tag:blogger.com,1999:blog-67521357466967193342024-02-14T22:48:14.626-08:00shortershriftrekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.comBlogger88125tag:blogger.com,1999:blog-6752135746696719334.post-76441182739476730792009-07-23T09:27:00.000-07:002009-07-23T09:43:32.537-07:00Mozilla Foundation<div style="text-align: justify;">The Mozilla Foundation is a non-profit organization that exists to support and provide leadership for the open source Mozilla project. The organization sets the policies that govern development, operate key infrastructure and control trademarks and other intellectual property. It owns two taxable for-profit subsidiaries: the Mozilla Corporation, which employs several Mozilla developers and coordinates releases of the <span style="font-weight: bold;">Mozilla Firefox web browser,</span> and <span style="font-weight: bold;">Mozilla Messaging</span>, Inc., which primarily develops the Mozilla Thunderbird email client. The Mozilla Foundation is based in the Silicon Valley city of Mountain View, California, USA.<br /><br />The Mozilla Foundation describes itself as "a <a href="http://en.wikipedia.org/wiki/Non-profit_organization"><span style="font-weight: bold;">non-profit organization</span></a> dedicated to preserving choice and promoting innovation on the Internet". <span style="font-weight: bold;">Mozilla Europe, </span>Mozilla Japan and Mozilla China are non-profit organizations whose mission is to help promote and deploy Mozilla products and projects. They are independent of, but affiliated with, the <span style="font-weight: bold;">Mozilla Foundation.</span><br /><br /><span style="font-weight: bold;">Mozilla Corporation</span><br /><br />On August 3, 2005, the Mozilla Foundation launched a wholly owned subsidiary called the Mozilla Corporation to continue the development and delivery of Mozilla Firefox and Mozilla Thunderbird. The Mozilla Corporation takes responsibility for release planning, marketing and a range of distribution-related activities. It also handles relationships with businesses, many of which generate income. Unlike the Mozilla Foundation, the Mozilla Corporation is a taxable entity, which gives it much greater freedom in the revenue and business activities it can pursue.<br /><br /><br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com1tag:blogger.com,1999:blog-6752135746696719334.post-63287999554701670462009-07-13T12:55:00.000-07:002009-07-13T13:06:29.975-07:00Web application Technology<span style="font-weight: bold; color: rgb(51, 204, 255);"><u>Server 50938</u></span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6UfnUHx_-keTMGxcdcFsiF6_6MHe_ioRMkQtSVgHZzDWwFz_9JEmECAw2O1980ubNpNF-8NOVlSjwhQvJIoajp77Mb6Wa0OTMMcpqz0Uinf2Z23rBAmMpv8ew3N6COhjLb9MamxQq5Oj4/s1600-h/image1.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 163px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6UfnUHx_-keTMGxcdcFsiF6_6MHe_ioRMkQtSVgHZzDWwFz_9JEmECAw2O1980ubNpNF-8NOVlSjwhQvJIoajp77Mb6Wa0OTMMcpqz0Uinf2Z23rBAmMpv8ew3N6COhjLb9MamxQq5Oj4/s200/image1.jpg" alt="" id="BLOGGER_PHOTO_ID_5358036477184544898" border="0" /></a><br /><span style="font-weight: bold; color: rgb(51, 204, 255);"><u>Global Media Technology World Sphere</u></span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvBDtO6Sxs-tH2RoSqjSMQ_N_mRYlIlD4kd8L8QguwWB16rNPwDZbz7fU0MIlyY4h4payLlxqoM5WyZ_hazm4iQHDBxSiT1q0HkP7mmR5Klr2R-R4Zr5lJJvM3zLs_FcYbMkZKVagPM-PL/s1600-h/image2.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 188px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvBDtO6Sxs-tH2RoSqjSMQ_N_mRYlIlD4kd8L8QguwWB16rNPwDZbz7fU0MIlyY4h4payLlxqoM5WyZ_hazm4iQHDBxSiT1q0HkP7mmR5Klr2R-R4Zr5lJJvM3zLs_FcYbMkZKVagPM-PL/s200/image2.jpg" alt="" id="BLOGGER_PHOTO_ID_5358036470370440306" border="0" /></a><br /><span style="font-weight: bold; color: rgb(51, 204, 255);"><u>Icon Button Set For Navigation</u></span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicSaEhTEf7KnVrk1J45MNg8UxwZYnaqYOvk8vtVqcl0FlD3NWKO89-4M1oxSCRZXc8STwEQJ8K2DTNKVQyH9Zgj_tuzngDpGsjmHPQp77ciO3ob3_KeNztdmFoMH0teG7viGuOoenfnzqP/s1600-h/image3.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 170px; height: 141px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicSaEhTEf7KnVrk1J45MNg8UxwZYnaqYOvk8vtVqcl0FlD3NWKO89-4M1oxSCRZXc8STwEQJ8K2DTNKVQyH9Zgj_tuzngDpGsjmHPQp77ciO3ob3_KeNztdmFoMH0teG7viGuOoenfnzqP/s200/image3.jpg" alt="" id="BLOGGER_PHOTO_ID_5358036466655036402" border="0" /></a><br /><span style="font-weight: bold; color: rgb(51, 204, 255);"><u>Background, Business, Businessman, Caucasian, Cellphone</u></span><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhk-vh9X4jrf2NmEzOKMCBgew2LebttBNcINn1u1xPtE6kOPUm0xDbcFrlYh_4sbg1e9xKWfm9wxeW-LKbO2Palg-iidKrhoKr7OWH1E39PjoguCCSruF6JYLuTWGotSTtyHlG_v_o8S3eN/s1600-h/image4.