Pages

Wednesday, December 31, 2008

how-to-store-data

Data Management System
GData

Google's mission is to organize the world's information and make it universally accessible and useful.

Sometimes making information accessible requires making it available in contexts other than a web browser. Thus, Google provides APIs to let client software request information outside of a browser context.

GData provides a general model for feeds, queries, and results. You can use it to send queries and updates to any service that has a GData interface.

GData is a new protocol based on the Atom 1.0 and RSS 2.0 syndication formats, plus the Atom Publishing Protocol.

Syndication is an effective and popular method for providing and aggregating content. GData provides a way to expand the types of content that Google can make available through syndication; in particular, it lets you use the syndication mechanism to send queries and receive query results. GData also lets you send data to Google, and update data that Google already has.

#
Core Data API Documents

* Overview
* Protocol Basics
* Protocol Reference
*
Expand AuthenticationAuthentication
o AuthSub Overview
o OAuth Overview
o ClientLogin Overview
* Common Elements
* Client Libraries
* Batch Processing
* Samples

#
Service-specific documents

* Apps APIs
* Base Data API
* Blogger Data API
* Calendar Data API
* Code Search Data API
* Contacts Data API
* Documents List Data API
* Finance Data API
* Health Data API
* Notebook Data API
* Picasa Web Albums Data API
* Spreadsheets Data API
* Webmaster Tools Data API
* YouTube Data API
Example:
For details of information pertaining to
Google Health Data API











Google Health has its own
AuthSubRequest handler at
https://www.google.com/health/authsub?....

This is different from the normal
AuthSubRequest page,
https://www.google.com/accounts/AuthSubRequest?...




http://code.google.com/apis/health/ccrg_reference.html

http://www.ccrstandard.com/



http://www.ccrstandard.com/


http://code.google.com/apis/health/ccrg_reference.html


Google Data APIs Overview - Google Data APIs - Google Code

On Fast Track
with
Dr. Ashok Koparday



Reblog this post [with Zemanta]

Read more On "how-to-store-data"!

Tuesday, December 30, 2008

who-is-web-developer

We know web sites. Do we know the difference between web designer, web developer, web site administrator?

This is explained by using Joomla! as an example.

You do know who is web site user. Its you and me. Website users are the very people for whom the designed website offers its services or products. If you are reading this page you are the user. Those who create and display the rich contents of this website so that you can peep in and and read on are the rest of the web technology people as described below.

Search Engine Optimization is done by another breed of web tech people, not mentioned in this list, though all except the end user of your website [and translators] are doing the same; trying to make contents of your web site easy to access by the end user who uses search engines like yahoo or Google to search services or products you furnish through your web site.

To make it easy to find the information you need, read the profiles below and choose the one that most accurately describes your current role. This will take you to an area where the documentation is organised according to the goals that you are most likely to require help with. There is a lot of overlap in the documentation for each of these roles; they are not mutually exclusive; so just choose one that seems to be nearest to your own role even if the fit is not exact. To make these user profiles more concrete and so help writers to target the material more accurately, we are looking at creating personas for each of the profiles.

Beginners Glossary of terms used for people who finally make the web site that you use. Behind the screen, back stage wizards.
Maybe you want a Web site of your very own. Maybe you have a small business or a church or a community that needs a web presence and you want to use Joomla! for that purpose. Maybe you are a seasoned Information Technology professional, but you have no idea where to get started using Joomla!. If so, you are just starting a very enjoyable journey and we warmly welcome you to Joomla! and encourage you to use the Absolute Beginner's Guide to Joomla!
Evaluators
As someone charged with evaluating Joomla! for your requirements, you want to find out as quickly as possible whether Joomla! is a good fit with your project.

Content creators
As a content creator you might have only a rudimentary knowledge of Joomla! Just sufficient for you to carry out your job of writing, assembling and publishing content on the website. You will need information about how to achieve specific goals associated with content creation starting with very basic information such as how to use a WYSIWYG editor. After becoming more proficient you might benefit from information about how to make use of some of the more advanced features that will streamline routine tasks.

Editors
As an editor you will be responsible for reviewing the work of content creators, amending it where necessary.


Publishers
As a publisher you will be responsible for ensuring that content on your website is kept up-to-date and relevant to your target audience. You might commission content creators and liaise with editors to ensure consistency and good organisation of the content.


Administrators
As a website administrator you might be concerned about the visual appearance of a website but will pass responsibility for making changes and improvements to a web designer. Similarly, when changes to functionality are required you will contract a web developer to do the necessary work. As a website administrator you are responsible for the day-to-day operation and maintenance of the website. Activities might include ensuring that the site is properly backed up; managing user access; possibly installing extensions. You will also have responsibility for maintaining the security of the website.


Web designers
As a web designer you are concerned with the visual appearance and user functionality of a website. For example, you will want to know how to alter the visual style of an article but will usually not be concerned about the article content or how that content is entered and maintained. Your primary focus is the visitor experience. You will be knowledgeable about HTML and CSS but might have only rudimentary programming experience and so could need extra support when dealing with Javascript and PHP. Your knowledge of Joomla! itself may not be advanced as you may have to deal with a wide range of content management systems while working for a range of clients. You may be contracted to supply just a template or set of templates, or you may be asked to deliver a complete working website. You are likely to be increasingly concerned with issues of accessibility and will probably want to ensure that your designs pass various standard tests.


Web developers
As a web developer you may not be too concerned about the visual appearance of a website as you are tasked with producing functionality. You will probably have a good knowledge of HTML and CSS but will also be proficient in Javascript, PHP and a range of other languages. If you are new to Joomla! you will need support in developing or customising Joomla! extensions (components, modules, plugins, templates and languages). You will need information about the Joomla! Framework API and how to use it and will probably make extensive use of best practice example code. A strong understanding of Joomla! security issues is also important to you.
Developers


As a developer you are tasked with altering or extending the functionality of Joomla! or one of its extensions. You will be proficient in a range of programming languages, including PHP, but may be less familiar with such things as JavaScript or CSS. If you are new to Joomla! you will need information about the Joomla! Framework API and how to use it and will probably make extensive use of best practice example code.


