Wednesday, 20 June 2012

"Microsoft Surface" Vs "Samsung Galaxy Tab" Vs "Apple iPAD"


"Microsoft Surface" Vs "Samsung Galaxy Tab" Vs "Apple iPAD"... Decide yourself..

Microsoft Surface Samsung Galaxy Tab Apple iPAD
Keyboard The Surface keyboard will be part of its Touch Cover, which is connected with magnets and flips open. There will be a version with pressure-sensitive flat keys and another with more traditional raised keys called a Type Cover. Thirdparty support Thirdparty support
Display Size 10.6 inches 1366×768 10.1-inch 1280 x 800 9.6 Inches 2048 x 1536
Processor Windows RT has an NVIDIA Tegra-based ARM chip and the Surface Windows Pro has an Intel Ivy Bridge Core i5 processor  respectable 1GHz dual-core NVIDIA Tegra 2 processor Apple A5x SoC, which breaks down to a 1GHz dual-core processor combined with a quad-core graphics processing unit.
OS Windows RT/Windows 8 Professional Android 4.0 ICS + TouchWiz UX iOS 5.1
RAM ?? 1GB 1GB
Disk Space Windows RT has 32 or 64GB while the Surface Windows Pro has 64 or 128GB it’s offered in 16GB, 32GB and 64 GB versions, but it can be expanded thanks to its available microSD card slot 16GB, 32GB, and 64GB capacities
Stand kickstand included thirdparty thirdparty
Productivity Suite

Read more »

Wednesday, 20 June 2012 by Saurabh Gupta · 0

Saturday, 16 June 2012

Reading Credit Card Numbers


Have you ever tried to figure out what a credit card number represent or if there is any way to figure out if number itself is correct. You surely cant check the validity of credit card just by number, but can  figure out if credit card number is valid or not.




Read more »

Saturday, 16 June 2012 by Saurabh Gupta · 0

How do you blog?


So you have decided to start your own blog/CMS site and want to join the crowd.. read on..

I will try to cover generic topics in this article that you need to start blogging or CMS site. Details will follow in future posts. 

Step One – What do you want to blog about?


You need to make sure that you select right area in which you are good. For example if I am asked to write a review of Indian classical music, then god save me and reader. Similarly you need to make sure that you are good at the topic you are writing about. Secondly use “Google Adwords” and “Google Trends” to figure out you don’t have too much competition on the similar lines. For example you may be having heavy “keyword” competition for “textile waste recycling” but low competition for “textile recyclers”. Start with the topics which face low competitions but have low to medium traffic generation. Once you have figured it out, you are all set to look for technology/platform.

Read more »

by Saurabh Gupta · 0

Sunday, 10 June 2012

What is Hacking?

Hacking means finding out weaknesses in a computer or computer network and exploiting them, though the term can also refer to someone with an advanced understanding of computers and computer networks. 

Disclaimer: I have never been involved with any hacking activity nor caused trouble to network administrators :). 

Firstly why do we need to know what is hacking? Surely not to impress girls, but to make sure others tech guys cant get into your network and PC. They can steal your data data, modify it or even destroy it. Bringing down a network is childs play these days. The technique which were used by SETI earlier are now used to push denial of services on various sites. The other reason for learning hacking is to ensure internally employees are not able to steal data, watch restricted contents or do something that security admins dont want them to do.

One famous hacker once wrote that ``Hackers understand something basic about computers, and that is that they can be enjoyed.  I know none who hack for money, or hack to frighten the company, or hack for anything but fun.'' Most of the IT wizards were once hackers; Bill Gates, Alan cox, Linus, Marcello, Willy, Tweedie, Kolivas etc are just to name few. For that matters, most of the kernel programmers are the best hackers. 

Read more »

Sunday, 10 June 2012 by Saurabh Gupta · 0

Help me buy a Computer


Buying a right computer as per your need is critical for your work and day to day communication. I have put some of the points that can be useful while buying a new computer. You can use these tips to buy a new laptop or desktop.

Whether you want a laptop or desktop?
Whether you want a laptop or desktop?
Though desktops are cheaper than laptops and repairs costs are also less in desktop, but are you sure you want a desktop? Desktop takes more space, requires external power backup and can’t be moved easily. You can’t carry a desktop around and it will take lot of space on your table. Price difference between regular desktop and laptop is not much. At the same time if you want to play latest games and run processor intensive games on big screen, desktops are the way to go.
So first make up your mind whether you want a desktop or laptop!!