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 188px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhk-vh9X4jrf2NmEzOKMCBgew2LebttBNcINn1u1xPtE6kOPUm0xDbcFrlYh_4sbg1e9xKWfm9wxeW-LKbO2Palg-iidKrhoKr7OWH1E39PjoguCCSruF6JYLuTWGotSTtyHlG_v_o8S3eN/s200/image4.jpg" alt="" id="BLOGGER_PHOTO_ID_5358036461572731618" border="0" /></a><br /><span style="font-weight: bold; color: rgb(51, 204, 255);"><u>The internet shorthands</u></span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD_d0XStZZHgZmbVjecVIAbje6Ocuvhbsb9mYccN_LlfX9s6PXdg7HeqJe30hvuPIsR6TZcDCIPAc3j9vAy1Bd_N4cec-CqG9PsZIGifwFj4aArb5WQXRNvKWwfT6oNUu0T-i9dX2hIcOy/s1600-h/image5.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 144px; height: 170px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD_d0XStZZHgZmbVjecVIAbje6Ocuvhbsb9mYccN_LlfX9s6PXdg7HeqJe30hvuPIsR6TZcDCIPAc3j9vAy1Bd_N4cec-CqG9PsZIGifwFj4aArb5WQXRNvKWwfT6oNUu0T-i9dX2hIcOy/s200/image5.jpg" alt="" id="BLOGGER_PHOTO_ID_5358036458853657586" border="0" /></a>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-86229746241375166332009-07-07T17:41:00.000-07:002009-07-07T17:43:24.441-07:00Hacker breaks into Ecuador’s presidential website<div style="text-align: justify;">Quito, Feb 11 (IANS) An investigation has been launched to find the hacker who broke into the website of Ecuador’s presidential office while it was undergoing maintenance, senior officials have said.<br /><br />“Unscrupulous persons managed to enter the website and leave messages that had nothing to do with the <span style="font-weight: bold;">national government,</span>” said <span style="font-weight: bold;">Carlos Medina</span>, a member of the presidential communications office, Spain’s EFE news agency reported Monday.<br /><br />The unidentified hacker entered the presidential website Saturday.<br /><br />“We are currently conducting the necessary investigations to find out who was responsible,” Medina said.<br /><br />According to media reports, the message left by the hacker on the presidential website expressed support for Ecuador’s President <span style="font-weight: bold;">Rafael Correa </span>and condemned corruption on the part of Jaime Nebot, the best-known opposition leader and mayor of Guayaquil, the largest and most populous city in the country.<br /><br />However, the authorities quickly clarified that the message which appeared on the website did not represent the views of the government.<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-48280618273030484962009-06-29T10:46:00.000-07:002009-06-29T10:52:47.550-07:00Web Application Security Consortium<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjub3G-DQ9rPvMyWEw2lt2VV_jtF_yso5c1gAgwR7sBwVzrP-AbPW6hi2c-3vp_mnW0tg0vlpSE12abXGkU_UAghEKtl0VAsEDUgErUPPkLcZFMLfjOGCoNEURmlp2tQjJaB9PIe2UvGdHf/s1600-h/webdefend_overview.gif"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px; height: 133px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjub3G-DQ9rPvMyWEw2lt2VV_jtF_yso5c1gAgwR7sBwVzrP-AbPW6hi2c-3vp_mnW0tg0vlpSE12abXGkU_UAghEKtl0VAsEDUgErUPPkLcZFMLfjOGCoNEURmlp2tQjJaB9PIe2UvGdHf/s200/webdefend_overview.gif" alt="" id="BLOGGER_PHOTO_ID_5352808833976756114" border="0" /></a><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CUsers%5CSYSTEM%7E2%5CAppData%5CLocal%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman";} span.bodytext {mso-style-name:bodytext;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="MsoNormal" style="margin-bottom: 12pt; text-align: justify;"><span class="bodytext">It can be Web Application Security Consortium (WASC) is in search of contributed 'Guest Articles' by industry professionals on the latest in trends, techniques, defenses, best practices and lessons learned relevant to the field of web application security.</span>
<br />
<br /><span class="bodytext">The value of web application security has very much increased in recent years due to the exponential increase in threats plaguing the application layer of the network. To properly protect systems from application-level attacks, the understanding of today's issues has never been more critical. It's imperative the industry work together by sharing first-hand experiences to combat the growing number of issues. Your contributed articles will assist in the advancement of the field of web application security and the education of the issues we all face.</span>
<br />
<br /><span class="bodytext">Contributed articles may include industry best practices, technical information about current issues, innovative defense techniques, etc. NO VENDOR PITCHES OR MARKETING GIMMICKS PLEASE. We are only soliciting concrete information from the experts on the front lines of the web application security field.</span>
<br />
<br />Goals & Objectives provide a venue for the information security community to publish and obtain up-to-date web security content.
