Monday, March 30, 2009

Speed up ur Acrobat Reader


1. Go to the installation folder of acrobat reader
(C:\program files\adobe\acrobat\reader\.. whatever)

2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).

Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).Now your acrobat reader will load very fast and almost as good as notepad..

Monday, March 23, 2009

SWiSH Max

SWiSH Max is a program that utilises Adobe Flash technology to create cross-platform compatible presentations. It is developed and distributed by Swishzone.com Pty Ltd, based in Sydney, Australia.

SWiSH Max is a reasonably high power program that incorporates many features which give the application a wide scope of uses.SWiSH Max primarily outputs to the .swf format created by Adobe Systems (formerly Macromedia) for the purposes of displaying their content on the web within the parameters set by the W3C. SWiSH Max uses a variation of ActionScript for scripting.

SWISH Max works, in particular, to make use of objects, vector graphics, keyframes and scripting. It incorporates a number of automated effects and transitions, which make building certain Flash elements such as buttons, advanced transition effects and interactive Flash sites possible.

Monday, March 16, 2009

Buffer

A temporary storage area, usually in RAM. The purpose of most buffers is to act as a holding area, enabling the CPU to manipulate data before transferring it to a device.

Because the processes of reading and writing data to a disk are relatively slow, many programs keep track of data changes in a buffer and then copy the buffer to a disk. For example, word processors employ a buffer to keep track of changes to files. Then when you save the file, the word processor updates the disk file with the contents of the buffer. This is much more efficient than accessing the file on the disk each time you make a change to the file.

Note that because your changes are initially stored in a buffer, not on the disk, all of them will be lost if the computer fails during an editing session. For this reason, it is a good idea to save your file periodically. Most word processors automatically save files at regular intervals.

Buffers are commonly used when burning data onto a compact disc, where the data is transferred to the buffer before being written to the disc.

Monday, March 9, 2009

Multitier architecture

In software engineering, multi-tier architecture (often referred to as n-tier architecture) is a client-server architecture in which, the presentation, the application processing and the data management are logically separate processes. For example, an application that uses middleware to service data requests between a user and a database employs multi-tier architecture. The most widespread use of "multi-tier architecture" refers to three-tier architecture.

The concepts of layer and tier are often used interchangeably. However, one fairly common point of view is that there is indeed a difference, and that a layer is a logical structuring mechanism for the elements that make up the software solution, while a tier is a physical structuring mechanism for the system infrastructure.

Typically, the user interface runs on a desktop PC or workstation and uses a standard graphical user interface, functional process logic may consist of one or more separate modules running on a workstation or application server, and an RDBMS on a database server or mainframe contains the computer data storage logic. The middle tier may be multi-tiered itself (in which case the overall architecture is called an "n-tier architecture").

Monday, March 2, 2009

LexisNexis Data Breach

Classifications:

* Attack Method: Insufficient Anti-automation
* Country: USA
* Outcome: Leakage of Information
* Vertical: Information Services

The LexisNexis data breach is not new, but we have recently decided to start tracking abuse of insufficient automation measures and are adding historical incidents.

In this incident a group of people opened accounts at data broker LexisNexis and used automated tools to extract a large amount of personal information provided by the service.

As usual in such cases there is a question of whether the attack was a criminal activity, violation of the license agreement of the information provider or plainly legal. In this regard it is interesting to note that the group arrested in the incident was also responsible for the hacking to Paris Hilton Vodafone account, which was clearly an unlawful act.