<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1548980119942535768</atom:id><lastBuildDate>Fri, 25 Oct 2024 12:00:15 +0000</lastBuildDate><title>Computer World</title><description>The main emphasis here is on the technologies that are used previously in the field of computers and IT sector; and also the new and upcomming technologies...</description><link>http://raghav-hightech-guy.blogspot.com/</link><managingEditor>noreply@blogger.com (Raghav)</managingEditor><generator>Blogger</generator><openSearch:totalResults>9</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>The main emphasis here is on the technologies that are used previously in the field of computers and IT sector; and also the new and upcomming technologies...</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1548980119942535768.post-9008334086028343864</guid><pubDate>Fri, 22 Jul 2011 06:24:00 +0000</pubDate><atom:updated>2011-07-22T12:31:12.121+05:30</atom:updated><title>TFS 2010: Test Manager Web Access</title><description>TFS 2010 has introduced many new features, and one of them is the Team System Web Access (TSWA) that is installed by default when you install TFS 2010 and is accessible through the URL: “&lt;span style="font-style: italic;"&gt;http://servername&lt;/span&gt;&lt;span style="font-style: italic;"&gt;:8080/tfs/web&lt;/span&gt;”. (This was available in previous versions of TFS, but you have to install it explicitly.)&lt;div&gt;&lt;div&gt;Also Visual Studio 2010 offers an excellent tool for the testers for carrying out the testing activities: Microsoft Test Manager. It offers complete end to end testing of the application and managing the testing artifacts in Team Foundation Server. With Team Foundation Web Access (TSWA) all the data that is present in TFS can be viewed within the browser and there is no need to install Visual Studio Team Access or any other client in the machine. Thus, management people or people at remote locations can easily access the information related to project.&lt;br /&gt;&lt;br /&gt;However, Team System Web Access provides feature to view the various artifacts, but it doesn’t provide the feature to view the artifacts created by using Microsoft Test Manager i.e. Test Plan and Test Suite. So, there is a gap between Team System Web Access and Test Manager, and again we are landed at the same point, if people want to view how testing is going-on or what approach is being followed, they have to get this data using Microsoft Test Manager and they will end up installing the client in their machines.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;Solution to this problem is &lt;span style="font-weight: bold;"&gt;Test Manager Web Access&lt;/span&gt;. Test manager Web Access is a plugin to Team System Web Access that enables the users to view the artifacts created within Microsoft Test Manager. It gives exactly the same view of the Test Plan and Test Suite hierarchy as displayed in Microsoft Test Manager.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;After adding this plugin to the Team System Web Access a new tab “Test Manager” (as shown in figure below) is displayed in the Team System Web Access site.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx2TctVHh_F0GRfuUCFHhb7JAQ0WqvSxvK0WoHlBma0fT4eHpLzVKgsGDptR33CEAZplkp4W0cC2mjg44NyaL2t2LUqJ4Nz5i2cQ3w2YljhXF1U418vTy4h6tZO1zfsvQJRpg8oy9bDDw/s1600/TSWA.jpg"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx2TctVHh_F0GRfuUCFHhb7JAQ0WqvSxvK0WoHlBma0fT4eHpLzVKgsGDptR33CEAZplkp4W0cC2mjg44NyaL2t2LUqJ4Nz5i2cQ3w2YljhXF1U418vTy4h6tZO1zfsvQJRpg8oy9bDDw/s400/TSWA.jpg" alt="" id="BLOGGER_PHOTO_ID_5632067769743581906" border="0" /&gt;&lt;/a&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm6C2iiHsGnIPM1XeSTGgQDfG3XvnRFOHxVTekVp2YwW8W6c6mMuTl4sJR14SuNMLI-L0IxWxNImJrGpHK3sOmK0kTcTXhFtSCzbSEbFixTIOSD4Jg4nZWFBb_2FhXmwQpM0JjiQjWvAw/s400/TSWA.png"&gt;&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;Clicking on the Test Manager tab, user is able to view the same Test Plan and Test Suite hierarchy as visible in Microsoft Test Manger. Here, if user clicks any node in the tree structure he/she will be able to view the test cases present under that particular Test Suite or Test Plan.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGFdVJuxdlfXMpmZbq6_QT5U-ZSwynXYtHpnh0JW8MuowWG9vWCSxAIc-VGLzTE2Ev0zI5UDqGWQ1A0A-lih2iWQQAcBlR0ZqZUfeqgIGVVlCnUONTIeq6zytMA3tDcyI5vMM8LxW3SnI/s1600/TMWA.jpg"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGFdVJuxdlfXMpmZbq6_QT5U-ZSwynXYtHpnh0JW8MuowWG9vWCSxAIc-VGLzTE2Ev0zI5UDqGWQ1A0A-lih2iWQQAcBlR0ZqZUfeqgIGVVlCnUONTIeq6zytMA3tDcyI5vMM8LxW3SnI/s400/TMWA.jpg" alt="" id="BLOGGER_PHOTO_ID_5632067770573954898" border="0" /&gt;&lt;/a&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3ZAm3znIWB2qeYTG39YjIGP5qmkN02NV0Eo5oRziEphvSNGQXy0CeGWn-cvs40QlOHuRiIsEMwgGKDjXUV02tfdUXGIw6uj0bGo82NudpVZJdTX7yeezaaTxuxZoqY2hq9pZIU1-HCMQ/s400/TMWA.png"&gt;&lt;br /&gt;&lt;/a&gt;However, currently there are few limitations to this plugin. Users can only view the Test Plan or Test Suites and the test cases present in them but they cannot edit or modify it. This plugin is completely for viewing purpose.&lt;br /&gt;It might help people who don’t have Microsoft Test Management client installed but interested in data present in it.&lt;br /&gt;&lt;/div&gt;</description><link>http://raghav-hightech-guy.blogspot.com/2011/07/tfs-2010-test-manager-web-access.html</link><author>noreply@blogger.com (Raghav)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx2TctVHh_F0GRfuUCFHhb7JAQ0WqvSxvK0WoHlBma0fT4eHpLzVKgsGDptR33CEAZplkp4W0cC2mjg44NyaL2t2LUqJ4Nz5i2cQ3w2YljhXF1U418vTy4h6tZO1zfsvQJRpg8oy9bDDw/s72-c/TSWA.jpg" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1548980119942535768.post-3510538401314800461</guid><pubDate>Mon, 14 Feb 2011 22:45:00 +0000</pubDate><atom:updated>2011-02-15T04:36:49.535+05:30</atom:updated><title>"Export Test Cases from TFS to Excel".... now available for DOWNLOAD</title><description>Thanks all for having look on my blog and appreciating my effort.&lt;br /&gt;All these days I was getting emails from people asking about where they can download this tool.&lt;br /&gt;As I mentioned before also that I was working on few modifications in the tool and also I was bit busy, so got bit delayed... :)&lt;br /&gt;&lt;br /&gt;But now the wait is over. "Test Case Export to Excel 1.0" is now available for download along with few enhancements.&lt;br /&gt;&lt;br /&gt;As mentioned in the previous post, user has to first connect to the Team Foundation Server and then to the Team Project. After connecting to the Team Project, the Test Plans were populated in the dropdown box; and based on the selection of the Test Plan the Test Suites at the root level were being populated in the next dropdown box. Thus, the user has the limitation to select only the Test Suite present directly under Test Plan, also all the test cases that were present under the selected Test Suite and Sub Suites will be exported.&lt;br /&gt;&lt;br /&gt;But now in the enhanced version i.e. "Test Case Export to Excel 1.0" user gets the complete view of the Test Plans and all the Test Suite in the form of tree structure, similar to the way it is displayed in MS Test Manager. Also, user is now having the flexibility select the test cases he/she wants to export. He/She can either choose to export the test cases present under the selected Test Suite or to export test cases present under selected Test Suite and its Sub Suites. Below is the screenshot of the enhanced version of the tool.&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4U5qvVt7QOprm0r3m0xtNMrvAB4NgwS0XjXoSud9mZGFwH0V36pQKSe5BPdtatp9AWAhSxMbawxh0P_d3YbSnmlSLXjYBKiYJLCkin_VP175YfKL0BBdVovyxHDoddCV0Nw24-vpaPWI/s1600/NewApp.JPG"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 218px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4U5qvVt7QOprm0r3m0xtNMrvAB4NgwS0XjXoSud9mZGFwH0V36pQKSe5BPdtatp9AWAhSxMbawxh0P_d3YbSnmlSLXjYBKiYJLCkin_VP175YfKL0BBdVovyxHDoddCV0Nw24-vpaPWI/s400/NewApp.JPG" alt="" id="BLOGGER_PHOTO_ID_5573685308108356610" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;If you want to download the tool you can download it from the following codeplex site:&lt;br /&gt;&lt;a href="http://exporttfs2excel.codeplex.com/"&gt;http://exporttfs2excel.codeplex.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Please post your comments or suggestions on this tool. Also, if you face any issues in the tool, please let me know.</description><link>http://raghav-hightech-guy.blogspot.com/2011/02/export-test-cases-from-tfs-to-excel-now.html</link><author>noreply@blogger.com (Raghav)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4U5qvVt7QOprm0r3m0xtNMrvAB4NgwS0XjXoSud9mZGFwH0V36pQKSe5BPdtatp9AWAhSxMbawxh0P_d3YbSnmlSLXjYBKiYJLCkin_VP175YfKL0BBdVovyxHDoddCV0Nw24-vpaPWI/s72-c/NewApp.JPG" width="72"/><thr:total>11</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1548980119942535768.post-8191339883137397804</guid><pubDate>Sat, 04 Dec 2010 20:22:00 +0000</pubDate><atom:updated>2010-12-05T02:29:48.651+05:30</atom:updated><title>Exporting Test Cases from TFS to Excel... Made easy with... "Test Case Export to Excel"</title><description>&lt;div style="text-align: justify;"&gt;It’s been a long time since I blogged.  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;In fact, it’s my first blog after joining Accenture. Just enjoying the work experience and learning new things. In this span I learnt couple of new tools and technologies, and one of them is &lt;a href="http://en.wikipedia.org/wiki/Team_Foundation_Server"&gt;Team Foundation Server&lt;/a&gt; 2010.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;For those who are not aware of what &lt;a href="http://en.wikipedia.org/wiki/Team_Foundation_Server"&gt;Team Foundation Server&lt;/a&gt; is? Here is a brief introduction; Team Foundation Server (commonly abbreviated as TFS) is a &lt;a href="http://en.wikipedia.org/wiki/Microsoft"&gt;Microsoft &lt;/a&gt;product for collaborative software development projects and offers source control, data collection, reporting and project tracking.