Saturday, August 6, 2011

Search



Monday, April 19, 2010

host

host computer (host)
1. A computer that is attached to a network and provides services other than simply acting as a store-and-forward processor or communication switch. Host computers range in size from small microcomputers to large time-sharing or batch mainframes. Many networks have a hierarchical structure, with a communication subnetwork providing packet-switching services for host computers to support time-sharing, remote job entry, etc. A host computer at one level of a hierarchy may function as a packet or message switch at another.
networking
2. A computer used to develop software for execution on another computer, known as the target computer.

3. A computer used to emulate another computer, known as the target computer. See also emulation.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

microsoft

Microsoft Corporation (NASDAQ: MSFT, HKEX: 4338) is a multinational computer technology corporation that develops, manufactures, licenses, and supports a wide range of software products for computing devices. Headquartered in Redmond, Washington, USA, its most profitable products are the Microsoft Windows operating system and the Microsoft Office suite of productivity software. As of the third quarter of 2009, Microsoft was ranked as the third largest company in the world, following PetroChina and ExxonMobil.
SIXTH SCENCE TECHNOLOGY
The company was founded on April 4, 1975, to develop and sell BASIC interpreters for the Altair 8800. Microsoft rose to dominate the home computer operating system market with MS-DOS in the mid-1980s, followed by the Windows line of operating systems. Many of its products have achieved near-ubiquity in the desktop computer market. One commentator notes that Microsoft's original mission was "a computer on every desk and in every home, running Microsoft software." Microsoft possesses footholds in other markets, with assets such as the MSNBC cable television network and the MSN Internet portal. The company also markets both computer hardware products such as the Microsoft mouse and the Microsoft Natural keyboard, as well as home entertainment products such as the Xbox, Xbox 360, Zune and MSN TV. The company's initial public stock offering (IPO) was in 1986; the ensuing rise of the company's stock price has made four billionaires and an estimated 12,000 millionaires from Microsoft employees.

Throughout its history the company has been the target of criticism, including monopolistic business practices and anti-competitive strategies including refusal to deal and tying. The U.S. Department of Justice and the European Commission, among others, have ruled against Microsoft for antitrust violations. (See also United States v. Microsoft, European Union Microsoft competition case.)
computer science tutorial
seminar topic
newidea
social networking
computer science engineering
power of computer
magic of computer
computerinformation

animation

Animation is the rapid display of a sequence of images of 2-D or 3-D artwork or model positions in order to create an illusion of movement. It is an optical illusion of motion due to the phenomenon of persistence of vision, and can be created and demonstrated in a number of ways. The most common method of presenting animation is as a motion picture or video program, although several other forms of presenting animation also exist.
2D animation figures are created and/or edited on the computer using 2D bitmap graphics or created and edited using 2D vector graphics. This includes automated computerized versions of traditional animation techniques such as of tweening, morphing, onion skinning and interpolated rotoscoping.
3D animation are digitally modeled and manipulated by an animator. In order to manipulate a mesh, it is given a digital skeletal structure that can be used to control the mesh. This process is called rigging. Various other techniques can be applied, such as mathematical functions (ex. gravity, particle simulations), simulated fur or hair, effects such as fire and water and the use of Motion capture to name but a few, these techniques fall under the category of 3d dynamics. Many 3D animations are very believable and are commonly used as Visual effects for recent movies.
creat animation
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

open source program

The Open Source Definition (Annotated)

Version 1.9

The indented, italicized sections below appear as annotations to the Open Source Definition (OSD) and are not a part of the OSD. A plain version of the OSD without annotations can be found here.
Introduction

Open source doesn't just mean access to the source code. The distribution terms of open-source software must comply with the following criteria:
1. Free Redistribution

The license shall not restrict any party from selling or giving away the software as a component of an aggregate software distribution containing programs from several different sources. The license shall not require a royalty or other fee for such sale.

Rationale: By constraining the license to require free redistribution, we eliminate the temptation to throw away many long-term gains in order to make a few short-term sales dollars. If we didn't do this, there would be lots of pressure for cooperators to defect.
2. Source Code

The program must include source code, and must allow distribution in source code as well as compiled form. Where some form of a product is not distributed with source code, there must be a well-publicized means of obtaining the source code for no more than a reasonable reproduction cost preferably, downloading via the Internet without charge. The source code must be the preferred form in which a programmer would modify the program. Deliberately obfuscated source code is not allowed. Intermediate forms such as the output of a preprocessor or translator are not allowed.

Rationale: We require access to un-obfuscated source code because you can't evolve programs without modifying them. Since our purpose is to make evolution easy, we require that modification be made easy.
3. Derived Works

The license must allow modifications and derived works, and must allow them to be distributed under the same terms as the license of the original software.

Rationale: The mere ability to read source isn't enough to support independent peer review and rapid evolutionary selection. For rapid evolution to happen, people need to be able to experiment with and redistribute modifications.
4. Integrity of The Author's Source Code

The license may restrict source-code from being distributed in modified form only if the license allows the distribution of "patch files" with the source code for the purpose of modifying the program at build time. The license must explicitly permit distribution of software built from modified source code. The license may require derived works to carry a different name or version number from the original software.

