Saturday, October 25, 2008

Technical Glossary



This is an extension of my previous article Shortfoms of communication. This time you will see a technical terms & abbrevations also referred as glossary. This is an effort to consolidate some of the technical shortforms that we come accross. Almost all these terms are related to project management and other terms related to software industry.


AD - Activity Description
ADM - Arrow Diagramming method
ADSL - Advanced Digital Subscriber Line

BAC - Budget On Completion
BIOS - Basic Input/Output System
Blog - web log. Just like this one
BMP - BitMaP - A windows file format to store images.
BRM -Build and Release Management

CDM - Conceptual Data Model
COQ - Cost Of Quality
CPM - Critical Path Method
CPI - Cost Performance Index
CR - Change Request
CSS - Cascaded Style sheets
CSV - Comma Seperated Values

DB - DataBase
DBMS - DataBase Management System
DFD - Data Flow Diagram
DHCP - Dynamic Host Configuration Protocol
DNS - Domain Name System.
DSL - Digital Subscriber Line.
DVD - Digital Versatile Disc or Digital Video Disc

EDD - External Design Document
ER(Diagram) - Entiry Relationship Diagram
ERP - Enterprice Resource Planning
FTP - File Transfer Protocol

GIF - Graphics Interchange Format - One of the earliest image formats
GPL - GNU General Public License

HTML - HyperText Markup Language
HTTP - HyperText Transfer Protocol

IT - Information Technology
JAD - Joint Application Design

LDD - Local Delivery Desk
LTV - Loan To Value

MCAD - Microsoft Certified Application Developer
MCP - Microsoft Certified Professional
MCSD - Microsoft Certified Solutions Developer - a Certificaiton by Microsoft

OOPS - Object Oriented Programming System

PERT - Program Evaluation & Review Technique
PMI - Project Management Institue
PHP - PHP Preprocessed Hypertext programming ??

PL - Project Lead
PMI - Project Management Institue
PMP - Project Management Professional
PR - Permanet Resident (US)
PR - Page Rank (Google)
PR - Public Relations (Marketing)

RAD - Rapid Application Development
RDBMS - Relational Database Management System

SAM- Security accounts Manager
SSAD - Structured System Analysis and Design
SOW - Statement Of Work

TBD - To be done
TDD - Technical Design Document
TL - Team Lead
TPM - Thought process Map

UML - Unified Modeling Language

WBS - Work Breakdown Structure.

Do share the other terms that you came accross by commenting on the topic. I will also add them as a part of the topic.

Get A Windows Run Box Even if Run & Task Manager are Disabled

If your Run dialog has been disabled and your machine’s task manager is disabled,so don’t be panic,RunMimic is the solution. RunMimic is an emulation of the Windows Run dialog, it even looks the same!

If your Run dialog has been disabled and your machine’s task manager is disabled,so don’t be panic,RunMimic is the solution. RunMimic is an emulation of the Windows Run dialog, it even looks the same!

RunMimic is 21k portable executable, looks almost exactly like the regular Windows run box and it’s just as functional.All of the commands I normally need to issue worked without a hitch: services.msc, compmgmt.msc, control, appwiz.cpl, regedt32, cmd. RunMimic also had no problem getting Explorer to access my network file shares.

Since it’s portable, this is a nice little app to keep on a flash drive in case of emergencies. RunMimic is not the kind of program I need often, but I tend to work by the old Boy Scout motto: “Be prepared.”

Friday, October 24, 2008

WHAT IS KEYLOGGER?

WHAT IS KEYLOGGER?
A keylogger is a program or piece of hardware that records all keyboard keystrokes
to an encrypted file which can then be read later. Based on the order of the keystrokes,it is usually easy to identify the password(s) from the file later. Like the Trojan, this also requires that someone actually type the password. Keyloggers come in two types:hardware and software. A hardware keylogger can be fitted between the keyboard cable and the computer and can be activated with a few keystrokes. It is then left in place until after the password that you are looking to hack is typed. Later it is removed and the file of keystrokes is examined for the password. A software keylogger is installed on a system and effectively has the same function, however, it is a little bit more complex to use since it must be installed to run stealthily. A keylogger could be usedto steal a password from someone who is using an office computer or sharing a computer. It is likely that installing and using such a device or piece of software is illegal and we do not recommend or condone this activity.

HOW TO HACK AOL, YAHOO AND HOTMAIL..!!

HOW TO HACK AOL, YAHOO AND HOTMAIL..!!