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;a href="http://en.wikipedia.org/wiki/Team_Foundation_Server"&gt;Team Foundation Server&lt;/a&gt; works in three-tier architecture: the &lt;i style=""&gt;client&lt;/i&gt; &lt;i style=""&gt;tier&lt;/i&gt;, the &lt;i style=""&gt;application tier&lt;/i&gt; and the &lt;i style=""&gt;data&lt;/i&gt; &lt;i style=""&gt;tier&lt;/i&gt;. The &lt;i&gt;client tier&lt;/i&gt; is used for creating and managing projects and accessing the items that are stored and managed for a project, however TFS does not provides any user interface for this tier but exposes web services which client applications can use (e.g. &lt;a href="http://en.wikipedia.org/wiki/Visual_Studio_Team_System"&gt;Visual Studio Team System&lt;/a&gt;). The application layer contains the web services that are used by the client applications. It also includes a web portal and a document repository facilitated by &lt;a href="http://en.wikipedia.org/wiki/Windows_SharePoint_Services" title="Windows SharePoint Services"&gt;Windows &lt;/a&gt;&lt;a href="http://en.wikipedia.org/wiki/Windows_SharePoint_Services" title="Windows SharePoint Services"&gt;SharePoint Services&lt;/a&gt;. The web portal, called the &lt;i&gt;Team Project Portal&lt;/i&gt;, acts as the central point of communication for projects managed by TFS. The document repository is used for both project items and the revisions tracked, as well as for aggregated data and generated reports. The data tier is SQL Server Standard Edition installation that provides the persistent data storage services for document repository.&lt;/p&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKH5dCXQVz2d57GsJp7EyFuUtHAV7VQVfBP3lhPMy20VeOMiEBhFwZ85z4efBtRcPyUGzwgg6jpHsPE2s1dsGERKS_YmsG0G7dfGSqhC3-1xjFUrX_bMo5HBBYEK2eyMHIC2uQUddKyd0/s1600/720px-TFS.svg.png"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 216px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKH5dCXQVz2d57GsJp7EyFuUtHAV7VQVfBP3lhPMy20VeOMiEBhFwZ85z4efBtRcPyUGzwgg6jpHsPE2s1dsGERKS_YmsG0G7dfGSqhC3-1xjFUrX_bMo5HBBYEK2eyMHIC2uQUddKyd0/s320/720px-TFS.svg.png" alt="" id="BLOGGER_PHOTO_ID_5546925740471460946" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Activities in Team Foundation Server revolve around Work Items. Work Item is a single unit of work that needs to be completed. Work Items can be of different types like Task, Requirement, Test Case, Bug, etc. &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Visual Studio 2010 Ultimate offers an excellent tool for testers for carrying out the testing activities: &lt;b style=""&gt;Microsoft Test Manager 2010. &lt;/b&gt;It offers complete end to end testing of the application and managing the testing artifacts in Team Foundation Server.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Team Foundation Server (TFS) 2010 enables the users to manage test cases as Work Item(s). The complete description of the test case along with steps can be managed as single Work Item in TFS 2010.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Before migrating to TFS 2010 many test teams will be using MS Excel to manage the test cases (or test scripts). However, after migrating to TFS 2010, test teams can manage the test cases in the server but there may be need to get the test cases into excel sheet like approval from Business Analysts or sending it for review to a person who is not having access to the organization’s VPN.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Similar problem is been faced by me and my team, that once Test Cases are created in TFS there is no provision to export them to MS Excel. Thus I created an API “&lt;b style=""&gt;&lt;i style=""&gt;Test Case Export to Excel&lt;/i&gt;&lt;/b&gt;” &lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;“Test Case Export to Excel” enables the users to export the test cases present in TFS as Work Item(s) to excel sheet. Thus, the users will have backward compatibility with the process they were using.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;“Test Case Export to Excel” follows the concept:&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;ul style="text-align: justify;"&gt;&lt;li&gt;A Team Project consists of Test Plans.&lt;/li&gt;&lt;li&gt;A Test Plan contains Test Suites.&lt;/li&gt;&lt;li&gt;A Test Suite can contain Test Cases or Sub-Suites which in turn can contain test cases.&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: justify;"&gt;       &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Image below shows the hierarchy explained above:&lt;/p&gt;&lt;div style="text-align: justify;"&gt;     &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRjeThyphenhyphen8wlOKy0t3vd1aA1HpLZ8mW5kTjCWtLnER_svsmJLekKub5blpa8zG_Y_-IVc90QtgSGJcQ8EsTUEUXVjyGbR7pdRXUQFRe2JNnpyKsGEQH9ASZ7p-m8sIvxxlpynKO-SM3VH_Y/s1600/Hierarchy.JPG"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 189px; height: 159px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRjeThyphenhyphen8wlOKy0t3vd1aA1HpLZ8mW5kTjCWtLnER_svsmJLekKub5blpa8zG_Y_-IVc90QtgSGJcQ8EsTUEUXVjyGbR7pdRXUQFRe2JNnpyKsGEQH9ASZ7p-m8sIvxxlpynKO-SM3VH_Y/s320/Hierarchy.JPG" alt="" id="BLOGGER_PHOTO_ID_5546926515323578738" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;“Test Case Export to Excel” can export all the test cases present in a test suite to a excel file. If the selected Test Suite contains any Sub-Suite(s), then all the test cases present in the sub-suite(s) will also be exported to the excel file.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;span style=""&gt; &lt;/span&gt;“Test Case Export to Excel (Beta)” is built on .NET Framework 4.0. Thus, .NET Framework 4.0 is required to be installed on the client machines to run “Test Case Export to Excel (Beta)”.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;If .NET Framework 4.0 is not present on the client machine, then at the start of installation user will be prompted to install .NET Framework 4.0.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;“Test Case Export to Excel (Beta)” is a GUI based simple tool that guides the users to export test cases from TFS to MS Excel.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;“Test Case Export to Excel (Beta)” starts with screen as shown below:&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsEviw4EI5oCtaxokWuZ9hzIIyPRxxImWIaZhLhyphenhyphenjy_WlG0bPmXem_XoatvKpbYfr3L2Gl9nPeStSmJqgjZEs08OVbchUK50ZIwnSCSQD_xbzWHrFKXdt7CyNHGfMobgyBKqyh0OhOb08/s1600/Main.JPG"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 427px; height: 288px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsEviw4EI5oCtaxokWuZ9hzIIyPRxxImWIaZhLhyphenhyphenjy_WlG0bPmXem_XoatvKpbYfr3L2Gl9nPeStSmJqgjZEs08OVbchUK50ZIwnSCSQD_xbzWHrFKXdt7CyNHGfMobgyBKqyh0OhOb08/s320/Main.JPG" alt="" id="BLOGGER_PHOTO_ID_5546927177696937042" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;     &lt;/div&gt;&lt;p class="MsoNormal" style="margin: 12pt 0in 0.0001pt 0.4in; text-indent: -0.4in; line-height: normal; page-break-after: avoid; text-align: justify;"&gt;&lt;span style="font-size:130%;"&gt;&lt;a name="_Toc277806099"&gt;&lt;b style=""&gt;&lt;span style="color: rgb(0, 114, 188);"&gt;&lt;span style=""&gt;1.1 &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=""&gt;&lt;span style="color: rgb(0, 114, 188);"&gt;Seleting the “Source”&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;a name="_Toc277806099"&gt;&lt;/a&gt;&lt;span style="font-size:130%;"&gt;&lt;a name="_Toc277806099"&gt;&lt;/a&gt;&lt;/span&gt;&lt;a name="_Toc277806099"&gt;&lt;/a&gt;&lt;span style="font-size:130%;"&gt;&lt;a name="_Toc277806099"&gt;&lt;/a&gt;&lt;/span&gt;&lt;a name="_Toc277806099"&gt;&lt;/a&gt;&lt;span style="font-size:130%;"&gt;&lt;a name="_Toc277806099"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Source for “Test Case Export to Excel (Beta)” is the Test Suite in Team Foundation Server that contains the test cases.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;For selecting the Test Suite you are required to connect to Team Foundation Server and then connect to a Team Project.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;For connecting to a Team-Project click the ellipses (…) button next to Team-Project text box. You will be presented with a screen shown below with option to connect to a Team-Project.&lt;/p&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1aHU6dhro8HXA0E3APuEV2SG00j6pBa7n7r0-juhRhxUE1w3snD5vzguaST_rL1yQKlrfcxRvVL17-t_ZkVPwyk5P0sa1kvQLPJoDnI5Jd667TtF42ayYWWwrJzHCC8wq3UPBTgPZ_Z0/s1600/ConnectServers.JPG"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 204px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1aHU6dhro8HXA0E3APuEV2SG00j6pBa7n7r0-juhRhxUE1w3snD5vzguaST_rL1yQKlrfcxRvVL17-t_ZkVPwyk5P0sa1kvQLPJoDnI5Jd667TtF42ayYWWwrJzHCC8wq3UPBTgPZ_Z0/s320/ConnectServers.JPG" alt="" id="BLOGGER_PHOTO_ID_5546927184314050274" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;     &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;If there is no Server present in the dropdown box then click the “Servers…” button to add a Server. &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;You will be presented with dialog to “Add/Remove Team Foundation Server”.&lt;br /&gt;&lt;/p&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZxBqq2PbRcEv078F8GpmWl3_R7h8PYSGZj5Q_SDkY_rFOwvrzDWAvj_S_Ml6biOlMz3voz9r0yrmw_Mu5J9TZRamh6kPXRdpMHKkl8KzeumhJmmi2Tql_sdKz6agcxBJ3-_IemwRM7uc/s1600/AddServer.JPG"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 207px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZxBqq2PbRcEv078F8GpmWl3_R7h8PYSGZj5Q_SDkY_rFOwvrzDWAvj_S_Ml6biOlMz3voz9r0yrmw_Mu5J9TZRamh6kPXRdpMHKkl8KzeumhJmmi2Tql_sdKz6agcxBJ3-_IemwRM7uc/s320/AddServer.JPG" alt="" id="BLOGGER_PHOTO_ID_5546927193131504290" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Click on “Add…” button to add details of Team Foundation Server you want to connect.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;In “Add Team Foundation Server” dialog you can enter the details of Team Foundation Server that contains your Team-Project.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgChCHUb4XcezxumLxrcnK68xEx0brG7wWoW900QxBcmUMZlJmnHTvUXp3u-dDsSaBwpZ9UH1RUA9Z-dPQESl2aHm-cznnF40Vh7ENCrgoT9WcfjisbjMUxLLL-DW9VceXsvqrYyngGrCQ/s1600/ServerDetail.JPG"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 218px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgChCHUb4XcezxumLxrcnK68xEx0brG7wWoW900QxBcmUMZlJmnHTvUXp3u-dDsSaBwpZ9UH1RUA9Z-dPQESl2aHm-cznnF40Vh7ENCrgoT9WcfjisbjMUxLLL-DW9VceXsvqrYyngGrCQ/s320/ServerDetail.JPG" alt="" id="BLOGGER_PHOTO_ID_5546927196707658194" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;After successfully connecting to Team-Project all the Test Plans present under the selected “Team-Project” will be populated automatically in the “Test-Plan” dropdown box. (If there are no Test Plan present in the dropdown box then the selected Team-Project doesn’t contains any Test Plan).