<br />
<br />Our readers are very important to WASC. The readers come from a wide range of professional backgrounds and have a high expectation for quality educational material. As such, WASC contributed articles are not to be used as a venue for marketing purposes. Articles are assumed op-ed; they should be succinct, and direct while presenting details and solutions.<o:p></o:p></p> <p class="MsoNormal"><o:p> </o:p></p> rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com1tag:blogger.com,1999:blog-6752135746696719334.post-52666689627462611742009-06-22T08:51:00.000-07:002009-06-22T09:38:25.316-07:00Web Security Mailing List<div style="text-align: justify;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxQBj6xu-QF4n09YhNoX85Fzsl64ew50JJz0-uxS87frxQV2ZyZHGVItztJgV0A8ZgZVMtUpKcbFyERADag3HcclvigzF4JcLx1nwjA8nCLeAZ1DuL6gLd5bqb9rPajDHDr8WX7RH-IYuh/s1600-h/Ecosystem.gif"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxQBj6xu-QF4n09YhNoX85Fzsl64ew50JJz0-uxS87frxQV2ZyZHGVItztJgV0A8ZgZVMtUpKcbFyERADag3HcclvigzF4JcLx1nwjA8nCLeAZ1DuL6gLd5bqb9rPajDHDr8WX7RH-IYuh/s200/Ecosystem.gif" alt="" id="BLOGGER_PHOTO_ID_5350192121382008210" border="0" /></a>Web Security Mailing List is an open information discussion for discussing topics applicable to web security. Topics include, but are not limited to, industry news and technical discussions hard by web applications, proxies, honey pots, new attack types, methodologies, application firewalls, discoveries, experiences, web servers, application servers, database security, tools, solutions, and others.<br /></div><div style="text-align: justify;"><br />The Web Security Mailing List is maintained by the Web Application Security Consortium (WASC)<br /><br />The Web Application Security Consortium <a href="http://www.webappsec.org/lists/websecurity/">(WASC)</a> is an international group of experts, industry practitioners, and organizational representatives who produce open source and widely agreed upon best-practice security standards for the World Wide Web.<br /><br />As an active community, WASC facilitates the exchange ideas and organizes several industry projects. WASC consistently releases technical information, contributed articles, security guidelines, and other useful documentation. Businesses, educational institutions, governments, application developers, security professionals, and software vendors all over the world utilize our materials to assist with the challenges presented by web application security.<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-81537808390118210082009-06-15T10:00:00.001-07:002009-06-15T10:16:04.992-07:00File Server Application<div style="text-align: justify;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuf_hoo-eBCkPSkFMGw-d-vyW2bYsk0nnMzIGd6htrlc3Npp9IgW75_HLV9uz4MR817MK5zd1cryOeiKc8ZXjEAmuY_jRjXMy7J0bKEjkNnkTtelMTBE5usfFqFm4a9laVYKcc8onoWFho/s1600-h/FileServer1.gif"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 265px; height: 318px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuf_hoo-eBCkPSkFMGw-d-vyW2bYsk0nnMzIGd6htrlc3Npp9IgW75_HLV9uz4MR817MK5zd1cryOeiKc8ZXjEAmuY_jRjXMy7J0bKEjkNnkTtelMTBE5usfFqFm4a9laVYKcc8onoWFho/s200/FileServer1.gif" alt="" id="BLOGGER_PHOTO_ID_5347601972133906066" border="0" /></a>In computing, a file server is a computer attached to a network that has the primary purpose of providing a location for the shared storage of computer files (such as documents, sound files, photographs, movies, images, databases, etc.) that can be accessed by the workstations that are attached to the computer network. The term server highlights the role of the machine in the client-server scheme, where the clients are the workstations using the storage. A file server is usually not performing any calculations, and does not run any programs on behalf of the clients. It is designed primarily to enable the rapid storage and retrieval of data where the heavy computation is provided by the workstations.<br /><br /><span style="font-weight: bold;">History of file servers</span><br /><br /><div style="text-align: justify;">In the mid-1980s enterprises became increasingly interested in ways to connect a rapidly growing population of personal computers. Novell proposed an approach using software to connect each workstation to a network file server that would manage both the network and access to network resources. At the same time 3Com Corporation was creating Ethernet adapter cards, building hardware connectivity needed for such approach.<br /><br />Novell grew upon the strength of its Netware operating system, used for file serving, and by the late 1980s had a 50% market share of local area networks. Seeing the potential growth in this arena IBM and Microsoft both introduced their own file server strategies.<br /><br />Twenty years after its peak, Novell and 3Com have virtually disappeared from the Server market; today disk servers (a NAS or a SAN) supplied by one of the leading vendors such as EMC or NetApp are typically attached to a file server running the Microsoft Windows or Linux operating systems. Large data centers, that serve millions of customers (such as Google's), run server farms on specialized equipment with large, complex operating systems.<br /><br /><br /><br /><br /><br /><br /><br /></div><br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-70584594578756826452009-06-04T08:47:00.000-07:002009-06-13T02:25:29.613-07:00Server application<div style="text-align: justify;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLVFmELEDSSVD4xn9I9Hie1jDrgE2mS6eUMP6Cz1_Qp7wE2kALrviEqiOQD0cI92UU_dzdH6rFxu6vgu3FbbY_N88TFfUH1NXUKazsafD7Ss3bRhq0ifyVst9OtyERUVIVpVDZkrzqSjtY/s1600-h/server1.