KONGU ARTS AND SCIENCE COLLEGE

ERODE – 638 107.

P.G. DEPARTMENT OF COMPUTER SCIENCE

MCA – News Bulletin (2010-2011)

EDITORIAL BOARD

PATRON : A.VENKADACHALAM B.Sc., Correspondent.

CONVENER : Dr. N.RAMAN MBA., M.Com., M.Phil., B.Ed.,PGDCA Principal

ADVISOR : Ms. D. GAYATHRI DEVI M.C.A., M.Phil. Prof. and Head.

COORDINATOR & : Ms. B. JAYANTHI M.C.A., M.Phil., Associate Professor EDITOR

STUDENT EDITORS

1. S.BAGAVATHSINGH - II - M.C.A

2. R.SAMPATHKUMAR - II - M.C.A

3. G.ARUNKUMAR –I MCA

4. K.SANKAR – I MCA

1

News Bulletin (2010-2011)

2 S.NO DATE PARTICULARS P.NO

1. 29.12.2010 COMPUTER ASSISTED TRANSLATION 7

KEY FEATURES AND BENEFITS OF BIT 2. 29.12.2010 DEFENDER ANTIVIRUS 2010 8

3. 30.12.2010 COMPUTER BASED TRAINING 9

INTEL® CORE™ I7 PROCESSOR 4. 30.12.2010 FEATURES AND BENEFITS 10

MICROSOFT CONFIRMS CRITICAL IE 5. 31.12.2010 11 BUG,WORKS ON FIX

6. 31.12.2010 LINUX 12

BENQ TO LANUCH R100 TABLET PC IN 7. 03.01.2011 EARLY 2011 13

BEAST TROJAN- MOST DANGEROUS 8. 03.01.2011 COMPUTER VIRUS 14

9. 04.01.2011 IT NEWS 15

FACE BOOK PASSES GOOGLE AS MOST 10. 04.01.2011 16 VISITED SITE OF 2010

LA CINEMA RUGGED HARD DRIVE 11. 05.01.2011 CONNECTS TO TV 17

12. 05.01.2011 FEATURES OF SOUND TECHNOLOGY 18

THE IPHONE AND IPOD COULD SOON 13. 06.01.2011 HIT VERIZON WITH 4G 19

3 14. 06.01.2011 MICROSOFT PROTOCOLS 20

15. 08.01.2011 SHORTCUT KEYS 21

16. 08.01.2011 GRID COMPUTING 22

17. 10.01.2011 SMTP SERVER 23

18. 10.01.2011 TYPES OF SERVER 24

19. 11.01.2011 BANG, THERE GOES YOUR iPOD! 25

20. 11.01.2011 JAVA CARD 26

21. 12.01.2011 COMPANY PROFILE 27

22. 12.01.2011 ABOUT WIKILEAKS 28

23. 18.01.2011 TCS PROFILE 29

24. 18.01.2011 WIKILEAKS 30

25. 19.01.2011 COMPRO LANCHES NETWORK CAMERA 31

26. 19.01.2010 AIRBORNE INTERNET 32

27. 20.01.2011 ANDROID 3.0 33

28. 20.01.2011 BUBBLE SENSING 34

29. 21.01.2011 SKY X TECHNOLOGY 35

INFRASECURE 30. 21.01.2011 36 SOFTWARE TO CUT PC POWER

31. 22.01.2011 CLOUD COMPUTING 37

32. 22.01.2011 ABOUT CLOUD COMPUTING 38

4 33. 24.01.2011 POWER G3 39

TOSHIBA CANVIO 3.0 PORTABLE 34. 24.01.2011 40 DRIVES

35. 25.01.2011 STRATA FLASH MEMORY 41

36. 25.01.2011 TYPES OF COMPUTER VIRUS 42

37. 27.01.2011 APPLE REVEALS OS X 10.7 43

38. 27.01.2011 TASK MANAGER 44

39. 28.01.2011 PI4-WORKERBOT 45

40. 28.01.2011 HONEYPOT (COMPUTING) 46

41. 31.01.2011 TOP EIGHT IT COMPANIES IN INDIA 47

HACKERS TURN BACK THE CLOCK 42. 31.01.2011 48 WITH TELNET ATTACKS

43. 01.02.2011 COMPANY PROFILE 49

44. 01.02.2011 USB FLASH DRIVE 50

AMPLITUBE UPDATE ADDS RECORDING 45. 03.02.2011 FEATURES TO iPOD 51

46. 03.02.2011 IRIS RECOGNITION 52

47. 05.02.2011 GIANT RING OF BLOCK HOLES 53

48. 05.02.2011 AVAST ANTI-VIRUS 54

3D GAMING WONT PERMENANTLY 49. 07.02.2011 DAMAGE YOUR EYES 55

5 50. 07.02.2011 SOFTWARE OF LASER PRINTER 56

51. 08.02.2011 TCS 57

52. 08.02.2011 CRYPTOGRAPHIC ALGORITHMS 58

53. 09.02.2011 JOB SEARCHING WEBSITE 59

54. 09.02.2011 HP LAUNCHES CLOUD SERVICES 60

IBM DEVELOP DENSER,FASTER CHIP 55. 11.02.2011 61 MEMORY

56. 11.02.2011 BLU-RAY DISC 62

INTEL DESKTOP BOARD DP55KG 57. 12.02.2011 EXTREME SERIOUS 63

SELF-RECONFIGURING ROBOTIC 58. 12.02.2011 SYSTEMS 64

59. 14.02.2011 NANO ROBOTICS 65

60. 15.02.2011 CYBER CRIME 66

61. 17.02.2011 APPLICATIONS OF NANOTECHNOLOGY 67

6 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 29.12.2010

COMPUTER-ASSISTED TRANSLATION

 Spell checkers, either built into word processing software, or add-on programs.  Grammar checkers, again either built into word processing software, or add-on programs.  Terminology managers, allowing the translator to manage his own terminology bank in an electronic form. Dictionaries on CD-ROM, either unilingual or bilingual.  Full-text search tools (or indexers), which allow the user to query already translated texts or reference documents of various kinds. In the translation industry one finds such indexers as Natural, ISYS Search Software and dtSearch.  Bitexts, a fairly recent development, the result of merging a source text and its translation, which can then be analyzed using a full-text search tool or a concordancer.  Translation memory managers (TMM), tools consisting of a database of text segments in a source language and their translations in one or more target languages.

G.ANANTHI

II – MCA

7 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 29.12.2010

Key Features and Benefits of Bit Defender Antivirus 2010

 Bit Defender is an antivirus software suite developed by Romania-based software company SOFTWIN.  It was launched in November 2001.  It is one of the top ten antiviruses in 2010.  Protection against viruses and other malware.  Scans all Web, e-mail and instant messaging traffic in real-time.  Blocks spyware programs that track your online activities.  Blocks web pages that attempt to steal your credit card data.  Prevents personal information from leaking via e-mail.  Instant Messaging Encryption keeps your conversations private on Yahoo! and MSN Messenger.  Reduces the system load and avoids requesting user interaction during game play.  Suitable for Windows 7.

M.ANANTHARAJ I – MCA

8 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 30.12.2010

COMPUTER-BASED TRAINING

 Computer-Based Trainings (CBTs) are self-paced learning activities accessible via a computer or handheld device.  CBTs typically present content in a linear fashion, much like reading an online book or manual. For this reason they are often used to teach static processes, such as using software or completing mathematical equations.  The term Computer-Based Training is often used interchangeably with Web-based training (WBT) with the primary difference being the delivery method.  CBTs provide learning stimulus beyond traditional learning methodology from textbook, manual, or classroom-based instruction. For example, CBTs offer user- friendly solutions for satisfying continuing education requirements.  CBTs can be a good alternative to printed learning materials since rich media, including videos or animations, can easily be embedded to enhance the learning.  Another advantage to CBTs are that they can be easily distributed to a wide audience at a relatively low cost once the initial development is completed.

