Bharat Banate's Work Profile

View Bharat Banate's profile on LinkedIn

Wednesday, April 2, 2008

Send an Email to Undisclosed Recipients from Gmail

Whenever you want to send mail to a mass of people, you generally include all the email IDs in the TO: field of your email client. So, when a recipient receives this mail, he/she can see who all are the other recipients. But what if you do not wish to disclose recipients email addresses? Here is a trick to keep recipients' addresses undisclosed. I have used Gmail to test this trick, but it works with all other email clients.
 
To address a message in Gmail so that it goes to "undisclosed recipients" but arrives in all the real recipient's inboxes:
1. Click Compose Mail to start a new message.
2. Type your own email address  OR "Undisclosed Recipients <your email address>" (without double-quotes) in the To: field. 
3. Click Add Bcc.
4. Type the email addresses of all the intended recipients in the Bcc: field. Make sure you separate addresses by comma. If you write to same group of recipients frequently, you can make a mailing list.
5. Now type the subject and message, and finally click Send button.
 
That's all !!

Tuesday, April 1, 2008

CAPTCHA

The word CAPTCHA stands for "Completely Automated Public Turing test to tell Computers and Humans Apart".
CAPTCHA is a type of challenge-response test used in computing to determine whether a user is being imitated by a computer. The process involves one computer (a server) asking a user to complete a simple test which the computer is able to generate and grade. Because other computers are unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human. A common type of CAPTCHA requires that the user type the letters displayed in a distorted image, sometimes with the addition of an obscured sequence of letters or digits that appears on the screen.

A CAPTCHA is sometimes described as a reverse Turing test, because it is administered by a machine and targeted to a human, in contrast to the standard Turing test that is typically administered by a human and targeted to a machine.

Currently, reCAPTCHA is recommended as the official CAPTCHA implementation by the original CAPTCHA creators.

Applications:
CAPTCHAs are used to prevent automated software from performing actions which degrade the quality of service of a given system, whether due to abuse or resource expenditure. Although CAPTCHAs are most often deployed as a response to encroachment by commercial interests, the notion that they exist to stop only spammers is mistaken. CAPTCHAs can be deployed to protect systems vulnerable to e-mail spam, such as the webmail services of Gmail (there is also a claim that the Gmail CAPTCHA has been compromised), Hotmail, and Yahoo!. CAPTCHAs have also found active use in stopping automated posting to blogs, forums and wikis, whether as a result of commercial promotion, or harassment and vandalism. CAPTCHAs also serve an important function in rate limiting, as automated usage of a service might be desirable until such usage is done in excess, and to the detriment of human users. In such a case, a CAPTCHA can enforce automated usage policies as set by the administrator when certain usage metrics exceed a given threshold. The article rating systems used by many news web sites are another example of an online facility vulnerable to manipulation by automated software.

Tuesday, March 25, 2008

SAP:-Introduction..

What is SAP?
SAP is the leading Enterprise Information and Management Package worldwide. Use of this package makes it possible to track and manage, in real-time, sales, production, finance accounting and human resources in an enterprise.


SAP the company was founded in Germany in 1972 by five ex-IBM engineers. In case you’re ever asked, SAP stands for Systeme, Andwendungen, Produkte in der Datenverarbeitung which - translated to English - means Systems, Applications, Products in Data Processing. So now you know! Being incorporated in Germany, the full name of the parent company is SAP AG. It is located in Walldorf, Germany which is close to the beautiful town of Heidelberg. SAP has subsidiaries in over 50 countries around the world from Argentina to Venezuela (and pretty much everything in between). SAP America (with responsibility for North America, South America and Australia - go figure!) is located just outside Philadelphia, PA.

