Thursday 25 April 2013

Web Hosting Security

With more and more websites allowing visitors to input their personal details to some extent, it is important for web hosting companies to be able to adapt their web hosting policies to ensure that their servers and customers are protected against any new security threats that arise. There are many different factors that can affect how secure a web hosting service and it is the job of web hosting companies to analyze their infrastructures to identify any holes that could be potential security risks. If you are a shared hosting customer then you have to rely on your web hosting provider to offer you a good level of security and for this to work a certain level of trust between the two parties is required; as for VPS server hosting and dedicated server hosting customers, you are responsible for the security of your own web hosting environment because you have a dedicated hosting environment meaning that you need to be well versed in server management to be able to secure your server to a level that will prevent hackers from being able to hack it and cause any damage. In order for visitors to enter their person details into your website, it is up to you to take the measures to guarantee trust between you and them as this is the only way that you are going to get people enter their details into your website.

Server-Level Security
The most basic form of web hosting security takes place at the server level because this is where all of the software that is going to be required to prevent the most serious attacks such as DDOS attacks and hackers trying to gain access through compromised scripts will be hosted. There are many different applications and firewalls available that will prevent hackers from gaining access to your server using open ports and applications that have holes that could be easily compromised; one of the most popular is CSF (ConfigServer Firewall) which is a Linux application capable of protecting any Linux server to a high level, whilst those using Windows servers will be able to make the most of the server protection that is available by using the Windows Firewall that comes with the Windows operating system by default. As a shared hosting customer this should be taken care of by any good web hosting provider, but as a dedicated web hosting customer you will be expected to be able to secure your own server.

Website and Coding Security
As a web developer it is your responsibility to make sure that all applications that you develop are done so to a high standard to prevent hackers from being able to hijack a web hosting account or a web hosting server through a hole that has been left in your web application due to poor coding. SQL injections are one of the most popular forms of website hacking and although they may not necessarily put the hosting server at risk, they can be used to hack the actual website and to access the data that is stored in your backend database. If you are storing the personal details of your visitors or customers then hackers could have a field day because certain personal information such as credit card details have value meaning that they can be sold on, thus allowing hackers to profit from their work. When developing web applications using PHP or ASP.NET, or any language for that matter, it is important to ensure that you use all of the latest functions available to handle the data that is entered into your website to guarantee that it can’t be compromised in any way at the frontend. SSL certificates can also be used to encrypt any information that is sent between your hosting server from your website and your visitor’s computers; many web browsers prominently display the fact that a website has an SSL certificate and they are increasingly becoming a source of trust for visitors because they know that their data is going to be handled and processed safely.

Looking After Your Personal Information
Although web hosting companies will have to keep your personal information private because of the Data Protection Act and the fact that you don’t want unauthorized individuals having access to your confidential details, if you are to register a domain name then you could risk having your personal details such as your name and address put into the public domain. All domain network controllers, known as NICs (Network Information Centres), run their own public WHOIS databases that host the personal details of the owners of individual domain names under the specific TLD (Top Level Domain); for example, Nominet (nic.uk) is the NIC for all domains that fall under the “.uk” TLD. With most NICs you are required to have your details posted publicly regardless of what your legal standing is, although some will allow you to hide your personal details if you are in fact a private individual who has registered the domain solely for your own use. Some domain name registrars and web hosting companies can provide you with a premium service that will allow you to hide your personal data from being displayed on any WHOIS database and instead will display their own private details; although you usually have to pay extra for domain privacy, for some people it can be worth it for the peace of mind that it can provide.
In conclusion, the security of web hosting packages as well as your own personal information are two key considerations to remember when choosing a web hosting provider, but more importantly the form of web hosting that you are going to be using to meet your web hosting requirements. In this day and age there are many precautions that can be taken to minimize any damage that could be done if a hacker does manage to gain entry to a server that hasn’t been secured properly, but the threats available are changing daily and are adapting to fight the new technologies that are being developed to stop them.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/


