Pages

Monday, May 11, 2015

I am or We are back.

0 comments
 
Me is a student at RMIT studying Computer Science. I want to share and mainly learn from anyone who is reading one of posts(in the future I will try to add many as possible). You can criticize or argue with what I wrote. I will try to take those criticism as motivation and learning process. Will usually share everything I want to or you guys can give some request that is related to my field. so I can dig into that topic. Please request something that is related to my field. I think that is for all now. See you guys soon BAAAAM.
Readmore...
Tuesday, April 5, 2011

Placement of AdSense In The Online Advertising World

1 comments
 
Let’s  start our journey in the world of Google AdSense by first understanding how the online advertising came into  being and how Google AdSense is place with respect to the other online advertising concepts:

Soon after the advent of internet, it was realized  that the website real  estate (or the space on websites) had commercial value in the advertising world. The
simple reason behind  this was the soaring  popularity of internet and the increasing number of eyeballs received by various websites. Thus, internet advertising (or online advertising) came into being. Today, internet advertising is
treated as one of the most effective and most economical means of advertising.
In fact, a  lot of businesses, especially small businesses, use only this (affordable) medium for advertising  their products and  services. As technology progressed, so  did  the  online  advertising methodologies. Graphics  based  banner Ads  and text Ads got their due recognition  and were used quite extensively for online advertising.   Even now banner advertising is one of the most popular forms of online advertising.


However,  the real breakthrough in online advertising  came with Google AdSense advertising  program.  This  program  helped  in  connecting  advertisers to several website owners who were ready to offer advertising space on their websites. Through Google AdSense program, the advertisements were floated on the websites that had some relevance to the products or services  of fered by the advertiser. This type of advertising  is also called targeted advertising  since the Ads  are served only to the interested audience and  not just anyone or everyone. Soon, Google AdSense became  a  very effective form of targeted advertising. On Google AdSense  program, webmasters are paid on per-click and  per-thousand-Ads-displayed basis.
Readmore...

Anaylze for a single account

0 comments
 
The main feature of the protocol that is relevant for the security analysis is that for a p fraction of the incorrect passwords, as well as for the correct password, the attacker must solve an RTT before it receives a yes/no answer that distinguishes the correct password from the incorrect ones. Suppose that the set of all passwords includes N passwords. The attacker can identify, without answering any RTT, that the correct password is a member of a subset of size p(N ¡ 1) + 1 ¼ pN of the passwords – these are the passwords for which it does not receive an immediate “reject” answer but is rather asked to solve an RTT. Given that the implementation requirement is satisfied, there is only one way that the attacker can receive additional information about the passwords – by choosing a password value that it wants to verify and paying with an “RTT solution” in order to learn whether it is the correct value of the password. Let us assume for simplicity that all password values have the same probability of being the correct password. (This is the case if passwords are chosen at random by the server. Even if the passwords are chosen by the user we can limit P in our analysis to the set of passwords that occur with high probability, and assume that the password is chosen among them with uniform probability. The analysis for the case of a non-uniform probability distribution of passwords is similar.) We can model the attacker as playing the following game: it receives pN identical envelopes,
and it knows that a winning ticket is hidden in exactly one of them, chosen uniformly at random. In order to open an envelope it has to pay one coin (i.e. RTT solution). Its goal is to minimize its expected payment until it finds the winning ticket. The analysis of this game is simple. The expected number of coins that have to be paid (i.e. RTTs that have to be solved) is pN=2. If the attacker pays c coins (i.e. solves c RTTs), it finds the winning ticket (password) with probability c=(pN).
Readmore...

Software Requirement

0 comments
 
In Software engineering software requirement takes deep section. From the beginning Project manager must make a good requirement from user as we called user requirement. Otherwise there will be misunderstandings. If requirement is exactly what customer need then there will be perfect-1 software. For example this picture: 

Software requirement bad specification thus misunderstandings
Readmore...
Sunday, April 3, 2011

Steps for building security

0 comments
 
Security should be built into your system from the start, and should be a part of a system’s specification and functional requirements. This may be a struggle — customers or project managers may assume that security is inherent in a system. They may balk at having it written down and taken into account during development — after all, the more that is written down, the more the software may cost and the longer it may take. However, the assumption that security does not need to be specifi  ed is a huge risk. When security is not explicitly part of the software requirements, it may never get considered. Microsoft itself has made great advances in recent years in developing secure code by changing its approach and embracing the Security Development Lifecycle (SDL), which highlighted the need to integrate security into the software development lifecycle. The SDL consists of seven steps:
      1. Gather security requirements.
      2. Secure the design.
      3. Incorporate threat modeling.
      4.  Perform code reviews.
      5. Perform penetration tests.
      6. Secure the deployment of the application.
      7. Integrate feedback into the next iteration of the development cycle.
Readmore...

Troubleshooting

0 comments
 
The technical support line for your PC or software should only be a last resort. Most problems are common
and not too serious, and can be solved almost immediately, without spending hours and a for tune talking to someone who may or may not be able to help over the telephone. Once you're relatively familiar with Windows XP, and with the help of the following six pages of advice and tips, you should be able to get working on the solution to most common problems before you can even begin to worry. As well as 25 of our own fix-it solutions on what to do if your PC or Windows XP starts behaving badly, we've spoken to
exper t Richard Mannion, Par tner Suppor t Technical Lead at Microsoft, who's shared his top 10 support solutions that Microsoft is asked for by Windows XP users. That's advice straight from the horse's mouth, and it deals with troubles such as upgrading from previous versions of Windows, restoring your PC to a trouble-free state and transferring settings and files across from other PCs or operating systems. We've  exhaustively compiled solutions to most of the common conundrums that Windows XP users have been faced with, but if the problem you're having with your PC isn't covered by the tips in this section, your first port of call should be the enormously detailed Microsoft Knowledge Base, which is available for free online. You’ll find it at http://support.microsoft.com.
Readmore...

Camera

0 comments
 
Just when the rising cost of decent SLR cameras looked as though it was going to price out the amateur photographer from taking decent pictures easily and cheaply, we were met by the dawning of the age of digital cameras. The technology is still evolving, but it's already possible to take some wonder ful photos and see them instantly, as well as editing, printing and emailing them, without having to bother with any of the time or cost of developing them. However, it's also possible to take really bad photos if you rely too heavily on the
automatic or default settings of your camera, so it's well wor th having a fiddle with the settings until you learn what gives the best results in different locations.  To help you, we've compiled our series of digital camera tips that ran for three issues into one enormous archive. In fact, we reckon that within just half an hour, you'll be
taking immeasurably better shots and will be able to wield an impressive working knowledge of what makes a good photo. Just a few of the things we’ve covered include how to take better exterior or indoor shots, how to create cool effects, how to ensure the foreground is always in focus, what size of memory card to choose, how to take better head shots or pictures of water, a guide to night-time photos, a close-up look at macro shots and more. There are 60 tips in total, and while we can't quite promise your photos will be 60 times better as a result, it's a near thing for sure.
Readmore...