Which operating system you need?
Which operating system you need?
Most likely it will be windows based system which is easy to operate for everyone at home. However you make also like to look for Mac based system which will be good for graphics or Linux based system which can be great for programming and open source lovers. Also see if you can get 64 bit Operating system. It will definitely be faster compared to 32 bit OS.

Read more »

by Saurabh Gupta · 0

Secure your network with Open Source applications and Tools


Wikipedia - “Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.”

In today’s world securing information is most critical and difficult part in any organization. Your development and research team will come up with some of the best ideas and products, but in the end somebody else may end up enjoying benefits out of it. You will never know while you are sleeping, your employee may steal data from your premise or your corporate enemies may launch a cyber attack on your network.

In order to secure your network you will find lot of applications, hardware and tools which are available in market. However I will try to explain very few of open source tools from load of tools which are freely available. The reason for going with open source is simple, it’s open. You know what is application/tool is doing and you have full control on it. Should your company follow the crowd moving towards open source network security? That depends on which is more important to you: an agile solution that doesn't cost much or a comprehensive solution that comes with plenty of support. If you are looking for the agile solution read on…

IP COP – IPCOP comes with bundle of tools and applications built in. It has transparent proxy server, web caching tools, advanced proxy for controlling your traffic, DHCP server, firewall, IP tables for those fine tuning, URL filtering for blocking chat etc, port forwarding for getting specific traffic into your network. Just put in on your internet pipe and you are up and running. It will secure network and keep inform you once something goes wrong. It can run on old PII or PIII machine with 512 MB RAM and is not resource intensive. You can access the website at http://www.ipcop.org/

OpenVPN – You must be using paid VPN software or hardware to connect to your office network. Try Open VPN, It’s an excellent tool which can be run on Linux box or can be run directly from IPCOP. With OpenVPN you can
·         tunnel any IP subnetwork or virtual Ethernet adapter over a single UDP or TCP port,
·         configure a scalable, load-balanced VPN server farm using one or more machines which can handle thousands of dynamic connections from incoming VPN clients,
·         use all of the encryption, authentication, and certification features of the OpenSSL library to protect your private network traffic as it transits the internet,
You can access further details on http://openvpn.net/

WireShark - Formerly known as "Ethereal," Wireshark is the world's foremost network protocol analyzer. It allows the user to see all traffic being passed over an Ethernet network. It runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and others. It shows you any packet travelling on network and can also show you any non encrypted password J. Use it for good  http://www.wireshark.org/

NMAP - Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Output of nmap can tell you open ports, running services etc on a network in a minute. NMAP is fastest and most comprehensive way to discover network, running services and holes in security.

Open SSL - The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. You can compile apache, postfix with SSL support and start your own secure mail delivery on TLS or run https services. SSL will provide secure connectivity between your server and client to exchange data. http://www.openssl.org/

Clam Antivirus – Ever heard of free antivirus which can secure your email gateway for free. Clam is just the right choice if you are looking to implement a low cost email server with full featured antivirus support. ClamAV is an open source (GPL) antivirus engine designed for detecting Trojans, viruses, malware and other malicious threats. It provides a high performance mutli-threaded scanning daemon, command line utilities for on demand file scanning, and an intelligent tool for automatic signature updates. I have personally used it along with postfix and found it as reliable as any commercial grade application. http://www.clamav.net/lang/en/

There are more open source applications and tools which you can utilize in your network and make it more secure and efficient. 

by Saurabh Gupta · 0

SAP Business One and Perl

Do you find SAP Business One scheduled reports boring and difficult to use?
Management find it difficult to use SAP Business One Scheduled reports?
You thought if you could convert those reports into custom excel sheet and send it to users separately....

Yes you have come to the right place...

So to begin ... this is what you need...
1) A windows machine with Active perl (should work on linux also, havent tried yet)
2) Download following perl modules from CPAN

DBD::ODBC;
Spreadsheet::WriteExcel;
Net::SMTP;
MIME::Lite;

This is how you use command line utility to do it. Open command prompt and type "perl -MCPAN -e shell". Afterwards type "install DBD::ODBC" etc.

3) Once you have downloaded and installed above modules, connect to the database

my $dsn = join "", (
"dbi:ODBC:",
"Driver={SQL Server};",
"Server=[YOUR SERVER IP];",
"UID=sa;",
"PWD=[YOUR PASSWORD];",
"Database=[DATABASE NAME]",
);

If it gets connected, means you are all set to retrieve all sorts of reports from SAP.

Refer to other posts to retrieve the data, write to excel file and email to respective people.

by Saurabh Gupta · 0