Saturday, February 9, 2013

Cloud Computing Security

A Complete Paper On Cloud Computing Security.

Topic Includes about Cloud Computing Security
  • Virtualization 
    • full virtualization
    • para  virtualization
    • virtual machines
    • virtual appliances
    • Virtualization security  etc.
  • Multi-tenanacy 
    • levels
    • Multi-tenanacy security etc.
Read Full Paper or Download from here:-


if this does not work then Copy & paste  following  link into your Address bar:-

www.ijritcc.org/IJRITCC Vol_1 Issue_1/IJRITCC_1309.pdf

Wednesday, January 23, 2013

Some Dos Commands


DOS Commands are instructions to perform tasks on files and directories. They are case insensitive. And as you already know, file is the area where we store group of information or data, and collection of group of files is called a directory. In MS-DOS the file name follow 8dot3 format and is divided into two parts - primary name and secondary name. Primary name is up to 8 characters long and secondary name is up to 4 characters with dot. For example, in the image file-name logo.jpg Logo is the primary name and .JPG is the secondary name. Secondary names are fixed for particular type of file, meaning for system files the secondary name is designated as .sys, for text files it is .txt and so on. Here is the list of some of the important types of files with their default secondary names:
Text file
.txt
Command file
.com
System file
.sys
Programme file
.prg
Database file
.dbm
Library file
.lib
Batch file
.bat
Executable file
.exe

DOS Commands are divided into 2 types:
  1. Internal Commands
These are for performing basic operations on files and directories and they do not need any external file support.
  1. External Commands
These external commands are for performing advanced tasks and they do need some external file support as they are not stored in COMMAND.COM
Cursor gives our position.
In MS-DOS keyboard shortcuts involving handy ones like Functional keys, arrows along with ESC are of great help for recalling to searching to clearing command line etc., Here are few of them:
  • UP () and DOWN () arrows recall previously entered commands.
  • ESC clears the present command line.
  • F7 key displays command history and ALT+F7/ESC hides it.
  • F9 is used to selects a command by number. Just enter the command number and it fetches the command line for you.
Most Commonly Used Internal DOS Commands
  1. DATE
This command is used to display the system current date setting and prompt you to enter a new date. The syntax is: DATE  [/T | date]
If you type DATE without parameters then it displays current date and prompts to enter new date. We should give new date in mm-dd-yy format. If you want to keep the same date just Press ENTER. DATE command with /T switch tells the command to just output the current system date, without prompting for a new date.
  1. TIME
This command is used to displays or set the system time.
The syntax is: TIME   [/T | time]
Same as DATE command, typing TIME with no parameters displays the current time and a prompt for a new one. Press ENTER to keep the same time. TIME command used with /T switch tells the command to just output the current system time, without prompting for a new time.
  1. COPY CON
It is used to create a file in the existing directory. Syntax is: COPY  CON filename after that press Enter and start typing your text and after you're done typing your text, to save and exit hit F6 key.
  1. TYPE
This command is used to display the contents of a text file or files. The syntax is: TYPE [drive:][path]filename Now, lets try to display the contents of the file named filename we've created earlier using COPY CON command.
  1. CLS
It is used to clear the screen. Syntax is CLS
  1. REN
This command is used to change/modify the name of a file or files.
Syntax is: REN   [drive:] [path] filename1   filename2.
Here, filename1 is source file for which you wanted to change the name, and filename2 will obviously becomes your new file name. Also note that you cannot specify a new drive or path for your destination file.
  1. DIR
This command displays a list of files and subdirectories in a directory. Syntax is: DIR   [drive:]  [path]  [filename] [/A[[:]attributes]]  [/B]  [/C]  [/D]  [/L]   [/N]  [/O[[:]sortorder]]  [/P]  [/Q] [/S]  [/T[[:]timefield]]  [/W]  [/X]  [/4]
Here,
[drive:][path][filename]
Specifies drive, directory, and/or files to list.
/A:attributes
Displays files with specified attributes. The possible attributes are as follow: D Directories, R Read-only files, H Hidden files, A Files ready for archiving, S System files, - Prefix meaning not
/B
display in bare format with no heading information or summary
/C
Using this attribute with dir by default displays the thousand separator in file sizes. To disable display or separator use /-C
/D
Displays file list sorted by column.
/L
Uses lowercase in listing file names and sub-directories.
/N
Display in new long list format where filenames are on the far right.
/O:sortorder
Displays list by files in sorted order. The sortorder attributes are as follow: N By name (alphabetic), S By size (smallest first), E By extension (alphabetic), D By date/time (oldest first), G Group directories first, - Prefix to reverse order
/P
Display page wise pausing after each screenful of information and prompts to press any key to continue.
/Q
Displays the owner of a file or files.
/S
Displays files in specified directory and all subdirectories. Bear caution in using this in your root directory as you may end up in overflowing information. To stop the screen overflow at any point hit Pause-Break key.
T:timefield
This sorts and displays the list based on time field specified. C for Creation, A for Last Access, W for Last Written
/W
Displays list width wise or wide list format.
/X
This is used to display the short names generated for non-8dot3 file names.