&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Select a “Test Plan” from the available Test Plan(s) in the Test-Plan dropdown box. Based on the selected “Test Plan”, Test-Suite dropdown box will be populated with all the Test-Suites present in the Test Plan.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;b style=""&gt;Note: &lt;/b&gt;Only the Test Suites present directly under selected Test-Plan will be populated in the Test-Suite dropdown box. No Sub-Suite(s) present under any of the Test-Suite will be populated. However, during export if the selected Test-Suite contains any sub-suite(s), then the test cases under the sub-suite(s) will also be exported.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p class="MsoNormal" style="margin: 12pt 0in 0.0001pt 0.4in; text-indent: -0.4in; line-height: normal; page-break-after: avoid; text-align: justify;"&gt;&lt;span style="font-size:130%;"&gt;&lt;a name="_Toc277806100"&gt;&lt;b style=""&gt;&lt;span style="color: rgb(0, 114, 188);"&gt;&lt;span style=""&gt;1.2 &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=""&gt;&lt;span style="color: rgb(0, 114, 188);"&gt;Seleting the “Destination”&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Destination is the location where the excel file with exported test cases will be saved.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Select the folder location using the “Browse…” button where you want to save the file.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Specify a valid file name for the excel file.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p class="MsoNormal" style="margin: 12pt 0in 0.0001pt 0.4in; text-indent: -0.4in; line-height: normal; page-break-after: avoid; text-align: justify;"&gt;&lt;span style="font-size:130%;"&gt;&lt;a name="_Toc277806101"&gt;&lt;b style=""&gt;&lt;span style="color: rgb(0, 114, 188);"&gt;&lt;span style=""&gt;1.3 &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=""&gt;&lt;span style="color: rgb(0, 114, 188);"&gt;Exporting&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;After entering both “Source” and “destination” details click on “Export” button.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;If the fields are populated correctly, export process will start; otherwise error message will be displayed and you are supposed to correct the error(s) before you proceed.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;During export, mouse cursor will be shown in busy state. The export may take some time depending upon the data to exported and network speed.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;After successful export, a confirmation message will be displayed.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Product information i.e. version detail and developer information is available by clicking on “About” button.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Current product version is “Beta” version.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSXO3b3ll5k4YhdwPZDY5M1aPn4rzry8lLSu1vcTeVdSVzC0meia0NfvgzyKmpjXX1OD8C4mI-ljAxOPWLZqO7WyMQX5ZsRaumGmvIYRRuQ0rLFxIXFI6FNnsbYPcHUIyCTTqCjER8p7A/s1600/About.JPG"&gt;&lt;img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 269px; height: 168px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSXO3b3ll5k4YhdwPZDY5M1aPn4rzry8lLSu1vcTeVdSVzC0meia0NfvgzyKmpjXX1OD8C4mI-ljAxOPWLZqO7WyMQX5ZsRaumGmvIYRRuQ0rLFxIXFI6FNnsbYPcHUIyCTTqCjER8p7A/s320/About.JPG" alt="" id="BLOGGER_PHOTO_ID_5546927201836929410" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;However, there are some known issues with the current version.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;ul style="text-align: justify;"&gt;&lt;li&gt;If there already exists a file with same name as specified by the user in the specified location, then a dialog box is displayed to replace the file with “Yes”, “No” and “Cancel” buttons. If user clicks “Yes” button, the existing file is replaced with the new one; whereas if user clicks “No” or “Cancel” button, application throws “Fatal Error” and terminates.&lt;/li&gt;&lt;li&gt;If client machine is having version of MS Office higher that 2003, then a compatibility warning is displayed with “Continue” and “Cancel” button. If user clicks “Continue” the excel file is saved successfully; but if user clicks “Cancel”, application throws “Fatal Error” and terminates.&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;I will try to address the above mentioned issues in the upcoming version with few more functionalities.&lt;/p&gt;  &lt;p class="MsoNormal"&gt; &lt;/p&gt;  &lt;p class="MsoNormal"&gt; &lt;/p&gt;  &lt;p class="MsoNormal"&gt; &lt;/p&gt;  &lt;p class="MsoNormal"&gt; &lt;/p&gt;</description><link>http://raghav-hightech-guy.blogspot.com/2010/12/exporting-test-cases-from-tfs-to-excel.html</link><author>noreply@blogger.com (Raghav)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKH5dCXQVz2d57GsJp7EyFuUtHAV7VQVfBP3lhPMy20VeOMiEBhFwZ85z4efBtRcPyUGzwgg6jpHsPE2s1dsGERKS_YmsG0G7dfGSqhC3-1xjFUrX_bMo5HBBYEK2eyMHIC2uQUddKyd0/s72-c/720px-TFS.svg.png" width="72"/><thr:total>20</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1548980119942535768.post-3810130574909313905</guid><pubDate>Fri, 26 Sep 2008 09:37:00 +0000</pubDate><atom:updated>2008-10-03T12:11:58.260+05:30</atom:updated><title>Security threats in your daily INTERNET life</title><description>&lt;div style="text-align: center;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK99xt-1iKKN6XgWjURNvNqUFFQBOemX1HHBdAJg4aCfpXD2CHbZgLmfOwy2dSU7VFhKhMIDVXzklfSHpjr3u2wrmP_SXmxNIMVQ386CJQTFZlS-ng9HPy8FvgLF91OR8G5_oiB6ifvy0/s1600-h/abc.jpeg"&gt;&lt;img style="cursor: pointer; width: 326px; height: 489px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK99xt-1iKKN6XgWjURNvNqUFFQBOemX1HHBdAJg4aCfpXD2CHbZgLmfOwy2dSU7VFhKhMIDVXzklfSHpjr3u2wrmP_SXmxNIMVQ386CJQTFZlS-ng9HPy8FvgLF91OR8G5_oiB6ifvy0/s320/abc.jpeg" alt="" id="BLOGGER_PHOTO_ID_5250262587568117906" border="0" /&gt;&lt;/a&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;meta equiv="Content-Type" content="text/html; charset=utf-8"&gt;&lt;meta name="ProgId" content="Word.Document"&gt;&lt;meta name="Generator" content="Microsoft Word 12"&gt;&lt;meta name="Originator" content="Microsoft Word 12"&gt;&lt;link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CRaghav%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_filelist.xml"&gt;&lt;link rel="themeData" href="file:///C:%5CDOCUME%7E1%5CRaghav%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_themedata.thmx"&gt;&lt;link rel="colorSchemeMapping" href="file:///C:%5CDOCUME%7E1%5CRaghav%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_colorschememapping.xml"&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:trackmoves/&gt;   &lt;w:trackformatting/&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:donotpromoteqf/&gt;   &lt;w:lidthemeother&gt;EN-US&lt;/w:LidThemeOther&gt;   &lt;w:lidthemeasian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:lidthemecomplexscript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;    &lt;w:splitpgbreakandparamark/&gt;    &lt;w:dontvertaligncellwithsp/&gt;    &lt;w:dontbreakconstrainedforcedtables/&gt;    &lt;w:dontvertalignintxbx/&gt;    &lt;w:word11kerningpairs/&gt;    &lt;w:cachedcolbalance/&gt;   &lt;/w:Compatibility&gt;   &lt;m:mathpr&gt;    &lt;m:mathfont val="Cambria Math"&gt;    &lt;m:brkbin val="before"&gt;    &lt;m:brkbinsub val="--"&gt;    &lt;m:smallfrac val="off"&gt;    &lt;m:dispdef/&gt;    &lt;m:lmargin val="0"&gt;    &lt;m:rmargin val="0"&gt;    &lt;m:defjc val="centerGroup"&gt;    &lt;m:wrapindent val="1440"&gt;    &lt;m:intlim val="subSup"&gt;    &lt;m:narylim val="undOvr"&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"&gt;   &lt;w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"&gt;   &lt;w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 1"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 2"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 3"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 4"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 5"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 6"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 7"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 8"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 9"&gt;   &lt;w:lsdexception locked="false" priority="35" qformat="true" name="caption"&gt;   &lt;w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"&gt;   &lt;w:lsdexception locked="false" priority="1" name="Default Paragraph Font"&gt;   &lt;w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"&gt;   &lt;w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"&gt;   &lt;w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"&gt;   &lt;w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"&gt;   &lt;w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"&gt;   &lt;w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"&gt;   &lt;w:lsdexception locked="false" unhidewhenused="false" name="Revision"&gt;   &lt;w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"&gt;   &lt;w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"&gt;   &lt;w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"&gt;   &lt;w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"&gt;   &lt;w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"&gt;   &lt;w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"&gt;   &lt;w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"&gt;   &lt;w:lsdexception locked="false" priority="37" name="Bibliography"&gt;   &lt;w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;style&gt; &lt;!