Pages

Tuesday, April 5, 2011

Placement of AdSense In The Online Advertising World

1 comments
 
Let’s  start our journey in the world of Google AdSense by first understanding how the online advertising came into  being and how Google AdSense is place with respect to the other online advertising concepts:

Soon after the advent of internet, it was realized  that the website real  estate (or the space on websites) had commercial value in the advertising world. The
simple reason behind  this was the soaring  popularity of internet and the increasing number of eyeballs received by various websites. Thus, internet advertising (or online advertising) came into being. Today, internet advertising is
treated as one of the most effective and most economical means of advertising.
In fact, a  lot of businesses, especially small businesses, use only this (affordable) medium for advertising  their products and  services. As technology progressed, so  did  the  online  advertising methodologies. Graphics  based  banner Ads  and text Ads got their due recognition  and were used quite extensively for online advertising.   Even now banner advertising is one of the most popular forms of online advertising.


However,  the real breakthrough in online advertising  came with Google AdSense advertising  program.  This  program  helped  in  connecting  advertisers to several website owners who were ready to offer advertising space on their websites. Through Google AdSense program, the advertisements were floated on the websites that had some relevance to the products or services  of fered by the advertiser. This type of advertising  is also called targeted advertising  since the Ads  are served only to the interested audience and  not just anyone or everyone. Soon, Google AdSense became  a  very effective form of targeted advertising. On Google AdSense  program, webmasters are paid on per-click and  per-thousand-Ads-displayed basis.
Readmore...

Anaylze for a single account

0 comments
 
The main feature of the protocol that is relevant for the security analysis is that for a p fraction of the incorrect passwords, as well as for the correct password, the attacker must solve an RTT before it receives a yes/no answer that distinguishes the correct password from the incorrect ones. Suppose that the set of all passwords includes N passwords. The attacker can identify, without answering any RTT, that the correct password is a member of a subset of size p(N ¡ 1) + 1 ¼ pN of the passwords – these are the passwords for which it does not receive an immediate “reject” answer but is rather asked to solve an RTT. Given that the implementation requirement is satisfied, there is only one way that the attacker can receive additional information about the passwords – by choosing a password value that it wants to verify and paying with an “RTT solution” in order to learn whether it is the correct value of the password. Let us assume for simplicity that all password values have the same probability of being the correct password. (This is the case if passwords are chosen at random by the server. Even if the passwords are chosen by the user we can limit P in our analysis to the set of passwords that occur with high probability, and assume that the password is chosen among them with uniform probability. The analysis for the case of a non-uniform probability distribution of passwords is similar.) We can model the attacker as playing the following game: it receives pN identical envelopes,
and it knows that a winning ticket is hidden in exactly one of them, chosen uniformly at random. In order to open an envelope it has to pay one coin (i.e. RTT solution). Its goal is to minimize its expected payment until it finds the winning ticket. The analysis of this game is simple. The expected number of coins that have to be paid (i.e. RTTs that have to be solved) is pN=2. If the attacker pays c coins (i.e. solves c RTTs), it finds the winning ticket (password) with probability c=(pN).
Readmore...

Software Requirement

0 comments
 
In Software engineering software requirement takes deep section. From the beginning Project manager must make a good requirement from user as we called user requirement. Otherwise there will be misunderstandings. If requirement is exactly what customer need then there will be perfect-1 software. For example this picture: 

Software requirement bad specification thus misunderstandings
Readmore...
Sunday, April 3, 2011

Steps for building security

0 comments
 
Security should be built into your system from the start, and should be a part of a system’s specification and functional requirements. This may be a struggle — customers or project managers may assume that security is inherent in a system. They may balk at having it written down and taken into account during development — after all, the more that is written down, the more the software may cost and the longer it may take. However, the assumption that security does not need to be specifi  ed is a huge risk. When security is not explicitly part of the software requirements, it may never get considered. Microsoft itself has made great advances in recent years in developing secure code by changing its approach and embracing the Security Development Lifecycle (SDL), which highlighted the need to integrate security into the software development lifecycle. The SDL consists of seven steps:
      1. Gather security requirements.
      2. Secure the design.
      3. Incorporate threat modeling.
      4.  Perform code reviews.
      5. Perform penetration tests.
      6. Secure the deployment of the application.
      7. Integrate feedback into the next iteration of the development cycle.
Readmore...