  VER
This command displays the version of the Microsoft Windows running on your computer.

  VOL
It displays the disk volume label and serial number, if they exist for the drive specified. If no drive is specified it displays for the active drive.
Syntax is VOL  [drive:]
  DEL/ERASE
Used to delete one or more files. Syntax is DEL   [/P]   [/F]   [/S]   [/Q]   [/A[[:]attributes]] names
Here,

names
Specifies a list of one or more files or directories. Wildcards * and ? may be used to delete multiple files. * indicates group of unknown characters whereas using wildcard ? in file-names is for single unknown character. And using this command if a directory is specified, all files within the directory will be deleted.
/P
Prompts for (Y)es/(N)o confirmation before deleting each file.
/F
Used to force delete read-only files.
/S
Delete specified files from all subdirectories. If Command Extensions are enabled DEL and ERASE change while using /S switch such that it shows you only the files that are deleted, not the ones it could not find.
/Q
Delete in quite mode and do not ask if ok to delete on global wildcard
/A:attributes
Delete files based on specified attribute. The attributes are: R for Read-only files, S for System files, H for Hidden files, A for files ready for archiving and - Prefix meaning not.
  COPY
This command is useful in copying one or more files to another file or location. Syntax is COPY   [/D]   [/V]   [/N]   [/Y | /-Y]   [/Z]   [/A | /B ]   source [/A | /B]   [+ source [/A | /B] [+ ...]]   [destination [/A | /B]]
The different switches that can be used with this command as follow along with their use.

source
It specifies the file or files to be copied.
/A
Indicates an ASCII text file.
/B
This switch indicates a binary file.
/D
This allows the destination file to be created with decryption.
destination
This specifies the directory and/or filename for the new file or files.
/V
Helps to verify new files to be written correctly.
/N
Specifying this switch uses short filename, if available, when copying a file with a non-8dot3 file name.
/Y
If destination file already exists, this switch suppresses prompting to confirm you want to overwrite it and does it asap.
/-Y
Contrary to above switch, this causes prompting to confirm you want to overwrite an existing destination file.
/Z
Copies networked files in restartable mode.

For appending multiple files for source use wildcard or file1+file2+file3 format and make sure to specify a single file for destination.
  MD, CD and RD
  • MD (or MKDIR) command stand for make directory and it is used to create a directory.
    Syntax is MD   [drive:]path
  • CD (or CHDIR) stands for create or change directory and it allows to display the name of or change the current directory or rather we can say come out of a directory. Syntax is CD   [/D]   [drive:][path]
    Typing CD drive: displays the current directory in the specified drive. This CD (or CHDIR) command does not treat spaces as delimiters due to which it allows to CD into a subdirectory name that contains a space without surrounding the name with quotes.
    For example:
    CHDIR \program files\mozilla firefox
    is the same as:
    CHDIR "\program files\mozilla firefox"

    If you type CD without any parameters it displays current drive and directory. CD.. specifies that you want to change to the higher directory in the current path. Whereas, using CD\ you can directly change to parent/root directory from any location in the current drive.

    Using /D switch changes current drive in addition to current directory for a drive.

  • RD (or RMDIR) command removes or deletes a directory. There are two conditions to remove any directory - (1) Directory to be removed should be empty. and (2) We should be outside the directory we are commanding to delete.
    Syntax is RD   [/S]   [/Q]   [drive:]path
    Here, using the switch /S removes a directory tree meaning it removes all directories and files in the specified directory in addition to the directory itself. And using /Q is the quiet mode that doesn't asks for ok approval to remove a directory tree.
Source:- any Blog or  using Internet

Sunday, June 10, 2012

RECENT TRENDS IN WIRELESS, RADIO AND SATELLITE COMMUNICATION: A SURVEY ON WIRELESS FIDELITY :TECHNOLOGY AND STANDARDS

Authors :  Deepak Mathur1,Shishir Jain2
1[Asst. Professor (Comp. Sc.), Lachoo Memorial College of Science and Technology Jodhpur 342003, ]
2[Student (MCA IV), Lachoo Memorial College of Science and Technology, Jodhpur 342003]

Abstract
Wi-Fi stands for Wireless Fidelity. Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networking (LAN) Technology. The number of computing and telecommunications devices are  increasing and consequently the focus on how to connect them to each other. The Solution is to connect them by the cable or by the Wireless technology Wi-Fi offers us remarkably higher peak data rates. So that do 3G systems, primarily since it operates over a larger 20MHz bandwidth. In this paper we are going to survey on wi-fi technology and the standards that are followed.
Keywords: WiFi, WSE,WSM

1 . Introduction:
Wireless Stands for Wireless Fidelity. Wi-Fi is based on the IEEE 802.11 family of standards. Current Wi-Fi systems based on IEEE 802.11a/g support a peak physical-layer data rate of 54Mbps and typically provide indoor coverage over a distance of 100 feet. Today Wi-Fi becomes for last feet broadband connectivity in homes, offices, and public hotspot locations. Vic haves is the person who is called “Father of Wi-Fi”. The first wireless products were under the name WaveLan. Current Wi-Fi systems based on IEEE 802.11a/g support a peak physical-layer data rate of 54Mbps and typically provide indoor coverage over a distance of 100 feet.

