Tuesday, July 1, 2008

State of Computer Science Research in India

The article I have found in the internet is about the state of computer science research in India. And on how the researches have been a big help in India's technological and economic progress. The researches have been organized by some educational research institutions, funded and sponsored by the government, and some are made by private organizations. The author listed the researchers that belong in the said institutions, from the government and private organizations; and which area in computer science they made their research. Researchers are sometimes collaborated with other countries like US. Some researchers do such because of isolation since the area of research is widely spreading with less resources. Some make an abroad-based research to broaden their research area coverage. According to author, "India is one of just half a dozen countries to have successfully built and deployed their own satellites and launch vehicles. These accomplishments indicate that there is excellent potential for high-caliber research."


Maybe he is right. India today is really fast growing in their technology, health, business and foreign affairs. A fact from the BBC News says that India is in fourth place of fast economic growing country in spite of their large population. Because of the impressive researches made, multinational investors arrived in India. Foreign investors established call centers and manufacturing industries which helped the employment substantiality. According to BBC News site, "The success of hi-tech industries in particular has seen large numbers of overseas Indians return, in what has been described as a "brain gain". They are part of growing middle class, which is seen as a potentially vast domestic market."


But inspite of the fast growing economy, research funding is the number one problem in research industries. Funding agencies in India demands more industry oriented research but somehow lack of funds. The researchers are not equally funded. Large research group may get the big amount and the small group research may get just little support. Isn't it fair? Yes. The funding of research should be equalized and the researchers involved in such should be accountable to the funding agency they are under. Receiving not enough fund and compensation can make the researchers unable to work properly. Thus, this make research not helpful rather hurtful. Making research is sure very expensive. So, if we plan to make a research, we sure should have lot of money to fund our work.


The technical topics discussed in the article are about: Artificial Intelligence, Multimedia and Robotics, Space and Advance research, software technologies development, programming technologies, networking, compiler technologies and databases.

Breaking Phone Call Encryption

Breaking Phone Call Encryption




In our world today becuase of fast changing in technology, conversations can be made using telephones,mobilephones and even voice messaging over the internet is possible. It was made possible with the help of VoIP or Voice Over Internet Protocol.




VoIP is a protocol used to convert the voice signal into packets before being sent over the internet. This protocol is present to VOIP phones . Eavesdroppers are abundant around the world. It can be your seat mate in a bus or your friend in the neighborhood. If conversations of two individuals can be eavesdrop by someone from a distance, phone calls conversation can be too. Telephone call can now be listened through by wiretapping on the telephone line of one of the caller. VoIP phone calls can also be vulnerable to eavesdroppers by breaking through firewalled networks.




To address these problems according to the article, the John Hopkins University Researchers presented a compression technique called variable bit-rate encoding, which adjust the size of data packets being sent over the internet based on how mush information they actually contain. Encrypting the packets after thay have been compressed scrambles their content but somehow does not change the size. This technique would make a result of giving almost of the information to potential eavesdroppers. By the way, what is encryption? Encryption, for the benefits of those who is not familiar with, is a process of altering data into codes which the maker could only understand. The main pupose of encryption is to hide the real meaning of the message to potential and unwanted listeners.




According to the article, the technique presented by the researchers is good in terms of improving the quality of service of VoIP phones . The researcher's technique reduces the bandwith usage of the computer to protect the security of the VoIP phone call. But reducing the computer's bandwith can somehow affect the phone call security.




But their is still a solution in protecting your calls from eavesdroppers. You can use a special hardware such as Cryptophone. Making calls using cryptophoone is limited because it can only work with the other cryptophones. That is its disadvantage! Well, making phone calls secure form eavesdroppers is still an issue. To make sure their are no one listening to our calls, look around before you answer any call and keep your voice as low as possible.



Did you Know that Servers can Lie?

Did you Know that Servers can Lie?

An Article from IndiaTimes Infotech Site



Our world today is a fast changing world. Computers are now mostly used for business purposes. Internet usage are increasing spreading around the globe. Internet have servers which manipulate the coming in and out of domain names that users are trying to open. But do servers secure?