--  /* Font Definitions */  @font-face 	{font-family:"Cambria Math"; 	panose-1:2 4 5 3 5 4 6 3 2 4; 	mso-font-charset:0; 	mso-generic-font-family:roman; 	mso-font-pitch:variable; 	mso-font-signature:-1610611985 1107304683 0 0 159 0;} @font-face 	{font-family:Calibri; 	panose-1:2 15 5 2 2 2 4 3 2 4; 	mso-font-charset:0; 	mso-generic-font-family:swiss; 	mso-font-pitch:variable; 	mso-font-signature:-1610611985 1073750139 0 0 159 0;}  /* Style Definitions */  p.MsoNormal, li.MsoNormal, div.MsoNormal 	{mso-style-unhide:no; 	mso-style-qformat:yes; 	mso-style-parent:""; 	margin-top:0in; 	margin-right:0in; 	margin-bottom:10.0pt; 	margin-left:0in; 	line-height:115%; 	mso-pagination:widow-orphan; 	font-size:11.0pt; 	font-family:"Calibri","sans-serif"; 	mso-ascii-font-family:Calibri; 	mso-ascii-theme-font:minor-latin; 	mso-fareast-font-family:Calibri; 	mso-fareast-theme-font:minor-latin; 	mso-hansi-font-family:Calibri; 	mso-hansi-theme-font:minor-latin; 	mso-bidi-font-family:"Times New Roman"; 	mso-bidi-theme-font:minor-bidi;} .MsoChpDefault 	{mso-style-type:export-only; 	mso-default-props:yes; 	mso-ascii-font-family:Calibri; 	mso-ascii-theme-font:minor-latin; 	mso-fareast-font-family:Calibri; 	mso-fareast-theme-font:minor-latin; 	mso-hansi-font-family:Calibri; 	mso-hansi-theme-font:minor-latin; 	mso-bidi-font-family:"Times New Roman"; 	mso-bidi-theme-font:minor-bidi;} .MsoPapDefault 	{mso-style-type:export-only; 	margin-bottom:10.0pt; 	line-height:115%;} @page Section1 	{size:8.5in 11.0in; 	margin:.75in 1.0in .75in 1.0in; 	mso-header-margin:.5in; 	mso-footer-margin:.5in; 	mso-paper-source:0;} div.Section1 	{page:Section1;} --&gt; &lt;/style&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable 	{mso-style-name:"Table Normal"; 	mso-tstyle-rowband-size:0; 	mso-tstyle-colband-size:0; 	mso-style-noshow:yes; 	mso-style-priority:99; 	mso-style-qformat:yes; 	mso-style-parent:""; 	mso-padding-alt:0in 5.4pt 0in 5.4pt; 	mso-para-margin-top:0in; 	mso-para-margin-right:0in; 	mso-para-margin-bottom:10.0pt; 	mso-para-margin-left:0in; 	line-height:115%; 	mso-pagination:widow-orphan; 	font-size:11.0pt; 	font-family:"Calibri","sans-serif"; 	mso-ascii-font-family:Calibri; 	mso-ascii-theme-font:minor-latin; 	mso-fareast-font-family:"Times New Roman"; 	mso-fareast-theme-font:minor-fareast; 	mso-hansi-font-family:Calibri; 	mso-hansi-theme-font:minor-latin;} &lt;/style&gt; &lt;![endif]--&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;Internet has revolutionized the life of the people all around the world. About 80% of the data on the internet is due to e-mail. Today every user on the internet surely having an e-mail ID. A lot of communication either related to business or personal issue takes place over the Internet. But in general users of the internet only knows the ways that is sufficient to carry out the work, they are not aware of the security threats present all around them. Here I’m mentioning some of those security threats…&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b style=""&gt;&lt;span style="font-size:130%;"&gt;Lottery wining e-mails:&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;Now a-days most people are receiving e-mails stating that they have won a huge sum of money in the lucky draw or sender’s grandfather had left the huge amount for him/her and with your help that person can get that money and in lieu of that you will get some share in that huge amount. This thing is called as Social Engineering. The sender of the e-mail takes you in confidence and then directs you steps for attaining the amount. The sender tries to fool you and instead of giving money to you, actually wants money from you. The sender first asks for your personal details as your name, the mailing address, phone number, photo identity proof that may be either the passport or driving license, etc. When you go ahead with this first step the sender then asks for the processing fee for the papers, and after that asks you to collect the money in person by coming over there. Many persons are fooled and suffered a lot from all these fraud e-mails. Some who believed these fraud people lost their huge sum of amount and who went there for money kidnapped over there and their family members were asked for ransom, while some others even lost their lives in all this. On the other hand the information given by you is being used in the terrorist activities. Only your photograph is changed from the identity proof given by you and rest all things remains same, thus the terrorist does all the activities on your name. &lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;So, in future whenever you get this type e-mail that is offering you money always mark it as spam and delete it.&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b style=""&gt;&lt;span style="font-size:130%;"&gt;Banking over the Internet:&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;Another threat over the internet is related to online banking. The online banking where on one hand facilitated their customers, but on the other hand increased the threat to transmit the sensitive information over the internet. However a high care is taken to prevent the misuse of user’s information but again some unsocial agents deploy the same social engineering to get your sensitive information regarding your bank account details. The idea here deployed is sending an e-mail, saying that due some technical problems or some other problems your online account is disabled and you can re-activate it by clicking the link below, and logging in to your account. The link in the email takes you to the bank’s website for logon. But actually the website, on which you have reached from the link in the e-mail, is not the authentic website of the bank but is actually the fake website that looks exactly same as the bank’s website whose purpose is to get the user’s log id and password, so that he/she can access your bank account for your funds. The technical term for this in computer’s world is known as &lt;a href="http://en.wikipedia.org/wiki/Phishing"&gt;Phishing&lt;/a&gt;. Thus when you enter your account’s username and password on the fake website it is sent to the sender of the e-mail and you are simply shown a simply error message. In this way your bank account’s security is compromised.&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;Thus, if you are getting this type of notification, there is no need to panic. If you have activated your account for online banking then simply open a new browser window and type in the URL of your bank’s online banking and then logon to your account to check your account. One thing you should keep in mind to never click on the link available in the e-mail. Never go to bank’s online banking website by clicking to any link in any e-mail or on any web page that is not believed to be authentic. If you have received these types of phishing e-mails then always inform the technical support department of the bank to take appropriate steps.&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b style=""&gt;Job Offers:&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;Another trap to get money from the people is fake job offers, especially from abroad. In this, the unsocial people collect individual’s data from job portals that he/she has put on the job portal like &lt;a href="http://www.monster.com/"&gt;Monster.com&lt;/a&gt;, &lt;a href="http://www.naukri.com/"&gt;Naukri.com&lt;/a&gt;, &lt;a href="http://www.shine.com/"&gt;Shine.com&lt;/a&gt;, etc. for jobs. In this, an e-mail is communicated to the individual stating that his/her profile matches with the requirements of the job openings in their company, and they offer you to go forward on the process to join the company. Generally the process consists of a telephonic interview after that those people demand for processing fee for the papers necessary to join the company and also ask fee for visa to work in their country. Once the payment is received from the person, then no response is made from these fraud people.&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;So, whenever you receive such email, always check the authenticity of the email. Search for the company profile over the internet. After consulting with some knowledgeable persons reply or go forward on such matters. &lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b style=""&gt;&lt;span style="font-size:130%;"&gt;Social Networking:&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;A lot of social networking sites are point of attraction to the people now a day, like &lt;a href="http://www.orkut.com/"&gt;Orkut&lt;/a&gt;, &lt;a href="http://www.wayn.com/"&gt;Wayn&lt;/a&gt;, &lt;a href="http://www.facebook.com/"&gt;Facebook&lt;/a&gt;, etc. These services where made a platform for friends to meet and, discuss and share their emotions but also made the personal information about the people public. Whereas option is available on these sites to show the information you want, but that also is not 100% guaranteed. As there are scripts used for all these security related tasks and an expert programmer can easily fetch all your personal data. I’m not saying that you should not use social networking sites but be cautious while submitting the information on these sites. Special care must be taken by the girls and ladies while posting the information and photographs on these sites. A lot of cases have been heard regarding theft of the photographs of girls from these social networking sites and misused over other sites. Another thing you should also keep in mind that you should never trust the person on the other side if you do not know him/her personally, never reveal your phone number or mobile number to that person. Even if you have met your childhood friend on these sites, it may be possible that it is not the same person whose name is written over there and whose photograph is displayed on the profile. I myself have seen three profile of my friend on the internet with his name and photograph on all the three profiles; out of these only one profile was authentic that was created by himself rest others were fake and were made by unsocial people on these sites.&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;So, from next time always be careful in using these sites and do keep in mind what I told above.&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: center;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0R3d1VmzmEhXd1d08bdE3TdxlzYXOfVAaNc2I0g1Dxk6VwFSwSINoAEbWzsuqyYOsfYfVZf-DgNgBLj0288Cgvhy_Wo8UoTAzKLXO3c-F3ld_70i2F709Owy7vU7aVPjWHFW7Q0vHNTY/s1600-h/def.jpg"&gt;&lt;img style="cursor: pointer; width: 455px; height: 345px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0R3d1VmzmEhXd1d08bdE3TdxlzYXOfVAaNc2I0g1Dxk6VwFSwSINoAEbWzsuqyYOsfYfVZf-DgNgBLj0288Cgvhy_Wo8UoTAzKLXO3c-F3ld_70i2F709Owy7vU7aVPjWHFW7Q0vHNTY/s320/def.jpg" alt="" id="BLOGGER_PHOTO_ID_5250262585978252466" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b style=""&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b style=""&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b style=""&gt;&lt;span style="font-size:130%;"&gt;Some important tips for using Internet:&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="text-align: justify;"&gt;&lt;li&gt;&lt;span style="font-size:85%;"&gt;Always remember to sign out of all your account. Many people simply close the browser window in hurry instead of signing out, and think their account is safe. But this not the case, the session remains valid as long as the valid cookie (used for managing user’s session on the internet) remains on the user’s computer. A cookie is invalidated by signing out of the account. If due to some problem you have lost your internet connection or due to some other problem not able to sign out then simply clear your private data, for this simply select the option from the tools menu. The main thing is to delete the cookies from your browser and your session is invalidated.