Troubleshooting

0 comments
 
The technical support line for your PC or software should only be a last resort. Most problems are common
and not too serious, and can be solved almost immediately, without spending hours and a for tune talking to someone who may or may not be able to help over the telephone. Once you're relatively familiar with Windows XP, and with the help of the following six pages of advice and tips, you should be able to get working on the solution to most common problems before you can even begin to worry. As well as 25 of our own fix-it solutions on what to do if your PC or Windows XP starts behaving badly, we've spoken to
exper t Richard Mannion, Par tner Suppor t Technical Lead at Microsoft, who's shared his top 10 support solutions that Microsoft is asked for by Windows XP users. That's advice straight from the horse's mouth, and it deals with troubles such as upgrading from previous versions of Windows, restoring your PC to a trouble-free state and transferring settings and files across from other PCs or operating systems. We've  exhaustively compiled solutions to most of the common conundrums that Windows XP users have been faced with, but if the problem you're having with your PC isn't covered by the tips in this section, your first port of call should be the enormously detailed Microsoft Knowledge Base, which is available for free online. You’ll find it at http://support.microsoft.com.
Readmore...

Camera

0 comments
 
Just when the rising cost of decent SLR cameras looked as though it was going to price out the amateur photographer from taking decent pictures easily and cheaply, we were met by the dawning of the age of digital cameras. The technology is still evolving, but it's already possible to take some wonder ful photos and see them instantly, as well as editing, printing and emailing them, without having to bother with any of the time or cost of developing them. However, it's also possible to take really bad photos if you rely too heavily on the
automatic or default settings of your camera, so it's well wor th having a fiddle with the settings until you learn what gives the best results in different locations.  To help you, we've compiled our series of digital camera tips that ran for three issues into one enormous archive. In fact, we reckon that within just half an hour, you'll be
taking immeasurably better shots and will be able to wield an impressive working knowledge of what makes a good photo. Just a few of the things we’ve covered include how to take better exterior or indoor shots, how to create cool effects, how to ensure the foreground is always in focus, what size of memory card to choose, how to take better head shots or pictures of water, a guide to night-time photos, a close-up look at macro shots and more. There are 60 tips in total, and while we can't quite promise your photos will be 60 times better as a result, it's a near thing for sure.
Readmore...

Tablet PC

0 comments
 
There's a new breed of PC around these days: the Tablet PC. Spor ting a specially modified version of Windows XP to suppor t its mobile and touch-screen functions, Tablets are per fect for anyone whose job requires a lot of travelling, but still needs them to have near-constant access to a PC. Heavy and bulky laptops can only really be used while you're sitting down, and still depend on standard keyboard and mouse inputs. Tablet PCs use a magnetic pen to literally write straight onto the screen, so you can even use it standing up on a train. Even if you don't need it for business, a Tablet can improve your home computing experience – you can use it to browse the internet or watch movies while in bed, or use its unique capabilities to read books or send handwritten emails.  Over the next six pages, we’ll tell you exactly how Microsoft Windows XP: Tablet PC Edition will change your life in the office, at home and on the road, with some
top tips on how it’s being used by different people and industries across the world and why it's more environmentally friendly. We’ll also give you some great advice on how its special functions can be seamlessly used in conjunction with your existing PC and a full range of peripherals. There are hundreds of potential uses for Tablet PCs and they’re revolutionising the world of mobile computing. The laptop is definitely advancing to its next evolution…
Readmore...

Clean-up

0 comments
 
A tidy house is a happy house, and the same applies to your PC. Getting rid of all the junk and unnecessary files that build up over time will give you a much more efficient machine. Everything wants a piece of Windows XP. Every application you install, web page you visit or email you download leaves pieces of itself all over your system, all of which takes up valuable hard drive space and can even slow down your PC's per formance. Regular house cleans are necessary to clean out the detritus and they have the added benefit of giving your system that straight-from-the-shop feel all over again. In issue 10’s lead feature we unear thed
the 50 best ways to use Windows XP to give itself a good old wash behind the ears and get running at full pelt again, without any of the accumulated rubbish from months of PC usage slowing it down. You can discover which files are safe to delete, how to completely remove an old application from your system, how to pick
and choose which programs and processes are loaded whenever you boot up your PC, which types of file take up the most space and impact most heavily on per formance and how to improve hard drive efficiency.
Nothing's too complicated either. Most of these tips can be carried out in just a few seconds and one decent clean up a month should keep your PC running smoothly, leaving you with tons of space to install new
programs and store your documents.
Readmore...

