Archive for the ‘Information Technology’ Category

Free Calls Pc to Phone Known For Their Easy Connectivity

The PC Phone calls was never known before. But now with the introduction of VoIP, this advanced method of calling has come to limelight. Personal computers are now used randomly to make both international as well as domestic calls. The user-friendliness of the technology with added sophistication has boosted the confidence of users who now make use of this technology for achieving telephony services.

The quality of voice with this technology is very satisfying and users can actually rely on it for achieving seamless connection. The user-friendliness of the technology is what makes people use the PC phone calling at a rapid scale. It allows people to initiate a call from one’s PC and then forward it to other people’s mobiles or phones. Thus with this technology both PC to phone calls and PC to mobile phone calls are made possible.

The process adopted by this technology is that analogue voice signals are converted to digital forms that are reconverted to the analogue signals once the signal reaches the end user. The process of reconversion allows the end users to receive the voice signals with its original quality. The system is such that the voice signal has to passes through various PSTN in order to reach the end user. So, reconversion of signals into various formats take place. It is what makes the system ‘wireless’ as satellite is brought to use for transferring signals from one region to another.

Another interesting feature of the PC phone call is that it can be used for transferring data in addition to voice signals. So, text can be typed that is sent to people with whom one may be conferencing. There is the 3-way conferencing option too that allows people to connect with a number of people simultaneously. So, ideas can be exchanged and views of different people can be gathered simultaneously. Then the users can also share videos, photos and exchange other files with people very easily. There is also the option of chatting offered by this technology.

The billing procedures in PC phone is also significant. People now have the option to low cost telephony. It is possible for users of this technology to connect to international as well as domestic clients by means of this technology. Summarily the users find it a lovely means to avail low cost connectivity. It overcomes all lapses of the traditional means of connectivity and brings users to a platform from where they can share files with others while simultaneously conversing with them.

Moreover, the technology has immense flexibility as far as billing is concerned. One can now pay off their bills online without having to visit the service providers office personally. Then people are also furnished with an e-statement from time to time that allows users to keep on a check on their phone bills. That is users can always keep their budget under control.

The technology being feasible can be accessed from any place of the Earth. As it is dependent on internet connection, so internet is a pre-requisite for the service. With the availability of internet, users can make PC to mobile phone calls or PC to phone calls from any place. It is this accessibility that has garnered huge applauds for the technology. The other aspects being the sophistication and speed of this technology that have made people adopt this new technology.

At a Cafe! I Can hack your Social Networks:

At a Cafe? I Can Hack Your Facebook, Twitter, Etc…
With a Firefox Extension

By Mike Melanson / October 25, 2010 11:28 AM

Whenever you connect to an unsecured WiFi network, you’re taking a chance, but now it’s easier than ever for someone to gain access to all of your social network login information. A new Firefox extension called Firesheep makes it simple for anyone to see that you’re connected to the network, grab your login information for any number of social networks, and take over your online identity.

Without this, hacking your account over an unsecured wireless network may not be rocket science, but it surely isn’t the one-click magic made possible by Firesheep.

Firesheep takes advantage of unsecured wireless networks and unencrypted cookies to “sidejack”, or gain access to sites by way of accessing these cookies. Developed by Eric Butler, a freelance web application and software developer in Seattle, Washington, Firesheep was created and released at Toorcon 12 to demonstrate the security risk inherent in storing unencrypted login data in cookies. As Butler writes on his blog, “On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy.”

Firesheep opens a sidebar in Firefox that shows everyone who is connected to a certain unsecured WiFi network. With a single click, you can connect to most any social network using that person’s user name and password.

firesheep.png

By making it this easy to hack other users accounts, Butler says that he is hoping the extension will force major sites like Twitter or Facebook to act responsibly and protect their users.

“Websites have a responsibility to protect the people who depend on their services,” writes Butler. “They’ve been ignoring this responsibility for too long, and it’s time for everyone to demand a more secure web. My hope is that Firesheep will help the users win.”

Earlier today, TechCrunch pointed to Force-TLS as a potential solution. The Firefox extension allows you to force sites like Twitter or Facebook to use HTTPS. In the comments, users also pointed to a Chrome extension that has similar functionality. Many, however, pointed out that the most secure route is to set up a VPN (virtual private network) for whenever you access the Internet using unsecured wireless. Others pointed to an  SSH (secure shell), which allows the secure transfer of information. At the same time, other commenters pointed out ways that these too might not be secure.

