1
October
2
Infinitytech Magazine Technically advance
Infinitytech.co.in Copyright@ 2009 infinitysoft.co.in All right reserve All text and context in this book solely owned by infinitysoft.co.in .Reproduction without permission in any form is illegal .
Get your own free personalized copy of this book from
www.infinitysoft.co.in
3
Editor’s pen Advantages of contract programming in software development industry As we all know that programming industry is getting tougher rapidly and as a result of that the necessity of freelance programmers and contract programmers is being sensed vastly. In a professional software development firm, the programmer’s expertise module wise. Some times it is viewed that, such programmers are unable to work at different module in same project.
Shashwat Shriparv
[email protected]
Hence the concept of freelance programming or contract programming arises in recent programming arena. These contract programmers are really very knowledgeable and have great expertise in web programming as well as the software development industry. These freelance programmers can judge the task easily through their years of expertise, and are in an faster able to solve the problems manner. These freelance programmers may follow single programming language like PHP, Dot Net, Java etc. but their skills reside in interface design, form processing, navigation maintaining, error handling, database handling, HTML development and also visual representation makes them famous in the software development industry .
4
Table of contents Editor speak Devil facts Programmers Area Career Guide Know your hard disk Learn Linux Software of the month Hardware/Software Problem Help Line
5
Devil Fact Cyber criminals Flock to the Internet and to a Computer in Your Home or Business…..
6
Devil Fact Organized
crime seems too be extremely active in the scam known as "phishing" in which they send emails under the guise of being a financial institution or other legitimate organization. In the email they ask unsuspecting victims to verify personal information such as account numbers and passwords. They will target home users who have become the weakest link and they target their victims much more closely than before, by tracking down full names and personal interests. They also skim social networking sites and personal websites where most people have left a digital footprint that can be mined . Criminals are increasingly trying to trick citizens into giving them their bank account details, according to a published survey which showed such "phishing" attempts almost doubled in the first six months. Over 157,000 unique phishing messages were sent out around the world in the first half of 2006, an increase of 81 percent compared with the six-month period to end-December 2005. Each message can go to thousands or hundreds of thousands of consumers, according to the bi-annual Internet Security Threat Report from security software vendor Symantec. Another trend in the first half of the year is that phishes have become more sophisticated, dodging spam filters and other defense mechanisms designed by provider sand software companies to keep out the criminals. How much financial damage phishes have caused is unclear and usually at an individual level, which is why phishing does not get the same media attention as "denial of service attacks" aimed to take out a specific website, or email worms which can shut down millions of computers in a digital equivalent of a carpet bombing. The internet is still under fire from such attacks, taking about 6,110 different denial of service hits every a day, but unlike a few years ago they cause less damage. A successful 'denial of server' attack or worm can have ramifications far beyond phishing. Worms have taken down electricity grids. That's why critical infrastructure is now much more resilient. Information technology managers are better prepared and networks are more robust," Whitehouse said.
7
Increased focus on security, and a willingness from software companies to own up to their mistakes has dramatically cut down the time that computers are at risk, Symantec found. For example, Internet Explorer, the world's most popular browser from Microsoft, has cut the number of days in which hackers can exploit a security flaw to nine days from 25 days six months earlier. Security holes in browsers from Opera and Mozilla Firefox are patched within two days and one day respectively. Because cyber predators and other cybercriminals are becoming smarter and more sophisticated in their operations, they are real threats to your personal security and privacy. Your money, your computer, your family, and your business are all at risk. These cybercriminals leave you with three choices: 1. Do nothing and hope their attacks, risks, and threats don’t occur on your computer. 2. Do research and get training to protect yourself, your family, and your business. 3. Get professional help to lockdown your system from all their attacks, risks, and threats.
Remember When you say "No!" to hackers and spyware, everyone wins! When you don't, we all lose!