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px; height: 133px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLVFmELEDSSVD4xn9I9Hie1jDrgE2mS6eUMP6Cz1_Qp7wE2kALrviEqiOQD0cI92UU_dzdH6rFxu6vgu3FbbY_N88TFfUH1NXUKazsafD7Ss3bRhq0ifyVst9OtyERUVIVpVDZkrzqSjtY/s200/server1.jpg" alt="" id="BLOGGER_PHOTO_ID_5343504366648225986" border="0" /></a>A server is any arrangement of hardware or software designed to present services to clients. When used alone, the term typically refers to a computer which may be running a server operating system, but is commonly used to refer to any software or committed hardware capable of providing services.<br /><br /><span style="font-weight: bold;">Usage</span><br /><br />The word server is used quite generally in information technology. Consider the multi platform software known as the <span style="font-weight: bold;">"Apache HTTP Server"</span>. This software runs on many modern computers which may not normally be called servers (like laptops for instance), but the host computer is also a server. particularly, the combination of the<br />Hardware computer and the Apache software can be called a web server.<br /><br />Inside the hardware sense, the word server classically designates computer models intended for running software applications under the heavy demand of a network surroundings. In this client-server configuration one or more machines, either a computer or a computer appliance, share information with each other with one acting as a host for the other.<br /><br />While nearly any personal computer is skilled of acting as a network server, a committed server will contain features making it more suitable for production environments. These features may include a faster CPU, increased high-performance RAM, and typically more than one large hard drive. More obvious distinctions include marked redundancy in power supplies, network connections, and even the servers themselves.<br /><br />Among the 1990s and 2000s an increase in the use of dedicated hardware saw the arrival of self-contained server appliances. One well-known creation is the Google Search Appliance, a unit which combines hardware and software in an out-of-the-box packaging. Simpler examples of such appliances include switches, routers, gateways, and print server, all of which are available in a near plug-and-play configuration.<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-9027101117814652992009-05-29T09:56:00.000-07:002009-05-29T10:44:31.642-07:00Object animation<div style="text-align: justify;"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 216px; height: 224px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbSmoaLO6F-3bsgWpR04kH2_zbmb7AFSXVu7Rk6tXSGpJ_y7j5Eg7lw751blZeKPifx5-rxd5pXHYuiMNuDfDM35jQdrDxbljYMkEPb1bCQW26ZZG30TCLznLWtFFtvX0U-xS2QhzyJ1wz/s200/Object+animation.jpg" alt="" id="BLOGGER_PHOTO_ID_5341303070388075394" border="0" />Object animation is a form of end movement animation that involves the animated movements of any non-drawn objects such as toys, blocks, dolls, etc. which are not fully malleable, such as clay or wax, and not planned to look like a identifiable human or animal nature.<br /></div><div style="text-align: justify;"><div style="text-align: justify;"><br />Object animation is measured a different form of animation distinct from model animation and puppet animation, as these two forms of stop-motion animation usually use recognizable characters as their subjects, rather than just objects like static toy soldiers, or construction toys such as Tinker Toys, LEGO brand bricks (Brick film), Lincoln Logs, Erector Sets, Play Mobil, etc.<br /></div><br />Object animation is frequently combined with other forms of animation, usually for a more realistic effect (e.g., Model Animation or Puppet Animation to add more complex movement or depth to the characters). For example; A toy car can be animated, but is more often animated with a character easily seen driving the car.<br /><br />An example of present object animation can be seen on Robot Chicken, part of the regular Adult Swim block on the Cartoon Network, which combines object animation with a variation of puppet animation, in this case the puppets are made to resemble plastic action figures from various TV shows, movies, and pop culture.<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-34745595691876050022009-05-20T14:46:00.000-07:002009-05-20T17:19:20.658-07:00Traditional animation<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguLxPmoH_bpvdQaEYmK_N2FkSadVVVEovkEnIEBQaHAzns60Ab8fGBWa_bZo457kFdKA0qAvyT9rjHK2Ak9UMWHyQsrFWWnio8VPqLJ6X9yidFkcQEy7zgfAnK-sDLyIFTJABAZE3j0xKd/s1600-h/Animhorse.gif"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px; height: 150px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguLxPmoH_bpvdQaEYmK_N2FkSadVVVEovkEnIEBQaHAzns60Ab8fGBWa_bZo457kFdKA0qAvyT9rjHK2Ak9UMWHyQsrFWWnio8VPqLJ6X9yidFkcQEy7zgfAnK-sDLyIFTJABAZE3j0xKd/s200/Animhorse.gif" alt="" id="BLOGGER_PHOTO_ID_5338026782425888866" border="0" /></a><br /><div style="text-align: justify;">Traditional animation was the process used for most animated films of the 20th century. The individual frames of a traditionally animated film are photographs of drawings, which are first drawn on paper. To create the illusion of movement, each drawing differs slightly from the one before it. The animators' drawings are traced or photocopied onto transparent acetate sheets called cels, which are filled in with paints in assigned colors or tones on the side opposite the line drawings. The completed character cels are photographed one-by-one onto motion picture film against a painted background by a rostrum camera.