WE are an SEO pro working for last 5 years in this very field of eMarketing, SEO and SEM. This is an IT oriented Com. that is providing IT Solution like, Graphics Design,logo Design,converts image, vector image,Data Management services, Database - Mailing list development and web solution. We not only develop database but also provide solution to data entry, update & data manipulation by configuring database server. We develop E-commerce and websites for org. to give them an identity in the Internet world. A new generation of entrepreneurs armed with latest Information Technology, relevant experience. Backed by the finest of field experience and a will to provide the best of service, JMDII and technology is all set to enter the international arena for sharing the technology perfected over time, with developed and developing countries and to take the advantages of a developing country, multi - faced IT Org. with operation that have encompassed high and IT training, Professionalism and willingness to adopt new technology have borne fruit in terms of repeat orders from the esteemed clientele In short; presently around 20 computer professionals are working with JMD InfoTech India.
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
Mobile Application Designing and Developing
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
E-Commerce Website Development
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
Matrimonial Website Development
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
CMS / MLM Website Development
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
A new project has been launched that could replace the internet.
The ambitious project, Bitcloud, aims to provide services currently controlled byinternet service providers ( ISPs) and corporations. The project is based on the same methods used to mine bitcoins.
According to the BBC, individuals would perform tasks such as storing, routing and providing bandwidth, in return for payment.
The founders are searching for developers for the project, adding that they will start by decentralising the current internet, and then create a new internet to replace it.
According to the report, like bitcoin miners provide computing power and are rewarded for solving complex mathematical equations with the virtual currency, so individual net users would be rewarded based on how much bandwidth they contribute to the Bitcloud network.
Despite the solid performance in first quarter of the current fiscal year, Infosys has adopted a "cautiously optimistic" stance and left its full-year growth forecast unchanged. In the third quarter of the last fiscal also, the Bangalore-based company delivered a surprisingly robust performance, only to slump back in the quarter after that.
Acknowledging the volatility in performance, in an interview with N Shivapriya and Akanksha Prasad, chief executive officer SD Shibulal cautioned against drawing conclusions about a secular trend based on a single quarter's performance. While he described analysts as "experts", Shibulal refused to comment on why they are getting Infosys estimates wrong quarter after quarter. Edited excerpts:
In the last three quarters, including this one, analyst forecasts have failed to get Infosys' performance right. In your view, why is this happening?
Our performance has been volatile in the last few quarters. Even at the end of Q3, we said that a single quarter's performance cannot be taken as a secular trend. This quarter we have done reasonably well and we have not changed our guidance. We have a few challenges which we are trying to address - high quality growth is one of them, plus there are also challenges on the cost side because salary increases will have an impact. We have to mitigate these through various methods. I do not want to comment about why analysts are getting it wrong; they are the experts. I do acknowledge that our performance has been volatile. This is one of the reasons why we are optimistically cautious and have not changed our guidance. Our guidance is a statement of fact and not a statement of hope.
Does this quarter's performance feela vindication for you?
If we look at this quarter, we have achieved 2.7% growth. On constant currency, the growth is around 3.4%, which means we lost around $40 million due to currency volatility for the quarter.
You referred to certain steps the company undertook earlier that are showing results now. What are they?
Part of the overall Infosys 3.0 strategy was to grow the consulting and system integration business, which is now strong. The second aim was to achieve balanced growth. The Business IT Services division was growing below the company's average, so we brought in a lot of focus into that segment. Our target is to bring it on a par with the company's growth rate although as a percentage of the overall revenue it may not increase because other divisions are growing faster.
What is your strategy to win large deals?
We are working on multi-tower solutions and alliancesthe one we have with IPSoft. Since business IT services is price sensitive, we need to ensure that we bring tools, automation, and operational efficiency. It is tough to balance margins and growth, but we have done it for many years and we will do it again.
What are some of the changes you are making?
There have been changes and it is part of the overall strategy. Despite competition getting aggressive and poaching people, in the last two years, we increased our sales force800 to 1,200. It depends on the way you look at the glass - half full or half empty.
For Narayana Murthy, Infosys isa middle child. What is Infosys to you?
For me, Infosys is life. Most of my life has been spent here.
With your term ending in 2015, has the company set in motion the succession planning process?
We have a nominations committee, which has the responsibility for it. They are looking at it.
One of the best routers available today with just one flaw. The name ‘Play Max’ raised our expectation before we actually tested this IEEE 802.11n based router and when we did it we were not at all disappointed, in fact disappointment came from other features.