Testers
As a tester you are tasked with performing a predetermined sequence of operations in Joomla! and carefully observing and recording the results where they deviate from those expected. You may not necessarily be a developer, but you will probably be quite familiar with Joomla! itself.


Translators
As a translator you are asked to take on the responsibility of translating all the discrete strings found in the Joomla! front and back-ends as well as creating the necessary translation files. You do not have to be a Joomla! expert to contribute to the translation teams, and you do not have to have any development experience, although many of our translation workgroup members are experts and developers. You will need to know or learn how to use the translation debugging mode and how to assemble your translated strings into a translation file. You will also need to know or learn how to package translation files into an installable translation pack.


Trainers
As a trainer you are tasked with producing and running training courses and you will need to create training materials to support your learners. You are likely to have a thorough working knowledge of the aspects of Joomla! that are the subject of your training courses, but you might need to refresh your knowledge from time to time, especially as new developments take place. You will want to have access to ready-made training materials that you can adapt for your specific circumstances.


Documentors
As a documentor you have the unenviable task of creating material for a wide range of readers from beginning users to advanced professional developers. You will need to know how to use various tools (such as this wiki) and you will need to read guidelines and other meta documents. You will probably need to update those documents over time too.

source:

Start here - Joomla! Documentation

What is Joomla?
This is how Joomla! defines itself "Cutting Edge Content Management"
Joomla!
is one of the most powerful Open Source Content Management Systems on
the planet. It is used all over the world for everything from simple
websites to complex corporate applications. Joomla! is easy to install,
simple to manage, and reliable.
Other example is WordPress.org
On Fast Track
with
Dr. Ashok Koparday

Read more On "who-is-web-developer"!

Monday, December 29, 2008

programmer-prezemyslaw-rumik

Web technology people make the use of PC/Internet a child's play for us. Also called as 'Geek', they are fascinating species of human beings who do magic with software. "Programming is not a child's play", you will admit. You are wrong.

Who is Przemyslaw Rumik?
Przemyslaw Rumik, Polish citizen, is a prodigy who wrote his first program at age 12 years even before he owned a computer. Prezemyslaw is a noteworthy Computer Systems Specialist/Software Engineer and a Sun Certified Java Programmer.

People of his calibre stand apart because of their contribution to open source.
Przemyslaw is the author and main developer for OpenOffice.org2GoogleDocs - AddOn for
OpenOffice.org
to export and import documents between OpenOffice.org
and Google Docs or Zoho.

What is OpenOffice?

For those who are unaware, OpenOffice is equivalent to Microsoft Office [some say it is better] and has all functionalities as Word, Excel, Powerpoint. I do not use Microsoft Office anymore. Most important is its generosity. OpenOffice is free.Microsoft Office is not free or is pirated (offense liable to prosecution)

What he says [In his own words]

I love new challenges, new areas of development.
Give me a difficult problem to resolve and you will make me happy :-)

I wrote my first program when I was twelve. When I wrote this I
even don't owe computer ;-) I used paper and pencil ;-) when I got my
first computer I started from checking if my program was working ;-) it
wasn't ;-) but I fixed it and I found my future ;-)


From this time I wrote software for computers, web browsers,
micro-controllers, PDAs, cell phones and even some very simple robots.
My software helps visual impairments people, it helps in calibrating of
CDMA BTSes, helps in manage and localization of vehicles fleets and
helps travel agents in theirs work. I wrote programs in Java (J2SE and
Java 5.0 SE, J2EE, JSP) with SQL (Interbase and Oracle), scripts for
web pages in JavaScript (AJAX and dHTML with DOM), programs in C#
(ASP.NET and Compact Framework) and Delphi.

I’m interested in Rich Web Applications, Virtual Machines
(especially Java Virtual Machine), Text Classification, Data Mining,
Multi Agent systems, TDD, XP and other cool things ;-)

I'm author and main developer for OpenOffice.org2GoogleDocs - AddOn
for OpenOffice.org to export and import documents between
OpenOffice.org and Google Docs or Zoho.

I worked with process on level 5 of CMM as Defect Prevention Champion and ODC Champion for my project.

I'm Sun Certified Java Programmer for Java SE 5.0

Przemyslaw Rumik’s Specialties:

Java (SCJP, J2SE & Java 5.0 SE, J2EE (JSP, JavaBeans), J2ME and
Personal Java), JavaScript (AJAX, dHTML with DOM), also C# (ASP.NET,
Compact Framework), C/C++, SQL (Interbase and Oracle), HTML.
Some Python and Prolog.

On Fast Track
with
Dr. Ashok Koparday

Read more On "programmer-prezemyslaw-rumik"!

Friday, December 26, 2008

hack-domain-name

Is your domain name popular, with huge traffic?
How to protect 'domain name'?

How your domain name can be hacked?

If your domain is popular and have some traffic, many people will try to hack your domain name, If anyhow they change the whois information of your domain name with change of registrar, you will not able to do any thing to get back your domain

To protect your domain Insure following steps.

1. You must have updated whois information

2. Your Email address at whois information at your domain should be working, and you should check your domain whois and your email at regular interval.

3. You must lock your domain name, this is a facility available at free at your domain control panel. This is the most crucial step to protect your domain from hack.

4. Renew your domain name much before your domain expiration date.

5. Don’t reveal your control panel username and password to any one. and don’t use the same information for all of your account.

Thanks to Prasanna, US
How Any People can Steal or Hack Your Domain Name | Web 3

On Fast Track
with
Dr. Ashok Koparday



Reblog this post [with Zemanta]

Read more On "hack-domain-name"!