<br /><br />The traditional cel animation process became obsolete by the beginning of the 21st century. Today, animators' drawings and the backgrounds are either scanned into or drawn directly into a computer system. Various software programs are used to color the drawings and simulate camera movement and effects. The final animated piece is output to one of several delivery mediums, including traditional 35 mm film and newer media such as digital video. The "look" of traditional cel animation is still preserved, and the character animators' work has remained essentially the same over the past 70 years. Some animation producers have used the term "tradigital" to describe cel animation which makes extensive use of computer technology.<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-17677900805843570552009-05-11T13:18:00.000-07:002009-05-11T14:02:41.569-07:00custom web application development<div style="text-align: justify;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPMN7zuNbk-dOTy1ys72xx-RXTJ8rNbopy8_SO8Wwvm-yVRU7BGtCcaWv04_k8F8MqA9Z2dWno6nluBmUPk9mzTXk2U4Il8ix2DYMLgffCML2X6EIdCbhY1G8VUC9EHdscCQhQeW8P5B_I/s1600-h/venkat.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPMN7zuNbk-dOTy1ys72xx-RXTJ8rNbopy8_SO8Wwvm-yVRU7BGtCcaWv04_k8F8MqA9Z2dWno6nluBmUPk9mzTXk2U4Il8ix2DYMLgffCML2X6EIdCbhY1G8VUC9EHdscCQhQeW8P5B_I/s200/venkat.jpg" alt="" id="BLOGGER_PHOTO_ID_5334674537042645778" border="0" /></a><br /><br />Webworld Experts can develop customized web applications that are more useful than just a nice looking websites and customize the web applications to guarantee quality, competence and rapid development. Our web application development team brings experience in virtually all major platforms and environments to your custom applications.We can develop powerful web applications customized with features such as content management, shopping carts, forums, affiliate management, add/banner management, and much more.<br /><br />We believe that clearly defined purpose and a careful planning are the keys to successful web application design and development, particularly when work is being done by a web application development team.After successful web application development and delivery of the project, as an after sale service offer, we also provide maintenance and minor changes of the web application at no cost. It is something which distinguishes us from other web development firms, and thus helps us deliver custom website solutions to all our customers.<br /><br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com1tag:blogger.com,1999:blog-6752135746696719334.post-26163271124494055022009-05-04T21:56:00.000-07:002009-05-04T21:58:22.549-07:00Pesticide Disposal<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-pd93uDZtqeefYxkHO_nztsqKJWU7W2Stl6xmvzWvjlZFdqiQzGVJQlKZiqaganPCztKpitWkN6UKMWJNHKcNnXQLCTJWI-og3eMFbrUFJsHgAVCUiLOiS3EBWO_LQDY00VcjgVdd2gJ-/s1600-h/155.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 200px; height: 137px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-pd93uDZtqeefYxkHO_nztsqKJWU7W2Stl6xmvzWvjlZFdqiQzGVJQlKZiqaganPCztKpitWkN6UKMWJNHKcNnXQLCTJWI-og3eMFbrUFJsHgAVCUiLOiS3EBWO_LQDY00VcjgVdd2gJ-/s200/155.jpg" alt="" id="BLOGGER_PHOTO_ID_5332199688449269714" border="0" /></a><br /><p><span style="font-size:85%;"><span style="font-family:verdana,arial;">How to get rid of excess or unused pesticides, fungicides, rodenticides, and herbicides.</span></span></p><p><span style="font-size:85%;"><span style="font-family:verdana,arial;"><strong>Summary of Federal Requirements</strong></span></span></p> <p> <span style="font-size:85%;"><span style="font-family:verdana,arial;">Waste or excess pesticides must be disposed of as either hazardous waste or universal waste. </span></span></p><p> <span style="font-size:85%;"><span style="font-family:verdana,arial;">Disposal as a universal waste is only possible if they are pesticides that are either: </span></span></p><ol><span style="font-size:85%;"><span style="font-family:verdana,arial;"><li> recalled pesticides that are stocks of a suspended and canceled pesticide that are a part of a voluntary or mandatory recall under FIFRA Section 19(b), including, but not limited to, those owned by the registrant responsible for conducting the recall, </li><li> the total amount of the restricted-use pesticide that was applied<br /></li><li> recalled pesticide that are stocks of suspended or canceled pesticides, or a pesticide that is not in compliance with FIFRA, that are part of a voluntary recall by the registrant, or<br /></li><li>stocks of other unused pesticide products that are collected and managed as a part of a waste pesticide collection. </li></span></span></ol>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-9270592432197699842009-05-04T13:32:00.000-07:002009-05-04T13:51:24.319-07:00FotoVision Web Application<div style="text-align: left;"><span style="font-weight: bold;">Different pages on the website</span><br /></div><br /><div style="text-align: center;"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 335px; height: 327px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcWRqsEFmIQWS-WuEX2dWItJXT-uW1v9i9bha3pkrZWWXfxiCeC2XmLPUqrAYqPZA4Xs8y-PATixEdMkNjWmeDo9RWxZNjthJXHDw5347Rxo9W9hEIcF7hZczbKOW4tizJ57kqnCMlb19n/s200/web.png" alt="" id="BLOGGER_PHOTO_ID_5332070154124341410" border="0" /><br /></div><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><span style="font-weight: bold;">Web Application Overview</span><br /><br /><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 335px; height: 327px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivihq_rOJgVsiHqCc-J0ViTZ_3dT84RLDKObKVDUfHDi4GtF1nBQxBmrMGKGjVopHZet0lH4JEffz5K1Tj0omT1qNETYQOfnNKH2E6bWu2Q1HZ_p3Y-8EX1ugWcjUGr7ZwTK26R0yAZ4Vm/s200/web3.png" alt="" id="BLOGGER_PHOTO_ID_5332071711799465570" border="0" /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><span style="font-weight: bold;">FotoVision Overview</span><br /><br /><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 335px; height: 