Once out of box what you have in hand is a compact clean looking router with hidden antennas and single indicator light and WPS button in front for hassle free secure connection setup. Number of connection ports at back is where Play Max has edge when compared with other similar products; there are 5 gigabit ports (1xWAN, 4xLAN) which would be ample for any wired connection plus being gigabit would mean faster data transfer speeds. 2 USB 2.0 ports are also present at the back for connecting external USB based storage devices with FAT 16/32 and NTFS file system, USB printers are also supported by Play Max giving you ability to convert your USB based printer to network one.
Setting up this router was the simplest of jobs and a mere 3 step process with initial configuration provided in small booklet attached to box. To use most of the features of this router including using USB storage/printer you have to install router management software that would sit in task bar and add to CPU usage, which as per us is a major con of Play Max. The main issue we faced with the router was that it does not support plugging in a 3G USB modem.
To test the performance of this router which supports true dual band in 2.5 Ghz and 5 GHz band respectively, we carried out two tests. First we used Qucheck 3.0 to test throughput, we connected one machine with wire to router and other wirelessly to N based laptop (both laptop and machine were running Windows 7) and then checked throughput over TCP protocol. Play Max was able to transfer 1000 Kb payload at 64 mbps which is one of the best scores we have seen. In second test we transferred 40 MB of mixed data from machine to laptop; Play Max was able to complete this transfer in 4 seconds which is again very high when compared to other products. We also tried using the router to stream HD videos from a windows media center to an Xbox 360 over WiFi, and it worked great.
Besides performance and features there are number of bundled utilities for different purposes like torrent gene for downloading files to external storage, bit boost for traffic prioritization, music mover for wireless music play from external storage. All in all, a high performing router with not so user friendly bundled software.
मैने पिछले पोस्ट मे बताया था की कैसे XAMPP ईंस्टाल करते हैं और अब MySQL, डाटाबेस बनाना और उसका प्रयोग कैसे करना है वो बताने जा रहा हूं।
पहले "XAMPP Control Panel" को ओपन करें और Apache के साईड मे Modules लिखा होगा उसके निचे Svc लिखा होगा उसपर क्लिक कर के ओके करना है। फिर अपाची को स्टार्ट करना है और MySQL को भी।
स्क्रिन साट:
अब अपना ब्राउजर खोलीये और उसमे localhost टाईप कर के एन्टर दबा दें।
अगर आपको xampp का पेज दिखता है तो ठिक है फिर आप
ये लिंक अपने ब्राउजर मे खोलीये
http://localhost/security/xamppsecurity.php
अब उसमे आपको MySQL SuperUser: का पास्वर्ड सेट करना है।
New password: root Repeat the new password: root
Note:- अगर आपको आपका पास्वर्ड सेट करना है। तो सेट कर सकते है
स्क्रिन साट:
अब अगर आप पास्वर्ड मे root डालते हैं तो आपका MySQL का यूजर नेम ये होगा Username: root Password: root अब आपको अपने Xampp डायरेक्ट्री को पास्वर्ड प्रोटेक्टेड बनाना है।
XAMPP DIRECTORY PROTECTION (.htaccess)
उसमे भी पास्वर्ड डाल दें।
अब आपका phpMyAdmin पास्वर्ड प्रोटेक्टेड हो गया है।
MySQL कैसे बनाएं?
यहां http://localhost/phpmyadmin/ पर जा कर अपना username और paasword डाल के लागईन कर लें।
username: root
और वही पास्वर्ड डालें जो आपने सेट किया था।
अब लागईन होने के बाद Create New Database मे कोई नाम डालीये जैसे मै jmdcomputer डाल रहा हूं।
और अब Create पर क्लिक कर दें।
स्क्रिन साट:
अब आपने MySQL का एकाऊंट भी बना लिया है और डाटाबेस भी। तो अब आप कोई भी स्क्रिप्ट ईन्स्टाल कर सकते हैं। आपका एकाऊंट एसा होगा।
अब आप स्क्रिप्ट कहां डाल सकते हैं, फाईल कहां डालेंगे?