Tuesday, December 23, 2008

new-browser-by-google-chrome

Which browser are you?
XXX Browsers war XXX
Firefox | Google Chrome | Opera | Internet Explorer | Flooble

  • Internet Explorer Microsoft IE8 is a browser.
  • FireFox 3.05 is Mozilla's web browser
  • Opera Browser and now Google comes with its own browser
  • Google Chrome
Google Chrome is a free open-source web browser developed by Google.
What is Google Chrome?
Chrome

When Google decided to make a browser, they wanted to completely rethink the browser, as browsing now is very different from browsing the early simple text web pages, now we email, shop, pay bills, and run other large application in our browsers.

Download Google Chrome.
What is new?

Google Chrome is an early beta version, and at the moment, for Windows only, but it has some new smart features.

Google Chrome is running each tab isolated from another, which prevents one tab to crash another, and is also more secure, and better for the memory; when a tab is closed it's memory use is eliminated.

Google added a more powerful JavaScript engine, V8, which will make large application perform better.

The start page offers new functionality, a bit like Opera, with your nine most visited web pages, a list of recently visited pages, your favorite search engines and more.

Because it is an open source project, new features will be added, and other browser developers can adopt what they find useful, in their browser.

Google has made a comic book presenting Google Chrome:

To Download Google Chrome Click Here

http://www.google.com/googlebooks/chrome/

Google's Policy and Disclaimer dated 15th August, 2008 says

10.1 Google gives you a personal, worldwide, royalty-free, non-assignable and non-exclusive license to use the software provided to you by Google as part of the Services as provided to you by Google (referred to as the “Software” below). This license is for the sole purpose of enabling you to use and enjoy the benefit of the Services as provided by Google, in the manner permitted by the Terms.
Google Chrome Browser
 
On Fast Track
with
Dr. Ashok Koparday



Reblog this post [with Zemanta]

Read more On "new-browser-by-google-chrome"!

Saturday, December 20, 2008

convert-indian-language-to-any-other-indian-language-using-baraha

You can convert any Indian language to another Indian language
using the magician Sheshadrivasu Chandrasekharan's software at baraha.com

I would like the name

Shri Sheshadrivasu Chandrasekharan

creator of unique software 'Baraha' (meaning 'Write') to figure proudly in the headlines of Indian News Media, at least as a refreshing change from stale politics/movie gossip/crime reporting. Perhaps it will when it receives prestigious award and makes news in Europe and US.

Bottom
Baraha (means "writing" in Indian language called Kannada, which is the mother tongue of Shri Sheshadrivasu Chandrasekharan) is in use since 1998.
Software Baraha is an example of Typical Indian Culture where Genius and Generosity, Intelligent and Intense Workmanship go to generate Unique Creative Application that is Given to all, in Spirit of Dedication, with Indian hallmark of humbleness, as seen in its Low Profile, that is being bereft of jazzy advertisement or marketing gimmicks (like 'No. 1 on Bestseller list'). This is Baraha (meaning 'writing'), a sophisticated creation of Sheshadrivasu Chandrasekharan of India that transliterates one Indian language to another Indian language.


Bottom
Baraha means 'writing' in Kannada. Baraha is a transliteration based application which converts 'Indian language text written in English' to their own respective scripts.
To Top

Bottom
The first release of Baraha software was made on January 1998. This initial release was developed with an intention to provide a free, easy to use Kannada language software to enable even non-computer professionals to use Kannada in computers thereby promoting Kannada language in the cyber world. Today hundreds of thousands of Indians are using Baraha for sending e-mails to friends & family across the world in their mother tongue. Many websites have been created using Baraha. Various Indian organizations around the world are publishing their newsletters using Baraha. Government & private offices, schools, litterateurs, journalists are among those who have been using Baraha for documentation purposes.

Bottom
To Top
The biggest challenge for use of Indian languages is the keyboard. At present, usage of English language & English keyboard(QWERTY) in computers is inevitable. One has to use the English keyboard only to type Indian language text. Today, there exist many different keyboard layouts for typing Indian languages.

Bottom
To Top

Download Baraha 7.0 Build 9
Download BarahaIME 1.0 Build 5
Get Help Here
To Know More Click Here
Baraha fonts in Kannada, Tamil, Telgu, Malayalam, Gujrathi, Gurumukhi, Bengali, Oriya, Devnagri, which includes Hindi, Sanskrit, Marathi


Many such layouts are based on the earlier typewriter designs, which are not at all relevant for the intelligent computers. It is also very difficult and confusing for a common user, who most of the time uses the English keyboard, to switch to one such keyboard for quickly typing an email in Kannada or Hindi.

To Top
Baraha breaks the keyboard barrier for Indian languages by using a transliteration scheme in which any Indian language word may be typed using the standard English keyboard. Baraha user doesn't feel any discomfort when he switches between typing Indian language text and English. In fact, writing in Baraha is as simple and easy as writing our names in English! Kannada and Hindi text such as cheluva kannaDa nADu, merA bhArat mahAn can be typed as shown.
To Top

Bottom
Many Indian language software were created based on True Type fonts (ANSI encoding) many years before Windows/Linux re-introduced them using Open Type fonts (Unicode encoding). Even today, majority of the Indian language content is being created using TrueType fonts and almost all Indian publications use ANSI based TrueType fonts for printing and online publications. Baraha breaks the barrier between ANSI and Unicode. Using Baraha, one can effortlessly convert text between ANSI and Unicode. For example, there are a lot of Tamil documents that are created using True Type fonts based on TSCII - which is a popular standard for Tamil. These documents can be converted to Unicode with a few keystrokes! Similarly, when a user on Windows 98 - that doesn't support Unicode, receives a Hindi email in Unicode, he can convert it to ANSI and read it.

Bottom
To Top
Baraha breaks the script barrier between different Indian languages. All the Indian scripts are derived from the Brahmi script, which is also the underlying concept in Baraha. Baraha uses a common code (BRHCODE) for representing all the Indian languages. So, it is possible to convert text from one script to another. For example, lets say a Malayalam user who understands Hindi language receives a Hindi email. If the user is not fluent in reading Devanagari script, then he can convert the email to Malayalam script and read it.