G.ARULMURUGAN II - MCA

9 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 30.12.2010

Intel® Core™ i7 Processor Features and Benefits

 Go to the next level of multi-core performance. Intel Core i7 processors deliver an incredible breakthrough in quad-core performance and feature the latest innovations in processor technologies:  Intel Turbo Boost technology maximizes speed for demanding applications, dynamically accelerating performance to match your workload—more performance when you need it the most.  Intel Hyper-Threading technology enables highly threaded applications to get more work done in parallel. With 8 threads available to the operating system, multi-tasking becomes even easier.  Intel QuickPath Interconnect is designed for increased bandwidth and low latency. It can achieve data transfer speeds as high as 25.6 GB/sec with the Extreme Edition processor.  Integrated memory controller enables three channels of DDR3 1066 MHz memory, resulting in up to 25.6 GB/sec memory bandwidth. This memory controller's lower latency and higher memory bandwidth delivers amazing performance for data-intensive applications.  Intel HD Boost significantly improves a broad range of multimedia and compute- intensive applications. The 128-bit SSE instructions are issued at a throughput rate of one per clock cycle, allowing a new level of processing efficiency with SSE4 optimized applications.

G.ARUNKUMAAR I - MCA

10 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 31.12.2010

Microsoft Confirms Critical Ie Bug, Works On Fix  Microsoft late Wednesday confirmed that all versions of Internet Explorer (IE) contain a critical vulnerability that attackers can exploit by persuading users to visit a rigged Web site.  Although the company said it would patch the problem, it is not planning to rush out an emergency update.  "The issue does not currently meet the criteria for an out-of-band release," said Carlene Chmaj, a spokeswoman for the Microsoft Security Response Center (MSRC), in an entry on the center's blog. "However, we are monitoring the threat landscape very closely and if the situation changes, we will post updates."  Chmaj also downplayed the threat posed by the bug. "Currently the impact of this vulnerability is limited and we are not aware of any affected customers or active attacks targeting customers," she said.  The vulnerability in IE6, IE7 and IE8 surfaced several weeks ago when French security firm Vupen disclosed a flaw in IE's HTML engine. Tuesday, researchers posted a video demonstration of an attack, and added a reliable exploit to the Metasploit penetration toolkit.  That exploit used a technique revealed earlier this year by McAfee researchers that defeats a pair of important Windows defensive technologies -- ASLR (address

S.BAGAVATHSINGH II – MCA

11 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

LINUX

News Bulletin: MCA DATE: 31.12.2010

 It’s Free. You don’t have to pay for it.  Linux requires minimal hardware configuration. You can run it on your old systems and it will work fine.  No virus or spyware can affect systems running on Linux. Linux systems are virus free.  Linux can run almost forever without any reboot. It’s stable.  When working on Linux, your operating system does not slow down with time.  Linux is having an active forum  Whenever you need help, post it there and you can expect a reply within minutes from the helpful geeks on Linux forums.  Linux operating systems comes with some inbuilt softwares like open office for Word, Power-point, Excel, Firefox, CD/DVD burner etc.  Ubuntu (Linux’s operating system) gets updated automatically with latest bug patches, security patches automatically.  Linux never gets corrupted due to any third party software. Its security stability is top notch.

S.CHITRA I - MCA

12 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 03.01.2011 BenQ to launch R100 tablet PC in early 2011

 Taiwanese consumer electronics vendor BenQ plans to launch its first tablet PC in China and Taiwan during the first quarter of 2011, a company representative confirmed Wednesday.  The R100 tablet boasts a 10.1-inch LCD touchscreen with 1024 x 600 resolution and runs Google's Android mobile OS.  It also has an ARM-based processor made by Samsung Electronics that runs at 833MHz, according to information provided by BenQ.  With the R100, BenQ will join the ranks of other companies around the world putting out tablet PCs to compete with Apple's iPad.  The company said the R100's battery can run for up to 12 hours when the device is being used for reading.  The R100 will come with 8GB of internal storage as well as an SD slot able to handle up to 16GB SD cards. BenQ added mini-USB and mini-HDMI ports to the device as well as a 3.5-millimeter earphone jack.  It works with Wi-Fi 802.11 b/g/n and Bluetooth wireless data transfer protocol.  The R100 is 15mm thick and is 191mm by 244mm in size. It weighs 720 grams.  BenQ has not yet set a price for the R100 and a company representative said pictures would be available when the device is officially launched.

P.BALUKUMAR II - MCA

13 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 03.01.2011 Beast Trojan- Most Dangerous Computer Virus

 Beast is a Windows-based backdoor trojan horse more commonly known in the underground "script-kiddie" community as a RAT (Remote Administration Tool).  It is capable of infecting almost all Windows versions i.e. 95 through XP. Written in Delphi and released first by its author Tataye in 2002, it became quite popular due to its unique features.  It used the typical client/server mechanism where the client would be under operation by the attacker and the server is what would infect the victim.  Beast was one of the first trojans to feature a 'reverse connection' to its victims and once established, it gave the attacker complete control over the infected computer.  Using the 'reverse connection' there was no need for the attacker to know the target IP, instead the server itself connected to a predefined DNS, which was redirected to the attacker IP.  Its targeted infection sites were mainly three:

 C:\Windows\msagent\ms****.com (Size ranging from 30KB to 49KB)  C:\Windows\System32\ms****.com (Size ranging from 30KB to 49KB)  C:\Windows\dxdgns.dll or C:\Windows\System32\dxdgns.dll (Location dependent on attacker's choice)

 It also came with a binder that could be used to join two or more files together and then change their icon.

N.DHINESH I - MCA

14 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 04.01.2011

IT NEWS

Google #1 in Search Engine Satisfaction, AOL in Last Place

A new report on consumer satisfaction with search engines and Internet portals says we like them more they now than this time last year. Of the major engines, only last-place AOL improved its score. The big winner? "All others."

Beyond HandBrake's defaults

If you're a Mac user interested in ripping your commercial DVDs to a format playable on an Apple TV, iPod, or iPhone, the free video transcoder, HandBrake 0.9.3, is one of the easiest ways to go about it. With a copy of the free VLC installed on your Mac, HandBrake can rip most DVDs made today, and the results it produces are quite watchable.

Casio Announces New Entry-Level Exilim Cameras

Casio is the latest big-name company to announce new point-and-shoot cameras for the fall, chipping in with two entry-level models that carry advanced automatic features.

New China Mobile app store supports Dell device

A Dell mobile device is listed beside handsets supported by the China Mobile application store launched this week.

D.BOOPATHI II - MCA

15 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 04.01.2011

Face book passes Google as most visited site of 2010

 For the first time ever, U.S. Web surfers visited the social networking site more than any other site in 2010, beating out Internet behemoth Google, according to a report from Hit wise, an Internet analytics firm.  Face book, which had a flood of good and bad publicity last year, grabbed 8.93% of all U.S. visits between January and November 2010. Google, which had been in the top spot in 2009, slipped to the No. 2 position with 7.19% of all visits, Hit wise said.  The analytics firm also reported that Yahoo! Mail came ranked third with 3.52% of all visits, while the main Yahoo! site was fourth with 3.3%. You Tube rounded out the top five with 2.65% of all site visits.  In September, Online researcher COM Score reported that for the month of August, Face book edged out Google in terms of how much time U.S. users spent on a Web site.  U.S. users spent a total of 41.1 million minutes on Face book in August, compared with 39.8 million minutes on Google's various sites, including Google News and You Tube.  Hit wise reported over the weekend that Face book marked another small victory for the year. After analyzing the top 1,000 search terms for 2010, Hit wise calculated that the word "Face book" was the top search term for the year.  "This is the second year that the social networking Web site has been the top search term overall, accounting for 2.11% of all searches," Hit wise reported.

G.DIVYA I - MCA

16 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE:05.01.2011 LaCinema Rugged Hard Drive Connects to TV  LaCie on Monday announced the release of the LaCinema Rugged, a USB 2.0 hard disk drive equipped with a High Definition.

 LaCie on Monday announced the release of the LaCinema Rugged, a USB 2.0 hard disk drive equipped with a High Definition Multimedia Interface (HDMI) connector. It's priced starting at US$199.

 Compatible with Macs and PCs, the LaCinema Rugged sports an aluminum shell and internal anti-shock absorbers, along with a shock-resistant rubber bumper.

 It comes in 250GB, 320GB and 500GB capacities.

 Data transferred to the drive is visible on any display. Equipped with an HDMI interface, you can connect the drive directly to a high-definition TV display, or you can connect to other TVs using a composite video connection.

 The drive manages 1080i upscaling itself. It also includes a wireless remote control, and is equipped with analog stereo and optical audio connections.

 MPEG-1, MPEG-2 and MPEG-4 video codecs, and JPEG, GIF, PNG and BMP digital image formats.