अपने कंप्युटर मे जहां पर भी आपने अपना xampp डाला होगा उसमे जाएं। जैसे मैने यहां डाला है C:\server मे और आपको जाना है htdocs फ़ोल्डर मे। जैसे मै यहां जाउंगा। C:\server\xampp\htdocs और ईस फोल्डर मे जो भी हो उसे डिलीट कर दें और उसमे आप अपना फाईल, स्क्रिप्ट डाल कर चलाईये।
index.php या index.html डालेंगे तो ब्राउजर मे http://localhost खोलने पर सिधे आपका index पेज दिखेगा।
क्या आप कोई स्क्रिप्ट या साईट अपने कंप्युटर मे ही चलाना चाहते हैं? या कोई साईट बना रहे हैं और उसमे आपको बार बार वो साईट खोल कर देखना पड रहा है की पेज मे क्या बदला है? अगर हां तो अब टाईम बर्बाद करना बंद करें।
ये सिर्फ पेज बनाने, स्क्रिप्ट चलाने के ही काम नही आता आप ईसमे FTP,PHP,MySQL,Apache आदी सभी सिख सकते हैं वो भी अपने कंप्युटर मे।
Direct Tutorial
पहले आपको XAMPP यहां क्लिक कर के डाउन्लोड करना होगा।
32Bit के विन्डोज एक्स-पी प्रयोगकर्ता यहां क्लिक कर के XAMPP डाउन्लोड कर सकते है।
अन्य कंप्युटर Configuration के लिये यहां से डाउन्लोड कर सकते हैं।
डाउन्लोड होने के बाद आप ईस साफ्टवेयर को जहां भी डालना चाहते हैं वहां एक फोल्डर बना लें जैसे मै ईसे यहां डालने जा रहा हूं
C:\server
अब XAMPP को रन करें और ईन्स्टालेसन डायरेक्ट्री डालें और ईन्सटाल पर क्लिक कर दें।
स्क्रिन साट:
अब ईंतजार करें ईस्टालेसन पूरा होने का।
DOS खूलेगा और अब आपको प्रशन के जवाब देने हैं। बस आपको मै जसे बता रहा हूं वैसे ही कर दें।
अबर आपके कंप्युटर मे पहले से ही y लिखे आ रहा है तो आपको y दबाने कि जरूरत नही है बस सिधे एन्टर दबा दें।
1. अगर y पहले से ही लिखा है तो एन्टर दबा दें
2. फिर एन्टर दबा दें
3. फिर एन्टर दबाएंऔर फिर पूछेगा की Press (Return) to continue - एन्टर दबा दें। और एक बार फिर यही कहेगा की Press (Return) to continue - एन्टर दबा दें। अब आपको "1" दबा कर एन्टर दबाना है।
ईन्सटालेशन पूरा हो गया पर अब आपको ईसको चलाना बता दूं ताकी आप ईसमे MySQL आदी सभी आसानी से बना सकें और उसका पूरी तरह से प्रयोग कर सकें।
आपको एक कंट्रोल पैनल दिख रहा होगा - अगर नही खूला है तो डेस्कटाप पर एक्जेम्प का सार्टकट आईकन होगा उसपर क्लिक कर के एक्जेम्प को खोलें।
अब सबसे पहले आपको Apache के Modules के निचे Svc पर क्लिक कर के फिर उसके साईड मे "Start" पर भी क्लिक करना है और हां ईनपर क्लिक करने के बाद आपको कूछ देर तक ईंतजार करना पड सकता है।
अब MySQL के सामने Start पर क्लिक कर दें। जब दोनो Apache और MySQL पर "Running" लिखा होगा तो समझीये सब ठिक है।
Screenshot:
अब आपके कंप्युटर के सर्वर का दो एड्रेस है। आप ईसे अपने कंप्युटर पर खोल सकते हैं।
http://127.0.0.1
http://localhost
या SSL वाला एड्रेस(अगर SSL प्रयोग करना हो तब)
https://127.0.0.1
https://localhost
अगले पोस्ट मे बताऊंगा की कैसे MySQL, PHP, phpMyAdmin का प्रयोग करना है। अगला पोस्ट कुछ ही दिनो मे लिखने वाला हूं....
Create web site in no time using web templates for yourself or for your clients.
Take your web designing skills to next level by learning advance techniques.
Excellent asset for Web site owners, web designers and students. One can even start his/her own web designing company!
Acts like a library for your further web designing related needs as well as for other designing and printing needs as it contains thousands of clipart, fonts, and royalty free stock photographs etc. which are used for common home/business requirements.
The main difference between http:// and https:// is It's all about keeping you secure.
HTTP stands for Hypertext Transport Protocol, which is just a fancy way of saying it's a protocol (a language, in a manner of speaking) for information to be passed back and forth between web servers and clients.
The important thing is the letter S which makes the difference between HTTP and HTTPS.
The S (big surprise) stands for "Secure".
If you visit a website or webpage, and look at the address in the web browser, it will likely begin with the following: http://.
This means that the website is talking to your browser using the regular 'unsecure' language. In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the website. If you fill out a form on the website, someone might see the information you send to that site.
This is why you never ever enter your credit card number in an http website!
But if the web address begins with https://, that basically means your computer is talking to the website in a secure code that no one can eavesdrop on.
You understand why this is so important, right?
If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https://.