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-size:85%;"&gt;Always think twice before you activate your account for online net banking; do you really need it! These things are not for fun. As far as possible access your net banking account from your personal computer or laptop only. If any time you have to access your account from &lt;a href="http://en.wikipedia.org/wiki/Cyber_cafe"&gt;cyber café&lt;/a&gt; or some others computer then use the on screen keyboard utility to enter your password to prevent password theft.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style="font-size:130%;"&gt;&lt;span style="font-weight: bold;"&gt;Precautions:&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;&lt;ul style="text-align: justify;"&gt;&lt;li&gt;&lt;span style="font-size:85%;"&gt;Never pay attention to lottery wining e-mails, mark it as spam and block sender.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-size:85%;"&gt;While banking over internet never disclose your sensitive information as your login password, profile password, etc. to anyone.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-size:85%;"&gt;Use the on-screen keyboard utility when accessing your account from public computer or some other's computer.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-size:85%;"&gt;If you receive a job-offer always research about the company over the internet, and also consult some learned person before replying.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-size:85%;"&gt;Never disclose your personal information on social networking sites, as there is risk of information theft.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;   &lt;p class="MsoNormal" style="text-align: justify;"&gt;Internet has emerged as a very powerful tool for communication, but by knowing these security related issues you can take full advantage of it, and will not have to suffer in future.
&lt;br /&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;Wish you happy and better internet experience…&lt;/p&gt;  </description><link>http://raghav-hightech-guy.blogspot.com/2008/09/security-threats-in-your-daily-internet.html</link><author>noreply@blogger.com (Raghav)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK99xt-1iKKN6XgWjURNvNqUFFQBOemX1HHBdAJg4aCfpXD2CHbZgLmfOwy2dSU7VFhKhMIDVXzklfSHpjr3u2wrmP_SXmxNIMVQ386CJQTFZlS-ng9HPy8FvgLF91OR8G5_oiB6ifvy0/s72-c/abc.jpeg" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1548980119942535768.post-4242887146865965396</guid><pubDate>Mon, 15 Sep 2008 13:16:00 +0000</pubDate><atom:updated>2008-09-15T19:04:12.314+05:30</atom:updated><title>Planning network for home or office…. Go for</title><description>
&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEeeqQOven1eioZU5sYq7QTblg8Z9HG88UhB_LLA4JsnNUwIJMg3XeBrqYBrmyZtvma67CEBFxpVjaKqZwi0jB0X1-1N6ZgEo76Uroyebv19CxKdBviFooxE1A_zKl1vgwuMdefpoglu8/s1600-h/wiii.JPG"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEeeqQOven1eioZU5sYq7QTblg8Z9HG88UhB_LLA4JsnNUwIJMg3XeBrqYBrmyZtvma67CEBFxpVjaKqZwi0jB0X1-1N6ZgEo76Uroyebv19CxKdBviFooxE1A_zKl1vgwuMdefpoglu8/s320/wiii.JPG" alt="" id="BLOGGER_PHOTO_ID_5246236692419415218" border="0" /&gt;&lt;/a&gt;
&lt;br /&gt;&lt;meta equiv="Content-Type" content="text/html; charset=utf-8"&gt;&lt;meta name="ProgId" content="Word.Document"&gt;&lt;meta name="Generator" content="Microsoft Word 12"&gt;&lt;meta name="Originator" content="Microsoft Word 12"&gt;&lt;link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CRaghav%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_filelist.xml"&gt;&lt;link rel="themeData" href="file:///C:%5CDOCUME%7E1%5CRaghav%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_themedata.thmx"&gt;&lt;link rel="colorSchemeMapping" href="file:///C:%5CDOCUME%7E1%5CRaghav%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_colorschememapping.xml"&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:trackmoves/&gt;   &lt;w:trackformatting/&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:donotpromoteqf/&gt;   &lt;w:lidthemeother&gt;EN-US&lt;/w:LidThemeOther&gt;   &lt;w:lidthemeasian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:lidthemecomplexscript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;    &lt;w:splitpgbreakandparamark/&gt;    &lt;w:dontvertaligncellwithsp/&gt;    &lt;w:dontbreakconstrainedforcedtables/&gt;    &lt;w:dontvertalignintxbx/&gt;    &lt;w:word11kerningpairs/&gt;    &lt;w:cachedcolbalance/&gt;   &lt;/w:Compatibility&gt;   &lt;w:browserlevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;   &lt;m:mathpr&gt;    &lt;m:mathfont val="Cambria Math"&gt;    &lt;m:brkbin val="before"&gt;    &lt;m:brkbinsub val="--"&gt;    &lt;m:smallfrac val="off"&gt;    &lt;m:dispdef/&gt;    &lt;m:lmargin val="0"&gt;    &lt;m:rmargin val="0"&gt;    &lt;m:defjc val="centerGroup"&gt;    &lt;m:wrapindent val="1440"&gt;    &lt;m:intlim val="subSup"&gt;    &lt;m:narylim val="undOvr"&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"&gt;   &lt;w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"&gt;   &lt;w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 1"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 2"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 3"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 4"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 5"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 6"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 7"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 8"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 9"&gt;   &lt;w:lsdexception locked="false" priority="35" qformat="true" name="caption"&gt;   &lt;w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"&gt;   &lt;w:lsdexception locked="false" priority="1" name="Default Paragraph Font"&gt;   &lt;w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"&gt;   &lt;w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"&gt;   &lt;w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"&gt;   &lt;w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"&gt;   &lt;w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"&gt;   &lt;w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"&gt;   &lt;w:lsdexception locked="false" unhidewhenused="false" name="Revision"&gt;   &lt;w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"&gt;   &lt;w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"&gt;   &lt;w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"&gt;   &lt;w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"&gt;   &lt;w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"&gt;   &lt;w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"&gt;   &lt;w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"&gt;   &lt;w:lsdexception locked="false" priority="37" name="Bibliography"&gt;   &lt;w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;style&gt; &lt;!--  /* Font Definitions */  @font-face 	{font-family:"Cambria Math"; 	panose-1:2 4 5 3 5 4 6 3 2 4; 	mso-font-charset:0; 	mso-generic-font-family:roman; 	mso-font-pitch:variable; 	mso-font-signature:-1610611985 1107304683 0 0 159 0;} @font-face 	{font-family:Calibri; 	panose-1:2 15 5 2 2 2 4 3 2 4; 	mso-font-charset:0; 	mso-generic-font-family:swiss; 	mso-font-pitch:variable; 	mso-font-signature:-1610611985 1073750139 0 0 159 0;}  /* Style Definitions */  p.MsoNormal, li.MsoNormal, div.MsoNormal 	{mso-style-unhide:no; 	mso-style-qformat:yes; 	mso-style-parent:""; 	margin-top:0in; 	margin-right:0in; 	margin-bottom:10.0pt; 	margin-left:0in; 	line-height:115%; 	mso-pagination:widow-orphan; 	font-size:11.0pt; 	font-family:"Calibri","sans-serif"; 	mso-ascii-font-family:Calibri; 	mso-ascii-theme-font:minor-latin; 	mso-fareast-font-family:Calibri; 	mso-fareast-theme-font:minor-latin; 	mso-hansi-font-family:Calibri; 	mso-hansi-theme-font:minor-latin; 	mso-bidi-font-family:"Times New Roman"; 	mso-bidi-theme-font:minor-bidi;} .MsoChpDefault 	{mso-style-type:export-only; 	mso-default-props:yes; 	mso-ascii-font-family:Calibri; 	mso-ascii-theme-font:minor-latin; 	mso-fareast-font-family:Calibri; 	mso-fareast-theme-font:minor-latin; 	mso-hansi-font-family:Calibri; 	mso-hansi-theme-font:minor-latin; 	mso-bidi-font-family:"Times New Roman"; 	mso-bidi-theme-font:minor-bidi;} .MsoPapDefault 	{mso-style-type:export-only; 	margin-bottom:10.0pt; 	line-height:115%;} @page Section1 	{size:8.5in 11.0in; 	margin:1.0in 1.0in 1.0in 1.0in; 	mso-header-margin:.5in; 	mso-footer-margin:.5in; 	mso-paper-source:0;} div.Section1 	{page:Section1;} --&gt; &lt;/style&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable 	{mso-style-name:"Table Normal"; 	mso-tstyle-rowband-size:0; 	mso-tstyle-colband-size:0; 	mso-style-noshow:yes; 	mso-style-priority:99; 	mso-style-qformat:yes; 	mso-style-parent:""; 	mso-padding-alt:0in 5.4pt 0in 5.4pt; 	mso-para-margin-top:0in; 	mso-para-margin-right:0in; 	mso-para-margin-bottom:10.0pt; 	mso-para-margin-left:0in; 	line-height:115%; 	mso-pagination:widow-orphan; 	font-size:11.0pt; 	font-family:"Calibri","sans-serif"; 	mso-ascii-font-family:Calibri; 	mso-ascii-theme-font:minor-latin; 	mso-fareast-font-family:"Times New Roman"; 	mso-fareast-theme-font:minor-fareast; 	mso-hansi-font-family:Calibri; 	mso-hansi-theme-font:minor-latin;} &lt;/style&gt; &lt;![endif]--&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;The current time is where everyone likes to be connected to their loved ones and the &lt;a href="http://en.wikipedia.org/wiki/Internet"&gt;Internet&lt;/a&gt; has played a very vital role in this. Now almost all middleclass families are having computer in their home and also have access to the internet. Similarly the support of internet to your business can give it new heights. &lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;Now the condition is again changing, instead of having a single system, there is more than one system and every system likes to be connected to the internet. So, now whenever you are planning for the internet connections, and if you are going to use it regularly, then go for the broadband connection. It will give you a good experience and will be economical also. There’s lot of offers available in the market so it’s difficult for one to make choice.