Rationale: Encouraging lots of improvement is a good thing, but users have a right to know who is responsible for the software they are using. Authors and maintainers have reciprocal right to know what they're being asked to support and protect their reputations.

Accordingly, an open-source license must guarantee that source be readily available, but may require that it be distributed as pristine base sources plus patches. In this way, "unofficial" changes can be made available but readily distinguished from the base source.
5. No Discrimination Against Persons or Groups

The license must not discriminate against any person or group of persons.

Rationale: In order to get the maximum benefit from the process, the maximum diversity of persons and groups should be equally eligible to contribute to open sources. Therefore we forbid any open-source license from locking anybody out of the process.

Some countries, including the United States, have export restrictions for certain types of software. An OSD-conformant license may warn licensees of applicable restrictions and remind them that they are obliged to obey the law; however, it may not incorporate such restrictions itself.
6. No Discrimination Against Fields of Endeavor

The license must not restrict anyone from making use of the program in a specific field of endeavor. For example, it may not restrict the program from being used in a business, or from being used for genetic research.

Rationale: The major intention of this clause is to prohibit license traps that prevent open source from being used commercially. We want commercial users to join our community, not feel excluded from it.
7. Distribution of License

The rights attached to the program must apply to all to whom the program is redistributed without the need for execution of an additional license by those parties.

Rationale: This clause is intended to forbid closing up software by indirect means such as requiring a non-disclosure agreement.
8. License Must Not Be Specific to a Product

The rights attached to the program must not depend on the program's being part of a particular software distribution. If the program is extracted from that distribution and used or distributed within the terms of the program's license, all parties to whom the program is redistributed should have the same rights as those that are granted in conjunction with the original software distribution.

Rationale: This clause forecloses yet another class of license traps.
9. License Must Not Restrict Other Software

The license must not place restrictions on other software that is distributed along with the licensed software. For example, the license must not insist that all other programs distributed on the same medium must be open-source software.

Rationale: Distributors of open-source software have the right to make their own choices about their own software.

Yes, the GPL is conformant with this requirement. Software linked with GPLed libraries only inherits the GPL if it forms a single work, not any software with which they are merely distributed.
10. License Must Be Technology-Neutral

No provision of the license may be predicated on any individual technology or style of interface.

Rationale: This provision is aimed specifically at licenses which require an explicit gesture of assent in order to establish a contract between licensor and licensee. Provisions mandating so-called "click-wrap" may conflict with important methods of software distribution such as FTP download, CD-ROM anthologies, and web mirroring; such provisions may also hinder code re-use. Conformant licenses must allow for the possibility that (a) redistribution of the software will take place over non-Web channels that do not support click-wrapping of the download, and that (b) the covered code (or re-used portions of covered code) may run in a non-GUI environment that cannot support popup dialogues.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

backtrck 4

BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.
backtrack 4 tutorial
Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community. Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available.

Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.
<a href=". [common among security specialists] A cracker, someone bent on breaking into the system you are protecting. Oppose the less comon white hat for an ally or friendly security specialist; the term gray hat is in occasional use for people with cracker skills operating within the law, e.g. in doing security evaluations. All three terms derive from the dress code of formulaic Westerns, in which bad guys wore black hats and good guys white ones. firewall can prevent cracking? 2. [spamfighters] ‘Black hat’, ‘white hat’, and ‘gray hat’ are also used to denote the spam-friendliness of ISPs: a black hat ISP harbors spammers and doesn't terminate them; a white hat ISP terminates upon the first LART; and gray hat ISPs terminate only reluctantly and/or slowly. This has led to the concept of a hat check: someone considering a potential business relationship with an ISP or other provider will post a query to a NANA group, asking about the provider's hat color. The term albedo has also been used to describe a provider's spam-friendliness. cracking e mail more on computer science">more on computer science
linux interview question
computer science engineering
power of computer
magic of computer
computerinformation

cracking

. [common among security specialists] A cracker, someone bent on breaking into the system you are protecting. Oppose the less comon white hat for an ally or friendly security specialist; the term gray hat is in occasional use for people with cracker skills operating within the law, e.g. in doing security evaluations. All three terms derive from the dress code of formulaic Westerns, in which bad guys wore black hats and good guys white ones.
firewall can prevent cracking?
2. [spamfighters] ‘Black hat’, ‘white hat’, and ‘gray hat’ are also used to denote the spam-friendliness of ISPs: a black hat ISP harbors spammers and doesn't terminate them; a white hat ISP terminates upon the first LART; and gray hat ISPs terminate only reluctantly and/or slowly. This has led to the concept of a hat check: someone considering a potential business relationship with an ISP or other provider will post a query to a NANA group, asking about the provider's hat color. The term albedo has also been used to describe a provider's spam-friendliness.
cracking e mail
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation