Thursday, August 12, 2010

Multimedia and its application


The simplest type of application involves adding a multimedia data object to a traditional data object (multimedia e-mail or multimedia notes, for example). This type of application uses existing point-to-point networking technology and is not interactive in real time.
A second application category involves sending multimedia data objects to multiple hosts, such as with LAN TV or other forms of broadcast. This category needs to go to multiple locations but does not tend to require much real-time interaction.
A third category is point-to-point applications that may be real-time interactive. Many vertical industries are planning multimedia kiosks, for example. Some examples are the following:
* The financial industry wants to use multimedia kiosks at banks to provide detailed information about financial services.
* The retail industry wants to use kiosks in stores to help customers locate merchandise and find out additional information about merchandise.
* The entertainment industry wants to use kiosks as points of sale and to provide advertising for scheduled entertainment events such as the theatre, concerts, plays, etc.
* The entertainment industry is also interested in multimedia kiosks that allow multiperson video games to occur over networks.
* Digital libraries use large computer servers to store books, journals, and other Multimedia literature in digital form. Users access this information via computer networks.
A fourth category is applications that are both multipoint and real-time interactive. The primary example of this category of traffic is desktop videoconferencing. Desktop videoconferencing requires real-time interactive communication among groups of individuals who may not be at the same location.

cyber law and ethics


Cybercrimes can be basically divided into 3 major categories:

1. Cybercrimes against persons.
2. Cybercrimes against property.
3. Cybercrimes against government

Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important Cybercrimes known today. The potential harm of such a crime to humanity can hardly be amplified. This is one Cybercrime which threatens to undermine the growth of the younger generation as also leave irreparable scars and injury on the younger generation, if not controlled.

Using one's own programming abilities as also various progra-mmes with malicious intent to gain unauthorised access to a computer or network are very serious crimes. Similarly, the creation and dissemination of harmful computer programmes which do irreparable damage to computer systems is another kind of Cybercrime. Software piracy is also another distinct kind of Cybercrime which is perpetuated by many people online who distribute illegal and unauthorised pirated copies of software.

Professionals who involve in these cybercrimes are called crackers and it is found that many of such professionals are still in their teens. A report written near the start of the Information Age warned that America's computers were at risk from crackers. It said that computers that "control (our) power delivery, communications, aviation and financial services (and) store vital information, from medical re-cords to business plans, to criminal records", were vulnerable from many sources, including deliberate attack.

The above case cannot be registed with cyber police. You have to take help from local police station. Cyber police look for only the case that involve cyber law violation.

Offline Attack and Internet Security.


Offline attacks against Internet Security are another form of brute force attacks. This method enable the hacker to obtain data of the passwords from the server itself, and he runs the dictionary force software against this in his privacy, and tries to find out your passwords through a variety of permutations.This means your servers should be secure, which does not give the data to hackers, and keep out data-harvesters from their site. The servers have now developed formats which store passwords in a resistant format which does not yield to the brute force, even as an algorithm mixes a salt generated at random with hash-keys. These kids of passwords cannot be easily decrypted and a dictionary attack will take months to get at the right password, ensuring

Evolution Of Internet Security System


Changing Passwords is sheer wasting of time, claim some people, hitting at the conventional method of internet security. We have known that cryptic strong passwords provide personal internet security. But this conviction may be now outdated and even counter productive, exposing us to more and more risks than other users.
How Strong Should A Password Be, For Internet Security?
It is common to find that users are advised to change their passwords into strong ones, ensuring that they contain more than six characters and a mix of characters which never resemble simple words. This strength of password is based on the hunch that such passwords cannot be guessed by hackers. Times have changed and so have methods which criminals deploy.