Ratnakar Mishra
[email protected]
Space for ads
8
Programmers Area By the programmers for the programmers…
9
“Customizable Web Pages” An universal approach to almost every webpage I am mostly a man who wants to see the real implementation of things, I mean there practical and real world implementation, in Geek speaks ‘Encapsulation’ of the data. So most of my development are/ were based on the way a product or an application can ease the life of the basic users, because ultimately they are the people who pronounce the success and failure of a product in market, the more ‘User friendly’ your product is, the more laymen usage of your product will be. Just a few weeks back I started off with a concept to be implemented and deciphered soon, I will come to that later on. Now that concept started off with an idea, rather say an “Psychological approach of constructing a social platform’. I studied blogs,feeds,reviews and videos of people who actively are associated with this whole criticism of IT and Web 2.0 arena.(By the way some really good Tech Blogs and portals which can keep you Up to Date with the latest Geek stuffs and happenings in this Web World are: www.techcrunch.com www.webuser.co.uk www.networkcomputing.com www.webopedia.com www.internet.com Now the outcome of this ‘Research’ was that I get to know that now a days people really want to get there things ‘Customized’ be it the skin of their iPhone or having their Gmail theme and gadgets in place. But there is restriction, I mean this whole customization of your personal stuff is offered by very limited web players, the Giant Google of course with there Gmail personalisation wherein a user can add gadgets from Google Labs, customize the shortcut keys for saving drafts, adding a label or be it choosing the background for their Gmail or theme per seethe there is iGoogle,what more... up to a certain extent by Facebook just that it allows you to “Hide/Show” certain posts/updates. But still they have this “interface architecture” defined by them which bounds you to the things which they want you to get displayed on your profile, not something completely on your own. Let our imagination get wild, now think something like an ‘Compilation’ of web pages, rather Web applications....on a SINGLE webpage......now you might think I am suggesting you to create an web page of your own (By the way pick up the last addition of this magazine to learn how to “Make your own website in just days”),no my friend that’s where the fun comes, you don’t need to make a page of your own, just imagine if you
10
can personalize each and every webpage that you see, be it some news channel, some radio junction or any other social networking site (Even if they don’t provide you with the liberty of customising the way the profile looks),even wilder, imagine if you can merge the Updates of your friends from Facebook,the latest Email notifications from Gmail,recent RSS feeds from Sun’s website and the most watched video on you tube for the day. Isn't that fun, now you may ask me that what about the privacy issues, why will these sole owners of the contents allow me to do so, the answer is Alias (Will get to that later). It is maybe you can say, a wilder or a more creative form of iGoogle, you can play around with things you want, shift the contents from one side to another and the fact is it is not dependent upon the service provider, say the links at the top of iGoogle ‘Web Images News Groups Books Scholar Gmail’, but Google doesn’t allow you to change, modify or move them around, do they no since that’s in there hand, what services they want to provide to you. Alias what I was talking about previously is a mere web space where you can put all you want, the changes you want to see in your own “Customizable webpage”. It can be achieved by using a proxy server. Let me elaborate each aspect, tool and services and terms specifically which shall be used in for this purpose. What is a Proxy server: A proxy server has two purposes: • To keep machines behind it anonymous (mainly for security) • To speed up access to a resource (via caching). It is commonly used to cache web pages from a web server Firewall reasons : The proxy server is an additional layer of defence and can protect against some OS and Web Server specific attacks. However, it does not provide any protection to attacks against the web application or service itself, which is generally considered the larger threat. A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunnelling proxy. So we will modify this aspect in which the proxy server DOES manipulate or modify the content that the user wants. That why it is better to call it as a ‘Content Proxy’ with customizable user content 1.This content proxy shall receive a request from the client (A client is a user which sends a request for a webpage), then it forwards this request on the behalf of the user to a thing called Scaper which extracts the ‘DOM’ of a webpage by fetching a webpage from global server.
11
2.This fetched DOM is then sent to the content proxy to get manipulated,the content proxy has its rules and configuration for manipulating the webpage.It may provide a GUI to the user so as to what manipulation and addition user wants,this gives the scope of this application to diversify enormously, since there is no end to what sort of customizations users wants to see in their webpage. 3 After the manipulations the webpage is then sent by the content proxy to the user,as fully customized one,but specifically for a user in its own session. Now don’t get worried due to all those heavy and alien terms if you happen to be unaware of them,read below,I shall explain them: What is a Scraper: A web scaper is a application or a software which extracts useful information out of sites,at the back end and then it can form a totally new Scraper site on which there is content gathered and compiled onto it.Like those sites which are especially meant for advertising in which there is no original content,you may call a search engine as a Scraping site using bots for scraping the www for data.In our case we use the scraper to extract and fetch the webpage from the www. What is DOM: A DOM typically elaborated as Document Object Model is the description of how a webpage is stored displayed/rendered as an HTML page. Objects under the DOM (also sometimes called "Elements") may be specified and addressed according to the syntax and rules of the programming language used to manipulate them. That's one of our purpose in the entire flow, to manipulate the DOM,it can be achieved easily by Javascript.