&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b style=""&gt;&lt;i style=""&gt;Selection of ISP:&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;The broadband service provided by BSNL and MTNL are for stationary access, whereas the services provided by the mobile companies as TATA Indicom, Reliance, Idea, etc. allows you to access the internet on the move. So depending upon your need select your connection. I suggest that you must go for the stationary connection, provided by BSNL and MTNL over their basic phone connection, as here are very few moments when you will have to access the internet on the move unless you are from corporate world. You can also go for the broadband connection provided by the mobile companies but that will be not economical. Stationary broadband will give you good bandwidth (speed) so you can have good working experience. The service provided by mobile service providers through the USB modem or device not gives the good speed. So, you are not going to work smoothly with the interactive multimedia content, like watching videos, or video conferencing with your loved ones.&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b style=""&gt;&lt;i style=""&gt;Selecting Customer Premises Equipment (CPE):&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;The broadband service provided by BSNL and MTNL requires you to setup ADSL modem for accessing the service. I will suggest you to purchase the modem having more than one LAN port and also having Wi-Fi port this will help you access the service on more than one system and also wirelessly. However this let you spend some more money but it will be beneficial for the future.&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6VtVsDe5ZE5CFqprIL6gdN6sTgbUbo2reau7MGDEm1VaHh5Tt997GdIQATT5t3tgjClclZ7PlnyJB4lTTaJRtByknL36_9UhFlrEei9jenXheJvUY_8jPOrJ_yzV3cjDMRs3wg3TNJmY/s1600-h/Picture+001.jpg"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 444px; height: 332px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6VtVsDe5ZE5CFqprIL6gdN6sTgbUbo2reau7MGDEm1VaHh5Tt997GdIQATT5t3tgjClclZ7PlnyJB4lTTaJRtByknL36_9UhFlrEei9jenXheJvUY_8jPOrJ_yzV3cjDMRs3wg3TNJmY/s320/Picture+001.jpg" alt="" id="BLOGGER_PHOTO_ID_5246237094503327730" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: center;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Typical Wi Fi Router with inbuilt modem (front view)
&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: center;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr6AdBxO7YrST9aarlWbmacbsxRDUWC9ATdH2MkgbzxOaxQkAM0phQPSBSBETZjbnR4vg_BanudLyegEl0cflA0Vc_Ogb-WbCqJ8PnhPR2wOfXbG8wkxoGadYHsrf2MmgpguvuIorhg3k/s1600-h/Picture+010+copy.jpg"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 445px; height: 333px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr6AdBxO7YrST9aarlWbmacbsxRDUWC9ATdH2MkgbzxOaxQkAM0phQPSBSBETZjbnR4vg_BanudLyegEl0cflA0Vc_Ogb-WbCqJ8PnhPR2wOfXbG8wkxoGadYHsrf2MmgpguvuIorhg3k/s320/Picture+010+copy.jpg" alt="" id="BLOGGER_PHOTO_ID_5246237096819944354" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: center;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Rear view&lt;/span&gt;
&lt;br /&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;The most important thing over here is the &lt;a href="http://en.wikipedia.org/wiki/Wi-Fi"&gt;Wi-Fi&lt;/a&gt;! As it will be good for you, because the future is of &lt;a href="http://en.wikipedia.org/wiki/Wi-Fi"&gt;Wi-Fi&lt;/a&gt;. Maximum devices are now being &lt;a href="http://en.wikipedia.org/wiki/Wi-Fi"&gt;Wi-Fi&lt;/a&gt; enabled like the mobile phones and printers. This also lets you get of the rid of the wiring overhead for accessing the network. It also lets you easily add devices to the network. All laptops are now &lt;a href="http://en.wikipedia.org/wiki/Wi-Fi"&gt;Wi-Fi&lt;/a&gt; enabled, for accessing &lt;a href="http://en.wikipedia.org/wiki/Wi-Fi"&gt;Wi-Fi&lt;/a&gt; network on desktop computer just use the USB Wi-Fi Adapter, which is also easily available. It lets you to move out of the rooms and provides you access to the network in your whole premises. The most important is placement of the &lt;a href="http://en.wikipedia.org/wiki/Wi-Fi"&gt;Wi-Fi &lt;/a&gt;router (modem). The modem acts as the &lt;a href="http://en.wikipedia.org/wiki/Wi-Fi"&gt;Wi-Fi&lt;/a&gt; router (or Access Point) for the devices in range. The placement of the router (modem) plays a dominant role for better reception of the signal. &lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;The router will be placed in the open location so that you get good signal reception. If possible place it in the center of your home or office at a height of 1.5 to 2 meters, which will give you better signal strength. &lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b style=""&gt;&lt;i style=""&gt;Security:&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;Now the most important thing with the &lt;a href="http://en.wikipedia.org/wiki/Wi-Fi"&gt;Wi-Fi &lt;/a&gt;is the security. You think that you placed the router at the best location and getting good signal reception all over your premises that’s all! You think that the signal seizes to extend out of your premises! It is not the case; the signal continues to extend beyond the boundary of your premises. Thus to protect your data and internet connection, security is the most important concern. The most common wireless encryption standard is &lt;a href="http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access"&gt;Wired Equivalent Privacy (WEP)&lt;/a&gt;, but it has shown to be easily breakable even when correctly configured. So, &lt;a href="http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access"&gt;Wi-Fi&lt;/a&gt;&lt;a href="http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access"&gt; Protected Access (WPA and WPA2)&lt;/a&gt; became the standard in 2003 and is now shipped with almost all &lt;a href="http://en.wikipedia.org/wiki/Wi-Fi"&gt;Wi-Fi&lt;/a&gt; enabled equipments. By default the Wi-Fi routers are configured in the “open” mode, i.e. anyone who is in the range of the Wi-Fi signals can access the network and if the person having some technical knowledge then he/she can change the settings of your router. Thus it is advisable to first change the IP address range of you router and then change the &lt;a href="http://en.wikipedia.org/wiki/SSID"&gt;SSID&lt;/a&gt; i.e. the network name and then set the network access key. Also it will be better to hide the access point so that it is not discoverable from the devices in range.&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify;"&gt;So whenever you are going to set up small networks in home or in your office then go for Wi-Fi. It is the best option available with least overhead. The wireless router with inbuilt modem will let you to connect the devices with each other and also to the internet. So turn your home or office into a “&lt;a href="http://en.wikipedia.org/wiki/Hotspot_%28Wi-Fi%29"&gt;hot spot&lt;/a&gt;” for you.&lt;/p&gt;  </description><link>http://raghav-hightech-guy.blogspot.com/2008/09/planning-network-for-home-or-office-go.html</link><author>noreply@blogger.com (Raghav)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEeeqQOven1eioZU5sYq7QTblg8Z9HG88UhB_LLA4JsnNUwIJMg3XeBrqYBrmyZtvma67CEBFxpVjaKqZwi0jB0X1-1N6ZgEo76Uroyebv19CxKdBviFooxE1A_zKl1vgwuMdefpoglu8/s72-c/wiii.JPG" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1548980119942535768.post-7637469856818342668</guid><pubDate>Sat, 12 Jul 2008 07:25:00 +0000</pubDate><atom:updated>2008-07-13T09:21:10.736+05:30</atom:updated><title>Vehicle Tracking System using GPS</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://en.wikipedia.org/wiki/GPS"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpUihhy9N9V_m3pxh7YfldREO0x3yDzsvV8TeRcOh_PZyJyjOUGMkIHnWhNSe_TDQTLVF0vqdO-iV_sNSO-78EhNr5rb4QlraFjz10w2fAE40K1GhumyzHWsDgmOv6QfHpwiPg5h32yW8/s320/Earth.jpg" alt="" id="BLOGGER_PHOTO_ID_5222026090795912818" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;As it has always been a logistic nightmare to track out the vehicles on the way. In order to solve this problem of tracing out the vehicles on the way a vehicle tracking system based on &lt;a href="http://en.wikipedia.org/wiki/GPS"&gt;Global Positioning System&lt;/a&gt; (GPS) has been devised. The system uses Global Positioning System as its base technology. For the communication purpose the system is set to be configured with the available terrestrial network.     &lt;/div&gt;&lt;p class="MsoNormal"&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;br /&gt;&lt;b style=""&gt;&lt;i style=""&gt;&lt;u&gt;&lt;span style="font-size:18;"&gt;&lt;span style="font-size:130%;"&gt;Working of GPS:&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;    &lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;o:p&gt; &lt;/o:p&gt;The feasibility studies were started in 1960’s. The Pentagon appropriates funding for this system in 1973 and the first satellite related to this topic was launched in 1978, and the system declared fully operational in 1995.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;span style="" lang="EN"&gt;The official name of the system was&lt;b&gt; &lt;a href="http://en.wikipedia.org/wiki/NAVSTAR_GPS"&gt;NAVSTAR GPS&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style="" lang="EN"&gt; (&lt;b&gt;Nav&lt;/b&gt;igation &lt;b&gt;S&lt;/b&gt;atellite &lt;b&gt;T&lt;/b&gt;iming &lt;b&gt;A&lt;/b&gt;nd &lt;b&gt;R&lt;/b&gt;anging &lt;b&gt;G&lt;/b&gt;lobal &lt;b&gt;P&lt;/b&gt;ositioning &lt;b&gt;S&lt;/b&gt;ystem) and is developed by US Department of Defence. &lt;/span&gt;The Global Positioning System is a worldwide positioning system based on the functioning of the 29 satellites. These satellites keep transmitting the signals at a particular frequency to the earth. The GPS listeners, on earth tune to that particular frequency and listen to the signals sent by the satellite. For positioning any device which is equipped with the GPS listener, signals from three or more satellites is required. The signals from three satellites determine the latitude and longitude of the device on the earth. But the signal from four satellites determines the latitude, longitude and altitude of that device on the earth. More the signals from the satellite more will be the accuracy of the position of the device.