It seems that Butler has a valid point and maybe, only through making the insecurities this glaringly obvious, will the big social networks – with which we share all our daily minutiae – change their insecure ways.

Source: http://www.readwriteweb.com/archives/at_a_cafe_i_can_hack_your_facebook_twitterwith_a_f.php

What is SAP?

What is SAP?

SAP (Systems, Applications, Products in Data Processing), is headquartered in Walldorf, Germany. They provide business software designed to help companies execute and optimize business and IT strategies. SAP defines business software as comprising enterprise resource planning (ERP) and related applications such as supply chain management (SCM), customer relationship management (CRM), product life‐cycle management, and supplier relationship management (SRM).

SAP currently has:

  • More than 51,000 employees in over 50 countries developing, marketing, and selling applications and services
  • 82,000 customers of all sizes across 25 industries and in over 120 countries
  • Listings on the Frankfurt and New York stock exchanges

SAP operates in three geographic regions: EMEA (representing Europe, Middle East, and Africa), Americas, and Asia Pacific Japan (APJ, representing Japan, Australia, and parts of Asia).

History of SAP:

In 1972, SAP was founded by 5 former IBM employees in Mannheim, Germany with the vision to “to develop standard application software for real‐time business processing.” After the first year, they created the first financial accounting software application, which came to be known as the “R/1 system.” “R” stands for real‐time data processing. By the end of the 1970s, R/1 evolved into SAP R/2. The programming language ABAP (Advanced Business Application Programming) was also a derivative of R/2, originally serving as the report language for the system.

In the 1980s, SAP R/2 was updated to handle different languages and currencies‐‐subsequently, this lead to SAP’s international expansion into Austria, Denmark, Sweden, Italy, and the United States.

By the 1990s, SAP R/3 was introduced to the market. ABAP was an important foundation of the system as it was used to develop the R/3 platform. The client‐server concept, uniform appearance of graphical interfaces, consistent use of relational databases, and the ability to run on computers from different vendors becomes increasingly popular.

ABAP continues to serve as a development foundation for SAP, allowing customers to create custom reports and interfaces for their own systems. NetWeaver, introduced in 2004 by SAP, is their most recent development platform. It supports both ABAP and Java.

Currently, SAP’s client base reaches out to more than 12 million users each day. SAP is now also the world’s third‐largest independent software vendor.

Latest Products:

SAP provides a range of business software and enterprise applications to empower every aspect of the business.

SAP Business Suite software provides “best industry practices” with industry specific applications, as well as the core applications of the SAP Business Suite:

  • SAP Customer Relationship Management
  • SAP ERP (enterprise resource planning)
  • SAP Product Lifecycle Management
  • SAP Supply Chain Management
  • SAP Supplier Relationship Management

In addition to their Business Suite software, they provide a variety of solutions, including SAP BusinessObjects – a business intelligence platform, SAP Manufacturing, and SAP Service and Asset Management solution, which supports service management, service parts management, and enterprise asset management.

 

Future of SAP:

SAP is focusing on the following growth goals through 2010:

  • Double the size of the addressable market for business software and services to $75 billion
  • Increase customer base to 100,000
  • Derive 50 percent of revenue from new products by 2010

They are committed to growing organically, innovating with partners and acquiring companies that add specific technologies and capabilities to SAP’s software solution offerings.

Need More….:

SAP, http://www.linkedin.com/companies/sap (June 2009)
About SAP, http://sapsustainabilityreport.com/aboutSAP.html (June 2009)
SAP FANS, http://www.sapfans.com/?page_id=3
SAP, https://www.sdn.sap.com/irj/sdn/nw‐2004

History of SAP, http://www.sapfans.com/sapfans/saphist.htm (June 2009)
SAP-Business-Suite, http://www.sap.com/solutions/business‐suite/index.epx (June2009)
About SAP, http://sapsustainabilityreport.com/aboutSAP.html (June 2009)

Author: Leah Gormly

The Best Screenshot – Expression Encoder

Are you looking for a screencasting tool for Windows that doesn’t cost a dime but can still help you create high-quality screencast videos? Read on.