To Top
One of the main objectives of Baraha is "portability of data". Baraha can export the data in various data formats such as ANSI text, Unicode text, RTF, HTML. User can convert documents to Unicode format by a few clicks of mouse, which means the documents that are created in Baraha, stay relevant in the future and will never become obsolete.

Bottom
To Top
"Language is not just a means of communication. Instead, it is the only means that can save the culture of its people."

Baraha was made freeware in order to motivate Indians to communicate in their languages on computers. We believe that only an easy to use, good quality, free Indian language software can jump-start the extensive usage of Indian language on computers, which today is dominated by English. Baraha may be freely downloaded and distributed to others.

Contact Anakru Foundation
K.T.Chandrasekharan
57, ITI Layout
BSK 3rd Stage
Bengaluru - 560085

#Phone: 26692694
To Top
On Fast Track
with
Dr. Ashok Koparday




Reblog this post [with Zemanta]

Read more On "convert-indian-language-to-any-other-indian-language-using-baraha"!

Thursday, October 23, 2008

browser_statistics

internet explorer logo imagefirefox logo imageChanging of Web Browser use from Internet Explorer (IE) to FireFox (Fx), and now Google's Chrome (C) is speeding up. Astonishing statistics of Web Browser use shown below are taken from w3schools, opera logo image


which sets up standards for the web. See the giant leap taken by Google's Chrome in couple of months.

Internet Explorer is Microsoft's© internet browser, began 1995.
FireFox is Mozilla's web browser, released 2004 and
Chrome is Google's internet browser, beta version, released August 2008.

WHY LESS PEOPLE ARE USING MICROSOFT'S© INTERNET EXPLORER?
The Open Source browsers Firefox and Chrome are FREE. Microsoft's Internet Explorer is neither free nor open source. Besides other factors, undoubtedly the Open Source browsers are more secure and safe than Internet Explorer.


WHY IS MICROSOFT© LOOSING ITS GRIP OVER CUSTOMERS?
Microsoft© products are for customers; Open Source products are for users.

The monopoly of Microsoft© in the entire Internet Technology is crumbling rapidly. Microsoft© is still holding its clenched fist monopoly in Internet Technology. Open Source is coming up. Open Source is created by versatile pool of Computer and Web Technology experts world over.

Open Source, meaning the source is available to anyone (not hidden by ownership copyright).

Amazing Web Browser Statistics.

[1]
2008-September
IE7 =26.3%
IE6 =22.3%
Fx =42.6%
Chrome =3.1%

[2]
IE was introduced in 1995 - 48.6% - consumers.
Fx was released in 2004 - 42.6% - users
Chrome was released 2008 - 3.1% - users

[1] http://www.w3schools.com/browsers/browsers_stats.asp
[2] http://www.w3schools.com/browsers/default.asp

IE Internet Explorer
Fx Firefox

Given below are
FEW MORE DETAILS FOR THOSE INTERESTED

FIRST RANK
Though Internet Explorer (IE 6 and 7 together) is the largest used web browser in the world today, the situation is likely to change as Google Inc, the Goliath, is dispensing free its beta edition of web browser Google Chrome. Chrome has reached 3.7% of world wide browser share in short span of couple of months (released 2008 August, 15).

THE SECOND RANKING
Mozilla Firefox is safer and secure web browser today.


OPERA

'Opera' rhymes with 'Oh! Pyara, (ओ प्यारा ) which means 'Oh! Lovable' in Hindi language। Hindi is India's national language।

I like Opera, the magnificent web browser from Norway.
Important - It is free.
It has enviable features that have been incorporated in Internet Explorer (version 7, vista) as well as Firefox 3 (latest version is 3.0).

WHY IS OPERA NOT LEADING OR MORE POPULAR?

It is my guess that it has less muscle power in the internet industry compared to Microsoft and Google Inc.

Check this for yourself, Opera Mini is the best hand held mobile phone browsers that easily beats Google's mobile browser in quality and features.
Yet, have you noticed that Nokia, one of the topmost hand held cell phone manufacturers ousted Opera Mini (version 4) as its default search engine and replaced it by Google's search engine.

Opera Mini is still the cutest browser for the hand held device.
Firefox is yet to come with a viable browser for hand held devices and as with everything else related to Microsoft its Mobile Browser is not free.
If I have both Internet Explorer 7 on my desktop and Mozilla Firefox version 3.0, I need not tell you that it is Mozilla Firefox that I will use and keep Internet Explorer as standby (stephani) or to check web designs compatibility on the Internet Explorer.
So ends the little web related gupshup. गपशप

The logo images belong to the respective owners. They are taken from w3schools

Read more On "browser_statistics"!

Saturday, June 21, 2008

how-to-make-favicon-on-addressbar

The small icon you see in your address bar is called the flavicon.
If you wondered how to make a flavicon and wanted one for yourself read on.

How to create a great Favorites Icon
Favicon is a small image (16x16 pixels), which is shown in your browsers location bar, next to the URL. The easiest way to create one is to use an icon editing software. Don`t have one? No problem. You can download it for free form our Webmaster Center. You can also use one of the online favicon generators you will find at the bottom of this page.
How do I create a Favicon .ico File ?


1. Create an image that is 16x16 pixels in size. You could also use an image you like and resize it. But remember, the image has to be in proportion (50x50, 100x100) or your favicon will not look good.



How to create a great Favorites Icon

D. Champ Webmaster


2. Save the image as an .ICO file. Name it exactly: "favicon.ico" or it will not work. Upload it to your website s root directory (that`s next to your index.htm file).

3. Add the following lines of code inside the section of your pages.

4. You re done.

Testing the Favicon


If you are using Internet Explorer and your favicon is not showing up, make sure you clear your browsers cache. You can do it by pressing Ctrl and F5 at the same time. Favicon Benefits or Why should I use a Favorites Icon?