S.ELUMALAI II - MCA

17 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE:05.01.2011

FEATURES OF SOUND TECHNOLOGY

 Datacenter consolidation and the growth in 10-Gigabit Ethernet networks is leading switch vendors and network appliance providers to outfit new products with high- performance features to handle these more demanding environments.  This week Force10 Networks will increase the density of its TeraScale E-Series family of switch/routers to more than 1,260 Gigabit Ethernet ports per chassis with a new line of High Density 90-port line cards.  ―These systems are designed to accommodate the increasing demand for bandwidth and have the capacity to accommodate growth for what we estimate to be 10 years,‖ said Andrew Feldman, vice president of marketing at Force10.  ―These types of networks used to be relegated to the scientific and research areas, but now we’re seeing more commercial applications.‖  ―Many companies can save money by reducing the number of datacenters they have when they move to these high-capacity systems, but they also receive just as much if not more benefit from the reduced management load,‖ he said.

N.ELAVARASI I - M.C.A

18 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 06.01.2011

The iPhone and iPad could soon hit Verizon with 4G

 It's been another busy and interesting day when it comes to speculation about Apple's relationship with Verizon both in terms of the carrier getting a CDMA version of the iPhone early next year .  First off, the news about a Verizon iPhone. While speculation's been brewing for months about a CDMA iPhone 4 to deployed on the largest U.S. carrier .  A recent analyst report noted that Verizon was willing to make concessions and put Apple in "the driver's seat" of negotiations in return for promising that exclusivity wouldn't expand beyond Verizon and AT&T, the current exclusive U.S. carrier.  More recently, reports of Verizon's smartphone sales have indicated that the company may need to offer the iPhone if it wants to remain the largest U.S. mobile carrier.  Sales of BlackBerries for Verizon have slipped significantly and while Android has become the lead platform for Verizon, it is becoming accepted wisdom that this is only because Android handsets are the most iPhone-like devices that Verizon can offer.  If true, then it would certainly be in the company's interest to try and secure as exclusive a deal as possible and to give into Apple's demands. In more recent and significant reports, a Verizon iPhone would support LTE, Verizon's 4G-branded service, which went live just over a week ago.

C.GOWRISHANKAR II - MCA

19 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 06.01.2011

MICROSOFT PROTOCOLS  NetBIOS-Network Basic Input/Output allows browsing of network resources and handles basic functions of a Windows network.Two many acknowledged data transfer is used.It is a Microsoft protocol used to support Microsoft Networking.Works at the session layer.Controls the sessions between computers and maintains connections.  NetBEUI-NetBIOS Extended User Interface.Microsoft Protocol used to support Microsoft Networking.Provides data transpotation.It is not a routable transport protocol which is why NBT exists on large networks to use routable TCP Protocol on large networks.This protocol may sometimes be called the NetBIOS frame (NBF) protocol.Works at the Transport and Network layers.NetBEUI-The main protocol used for networking in the transport layer and provides data transportation.It is not a routable transport protocol.  SMB-Microsoft Protocol used to support Microsoft Networking by providing redirector client to server communication.Works at the presentation layer. Other-Network Support  NBT-NetBIOS over TCP/IP refers to NetBIOS being transported by TCP/IP rather than NetBEUI defined by RFC 1002.  Redirector-Directs requests for network resources to the appropriate server and makes network resources seem to be local resources.  NDIS and NIC driver-NDIS allows several adapter drivers to use any number of transport protocols.The NIC driver is the driver software for the network card.

S.GOMATHI I - MCA

20

KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 08.01.2011 SHORTCUT KEYS Microsoft Word shortcut keys :  Ctrl + Shift + > : Increase selected font +1pts up to 12pt and then increases font +2pts.  Ctrl + Shift + < : Decrease selected font -1pts if 12pt or lower, if above 12 decreases font by +2pt.  Ctrl+1 ,Ctrl+2 : Single-space lines , Double-space lines.  Ctrl + 5 : 1.5-line spacing.  Ctrl + Shift + * : View or hide non printing characters.  Ctrl+Alt+1, 2, 3 : Changes text to heading 1, heading 2, heading 3.  Shift+Alt+D or T: Insert the current date. Or Insert the current time.  Alt + Ctrl + F2 : Open new document.  Ctrl +Shift +F6 : Opens to another open Microsoft Word document.

Other shortcut keys :  WINKEY + E : Open My Computer.  WINKEY + U : Open Utility Manager.  Alt + double - click : Display the properties of the object you double-click.  WINKEY + Pause / Break key : Open the system properties window.  Left Alt+left Shift+Print screen : Switch High Contrast either on or off.  Left Alt + left Shift + Num lock : Switch the MouseKeys either on or off. P.HEMACHANDRAN., II - MCA

21 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 08.01.2011 GRID COMPUTING  Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common goal.

 The Grid can be thought of as a distributed system with non-interactive workloads that involve a large number of files. What distinguishes grid computing from conventional high performance computing systems such as cluster computing is that grids tend to be more loosely coupled, heterogeneous, and geographically dispersed.

 A grid can be dedicated to a specialized application; Grids are often constructed with the aid of general-purpose grid software libraries known as middleware. Grid size can vary by a considerable amount.

 Grids are a form of distributed computing whereby a ―super virtual computer‖ is composed of many networked loosely coupled computers acting together to perform very large tasks.

 ―Distributed‖ or ―grid‖ computing in general is a special type of parallel computing thatrelies on complete computers (with onboard CPUs, storage, power supplies, network interfaces, etc.) connected to a network (private, public or the Internet) by a conventional network interface, such as Ethernet. K.S GOPALAKRISHNAN I - MCA

22 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 10.01.2011

SMTP Server

Sends your Mail with Lightening Fast Speed

 Computers have dominated the present world. Be it the business sector, the educational arena or the medical world, computers are everywhere.  A wide range of technological developments has bettered the modes of communication in between countries.  The SMTP or Simple Mail Transfer Protocol is one such brilliant technology through which you can send mails. Related Coverage

 Sending SMTP Mails through C# Application  SMTP Mail Server – Make Your Email Communication Successful  The way a SMTP server works  SMTP Mail server – Sends Your Email Successfully

 SMTP Relay Server is a type of a SMTP server program for Windows that allows you to transform any Windows based PC into an SMTP server.  SMTP Relay server helps you to send mails through your personal email account with the help of your current email service. K.KALAIVANI II – MCA

23 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 10.01.2011

TYPES OF SERVER A SERVER is any machine that provides a service for other users on the network.

 Application server, a server dedicated to running certain software applications  Communications server, carrier-grade computing platform for communications networks  Database server, see file AB2  Fax server, provides fax services for clients  File server, provides file services  Game server, a server that video game clients connect to in order to play online together  Home server, a server for the home  ISA server, provides the two basic services of an enterprise firewall and a Web proxy/cache server  Name server or DNS server  Print server, provides printer services  Proxy server, provides database server in services  Sound server, provides multimedia broadcasting / streaming.  Standalone server, an emulator for client–server (web-based) programs  Web server, a server that HTTP clients connect to in order to send commands and receive responses along with data contents.

N.HEMALATHA I - MCA

24 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 11.01.2011 BANG, THERE GOES YOUR iPOD!

 Apple tried to prevent a father from publicising that his daughter's iPod MP3 player blew up last month, according to new reports today.The Times said that 47 year old Ken Stanborough from Liverpool reported to Apple that his daughter's device had begun to hiss and overheat, so he threw it into the garden where it exploded in a puff of smoke. However, the hardware giant apparently sent Stanborough a letter offering a refund only if he kept the settlement confidential.

 In what appears to be an attempt by Cupertino to hush up any incidents where its devices are seen to have overheated, the firm warned Stanborough that any breach of this confidentiality "may result in Apple seeking injunctive relief, damages and legal costs against the defaulting persons or parties".

 Apple has since told Sky News that it is "standard practice to have a letter of settlement" in these cases, and that it wasn't an attempt to gag the family. You know how they say that there's no such thing as bad publicity? Er, that might not strictly speaking be true.

