Wednesday, February 22, 2012

Browser

1.Compuserve
 History
Compuserve browser
     CompuServe introduced the GIF format in 1987 to provide a color image format for their file downloading areas, replacing their earlier run-length encoding(RLE) format, which was black and white only. GIF became popular because it used LZW data compression, which was more efficient than the run-length encoding that formats such as PCX and MacPaint used, and fairly large images could therefore be downloaded in a reasonably short time, even with very slow modems.The original version of the GIF format was called 87a. In 1989, CompuServe devised an enhanced version, called 89a, which added support for animation delays (multiple images in a stream were already supported in 87a), transparent background colors, and storage of application-specific metadata. The 89a specification also supports incorporating text labels as text (not embedding them in the graphical data), but as there is little control over display fonts, this feature is not widely used. The two versions can be distinguished by looking at the first six bytes of the file (the "magic number" or "signature"), which, when interpreted as ASCII, read "GIF87a" and "GIF89a", respectively.
GIF was one of the first two image formats commonly used on Web sites, the other being the black and white XBM.[citation neede JPEG came later with the Mosaic browser.

Developer/Creator and Date
         The creators of the format pronounced GIF with a soft "G/ˈɪf/ as in "gin". An alternative pronunciation uses a hard "G" /ˈɡɪf/ as in "graphics", reflecting the expanded acronym. Both pronunciations are given as correct by the Oxford English Dictionary and the American Heritage Dictionary.
            According to Steve Wilhite, the creator of the GIF format, the original pronunciation deliberately echoes the American peanut butter brand, Jif, and the employees of CompuServe would often say "Choosy developers choose GIF", spoofing this brand's television commercials.This pronunciation was also identified by CompuServe in their documentation of a graphics display program called CompuShow.
              The GIF graphics file format was invented by CompuServe in 1987. In the years since, a debate has been raging as to the correct way to pronounce "GIF": like "jif", or with a hard 'g' as in "gift" as a majority of Mac users seem to prefer. With this page I intend to clear this up once and for all...
Platform
       CompuServe is an older platform for email and web browsing. CompuServe was purchased by America Online (AOL), but users of the older platform still connect to the CompuServe servers for email messaging. As long as you have the right email server addresses, any email platform is configurable for CompuServe. Windows Live Mail is a free product that comes with the Windows operating system. This email client is used to connect to CompuServe's servers.


 Features
Compuserve Feature
The feature of storing multiple images in one file, accompanied by control data, is used extensively on the Web to produce simple animations. The optional interlacing feature, which stores image scan lines out of order in such a fashion that even a partially downloaded image was somewhat recognizable, also helped GIF's popularity,[citation needed] as a user could abort the download if it was not what was required.  



2. Arcweb
  History
         ArcWeb Services was a GIS product offered by ESRI to provide Web-oriented spatial data services. ArcWeb Services is a Hosted GIS that provides geographic web services (W3C/SOAP and others) to web browsers and other Internet-enabled technology.
ArcWeb Services addresses the needs of organizations that wish to use geographic data and GIS functionality on a services basis, that is, without necessarily creating an extensive in-house GIS infrastructure. ArcWeb Services is composed of APIs, geographic services accessed through the APIs, and hosted data.

 Developer/Creator and Date
                ArcWeb Services is a set of GIS Web services, such as mapping, routing, and geocoding, hosted by ESRI. It gives you access to content and capabilities without installing software or maintaining data. Access ArcWeb Services through Web browsers, desktop applications, mobile devices, or APIs.


Platform 
  •  Robust GIS Utility Computing Platform
      - High Capacity: - 5,000,000 Maps per Day
      - High availability: - 99.9%
  • Redundant System at Remote Site(s)
     - Mirrored System at ISP in Mesa, AZ
     - New System Coming Online in Q2 2005
  • Powered by Leading Technologies
    - Sun Hardware, Java Software, Oracle & DB2 DBMS
    - ArcIMS, ArcSDE, ArcGIS Engine, Network Analyst
    - WebSphere Portal Server.     
Arcweb Feature
 Feature
        ArcWeb for ArcGIS is an extension for ArcMap that demonstrates some of the features of ESRI's ArcWeb web services. Included in this release are tools to display the various map image services such as GDT Streets and Census Density, as well as the Place Finder, Address Finder and Route Finder ArcWeb services.                    