The scraping engine,it shall take care of all the parsing and scraping to be
Request.htm
url
DOM
DOM processing, manipulations, rules,
Request*.htm (The ‘changed’ webpage as de-
Content Proxy (Since it filters the request)
Amar Deep Gupta
[email protected]
12
Algorithms As A Technology Think
computer were infinitely fast and computer memory was free. Would you have any reason to study algorithms? The answer is yes. Of course computers may be fast, they are not infinitely fast. And memory may be cheap, but it is not free. Computing time is therefore a bounded resources and so is space in memory. These resources should be used wisely, and algorithms that are efficient in terms of time or space will help do so. Total system performance depends on choosing efficient algorithms as much as on choosing fast hardware. Just as rapid advances are being made in other computer technologies, they are being made in algorithms as well. Analyzing an algorithm has come to mean predicting the resources. Occasionally, resources such as memory, communication bandwidth, or computer hardware are of primary concern, but most often it is computational time that we want to measure. The number of steps an algorithm requires to solve a specific problem is denoted as the computational time or running time of the algorithm. The notion of a step refers to an underlying machine model. The machine must be able to execute a single step in constant time. In general, the computational time depends on the size of the problem and on the respective input. Example: The computational time of a sorting algorithm grows if the length of the input sequence grows. If the input sequence is presorted, compared to an unsorted sequence possibly less steps are sufficient. In order to evaluate an algorithm independently of the input, the notion of time complexity is introduced. The time complexity T(n) is a function of the problem size n. The value of T(n) is the running time of the algorithm in the worst case, i.e. the maximum number of steps it requires with an arbitrary input. Sometimes the behavior on the average case is considered, i.e. the mean number of steps required with a large number of random inputs. Example: The sorting algorithm insertion sort has a worst case time complexity of T(n) = n(n-1)/2 comparisonexchange steps to sort a sequence of n data elements. Often, it is not necessary to know the exact value of T(n), but only an upper bound can be estimated.
Ashok kumar MCA B7(ER&DCI-IT)
13
14
Timeline : 53 Years of Hard Drives Over the past five decades, hard drives have come a long way. Travel through time with us as we chronicle 50 milestones in hard-drive development--from product firsts to new technologies, and everything in between.
1956 : IBM ships the first hard drive in the RAMAC 305 system. The drive holds 5MB of data at $10,000 a megabyte. The system is as big as two refrigerators and uses 50 24-inch platters.
1961: IBM invents heads for disk drives that "fly" on a cushion of air or on "air bearings." The IBM 1301 Disk Storage Unit, with its larger capacity, flexibility and speed, greatly expanded the operational capability of the IBM 7000 series of computers (7070, 7094, 7080 and 7090). 1973: IBM announces the 3340, the first modern "Winchester" hard drive, which has a sealed assembly, lubricated spindles, and low-mass heads. 1979: IBM's 3370 use seven 14-inch platters to store 571MB, the first drive to use thin-film heads.
1979: Seagate introduces the ST-506 drive and interface, which is then used in all early microcomputer implementation 1991 : IBM introduces the 0663 Corsair, the first disk drive with thin film magneto resistive (MR) Heads. It has eight 3.5-inch platters and stores 1GB. (The MR head was first introduced on an IBM tape drive in 1984.)
1998: IBM announces its Micro drive, the smallest hard drive to date. It fits 340MB on a single 1-inch platter.
15
2006 : Seagate releases the Barracuda 7200.10, at 750GB the
largest hard drive to date.
2009:
Hitachi Global Storage
Technologies announcement of a 1-terabyte hard disk drive. The drive ships in the first quarter of 2007. The drive, called the Desk star 7K1000.
2009 : Hitachi Global Storage Technologies Inc. launches the world's first 2TB(Tera Byte), 7200 RPM hard disk drive, the Deskstar 7K2000.The
By the end of the 20th century, internal drives became the system of choice for computers running Windows, while external hard drives remained popular for much longer on the Apple Macintosh and other professional workstations which offered external SCSI ports. Apple made such interfaces available by default from 1986 and 1998. The addition of USB and Firewire interfaces to standard personal computers led such drives to become commonplace in the PC market as well.
