Jump to content
xisto Community

phpphp

Members
  • Content Count

    113
  • Joined

  • Last visited

Everything posted by phpphp

  1. did you recieve any msg from vikyluv...:D

  2. You have described the what is reading! How we read and what reading required. Reading sometimes headace beacuse of language barrier and lack writer's writing skills. Now research shows graphical represetation with text is more readable than only text
  3. the title should be stupid should be banned to use and drive cars.
  4. What i understand that Your friend tried to cheat and you took revenge and sacrifice your love. You current love is not your real love rather its revenge that you took from your friend. Maybe your friend's girl also wanted to make jelous your friend because you said that your friend start interested in your girl friend. But I think you should be straight farward, and you should ask both before break up. Sometimes emotional decision make situation more worst. If your girl friend was not loyal to you, then its good to leave her! If you really intrested in true love then find someone else....
  5. you can compress as much as you want but you have to compromise the quality. Now a days it is being research how to compress video wihtout losing quality posilible. There are many algorithm developed offer their quality and compression ratio. you can read details about if from http://en.wikipedia.org/wiki/Video_compression Divx offer good compression compare to quality.
  6. lol, that hilarious and bit ridiculous!Most european countries's prison has many facilities that common man may not enjoying in real life. Its funny one hostile fellow was caught by police and I visted him and astonished to see the facilities in sweden prisons . Many of mentioned facilities were avaliable and I thought its not bad idea to spend few days in prison.........:DDDD
  7. phpphp

    Good Photo Editor

    to be honest, today as memory size has inreased dramatically and companies dont bother to care about less memory size. So its very difficult to suggest you such program with low memory size requirement. Graphic works requires memory alot.
  8. I used to watch American Home made video program and really enjoy. To be honest the video was normal not much funny. I recommend to watch American Home Video and just for fun for hilarious videos:)
  9. I have used Kaspersky Internet Security for several months and found best Internet security solltution. I like the very intelligent virus detector and smart firewall. Another great feature is banner blocker that block every kind of advertisement unlike other advertisement blockers. In windows 7, the antivirus worked very well except few days ago I faced update problem due to unknown reason. But I am quite satisfied with this antivirus and recomoned this antivirus...
  10. I used to watch scary movie alot. But now my interest has change a little bit. The most scary movie I have seen so far is Mist. The creatures shown in this movie is very scary and different from other movie. Every scene is very scary. I like the last scene when dad kill his son and other two guys with him and then tried to kill himself to save from dreadful death. but bullets had finished and after few moments he saw rescue team has reached and they have saved alot of people. But the dad who has killed his son with his hand with very sad sound made me cry...Another scary movie which I liked is I am legend.
  11. Human is supposed to be honest and loyal to one partner so in this case people will definately call her ****. What I have learnt so far is that a human is recognized by character. If character is good, then people respect that person and if not then that person can never earn respect. you can ask her, what she expect from her partner?
  12. As nobel prized is distributed in Sweden and the decision was made in Oslo. The decision was shocking not only for world but also sweden. Many thinks its unfair decision and question for the credibility of Nobel Prize. you can read more how swedish are shocked to know about this decision... https://www.thelocal.se/20091009/22560 I also dont understand what Obama has practically done for peace. The war in afghanistan and Iraq is going on same as in Bush period. Guantanamobe prison is still open as it was. Economic condition is being worst day by day. If Obama deserve this award then Bush also deserve for award for same decision.
  13. You website is okay. you have chosed godo template. Contents are pretty easy to access. Every section is seprate. Inshort website is simple and easy to use. But as its very small website with few contents and I know you will work in future...I oepend your website in firefox as website has almost half screen size header with logo, I think you can improve by reducing its size. in this way you will have extra size for even advertisement. moreover I have best internet speed, and found your website little slow to download contents. Instead of adding only one content(news) per page, you can add different catagories news or more news on home page. Because when new user comes he must be attracted with lot of material as you want to people spend their time on your website. You need to match color of your website and forum with the same logo, as people feel they are surfing same website. I think its good to have same plateform instead new page. you can add catagories section too....
  14. These companies only offer limited time hosting for spcified files size. Humyo.com is best wesite to host files. You can share files and you can do colaborated work free of cost. Moreover there is no time limitation and file size limitation as you can host files upto 5GB. I search for many free file sharing and found this best. They offer very good downloading uploading speed. You can even do you work online thorugh JAVA interface. You can even just through your files on the interface and files will start uploading like you do in your Operating system. You may get alot of space from microsoft but they have size limitation upto 20 MB. similarly google has file size limitation. But Humyo.com is best!
  15. Notice from jlhaslip: copied from http://forums.xisto.com/no_longer_exists/Quote tags added. We treat Spam seriously here. Next occurrence will be a warning issued.
  16. Its pitty, most of these cities belong to developing countries when all item which produce dangerous wastage in these countries are being used all over the world especially developed countries. Take example of leather, textile etc which produce dangerous wastages are prepared in these countries but most of the product sell to developed countries and pricess are very normal due to tough compitetion and companies cannot make enough money to process wastage. and Goverment is also poor so life of many poeple are at stake. I think this matter should be taken on international level and all the developed countries should help these countries. After all, these climate change will not only affect these cities it will affect sorrounding even other countres.
  17. that will not make your window heavy? Once I remeber did this kind of thing and my window got many problems.
  18. I am wandering US has no problem in selling dangerous weapon to world and feel fear on such matters. The recent example related to this topic would be, deportation of students from UK. They only share a email that was encypted. Agency tried to decode it and maybe they failed so they just ordered the student get of this country. After investigation, couldn't get proof but decision was done to prevent any possible terrorism activity. So it could be more dangerous than we can even think.
  19. I wanted this script for my website so now I will not have search the sollution it seems simple. Thanks for tutorial...
  20. It sounds like your hardrive got bad sectors. I experienced these kind of problem when my harddrive was suffering from bad sector problem. other problem would be some other hardware malfunctioning, like display driver fan stops sometimes etc..... or some virus.... only test can show the real problem. First scan your computer to know some possible hardware problem that can be achieved by vendor published testing software or third party software then scan for possible spyware or virus.... best of luck
  21. The topic was improtant so thougth I should share it with you guys. As its written by me with all reference and never publish anywhere so no copyright issue:) I have share important section here, rest you can read from attached file... Abstract Malicious software is referred to spyware that affects privacy and confidentiality of individuals and corporations and poses security risks. In this research paper, we presented different types of spywares, their behavior, how spyware works and spread? This paper also discussed the potentials of spyware to damage the computers. This report also shows investigative results of an experiment we conducted; to know the infections and risks of spyware in a computer with and without antispyware. It also includes some recommendation to prevent the spyware. 1. Introduction Spyware is any technology which helps organization to gather information about a person or an organization without their knowledge [1]. There are large numbers of synonyms of spyware including sneakware, stealthware, snoopware, trackware, thiefware, scumware [2], that have popped up in the past year or so. Spyware gathers sensitive data or secretly monitor user's activities, especially the typing of passwords, PINs and credit cards numbers, email addresses and sends to individual or company through user's internet connection (backchannel) [2]. Spyware is a package which contains two separate software components that perform two types of functionality. One component performs core functionality for which user has installed the software and second component perform gathering of information functionality and act as spyware [3]. Today spyware has become a big security risk that is effecting and damaging computers very rapidly. It is a relatively new phenomenon, and according to users of Microsoft, it affects more than 50 percent of Windows operating systems failures [3]. Dell estimated that 90% of Windows PCs have at least one spyware program on the base of a survey conducted on September 2004 [4]. Spyware can perform different function like capturing information, displaying ads, dialing a number etc by one program, but usually different types of spywares perform different functions. There are various types of spywares and a lot of such programs exist throughout the internet today. Spyware does not spread automatically, but mostly users themselves open the door [4]. Spyware can get or install into the computer with free downloads like screensavers, accounting software, games, movies players, web browsers, peer to peer file sharing etc that are bundled with some spywares or through ActiveX controls that are hidden in the source code of websites or pop-up advertisements while you browse the websites. These bundled programs and ActiveX controls can open doors to install a wide range of spyware programs onto a user's computers [6]. Spyware are evolving very rapidly and effecting not only individual but also corporations. If spyware is installed on the client user workstations, can significantly impact on business confidentiality of stored information. Spyware can also impact on the users' privacy, connected to the internet or intranet both at home or corporate environment [7]. America Online and the National Cyber Security Alliance (AOL/NCSA) performed spyware scan on 329 customer's computer and reported that 80% were infected with spyware programs and each customer's computer contained average of 93 spyware components [8]. The spyware have severe impacts on Reliability, Annoyance, Privacy, Security and Performance of user computers. The goals and objectives of this study were as follows: ? To explore and analyze behavior of different types of spywares ? Identify the risks of spywares to individuals and corporations ? To Explore the potential of spyware to effect or damage the computers ? Scanning Selected computers for spyware ? Compiling and analyzing scanning result. 4.0 How Spyware works? Spyware effect or attack on computer from different levels [15][16]. The levels vary from low to high security risks for individuals and corporations. The low security risk level is simple cookie, in which user?s website information stores, such as user name and password through which user can access the website without entering password again and again. This level has minimal risk. But it is a security risk and in some situation we cannot tolerate this kind of risk The other level of security risks is more dangerous for individual and corporations. The second level of security risk is associated cookies that can track and capture important information from user?s computer. The third level is application based. It has severe security risks e.g. it can gain the control of the system. 4.1 First level: Basic cookies The first level of spyware or low level spyware is considered simple cookie identification for single and specific site. Different websites require storing user information to identify the user from specific computer, when the user uses the website in future. The cookie identification allows this. In most cases it is useful because user agree before storing information and sharing it with the site. However it is considered type of spyware with low level security risks. Because user identification information is stored in the cookie that would be abused [15]. 4.2 Second level: Associated cookies Associated cookies are great security risks for individuals and corporation. These cookies are associated with member site to identify a single user every time when user connects to the site. The user?s activities are tracked in the result of user?s interaction with the each member site. These stored data can be shared with advertising companies that form an agreement with the member site. The member site gives a reference of advertising site on their site that can be in the form of an image or pixel. These are actually reference to the spyware data server. These references cause to connect the spyware data server to the user?s computer. The spyware server then looks for the recognizable cookie. If server fails to find the cookie, server sends a cookie with Unique ID that is called Global Unique Identifier (GUID) to recognize the object every time when connect to the member site. Now the spyware data server can track and capture different kinds of user?s activities exchanged with the member site through GUID. It can capture username, password, credit card, keystroke, email or any other information stored in the associated cookie through member site. The advertising company can share this information without the permission of the users. The worst thing in this scenario is user unawareness from these activities performed by member and spyware sites. Advertising company can use this information for direct marketing or can sell to any concern companies. The major security risk is that if sensitive data about an individual or corporation is exposed, the advertising company has no obligation to inform the users. As the advertising company don?t show their intent to capture the sensitive data [15]. 4.3 Third level: Application based The third level application based spyware cause severe security exposures and risks to individual and corporation. The application based spywares gain the full control of the system without allowing user to restrict their functionality. As the user starts the computer, spyware activates. Spyware can get all types of data and can send it to the other sources. This type of spyware have not only the characteristics of first and second level spywares but also have abilities to install new application, upgrade new version and generate new advertisement without the user?s permission. Anyone can buy application based spyware to spy on anyone, widely available on internet. Mostly intelligence agencies and hacker communities use application for their concerns [15]. Final_version.pdf
  22. Man you should learn cooking, its my suggestion. In my home i never cook even never ever saw how everything become eatable and delicious after cooking. When I moved to other country for studies then I came to know, oh to eat anything we have to cook :-). Not even cook in certain way in certain timing. When you are dying with hunger and noone here to help then you will find the improtance of cooking :-). You can lively solely on burgers and already cooked things. you must have to cook yourself that I experienced abroad.
  23. I just tested your chat box. First thing is you haven't make good interface. you should make table or something to make a sofisticated interface and secondly you need to use pagination to show history after 10 posts. there are many ways for the pagination. the simplest way is use some classes widely available on different website.
  24. this is the worst economy condition! In US unemployement reached more than 9 percent. Millions of poeple are losing their jobs wihout any reason. Here in sweden, freinds are applying for the job, and the condition is, employer dont even bother to call for interview. Few friends got job by reference (consider it most important factor). But I dont know our fault for this worst conditno of economy. I was reading that situation is being changed and thing are coming back to normal state. May be next year we can see some good change. Hope for the best.
  25. scientific reason is straight farward when moon come between earth and sun then eclipse occur and i think this reason is very simple to undertand. you have mentioned activists and critics, what are their claim? how its myth?
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.