Friday, June 27, 2008

Apple iPhone Specifications

Technical Specifications

Screen size
3.5 inches

Screen resolution
320 by 480 at 160 ppi

Input method
Multi-touch


Operating system
OS X


Storage
4GB or 8GB


GSM
Quad-band (MHz: 850, 900, 1800, 1900)


Wireless data
Wi-Fi (802.11b/g) + EDGE + Bluetooth 2.0


Camera
2.0 megapixels


Battery
Up to 5 hours Talk / Video / Browsing
Up to 16 hours Audio playback


Dimensions
4.5 x 2.4 x 0.46 inches / 115 x 61 x 11.6mm


Weight
4.8 ounces / 135 grams





Are you Apple iPhone user ????????? Do write your reviews

Computer Port

Most of the people assumes that port are present physical which needs to connected physically . Well ports are logical number assigned in a hardware , which is assigned a specific task. Ip Addresses are branched into ports, so that one ip address can be used by multiple programs to send and receive data at the same time. Ports make it possible for you to check your email and browse the web at the same time. This is possible because browsing the web uses port 80, and getting your email uses port number 110.

You can think of a port as a path for data. When a program is using a port to send or receive data, think of the port as blocked. Meaning that no other program can use a port when it is already in use by a program.In both TCP (Transmission Control Protocol) and UDP, each packet header will specify a source port and a destination port, each of which is a 16-bit unsigned integer (i. e. ranging from 0 to 65535), as well as specifying the source and destination network addresses (IP-numbers) among other things.

A process may "bind" to a particular port to send and receive data, meaning that it will listen for incoming packets whose destination port matches that port number, and/or send outgoing packets whose source port is set to that port number. Processes may also bind to multiple ports.

Do post your comments

Thursday, June 12, 2008

What is SSL ?

Secure Sockets Layer (SSL), are cryptographic protocols that provides secure communications on the Internet for web browsing, e-mail, Internet faxing, instant messaging(IM) and other data transfers.Specially those who run important part of their business on internet must be aware that the Internet is your gateway to millions of potential new customers. Moving your business online provides the convenience and accessibility your customers and partners demand, helping you to stand out from the competition.

As organizations provide more services and transactions online, security becomes a necessity. Customers need to be confident that sensitive information such as a credit / debit card number is going to a legitimate online business. Organizations need to keep customer information private and secure.

Do leave your comments ...........

Script Injection

As technology progresses hackers look for techniques to hack your servers . Most common technique is Script injection attack, which occur when a hacker takes a few lines of malicious programming code and enters it in to a form on your Website and then submits the form. If your Website is data driven then chances and you have forms on your Website. Hackers will often inject scripts in to your forms and try to do the following :


Mislead the system in to thinking they are a authorized or legitimate registered user
Try and modify your data on the data server
Try and generate reports from your database without your consent
Try and generate reports about your file structure or security



There are a million things a hacker can do if he can get access through script injection attacks. Most Web servers now combat this method of hacking automatically. Anything that looks like a script is rejected by the server and by default. Microsoft is dealing with it on the .NET framework.

So the most important thing to prevent script injection attacks:


1.Programming languages contain many characters and certain otherl keywords that are not conventional to the English language. For example, no one has a name that has the characters "*", or "%", or "@", or "!" or "<" or ">" in it. All of which are common place in all programming languages. These types of characters should be rejected by your forms whenever possible. This is the most simple way to tackle this problem.

2.Validate the data before submitting Eg: If you are asking the user for a name then make sure it does not contain numbers.

3.Limit the amount of characters a user can type in to each form.

4.Input encoding

5.Output encoding

Other type of injection is SQL injection , which will be discussed in the coming post

Feel free to add more information or comments using the comment feature present below