Microsoft Expression Encoder is essentially seen as a tool for developers to encode video files for the web with Silverlight. What you may not know, however, is that Expression Encoder comes with an impressive video screen capture application that is quite easy-to-use and offers more features than most other free screencasting solutions.

screen capture window

The program, known as Expression Encoder Screen Capture, is easy to learn and master and it won’t bore you with any of the technical jargon that is associated with video encoding.

To get started, simply select the area of the desktop screen that wish to capture as a video. The application has built-in presets for standard capture sizes, like 1280×720 for 720p or 1920×1080 for 1080p, or you may drag the red boundary to manually select an area. You can also perform full screen captures with Expression Encoder.

The default frame-rate for video screen captures is 15 fps but you can increase it to 30 or even 60 fps if you are recording, say, a video game walkthrough or even Google Earth.

You can toggle the microphone icon on the recording toolbar to add audio narration to the screen recording. Expression Encoder also supports “Picture in Picture” style video recording with your web camera, a feature that you are less likely to find in most other free screencasting tools.

Once you’re done with the recording, it’s time to edit and publish the video.

expression encoder screencasts

Expression Encoder offers a basic set of editing tools to help you fine-tune the recording. For instance, you may trim the boring parts or you can import external video clips and images (like an intro) to merge them with the main screencast.

If you would like to brand your screencast video with your own logo, just choose the “overlay” option and pick a location over the video where you want to place the logo. There’s support for sub-titles as well in case you would like to produce accessible screencasts.

The free version of Expression Encoder will let you publish screencast videos in Windows Media format and the maximum length of individual video screen captures is 10 minutes. The software supports Windows XP, Vista and Windows 7.

To give you an example, the above screencast video was recorded and produced with Expression Encoder. See more on screencasting software and online screencasting apps.

Source: Digital Inspiration

10 Tips for a Total Online Security

With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most Internet users. However it is still possible to effectively combat online insecurity provided that the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91% of the Internet users are unaware of the online scams and are worried about their security. Well if you are one among those 91% then here is a list of 10 tips to ensure your total online security.

1. Always install a good antivirus software and keep it up-to-date. Also install a good anti-spyware to keep your PC away from spywares. Click Here for a list of recommended anti-spyware softwares.

2. Always visit known and trusted websites. If you are about to visit an unknown website, ensure that you do not click on suspectable links and banners.

3. Perform a virus scan on the files/email attachments that you download before executing them.

4. Regularly Update your operating system and browser software. For a better security it is recommended that you surf the Internet through the latest version of your browser program.

5. Never share your password (email, bank logins etc.) with any one for any reason. Choose a strong password (A blend of alphanumeric+special symbols) and change it regularly, eg. every 3 months. Avoid using easy-to-guess passwords. (ex. pet’s name or kid’s name)

6. Always type the URL of the website in your browser’s address bar to enter the login pages. For ex. To login to your Gmail account type http://mail.google.com

7. Before you enter your password on any login page, ensure that you see https instead of http. ex. https://mail.google.com instead of http://mail.google.com. HTTPS protocol implements SSL (Secure Sockets Layer) and provide better security than a normal HTTP. For more information on HTTPS and SSL see Know More About Secure Sockets Layer (SSL).

8. Beware of phishing emails! Do not respond to any email that request you to update your login details by clicking on a link in the body of the email. Such links can lead to Fake Login Pages (Spoofed Pages). For more information on phishing refer What is Phishing?. Also refer How to Protect an Email Account from being Hacked.

9. Always hit the logout button to close your login session rather than abruptly terminating the browser window. Also clear your web browser caches after every session to remove the temporary files stored in the memory and hard disk of your PC.

10. Avoid (Stop) using any public computers or computers in the Internet cafes to access any sensitive/confidential information. Also avoid such computers to login to your email/bank accounts. You cannot be sure if any spyware, keystroke-logger, password-sniffer and other malicious programs have not been installed on such a PC.

By following the above 10 tips your online security can be guaranteed upto 90%. I hope this will help my readers for keeping themselves safe from any of the online insecurities. Cheers! Pass your comments.