K.KANIMOZHI

II - MCA

25 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 11.01.2011

JAVA CARD

 Java Card refers to a technology that allows Java-based applications (applets) to be run securely on smart cards and similar small memory footprint devices.  Java Card is the tiniest of Java targeted for embedded devices. Java Card gives the user ability to program the device and make them application specific.  It is widely used in SIM cards (used in GSM mobile phones) and ATM cards. The first Java Card was introduced in 1996 by Schlumberger's card division which later merged with Gemplus to form Gemalto. Java Card products are based on the Java Card Platform specifications developed by Sun Microsystems, a subsidiary of Oracle Corporation.  Many Java card products also rely on the GlobalPlatform specifications for the secure management of applications on the card (download, installation, personalization, deletion)  Java Card aims at defining a standard smart card computing environment allowing the same Java Card applet to run on different smart cards, much like a Java applet runs on different computers.  Java Card technology was originally developed for the purpose of securing sensitive information stored on smart cards. Security is determined by various aspects of this technology (Data encapsulation, Applet Firewall, Cryptography, Applet) M.JAGADEESH

I - MCA

26

KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 12.01.2011 Wipro What started off as a hydrogenated cooking fat company, Wipro is today is a $5 billion revenue generating IT, BPO and R&D services organisation with presence in over 50 countries. Premji started Wipro with the 'idea of building an organisation which was deeply committed to values, in the firm belief that success in business would be its inevitable, eventual outcome'. The company has over 72,000 employees.

Wipro's revenues grew by 33 per cent to Rs 19,957 crore (Rs 200 billion) for the year ended March 31, 2008. The net profit grew by 12 per cent to Rs. 3,283 crore (Rs. 32.83 billion). The revenues of the combined IT businesses was $4.3 billion with 43 per cent YoY growth.

Wipro was the only Indian company to be ranked among the top 10 global outsourcing providers in IAOP's 2006 Global Outsourcing 100 listing. Wipro has also won the International Institute for Software Testing's Software Testing Best Practice Award.

Infosys Infosys Technologies Ltd was started in 1981 by seven people with $250. Today, the company boasts of revenues of over $ 4 billion and 94,379 employees. Under the leadership of N R Narayana Murthy, the company has become a global brand. The company is now headed by Kris Gopalakrishnan. The income for the quarter ended June 30 2008 was Rs 4,854 crore (Rs 48.54 billion). The net profit stood at Rs 1,302 crore (Rs 13.02 billion).

Forbes magazine named Infosys in its list of Global High Performers. Waters magazine rated Infosys as the Best Outsourcing Partner. The Banker magazine conferred two Banker Technology Awards on Infosys to acclaim its work in wholesale and capital markets in two categories - Payments and Treasury Services, and Offshoring and Outsourcing.

The International Association of Outsourcing Professionals (IAOP) ranked Infosys at No. 3 in its '2008 Global Outsourcing 100'.

K.KARTHIKEYAN II - MCA

27 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 12.01.2011 ABOUT WIKILEAKS  URL : Wikileaks.org(originally)

 Slogan : We open Governments  Commercial? : No  Type of site : Document archive & disclosure  Owner : The sunshine Press  Created by : Julian assange  Launched : 4 October 2006  Alexa rank :861(December 2010)  Current status : Active  Julian Assange, the main spokesperson and editor-in-chief for WikiLeaks.  WikiLeaks is an international non-profit organisation at publishes submissions of private, secret, and classified media from anonymous news sources and news leaks.  In April 2010, WikiLeaks posted video from a 2007 incident in which Iraqi civilians and journalists were killed by US forces, on a website called Collateral Murder.  In October 2010, the group released a package of almost 4,00,000 documents called the Iraq War Logs in coordination with major commercial media organisations.

P.JAYAPRIYA I - MCA

28 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 18.01.2011

COMPANY PROFILE OF TCS Tata Consultancy Services started in 1968. Mr.F.C Kohli who is presently the Deputy Chairman was entrusted with the job of steering TCS. The early days marked TCS resonsibility in managing the punch card operations of Tisco. The company, which was into management consultancy from day one, soon felt the need to provide solutions to its clients as well.TCS was the first Indian company to make forays into the US market with clients ranging from IBM,American Express, Sega etc.

During the Y2K buildup, TCS had setup a Y2K factory in Chennai as a short-term strategy. Now, with E-business being the buzzword, the factory is developing solutions for the dotcom industries. Today, about 90 percent of TCS' revenue comes from consulting, while the rest from products. TCS has great training facilities. In addition to training around 5 percent of the revenue is spent upon its R&D centers like the Tata Research Design and Development Centre at Pune, along with a host of other centers at Mumbai and Hyderabad.

Over $25 million were spent on enhancing hardware and software infrastructure. The company now has 72 offices worldwide. As many as seven centers were assessed at SEI CMM Level 5 last year(3.4 mistakes in a million opportunities). These include Chennai, Mumbai, Bangalore, Calcutta, Hyderabad and Lucknow. Several business and R&D relationship with global firms like IBM, General Electric, Unigraphics Solutions have been made.

The present CEO of the company is Mr. S. Ramadorai. The companies strength is about 14,000.

G.LAKSHMANAN

II - M.C.A

29 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 18.01.2011

WIKILEAKS

 WikiLeaks is an international non-profit organisation that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks.  Its website, launched in 4 October 2006 under The Sunshine Press organisation, claimed a database of more than 1.2 million documents within a year of its launch.  It is created by Julian Assange.  The website was unveiled, and published its first document in December 2006.  The site claims to have been "founded by Chinese dissidents, journalists, mathematicians and start-up company technologists, from the US, Taiwan, Europe, Australia and South Africa".  In 2008, Index on Censorship presented WikiLeaks with their inaugural Economist New Media Award.  In 2009, Amnesty International awarded WikiLeaks their Media Award for exposing "extra judicial killings and disappearances" in Kenya.

N.JAGADHEESH I – MCA

30 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 19.01.2011

COMPRO LAUNCHES NETWORK CAMERA

 Compro Technology recently announced the launch of IP70 network camera with 1/3- inch CMOS megapixel sensor.

 The advanced H.264 video compression and IR technology, it can transfer HD video at a lower bit-rate.

 The camera features the function of professional light sensor IR solution.

 It provides user 365x24x7 complete protection, making it more suitable for network surveillance.

 Compro IP70 provides 1280x1024 image quality, and dual H.264, MJPEG or MPEG-4 streams.

 IP70 also has the function to connect sirens and sensing devices. Optional WL155 USB upgrade module provides 802.11 b/g/n wireless transfer functions.

 Compro IP70 network camera is touted an ideal surveillance solution for securing locations such as home, small business, hotel, shop or restaurant.

 It features 32 channels professional grade multi-camera video management solution for business surveillance. S.LALETHAPPRIYA II - MCA

31 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 19.01.2011

AIRBORNE INTERNET  The Airborne Internet is network in which all nodes would be located in aircraft. The network is intended for use in aviation communications, navigation, and surveillance (CNS) and would also be useful to businesses, private Internet users, and military.

 In time of war, for example, an airborne network might enable military planes to operate without the need for a communications infrastructure on the ground.

 The aircrafts will carry the "hub" of a wireless network having a star topology. The aircrafts will fly in shifts to provide continuous service, 24 hour per day by 7 days per week, with an overall system reliability of 99.9% or greater.

 At least three different methods have been proposed for putting communication nodes aloft. The first method would employ manned aircraft, the second method would use unmanned aircraft, and the third method would use blimps.

 The nodes would provide air-to-air, surface-to-air, and surface-to-surface communications. The aircraft or blimps would fly at altitudes of around 16 km, and would cover regions of about 40 mi (64 mi) in radius.

 Any subscriber within this region will be able to access the network„ ubiquitous multi- gigabit per second "bit cloud" upon demand. What the airborne internet will do is provide an infrastructure that can reach areas that don't have broadband cables & wires.

K.KARTHIKA I - MCA

32 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 20.01.2011

ANDROID 3.0 (HONEYCOMB)

 Android is a mobile operating system initially developed by Android Inc. Android was bought by Google in 2005  Android is based upon a modified version of the Linux kernel. Google and other members of the Open Handset Alliance collaborated on Android's development and release

HARDWARE RUNNING ANDROID 3.0

 The Android OS can be used as an operating system for cellphones, netbooks and tablets, including the Dell Streak, Samsung Galaxy Tab and other devices.  The world's first TV running Android, called Scandinavia, has also been launched by the company People of Lava.  The first commercially available phone to run the Android operating system was the HTC Dream, released on 22 October 2008

FEATURES OF ANDROID 3.0 Optimized tablet support with a new user interface. Three-dimensional desktop with redesigned widgets purportedly taken from BumpTop, the 3D desktop acquired by Google in 2010. Refined multi-tasking. Google Maps 5 with 3D interactions and offline reliability.Video S.MAIYAPPAN

II - M.C.A

33 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 20.01.2011

BUBBLE SENSING

 We propose bubble-sensing, a new sensor network abstraction that allows mobile phone users to create a binding between sensing tasks and the physical world at locations of interest, that remains active for a duration set by the user.  We envision mobile phones being able to affix sensing task bubbles at places of interest and then receive sensed data as it becomes available in a delay-tolerant fashion, in essence, creating a living documentary of places of interest in the physical world.  The system relies on other mobile phones that opportunistically pass through bubble- sensing locations to acquire tasks and do the sensing on behalf of the initiator, and deliver the data to the bubble-sensing server for retrieval by the user who initiated the task.  We describe an implementation of the bubble-sensing system using sensor-enabled mobile phones, specifically, Nokia’s N80 and N95 (with GPS, accelerometers, microphone, camera).  Task bubbles are maintained at locations through the interaction of ‖bubble carriers‖, which carry the sensing task into the area of interest, and ‖bubble anchors‖, which maintain the task bubble in the area when the bubble carrier is no longer present.  In our implementation, bubble carriers and bubble anchors implement a number of simple mobile phone based protocols that refresh the task bubble state as new mobile phones move through the area.