2. Wi-Fi Working Concept

2.1 Radio Signals:
Radio Signals are the keys which make WiFi networking possible. These radio signals transmitted from Wi-Fi antennas are picked up by WiFi receivers such as computers and cell phones that are equipped with WiFi cards. Whenever a computer receives any of the signals within the range of a WiFi network which is usually 300 - 500 feet for antennas, the WiFi card will read the signals and thus create an internet connection between the user and the network without the use of a cord. Access points which consist of antennas and routers are the main source which transmit and receive radio waves. Antennas work stronger and have a longer radio transmission with a radius of 300-500 feet which are used in public areas while the weaker yet effective router is more suitable for homes with a radio transmission of 100-150 feet.

2.2  Wi-Fi Cards:
WiFi cards can be external or internal, if a WiFi card is not installed in our computer, we  may purchase a USB antenna attachment and have it externally connect to our USB port, or have an antenna-equipped expansion card installed directly to the computer. For laptops, this card will be a PCMCIA card in which we insert to the PCMCIA slot on the laptop.

2.3 Wi-Fi Hotspots:
A Wi-Fi hotspot is created by installing an access point to an internet connection. The access point transmits a wireless signal over a short distance . typically covering around 300 feet. When a Wi-Fi .enabled device, such as a Pocket PC, encounters a hotspot, the device can then connect to that network wirelessly.

3  Wi- fi Quality of Services
There are plans to incorporate quality of service capabilities in Wi-Fi with the adoption of the IEEE 802.11e standard. The 802.11e standard will include two operating modes, either of which can be used to improve service for voice:

 

3.1 Wi-Fi Multimedia Extensions (WME):

This uses a protocol called Enhanced Multimedia Distributed Control Access (EDCA), which is Extensions an enhanced version of the Distributed Control Function (DCF) defined in the original 802.11 MAC.
The enhanced part is that EDCA will define eight levels of access priority to the shared wireless channel. Like the original DCF, the EDCA access is a contention-based protocol that employs a set of waiting intervals and back-off timers designed to avoid collisions. However, with DCF, all stations use the same values and hence have the same priority for transmitting on the channel.

 

3.2 Wi-Fi Scheduled Multimedia (WSM):

True consistent delay services can be provided with the optional Wi-Fi Scheduled Multimedia (WSM). WSM operates like the little used Point Control Function (PCF) defined with the original 802.11 MAC.
In WSM, the access point periodically broadcasts a control message that forces all stations to treat the channel as busy and not attempt to transmit. During that period, the access point polls each station that is defined for time sensitive service.

4. Wi-Fi Standards
Standard
Data Rate
Modulation Scheme
Security
Pros/Cons & More Info
Up to 2Mbps in the 2.4GHz band
WEP & WPA
This specification has been extended into 802.11b.
Up to 54Mbps in the 2.4GHz band
OFDM above 20Mbps, DSSS with CCK below 20Mbps
WEP & WPA
Products that adhere to this standard are considered "Wi-Fi Certified." May replace 802.11b. Improved security enhancements over 802.11. Compatible with 802.11b. 14 channels available in the 2.4GHz band (only 11 of which can be used in the U.S. due to FCC regulations) with only three non-overlapping channels.
Up to 2Mbps in the 2.45GHz band
PPTP, SSL or VPN
No native support for IP, so it does not support TCP/IP and wireless LAN applications well. Not originally created to support wireless LANs. Best suited for connecting PDAs, cell phones and PCs in short intervals.
HiperLAN/1 (Europe)
Up to 20Mbps in the 5GHz band
Per-session encryption and individual authentication.
Only in Europe. HiperLAN is totally ad-hoc, requiring no configuration and no central controller. Doesn't provide real isochronous services. Relatively expensive to operate and maintain. No guarantee of bandwidth.


5. Conclusions
As per the above discussion there are following issues which are assumed to be the cause of the sluggish adoption of Wi-Fi technology:
·        Security Problems: Security concerns have held back Wi-Fi adoption in the corporate world. Hackers and security consultants have demonstrated how easy it can be to crack the current security technology, known as wired equivalent privacy (WEP), used in most Wi-Fi connections. A hacker can break into a Wi-Fi network using readily available materials and software.
·         Compatibility and Interpretability: One of the bigger problems with Wi-Fi is compatibility and interpretability, for example 802.11a products are not compatible with 802.11b products, due to the different operating frequencies, and 802.11a hotspots would not help a 802.11b client. Due to lack of standardization, harmonization and certification, different vendors come out with products that do not work with each other.
·         Billing Issues: Wi-Fi vendors are also looking for ways to solve the problem of back-end integration and billing that has dogged the roll-out of commercial Wi-Fi hotspots. Some of the ideas under consideration for Wi-Fi billing include per day, per hour and unlimited monthly connection fees.
·         Use this wireless networking standards chart to get quick information to help we differentiate between the available wireless networking standards and choose which standard might be the right fit for wer business. See the links below the chart for further information on wireless networking standards.