3. Bionex
History
        Along with the growth and development of the Singapore Armed Forces (SAF) during the mid 1980s came a need to bolster (and eventually replace) the existing fleet of M113 Armored Personnel Carriers (APCs). This prompted the Ministry of Defence (MINDEF) to source for a fleet of armored vehicles to operate in tandem with the current fleet of AMX-13 SM1 light tanks.
Bionex Platform
With the participation of the SAF, the Defence Materiel Organisation (DMO), MINDEF's systems acquisition house, was appointed to conduct a technology study and recommend the direction for the project. A market survey was conducted in which various armored vehicles including the Warrior Tracked Armoured Vehicle, the M2/M3 Bradley Fighting Vehicle, and the Schützenpanzer Marder were evaluated. The findings from the market survey showed that none of the off-the-shelf vehicles met the specific requirements of the SAF. Therefore, the decision was made to develop a vehicle locally. Local development was necessary not only because of a lack of suitable off-the-shelf designs, but also as an opportunity to build up the capability of the local defense industry. Known as "BIONIX", the IFV was the product of a tripartite team of engineers and technical staff from Singapore Technologies Automotive, DMO and G5 Army, working jointly with HQ Armour to produce a fighting machine tailored to the specific operational requirements of the Army. Key considerations during the design process included high mobility and agility, low weight, amphibious capability, and adequate protection and firepower.
Developer/Creator and Date     

                     Development of the Bionix began in 1988. It took several years before leaving the prototyping phase in 1995 and finally being commissioned on 26 March 1997. ST Automotive was awarded a S$2.5 billion (US$1.7 billion) contract in March 1997 to supply several hundred Bionix IFVs to the Singapore Armed Forces. The first production vehicles were inducted by the 42nd Battalion, Singapore Armoured Regiment in July 1999. The Bionix IFV has since been succeeded by the Bionix II, which entered service with the Singapore Armed Forces in October 2006.
 Platform
         The unique design of the Hive automation platform allows the use of the entire workspace, including above-and below-deck spaces. It provides a compact system integration of our instruments and/or third-party devices without compromising performance. Most devices face the front of the platform for easy offline use and serviceability. When additional space is required to integrate many devices or larger devices, the automated system can be easily expanded — not limited to a specific size.         
 Feature
     This wallpaper manager has a "don't disturb user" mode (through "automatic shut down" option): images will be changed automatically when Windows starts, then the program will close without user intervention.
Like Winamp, Bionix Wallpaper gives you the posibility to gather images from all over the hardisk in one playlist, without changing their physical location.
Also, like Winamp, BioniX Wallpaper cycler has playlist navigation, which permits you to go back and next through the images.
     
4. Chibrow
History
Chibrow.com
         Designed to give parents complete control over their children's Internet use, thereby allowing the child to safely explore and benefit from the Net's educational content. Parent's password allows for management of allowable URLs in the encrypted database. Simple to Manage and Simply Safe. Comes Preconfigured with Safe Sites. Free Safe Site Updates are emailed to Registered owners on an ongoing basis. 

Developer/Creator and Date     
         ChiBrow - The Children's Browser 5.0 File & Disk Management software developed by ChildrenBrowsercom - eCapital Group, Inc. The license of this file & disk management software is freeware, the price is free, you can free download and get a fully functional freeware version of ChiBrow - The Children's Browser. Do not use warez version, crack, serial numbers, registration codes, pirate key for this file & disk management freeware ChiBrow - The Children's Browser. Always use genuine version that is released by original publisher ChildrenBrowser.com - eCapital Group, Inc..   

Platform
        ProfLT is an excellent choice if you want to draw surface profiles and cross sections in AutoCAD or other CAD software. The program allows easy generation of profiles, including the possibility to use the 3D model made with TopoLT and can be configured for many situations.

Feature
       The competitive matrix feature comparison chart help you to create a matrix to compare product features. This can be used internally for product planning or externally for sales purposes. Also includes "Top 10 Product Launch Mistakes" White Paper.. Free download of Competitive Matrix Feature Chart 1.0, size 1.02 Kb. 