Improving password security

0 comments
 
When trying to improve the security of password based authentication, one wants to prevent attackers from
eavesdropping on passwords in transit, and from mounting offline dictionary attacks, namely attacks that enable
the attacker to check all possible passwords without requiring any feedback from the server. Eavesdropping attacks can be prevented by encrypting the communication between the user and the server, for example using SSL. Offline dictionary attacks are prevented by limiting access to the password file (and can be made even harder by adding well-known measures such as the use of salt).
Readmore...

Global password attacks

0 comments
 
Consider a system that has many user accounts, and which enables logins over a network that is accessible to
hackers. (Again, we do not assume that the attackers can sniff network traffic, we only assume that they can
connect to the network and try to login to the server, pretending to be a legitimate user.) Consider an attacker that is interested in breaking into any account in the system, rather than targeting a specific account. The  attacker can try many login attempts in parallel and circumvent the timing measure using the fact that user logins are typically handled by servers that can handle many login sessions in parallel. For example, the attacker can send a login attempt every 10 milliseconds, obtaining a throughput of 100 login attempts per second, regardless of how long the server delays the answers to the login attempts. The account locking feature can also be circumvented by such a “global” attacker, if it tries to login using different username/password pairs, and operates without trying the same user name twice. Since every user name is used only once, the “account with many failed login attempts” alarm is never triggered.
Readmore...

About passwords

0 comments
 
Passwords are the most common method of authenticating users, and will most likely continue to be widely used for the foreseeable future, due to their convenience and practicality for service providers and end-users. Although more secure authentication schemes have been suggested in the past, e.g., using smartcards or public key cryptography, none of them has been in widespread use in the consumer market. It is a well known problem in computer security that human chosen passwords are inherently insecure since a large fraction of the users chooses passwords that come from a small domain . A small password domain enables adversaries to attempt to login to accounts by trying all possible passwords, until they find the correct one. This attack is known as a “dictionary attack”. Successful dictionary attacks have, e.g., been recently reported against eBay user accounts, where attackers broke into accounts of sellers with good reputations in order to conduct fraudulent auctions.
Readmore...

Attack structure

0 comments
 
Web site: the client (or attacker), a firewall, the Web server, and perhaps a separate SQL server and fi  le server to store uploaded documents. In the early days of Web security, most hacks made use of vulnerabilities in the Web server software, the operating system hosting it, or the ancillary services running on it (such as FTP or email).Often, an exploit in the operating system or Web server would allow access to the underlying file system, or allow an attacker to run code on the hosting machine. During the late 1990s, Microsoft’s reputation for security was poor because exploits came out against Windows and IIS on a regular basis. Administrators would find themselves installing a patch against one problem, only to find another unpatched problem was now being exploited. The poor reputation for security undoubtedly resulted in lost sales, but it also resulted in a push at Microsoft to develop more secure systems by changing the company’s development process.
Readmore...

Web in my eyes

0 comments
 
Now i Study in national university of Mongolia. In few countries it is very popular. But while i'm studying here i think it is very easy. You just do your homework. When we become 3rd grade we need choose the deep occupation. We have two choices 1. Program developer 2. Web developer. Now in my eyes if you have a very good idea that no one even imagined you make that idea live with web. Why Web? Because the main thing is internet. For example facebook right it just depends on the idea. Share people your life. just idea right. So web in my eyes is the art of code including necessary informations.
Readmore...

Why Security is important

0 comments
 
Imagine working for the company providing Microsoft UK  ’s events registration system. It  ’s the beginning of summer in June 2007, and the news is fi  lled with fl  oods in the north of England where people have had to evacuate their homes while the rest of the country swelters in the well  -above  -average heat and sunshine. You fi  re up your Web browser just to check how your site is doing, only to discover. You  ’ve been hacked!  
Readmore...

Business goals

0 comments
 
Few months ago i read book called 'Micheal Dell'. It was all about Dell company success. What kind of things effected for the success he has made today. There says 'The friends in his life was very helpful and also wife'
Readmore...
Wednesday, March 30, 2011

Technology

0 comments
 
In my eyes technology is the most exciting thing ever. The IT students who study technology are very nice. It says when IT students learn something in their first year it will have become old when they are in 3 grade. It means that technology doesn't develop with seconds it develops with miliseconds.
Readmore...