Have you ever asked yourself why do all the big companies have favicons?


Here are the reasons:
* Favicon or a page icon is a great tool to brand your website. Since many pages still don`t have a favicon, your page will stand out from others!
* Your site will gain a professional and unique look, which can cause more links to your site and that means better rankings in search engines.

* You will save bandwidth since pages without favicons produce 404 File not found error files.


Free Online Favicon generators:

No problem if you don`t have an image editor. You can create your icon online. Try some of these great favicon makers.


* 1Favicon
- great website with lots of information about favicon.ico and a Tutorial to make your own.

* Favicon Maker
* Dynamic Drive Favicon Generator
* Favicon text generator
* Graphics Guru Favicon Tool

Particularly see

http://www.1favicon.com/

Source
D. Champ Webmaster

Read more On "how-to-make-favicon-on-addressbar"!

Friday, June 20, 2008

security-best-practices

SECURITY OF A WEBSITE
Do you know how important it is?
There's is no free lunch!

One of the world's best Open Source Content Management System
Joomla! tells us
There's no free lunch!

Don't be fooled by Joomla's award-winning ease of use. Maintaining a secure, dynamic Web site on the open Internet is not easy. Adequate security requires constant watchfulness and effort.

Many perspectives
There's no one right way!

Due to the variety and complexity of modern web systems, security issues can't be resolved with simple, one-size-fits-all solutions.

Learning indispensable
You, or someone you trust, must learn enough about your server infrastructure to make valid security decisions.

Experience Matters - Use Forums
There's no substitute for experience!

To secure your web site, you must gain real experience (some of which will be bitter), or get experienced help from others.

Chaltahai*** attitude is dangerous!

Rise above the herd

***[slang in Indian Hindi, meaning "Don't bother"]

The Security Forums are filled with "Help! I've been hacked" posts by people who did NOT follow standard security practices (this author included). If you decided to study documents such as this before your site is attacked, congratulation, you're already above the herd.

It's not as hard as it looks


The following checklist may seem intimidating, but you don't have to deal with all of it at once. As you become familiar with tools of modern Open Source Web development, suchn as GNU/Linux, Apache, MySQL, SQL, PHP, HTTP, CSS, XML, RSS, TCP/IP, FTP, Subversion, JavaScript, Joomla!, you'll add refinements to your set of security tactics.

All complex, dynamic, and open systems require powerful error checking and recovery methods. Web sites are no different.

Strong security is a moving target. Today's expert might be tomorrow's victim. Welcome to the game...

Source
Joomla Administrators Security Checklist - Joomla! Documentation
Getting Started _ _ _

Read more On "security-best-practices"!

password-best-safety-practice


LOCK AND KEY is Your Password
Andy Wallace tells little more than yahoo would tell us about password security.



I may have to pass on security expert's thoughts from time to time. People in general are lazy and loose about password, the only LOCK and key system, you have on the World Wide Internet.

Acknowledgments
Andy Wallace
Last Updated ( Monday, 26 November 2007 )
License

This document is released under the
Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported license.


Secure Password Thinking

Any password you create for Joomla!, MySQL, Apache, or in fact any passwords you ever create, should be made as secure as possible.

Typically this would mean:

BEGINNING WITH THE SIMPLE THINGS FIRST

  1. * using a minimum of 6 characters - the more the better but 8-10 should be an ideal
  2. * a mixture of upper and lower case alphabet characters, numbers, and permitted special characters for example -, _, *, $, !, %, although the use of these may be governed by the host settings on shared or virtual hosted, remote servers
  3. * do not use easily identifiable passwords for example, birthdays, children's or family names, or words that could be easily associated with you
  4. * in fact try not to use real words at all, replace letters with their numeric equal so the word ocean could become 0c34n (yes – I know it is a real word and there are only 5 characters but it is just an example) try 0c34n!c – and no do not now use that either
  5. * another way is to think entirely off-the-wall. Think of a favourite novel for example, The Hitch-hikers Guide to the Galaxy, and then take say the first and last letter from each word giving a sequence of letters (as indicated by the underscores):
Example 1: t e h s g e t o t e g y
this clearly means absolutely nothing but it could still be traced – eventually – by a determined cracker so let us mix it up a bit more:
Example 2: T 3 h $ 9 3 t 0 T 3 g Y
(again ignore the spaces) but you can now see that it would be a pretty illogical logic that would need to be applied to even come close to cracking that and when the additional security features of the various platforms is then laid over the top of this – we would not want to say it is impossible to crack, but they would take a very long time,
6. * you should regularly change your passwords certainly on critical sites
7. * if you keep a written record of your passwords, always ensure they too are kept secure and safely out of the way of prying eyes
8. * despite the temptation, try to avoid using the same password for all your various access requirements, both at home and at work

[The spaces are included in the two examples solely for clarity and should not be included and in fact spaces are generally not accepted in passwords]

PASSWORD MANAGERS

How to remember all those passwords?

One of the issues that can be experienced particularly when there are a lot of passwords that have to be maintained - especially as more and more services and utilities switch to, or offer, the option to deal with your accounts online - is actually remembering what all of these passwords are.

Most of todays browsers have an inbuilt facility to remember passwords and form completion details but there have been concerns raised over the security of these facilities in the past. It is a case of one program trying to do too much. If you feel this way and don't trust yourself (or your environment) to write down passwords properly and maintain this in an accessibe format then you might consider using one of the dedicated Password Managers that have been developed.

These can often be found as an integrated part of your Internet Security Software or you might consider one of the many commendable Open Source or indeed Commercial alternatives.

Password Managers
are dedicated software programs that apply high levels of encryption to secure your passwords and other data, yet give you an easily accessible repository for the information when you need it. Essentially you only have to remember the one password, which should be the most secure you can make it as described above, and the program holds all of the other information ready for when you need it.

