Wednesday, 20 June 2012
"Microsoft Surface" Vs "Samsung Galaxy Tab" Vs "Apple iPAD"... Decide yourself..
Microsoft Surface | Samsung Galaxy Tab | Apple iPAD | |
Keyboard | The Surface keyboard will be part of its Touch Cover, which is connected with magnets and flips open. There will be a version with pressure-sensitive flat keys and another with more traditional raised keys called a Type Cover. | Thirdparty support | Thirdparty support |
Display Size | 10.6 inches 1366×768 | 10.1-inch 1280 x 800 | 9.6 Inches 2048 x 1536 |
Processor | Windows RT has an NVIDIA Tegra-based ARM chip and the Surface Windows Pro has an Intel Ivy Bridge Core i5 processor | respectable 1GHz dual-core NVIDIA Tegra 2 processor | Apple A5x SoC, which breaks down to a 1GHz dual-core processor combined with a quad-core graphics processing unit. |
OS | Windows RT/Windows 8 Professional | Android 4.0 ICS + TouchWiz UX | iOS 5.1 |
RAM | ?? | 1GB | 1GB |
Disk Space | Windows RT has 32 or 64GB while the Surface Windows Pro has 64 or 128GB | it’s offered in 16GB, 32GB and 64 GB versions, but it can be expanded thanks to its available microSD card slot | 16GB, 32GB, and 64GB capacities |
Stand | kickstand included | thirdparty | thirdparty |
Productivity Suite |
Wednesday, 20 June 2012 by Saurabh Gupta · 0
Saturday, 16 June 2012
Saturday, 16 June 2012 by Saurabh Gupta · 0
So you have decided to start
your own blog/CMS site and want to join the crowd.. read on..
I will try to cover generic topics
in this article that you need to start blogging or CMS site. Details will
follow in future posts.
Step One – What do you want to blog about?

by Saurabh Gupta · 0
Sunday, 10 June 2012
Hacking means finding out weaknesses in a computer or computer network and exploiting them, though the term can also refer to someone with an advanced understanding of computers and computer networks.
Disclaimer: I have never been involved with any hacking activity nor caused trouble to network administrators :).
Firstly why do we need to know what is hacking? Surely not to impress girls, but to make sure others tech guys cant get into your network and PC. They can steal your data data, modify it or even destroy it. Bringing down a network is childs play these days. The technique which were used by SETI earlier are now used to push denial of services on various sites. The other reason for learning hacking is to ensure internally employees are not able to steal data, watch restricted contents or do something that security admins dont want them to do.
One famous hacker once wrote that ``Hackers understand something basic about computers, and that is that they can be enjoyed. I know none who hack for money, or hack to frighten the company, or hack for anything but fun.'' Most of the IT wizards were once hackers; Bill Gates, Alan cox, Linus, Marcello, Willy, Tweedie, Kolivas etc are just to name few. For that matters, most of the kernel programmers are the best hackers.
Sunday, 10 June 2012 by Saurabh Gupta · 0
Buying a right computer as per your need is critical for your work and day to day communication. I have put some of the points that can be useful while buying a new computer. You can use these tips to buy a new laptop or desktop.
Whether you want a laptop or desktop?
Though desktops are cheaper than
laptops and repairs costs are also less in desktop, but are you sure you
want a desktop? Desktop takes more space, requires external power backup and can’t
be moved easily. You can’t carry a desktop around and it will take lot of space on
your table. Price difference between regular desktop and laptop is not much. At
the same time if you want to play latest games and run processor intensive games
on big screen, desktops are the way to go.
So first make up your mind
whether you want a desktop or laptop!!
Which operating system you need?
Most likely it will be windows
based system which is easy to operate for everyone at home. However you make
also like to look for Mac based system which will be good for graphics or Linux
based system which can be great for programming and open source lovers. Also
see if you can get 64 bit Operating system. It will definitely be faster compared
to 32 bit OS.
by Saurabh Gupta · 0
Wikipedia
- “Network security consists of the provisions and policies adopted by a network
administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer
network and network-accessible resources.”
In today’s world securing information is most
critical and difficult part in any organization. Your development and research
team will come up with some of the best ideas and products, but in the end
somebody else may end up enjoying benefits out of it. You will never know while
you are sleeping, your employee may steal data from your premise or your
corporate enemies may launch a cyber attack on your network.
In order to secure your network you will find lot
of applications, hardware and tools which are available in market. However I
will try to explain very few of open source tools from load of tools which are
freely available. The reason for going with open source is simple, it’s open.