S.KARTHIKEYAN I - MCA

34 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 21.01.2011

SKY X TECHNOLOGY

Satellites are ideal for providing internet and private network access over long distance and to remote locations.

The Sky X Gateway and Sky X Client/Servers systems replaces TCP over satellite link with a protocol optimized for the long latency, high loss and asymmetric bandwidth conditions of the typical satellite communication.

The Sky X Client and the Sky X Server enhance the performance of data transmissions over satellites directly to end user PC's, thereby increasing Web performance by 3 times or more and file transfer speeds by 10 to 100 timesThe geosynchronous satellites, orbiting at an altitude of 22,300 miles has round trip times of approximately 540 m/s, an order of magnitude larger than terrestrial networks.

The journey through the atmosphere can also introduce bit errors into the data stream. These factors, combined with backchannel bandwidth typically much smaller than that available on the forward channel.

But the satellite conditions adversely interact with a number of elements of the TCP architecture, including it s window sizing, congestion avoidance algorithms, and data acknowledgment mechanisms. R.MEENAKSHI

II - MCA

35 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 21.01.2011

INFRASECURE

-SOFTWARE TO CUT PC POWER

 An Indian startup See Beyond Technologies (SBT) has developed a software named Infrasecure, which can reduce the power consumption of desktops by 35-40 percent.

 We launched Infrasecure in 2009, and since then we have won 15 large customers in India and the Middle East with an average deal size of 2,500 desktops. MindTree is the largest customer with deployment across 10,000 desktops.

 According to SBT, Infrasecure can save Rs. 24 lakh per annum in electricity costs for a company with 1,000-desktop infrastructure.

 A typical PC uses three units of electricity for the entire day. By using the smart power management features of Infrasecure, the consumption can be reduced by one- third or one unit. At Rs. 5 per unit, this works out to a savings of Rs. 24 lakh per annum for 1,000 nodes. In addition, this amounts to 300 tons of CO2 reduction per annum.

 At Rs. 1,200 for a perpetual license and Rs. 480 per year for a 3-year subscription license, the ROI for a typical 1,000-node customer works out to less than six months. The client can be remotely distributed by using Microsoft’s System Center Manager on desktops with any Windows OS supporting ACPI Power Management.

 It hibernates the desktop when not in use, and also wakes it up at predefined times to run batch schedules like antivirus updates.

R.KAVITHA I - MCA

36 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 22.01.2011

CLOUD COMPUTING  Cloud Computing is Internet-based computing, whereby shared resources, software, and information are provided to computers.  Cloud computing is a paradigm shift following the shift from mainframe to client– server in the early 1980s.  The term "cloud" is used as a metaphor for the Internet, based on the cloud drawing used in the past to represent the telephone network.  Cloud engineering is a field of engineering that generally deals with the lifecycle of Cloud computing solutions, design, development, testing,delivery, operation and consumption of Cloud products and services.  Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components.  Cloud platform services or "Platform as a Service (PaaS)" deliver a computing platform and/or solution stack as a service.  Cloud computing types: 1. Public cloud or external cloud 2. A community cloud.  Cloud Storage is a model of networked Computer data storage.

K.MYTHILI II - MCA

37 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 22.01.2011

ABOUT CLOUD COMPUTING  Cloud computing is location independent computing, whereby shared servers provide resources, software, and data to computers and other devices on demand, as with the electricity guide.  Layers of cloud computing includes client, application, platform, infrastructure and server.  Deployment models of cloud computing includes public cloud, community cloud,hybrid cloud and private cloud.  Cloud engineering is the application of a systematic, disciplined, quantifiable, and conceptualization, development, operation, and maintenance of cloud computing.  Cloud storage is a model of networked computer data storage where data is stored on multiple virtual servers, generally hosted by third parties, rather than being hosted on dedicated servers.  Hybrid storage clouds are often useful for archiving and backup functions, allowing a hybrid storage cloud uses a combination of public & private storage clouds and the local data to be replicated to a public cloud.  There are a number of open standards under development, including the OGF's Open Cloud Computing Interface.

 It losses out for Oracle (ORCL), SAP AG (SAP),BlackBaud(BLBK),Lawson software(LSWN). A.KAVITHA MANI I - MCA

38 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 24.01.2011

POWER MACINTOSH G3  The G3, commonly called "beige G3s" or "platinum G3s" for the color of their cases, was a series of personal computers designed, manufactured, and sold by Apple Computer, Inc.

 It was the first Macintosh to use the PowerPC G3 (PPC750) microprocessor, and replaced a number of earlier Power Macintosh models, in particular the 7300, 8600 and 9600 models.

 The introduction of the Desktop and Minitower G3 models coincided with Apple starting to sell user-configurable Macs directly from its web site in an online store, which was innovative for the time as Dell was the only other major manufacturer then doing this.

 The Power Mac G3 introduced a fast and large Level 2 backside cache to Apple's product lineup, running at half processor speed. As a result, these machines were widely considered to be faster than Intel PCs of similar CPU clock speed at launch, an assertion that was backed up by benchmarks performed by Byte Magazine, which prompted Apple to create the "Snail" and "Toasted Bunnies" television commercials.

 The was originally intended to be a midrange series, between the low-end Performa/LC models and the six-PCI slot Power Macintosh 9600.

 Apple developed a prototype G3-based six-slot full tower to be designated the Power Macintosh 9700. Despite demand from high-end users for more PCI slots in a G3 powered computer.

R.NITHYA

II – MCA

39 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 24.01.2011

TOSHIBA CANVIO 3.0 PORTABLE DRIVES Compatible with windows 7, windows Vista and windows XP. KEY PRODUCT FEATURES:  Transfer karge media files at blazing fast speeds with USB3.0.  Backwards compatible with USB 2.0.  Secure backup with a password(Data encryption,upto 256-bit).  Alerts when running low on backup capacity (Drive Space Alert).  Protects the drive(Internal Shock sensor and Ramp Loading technology).  Gives you peace of mind(Toshiba 3-Year Limited Warranty).

SPECIFICATION:  Interface: USB 3.0.  Transfer Rate: Upto 5Gb/s.  Speed: 5,400 rpm.  Average seek time:12ms.  Cache Buffer:8Mb.  Size : 3.1in(W) X 0.53in(II)X 4.7in(D).  Color:Black with red/White/blue/silver/green accents.  Weight:5.2oz

E .KAVIYAVARSHINI I - MCA

40 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 25.01.2011

Strata flash Memory The L18 flash memory device provides read-while-write and read-while-erase capability with density upgrades through 256-Mbit. This family of devices provides high performance at low voltage on a 16-bit data bus. Individually erasable memory blocks are sized for optimum code and data storage.

The flash memory array is grouped into multiple 8-Mbit partitions.

By dividing the flash memory into partitions, program or erase operations can take place at the same time as read operations.

The L18 flash memory device allows burst reads that cross partition boundaries. A WAIT signal provides easy CPU-to-flash memory synchronization. The L18 flash memory device incorporates technology that enables fast factory program and erase operations.

Designed for low-voltage systems, the L18 flash memory device supports read operations with VCC at 1.8 volt, and erase and program operations with VPP at 1.8 V or 9.0 V

G.RAMYA II - MCA

41

KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 25.01.2011

TYPES OF COMPUTER VIRUS Virus:  A virus is an independent program that reproduces itself.It can attach itself to other programs and make copies of itself(i.e.,companion viruses).  It can damage or corrupt data, or lower the performance of your system by using resources like memory or disk space. Trojans:  Another unsavory breed of malicious code are Trojans or Trojan horses,which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms. Boot Virus:  This type of virus affects the boot sector of a floppy or hard disk.This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk. Examples: Poly boot B, Anti EXE . Macro Virus:  Macro viruses infect files that are created using certain application programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single actions, thereby saving the user from having to carry them one by one. Examples : Relax,MeliddsA,Bablas,O97M/Y2K.