For details on the available options check out the many Open Source and other format download sites and check out the customer & industry reviews that accompany the software and make your choice.

Password Generators

One of the benefits of this type of program is that they will often have a Password Generator that will create a completely random password for you. Takes a bit of the brain strain out of it all! These are also available as a separate standalone application.

Source

Andy Wallace
Acknowledges among many others

Jozsef Tamas Herczeg for the ideas on Password Manager/Generator.
Chad McKissick and Leandro Bergantiños

From the Joomla! Help Site - article titled Secure Password Thinking

Read more On "password-best-safety-practice"!

Sunday, June 15, 2008

how-password-are-hacked

Howstuffworks "The Hacker Toolbox"
ARTICLE REVIEW
TITTLE How Hackers Work
AUTHOR Jonathan Strickland
Hacking of passwords has been a topic of curiosity and dread to everyone using the Internet at some point of time or the other.


Password became a common word only after the advent of Internet as email and chat spread like wild fire, unprecedented and unforeseen growing in geometric proportion in the population. Password cult now is pervasive world over as Internet access has reached the common man and the mouse is held by school children who pick up new technology fast.

It is worthwhile knowing some basics of password hacking from the experiences of developed countries who are two decades ahead or earlier than the third world countries.
Jonathan Strickland writes:

Malicious hackers use programs to:

* Hack passwords: There are many ways to hack someone's password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols. The trial and error method of hacking passwords is called a brute force attack, meaning the hacker tries to generate every possible combination to gain access. Another way to hack passwords is to use a dictionary attack, a program that inserts common words into password fields.
* Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system's hard drive. A hacker might install a virus by infiltrating a system, but it's much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages, Web sites with downloadable content or peer-to-peer networks.
* Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim's computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone's identity.
* Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse.
* Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker's system. The hacker can secretly control the victim's computer, using it to commit crimes or spread spam.
* Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages -- the Internet's equivalent to wiretapping. Today, most e-mail programs use encryption formulas so complex that even if a hacker intercepts the message, he won't be able to read it.

Hacker Hierarchy
Psychologist Marc Rogers says there are several subgroups of hackers -- newbies, cyberpunks, coders and cyber terrorists. Newbies are hackers who have access to hacking tools but aren't really aware of how computers and programs work. Cyberpunks are savvier and are less likely to get caught than a newbie while hacking a system, but they have a tendency to boast about their accomplishments. Coders write the programs other hackers use to infiltrate and navigate computer systems. A cyber terrorist is a professional hacker who infiltrates systems for profit -- he might sabotage a company or raid a corporation's databases for proprietary information [source: Knittel and Soto].

Read more On "how-password-are-hacked"!

Sunday, June 1, 2008

cellular

"I'm videotaping hot chicks walking in the bikinis.
Man, this is the greatest cell phone ever made. It is, I'm not kidding. Ryan says this as the movie "CELLULAR" begins.
cellular-movie-mobile-phonecellular-movie-kim-baingercell phone used in Cellular movie


"Let me get the phone. Hold on a second, I'm e-mailing this video to my computer. Its gonna be my new screen saver," this is the only wonder that the cell phone does other than being used to talk, just to talk in the movie "CELLULAR".
"This is the great cell phone ever made. It is. I am not kidding" one would expect to be brought in the movie titled 'cellular'.

A piece of video captured at the tail end of the movie is supposed to throw a surprise. Those who would love are in for a huge disappointment.Mobile gizmo fans who would love to see magic capabilities of hand held devices are in for a BIG disappointment when they pay to see another run of the mill kidnap thriller.

MOVIE TRAILOR
MyMovies.Net - Trailer (WM9 - 56kbps) (mymovies.net)

Mobile phone's WIFI, WAP, GPS, GPRS, Music, Camera, Video, HiFi, the lesser known, ever new, amazing magic, used either for sinister, clandestine or fun n funky purpose simply isn't there to send chemicals racing in your blood as you watch the movie CELLULAR. The name 'CELLULAR' is a misnomer.

The magic of the hand held cell phone that links one person to other across continents, over skies through the remote satellite, the blue tooth; for love, for entertainment, for business, for pleasure or as status signature or just as the single and worlds topmost ranking hype that is as widespread as an epidemic craze of the modern times is conspicuously missing in the CELLULAR.
KIM BASSINGER

Result: Nominated for Saturn Award
Category: Best Supporting Actress Kim Basinger
Academy of Science Fiction, Fantasy & Horror Films, USA
Year: 2005


[after slashing a kidnapper's arm with a shard of glass]
Jessica Martin: Tenth grade biology. Brachial artery... pumps 30 liters of blood a minute. There's only five in the human body. I'm sorry.

NO WIZARDRY OF MOBILE PHONE
Chad: [greeting girls at the pier] Hey Chloe. Sam. Friend with nipples.
[talking to Ryan on a payphone]
Chad: Dude, I have no idea what just happened. One minute I'm talking to nipples, next thing you know, I'm wearing a whale costume handing out flyers.
Ryan: [laughs] That sucks. Sounds like she got you.
Chad: I mean, I'm not saying it doesn't have its benefits.
[to two girls that pass him by]
Chad: Hey, you guys know that a blue whale's got an 11-foot penis? Heal the Bay.

A random wrong number on Ryan's (Chris Evans) cell phone sends him into a high-stakes race against time to save kidnapped Jessica Martin's (Kim Basinger) life. With no knowledge of Jessica other than her hushed, fearful voice on the other end of the tenuous cell phone connection, Ryan is quickly thrown into a world of deception and murder in a frantic search to find and save her. They are out looking for Ryan:
Ethan: [on walkie talkie] We found him yet?
Dmitri: No, I don't see him.
Ethan: He's the one on the cell phone, you idiot.
[looks through his binoculars and sees various people on cell phones]
Dmitri: Everybody's on a cell phone.