 5. Contiki
Contiki
History
         In 1961, a young New Zealander named John Anderson arrived in London to embark on a journey to Europe. He didn’t want to travel alone and he didn’t have a lot of money, so he came up with a plan. He put a deposit on a minibus and gathered a group of people to travel with. They spent twelve weeks exploring Europe together and had a wonderful time. In the Spring of 1962 he decided to advertise his Europe trip again. This time, he was able to fit two trips into the Summer season, therefore doubling his business, and Contiki Holidays was ‘born’. The first tours were all booked by 19-29 year olds so right from the start Contiki was all about youth travel. Contiki’s reputation for great vacations continued to grow and ten years later there were over 50 Contiki buses on the roads of Europe as tours began in Russia, Scandinavia, Spain, Portugal and Morocco. Built on word of mouth and the strength of our reputation, ‘Contiki’ quickly became a household name among young travelers from Australia and New Zealand while the company’s success spawned a series of imitators. During the 1970s almost 30 companies were based on Contiki’s style of touring, but as time went on, most fell by the wayside as Contiki began to thrive and prove itself to be the worlds leading tour operator for young people.


Developer/Creator and Date   
          Contiki was the first tour operator for young people to move from the traditional camping style of tour to the Concept (Budget) style, staying in camping villages as well as pioneering the now popular Time Out (Superior) hotel tour style. As a result business doubled and over 20,000 people a year chose to travel with Contiki in the late 70’s with that number now roughly tripling to around 60,000 people a year. In 1989 John Anderson decided to sell Contiki to Trafalgar Tours, thus creating what eventually would become The Travel Corporation, a world wide combination of tour operators, travel and tourism companies that now carry over 1 million people a year. 


Platform
    Contiki runs on a variety of platforms ranging from embedded microcontrollers such as the TI MSP430 and the Atmel AVR to old home computers. Code footprint is on the order of kilobytes and memory usage can be configured to be as low as tens of bytes.

[edit]

Feature
        Contiki supports per-process optional preemptive multi-threading, inter-process communication using message passing through events, as well as an optional GUI subsystem with either direct graphic support for locally connected terminals or networked virtual display with VNC or over Telnet.

A full installation of Contiki includes the following features:


5 online Chat/Chatsite

1. Knuddels Chat
History
Knuddels Chat
            Finally you can visit Knuddels.de, with over 4 million users Germany's biggest chat community, with your iPhone! You don't know Knuddels.de? Well, than it's high time to pay a visit to Knuddels! Just choose a nickname und chat with nice people from throughout germany. You want to flirt? With Knuddels you'll have the opportunity to do so in over 200 flirt rooms. You're looking for nice people from your neighbourhood to chat with? No problem either. You'll find them in over 500 local  chatchannels. If you'll sign up for Knuddels using the app, you can also use Knuddels.de with your computer and e.g. improve your account by uploading your photo. You are an experienced Knuddels.de user? Then use your Knuddels-App to be always up to date, even when your not at home at your computer. User your mobile phone to Chat with your friends from Knuddels.de and send and get /ms or roses directly on your mobile phone!  

Developer/Creator and Date
App Developer Love. First off, Thank you for being an App Developer. Our site woudn't have been possible without you. Zappium is an App Discovery Engine - We want to make it easy for people to discover and install or buy your great apps through:
  1. Creating Zappium - A powerful powerful app search & directory
  2. Helping app developers like you to market your apps by providing you with simple, yet powerful tools to distribute and SELL your apps. 
The first free app we have rolled out is what we call "the Converting Landing Page". Start using your Free landing page today!


Platform
   Win95,  Win98,  WinME,  WinXP
Features: 
Knuddels.com's special features that you should not miss include
  •   Interactive, multi-player online games, such as Billards, Beach Volleyball, and the mysterious Mafia 2.0---an extremely fast and mind-boggling game about mafiosos, detectives, and regular citizens like you and I (or wait, are you actually one of the mafiosos? I'm not so sure any more...)
  • Features, features and features, such as initiating blind dates, throwing cakes, holding channel elections, giving gifts, and much more...
  • A photo database and rating functionality that gives you a more visual impression about who you are chatting to.
  • State-of-the-art youth protection functions. If you experience misbehavior of another chatter, just hit the "emergency" button at any time during your visit. This will immediately cut off the conversation to your conterpart and will guide you through a process for reporting the missbehavior.
  • An online forum, personal guest books and easy-to-edit personal homepages.