327px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjr7tlBudp8pOhbVNOIa4Pv9Z5HmCxyIoKA_ZZ7uRoPWvwGYhYMa85_B1Ksy27j0R6avu_wXBcdiVZ7OS-k9WhcbFAit44ZTMWrShON7r3Zuf0cCVQE3xTXzb4NhD3-b-grvgfi1A5UbWTi/s200/web2.png" alt="" id="BLOGGER_PHOTO_ID_5332073016223132610" border="0" />rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-57605817888914562602009-04-27T09:18:00.000-07:002009-04-27T09:26:37.750-07:00Slideshow<img style="margin: 0pt 10px 10px 0pt; cursor: pointer; width: 298px; height: 225px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiySFV68jEpxSaX08b7eH_BCyrohV9Ek2PwJgHK2-qe8Yr0ndDT8U-M-ti7wLTqitUME9u3gr94yUPkEB6IjQoozp8nyFlWmsyzA1JILY5dlzbOQOWbJFZ7PRyEgkl5AA0yLbJZ_iXARurA/s200/mx.jpg" alt="" id="BLOGGER_PHOTO_ID_5329406897801953234" border="0" /><br /><br /><div style="text-align: justify;">The Slideshow is a modern concatenation of "Slide Show". A slideshow is a display of a series of chosen images, which is done for artistic or instructional purposes. When Slideshows conducted by a presenter using an apparatus, such as a carousel slide projector, an overhead projector or in more recent years, a computer running presentation software. The term originates from the use of slides which have been around for many years. Slides originally were projected on movie theater screens by magic lanterns as part of the program of early moving picture shows.<br /><br />A well organized slideshow allows a presenter to lend visual images to an oral presentation. The old adage "A picture is worth a thousand words" holds true, in that a single image can save a presenter from speaking a paragraph of descriptive details. As with any public speaking or lecturing, a certain amount of talent, experience, and rehearsal is required to make a successful slideshow presentation.<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-71430818888788744772009-04-15T10:22:00.000-07:002009-04-15T13:28:51.224-07:00Web operating system<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtUng0Tev_VwFNt3mf1LcGekO4Q01ZOnZKrf6wTKtRCYDeCQzzD5XccDYp9AelT4rqbA5FUH0tIgcAJ-mZ8vWjlzkzux8RjM8UsxZahoo9U1TZnELttQuu8HgE6SbZf1UdkZZfxN9xXEYJ/s1600-h/WebOS03.png"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 385px; height: 254px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtUng0Tev_VwFNt3mf1LcGekO4Q01ZOnZKrf6wTKtRCYDeCQzzD5XccDYp9AelT4rqbA5FUH0tIgcAJ-mZ8vWjlzkzux8RjM8UsxZahoo9U1TZnELttQuu8HgE6SbZf1UdkZZfxN9xXEYJ/s200/WebOS03.png" alt="" id="BLOGGER_PHOTO_ID_5325016821812224354" border="0" /></a><br /><div style="text-align: justify;"><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />In metacomputing, WebOS and Web operating system are terms that describe network services for internet scale distributed computing, as in the WebOS Project at UC Berkeley, and the WOS Project. In both cases the scale of the web operating system extends across the internet, like the web.<br /><br />However, the terms WebOS and Web operating system have been employed more broadly and with far greater popularity in the context of "the web as in HTTP", and for many meanings ranging from singular systems to collections of systems. In April 2002, Tim O'Reilly spoke of "the emergent Internet operating system" as an open collection of Web services.<br /><br />Common to uses for collections of systems, a Web operating system is distinct from Internet operating systems in that it is independent of the traditional individual computer operating system. This conception of the system reflects an evolution of research in the field of operating systems into the increasingly minimized (for example, TinyOS and Exokernel) and distributed (for example, Inferno), and for distributed systems increasingly defined in terms of the specification of their network protocols more than their implementations (for example, Plan9's 9P).<br /><br /><br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-37365502874508353952009-04-06T08:28:00.000-07:002009-04-06T08:35:05.166-07:00HTTP cookies<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMBtfo2IEBkPPpJ1dC8f51jipBEgdiQYRM0YUbK4W2spR5PsgxXD0xDAuxzB_tzYSoSaqQGSbaZToXuSWSL957wmWPk8AyvcywA00DbZGrUnujyNlFLVnJzQl-_eY_wviSyKehlpTzHhOh/s1600-h/cookies.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 283px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMBtfo2IEBkPPpJ1dC8f51jipBEgdiQYRM0YUbK4W2spR5PsgxXD0xDAuxzB_tzYSoSaqQGSbaZToXuSWSL957wmWPk8AyvcywA00DbZGrUnujyNlFLVnJzQl-_eY_wviSyKehlpTzHhOh/s320/cookies.gif" alt="" id="BLOGGER_PHOTO_ID_5321602280909033346" border="0" /></a><br /><div style="text-align: justify;">HTTP cookies (also referred to as Web cookies, tracking cookies, or cookies) are small text files containing a user's settings and other data used by websites, and are stored on the user's computer. They are transmitted as parcels of text sent by a server to a Web client (usually a browser) and then sent back unchanged by client each time it accesses that server. HTTP cookies are used for authenticating, session tracking (state maintenance), and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts.<br /><br />The term "<a href="http://en.wikipedia.org/wiki/HTTP_cookie">cookie</a>" is derived from "magic cookie," a well-known concept in UNIX computing which inspired both the idea and the name of HTTP cookies. Some alternatives to cookies exist, but each has its own uses, advantages, and drawbacks.<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-73512172905306041052009-03-30T09:09:00.000-07:002009-03-31T08:15:19.360-07:00Speed up ur Acrobat Reader<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.troop927.com/newweb/img/acrobat-reader.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 300px; height: 244px;" src="http://www.troop927.com/newweb/img/acrobat-reader.jpg" border="0" alt="" /></a><br /><div style="text-align: justify;">1. Go to the installation folder of acrobat reader<br /></div>(C:\program files\adobe\acrobat\reader\.. whatever)<br /><br />2. Move all the files and folders from the "<a href="http://hack2007.50webs.com/Speed_Up_Acrobat_Reader.htm">plugins</a>" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).