The lives of Jessica and her family are in his hands, but what is waiting for him on the other side of the line - and what will it cost him to find out? Also stars William H. Macy and Jason Statham. Directed by David R. Ellis (Final Destination 2). Special features: Deleted/alternate scenes with optional director commentary, "Celling Out" featurette, "Dialing Up Cellular" featurette, "Code of Silence: Inside the Rampart Scandal" featurette, Feature-length commentary from director David Ellis and writers Larry Cohen and Chris Morgan, Theatrical trailer
On Fast Track
with
Dr. Ashok Koparday

Read more On "cellular"!

Saturday, May 17, 2008

increase-site-traffic


1
To get the
WORDTRACKER FREE keyword suggestion tool click here. It is indispensable. It is a must for better SEO.
2
Technorati Chart tells popularity of LABELS.
3
Use Google adwords - to know the words that people actually use [keywords] to search topics.

Use one to two labels that are popular as shown by the Technorati Chart. The labels of course should be 'relevant' to the post. Or, write a post relevant to the most popular label on Technorati Chart.


Google AdWords is powerful tool for the netizen who wants his website to be fast popular. Use Google AdWords tell you exact words people used to search a topic and also how precious is it for advertisers.
You will find google adwords by clicking here. Google adwords is powerful tool to look for keywords. It is your FREE online Search Engine Optimization Guide.
http://technorati.com/chart/LABEL_NAME?chartdays=360&language=n&authority=n

http://technorati.com/chart/LABEL_NAME?chartdays=360&language=n&authority=n
Posts that contain Arizona per day for the last 30 days.
Technorati Chart
Get your own chart!
Technorati chart tells popularity helps select label
Change 'LABEL_NAME' and '360' days to whatever you want.

Source
vin at betabloggerfordummies.blogspot.com
http://betabloggerfordummies.blogspot.com/2007/06/everything-about-labels-in-blogger.html

On Fast Track
with
Dr. Ashok Koparday

And here is the rest of it.

Read more On "increase-site-traffic"!

Wednesday, April 30, 2008

how-to-mobilize-existing-site

Dr. Ashok Koparday says, "You can make your existing site display well on mobile phone. Use www.mofuse.com".



ASK-SEX-DOCTOR-on-mobile





mysexdoctor.blogspot.com-on-mobile

Expert-Dr.Ashok-Koparday-Consultant-Sexologist

ASK-SEX-DOCTOR-on-mobile

mysexdoctor.blogspot.com-ASK-SEX-DOCTOR






The same site shows well on mobile. Thanks to mofuse.


Here is the beginning of my post.

Thanks to Vin: click here to spot the blogger KING.

On Fast Track
with
Dr. Ashok Koparday

And here is the rest of it.

Read more On "how-to-mobilize-existing-site"!

Monday, March 31, 2008

images-on-internet-copyright

How to use images safely?
sharealike_ccattribution_ccnoderivatives_ccnot for commercial use_cc
creative commons offers alternative to full copyright
All images unless explicitly stated are copyright protected is the thumb rule that one should go by.
The places where you can find images, which you can copy and share are:
* Open Photo
* Flickr: Creative Commons
* Creative Commons Search
source
blogger.com

Creative Commons Trademark
"Creative Commons is a non-profit that offers an alternative to full copyright."
Attribution Attribution License
http://www.flickr.com/creativecommons/
Attribution No Derivative Works Attribution-NoDerivs License
Attribution Noncommercial No Derivative Works Attribution-NonCommercial-NoDerivs License
Attribution Noncommercial Attribution-NonCommercial License
Attribution Noncommercial Share Alike Attribution-NonCommercial-ShareAlike License
Share Alike Attribution-ShareAlike License
Using the image upload feature in Blogger, you shouldn't use an image location that is hosted at someone else's expense without their permission. Sometimes this is referred to as "stealing bandwidth" because every time your blog loads, the image is loaded from their server, and this person likely incurs an expense.
Copyrighted Materials

Before you put an image in your blog, realize that some images are protected as intellectual property through copyright. This means that the creator has sole legal rights to their works and may not want you copying and displaying them. If you are unsure whether or not an image is copyrighted, it's best not to risk it. However, there are places which make it easier for you to find images you're allowed to use:
source
blogger.com
On Fast Track
with
Dr. Ashok Koparday

Read more On "images-on-internet-copyright"!

Friday, February 29, 2008

get-openID

Not yet signed in to openID?
If not I am certain you will like to do so eventually. The following details by Sam Ruby has been instructive for me.



"Getting an OpenID URL for your blog" on the
blogger buzz dashboardwas informative for me.
This took me to Sam Ruby.
The passage below is an excerpt from Sam Ruby's tutorial at intertwingly.
If you have an OpenID identity and a blog, then follow these instructions. If you don't have an OpenID identity, you can get one for free at MyOpenID.

Here's mine.[Sam Ruby's]
Here is Dr. Ashok Koparday's.
Given such an identity, copy the following into the head section of your weblog, adjusting the two URIs as appropriate:



bracket link rel="openid.server" href="http://www.myopenid.com/server" /bracket close d
bracket link rel="openid.delegate" href="http://samruby.myopenid.com/" /bracket closed



That's pretty much it. What this says is that the web page in question is owned by the owner of http://samruby.myopenid.com/ and furthermore http://www.myopenid.com/server may be used to verify ownership of http://samruby.myopenid.com/.

By claiming your blog or homepage in this fashion, you can then use your URI (i.e., the URI of your blog or homepage) as your identity. Having this level of indirection is a good thing. If you ever become dissatisfied with your identity provider for whatever reason, you can easily and transparently switch providers.
When done, feel free to

check your setup.

source:
OpenID for Non-Super Users by Sam Ruby

Further details follow in

RECAP (Most of which is beyond my understanding as of today)
Astute readers will note that I still have the link in my main weblog home page. That's a fallback for consumers that don't (yet) support YADIS.

