Immigration Financial Information Bangladesh Gateway General World Cup Entertainment Programing University and College Scholarship Job Interview Health Job

Friday, December 17, 2010

localhost browsing problem in firefox,Authentication required for localhost in firefox

I could load sites from http://localhost in MSIE, but whenever I tried FireFox, it asked me for an user name and password. I've tried it all but I couldn't authenticate.
If you happen to have the same problem, here's a quick and simple workaround:

1. In Firefox type about:config in the addressbar
2. Find the preference named network.automatic-ntlm-auth.trusted-uris
3. Doubleclick and type localhost
4. Enter and you're done

Tuesday, December 14, 2010

Malware

Malware

Malware is a general term for malicious software, and it is a growing problem on the Internet. Hackers install malware by exploiting security weaknesses on your web server to gain access to your web site. Malware includes everything from adware, which displays unwanted pop-up advertisements, to Trojan horses, which can help criminals steal confidential information, like online banking credentials.Malware is increasingly distributed through web browsers. Hackers use drive-by malware to spread viruses, hijack computers, or steal sensitive data, such as credit card numbers or other personal information.

Drive-by malware

Drive-by malware downloads itself onto a user’s system without their consent. Cybercriminals exploit browser and/or plug—in vulnerabilities to deliver the malware by hiding it within a web page as an invisible element (e.g., an iframe or obfuscated javascript) or by embedding it in an image (e.g., a flash or PDF file) that can be unknowingly delivered from the web site to the visitor’s system.

The anatomy of malware attacks

To infect a computer through a web browser, an attacker must accomplish two tasks. First, they must find a way to
connect with the victim. Next, the attacker must install malware on the victim’s computer. Both of these steps
can occur quickly and without the victim’s knowledge, depending on the attacker’s tactics.

Common types of malware delivery mechanisms

• Software updates
• Banner ads
• Downloadable documents
• Man-in-the-middle
• Keyloggers

Simple way of Installing PHP with IIS as CGI

1. Add \php to the PATH environment variable. I assume you know how to do this.

2. Set up PHP configuration file. First rename \php\php.ini-recommended to \php\php.ini. Then edit \php\php.ini to set the following values:

cgi.force_redirect = 0

doc_root = "c:\inetpub\wwwroot"

cgi.redirect_status_env = ENV_VAR_NAME

3. Create a new environment variable PHPRC with \php. This is needed to access php.ini.

4. Now we need to change IIS configuration to run PHP scripts as CGI scripts. Run Control Panel, Internet Information Service, Default Web Site, and Properties. On the Directory tab, first set Execute Permissions to "Scripts only". Then click Configuration to add a new Application Mapping with Executable=\php\php-cgi.exe, Extension=.php, and Script engine checked.

5. Stop and start Default Web Site.

6. Copy Hello.php to \inetpub\wwwroot.

Sunday, December 12, 2010

System Analyst & System Administrator

Systems Analyst

A systems analyst is responsible for researching, planning and recommending software and system choices to meet an organization's business requirements.

Systems analysts may act as a liaison between vendors and the organization they represent. They may be responsible for developing cost analyses, design considerations, and implementation time-lines. They may also be responsible for feasibility studies of a computer system before making recommendations to senior management.

Systems analysts are responsible for deciding what software, hardware and settings are needed for each computer, and the steps needed to maintain them. They plan, implement and manage multi-computer systems within an organization.

Additional duties include:

  • Assessing the needs of individual departments within an organization and documenting them.
  • Planning for the computers and software they will need in order to interact and meet organizational goals.
  • Providing analysis of costs versus benefits and potential return on investments for proposed computer systems.
  • Establishing and documenting procedures for related tasks.
  • Installing and configuring software according to procedures.
  • Testing individual computers for proper function; repairing and upgrading software and hardware.
  • Working with computer programmers to set up, troubleshoot and maintain computer systems.
  • Conducting assessments on the quality and efficiency of computer systems, and making recommendations.

Systems analysts work with both technical and business customers, facilitating communication between the two. Many systems analysts focus on specific computing areas, such as for business, accounting, financial systems or scientific and engineering. Analysts that specialize in selection of system software and infrastructure are sometimes referred to as system architects while those that are specialized in developing and evolving systems are frequently known as systems designers. System analysts typically work in offices or computer labs, and may be either employees or self-employed consultants.


Systems Administrator

A system administrator is a person employed to maintain, and operate a computer system or network. System administrators may be members of an information technology department.

The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Sysadmins are usually charged with installing, supporting, and maintaining servers or other computer systems, and planning for and responding to service outages and other problems. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff. A System Administrator must demonstrate a blend of technical skills and responsibility.