<br /><br />Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).Now your acrobat reader will load very fast and almost as good as <a href=" http://reazonozaer.blogspot.com/">notepad</a>..rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-51087401838116116762009-03-23T08:02:00.000-07:002009-03-30T09:06:30.129-07:00SWiSH Max<div style="text-align: justify;">SWiSH Max is a program that utilises Adobe Flash technology to create cross-platform compatible presentations. It is developed and distributed by Swishzone.com Pty Ltd, based in Sydney, Australia.<br /></div><br /><div style="text-align: justify;">SWiSH Max is a reasonably high power program that incorporates many features which give the application a wide scope of uses.SWiSH Max primarily outputs to the .swf format created by Adobe Systems (formerly Macromedia) for the purposes of displaying their content on the web within the parameters set by the W3C. SWiSH Max uses a variation of ActionScript for scripting.<br /></div><br />SWISH Max works, in particular, to make use of objects, vector graphics, keyframes and scripting. It incorporates a number of automated effects and transitions, which make building certain Flash elements such as buttons, advanced transition effects and interactive Flash sites possible.rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-80121029104803771802009-03-16T15:29:00.000-07:002009-03-17T15:34:53.797-07:00Buffer<div style="text-align: justify;">A temporary storage area, usually in RAM. The purpose of most buffers is to act as a holding area, enabling the CPU to manipulate data before transferring it to a device.<br /></div><br />Because the processes of reading and writing data to a disk are relatively slow, many programs keep track of data changes in a buffer and then copy the buffer to a disk. For example, word processors employ a buffer to keep track of changes to files. Then when you save the file, the word processor updates the disk file with the contents of the buffer. This is much more efficient than accessing the file on the disk each time you make a change to the file.<br /><br />Note that because your changes are initially stored in a buffer, not on the disk, all of them will be lost if the computer fails during an editing session. For this reason, it is a good idea to save your file periodically. Most word processors automatically save files at regular intervals.<br /><br />Buffers are commonly used when burning data onto a compact disc, where the data is transferred to the buffer before being written to the disc.rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-13867362086698506402009-03-09T09:30:00.000-07:002009-03-09T09:31:33.499-07:00Multitier architecture<div style="text-align: justify;">In software engineering, multi-tier architecture (often referred to as n-tier architecture) is a client-server architecture in which, the presentation, the application processing and the data management are logically separate processes. For example, an application that uses middleware to service data requests between a user and a database employs multi-tier architecture. The most widespread use of "multi-tier architecture" refers to three-tier architecture.<br /><br />The concepts of layer and tier are often used interchangeably. However, one fairly common point of view is that there is indeed a difference, and that a layer is a logical structuring mechanism for the elements that make up the software solution, while a tier is a physical structuring mechanism for the system infrastructure.<br /><br />Typically, the user interface runs on a desktop PC or workstation and uses a standard graphical user interface, functional process logic may consist of one or more separate modules running on a workstation or application server, and an RDBMS on a database server or mainframe contains the computer data storage logic. The middle tier may be multi-tiered itself (in which case the overall architecture is called an "n-tier architecture").<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-25046889945604464432009-03-02T13:47:00.000-08:002009-03-02T13:48:33.841-08:00LexisNexis Data BreachClassifications:<br /><br /> * Attack Method: Insufficient Anti-automation<br /> * Country: USA<br /> * Outcome: Leakage of Information<br /> * Vertical: Information Services<br /><br />The LexisNexis data breach is not new, but we have recently decided to start tracking abuse of insufficient automation measures and are adding historical incidents.<br /><br />In this incident a group of people opened accounts at data broker LexisNexis and used automated tools to extract a large amount of personal information provided by the service.<br /><br />As usual in such cases there is a question of whether the attack was a criminal activity, violation of the license agreement of the information provider or plainly legal. In this regard it is interesting to note that the group arrested in the incident was also responsible for the hacking to Paris Hilton Vodafone account, which was clearly an unlawful act.rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-64229802411553632552009-02-23T10:17:00.000-08:002009-03-02T12:25:10.229-08:00AsciiAcronym for the American Standard Code for Information Interchange. Pronounced ask-ee, ASCII is a code for representing English characters as numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another.<br /><br />For a list of commonly used characters and their ASCII equivalents, refer to the ASCII page in the Quick Reference section.