Rakesh Kumar (MCA B8 ER&DCI-IT)
Linux revolution Visit Infinitysoft.co.in
16
Changing Career - Things to Remember Doing the 'right job' has become very important these days. As a result, people are observed making mid-career moves every now and then. It is no longer considered taboo to shift jobs even if one may have spent a decent amount of time in a certain job. What is more important for an individual is to enjoy what he does rather than spending an inordinate amount of time in a job he does not like doing? As a result, changing career becomes imperative for a large number of people every year. In the last few decades, it is true that the choice of careers has expanded beyond imagination. One is no longer left with just a few conventional career choices of being a doctor or a teacher or a banker. Inup that offer the combination of good money as well as a satisfying work profile. Before one embarks on a decision to change careers, it is essential to consider some points. 1. Decide Which Career To Opt For: There are a whole lot of resources available on the internet or in books that talk about the various career choices in the job market. Before deciding on which career to opt for, one should conduct adequate research about the new job. This would be important to ensure that once one changes his/her career to a new field, it doesn't come across as an unpleasant experience. 2. Tailoring the Resume: Once one decides on a new career avenue, it is important to tailor the existing resume to match the skill sets that the new career demands. One would also need to customize the covering letter with regard to the specific company one applies.
17
3. Skill Enhancement: Although one's skills might be usable to a large extent in the new career, there are times when changing careers requires certain skills to be enhanced as well. One might, for example, shift from sales to marketing which would require familiarity with marketing concepts. In such cases, one should either sign up for a short refresher course or take a brief sabbatical to get a specialized degree from a college before getting employment. 4. Employing Patience: It is important to note that the path for changing careers is strewn with rocks and stones, so patience is a virtue that needs to be adopted. It is easy to get frustrated when one fails to get a positive response from potential employers. However, one should not lose patience but keep on applying till one gets the job of his/her choice. In addition to the things listed above that discuss what one "should" do; there are a number of things to beware of. A random list of 'don'ts' is: - Do not confuse changing jobs with changing careers. Changing careers is a major decision and should be taken only after sufficient research and thought has gone into it. - Changing careers only for money is a bad idea. In most cases, people fail to realize that there is a cost to pay for a higher compensation in the form of more travel or longer working hours. - Changing careers to a new one without making a realistic assessment of one's skills and strengths might be disastrous.
Shailendra Kumar
[email protected]
18
Desktop go to die…! In this fast-changing technological world, sometimes you are faced with some difficult choices. For instance, your current computer has matured to the ripe old age of six months and has been deemed obsolete. Now it's time to purchase a new computer and the question is, "Should I buy a laptop or a desktop?" so there laptop has some advantage over desktop . Mobility - Well, sure, it's the big one. If you need to work remotely, a laptop is the way to go. Remember that a 3G card from your cell phone provider can give you high-speed internet access in most urban areas. Upgrades - Speaking of upgrades, it's more difficult to upgrade a laptop. In some cases, it's impossible: Sure, you can pop in a new hard drive later, but adding a second hard drive means plugging in an external disk that will be cumbersome to tote around with you. Storage - One of the major places where laptops and desktops differ is in how much hard drive space they offer. Laptops use physically smaller drives, which can only offer so much storage space. Though larger drives are available, 100GB is still common on a laptop, while 500GB desktop drives are seen all the time (again, bigger drives can be had). This is a huge difference and it seems to be expanding, not contracting. If you have very large storage needs, desktop is your best bet. Price - Expect to pay $300 to $500 more for a comparably equipped laptop (though this varies widely). Peripherals - Remember that when you're in the office, you can always plug in an external mouse, keyboard, and monitor to your laptop.
19
I obviously can't make the buying decision for you, but I'll reiterate my computer plan in case you haven't seen it before. I use both: a moderately-priced laptop is with me on a daily basis, syncing up with an inexpensive desktop that works as a print and file server. The desktop works as a machine for my daily backups, has plenty of storage for stuff I don't need to take with me on the road (or to other rooms of the house), has two printers hooked up to it, accepts incoming faxes, and otherwise stands as a backup in case something fails on my laptop. My laptop, however, is where I do most of my work. Sure I could get by with just a notebook PC, but having both makes things so much easier.
Shivendra Kumar MCA B8 Er&Dci-IT
Infinitysoft.co.in Every thing is different
20
Nikesh Arora President, Global Sales Operations and Business Development in Google Nikesh Arora oversees all revenue and customer operations, as well as marketing and partnerships. Since joining Google in 2004, he has held several positions with the company. Most recently, he led Google's global direct sales operations. He also developed and managed the company's operations in the European, Middle Eastern and African markets and was responsible for creating and expanding strategic partnerships in those regions for the benefit of Google's growing number of users and advertisers. This will make him the top-ranking (4th Position) Indian in Google. With a background as an analyst, Nikesh's main areas of focus have been consulting, IT, marketing and finance. Prior to joining Google, he was chief marketing officer and a member of the management board at T-Mobile. While there he spearheaded all product development, terminals, brand and marketing activities of TMobile Europe. In 1999, he started working with Deutsche Telekom and founded T-Motion PLC, a mobile multimedia subsidiary of T-Mobile International. Prior to joining Deutsche Telekom, Nikesh held management positions at Putnam Investments and Fidelity Investments in Boston. Nikesh holds a master's degree from Boston College and an MBA from Northeastern University, both of which were awarded with distinction. He also holds the CFA designation. In 1989, Nikesh graduated from the Institute of Technology in Varanasi, India with a bachelor's degree in electrical engineering.
Rajeev Ranjan
[email protected]
21
I remember whenever I've had to Interview for a position in the past the bit I always looked least forward to was the stage where the Interviewer asks me questions. The majority of which were easy to answer as its very clear what information the Interviewer was looking for, but there were always the odd tough Interview Questions thrown in to throw me out. Those coupe of tough Interview questions were always difficult to answer as it was never clear what information the Interviewer was looking for. I've since been working in recruitment for some time and have been the Interviewer asking those tough Interview questions on many occasions. Its clear that many candidates still don't know what I'm looking to hear from them. So I thought I'd cover some of the tough Interview Questions and ways to answer them. Interview Questions: What are your weaknesses? State a weakness but turn it into a positive: "At times I've been considered too much of a perfectionist, I use to get irritated if I felt someone else’s work on the project was below company standard, I've since learnt that I can't affect other peoples work so channel my energies into making my work as high a standard as possible" Interview Questions: How have you managed to attend an Interview in works time? "I didn't want to deceive my current employers, so I asked them if I could take an unpaid day of leave to attend to a personal matter"
22
Interview Questions: How do you feel about carrying out repetitive or mundane work? "I appreciate every position has an element of repetitiveness but I take all aspects of my job seriously whether they are repetitive or not and always give 100%." Interview Questions: How do you handle Criticism? "At some point we all make mistakes, I'm always happy to take on constructive criticism as this will help me perform better." Interview Questions: How long would it be before you would expect to be promoted? "I couldn’t give a time scale, I would want to prove myself and demonstrate my value to the company, I appreciate that promotion is a reward, not a right" Interview Questions: What sort of people do you find it difficult to work with? "I am a very amiable person and very team orientated, If I were to find it difficult to work with someone, it would be someone whose standards doesn't reach that of the team. Answering Tough Interview Questions well, will set you apart from other candidates Padmakar Mishra applying for the same
[email protected] position
Wait for next issue
Infinitysoft.co.in
23
VIRUS Computer viruses are programs that have been purposely designed to interfere with the regular operation of a computer. Depending on its nature and capabilities, a virus may cause minor or major interruption to the smooth functioning of a computer. They may just slow down your computer, or repeatedly cause meaningless message to appear on your monitor, freeze your computer or bring up cascading windows on your screen, cause screen blinking, record data without a commend from you, corrupt or delete data, revive deleted data, pick up e-mail addresses from your address book and local files and start sending e-mails on its own, and even damage vital system files.
Computer viruses can be several types: Worms: worms are self-replicating computer programs, similar to computer viruses. Worms can spread rapidly from one computer to another when documents are exchanged. A copy of the worm passes through the network to another machine that has a specific security hole. it then copies itself to the new machine, and then start replicating from there.
Trojan horses: Trojan horses are programs that claim to perform a particular function but which in fact do something different. For example, they could infect your computer with a virus your files.
Macro
viruses: Macro viruses use commends called macros embedded in other software to infect and spread to other files viewed by that software. For example. Microsoft word and Excel have macros viruses can spread by exploiting these commands.
Boot Sector Viruses: Boot sector viruses are an older type of virus and are not so common today. They used to infect computers’ startup programs, so that the virus would become active as soon as the computer started up.
Backdoor Trojans: Backdoor Trojans are programs that allow other computer users to remotely control your computer via a local area network or the internet.