If it doesn't, there's no way you're going to enter sensitive information like a credit card number!
Welcome back! I'm glad to see you are not interested in "just" being secure, but you want to be very secure. There are pros and cons to this. You know the pros. Security! , but first of course is my:
DISCLAIMER: While every reasonable precaution has been taken in the preparation of this document, the author is not responsible for errors or omissions, or for damages resulting from the use of the information contained herein.
The information contained in this document is believed to be accurate. However, no guarantee is provided. Use this information at your own risk.
OK. Here are the cons:
No DHCP (Dynamic Host Configuration Protocal) Server. You will need to set your IP addresses manually on all the wireless and wired clients you want to hook to your network.
No viewable SSID. You will have to remember the name of your wireless network, then manually join wireless clients to your network.
No standard IP address for your router. You will have to remember what you set that to. (This is easy as you can always check the IP address of a computer connected to your network.)
MAC (Media Access Control) will be used. This is like a computers finger print. You will have to remember to allow this computer into your network. Unless they are explicitly allowed to join the network they will not be able to unless this step is complete, even though they know the SSID and Shared Key.
Note: on't make these changes with a wireless client. You will not be connected for very long if you do. Use the computer that is hard wired to the router. PRINT this document or save a copy of it local on your computer. There will be places where you will not be able to get to the Internet to read this until some changes are made. You need this document to make those changes. This documentation has been done with Windows XP. If you have Windows Vista the documentation will not match exactly. The settings are the same, but getting to the place the settings are made will be a little different. Read through this document before making any changes.
Please be aware that these are no rock solid guarantees to keep people out of your network. These following steps are simply deterrents, and can be gotten around if the intruder wants in bad enough. If you have gotten to this point I need to make something perfectly clear. The encryption you are using is your number one defense. Don't do these steps if you have set a key like "mynetwork", or used WEP for your security. Use the strongest security available (WPA-AES) and have at least a 20 character key with numbers and upper/lower case characters. There should be no words in there that can be found in the dictionary. That being said let's get on with the deterrents.
Go into the local LAN settings and change the IP address of your router. If the default IP address of your router is 192.168.1.1 change it to something like 192.168.112.86. You can use 10.x.x.x or 172.16.x.x. Replace the "x" with any number under 255. Remember the number you used as it will become the default gateway and the DNS server for your network and you will have to set it in the client since we are going to disable DHCP. Make the changes and apply them. This makes guessing your IP range harder for the intruder. Leaving it set to the default just makes it easier to get into your network.
The computer hard wired to your network should still be able to connect to the network since it is using DHCP to get an IP address. You will have to change the address in your browser to the new IP address to get back into the router settings. That will change with this next step. You will have to hard code the IP address in the client to be able to get back on the network.
Go into the web interface and to the LAN settings. Find the DHPC server and disable it, or uncheck enabled. Save the settings. At this point you will not be able to get into your network. You have just told your router not to give any computer an IP address. If they want in they need to know an IP address that fits the network. To get back into your network we need to do this.
Right click on My Network Places and choose Properties.
Right click on the Local Area Connection that matches your Ethernet adapter. If you have a wireless adapter you will see two. Choose the LAN connection, or the one that is hard wired to your network. Choose properties.
In the box labeled This connection uses the following items:
scroll down to Internet Protocol (TCP/IP).Click on it then click on the Properties button.
Click the Use the following IP address and Use the following DNS server addresses radio buttons. The boxes will become white and you can enter data into them. Enter the following data: This is what you would enter if your routers IP address is 192.168.89.1
IP address: 192.168.89.2
Subnet mask: 255.255.255.0
Default gateway: 192.168.89.1
Preferred DNS server: 192.168.89.1
Click the OK button and you should be able to get back in to your network from a hard wired computer. If you have a wireless adapter you will have to follow these steps in your wireless clients to allow them back into the network.
Note: ***You cannot have any clients with the same IP address***. Increment the last number by 1. Example, the wireless client would have an IP address of 192.168.89.3. The Subnet mask, default gateway, and DNS server address will not change. Keep then the same on all clients.
Your wireless client should not be able to access the network. Let's make a few more changes before we join it to the network.
Next we are going to enable MAC filtering. This will only affect wireless clients. What you are doing is telling the router that only the specified MAC addresses are allowed in the network, even if they know the encryption and key. To do this go to Wireless Settings and find a box labeled Enforce MAC Filtering, or something similar to it. Check it an apply it. When the router reboots you should see the MAC address of your wireless client in the list. You can find the MAC address of your client by opening a DOS box like we did earlier and enter "ipconfig /all" without the quotes. You will see the information about your wireless adapter.