Servers Should Have Lockout For Internet Security.
When it is clear that passwords do not offer you the best of defenses to you, the researchers have pointed out that internet security is dependent on a variety of policies which the servers should adopt to lockout instruction. While there are some websites who are already adopting such lockout methods, for example, when you fail to login after three attempts, your account is disabled albeit temporarily.
Unfortunately, this kind of lockout method punishes the user, who may have forgotten his/her passwords and logically trying to remember it. There is yet another lockout methods to keep the hackers at bay, in which a ratio is adopted, which is like if you fail to login after ten repeated attempts in a hour, your account may be withdrawn temporarily, which indeed is a better way to treat your user, at the same time locking out the attacks through dictionary method. Remember the attacker may have to try thousands of logins per hour to succeed in getting at the password

Communications protocol

The protocols in human communication are separate rules about appearance, speaking, listening and understanding. All these rules, also called protocols of conversation, represent different layers of communication. They work together to help people successfully communicate. The need for protocols also applies to network devices. Computers have no way of learning protocols, so network engineers have written rules for communication that must be strictly followed for successful host-to-host communication. These rules apply to different layers of sophistication such as which physical connections to use, how hosts listen, how to interrupt, how to say good-bye, and in short how to communicate, what language to use and many others. These rules, or protocols, that work together to ensure successful communication are grouped into what is known as a protocol suite.
The widespread use and expansion of communications protocols is both a prerequisite for the Internet, and a major contributor to its power and success. The pair of Internet Protocol (or IP) and Transmission Control Protocol (or TCP) are the most important of these, and the term TCP/IP refers to a collection (a "protocol suite") of its most used protocols. Most of the Internet's communication protocols are described in the RFC documents of the Internet Engineering Task Force (or IETF).
Object-oriented programming has extended the use of the term to include the programming protocols available for connections and communication between objects. Protocols fall into many levels of processes and complexity.
Generally, only the simplest protocols are used alone. Most protocols, especially in the context of communications or networking, are layered together into protocol stacks where the various tasks listed above are divided among different protocols in the stack.
Whereas the protocol stack denotes a specific combination of protocols that work together, a reference model is a software architecture that lists each layer and the services each should offer. The classic seven-layer reference model is the OSI model, which is used for conceptualizing protocol stacks and peer entities. This reference model also provides an opportunity to teach more general software engineering concepts like hiding, modularity, and delegation of tasks. This model has endured in spite of the demise of many of its protocols (and protocol stacks) originally sanctioned by the

History of computer in Nepal

Computer was introduced in Nepal in the year 1972 only. It was introduced by His Majesty's government for the population census of 1972(2028 B.S.) This was the second generation computer of IBM company called IBM 1401. The goverhment had paid Rs 125000 per month as rent for this computer

At that time British Government helped to develop manpower of NCC. In the meantime Nepalese students went to India, Thailand and USA for the computer education themselves. In 2039 B.S., microcomputers such as Apple, Vector, Sins, etc were imported by private companies and individuals. Many private companies like Computer Consultancy (CC), Management Information Processing System (MIPS), Data System International (DSI), etc were established. Such private companies started selling computers and training people in other to produce manpower in Nepal itself.

Nowadays, computers with faster processing and larger storage are found cheaply in Nepalese market. Students are given computer education from school level. At present Computer Association of Nepal (CAN) is the governing body of Nepal.


In 1994, Mercantile Office Systems and Royal Nepal Academy of Scient and Technology contracted an Internet feed from a site in India. Since the transmission was over cable, the quality of the line was VERY poor and the UUCP connection was not reliable. It was not uncommon to try several hundred time to retrieve a few messages from the spooled computer in India. This effort was commercialized although there were significant losses. However, the CEO, Mr Sanjib Raj Bhandari considered it a necessary investment for the future of internetworking in Nepal
Also in 1994 Sanjay Manandhar volunteered to set up a private net called HealthNet for Satellife in Cambridge, US. It was started using the same UUCP technology. However, the mail exchange was with a computer in Cambridge, US over good international lines. Hence, the throughput and reliability was good and several hospitals and doctors were, therefore, connected to the network of healthcare providers in the world.
As of January 1996 only these two nets allowed limited access (email and some newsgroups) to the Internet. Mercantile was experimented and later provided more Internet functionality such as file-transfer (ftp), remote logging in (telnet), etc. but did not have enough bandwidth to provide WWW commercially