N.KIRUTHIKA I - MCA

42 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin:MCA DATE: 27.01.2011 Apple Reveals OS X 10.7 ("Lion") With New Features: Ships Summer 2011  Apple said "Back to the Mac," they meant it. The company was talking software this week at their mega event, with Mac OS X 10.7 being the star of the software show.  Apple's calling the next major version of OS X "Lion," and while it will not ship to consumers until summer of 2011, it promises to be the most significant Apple OS yet.  Developers are expected to start getting an early look sometime soon, and the added features are pretty impressive.  Lion includes system-wide support for full screen applications. With Lion, you can enter full screen mode with just one click, switch from one full screen app to another with just a swipe of the track pad.  Control presents you with a unified view of every app and window running on your Mac, so you can instantly navigate anywhere.  Mission Control also incorporates the next generation of Exposé, presenting all the windows running on your Mac grouped by application, alongside thumbnails of full screen apps, Dashboard and other Spaces.  Launch pad, a new home for all of your Mac apps; system-wide support for full screen apps; and Mission Control, which unifies Expose, Dashboard, Spaces and full screen apps into an innovative new view of everything running on your Mac, and allows you to instantly navigate anywhere.

G.N.SAI DIVYA

II - MCA

43 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin:MCA DATE: 27.01.2011 Task Manager  The Windows Task Manager allows you to monitor the programs running on your PC and close them is needed.  It comes particularly in handy when a program completely stops responding or crashes.  To launch the Task Manager users press ctrl-alt-delete.  The Application tab will display a list of your currently running programs, and their respective status.  If you opened the Task Manager because a program stopped responding and you want to force it to close, highlight that program and select the End Task button.  The Processes tab is one of the most useful "utilities" that comes built into Windows.  It allows you to view all the running processes on your PC-both programs that you've started and applications that Windows requires.  If you notice that after your PC has been in use for a while it starts to slow down, a quick view of the Processes can help you understand why-and regain some of that lost zip.  Select the Mem Usage column title ant the processes will be sorted by their memory usage. Some programs suffer from a problem called "memory leaks".  Using the Task Manager you can determine if this has happened by sorting the processes by their memory usage.

B.KOWSIKA I - MCA

44 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin:MCA DATE:28.01.2011 PI4-WORKERBOT

 At first sight, the pi4-workerbot looks like a clump of metal, but there’s something extraordinary - it has fingertip sensitivity and a variety of facial expressions.  Designed by Dr Ing. Dragoljub Surdilovic at the Fraunhofer Institute for Production Systems and Design Technology IPK in Berlin, the pi4-workerbot is capable of complex movements and expressions.  The robot has three cameras - a 3D camera in its forehead that captures its general surroundings and two others used for inspection purposes.  ―It can measure objects or inspect a variety of surfaces. If you use two different cameras, it can inspect one aspect with its left eye, and another with its right,‖ said Matthias Krinke, managing director of pi4-Robotics.  ―This allows it to carry out new kinds of operations. These robots can transfer a work piece from one hand to the other,‖ said Surdilovic.  The researchers also endowed the robot with fingertip sensitivity.  If you set the strength of the grip correctly, it will take hold of an egg without cracking it.

C.SANGATHAMIL

II - MCA

45 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin:MCA DATE:28.01.2011 HONEYPOT (COMPUTING)  In computer terminology, a honeypot is a trap set to detect,deflect,or in some manner counteract attempts at unauthorized use of information system.

 Generally it consists of a computer,data,or a network site that appears to be part of a network,but is actually isolated and monitored,and which seems to contain information or a resource of value to attackers.

 A honeypot is valuable as a surveillance and early-warning tool.While it is often a computer,a honeypot can take other forms,such as files or data records,or even unused IP address space.

 One practical application of this is a honeypot that thwarts spam by masquerading as a type of system abused by spammers.These honeypots categorize trapped material 100% accurately:it is all illicit

 Honeypots can carry risks to a network,and must be handled with care.If they are not properly walled off,an attacker can use them to break into a sytem.  TYPES Production Honeypots Research Honeypots V.LOKESH I - MCA

46 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 31.01.2011

TOP EIGHT IT COMPANIES IN INDIA The CEO of tcs is Mr.Natarajan Chandrasekaran. Services: Outsourcing, BPO.

The present CEO wipro is Mr.Azim Premji. Services: Application Development and Maintenance, BPO, Product Engineering Solutions Technology, Infrastructure Services Consulting.

The CEO of infosys is Mr. Kris GopalaKrishnan,. Services: Information Technology, consulting services, solutions and outsourcing.

The CEO of satyam is A.S. murthi is the current ceo. Services: IT Services, IT consulting, Software services.

The CEO of I-flex is N.R.K Raman, Services: Application lifecycle management, financial services consulting, Business Transformation, Consulting,

TATA INFOTECH, Services: E-learning services and solutions.

The CEO of cmc is R. Ramanan. Consulting, IT, Outsourcing, BPO.

The CEO of Mphasis is Mr.Balu Ganesh Ayyar services: Information services.

R.A.SANKARAPANDIAN II - MCA

47 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 31.01.2011

Hackers turn back the clock with Telnet attacks

 A new report from Akamai Technologies shows that hackers appear to be increasingly using the Telnet remote access protocol to attack corporate servers over mobile networks.  Akamai, which specializes in managing content and Web traffic, issues quarterly reports on Internet traffic trends.  The latest report, which covers the third quarter of 2010, shows that 10% of attacks that came from mobile networks are directed at Port 23, which Telnet uses. That marks a somewhat unusual spike for the aging protocol.  Telnet is a remote access tool used to log into remote servers, but it has been gradually replaced by SSH, also known as Secure Shell.  Administrators are generally advised to disable Telnet if the protocol is not used to prevent attacks targeting it, but some forget.  Including all types of attack traffic sources, about 17% of attacks were directed at Telnet. Port 23 was "overwhelmingly the top targeted port for attacks" in Egypt, Peru and Turkey, Akamai said.  "It is not clear if there is a common thread that connects these three countries, nor whether these observed attacks were brute-force login attempts or some other botnet- related traffic," the report said.

B.MANICKAVANNAN I – MCA

48 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 01.02.2011

Wipro What started off as a hydrogenated cooking fat company, Wipro is today is a $5 billion revenue generating IT, BPO and R&D services organisation with presence in over 50 countries. Premji started Wipro with the 'idea of building an organisation which was deeply committed to values, in the firm belief that success in business would be its inevitable, eventual outcome'. The company has over 72,000 employees.

Wipro's revenues grew by 33 per cent to Rs 19,957 crore (Rs 200 billion) for the year ended March 31, 2008. The net profit grew by 12 per cent to Rs. 3,283 crore (Rs. 32.83 billion). The revenues of the combined IT businesses was $4.3 billion with 43 per cent YoY growth.

Wipro was the only Indian company to be ranked among the top 10 global outsourcing providers in IAOP's 2006 Global Outsourcing 100 listing. Wipro has also won the International Institute for Software Testing's Software Testing Best Practice Award.

Infosys Infosys Technologies Ltd was started in 1981 by seven people with $250. Today, the company boasts of revenues of over $ 4 billion and 94,379 employees. Under the leadership of N R Narayana Murthy, the company has become a global brand. The company is now headed by Kris Gopalakrishnan. V.SANTHOSH II - MCA

49 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 01.02.2011

USB FLASH DRIVE

 A USB flash drive consists of a flash memory data storage device integrated with a USB (Universal Serial Bus) interface.

 USB flash drives are typically removable and rewritable, and physically much smaller than a floppy disk.

 USB flash drives are often used for the same purposes as floppy disks or CD- ROMs.

 They are smaller, faster, have thousands of times more capacity, and are more durable and reliable because of their lack of moving parts.

 USB Flash drives use the USB mass storage standard, supported natively by modern operating systems such as Linux, Mac OS X, Windows, and other Unix-like systems.

 A flash drive consists of a small printed circuit board carrying the circuit elements.  They should not be confused with some look-alike music player devices that combine.  It requires a battery for the player function.  USB flash drives draw power from the computer via external USB connection.