    2. Spanish Chat
    History
             This course serves as a historical and critical survey of Spanish history and culture from the 1980s to the present through the works of filmmaker Pedro Almodóvar. By watching and analyzing fragments of different films, reading articles and scripts, students will strengthen their comprehension, vocabulary and conversational skills through discussions on Almodóvar´s works as well as Spanish art, culture and contemporary history. 
       
    Developer/Creator and Date
              This course serves as a historical and critical survey of Spanish cinema and culture from the 1950s to the present. By watching and analyzing fragments of different films, students will strengthen their comprehension, vocabulary and conversational skills through discussions on contemporary Spanish cinema.


    Platform
        Launching with Android 2.2 Platform
    This extremely popular Android 2.2 Froyo operating system gives you quick access to over 100,000 apps and video games.
       
    Features
    Joomla versions 1.5,1.6,1.7 and 2.5
    WordPress versions 3.2 and 3.3
    Unlimited Operators
    Unlimited Departments
    Unlimited Domains
    Multi Language Support Unicode
    SSL Support
    Chat Rebranding
    Image for each agent
    User Recognition (Joomla )
    Multi Language Admin Panel
    No Monthly Fee
    No Setup Fee

     
    3. The Corner Cafe Chat
    History
             
    4. Hobbo Hotel Chat
    History
    5. Cybertown
    History

    Wednesday, January 25, 2012

    Top ten Computer Viruses

    1. Sadmind worm (2001)
    ALIAS: Sadmind/IIS, Unix/Sadmind, Solaris/Sadmind.worm
    The Sadmind worm was a self-propagating piece of malware, It was first discovered on May 8, 2001 in china. Sadmind is designed to provide remote system administration operations and is installed by default with many versions of the Sun Microsystems operating system.
     It affected some big operating systems like Sun Microsystems Solaris(OS) and Microsoft's Internet Information Services (IIS) which is the world's second most popular web server in terms of overall websites behind the industry leader Apache HTTP Server.



    2. Beast Trojan (2002)
    Beast is a Windows-based backdoor trojan horse more commonly known in the underground cracker community as a RAT (Remote Administration Tool). It was created in Delphi and released first by its author Tataye in 2002. Beast was one of the first trojans to feature a 'reverse connection' to its victims and once established, it gave the attacker complete control over the infected computer.

    Once connected to the victim computer, via Beast hacker can access victim's all computer file and directories along with the power to upload, download, delete or execute any file or folder.



    3. SQL Slammer (2003)
    ALIAS: Sapphire, Worm.SQL.Helkern, SQLSlammer

    Appeared first in 27th January 2003 and soon got a high rank in the list of most dangerous worms of the year because it is the first fileless worm. Slammer was able to spread by taking advantage of the vulnerability found in the SQL Server.
    Slammer spread to over 90 percent of all vulnerable hosts in 10 minutes and infected around 359,000 computers total and according to London-based market intelligence the worm caused between $950 million and $1.2 billion in lost productivity in its first five days worldwide.
    4. Sasser (2004)
    Sasser is an Internet worm that probably caused around $18.1 billions of dollars of damage in 2004. It was created by a Computer science student, Sven Jaschan in Germany first seen on last day of april. While there was no intentionally destructive payload, Sasser did cause many computers to slow down or crash, causing some high profile damage.
    And was destructive enough to shut down the satellite communications for some French news agencies. It also resulted in the cancellation of several Delta airline flights and the shutdown of numerous companies’ systems worldwide.


    5. Bandook (2005)
    ALIAS: Bandook Rat
    Bandook Rat is a backdoor trojan horse that infects Windows NT family systems (Windows 2000, XP, 2003, Vista). It uses a server creator, a client and a server to take control over the remote computer. It uses process hijacking / Kernel Patching to bypass the firewall, and allow the server component to hijack processes and gain rights for accessing the internet. It is somehow very similar to Beast Trojan (2002)

    6. Nyxem (2006)
    ALIAS: Mywife, Hunchi, I-Worm.Nyxem, Blackmal, Blueworm, Blackworm
    Nyxem worm was first found on March, 2006. The worm spreads in e-mails using an external SMTP engine. It sends itself with different subjects, body text and attachment names. The worm also copies itself multiple times to an infected hard drive. Blackworm is designed to corrupt data on infected computers on February 3, 2006, in respect to The Day the Music Died
    The most scary thing in this worm is, It can deletes your antivirus programs, if they are installed in the same directories as the ones specified in the worm's code. It can also delete the entries in the Windows Registry belonging to these antivirus programs, so these applications will not be run automatically the next time Windows is started.
    The worm also contains one GIF file which is used to make a recipient of infected e-mails think that the message was scanned by Norton Anti-Virus and no infection was found.