The Importance Of Real Time Server Monitoring

Real time server monitoring signifies a process by which you are provided with the information of your websites active time on a real time basis, this goes on to say that you get the update of every bit of data as it happens. Some of the server monitoring software applications are PC-based and they can only run when the PC is on. This might be a hindrance for the people who run a low cost website as they don’t get the access to alerts when their website is going through a down time, therefore it becomes difficult to fix these problems.
In case you are running a trade based online business or a business that requires constant update exchange of information, a website that gets directed to 404 pages is something that you would like to avoid. The need for real time server monitoring is crucial when you realize that you are not getting your mails from the website because your servers are down. Most of the websites require constant quality feedback, specifically if they are in beta testing mode or if they have just started. In some cases server monitoring is important because clients who visit the site to make a purchase loose motivation sometimes to buy when they end up in a blank page or an error page at the time of checking their items.
Real time server monitoring enables you to respond to the problems right away and improve your service continuously. Ideally you must also look for a server monitor that can check your website with the use of HTTP, HTTPS, FSTP, FTP and FTPS protocols. It should also be able to check your mails constantly by using the POP3, SMTP or IMAP protocols. Some monitors check by pinging your website during regular intervals, it is also possible for you to do it yourself. Is would be convenient if your real time monitoring software application enables you to store the data and statistics. In this way you can collate all this data in order to get a comprehensive guide so that you can get informative updates on a daily basis; you will also know if you are subscribing to an appropriate hosting service.



Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/

Wednesday 24 April 2013

3 Step For Protect Your PC From USB Threats

Everyone know that USB threats (Malware, Trojan, Virus etc....) is very harmful programe for computer users. They overspread very quickly in your PC and corrupting your personal data and imported things. So today I'll tell you how to protect your PC form USB threats.
Turn off  “autorun” in Windows

In windows there is good feature called Autorun which automatically initiates inserted USB or CD/DVD. If the autorun feature is enabled the virus program uses it to infect you computer. so now we are going to turn off autorun feature in windows.

3 Ways For Protect Your PC From USB Threats

To disable autorun feature manuall
> go to Run (Use start menu or Win + R)
> type “gpedit.msc” and press enter.
> Under “User configuration” expand “Administrative templates” and select “system”.
> Now double click on “Turn off autoplay” in right pan > select the radio button “Enable” > Click “ok”
-->
Scan USB devices with antivirus program 

3 Ways For Protect Your PC From USB Threats
It’s a good idea to scan usb devices with updated antivirus software's(Norton, Kaspersky, AVG, Avast) before opening them. All most all antivirus software’s can clean usb threats. It is also recommended to use some usb firewall like autorun eater etc.., which help you to clean some of the common autorun virus’s.
Safely remove your USB device from PC

3 Ways For Protect Your PC From USB Threats
In some times virus’s are created through damaged documents and the damaged documents can in turn damage other files in your USB device. So always remove your USB devices safely using the Safely Remove Hardware feature of Windows OS.

I hope this tricks will help you to protect your PC from USB threats. If you learn something from my post please comment about this and share it for your friends.
 
Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
 

Future of Google and internet marketing

I have often wondered when the internet will change from a page by page display to a actual virtual environment, I know flash and Html5 fundamentals create a good graphical display but the experience is not fully immersive. With the Iglasses on the rise and in the scopes of the public its a matter of time before you will see the Google Virtualnet! 10 years ago our main infrastructure could not host this reality but with processors clocking  at speeds crazy fast then the potential for all the data that would be required could actually be pulled off....  I See the future of marketing phasing out of the desktop searches and basically going mostly voice recognition search and quick tab features on a virtual display on Google Goggles and take the user experience to a whole new level!


So instead of having the traditional WWW. It would be like a VWW/. Virtual world wide or something along that line. Its a matter of time before we break the pattern of WWW. Face it with all the changing trends that has been one that has remained the same since creation. Only the trail of the WWW is customizable. Like the >coms ->biz-.Org etc...  so this new platform would be a standalone platform, as every computer wont be able to run this. I as a developer and marketing major really live for this technology.  I am crossing my fingers....wait why don't I just do this..... TO BE CONTINUED!!

