Pages

Oct 22, 2010

Internet vs Intranet

Internet
This is the world-wide network of computers accessible to anyone who knows their Internet Protocol (IP) address - the IP address is a unique set of numbers (such as 209.33.27.100) that defines the computer's location. Most will have accessed a computer using a name such as http://www.alertclub-differ.blogspot.com.
Intranet
This is a network that is not available to the world outside of the Intranet. If the Intranet network is connected to the Internet, the Intranet will reside behind a firewall and, if it allows access from the Internet, will be an Extranet. The firewall helps to control access between the Intranet and Internet to permit access to the Intranet only to people who are members of the same company or organisation.

In its simplest form, an Intranet can be set up on a networked PC without any PC on the network having access via the Intranet network to the Internet.

For example, consider an office with a few PCs and a few printers all networked together. The network would not be connected to the outside world. On one of the drives of one of the PCs there would be a directory of web pages that comprise the Intranet. Other PCs on the network could access this Intranet by pointing their browser (Netscape or Internet Explorer) to this directory - for example

U:\inet\index.htm.

From then onwards they would navigate around the Intranet in the same way as they would get around the Internet.

Spyware vs Virus

Spyware
Spyware is software that can display advertisements (such as pop-up ads), collect information about you, or change settings on your computer, generally without your consent. Spyware can damage your computer or cause you to lose important data.

In a general sense, spyware are programs designed to record your various activities on your computer (hence the prefix "spy") may it be internet browsing habits or software that you use on your computer. Spyware usually isn't designed to be directly harmful to your computer, unlike a virus, but instead can be extremely annoying, invasive to your privacy and suck system resources causing slow downs to your computer.

Virus
A computer virus is a malicious computer program designed specifically to replicate itself and spread from computer to computer. Like spyware, a virus can damage hardware, software, or data.

Viruses on the other hand are designed to run helter-skelter through your computer and caused actual, intentional damage to the computer itself. This can be in the form of corrupting files on your computer, damaging your personal documents, photos, music track, and more to rendering the computer completely unusable. Viruses usually don't have an ulterior motive like spy ware programs do, they are made to maliciously damage your computer and cause you problems. Like human viruses, computer viruses also replicate themselves, and spread by embedding into email attachments and other shared files. It only takes one file getting "infected" and distributed online (many times unknowingly) to spread at alarming rates if that file is accessed by others.

Oct 20, 2010

Debugging vs Testing

Debugging
* Debugging done in the devlopment phase by the devlopers.
* In devlopment phase devloper fixes the bug (i.e)called debugging.
* Debugging-Fixing the identified Bugs.
* Debugging is the act of fixing the bugs that is reported by either the testing team or by the end users.
* Debugging: It is done by the Developer. It is nothing but fixing the developer.

Testing
* Testing is conducted by the testers in testing phase.
* In Testing phase tester will finds the bug (i.e)called testing to improve the quality of the product.
* Testing-Locating/Identifying Bugs.
* Testing is the performed by tester with the intent of finding a bug in an application. Upon finding a bug the tester will be reporting it to development team.
* Testing: It is done by Tester.Testing is nothing but finding out the errors.

Oct 18, 2010

DBMS vs RDBMS

DBMS
  • DBMS data is stored in the form of rows and columns
  • Data stored in dbms is temporarly
  • DBMS is DATA BASE MANAGEMENT SYSTEM
  • In DBMS keys are not used.
  • In DBMS duplication of rows ans columns.
  • In DBMS rows and columns are independent.
  • DBMS is for single user only.
  • DBMS does not satisfies codd's rules.
  • Eg: DBMS: Sysbase foxpr
RDBMS
  • RDMS data stored in the form of tables                   
  • where as in rdbms is permanently              
  • RDBMS is RELATIONAL DATABASE MANAGEMENT SYSTEM.
  • In RDBMS keys are used.
  • But in RDBMS there is no duplication of rows and columns.
  • But in RDBMS rows and columns are dependent.      
  • RDBMS is for multi-user.
  • RDBMS satisfies codd's rules.
  • Eg: RDBMS: Oracle, SQl  server

Oct 17, 2010

Aims Vs Objectives

- Aims are actually Goals which you set for yourself in life.
- Objectives are the measures which you Undertaken to achieve your Aims.


In Short
Aims are what you want to achieve, Objectives are what you will do to achieve them.
So, an Aim would be the overall thing you want to eventually achieve.

-------------

A Goal is something you work toward, a setpoint.
An Aim is a focal point, something to keep your eye on.
An Objective is a more strategic goal, and usually indicates more planning or organization

Authentication Vs Authorization

Authentication
An authentication system is how you identify yourself to the computer. The goal behind an authentication system is to verify that the user is actually who they say they are. There are many ways of authenticating a user. Any combination of the following are good examples.
Password based authentication
Requires the user to know some predetermined quantity (their password).
  • Advantages: Easy to impliemnt, requires no special equipemnt.
  • Disadvantages: Easy to forget password. User can tell another user their password. Password can be written down. Password can be reused.
  • Device based authentication
    Requires the user to posses some item such as a key, mag strip, card, s/key device, etc.
  • Advantages: Difficult to copy. Cannot forget password. If used with a PIN is near useless if stolen.
  • Disadvantages: Must have device to use service so the user might forget it at home. Easy target for theft. Still doesn't actually actively identify the user.

  • Biometric Authentication
  • My voice is my passport. Verify me. This is from the movie sneakers and demonstrates one type of biometric authentication device. It identifies some physical charactistic of the user that cannot be seperated from their body.


    Retina Scanners:
  • Advantages: Accurately identifies the user when it works.
  • Disadvantages: New technology that is still evolving. Not perfect yet.



  • Hand Scanners:
  • Advantages: Difficult to seperate from the user. Accurately identifies the user.
  • Disadvantages: Getting your hand stolen to break into a vault sucks a lot more than getting your ID card stolen.



  • Authorization
    Once the system knows who the user is through authentication, authorization is how the system decides what the user can do. A good example of this is using group permissions or the difference between a normal user and the superuser on a unix system. There are other more compicated ACL (Access Control Lists) available to decide what a user can do and how they can do it. Most unix systems don't impliment this very well (if at all.)
    _______________ 
    In Short:
    Identification: Who are you?  Authentication: Prove it.   Authorization: Here is what you can do.