    But its havoc ended soon and it gone off the records after October 26. 
    7. Storm Worm (2007)
    ALIAS: Small.dam, Trojan.Peacomm, Trojan.Peed, Trojan.Tibs, W32/ZhelatinBut soon after the Nyxem ended, a new virus has been discovered on January 17, 2007 named Storm Worm having the same functionality as Nyxem, It hides himself in a email attachments that had the following title line: "230 dead as storm batters Europe."  Users that opened the attachment let the virus come in their machines. This virus infected around 10 million computers worldwide and after the computer is infected it could be used to launch millions of spam emails that would advertise Web links. 
    But it has also got some new features of stealing identity and according to the United States Federal Bureau of Investigation the Storm highly helped hackers in bank fraud, identity theft, and a number of other cybercrimes.

    8. Conficker (2008)
    ALIAS: Downup, Downadup, Kido
    Conficker is a computer worm targeting the Microsoft Windows operating system that was first detected 20th November 2008 affected more than seven million government, business and home computers in over 200 countries. 
    60 Minutes - The Internet is Infected (March 29, 2009)The worm attacks the Microsoft vulnerability MS08-067 in Server Service which allows remote code execution. This vulnerability allows a remote attacker to run arbitrary code on the machine without authentication and take full control of the computer. Second, Conficker Worm uses the infected machine computing power to execute password brute force attacks to crack administrator passwords in the local network. This will allow the worm to spread through network shares as well.
    The worm is said to have caused 9.1 billion in damage, mostly in Asia, South America and Europe. 
    New versions of Conficker came with the power to
    -Blocks DNS lookups.
    -Disables AutoUpdate.
    -Kills anti-malware.
    -Scans for and terminates processes with names of anti-malware, patch or diagnostic utilities at one-second intervals.

    9. Daprosy Worm (2009)
    Daprosy was first observed in early May 2009 and first announced to public as Daprosy trojan worm by Symantec on July 2009 . This worm is a malicious computer program that spreads via LAN connections, spammed e-mails and USB mass storage devices. Infection comes from a single read1st.exe filewhere several dozens of clones are created at once bearing the names of compromised folders. The most obvious symptom of Daprosy infection is the presence of Classified.exe or Do not open - secrets!.exe files from infected folders. 
    The worm is known to destabilize, corrupt and even stall the operating system due to programming bugs. It appears that it is incomplete and was probably created by students or amateur Visual Basic programmers. As of October 2009 special scripts are available to remove it from infected computers but till then many Windows system were stalled.

    10. Alureon (2010)
    Alureon is a trojan and rootkit which is designed to steal data by intercepting a system's network traffic and searching it for usernames, passwords and credit card data. Microsoft has confirmed that Alureon is the cause of a series of BSoD problems on Windows systems which were triggered by Patch Tuesday update MS10-015. Microsoft will not install the patch on these systems. The Alureon rootkit was first seen in 2006 and now started affecting computers.
    PCs become infected by downloading software also particularly off torrent sites and visiting certain posting sites
    Other viruses that appeared during this period of time include:
    2001: Anna Kournikova virus, Sircam, Code Red worm, Code Red II, Nimda, Klez
    2002: Optix Pro, Slapper
    2003: Graybird, ProRat, Blaster worm, Welchia, Sobig worm, Sober worm
    2004: MyDoom, Netsky, Witty worm, Nuclear RAT, Vundo, Bifrost, Santy
    2005: Samy, Zlob Trojan
    2006: Stration, OSX/Leap-A, Stration (a.k.a. Warezov)
    2007: Trojan.Tarodrop.E, Spybot.ATZN, Rustock.C
    2008: Mocmex, Torpig, Bohmini.A, Koobface,
    2009: W32.Dozor, Win32/Pacex.Gen, Win32/FlyStudio
    2010: only one virus Alureon has been detected yet.