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/

How Dedicated Hosting Can Benefit Your Business


Dedicated web hosting services include VPS servers and dedicated servers and are designed to provide businesses with reliable and secure web hosting solutions that will continue to meet their demanding needs for years to come. Whether you choose a VPS server or a dedicated server, having your own dedicated web hosting environment will provide you with a chance to install the applications and services that you require so that you can tailor your web hosting environment to meet your application requirements. Furthermore, a dedicated hosting service will be able to provide you with a high level of uptime and when you’re running a website that provides your business with a source of income, uptime is one of the most important factors for you to consider because downtime can cause you to lose money; dedicated servers generally provide you with a higher rate of uptime than VPS servers as a VPS server can be seen as being a form of shared web hosting to some extent. Even though dedicated hosting may seem like an expensive investment to begin with, the benefits that come with using a VPS server or dedicated server will provide you with greater revenue streams in the future which should aid with the justification of using such services. When running a business website you will also need to be sure that you are using a secure hosting environment as when you are processing the personal information of your customers, if any of that information does fall into the hands of hackers then you could find yourself in trouble; proving that you have a secure hosting environment will also boost your customer’s confidence in your business.
What can a VPS server offer me over a dedicated server?
VPS servers are a form of virtual hosting, meaning that you have to share a physical hosting node with other VPS servers. Despite this, VPS servers are still a form of dedicated web hosting and can offer you the following benefits over using a dedicated server:
  • Low cost dedicated hosting – a VPS server can be seen as being a more affordable option to a dedicated server as you will be provided with your own dedicated resources and dedicated web hosting environment like a dedicated server will, but as this will be in the context of a virtual hosting environment it means that the costs associated with the physical hosting node can be allocated across several VPS servers meaning that the individual unit price per VPS server is quite low – there are certain factors that will affect how much you pay for a VPS server including your chosen web hosting provider, the specifications of your VPS server and the operating system that you are running on your server
  • Management – more often than not, web hosting companies provide their VPS hosting customers with access to a web control panel through which they can manage a number of different aspects of their servers without the need to login to the server directly – this type of management enables web hosting companies to make VPS server hosting accessible to beginners who wish to get started with dedicated web hosting, whilst also making certain tasks easier for experienced users who for example may wish to reload the OS on their VPS servers on a regular basis – it should be noted that if you require additional support for a VPS server, this will be much easier to obtain than extra support for a dedicated server hosting solution
  • Room for expansion – the resources of a VPS server are a lot easier to expand on than the resources of a dedicated server, therefore meaning that if you are going to be running a website that you feel is going to be growing at speed then you may wish to purchase a VPS server as you will be safe in the knowledge that if further down the line you require additional resources to ensure that your website runs smoothly, these can be purchased and will be immediately allocated to your VPS server – the problem with dedicated servers when it comes to this is that the server has to be taken offline so that the additional hardware can be fitted and this can cause inconvenience as well as downtime.
What can a dedicated server offer me over a VPS server?
A dedicated server is a physical server that will provide you with resources that are yours to use only and you will only have to share this physical web hosting environment with other users if you choose to. Some of these benefits include:
  • Physical hosting environment – the main benefit to choose a dedicated server over a VPS server is that you will be provided with your own physical hosting environment that will guarantee isolation from anyone else – when you are running an online shop or a website that is processing personal details then you will be able to appreciate the importance of such a hosting environment because it allows you to create a wall of security around the data that you are hosting, providing your customers with peace of mind
  • Upgrade options – although a VPS server may be simpler and a lot quicker to upgrade than a dedicated server, a physical machine can provide you with a number of different potential hardware configurations meaning that as a dedicated server customer you will be able to upgrade the hardware in your server to meet your needs as you want – businesses will always have complex hosting requirements and so dedicated servers have been designed to be as flexible as possible to meet the needs of these larger customers.
In conclusion, dedicated hosting can benefit your business by providing you with a secure and reliable platform on which you can launch an online shop to help promote your goods and services online, allowing you to target a much wider audience. The choice between VPS server hosting and dedicated hosting is one that you should base on the size of your business; small and medium sized businesses will benefit the most from VPS servers whereas larger corporations will be able to make the most of what dedicated servers have to offer.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/

HTTP and HTTPS





In this short article I will talk a little bit about the HTTP and HTTPS protocols. HTTP stands for Hypertext Transfer Protocol and basically every web request (typing a site's URL in a browser such as Internet Explorer) is done using this protocol. HTTP uses the client-server model in which a client requests something from the server and the server responds with the desired request. You can visualize this protocol as a collection of hyperlinks interconnected. You can learn a lot of things about the functionality of the client-server model by reading my networking fundamentals articles. HTTP uses port 80, if you request a a web content on a different port other than 80, your request will not be routed throughout the Internet. Have you ever seen that even if you type for example ittrainingday.com, your request is automatically redirected to http://ittrainingday.com ? (any request by default is an HTTP request). When you specify a HTTPS request, by default, the port used is 443. We will talk in a second about the main differences between these two protocols. The requests that HTTP can fulfill are the following (taken from Wikipedia http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol):