M. MENAKA I - MCA

50 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 03.02.2011 AMPLITUBE UPDATE ADDS RECORDING FUTURE TO IPAD  The music software company released a major update to its AmpliTube for iPad app, highlighted by the addition of 8-track recording as well as the availability of new stompbox models.

 Plug your instrument into Apple’s tablet with a cable—IK Multimedia offers a $40 iRig adapter—and you can tap into a range of amplifiers and effects to customize your tone.

 Image Caption: AmpliTube 2 adds recording capabilities, including an 8-track recorder available as a $15 in-app purchase.

 A single track comes with the 2.0 update, with the option to expand the feature to an 8- track recorder with a master effects section via a $15 in-app purchase.

 IK Multimedia says that each track features a button for enabling recording, an insert effect, controls for volume and pan, solo and mute switches,

 and two send-effect level controls to add ambience and depth with reverb, chorus, and delay from the master effects section. There’s also a global equalizer and compressor in the master effects section to tweak your final sound.

 AmpliTube include the ability to import songs as backing tracks directly from the iPod library on your iPad or from a computer using file-sharing or Wi-Fi S.SARANYA II - MCA

51 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 03.02.2011 IRIS RECOGNITION

 Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes.  Not to be confused with another, less prevalent, ocular-based technology, retina scanning, iris recognition uses camera technology, with subtle infrared illumination reducing specular reflection from the convex cornea, to create images of the detail-rich, intricate structures of the iris.  Converted into digital templates, these images provide mathematical representations of the iris that yield unambiguous positive identification of an individual.  Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier (those who cannot use/enroll) group of all biometric technologies. A key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime.  Breakthrough work to create the iris-recognition algorithms required for image acquisition and one-to-many matching was pioneered by John G. Daugman, Ph.D, OBE (University of Cambridge Computer Laboratory).  These were utilized to effectively debut commercialization of the technology in conjunction with an early version of the IrisAccess system designed and manufactured by Korea's LG Electronics. Daugman's algorithms are the basis of almost all currently (as of 2006) commercially deployed iris-recognition systems.

C.MOGANA

I - MCA

52 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 05.02.2011

GIANT RING OF BLACK HOLES

 This composite image of Arp 147, a pair of interacting galaxies located about 430 million light years from Earth, shows X-rays from the NASA's Chandra X-ray Observatory (pink) and optical data from the Hubble Space Telescope (red, green, blue) produced by the Space Telescope Science Institute (STScI) in Baltimore, Md.  Arp 147 contains the remnant of a spiral galaxy (right) that collided with the elliptical galaxy on the left. This collision has produced an expanding wave of star formation that shows up as a blue ring containing in abundance of massive young stars.  These stars race through their evolution in a few million years or less and explode as supernovas, leaving behind neutron stars and black holes.  The nine X-ray sources scattered around the ring in Arp 147 are so bright that they must be black holes, with masses that are likely ten to twenty times that of the Sun.  An X-ray source is also detected in the nucleus of the red galaxy on the left and may be powered by a poorly-fed supermassive black hole.

D.SELVARAJ

II - MCA

53

KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 05.02.2011

AVAST ANTI-VIRUS

 Avast! is an antivirus program developed by AVAST Software a.s. (former ALWIL Software a.s.), a company based in Prague, Czech Republic. It was first released in 1988.  Antivirus kernel based on certified antivirus engine.  File System Shield — Real-time protection against viruses and other malware threats. Scans files as they run on your computer to keep viruses from being able to execute.  Mail Shield — Scans messages and attachments in E-mail/Microsoft Outlook/Exchange for viruses.  Web Shield — HTTP protection (local transparent proxy). Version 4.8 also allows the blocking of URLs. Scans URLs and incoming data for viruses, and aborts connections to the site if one is found.  P2P shield — Scans P2Pfiles from file share programs.  IM shield — Instant Messaging protection. (Scanning of files transferred through instant messaging applications) Virus Chest — Quarantine; folder where infected files can be stored. The virus chest also stores vital system files to protect them from damage by malware.

A.MUTHUKUMAR I - MCA

54 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 07.02.2011

DOC: 3D GAMING WON'T PERMANENTLY DAMAGE YOUR EYES

Dr. Mark Borchert  An L.A.-based ophthalmologist has said that prolonged exposure to 3D images in games consoles will not have any permanent adverse effects for adults and children over four years of age.  Eye scientist Dr. Mark Borchert has refuted claims that upcoming 3D technology for Sony's PlayStation 3 and Nintendo's 3DS will prove to be damaging for hardcore games players.  "It's not likely to cause any permanent harm to vision," he said to Gamasutra. He should know what he's talking about - the L.A.  Times ranked him as one of the best in the profession in the Southern California area last year.  "There are people who get uncomfortable with it, and get eyestrain or headaches, or on much rarer occasions, a sense of imbalance or nausea.  But there's no evidence it can cause permanent harm to your vision or use of both eyes together or anything like that." Music to Sony and Nintendo's collective ears, then. R.YASODHA II - MCA

55 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 07.02.2011

Software of Laser Printer

 MFPs also run a set of instructions from their internal storage, which is comparable to a computer's operating system.  Generally, as the size and complexity of an MFP increases, the more like a computer the device becomes. It is uncommon for a small AIO or even a SOHO MFP to use a general purpose operating system, however many larger MFPs run GNU/Linux or VxWorks  Additionally, many print controllers, separate, but integral to the MFP, also run computer operating systems, with GNU/Linux and Microsoft Windows (often Windows NT 4.0 Embedded, Windows XP Embedded).

On top of the core operating system and firmware, the MFP will also provide several functions, equivalent to applications or in some cases daemons or services.

 MFP Panel control for user input  Bytecode interpreters or virtual machines for internally hosted third party applications  Web server for remote management functions  Network service clients for sending of documents to different destinations  Network service ig functions  Raster image processing functions

K.MUTHUKUMAR I - MCA

56 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 08.02.2011

Tata Consultancy Services

The Indian software industry is set to keep up its growth rate despite the slowdown in the economy. The National Association of Software and Services Companies (Nasscom) has forecast a strong outlook for FY08-09 strong with software and services revenue seen growing by 21-24 per cent. The software and services exports are set to hit the $50 billion-mark.

The software and services exports segment grew by 29 per cent (in USD) to register revenues of $40.4 billion in FY07-08, up from $31.4 billion in FY06-07. The domestic segment grew by 26 per cent (in INR) to register revenues of $ 11.6 billion in FY07-08. According to the latest Nasscom rankings, Tata Consultancy Services Ltd., Infosys Technologies Ltd. and Wipro Technologies Ltd are the top 3 revenue generators in India.

TCS Founded in 1968, TCS is one of India's largest corporate houses. It is also India's largest IT employer with a staff strength of 111,000 employees.

The company began as a division of the Tata Group, called the Tata Computer Centre. Its main business was to offer computer services to other group companies. Soon the company was spun off as Tata Consultancy Services after it realised the huge potential of the booming IT services.

The company posted a consolidated net profit of Rs 1,290.61 crore (Rs 12.90 billion) for the first quarter ended June 30, 2008, an increase of 7.3 per cent compared to the year-ago period.

Its annual sales worldwide stands at $5.7 billion for the fiscal year ending March 2008. During the year 2007-08,TCS' consolidated revenues grew by 22 per cent to Rs 22,863 crore ($5.7 billion). S. Ramadorai, is the chief executive officer and managing director of TCS.

S.SATHYA II – MCA

57 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 08.02.2011

Cryptographic Algorithms

The conversion of data into a secret code for transmission over a public network. Its purpose is Confidentiality, Non-refutation, Integrity and verification. There is wide range of cryptographic algorithms in use.

DES : This is the 'Data Encryption Standard'. This is a cipher that operates on 64-bit blocks of data, using a 56-bit key. It is a 'private key' system.

HASH : A 'hash algorithm' is used for computing a condensed representation of a fixed length message/file. This is sometimes known as a 'message digest', or a 'fingerprint'..

MD5 : MD5 is a 128 bit message digest function. It was developed by Ron Rivest.

SHA-1 : It is a hashing algorithm similar in structure to MD5, but producing a digest of 160 bits. Because of the large digest size, it is less likely that two different messages will have the same SHA-1 message digest. For this reason it is recommended in preference to MD5.