You know what is application/tool is doing and you have full control on it. Should
your company follow the crowd moving towards open source network security? That
depends on which is more important to you: an agile solution that doesn't cost
much or a comprehensive solution that comes with plenty of support. If you are
looking for the agile solution read on…
IP COP – IPCOP comes with bundle of tools and
applications built in. It has transparent proxy server, web caching tools,
advanced proxy for controlling your traffic, DHCP server, firewall, IP tables
for those fine tuning, URL filtering for blocking chat etc, port forwarding for
getting specific traffic into your network. Just put in on your internet pipe
and you are up and running. It will secure network and keep inform you once
something goes wrong. It can run on old PII or PIII machine with 512 MB RAM and
is not resource intensive. You can access the website at http://www.ipcop.org/
OpenVPN – You must be using paid VPN software or hardware
to connect to your office network. Try Open VPN, It’s an excellent tool which
can be run on Linux box or can be run directly from IPCOP. With OpenVPN you can
·
tunnel any IP subnetwork or virtual Ethernet adapter over a
single UDP or TCP port,
·
configure a scalable, load-balanced VPN server farm using one
or more machines which can handle thousands of dynamic connections from
incoming VPN clients,
·
use all of the encryption, authentication, and certification
features of the OpenSSL library to protect your private network
traffic as it transits the internet,
WireShark - Formerly known as
"Ethereal," Wireshark is the world's foremost network protocol
analyzer. It allows the user to see all traffic being passed over an Ethernet
network. It runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and others.
It shows you any packet travelling on network and can also show you any non
encrypted password J. Use it for good http://www.wireshark.org/
NMAP - Nmap ("Network Mapper") is a
free and open source utility for network discovery and security auditing. Many
systems and network administrators also find it useful for tasks such as
network inventory, managing service upgrade schedules, and monitoring host or
service uptime. Output of nmap can tell you open ports, running services etc on
a network in a minute. NMAP is fastest and most comprehensive way to discover
network, running services and holes in security.
Open SSL - The OpenSSL Project is a collaborative
effort to develop a robust, commercial-grade, full-featured, and Open
Source toolkit implementing the Secure
Sockets Layer (SSL v2/v3) and Transport
Layer Security (TLS v1) protocols as well
as a full-strength general purpose cryptography library. You can compile apache, postfix with SSL
support and start your own secure mail delivery on TLS or run https services.
SSL will provide secure connectivity between your server and client to exchange
data. http://www.openssl.org/
Clam
Antivirus – Ever heard of free antivirus which can secure your email gateway
for free. Clam is just the right choice if you are looking to implement a low
cost email server with full featured antivirus support. ClamAV is an open
source (GPL) antivirus engine designed for detecting Trojans, viruses, malware
and other malicious threats. It provides a high performance mutli-threaded
scanning daemon, command line utilities for on demand file scanning, and an
intelligent tool for automatic signature updates. I have personally used it
along with postfix and found it as reliable as any commercial grade
application. http://www.clamav.net/lang/en/
by Saurabh Gupta · 0
Do you find SAP Business One scheduled reports boring and difficult to use?
Management find it difficult to use SAP Business One Scheduled reports?
You thought if you could convert those reports into custom excel sheet and send it to users separately....
Yes you have come to the right place...
So to begin ... this is what you need...
1) A windows machine with Active perl (should work on linux also, havent tried yet)
2) Download following perl modules from CPAN
DBD::ODBC;
Spreadsheet::WriteExcel;
Net::SMTP;
MIME::Lite;
This is how you use command line utility to do it. Open command prompt and type "perl -MCPAN -e shell". Afterwards type "install DBD::ODBC" etc.
3) Once you have downloaded and installed above modules, connect to the database
my $dsn = join "", (
"dbi:ODBC:",
"Driver={SQL Server};",
"Server=[YOUR SERVER IP];",
"UID=sa;",
"PWD=[YOUR PASSWORD];",
"Database=[DATABASE NAME]",
);
Management find it difficult to use SAP Business One Scheduled reports?
You thought if you could convert those reports into custom excel sheet and send it to users separately....
Yes you have come to the right place...
So to begin ... this is what you need...
1) A windows machine with Active perl (should work on linux also, havent tried yet)
2) Download following perl modules from CPAN
DBD::ODBC;
Spreadsheet::WriteExcel;
Net::SMTP;
MIME::Lite;
This is how you use command line utility to do it. Open command prompt and type "perl -MCPAN -e shell". Afterwards type "install DBD::ODBC" etc.
3) Once you have downloaded and installed above modules, connect to the database
my $dsn = join "", (
"dbi:ODBC:",
"Driver={SQL Server};",
"Server=[YOUR SERVER IP];",
"UID=sa;",
"PWD=[YOUR PASSWORD];",
"Database=[DATABASE NAME]",
);
If it gets connected, means you are all set to retrieve all sorts of reports from SAP.
Refer to other posts to retrieve the data, write to excel file and email to respective people.
by Saurabh Gupta · 0
Subscribe to:
Posts (Atom)