"GET
Requests a representation of the specified resource. Requests using GET should only retrieve data and should have no other effect. (This is also true of some other HTTP methods.)[1] The W3C has published guidance principles on this distinction, saying, "Web application design should be informed by the above principles, but also by the relevant limitations." See safe methods below.
HEAD
Asks for the response identical to the one that would correspond to a GET request, but without the response body. This is useful for retrieving meta-information written in response headers, without having to transport the entire content.
POST 
Requests that the server accept the entity enclosed in the request as a new subordinate of the web resource identified by the URI. The data POSTed might be, as examples, an annotation for existing resources; a message for a bulletin board, newsgroup, mailing list, or comment thread; a block of data that is the result of submitting a web form to a data-handling process; or an item to add to a database.
PUT
Requests that the enclosed entity be stored under the supplied URI. If the URI refers to an already existing resource, it is modified; if the URI does not point to an existing resource, then the server can create the resource with that URI.
DELETE
Deletes the specified resource.
TRACE
Echoes back the received request so that a client can see what (if any) changes or additions have been made by intermediate servers.
OPTIONS
Returns the HTTP methods that the server supports for specified URL. This can be used to check the functionality of a web server by requesting '*' instead of a specific resource.
CONNECT
Converts the request connection to a transparent TCP/IP tunnel, usually to facilitate SSL-encrypted communication (HTTPS) through an unencrypted HTTP proxy.
PATCH
Is used to apply partial modifications to a resource.
HTTP servers are required to implement at least the GET and HEAD methods and, whenever possible, also the OPTIONS method.
   How a browser is requesting a webpage is a different topic, but if you are really interested, you can check out my IIS tutorials in which I've described how web servers work (at least Microsoft's web-hosting service or IIS). If you've read my networking articles you already know the TCP/IP and the OSI models and how everything is layered. HTTP is a layer 7 concept (Application layer). This protocol is responsible for displaying information so that it can be interpreted by the user.
   HTTPS stands for Hypertext Transfer Protocol Secure, is a concept that uses HTTP and SSL when sending and receiving data. By adding the SSL protocol, HTTPS ensures that information sent between the client and the server is not intercepted. SSL or Secure Sockets Layer is a protocol used to encrypt information sent over the public Internet. I will not talk much about this protocol, you will have to know that it provides three main features: authentication, integrity and confidentiality. Authentication is made using asymmetric cryptography with a public and a private key (these keys are exchanged between the client and the server). Confidentiality is made using symmetric encryption and message integrity is done using message authentication codes. You can browse a little on Google to find out more about these mechanisms.
   The main differences between HTTP and HTTPS are:
The first and most important is that HTTPS is secure while HTTP sends information in plain text.
HTTP uses port 80 while HTTPS uses port 443.
HTTP operates at the application layer while HTTPS works at the transport layer.
The URL is different in these two protcols: https:// and http://
secure HTTP connection
In a simple HTTP communication, the browser will establish a TCP connection with the server and will send a request for a desired resource. The server will respond with the requested resource and the TCP connection will close. If you want to know how a TCP connection is established or closed, check out my networking fundamentals tutorials. With HTTPS the client must first authenticate and then it will try to establish an encrypted connection using SSL. Only after these steps are complete, the HTTPS transfer can begin. Websites use certificates, signed by a public Certification Authority, to ensure users that the site is trusted. Most browsers will notify users when a website with an untrusted certificate is opened:
website certificate not trusted
   That's about it for this post, I hope you've made a general idea of these two protocols. Leave any comment or question that you have, enjoy your day and stay tuned for more articles to come.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/


Will the Thunderbolt Cable Ever Be the Norm?