If you want to allow other wireless clients into your network you will have to edit the list and allow them. MAC addresses can be spoofed, but this is another layer of security that you can implement.
So far we have changed the IP address of your router, disabled DHCP and set MAC filtering. I will take it for granted you had, or have changed, your encryption to be as strong as possible. The last thing we will do is not broadcast your SSID. What this means is where you look for Available Wireless Networks you will not see yours.
To disable the broadcasting of your SSID from the web interface for you router go to Wireless Security and uncheck Broadcast SSID and apply it. Your router will reboot.
Now, on to the wireless clients. You will have to assign your wireless client a static IP address. Do the exact same steps as above to do this, but choose the wireless adapter. Once you have a valid IP address you should be on the network. Your wireless client already knows of the SSID and the settings. If you View Available Wireless Networks your SSID will be there.
If you bring in another wireless client it will know nothing about your network. You will have to do the following to get it into your network.
Set your IP address, Default gateway, etc... on the new wireless clint
From the Available Wireless Networks dialog choose Set up a wireless network for home or small office.
Select Create a new connection.
The Welcome to the Wireless Network Connection Setup Wizard will start. Click Next.
Enter your Network name (SSID): "your network name"
Select Manually assign a network key
Check Use WPA encryption instead of WEP (WPA is stonger than WEP but not all devices are compatible with WPA).Click Next
Enter your key twice. Click Next
Choose Setup a network manually
Click Finish
You should now be connected to the wireless network.
This concludes PART3 if you would like to get things even stronger please review the final chapter PART4
A direct link to this article, complete with images can be found at TechAlternatives
The advancements in technology have made possible the proliferation of crimes that used to be depicted in the movies only and which were very far from reality. However, there are existing crimes that are now spreading like wildfire because of the lack of security in using the Internet, One such crime closely related to Internet use but which can also be committed in other ways is identity theft. Identity theft basically operates the same that the ordinary crime of theft does. The difference is that in identity theft, what is stolen is the identity of a person.
Identity is considered a crime because it is the act of assuming or using the identity of another person without his consent. Identity theft usually causes injury to the person whose identity has been stolen. It is usually committed for financial gain, blackmail or even espionage.
This crime has grown so widespread that the United States Congress has enacted the Identity Theft Penalty Enhancement Act to punish those found suing another person' identity without his consent. The criminal gets an additional two years in jail if he uses the stolen identity to perpetuate another crime. Another five years is added to the jail term if the crime is used to promote terrorism.
So how is identity theft done? Identity thieves are one of the most creative people in this planet and they will do anything to get information about the people whose identity they are planning to steal. This includes rummaging through the target victim's garbage to sift important information about the person's identity which they can use in perpetuating the crime.
Some identity thieves use computers and sophisticated programs like spyware to get financial information about their target victims. Hacking another person's computer is a method often used by identity thieves to commit the crime.
The proliferation of Identity theft can be blamed on the ease with which financial transactions can now be made. Credit card companies readily approve applications without even physically dealing with the applicants. These companies approve the applications based on documents that the applicants send by snail mail or online and the companies send the approved cards by mail. Revealing financial information through the telephone can also be a magnet for identity thieves. These criminals have access to high technology gadgets and they can eavesdrop on telephone conversations. Sending information through the Bluetooth technology can also be easily intercepted by identity thieves.
Everyone is in danger and any person's identity can be stolen. Thus, a person should be careful in revealing financial information especially if such information is being asked for no reason at all. To avoid being victimized by identity thieves, a person should consider the following safety measures:
1. Always be careful in sending and receiving financial information through snail mail because mails can easily be intercepted by thieves.
2. Never throw important financial and other information in the garbage without shredding them first. Identity thieves can masquerade as garbage collectors and sift through a mountain of financial information about the prospective victim.
3. Never reveal financial information over the phone. Anybody can call someone on the telephone and pretend to be a bank officer. When such information has to be given to any office, it is better to visit the office and personally hand in the information to the right person.
4. Always inspect bank transactions and look for any irregular payments or withdrawals.
5. In the same manner, always check credit card bills and cross check with purchases and other credits to make sure that the charges are correct and not made by another person.
When it comes to identity theft, no one is really safe and the best thing to do is to be careful and wary of revealing any financial information. It is best to incur a little delay by verifying the identities of people asking for financial information rather than to suffer financial distress later on.
Remember that identity thieves are very creative and they can get any information they want. They can even be getting a person's financial information this very moment while the target is using his computer. With all the convenience of technology, any person can be a victim of identity theft.
Lee Dobbins writes for http://identitytheft.pagechic.com where you can learn more about how to protect yourself from identity theft.