SAP Application Modules
SAP has several layers. The Basis System is the heart of the data operations and should be not evident to higher level or managerial users. Other customizing and implementation tools exist also. The heart of the system from a manager's viewpoint are the application modules. These modules may not all be implemented in a typical company but they are all related and are listed below:

*

FI Financial Accounting--designed for automated management and external reporting of general ledger, accounts receivable, accounts payable and other sub-ledger accounts with a user defined chart of accounts. As entries are made relating to sales production and payments journal entries are automatically posted. This connection means that the "books" are designed to reflect the real situation.
*

CO Controlling--represents the company's flow of cost and revenue. It is a management instrument for organizational decisions. It too is automatically updated as events occur.
*

AM Asset Management
--designed to manage and supervise individual aspects of fixed assets including purchase and sale of assets, depreciation and investment management.
*

PS Project System--is designed to support the planning, control and monitoring of long-term, highly complex projects with defined goals.
*

WF Workflow--links the integrated SAP application modules with cross-application technologies, tools and services
*

IS Industry Solutions--combine the SAP application modules and additional industry-specific functionality. Special techniques have been developed for industries such as banking, oil and gas, pharmaceuticals, etc.
*

HR Human Resources--is a complete integrated system for supporting the planning and control of personnel activities.
*

PM Plant Maintenance--In a complex manufacturing process maintenance means more than sweeping the floors. Equipment must be services and rebuilt. These tasks affect the production plans.
*

MM Materials Management--supports the procurement and inventory functions occurring in day-to-day business operations such as purchasing, inventory management, reorder point processing, etc.
*

QM Quality Management--is a quality control and information system supporting quality planning, inspection, and control for manufacturing and procurement.
*

PP Production Planning--is used to plan and control the manufacturing activities of a company. This module includes; bills of material, routings, work centers, sales and operations planning, master production scheduling, material requirements planning, shop floor control, production orders, product costing, etc.
*

SD Sales and Distribution--helps to optimize all the tasks and activities carried out in sales, delivery and billing. Key elements are; pre-sales support, inquiry processing, quotation processing, sales order processing, delivery processing, billing and sales information system
.

KolourPaint: More than a Microsoft Paint clone


Just as Microsoft Paint is included with every Windows installation, so KolourPaint has been part of the kdegraphics package since KDE 3.3. This simple raster graphics editor works well not only in KDE, but also in Xfce, GNOME, and Fluxbox.

Although it started out as a clone of Microsoft Paint, KolourPaint has grown to include more features than its proprietary inspiration. KolourPaint provides tools for image manipulation and icon editing as well as the typical "fingerpainting" that Paint is well known for. KolourPaint's and Paint's interfaces are nearly identical, but hidden behind a simple interface are several advanced features that make it a great graphics editor.

With the release of KDE 4, KolourPaint 4.0 brings some new features to the table, such as a configurable palette, some heavily refactored code, and new image effects that make photo editing a breeze.

Comparisons to Paint
KolourPaint has all the tools that Paint provides, such as the Brush, Color Eraser, Color Picker, Connected Lines/Polyline, Pen, Polygon, Rectangle, and Text to name a few. It also incorporates single-key shortcuts for all its tools to allow for better productivity. One of the handiest improvements over Paint is the number of levels of undo and redo, which, depending on memory usage, may be anywhere from 10 to 500 levels of history. Selections are also fully undo- and redo-able. KolourPaint includes support for freehand resizing and arbitrary rotation angles, and provides a choice between opaque and transparent selections.

[Click to enlarge] Click to enlargeClick to enlarge KolourPaint's Zoomed Thumbnail mode is an excellent addition to the Paint-like genre. It displays a thumbnail version of an image that works similar to an additional view in the GIMP. You can draw on the thumbnail, erase upon it, and use any selection tool on it. The selection tool needs a little more work in the thumbnail ability, as you can't see what contents you are selecting until you let go of the mouse button. You can resize the Zoomed Thumbnail by resizing its window.

KolourPaint provides Color Similarity, which allows you to fill regions in dithered images and photos. In addition to the standard Paint colors, KolourPaint lets you use other color sets (such as the Oxygen Icons in the latest version), or to create your own.

Unlike Paint, KolourPaint can save in every file format that KImageIO can provide; PNG, ICO, and PCX are supported, with the ability preview the images before you load them.

One of the biggest differences between KolourPaint and Paint is the support for transparency. Every KolourPaint tools lets you draw transparent icons and logos on a checkerboard background. This ability helps KolourPaint act as an icon editor too. By filling the workspace with the transparent "color" and resizing the image to a common icon size, you can whip up some catchy icons in a matter of minutes.