Now that people are always on the lookout for the newest gadget or computer, manufacturers are pressured to come out with faster and better specs than the last product launched. This is a never-ending quest on who will be able to satisfy the needs of the consumers and the market.
Because of this, technological advances on computers and its related machinery are moving forward at lightning speeds.  This can have both positive and negative effects on the side of the manufacturers and the consumers as well.
But at the end of the day, it is the consumers that are getting to enjoy the benefits of this race. We are the ones who are enjoying the new computers, gadgets and gizmos being launched into the market by the manufacturers.  We are the ones learning new ways of utilizing these products to be able to make them help us do things better and faster as well.  For those who rely on computers for their work, these advancements in the technology is indeed helping a lot in getting to increase the level of productivity of every individual.
Thunderbolt cable

This is what Intel and Apple had in mind when they collaborated on improving the Lightning Peak that Intel initially developed.  They were able to successfully share their ideas and translating it into something tangible that they know people would appreciate.
It was sometime in 2011 that they announced the launch of the Thunderbolt cable. This cable is said to enable transfer of huge data files within minutes from the hard disk or an external source into the computer’s output device.  This interface was initially available in the models of Macbooks and thus not enabling a lot of people to enjoy and utilize the new technology.
This is the limitation that has to be overcome by Apple or any other computer manufacturer who wants to include this interface into their soon to be launched products.  Since there is only a limited number of peripheral that have the same interface or can utilize it, not a lot of people will be able to use it.  Also, since there is a limited number of companies utilizing it, the costs involve are too high which drives away the potential customers.
For the Thunderbolt cable to become the norm when transferring data from one source to another, the costs should be driven down.  Also, there should be more computer manufacturers and peripheral makers who will be convinced that this is the future when it comes to data input/output transfers.
The convincing should be done first on the level of the manufacturers, as they are the ones who will be able to bring up the number of devices to use this technology.  When there are more devices, this will give people and the consumers more options, which in turn can bring on a healthy competition and drive down the prices.  When this happens, consumers will be more likely to patronize this cable and appreciate the technology that it brings. For more options of cables and networking devices that are iOS based.
 
 
 
Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/

Friday 19 April 2013

Managing Professional & Personal Life

Managing Professional & Personal Life

 the competition in every field is soaring high. To shine at anything that you do, you need to be an extraordinaire. The brightest students often burn the midnight oil to achieve excellent results in their studies. The most successful professionals put all their effort towards doing the best in their field. Hence, success comes at the price of sheer hard work. But sometimes this hard work could become a little too much for the life to stay normal.

A normal life would mean a balance between personal and professional life. It is an accepted fact that no matter how successful you are at what you do, you can’t be completely happy if you don’t have a blissful personal life. Similarly, an unhappy life could affect your performance at work too!

Nature of Your Job

The first step towards having a balanced life is to identify the nature of work that you do and the amount of time you wish to put into your personal life. Only then you will be able to plan strategies to achieve a balance in your life.

Some jobs could have harsh timings, such employees would need to make each and every moment of their life productive so that they don’t miss on anything.

A person associated with academia would not need to spend a lot of hours with his students, but to achieve success at his profession; he would need to work real hard at his own end so that he could be an effective teacher. On the other hand, a manager might not have a hectic job but he is often required to be physically present at the workplace to get the tasks done by others. So the nature and demands of professions often differ drastically.

Work Balance Means Time Management

It is indeed true that work balance means time management. Time management is such a tool that it could make the life of an extremely busy person easy and one could literally do a lot in a single day! It is often quoted that the most successful people never procrastinate. They often say that there is no time like the present.

Following handy solutions can bring balance to your life and make you a highly successful and HAPPY person.

List it down

Make a list, at the start of the day, of the tasks that you want to get done during the day. Today, everybody is accompanied with Smart-phones and PDAs and they always provide an option for making the to-do list. Use this feature; in this way you will know straight in your head that what the target is for the day. Then you can plan the strategy to achieve it!

Discover flexibility

Sometimes we overburden ourselves with extra duties. It could be the case that these duties are insignificant in eyes of the boss. Or maybe you are just doing too much to get the praise. Try to find some flexibility in your work—this does not mean adapting an irresponsible attitude. Leave the office as soon as you get your tasks done!

Avoid being too helpful

It is not to discourage teamwork and assistance at workplace but you need to learn to say no. You would find one or two colleagues at the place who would always want assistance and help for the task at hand. Offer help only when it is actually required, not when it is needed to just get the task done! You are paid only to do your chunk of work.

If you get out of the workplace after completing your tasks, you can have some time for yourself and the people around you.

Don’t bring Work back to home

In today’s corporate world, work is on everybody’s mind all the time. People stay connected with workplace issues and colleagues even when they are at home or at a social gathering. Smart-phones and Laptops could be legitimately called the culprit for this scenario!

Don’t use your laptop unless absolutely unavoidable. While you are at home, spend quality time with your family. Participate in their activities and let them know that you are there for them.