&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;b style=""&gt;&lt;i style=""&gt;&lt;u&gt;&lt;span style="font-size:18;"&gt;&lt;span style="font-size:130%;"&gt;Use of GPS for vehicle tracking system:&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;      &lt;p style="text-align: justify;" class="MsoNormal"&gt;For locating or tracking the vehicles, the system uses the GPS as its base technology to locate the vehicle on the earth. For this the vehicle is equipped with the GPS listener. Once the vehicle is located on the earth then the next step is to send this information to the control centre for the mapping of the vehicles. That’s here the terrestrial network comes into scene. The system uses the terrestrial network such as the available &lt;a href="http://en.wikipedia.org/wiki/CDMA"&gt;CDMA&lt;/a&gt; or &lt;a href="http://en.wikipedia.org/wiki/GSM"&gt;GSM &lt;/a&gt;mobile network for communicating with the control center.&lt;br /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;Once the vehicles is located then it is it sends its information such as the latitude, longitude, altitude, speed(derived), etc. to the terrestrial network. The terrestrial network then sends this information to the control center where the vehicle is mapped on the electronic map on the computer. If there is some information that is to be send to the person in the vehicle then it is sent to the terrestrial network. The terrestrial network sends this information to the device in the vehicle. For this the system use the Short Messaging Service (SMS), thus the information that is sent by the control centre to the person in the vehicle appears as SMS to him. Thus, it is fully two way communications between the control center and the device.&lt;/p&gt;&lt;div style="text-align: center;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://en.wikipedia.org/wiki/Vehicle_tracking_system"&gt;&lt;img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5txOr2O1W8B9XkTzNzcw1dR53t0BeeIdldt0AoOUeiP9jjxXZXDfXvXMeyPHV6Z62SFiQKCbx7gJPwnGZHFPl8nf0Adz1sw5k8w821XIaEAb8aXyI7isWhXvmgVt6PHCszhuWclKRBnU/s320/sys_staucture_new.jpg" alt="" id="BLOGGER_PHOTO_ID_5222026359283466402" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;The location is represented by the &lt;a href="http://en.wikipedia.org/wiki/Position_Fix"&gt;Position Fix.&lt;/a&gt; A position fix is based on real – time satellite tracking and is defined by set of co-ordinates. It changes as the GPS receiver moves. Position shows the approximation of the receiver’s true location. &lt;/p&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;" class="MsoNormal"&gt;&lt;o:p&gt; &lt;/o:p&gt;The path which the receiver must follow is denoted by the waypoint. A waypoint is the set of co-ordinates entered into the receiver. The position fix is matched with the waypoint within some allowed error limits. If it is within the error limits, the vehicle is following the correct path unless it is on wrong path and the control centre is sent information about this.&lt;/p&gt;</description><link>http://raghav-hightech-guy.blogspot.com/2008/07/vehicle-tracking-system-using-gps.html</link><author>noreply@blogger.com (Raghav)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpUihhy9N9V_m3pxh7YfldREO0x3yDzsvV8TeRcOh_PZyJyjOUGMkIHnWhNSe_TDQTLVF0vqdO-iV_sNSO-78EhNr5rb4QlraFjz10w2fAE40K1GhumyzHWsDgmOv6QfHpwiPg5h32yW8/s72-c/Earth.jpg" width="72"/><thr:total>11</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1548980119942535768.post-4827635462240920110</guid><pubDate>Fri, 11 Jul 2008 18:26:00 +0000</pubDate><atom:updated>2008-07-12T00:03:46.444+05:30</atom:updated><title>Your own Website, your own dedicated server, at your HOME…</title><description>&lt;p align="justify"&gt;You just typed in the URL in the address bar of the web browser and the site opened in front of you. Have you ever thought that from where the page came from or where it is lying? So, how do you feel if something like this happens for your website? Sounds great! But for this you have to buy the web space to place your web site over there, then buy the domain name, by which the people can access your stuff worldwide.&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;But you yourself have a computer which has lot of space available. Also you are having an internet connection. Can you use your own computer to act as server for hosting your website? Yes, sure you can do this; after all you have spent a lot of money for your computer, so it’s the time for you to exploit it!&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;There are many issues that must be handled for hosting the website from your home PC, which I shall take on in this article. The most important issue is that people access your stuff using your broadband internet connection. In 90% of the cases your ISP provide you with the dynamic IP, i.e. every time you get a different IP address when you connect to the internet. So it will be difficult for the DNS to map your computer appropriately. This is the main issue, which is handled later in this article.&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;For getting started its assumed that you have made you own website and its now ready to be published on the internet. In Windows XP Pro/2000/NT there is windows service available called Internet Information Service (IIS) for hosting website but in Windows 98/XP Home this is not available so, I’m using the third party server for publishing the server.&lt;br /&gt;Here I am using Apache Tomcat web server for the deployment of the web site.&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;Getting started…&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;First download and install Apache Tomcat on your computer. Just follow the typical settings for installation. To test whether the server is working properly fire a web browser window and type in the following: &lt;span style="color:#000000;"&gt;http://localhost:8080&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p align="justify"&gt;You will see the Tomcat home page. Now it is sure that you your server is installed and working properly. Now place the folder containing your web files in the webapps folder inside Tomcat. The very first page i.e. the home page of your website must be index.html or index.jsp. If this is not the case then rename the home page file to index.html or index.jsp and also update the links in your web site for your home page.&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;Making your website accessible&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;You have to configure your system for making your website accessible for people on the internet. First of all you have to configure your firewall to allow the requests for your website. For this, if you are using any other program other than the Windows inbuilt firewall then configure it to allow connections for port 80 that is for HTTP (Web Service). If you are using Windows firewall as in Win XP then in its advances settings tick the Web Service (HTTP). Thus now your system is configured to handle HTTP request from outside.&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;Securing your system&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;As you allow people on the internet to access the content available on your system, it’s not safe regarding the security issues as there are many security loopholes present in Windows XP Pro. So, it will be better to get your windows updated with the security updates released by Microsoft. If you are having genuine copy of windows then use the automatic updates feature; else manually download the updates and install them. &lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;span style="font-size:130%;"&gt;&lt;strong&gt;Getting domain name&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;Domain names are nothing but the names by which the computers are referenced on the internet instead of IP address. IP addresses are used to uniquely identify the computers on the network; they are just like phone numbers. But having dynamic IP address its problem for DNS! This problem is handled with the concept of dynamic DNS. A lot of information is available on the internet regarding dynamic DNS and also there are many service providers for dynamic DNS. The concept behind dynamic DNS is that you open an account with the service provider and then create a host over there. Then you must download the dynamic DNS client and run on the system that you use for hosting websites and is having dynamic IP. Whenever the IP address of the system changes then the running client of the service provider updates your IP address in the provider’s DNS database so that your computer is correctly mapped to the proper IP address by the domain name. One such service provider is &lt;a href="http://www.no-ip.com/"&gt;no-ip&lt;/a&gt;, that provides the dynamic DNS service. First you have to open the free account over there; once you are having account on no-ip, add host, select the domain name from the offered free domain names, then select port-80 redirect in the host type and enter port 8080 as Apache runs on port 8080. Now you are done.&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;Final step&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;Now go to apache webapps folder and rename the ROOT folder to some other name and rename your web application or website folder to ROOT. That’s all, now you are done. If everything that is explained above is right then startup the apache server and connect to internet; and your website is accessible from all over the world. To check fire a web browser window and type in the domain name of your web site that you have chosen and you will be presented with the home page of your very own website. &lt;/p&gt;&lt;p&gt;&lt;br /&gt;In this way without spending a single penny you can have your own website, your own dedicated server, at your very own HOME.