Photo editing

KolourPaint is also a useful photo editing application. Like the GIMP, it allows you to autocrop (remove internal borders) and adjust brightness, contrast, and gamma. Operations you can perform include clear, flatten, emboss, flip, and invert with the choice of channels. You can also resize and rotate, reduce colors, reduce images to greyscale, and smooth scale, soften, and sharpen images.

Effects allow you to change the appearance of the image, such as making an image look like it was painted on canvas. You can access effects that appear under the Image menu from the dialog window, as well as those that don't. The Balance effect, which changes the brightness, contrast, and the gamma of an image, is curiously placed in a new dialog window under Image -> More Effects, rather than as an entry in the Image menu. Almost all effects have an easy slider bar that let you change their values, and a thumbnail of the image that automatically updates when you apply an effect.

Anyone looking to fine-tune their graphic skills, or who would like to become more comfortable with KolourPaint, can peruse the KolourPaint Manual. To obtain further support, users can join the KolourPaint Support mailing list.

KolourPaint lacks a few of Paint's features. Some features currently under development include paletted image editing, selectable text, screen depth independence, and image acquisition from a scanner or a camera.

Still, with many of the features that the GIMP contains, and all but a few of Microsoft Paint's features, KolourPaint provides a simple user interface to manipulate photos and create raster graphics. By blending a completed user interface, stable image effects, and innovative features, KolourPaint's developers have put it one step ahead of other Linux Paint clones. As a graphics application, KolourPaint is powerful enough to make even the GIMP respect it.

What is Hacking?

Username: system
Password: manager
Welcome to ABL Computer Research Lab. You have five new messages.
$

That is how easy it was to hack into a computer network. The most prominent definition of hacking is the act of gaining access without legal authorization to a computer or computer network. A hacker first attacks an easy target, and then uses it to hide his or her traces for launching attacks at more secure sites. The goal of an attack is to gain complete control of the system (so you can edit, delete, install, or execute any file in any user’s directory), often by gaining access to a "super-user" account. This will allow both maximum access and the ability to hide your presence.

Often attacks are based on software bugs that a hacker can use to give himself or herself super-user status. The example above was used by West German hacker "Pengo" who exploited the fact that many systems came with default usernames and passwords which some buyers neglected to change. He succeeded by persistence.

Also one can get a copy of the password file (which stores usernames and encrypted passwords and is often publicly accessible) and either do a brute-force attack trying all possible combinations, or encrypt a dictionary and compare the results to see if anyone chose a password that is a dictionary word. Another method of hacking is to email someone a program that either automatically runs, or that runs when they click on an attachment. This can install a program that will give you control of their computer. L0pht Heavy Industry’s Back Orifice 2000 (a crude parody of Microsoft’s Office 2000) allows someone to have nearly complete control (running programs, deleting files, viewing the screen, logging typed keys, etc.) over the target computer without being noticed. One complicated method, known as IP spoofing, is to get one computer to pretend that it is another one which is trusted by the target system, thus gaining the access privileges of the latter.

Early hackers needed to be very knowledgeable so that they were able to identify bugs themselves (a task requiring extensive knowledge about the operating system, and reading complex manuals) and often write their own programs to exploit them. They had to keep track of the leading developments in the field (latest bugs, latest patches, latest bugs in the patches, etc.). Later hackers were able to increasingly rely upon the hacking community to identify bugs and write programs that could be adapted for their specific purpose. For instance, famed hacker Kevin Mitnick used a trojan horse written by the West German Chaos Gang to gain access to hundreds of systems. As another example, it does not take much intelligence to download a copy of Back Orifice 2000 from www.bo2k.com and send a copy of the client as an attachment disguised as a game or cute program, to an unsuspecting person. In fact, Back Orifice has been downloaded over 300,000 times (Deane 1999) and received substantial computer media coverage. In Pengo’s case it is often more a matter of dedication and trying well-known recipes until one finds a place that has not fixed the bugs, than genius.

The growing number of inexperienced hackers (deridingly called "lamers" or "crackers"), due to the growth first in BBSes and then in the Internet, helps explain the antagonism between the older generation that did more of the problem-solving for themselves and the new generation that can get a quick start by running hacker programs without understanding how they work. The reaction of the older generation is to shun the newbies, thus ignoring those who might show talent as well as those who are in it just to copy tactics.