D.MYTHILI

I - MCA

58

KONGU ARTS AND SCIENCE COLLEGE P.G DEPARTMENT OF COMPUTER SCIENCE ERODE-638107 News Bulletin: MCA DATE: 09.02.2011 Job Seaching Web Sites www.jobsDB.com www.financialjobs.com www.indiareference.com www.acsjobs.com www.Firmseekindia.com www.kempegowda.com www.acs4jobs.com www.go4careers.com www.jmjobs.com www.alltimesjobs.com www.globaljobsin.com www.jobs4it.com LIST OFCOMPANY MAIL SERVERS [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] N.SAKTHISARAVANAKUMAR II - MCA

59 KONGU ARTS AND SCIENCE COLLEGE P.G DEPARTMENT OF COMPUTER SCIENCE ERODE-638107 News Bulletin: MCA DATE: 09.02.2011 Hp Launches Cloud Services  Hp announced a suite of cloud enabled new products and services targeted at the government and enterprise customers.  The service titled Hp Hybrid Delivery comes as a part of the Instant-on-Enterprises strategy launched by Hp last year.  Hp Hybrid Delivery consists of HP Enterprises Cloud Services-Compute that Deliver ―private cloud as a service‖ from HP’s datacenters.  Governed by specified policies for service, performance, security and privacy, It provides clients with rapidly deployed, secure computing with scalable IT Capacity.  The service is built on HP’s converged infrastructure platform and HP Software.  Hp also announced HP cloud system as an integrated system to build, manage And consume services across private, public and hybrid cloud environments.  HP cloud system supports HP cloud maps, which provide preconfigured Service to automatically provision the optimized application and infrastructure resources.  Nedungadi claimed that the HP cloud system enables new cloud services to be Up and running in minutes.  HP is also organizing workshops called HP cloud discovery workshops to Educate government and enterprise customers. K.MYTHILI I - MCA

60

KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 11.02.2011

IBM Develops Denser, Faster Chip Memory

 IBM has developed a prototype of what the company claims is the smallest, densest and fastest on-chip memory, which could lead to higher performing electronics from servers to consumer gear.  IBM built the technology for use in next-generation 32-nanometer processors.  The embedded dynamic random access memory, or eDRAM, is integrated on the same die as a multi-core processor, instead of using external DRAM modules and transistor- based static random access memory, or SRAM, that's typically used for caches.  IBM built its eDRAM using 32-nm, silicon-on-insulator technology that protects the transistors on the chip with a "blanket" of insulation that reduces electrical leakage.  In comparing its eDRAM cell with 32-nm embedded SRAM, IBM says its technology is up to four times as dense, which means it can help produce smaller, more efficient processors that can process more data.  IBM claims its embedded memory is the fastest today, achieving latency and cycle times of less than 2 nanoseconds.

B.RAFFICRAJA

II - MCA

61 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 12.02.2011

Intel Desktop Board DP55KG Extreme Series

Features and Benefits

Support for the Intel® Core™ i7 and Intel® Core™ i5 processors in the LGA1156 package: Features Intel® Turbo Boost Technology3 and Intel® Hyper-Threading Technology4 for exceptional performance and scalability, and 8 MB Shared Intel® Smart Cache, enabling dynamic and efficient allocation of cache. Intel® P55 Express Chipset: Revolutionary new single chip increases routing space for additional onboard features and lowers power consumption. Dual-Channel DDR 3 1600 / 1333 / 1066 MHz memory support: Four DIMM slots support up to 16 GB5 memory connected directly to the processor via the Integrated Memory Controller. 4 One PCI Express 2.0 x4 slot, two PCI Express 2.0 x1 slots, and two PCI expansion slots: Flexibility to support PCI Express and legacy PCI devices. Eight SATA 3.0 GB/s ports, with two additional eSATA ports: Allows for a large addition of external mass storage using either single hard drives or SATA enclosures supporting port replication. 7

Six-phase improved voltage regulator: The addition of the CHiL* processor voltage regulator allows for improved power and voltage delivery to reach even better performance while running games and media applications.

V.RAGUVARAN

II - MCA

62 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 11.02.2011

BLU-RAY DISC

 It is an optical disc storage medium designed to supersede the DVD format.  The standard physical medium is a 12 cm plastic optical disc, the same size as DVDs and CDs.  Discs contain 25 GB per layer, with dual layer discs (50 GB) the norm for feature- length video discs and additional layers possible later.  A maximum data transfer rate of 36 Mbit/s, a maximum AV bitrate of 30.24 Mbit/s, and a maximum video bitrate of 29.4 Mbit/s.  Blu-ray Disc recordable" refers to two optical disc formats that can be recorded with an optical disc recorder.  BD-Rs can be written to once, whereas BD-REs can be erased and re-recorded multiple times.  The current practical maximum speed for Blu-ray Discs is about 12×. Higher speeds of rotation (10,000+ rpm).  Blu-ray equipment is encouraged to implement High-bandwidth Digital Content Protection (HDCP).  Given certain flags in the media streams, a Blu-ray Disc can enforce its reproduction in a lower resolution whenever a full HDCP-compliant link isn't established all the way from the Blu-ray drive to the rendering devices (i.e. display and speakers).

S.NITHYA

I – MCA

63 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 12.02.2011

SELF-RECONFIGURING ROBOTIC SYSTEMS

 Modular self-reconfiguring robotic systems or self-reconfigurable modular robots are autonomous kinematic machines with variable morphology.  Self-reconfiguring robots are also able to deliberately change their own shape by rearranging the connectivity of their parts, in order to adapt to new circumstances, perform new tasks.

 They can contain electronics, sensors, computer processors, memory, and power supplies; they can also contain actuators that are used for manipulating their location.

 A feature found in some cases is the ability of the modules to automatically connect and disconnect themselves to and from each other, and to form into many objects or perform many tasks moving or manipulating the environment.

 The ―self-reconfiguring‖ or ―self-reconfigurable is a mechanism or device is capable of utilizing its own system of control such as with actuators or stochastic means to change its overall structural shape.

 There are two basic types of methods of that self-reconfigurable mechanisms can utilize to reshape their structures, chain reconfiguration and lattice reconfiguration.

C .POOVIZHISELVI

I - MCA

64 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 14.02.2011

NANO ROBOTICS

 Nanorobotics is the emerging technology field of creating machines or robots Whose components are at or close to the microscopic scale of a nanometer (10-9 meters).  More specifically,nanorobotics refer to the nanotecnology engineering discipline of designing and building nanorobots,with devices ranging in size from 0.1-10.  Micrometers and constructed of nanoscale or molecular components the names nanobots,nanoids,nanites,nanomachines or nanomites have also been used to describe these device.  Currently under research and development Nanomachines are largely in the research – and-development phase,but some primitive molecular machines have been tested.  An example is a sensor having a switch approximately 1.5 nano meters across,capable of countings specfic molecules in a chemical sample.  The first useful applications of nanomachines might be in medical techonolgy which could be used to identify and destroy cancer cells.  Another potential application is the detection of toxic chemicals,and the measurement ot their concentrations,in the environment.  Recentily,Rice University has demonstrated a single-molecule car developed by a checmical process and including buckybull for wheels.

K.PREMALATHA I - MCA

65 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 15.02.2011

CYBER CRIME

 Computer crime, or cyber crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.  Government officials and Information Technology security specialists have documented a significant increase in Internet problems and server scans since early 2001.  But there is a growing concern among federal officials that such intrusions are part of an organized effort by cyber terrorists, foreign intelligence services, or other groups to map potential security holes in critical systems.  A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attack against computers, network, and the information stored on them.  Cyber terrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983).  As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyber terrorism.

K.PRIYADHARSHINI I – MCA

66 KONGU ARTS AND SCIENCE COLLEGE

P.G DEPARTMENT OF COMPUTER SCIENCE

ERODE – 638107

News Bulletin: MCA DATE: 17.02.2011

APPLICATIONS OF NANOTECHNOLOGY Diagnosis Nanotech chip can easily detect the disease in early stages and it can tell what exact stage of fatal disease like cancer is going on by scanning the human body cells. Drug delivery. Transfer of drug to the specific cells of human body suing Nano particles is another dynamic application of nanotechnology. Tissue engineering Nanotechnology also helps the surgeons and doctors for reproducing and repairing the damaged tissues. Applications in chemistry. Nanotechnology is used for exploring the chemical reactions in the field of chemistry many stimulation models are based on chemical reactions such as nuclear rector, robot power and many more. Aapplications in communication sector Present technologies in communication focuses on top to bottom but nanotechnology created change when made use of bottom up approach. Memory storage Memory storage before the advent of nanotechnology relied on transistors .but now reconfigurable arrays are formed for storing large amount of data in small space.

C.RAMESH I - MCA

67