&lt;/p&gt;</description><link>http://raghav-hightech-guy.blogspot.com/2008/07/your-own-website-your-own-dedicated.html</link><author>noreply@blogger.com (Raghav)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1548980119942535768.post-392368348586069160</guid><pubDate>Sun, 06 Jul 2008 11:07:00 +0000</pubDate><atom:updated>2008-07-13T08:48:56.707+05:30</atom:updated><title>The VIRUS Phobia</title><description>&lt;p class="MsoNormal" style="text-align: justify;"&gt;A general computer science student working at his room suddenly notices something strange in his system. Some of the icons are distorted, a folder inside the folder with the same name, and some applications are not working properly. He immediately thinks that what happened to the system, then it strikes to his mind that his computer may be infected by a virus. He instead of removing the virus makes up his mind to format the system, reinstalling the windows and then the various drivers and finally all the applications. &lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;This is the general view of many of the peoples who knows how to install the windows. The rest who don’t know how to install windows, thinks that many of the things in the system are not working properly, and due to the fear that it will spoil their costly system, they immediately call the vendor to do the things right; which in turn charges them a huge amount in lieu of doing the things right, which in fact is not a difficult task. Thus, many of us don’t exactly know how to handle the situation when a computer is attacked by a virus. &lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;Whenever you notice that the system is doing something strange, some of the applications are not working properly, windows is distorted then it may be the case that your system may be infected by virus. But there is nothing to panic. Remain calm and try to find out the virus and also find the way to fix that.&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;Amit Saxena, a student of Electrical and Electronics branch, is having system just only to carry out general word processing, listening songs, and watching movies. He used to collect the media from various sources and don’t worry about whether the data is safe or not. Result is, very often his system is infected with virus. And when the situation of the system becomes critical that it can’t work further then he simply formats the system, mostly spoiling his 4 to 5 hours. Thus in a month he use to format his system about 5 to 6 times. This is not right, as it creates a bad effect on the hard disk.&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;Handling a virus attack in fact is &lt;i&gt;not&lt;/i&gt; a hard nut to crack. Just you need some knowledge and most important is the “patience”. As prevention is better than cure, so it is beneficial to protect your computer using a good anti-virus program, keep the virus definitions update and also copy data from secure source. Whenever you bring any data from sources that you think may be vulnerable to viruses, always scan that. &lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;Whenever you find that your computer is infected by virus then there is no need to panic. Simply think of the source from where the virus made its way to the system, block that way so that it can’t make its way back to the system when you are on your way to fix that virus. To fix most viruses just follow the following steps:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Update the virus definitions of your anti-virus program.&lt;/li&gt;&lt;li&gt;Turn-off the system restore utility in windows XP. If it’s not possible to turn off the system restore, then restart the system in the safe mode and then turn off the system restore.&lt;/li&gt;&lt;li&gt;Perform full system scan, select fix for all the found viruses. If some of the viruses that cannot be fixed by the anti-virus program; quarantine all those infected files.&lt;/li&gt;&lt;/ul&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;In most of the cases above provided steps will fix the problem, and if problem still persists then go online and get a fix for that particular virus. &lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;Always make back up of your important data, so that in case of virus attack you not lose your data that may be the result of years of work. So, next time if you get infected by virus then don’t try to reinstall windows or call vendor for help, simply do it yourself.&lt;/p&gt;</description><link>http://raghav-hightech-guy.blogspot.com/2008/07/virus-phobia.html</link><author>noreply@blogger.com (Raghav)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1548980119942535768.post-4805789366043488292</guid><pubDate>Sun, 20 Jan 2008 10:10:00 +0000</pubDate><atom:updated>2008-07-06T16:44:11.585+05:30</atom:updated><title>Categories of  Members in Software Project Teams…..</title><description>&lt;em&gt;Here I'm presenting my personal view about the different types of persons that I've come through in my college life and in the development of software project. It is my thinking about these types of people, and many of you also agree with me. Any suggestions on this matter is highly appreciated.....&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;span style="font-family:courier new;"&gt;Some other categories related to this topic are available on my friend's blog. It is highly recommended to have a look on that......&lt;/span&gt;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;span style="font-family:courier new;"&gt;&lt;/span&gt;&lt;/em&gt;&lt;br /&gt;&lt;a href="http://manasdeeps.blogspot.com/"&gt;&lt;em&gt;&lt;span style="font-family:courier new;"&gt;http://manasdeeps.blogspot.com&lt;/span&gt;&lt;/em&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Theorists:&lt;/strong&gt;&lt;br /&gt;&lt;div align="justify"&gt;&lt;br /&gt;This kind of personnel in the field of programming knows the complete detail of how the things go on, what’s the theory behind it, what logic must be applied to do the things in the right way but they rarely have done these all things in practical. They can very well explain you how should you proceed but when the point comes for them to do those things by themselves they fail. They only have the theoretical knowledge but practically they are zero.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;strong&gt;Loudspeaker:&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Producing a lot of sound and impressing the audience is their main property. This kind of people are very well suited for presentations but becomes dangerous for the group sometimes when they are trapped by the questions of the audience. This category of the people can say all the things fluently in front of the audience what they have mugged up during the preparation. These people have expertise in speaking and also have good level of confidence to present the things in a relevant manner. Sometimes if they are trapped by the audience then they handle the matter by their common sense and knowledge what so ever they are having&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Commandos:&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;A very special category of the programmers is the commandos, who once understood the problem domain, are capable of doing all the work in time and in perfect manner. They know all the minute details of each and every step they are applying to solve the things. They are having sound technical knowledge both theoretical and practical. Confused professors seem to take lessons from commandos, and its big head ache of commandos to describe the things properly to confused professors. Also "&lt;a href="http://manasdeeps.blogspot.com/"&gt;Politician&lt;/a&gt;" is seen to have conflict with the commandos.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Confused Professor:&lt;/strong&gt;&lt;br /&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;Knowing a lot of programming languages as ‘C’, “JAVA”, J2EE, .NET, etc. but very few of them are recalled at the time when there is need is the problem of these types of persons. These types of people gain lot of knowledge in a short span of time but they don’t practice that knowledge; thus they get confused in the syntax and other minute details of the various programming languages. They not only themselves confused but they try to confuse the other people also. The main problem with “Confused Professor” is that being professor (in nature) he tries to explain the things to other people but being confused he actually fails to do that and confuses others also. So, other members try to keep away from confused professor. But commandos know that this guy is having a lot of knowledge, and when commandos are in problem they seek the help of confused professor.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Showman GUY:&lt;/strong&gt;&lt;br /&gt;&lt;/div&gt;&lt;strong&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/strong&gt;&lt;div align="justify"&gt;Talking about lot of technical words, carrying electronic devices to impress others, always doing work so that he must be the point of attraction of others – these are some of the activities that are done by the persons having this quality. They always try to show that they are superior than others, having a lot technical knowledge, they do what they like, don’t listen to others but actually they are only having little knowledge; in background they steal the ideas of commandos and administrators. They always try to keep away from commandos because they know that once they came in contact with the commandos, commandos will know their reality and then they cannot show off in front of commandos.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Side Kick:&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align="justify"&gt;Gathering material from various sources, giving ideas that are actually of others, going here ‘n there for printouts, reference books, etc. were main jobs of side kick. This category is overlooked in team but plays an important role in the team. The administrators and commandos know the potential of side kick. They exploit their potential for the welfare of the project. Side kick don’t argue with "&lt;a href="http://manasdeeps.blogspot.com/"&gt;Administrators&lt;/a&gt;" and "Commandos", and accept the work assigned to them happily.&lt;/div&gt;</description><link>http://raghav-hightech-guy.blogspot.com/2008/01/categories-of-members-in-software.html</link><author>noreply@blogger.com (Raghav)</author><thr:total>1</thr:total></item></channel></rss>