<br /><br />Text files stored in ASCII format are sometimes called ASCII files. Text editors and word processors are usually capable of storing data in ASCII format, although ASCII format is not always the default storage format. Most data files, particularly if they contain numeric data, are not stored in ASCII format. Executable programs are never stored in ASCII format.<br /><br />The standard ASCII character set uses just 7 bits for each character. There are several larger character sets that use 8 bits, which gives them 128 additional characters. The extra characters are used to represent non-English characters, graphics symbols, and mathematical symbols. Several companies and organizations have proposed extensions for these 128 characters. The DOS operating system uses a superset of ASCII called extended ASCII or high ASCII. A more universal standard is the ISO Latin 1 set of characters, which is used by many operating systems, as well as Web browsers.rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-80622503474510343192009-02-16T21:25:00.000-08:002009-02-23T06:22:01.500-08:00Ajax (programming)<div style="text-align: justify;">Ajax, or AJAX (Asynchronous JavaScript and XML), is a group of interrelated web development techniques used to create interactive web applications or rich Internet applications. With Ajax, web applications can retrieve data from the server asynchronously in the background without interfering with the display and behavior of the existing page. The use of Ajax has led to an increase in interactive animation on web pages.<br /><br />Data is retrieved using the XMLHttp Request object or through the use of Remote Scripting in browsers that do not support it. Despite the name, the use of JavaScript and XML is not actually required, nor do the requests need to be asynchronous. The acronym AJAX has thus changed to the term Ajax, which does not represent these specific technologies.<br /><br />While the term AJAX was coined in 2005, alternative techniques for the asynchronous loading of content date back to the mid 1990s. Java applets were introduced in the first version of the Java language in 1995. These allow compiled client-side code to load data asynchronously from the web server after a web page is loaded.<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-20853051208104195512009-02-09T12:51:00.000-08:002009-02-09T12:52:26.637-08:00Hacker<div style="text-align: justify;">In computing, a hacker is a person in one of several distinct (but not completely disjoint) communities and subcultures:<br /><br />* People committed to circumvention of computer security. This primarily concerns unauthorized remote computer break-ins via a communication networks such as the Internet (black hats), but also includes those who debug or fix security problems (white hats), and the morally grey hats. See "Hacker (computer security)".<br /><br />* A community of enthusiast computer programmers and systems designers, originated in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory. This community is notable for launching the free software movement. The World Wide Web and the Internet itself are also hacker artifacts. The Request for Comments RFC 1392 amplifies this meaning as “person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular." See "Hacker (programmer subculture)".<br /><br />* The hobbyist home computing community, focusing on hardware in the late 1970s (e.g. the Homebrew Computer Club) and on software (computer games, software cracking, the demo scene) in the 1980s/1990s. The community included Steve Jobs, Steve Wozniak and Bill Gates and created the personal computing industry. See "Hacker (hobbyist)".<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-3293676621767610482009-02-02T09:15:00.000-08:002009-02-02T09:22:26.657-08:00Adobe Flash<div style="text-align: justify;">Adobe Flash (previously called Macro media Flash) is a multimedia platform created by Macro media and currently developed and distributed by Adobe Systems. Since its introduction in 1996, Flash has become a popular method for adding animation and interactivity to web pages; Flash is commonly used to create animation, advertisements, and various web page components, to integrate video into web pages, and more recently, to develop rich Internet applications.<br /><br />Flash can manipulate vector and raster graphics and supports bi-directional streaming of audio and video. It contains a scripting language called Action Script. Several software products, systems, and devices are able to create or display Flash content, including Adobe Flash Player, which is available for most common web browsers, some mobile phones and other electronic devices (using Flash Lite). The Adobe Flash Professional multimedia authoring program is used to create content for the Adobe Engagement Platform, such as web applications, games and movies, and content for mobile phones and other embedded devices.<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0tag:blogger.com,1999:blog-6752135746696719334.post-74998342163108559372009-01-26T00:57:00.000-08:002009-01-26T02:00:13.856-08:00Drag-and-drop<div style="text-align: justify;">In computer graphical user interfaces, drag-and-drop or DnD is the action of (or support for the action of) clicking on a virtual object and dragging it to a different location or onto another virtual object. In general, it can be used to invoke many kinds of actions, or create various types of associations between two abstract objects.<br /><br />As a feature, support for drag-and-drop is not found in all software, though it is sometimes a fast and easy-to-learn technique for users to perform tasks. However, the lack of affordances in drag-and-drop implementations means that it not always obvious that an item can be dragged.<br /></div>rekhahttp://www.blogger.com/profile/02664347642836367233noreply@blogger.com0