Yearly Archives: 2013


Wordpress Design1
The most basic approach to improve a stage online is to make a web journal. It is WordPress Site that offers any blogger the most control for modifying and using every last bit of its characteristics. Numerous first-time bloggers accept that the methodology is excessively testing or moves along at a comfortable pace. It doesn’t require any specialized skill or abilities in workstation customizing, yet essentially the capability to pick […]

How to begin with a WordPress Site?


This article states that functioning of process model and various process model used in software engineering .This article explain use of this model in software development life cycle (SDLC) in simple lucid language.  The major and commonly used process models should be adapted for uses by a software project team. To achieve this, process technology tools have been developed which helps software development organizations to 1. Analyze current process 2. […]

The Process Model



RFID Reader 1
RFID stands for ‘Radio Frequency Identification’. It is short range communication system. An RFID consist of three main parts an antenna, transponder and a receiver. It is used to transfer data and is transferred through electromagnetic and electrostatic coupling. Data size can range from 2000 bytes and less. RFID system uses tag for identification of object. It consists of radio frequency transmitter and receiver. These tags contains unique tag serial […]

Radio Frequency Identification


Wi-Fi EAP 2
Wi-Fi is a Wireless technology that uses the radio frequency to transmit data through air. With the rise of Wireless Fidelity (Wi-Fi), technology comes the rise of the hotspot -public access Wireless Local Area Networks (WLANs) that allow anyone with a Wi-Fi capable notebook or PDA to connect to the Internet or a corporate intranet in airports, hotels, coffee shops, or even campgrounds and fast food restaurants. Wi-Fi hotspots are […]

What is WI-FI?



Tool Chain
A Toolchain is the set of Programming Tools that are used to create software. The Tools are used in a chain , so that the output of each tool becomes the input for the next tool.   Editor: Editor is program in which we can write our code and edit that code. Gedit , kwrite are the examples of editors.   File name : Demo.c #include<stdio.h> #define MAX 10 int […]

ToolChain


computer virus 2
Introduction to Virus   A machine infection is a workstation system that can reproduce itself and spread from one machine to another.[1] The expression “infection” is additionally ordinarily, however incorrectly, used to allude to different sorts of malware, incorporating yet not constrained to adware and spyware modifies that don’t have a regenerative capacity.  Malware incorporates machine infections, workstation worms, ransomware, trojan steeds, keyloggers, generally rootkits, spyware, untrustworthy adware, pernicious Bhos […]

Computer Virus



6
               Cyber crimes are crimes in which the computer is either an “object or subject of the conduct constituting crime.” Computers are easy to access and store a lot of data in a small space, which make them vulnerable to criminals. Cyber criminals may include children, adolescents, professional hackers, resentful employees, etc. The BAL Bharati case in Delhi is an example of a cyber crime committed by a juvenile. Harassment […]

Cyber Crime in India