Archive

Microsoft .net Framework

Microsoft .net framework is a framework application which provides the bridging for programming languages and windows operating system. It is the common layer which includes libraries, definitions, code compatibility, language compatibility and much more. It is installable on every Microsoft Windows Operation System.

Microsoft .net framework allows the applications to play with each other and with operating system with the help of interoperability function of .net framework.

Microsoft .net framework also allows integrating different technologies for the best solution. It also provides the framework for development with different technologies. Following are the versions...

Read more

From Paper to 3TB HDD

For several years, paper was utilized as the most important storage medium in the history of computer systems. Picture a life of punching holes into paper tapes or punch cards to record a program and data in your computer.

Imagine yourself typing a character as the punch machine makes holes into the punch card and by chance you made an error, well you must re-punch lots of the cards undeniably. A very inconvenient and tedious task as visualized, but this is the life they had a number of decades ago.

Later advancement...

Read more

Lync server: HISTORY

Microsoft Office Live Communications Server was initially launched on December 29, 2003 to replace the Exchange Instant Messenger service included in Exchange 2000, which was withdrawn from all the features of Exchange 2003.

Dealers, including Exchange 2000 Software Assurance are entitled to be given upgraded Live Communications Server, with Exchange 2003. Conversely, Live Communications Server Consumer Access Licenses must be procured as standard for fresh users. Agency Communications Server R2 was declared at VoiceCon in Amsterdam in October 2008 presently 364 days behind the discharge of Office Communications Server 2007. This edition has enormous advantages greater...

Read more

Introduction to Computer & IT Insecurity

Computer security and IT security are terms associated with the protection of computer software, hardware, and the network systems from the hazards of external attacks from virus, cracking, hacking, etc. In fact, the security measures and policies aim at safeguarding or protecting the information systems and information from anyone other than the administrator including consultants, customers, employees, suppliers, and the malevolent hackers.

present day efforts for maintaining IT security

But unfortunately, the security precautions that majority of the present-day computer-systems have are very limited. Most of the present day efforts for...

Read more

Ethical Hacking and its Difference to Malicious Hacking

Ethical Hacking is also often termed as Intrusion, Penetration Testing, Tiger Teaming, Sneaking, or Red Teaming. The methodologies used for ethical hacking are similar to those used for malicious hacking. The only difference between the two is the former uses the methods to report problem, the latter uses them to reap profits illegitimately.

The security experts or the white-hat hackers usually employ methods and several tactics of social engineering to carry out various tests for penetration testing and vulnerability assessment. The...

Read more

Computer Network’s Security Systems Penetration

Penetration refers to a successful, but an unauthorized breach of security perimeter of a computer system. Penetration Testing is done as a part of ethical infiltration, wherein the computer network’s security systems are evaluated thoroughly by simulating attacks from malevolent sources, also called the black hat attackers.

The penetration testing process is carried out from point of view of an attacker and thus, involves active exploitations and breaching of system’s vulnerabilities. The potential vulnerabilities, which might arise due to improper or poor system configurations, operational weakness in the...

Read more

Vulnerability with regards to computer security

Vulnerability, with regards to computer security, refers to weakness in the computer system or network that enables an attacker to make unauthorized access into the system and affect its information assurance. Any venerability is nothing, but an intersection of 3 basic elements – (i) Flaw or system susceptibility, (ii) access to the flaw by the attacker, and (iii) the capability of the attacker to access and exploit the identified flaw. An attacker usually employs a technique or a tool that can easily connect to the weakness of the system. Also defines...

Read more

CSharp Language: Its History and Uses

The symbol of programming language that will be discussed later was rooted on the note of music which is the see sharp note. The sharp signifies a pitch that is higher in half-step.  Due also to the restrictions of the computer display and because the symbol of sharp cannot be found on the standard computer keyboard that is why the number (#) sign was used to symbolize the character of sharp.

ACCOUNT

In writing the frameworks of .NET, a system named SMC (Simple Managed C) was utilized to write...

Read more

Performance of browsers: A short Study

Firefox 3.5: The most unique feature of Firefox is its simplicity.

Users will be excited with so many features like, customized tools and features, all types of add-ons, Smart Location Bar, an Instant Web Site ID, Improved Tabbed Browsing, an integrated search engine, Location-Awareness feature, Spell Checking options, Web Feeds (RSS) and Pop–up Blocker while browsing with Firefox.

A user can customize his/her own style of the browser by changing themes, colors and skins as well as add words to dictionary for spell checking or finding word meaning.

Entertainment options such as games, audio...

Read more

All about Exchange Server 2003 Tools – Top 20 Tools

You might have heard of the exchange server 2003 tools, which are in abundance for several different purposes, but perhaps, you’re not yet aware of their unique features, enhancements, how they work and their compatibility with other exchange servers like 2007 and 2010.

Well, this information will be pretty much help for you to locate many of the useful tools for your exchange server whether it is 2003, 2007 or 2010. Following are the 20 most popular Windows Exchange Server 2003 Tools,...

Read more