Skip to main content

Posts

Is Online Banking Safe ?

Online banking allows people to undertake traditional banking activities, like account transfers, payment of bills and requests for stopping payments, via the Internet. Customers can also keep tabs on the account balance from the comfort of their home. In this day and age, online banking has become an indispensable facility for people who are hard pressed for time and find it difficult, if not impossible, to reschedule their busy lives for the sake of making a few withdrawals and deposits. However, there are a few issues that have to be borne in mind in order to avoid being cyber scammed. Is Online Banking Safe - How Safe is Online Banking? This question often torments the customer who appreciates the facility of online banking but has a few misgivings about online banking security. An online bank account is accessed with the help of a username and a password. On divulging this information to an impostor, the customer ceases to have control over the online account....

What is Web 1.0, Web 2.0 and Web 3.0 ? Concepts Explained in Plain English

This slide neatly sums up the main differences between Web 1.0, Web 2.0 and Web 3.0. Web 1.0  – That Geocities, Hotmail era was all about read-only content and static HTML websites. People preferred navigating the web through link directories of Yahoo! and dmoz. Web 2.0  – This is about user-generated content and the read-write web. People are consuming as well as contributing information through blogs or sites like Flickr, YouTube, Digg, etc. The line dividing a consumer and content publisher is increasingly getting blurred in the Web 2.0 era. Web 3.0  – This will be about semantic web (or the meaning of data), personalization (e.g. iGoogle), intelligent search and behavioral advertising among other things. 

Different types of computing --Grid, Cloud, Utility, Distributed and Cluster computing

Cloud Computing  -  http://en.wikipedia.org/wiki/Cloud_computing Cloud computing is a computing paradigm shift where computing is moved away from personal computers or an individual application server to a “cloud” of computers. Users of the cloud only need to be concerned with the computing service being asked for, as the underlying details of how it is achieved are hidden. This method of distributed computing is done through pooling all computer resources together and being managed by software rather than a human. The services being requested of a cloud are not limited to using web applications, but can also be IT management tasks such as requesting of systems, a software stack or a specific web appliance.   Grid Computing  -  http://en.wikipedia.org/wiki/Grid_computing Multiple independent computing clusters which act like a “grid” because they are composed of resource nodes not located within a single administrative domain. (formal) Offering online co...

Stay Hungry. Stay Foolish.

I just came across the transcript of a graduation commencement address that  Steve Jobs  delivered to the Stanford University class of 2005.  Certain parts of this speech strongly coincide with the underlying message in my previous post.  Beyond that, it provides some exceptional first hand advice from a man who followed his heart and intuition in pursuit of what he loved in life… and he came out on top.  The  full commencement address  is definitely worth a quick read.  Here are a couple excerpts that initially caught my attention: “Remembering that I’ll be dead soon is the most important tool I’ve ever encountered to help me make the big choices in life. Because almost everything, all external expectations, all pride, all fear of  embarrassment or failure - these things just fall away in the face of death, leaving only what is truly important. Remembering that you are going to die is the best way I know to avoid the trap of thinking y...

Google's Bouncing Balls

Click here to have fun !!   Today marks the birthday of Google. In celebration of such an important holiday among internet users, the Google homepage consists of a Google logo made up of bouncing dots and balls. They just aren’t your normal Google balls though. They are interactive with the a user’s mouse pointer. If you hover over the word “Google” the balls will spread away from your mouse pointer. Once the mouse is placed away from the balls, they will slowly morph back into the shape of the word “Google”. Is there a point to the animated Google logo? Probably not much more than to celebrate their birthday. However they are also utilizing some HTML 5 and CSS3 elements, which they hope will be the future of the internet. Also, the bouncing Google balls are from a Google Doodle. You can see more Google doodle logos at http://www.google.com/logos/ Happy Birthday Google! Where would the internet be without you?

WINDOWS REGISTRY TWEAKS Part-1

How to edit the windows registry Editing the Windows registry can most easily be accomplished through the REGEDIT program built into Windows. This can be accessed by going to start\run\ and typing ‘regedit.’ Due to the nature of the registry, any changes you make here do not have to be saved. All changes are applied upon restarting the system. This also means that there is no ‘cancel’ button for undoing accidental changes, so make sure you keep careful note of the values you intend to edit. Registry values are stored in keys which appear as folders in the REGEDIT window. Most of the following instructions will have you add or edit values inside these keys. When you highlight a key in the left pane, the values stored in it appear in the right pane. To edit a value, right  click it and select ‘modify.’ To add a new value, navigate to the key in which you wish to add the value, right clock it and select ‘new’ then the type of value you wis...

WINDOWS REGISTRY TWEAKS Part-2

25) Increase Internet Download Connections Increase Simultaneous Internet Download Connections. Increases the number of allowed simultaneous connections to ten (10). [Start] [Run] [Regedit] Go to: HKEY_CURRENT_USER | Software | M*cro$oft | Windows | CurrentVersion | Internet | Settings Modify/Create DWORD Value of Data type REG_DWORD Named [MaxConnectionsPer1_0Server] Setting for Value Data: [0000000a] Modify/Create DWORD Value of Data type REG_DWORD Named [MaxConnectionsPerServer] Setting for Value Data: [0000000a] Exit Registry / Reboot 26) Create Legal Notice Logon Dialog Box In situations where you need users to read a legal notice before logging on, this tweak will create the caption for the notice. Start] [Run] [Regedit] Go to: HKEY_LOCAL_MACHINE | SOFTWARE | M*cro$oft | Windows NT | CurrentVersion | Winlogon Modify/Create String Value of Data type REG_SZ Named [LegalNoticeCaption] Value Data for LegalNoticeCaption: [Type the Ca...