NOW I UPDATED THE POST BY THE FACT DAT ALL THE INTERNET SERVICES UPDATES THEIR SECURITY METHODS & REQURED REGULAR LOGIN AFTER A PARTICULAR SPAN SO METHODS LIKE COOKIE CHATCHING,BRUITE FORCE R OF NO USE BUT STILL U CAN READ THIS POST AS D PURPOSE OF STUDY COZ DIS HV D BASIC THINGS WHICH ALL CAN SCIP THINKING AS LENGTHY & BORING…!!

MOST OF THE PEOPLE DON'T WANNA TAKE PAIN N JUS WANT FINAL SCRIP/SOFTWARE WHICH CAN HACK FOR THEM JUST 4 CLICK….. DO STOP DEVLOPING THIS SORT OF THINKING N START'S BRUNING UNLESS U CAN;T GET SWEET RESULTS..!!

DAT'S D WAY'S WHICH R USED TO….

We get numerous calls from people who want to recover AOL®, Yahoo® or
Hotmail® or other online and email passwords. We do not do this type of
work. Many of these people claim that they have lost their passwords because
they have been hacked and now need to get their password back.
As we have reviewed information on the web, we found
very little real information about the actual techniques that could be used
to hack these services. So we decided to pull together a detailed explanation.
What follows is a detailed explanation of the methodologies involved. We
do not condone any illegal activity and we clearly mention in this article
techniques that are illegal. Sometimes these methods are known as "Phishing."

THE HOAX
Let's dispose of one technique that is absolutely a hoax (meaning a fraud:
something intended to deceive; deliberate trickery intended to gain an advantage.)
If you see a newsgroup post or web page with something like the following, it is a
hoax and will not work.
: : : (([[THIS REALLY WORKS ]])) : : :
(1) send an E-mail to passwordrecovery@yourdomainhere.com
(2) In the subject box type the screenname of the person whose password you wish to steal
(3) In the message box type the following:
/cgi-bin/start?v703&login.USER=passmachine&class
=supervisor&f={your aol password}&f=27586&javascript=ACTIVE&rsa
(4) Send the e-mail with priority set to "high" (red ! in some mailprograms)
(5) wait 2-3 minutes and check your mail
(6) Read the message.-Where YOUR password was typed before,
NOW, the password of the screenname in the code string is there!!!
Why does this work? It´s a special decryption-server that
AOL-employees can use to decrypt passwords.The aolbackdoor
account is a bot that reads your authentification from the message
body and identifiying you as a valid AOL Staff-member,
you will get the password mailed back to you. The trick is that this
Bot´s script seems to be a little bit buggy and it automatically recogises
you as an supervisor (AOL-Staff member), even if you use a normal AOL
account. This means, that EVERYONE having a valid AOL account can
hack as many other accounts as he wants.
This is just a scam to steal your password and may explain some of the
calls we get from people saying they were hacked. Never give your
password to anyone. No legitimate web service or customer service
representative will ask for it or need it. There is no magic email address
or series of commands that will reveal the passwords of users.
mail me to know more ghanendra2506@gmail.com

what is TROJAN?

TROJAN
A Trojan is a program that is sent to a user that allows an attacker to control
functions of the target computer, recover information from the target or to delete
or damage files on the target. The name Trojan is given because the program wil
l usually come attached to some other program or file that entices you to run it.
There are a wide variety of Trojans any number of which can be programmed to
capture passwords as they are typed and to email or transmit them to a third party.
To protect yourself against Trojans, you should
never execute or download software or files that are not from a trusted source.
It is critical that anyone working on internet use a virus protection program
(which should catch most Trojans.) Note that since a Trojan requires the password
to be typed or stored in order to be recovered, this is not an effective way to recover
your own password. It could explain, however, how someone could lose their
password to a hacker. Sending someone a Trojan program is certainly illegal and
we do not recommend or condone this activity. A Trojan is unlikely to be effective
in recovering a particular account password since it requires the target to install it.
However, hackers will often bulk mail Trojans to thousands of people in the hope that a
small percentage will get caught. Legitimate account holders who may have been
caught by a Trojan and can authenticate themselves should contact their service provider
to have their account passwords reset.

pyar ya dhoka

Ban Jaon Agar Tumsa Tu Tumhe Kaisa Lage Ga.
Her Pal Mein Rahoon Tumse Khafa To Tumhe Kaisa Lage Ga...
Parhte Ho Jo tum Mujhe Namazoon Ki Tarha...Ho Jaon Agar Tumse Qaza Tu Tumhe Kaisa Lage Ga....
Tum Pyar Mein Khud Ko Mitane Per Ho Raazi...
Ban Jaye Pyar Saza Tu Kaisa Lage Ga...
Khud Se Bhi Ziada Yakeen Ho Tume Kisi Per....Wo Shaksh hi Agar De Daga To kaisa Lage Ga....?????

Tanhayi Me Jina Meri Aadat Hai,
Akele Me Rehna Meri Aadat Hai.
San-nato Se Hai Mujhe Pyaar,
Kyonki Maine Mohabbat Me Dhokha Khaaya Tha Ek Baar...

Sunday, August 10, 2008

FAQs

What is SEBI’s Role in an Issue?
Any company making a public issue or a listed company making a rights issue of value of more than Rs.50 lakhs is required to file a draft offer document with SEBI for its observations. The company can proceed further on the issue only after getting observations from SEBI. The validity period of SEBI’s observation letter is three months only ie. the company has to open its issue within three months period.
Where can I get a form for applying/ bidding for the shares?
The form for applying/bidding of shares is available with all syndicate members, collection centers, the brokers to the issue and the bankers to the issue.
Is it compulsory for me to have a Demat Account?
As per the requirement, all the public issues of size in excess of Rs.10 crore, are to made compulsorily in the demat more. Thus, if an investor chooses to apply for an issue that is being made in a compulsory demat mode, he has to have a demat account and has the responsibility to put the correct DP ID and Client ID details in the bid/application forms.
What are the dos and don’ts for bidding / applying in the issue?
The investors are generally advised to study all the material facts pertaining to the issue including the risk factors before considering any investment. They are strongly warned against any ‘tips’ or relying on news obtained through unofficial means.
How many days is the issue open?
As per Clause 8.8.1, Subscription list for public issues shall be kept open for at least 3 working days and not more than 10 working days. In case of Book built issues, the minimum and maximum period for which bidding will be open is 3–7 working days extendable by 3 days in case of a revision in the price band. The public issue made by an infrastructure company, satisfying the requirements in Clause 2.4.1 (iii) of Chapter II may be kept open for a maximum period of 21 working days. As per clause 8.8.2., Rights issues shall be kept open for at least 30 days and not more than 60 days.
Can I change/revise my bid?
Yes. The investor can change or revise the quantity or price in the bid using the form for changing/revising the bid that is available along with the application form. However, the entire process of changing of revising the bids shall be completed within the date of closure of the issue.
Which are the reliable sources for me to get information about response to issues?
In the case of book-built issues, the exchanges (BSE/NSE) display the data regarding the bids obtained (on a consolidated basis between both these exchanges). The data regarding the bids is also available categorywise. After the price has been determined on the basis of bidding, the statutory public advertisement containing, inter alia, the price as well as a table showing the number of securities and the amount payable by an investor, based on the price determined, is issued.
How do I know if I am allotted the shares? And by what timeframe will I get a refund if I am not allotted?
The investor is entitled to receive a Confirmatory Allotment Note (CAN) in case he has been allotted shares within 15 days from the date of closure of a book Built issue. The registrar has to ensure that the demat credit or refund as applicable is completed within 15 days of the closure of the book built issue.
How long will it take after the issue for the shares to get listed?
The listing on the stock exchanges is done within 7 days from the finalization of the issue. Ideally, it would be around 3 weeks after the closure of the book built issue. In case of fixed price issue, it would be around 37 days after closure of the issue.
What is the recourse available to the investor in case of issue complaints?
Most of the issue complaints pertain to non-receipt of refund or allotment, or delay in receipt of refund or allotment and payment of interest thereon. These complaints shall be made to the post issue Lead Manager, who in turn will take up the matter with registrar to redress the complaints. In case the investor does not receive any reply within a reasonable time, investor may complain to SEBI, Office of investors Assistance.
How will the investor confirm that bonus/rights entitlement is credited into the account?An allotment advice will be sent by the issuer for bonus/rights entitlement. The transaction statement given by the DP, will also show the bonus/rights credit into the account. The quantity shown in the advice and transaction statement should match.
What will happen if my DP goes bankrupt or stops operation?
In a rare event of your DP going bankrupt or closing its operations, the interests of the investors will be fully protected. In such situation, the investor will be given an option of either transferring the securities to a new DP or rematerialize the securities