Ravindra Bohra
[email protected]
24
25
Speeding up your hard drive to get faster file transfer by using 32-bit transfers on your hard drive: 1. Just add the line to a boot up script. hdparm -c3 /dev/hdX 2. If you use SuSE or other distros based on SYS V. /sbin/init.d/boot.local should work for you. 3 This enables 32-bit transfer on your hard drive. On some systems it can improve transfer performance by 75%. To test your performance gain, type: hdparm -t -T /dev/hdX More DOS-like commands: Many people are moving to Linux these days because windows XP onwards OS needs very large scale amount of resources but they are typing DOS commands on Linux that look fine but cause errors. The command "cd.." in DOS is perfectly valid, but in Linux, the valid command is “cd ..” (any parameter for that command must be separated from the command by a space). The same goes for "cd/" and "cd~". A quick fix is here. 1 Use your favorite text editor in your home directory to edit the file ".bashrc". The period is there on purpose, this hides the file from normal ls display. 2
Add the lines: alias cd/="cd /" alias cd~="cd ~" alias cd..="cd .."
26
3 And I usually add these... alias md="mkdir" alias rd="rmdir -i" alias rm="rm -i" Here “alias” is a powerful tool, and can be used in the .bashrc script as well as from the command line. You can, if you want to spend the time, create your own group of shell commands to suit how you work. As long as you put them in your .bashrc file, they'll be there every time you log in. Note that if you frequently log in as root, you might want to copy /home/username/.bashrc to /root/.bashrc to keep yourself same. More swap with a swap file: You installed a new Linux system, but forgot to set enough swap space for your needs. Do you need to repartition and reinstall? No, the swap utilities on Linux allow you to make a real file and use it as swap space. The trick is to make a file and then tell the swapon program to use it. Here's how to create, for example, a 64 megs swap file on your root partition (of course make sure you have at least 64 megs free): dd if=/dev/zero of=/swapfile bs=1024 count=65536 This will make a 64 megs (about 67 millions bytes) file on your hard drive. You now need to initialize it: mkswap /swapfile 65536 sync And you can then add it to your swap pool: swapon /swapfile With that you have 64 megs of swap added. Don't forget to add the swapon command to your startup files so the command will be repeated at each reboot.
VINEET PRATAP
[email protected]
27
But how ...
Fix-it
28
The following error message can occur during the WinXP upgrade process: “An unexpected error (768) occurred at line 5118 in
\xpclient\base\boot\setup\setup .c Press any key to continue.” When you press any key as instructed, the following error message appears: “A problem has been detected and windows has been shutdown to prevent damage to your computer. PROCESS1_INITIALIZATION_FAILED”Huh? Again, the Microsoft Knowledge Base comes to the rescue. The root cause triggering this error message is a software program (namely Roxio’s GoBack) that is incompatible with WinXP. To resolve the problem, disable GoBack when WinXP restarts by pressing the space bar at the GoBack boot menu, pressing d to disable and pressing y to confirm. Once GoBack is disabled, cancel the WinXP setup process and uninstall GoError Message: “Fatal System Error: 0x000000a0 (0x00000002,0x00070124, 0x00000000,0x00000000)” Translation: If you happen to own a Microsoft Sidewinder Game Pad Pro (not the joystick model), you may experience a unique problem. If you just happen to be running WinXP (as opposed to any other operating system) and you decide to unplug the USB (Universal Serial Bus) cable while WinXP is starting up, you will see the fatal system error and a blue screen, preventing you from accessing your Desktop. Solution: Microsoft is working on a fix for this error, but at press time it is still unresolved. Fortunately, the workaround is rather simple. Just make sure you don’t unplug Saket kumar the Sidewinder cable when the system is [email protected] starting .
WHICH PATH IS SUITABLE FOR YOU VISIT Infinitysoft.co.in
29
First Look software Panda cloud antivirus Panda has released a free anti-Virus offering that resides mostly off the host system and in the cloud. Using 'Collective Intelligence', along with distributed computing and a global and community-based platform, Panda has said this new offering is entirely different from what it's created in the past. So, has it succeeded? Starting off Light Panda Cloud Antivirus protects you while you browse, play or work and you won’t even notice it. It is extremely light as all the work is done in the cloud. Secure Panda Cloud Antivirus provides you with the fastest protection against the newest viruses thanks to its cloud-scanning from PandaLabs’ servers Easy Panda Cloud Antivirus is truly install and forget. Don’t worry about updates, configuration or complicated decisions ever again.
Anurag Shankar [email protected]
30
Ask...
31
"If you have any questions, please feel free to ask" or " We would be happy to answer any questions you have" Send your query mails at: [email protected] [email protected] [email protected] [email protected] Join our communities and group at: http://groups.yahoo.com/group/ infinitytechmagazine [email protected] http://www.orkut.co.in/Community.aspx? cmm=49916804 Join these groups to receive the magazine directly to your mail box.
infinitysoft.co.in