All told: I signed up for one free service, installed and tailored one PHP script, added one line to my weblog template, created one simple XML file and added a total of four lines to my .htaccess files.




On Fast Track
with
Dr. Ashok Koparday

And here is the rest of it.

Read more On "get-openID"!

Wednesday, January 23, 2008

table-of-contents-vin-me

The story of my travel in search of 'Table of Contents'.
Vin to win.
The gigantic
betabloggerfordummies.blogspot
unfolds s l o w l y
where you see 3 columns in the most unaesthetic colors.
vin_arr16.gif
The huge chunks called columns with gaudy colors like pink, blue, green having
jumbo sized fonts are conspicuously overcrowded like the local trains in Mumbai.
In this backdrop Aishwarya Rai's face is a relief.

proxy

Vin's famous 'Table of Contents Template' can be found by clicking here.

Vin: A jack fruit of all hacks and master at web tricks.


I guess the blog author's girlfriend either has not seen the blog or is putting up with it because the contents within are rich.
More maja but neither content nor table.
I get the message that these widgets will be deleted if I load the 'table of contents template'
# Profile1, # BlogArchive1, # LinkList1, # Text1, # LinkList1, # BloggerButton1, # TextList1
This message appears like Darth Vader grunting, "I am going to knock off your widgets," on my startrek to make a 'Table of Contents' on the blogspot.
message a novice like me
gets.
Having lost a content rich website www.mysexdoctor.com plus
another http://nise.us I was determined to
recreate one. I am now groping unsuccessfully for over a month to
get Table of Contents, for I cannot find the my posts and pictures myself.

I will get it soon.
I have Vin.
I had no opportunity to know Graham Waldon who was one of the longest-serving members of the Blogger team at Google. The following was displayed on the Dashboard while Eric and rest of the Blogger team were saying goodbye to Graham Waldon. I immediately perceived that the same was applicable to Vin. I quote:

"Over the years Graham's provided amazingly patient and exemplary service to Blogger's users, and set an impossibly high bar with his work — from constantly improving Blogger's Help site, to personally answering countless help emails, to digging up fantastic Blogs of Note, to training new members of the Support team."


My search showed that all leads for Help about Table of contents go to Vin's Table of Contents page.
For me it has been Table of disContent.
I could not accomplish this. I even took a fresh new blog site to work on.
I apply myself sincerely, most of the time at the cost of developing medical contents for people.


Whatever I learned at blogspot is from the MASTER of blogspot.
Whatever I did not accomplish is because of paucity of time.

All do not win, all the time, do they? [Except Vin!]

Beginning of SEX

HELPLINE:


I had a free helpline for offering
expert medical opinion on line. It began with just an email id. Necessity and
tenacity gave birth to mysexdoctor.com. Now
mysexdoctor.blogspot.com.
There is a need for
authentic,
authoritative,
appropriate information on
matters of sex, because sex matters.

The thrust is to provide
to maximum people wholesome scientific guidance on Human Sexuality.
And that too, free..
On Fast Track
with
Dr. Ashok Koparday

Read more On "table-of-contents-vin-me"!

Tuesday, January 1, 2008

mobile-in-emergency

How Mobile can be useful
In Case of Emergency?
Do you have ICU?



Dear friends,
Do read the following, it's important :--
Hi All,
We all carry our mobile phones with names & numbers
stored in its memory but nobody, other than ourselves,
knows which of these numbers belong to our closest
family or friends.
If we were to be involved in an accident or were taken
ill, the people attending us would have our mobile
phone but wouldn't know who to call. Yes, there are
hundreds of numbers stored but which one is the
contact person in case of an emergency? Hence this
"ICE" (In Case of Emergency) Campaign.
The concept of "ICE" is catching on quickly. It is a
method of contact during emergency situations. As cell
phones are carried by the majority of the population,
all you need to do is store the number of a contact
person or persons who should be contacted during
emergency under the name "ICE" ( In Case Of
Emergency).
The idea was thought up by a paramedic who found that
when he went to the scenes of accidents, there were
always mobile phones with patients, but they didn't
know which number to call. He therefore thought that
it would be a good idea if there was a nationally
recognized name for this purpose. In an emergency
situation, Emergency Service personnel and hospital
Staff would be able to quickly contact the right
person by simply dialing the number you have stored as
"ICE."
For more than one contact name simply enter ICE1, ICE2
and ICE3 etc. A great idea that will make a
difference!
Let's spread the concept of ICE by storing an ICE
number in our Mobile Phones today !
Please forward this. It won't take too many "forwards"
before everybody will know about this. It really could
save your life, or put a loved one's mind at rest .
ICE will speak for you when you are not able to.

On Fast Track
with
Dr. Ashok Koparday


Read more On "mobile-in-emergency"!

mobile-webdesign-free-resources-2

internet-now-from-pc-to-mobile

Free Resources
If you search for emulators or mobile web design in google search this is what you should pick up.

This takes you further to the MORE PRACTICAL free sources. Read on. . .

One who is designing a website accessible for mobile as well should book mark the links below.
# dotMobi Online Emulator - mTLD has an online emulator that you can use to quickly see what your site will look like on a common phone
# Nokia Browser Simulator - this simulator simulates a generic Nokia phone and WAP gateway
# Openwave Phone Simulator - Openwave's browser simulator
# Opera Mini Simulator - simulates Opera's popular J2ME browser
# BlackBerry Simulator - multiple different BlackBerry simulators
# Yospace SmartPhone Emulator - a versatile emulator that can display multiple phone instances at the same time
Don't miss this Hands on training. http://www.w3schools.com/wap/tryit_wap.asp
------------------------------------------5:40 PM 1/1/2008------------------------------

On Fast Track
with
Dr. Ashok Koparday

Read more On "mobile-webdesign-free-resources-2"!

SEXUAL HEALTH EDUCATION

SEXUAL HEALTH EDUCATION
Free Ask Sexologist