According to the article, "hackers that re-route internet traffic from infected computers to fraudulent websites are increasing." Yes, hackers do this to make money out of redirecting malicious sites to users with infected computers. I have not tried being directed to wrong websites. Only having pop-ups that shows on my computer screen surprisingly.



According to the article, "hackers that re-route internet traffic from infected computers to fraudulent websites are increasing." Yes, hackers do this to make money out of redirecting malicious sites to users with infected computers. I have not tried being directed to wrong websites. Only having pop-ups that shows on my computer screen surprisingly.



To secure your servers from these cheaters, here are some tips from the website "http://www.redhat.com/manuals/linux/RHL_9_manual/security_guide/ch-servers.html, the following are the general tips for enhancing server security:

1. Keep all services up-to-date to protect against latest threats.

2. Use secure protocols whenever possible.

3. Serve only one network service per machine whenever possible.

4. monitor all servers carefully for suspicious activity."



Blocking some websites and Domain Name Servers could also might help. securing your system is also significant. According to the site "http://www.webopedia.com/term/3/, a web server has security protocols that encrypt and decrypt message to protect them against third party." We could count on those protocols but I think not all the time. For us to be sure, let us seek for help from experts. We should make sure thatthose experts are not the internet cheaters we talked about. We might also browse the internet and look for some tips then apply it on our own. You could also visit this site for server security enhancement: http://ciac.llnl.gov/ciac/bulletins/j-042.shtml/.

How to Get Rid of Computer Viruses

How to Get Rid of Computer Viruses
An Article from www.howtogetridofstuff.com

We hear about viruses all the time. Everywhere and anywhere. In Information Technology, viruses are parasite which commonly resides in a computer and can destroy the computer files and later the whole computer system. But what is a computer virus? According to the website "http://www.seniormag.com/compcorner/articles/virus.htm/, a computer virus is a small piece of code that does two things: (1) It causes some sort of an unwanted change to the computer. (2) It is developed to spread itself to other computers without the users permission." Yes, the definition is extremely correct. Computer viruses resides and hide itself in the computer. They could delete your computer files, copy and replicate itself to your other file folders; and on some cases, could totally corrupt and crash your computer which is the very worse thing they do.
But do we know what kind of viruses our computer might have? According to the article, "computer viruses can be divided into different categories namely:
(1) Resident viruses,
(2) Direct Action Viruses,
(3) Overwrite Viruses,
(4) Boot Viruses,
(5) Macro Viruses, and
(6) File Infectors."
You could know that your computer is infected by viruses in any of the categories if:
(1) your computer run very slow as in "usad-pagong",
(2) you encounter lots of errors and your computer 'hung' if we call it,
(3) it suddenly restart without your consent.
If you encounter those problems, then your computer have viruses. Then how could we get rid of those viruses? Well, there are lots of anti-virus software available on the internet and even in the computer stores. These are some anti-virus software you could try: the McAffee Antivirus, Norton Antivirus, Avast Antivirus and AVG Antivirus Softwares. Yes, they are one of the best and is easy to use too.
You now have antivirus software, but how would you clean your infected PC? The Website http://www.ehow.com show us some ways to clean our computer, which are the following:
1. As soon as you suspect your computer has viruses, remove your computer from any networks or from the internet to avoid to spread the bug.
2. Run any available anti-virus software and scan your computer until it is clean.
3. Install antivirus software if you don't have one.
4. Reconnect to the internet and check for latest antivirus software update, then download it to your PC.
5. Run the updated antivirus software until your computer is clean.
After you have tried to do the ways of cleaning your computer but still your computer is "usad-pagong" and encounter errors, I guess it is time for you to call for an expert. If you have computer genius friends, then seek for their help. If money bothers you, payment for service can be talk about. Well, that is the disadvantage of seeking for experts. You will pay them for their work. For you not to waste your money to experts, make your computer virus-free by always keeping your anti-virus software updated. To be safe is to be cautious!