-20">Fujinon HA42x13.5ERD 13.5-570mm HDTV ENG-Style Stabilized Telephoto Zoom Lens with 2x Extender</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B000H825B2" height="1" style="border: none !important; margin: 0px !important;" width="1" />
<br />
<br />
<a href="http://www.amazon.com/gp/product/B000H7YCDW/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B000H7YCDW&linkCode=as2&tag=fromthesun-20">Fujinon HA42x9.7ERD 9.7-410mm HDTV ENG-Style Stabilized Telephoto Zoom Lens with 2x Extender</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B000H7YCDW" height="1" style="border: none !important; margin: 0px !important;" width="1" />
<br />
<br />
<br />
</div>
<div class="blogger-post-footer"><iframe src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=26&l=ur1&category=computers_accesories&banner=1SKRXV416ZYVKCEGXQR2&f=ifr" width="468" height="60" scrolling="no" border="0" marginwidth="0" style="border:none;" frameborder="0"></iframe>
</div>Anonymoushttp://www.blogger.com/profile/11268821733427039973noreply@blogger.com0Cuttack, Odisha, India20.462521 85.88298950000000820.343507499999998 85.72162800000001 20.5815345 86.044351tag:blogger.com,1999:blog-5890279788857885383.post-88913333650810345852013-08-25T14:39:00.000+05:302013-09-08T19:18:51.644+05:30How online profiles can be deleted in a click?<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: justify;" trbidi="on">
<span style="font-family: Georgia, "Times New Roman", serif;">You must be tired of having signing up hundreds of websites or apps just to know the inside story, & then climb uphill deleting your online profiles from the unnecessary ones. A lot of companies or websites use dark pattern techniques to make it difficult to find how to delete your online profile or account. A dark pattern is a type of user interface that has been carefully crafted to trick users into doing things, such as buying insurance with purchase or signing up for recurring bills.</span></div>
<div dir="ltr" style="text-align: left;" trbidi="on">
<br /></div>
<div dir="ltr" style="text-align: left;" trbidi="on">
<iframe allowfullscreen="" frameborder="0" height="356" marginheight="0" marginwidth="0" mozallowfullscreen="" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/5191495" style="border: 1px solid rgb(204, 204, 204); margin-bottom: 5px;" webkitallowfullscreen="" width="427"> </iframe></div>
<div dir="ltr" style="margin-bottom: 5px; text-align: justify;" trbidi="on">
<a href="https://www.slideshare.net/harrybr/ux-brighton-dark-patterns" target="_blank" title="Dark Patterns: User Interfaces Designed to Trick People (Presented at UX Brighton 2010)"><strong>Dark Patterns: User Interfaces Designed to Trick People </strong></a> </div>
<a name='more'></a><div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;"><a href="http://robblewis.me/" target="_blank">Robb Lewis</a> and <a href="http://edpoole.me/" target="_blank">Ed Poole</a> came up with a solution through a website <a href="http://justdelete.me/">Justdelete.me</a>, which aggregates the "delete" pages of at least 100 popular sites. This website aims to be a directory of 'urls' to enable you to delete your account from the web services. You can also submit the 'account delete page' of a site you know to <a href="http://justdelete.me/">Justdelete.me</a>, that is not listed over there.</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;"></span> </div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghKfJ84L0NEVRr8HNzIFEWylY6nHYdgxPATiVGxjl7cT6Nu4xmI_P0D9vA6A-rLkmDUqf1I3gEFYNzxQ4QR-RR6oo7_egtPKE18bB3Nh2jaccPKY1HBKK9Jw1YZ1uJQKvxSvW37YgGJ50/s1600/justdelete.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghKfJ84L0NEVRr8HNzIFEWylY6nHYdgxPATiVGxjl7cT6Nu4xmI_P0D9vA6A-rLkmDUqf1I3gEFYNzxQ4QR-RR6oo7_egtPKE18bB3Nh2jaccPKY1HBKK9Jw1YZ1uJQKvxSvW37YgGJ50/s320/justdelete.png" height="179" width="320" /></a></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;">The links provided in the website <a href="http://justdelete.me/">Justdelete.me</a> have been color coded to indicate the difficulty level of account deletion:</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><span style="background-color: #ead1dc; color: lime;">GREEN</span>: Simple process,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><span style="background-color: #d9d2e9; color: yellow;">YELLOW</span>: Some extra steps involved,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><span style="background-color: #f3f3f3; color: red;">RED</span>: Cannot be fully deleted without consulting customer services,</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><span style="background-color: #d9d2e9; color: black;">BLACK</span>: Cannot be deleted.</span></div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"></span> </div>
<div style="text-align: justify;">
<span style="font-family: Georgia;"><u>Examples</u>:</span> </div>
<ul style="text-align: left;">
<li><div style="text-align: justify;">
<span style="font-family: Georgia, "Times New Roman", serif;">In order to delete Skype, you must know five contacts, your sign up email address, & the month you created your account.</span></div>
</li>
<li><div style="text-align: justify;">
<span style="font-family: Georgia;">To delete Spotify, you have to contact the customer service.</span></div>
</li>
<li><div style="text-align: justify;">
<span style="font-family: Georgia;">You cannot delete your profiles in Netflix, Pinterest, & Craigslist.</span></div>
</li>
<li><div style="text-align: justify;">
<span style="font-family: Georgia;">To delete your account in Vine, </span><span style="font-family: Georgia, "Times New Roman", serif;">you have to contact Twitter directly.</span> </div>
</li>
</ul>
<br />
<a href="http://www.amazon.com/gp/product/B005HZNCTE/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B005HZNCTE&linkCode=as2&tag=fromthesun-20">Best Quality StreetGlow The Fast and The Furious LED Exhaust Tip - Purple</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B005HZNCTE" height="1" style="border: none !important; margin: 0px !important;" width="1" />
<br />
<br />
<a href="http://www.amazon.com/gp/product/B008B1URIA/ref=as_li_tf_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B008B1URIA&linkCode=as2&tag=fromthesun-20">Motorola Waterproof 35 mile FRS</a><img alt="" border="0" src="http://ir-na.amazon-adsystem.com/e/ir?t=fromthesun-20&l=as2&o=1&a=B008B1URIA" height="1" style="border: none !important; margin: 0px !important;" width="1" />
<br />
<br />
<br />
</div>
<div class="blogger-post-footer"><iframe src="http://rcm-na.amazon-adsystem.com/e/cm?t=fromthesun-20&o=1&p=26&l=ur1&category=computers_accesories&banner=1SKRXV416ZYVKCEGXQR2&f=ifr" width="468" height="60" scrolling="no" border="0" marginwidth="0" style="border:none;" frameborder="0"></iframe>
</div>Anonymoushttp://www.blogger.com/profile/11268821733427039973noreply@blogger.com0Cuttack, Odisha, India20.462521 85.88298950000000820.343507499999998 85.72162800000001 20.5815345 86.044351