Treat yourself everyday

It is true that life have a fast pace but don’t forget to treat yourself every day. Find out time in your schedule to do something for your own self. This will give you pleasure and happiness. Go out with your family or watch a good movie. Relax yourself by doing yoga or going for a walk in the evening. Having something more in life than just a hectic job is rewarding and pleasing.

Recreation once in a while

Find out time once in a while to spend with your family members. Don’t forget the people, who make your life worthwhile, in order to make your career successful. Put your phone on silent mode and shut down the laptop to spend some memorable moments that remain completely undisturbed by the whims of work.

Don’t forget yourself

Many times, people just forget their own selves while finding a balance in life. We can’t afford to forget our children but we certainly forget our own selves. Once in a while, do what gives you pleasure. Go out to your favorite restaurant or watch a classic movie that never fails to make you laugh! It is crucial to never forget those things that make you YOU!

Avoid working extra hours

In this cut throat economic condition, everyone wants to find ways to make some extra cash. This could be the fruit of the desire for a dream home or quality education for the children. Whatever is the case, sometimes we become hard on ourselves to achieve materialistic goals.

Working extra hours can considerably affect the quality of your personal life. In worst case scenario, it can cause serious damage to your health and to the relationships that matter. Following could be the consequences of working for extra hours.

Suffering relationships

Relationships need quality time and effort to make them successful. Extra time at office would mean that you sacrifice the time that should have been spent with your family. You would certainly not want to miss the birthday bash of your brother or the first step of your son! Spending extra time at office would broaden the distance between you and the people you want to be with.

An exhausted mind and body

Extra work requires extra energy—make sure that you get an extra supply of energy to use it during extra hours of work. It is highly unlikely. Most of the times, extra hours at office would make you weary and tired. You would become exhausted within a short while. Exhaustion casts negative effects upon your productivity and the quality of work. This, in turn, can put a negative shadow on your professional standing.

Higher Expectations

If you don’t mind working for late hours, it could go in a negative direction for you as well. You could be assigned extra duties with or without any profit! Be careful or you could get caught in a burdensome and never ending cycle of work!

Sometimes it becomes unavoidable to work for extra hours at the workplace. It could be due to an ongoing venture or due to unexpected workload. If working till late hours starts bothering you, be straight forward and tell your boss about the situation. Explain that extra hours make you weary and hence you become too exhausted to give your hundred percent. Your boss will understand and let you have an easy schedule!

Hard work is the key to success—this is true but happiness and peace of mind are equally important. You can achieve bliss in a successful career but your happiness can’t certainly be complete without a blissful personal life. Work towards achieving a beautiful balanced life!

 Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/

Tuesday 16 April 2013

Microsoft Reportedly Preparing To Jump On The Smartwatch Bandwagon



microsoft-watch
Apple, Google, LG, and Samsung are all reportedly working on wrist-worn computing devices behind closed doors, and it seems like that little club of big companies may soon get another member. If a new report from the Wall Street Journal is to be believed, Microsoft has been in touch with an undisclosed number of suppliers who have apparently been tasked with delivering components for a smartwatch-like device that supports touch input.
Now that’s not to say that such a Microsoft smartwatch is a done deal just yet. The Journal’s sources couldn’t confirm that it would ever actually see the light of day, and I’d wager that’s because the folks in Redmond aren’t exactly sure themselves. After all, some of the company’s most intriguing potential products died ignominious deaths after being stuck in the research and production pipeline. Remember the Courier? The curious dual-screen tablet was apparently very far along (according to CNET, an employee who worked on Courier said it could’ve been completed in “months”) before Microsoft announced its demise in 2010.
It doesn’t help that the nascent smartwatch market has proven to be a tough one to crack. After all, the prospect of delivering a compelling user experience on a wrist-worn gadget isn’t a new one, and only a few of those devices (like the Pebble) could be considered anything close to successful.
Microsoft knows this all too well — the Redmond-based company debuted its SPOT (“Smart Personal Objects Technology”) data delivery service back at CES 2003, and it wasn’t long before watchmakers like Fossil, Suunto, and Tissot began folding SPOT into their own timepieces. Microsoft toyed around with at least one SPOT watch concept of its own, but as a company that was devoted largely to its software endeavors, it seemed more than happy to leave the finicky business of building watches to others before ultimately killing SPOT in 2008.
That’s not exactly the Microsoft we know today though. Early, fruitful hardware projects like the XBox and its successful successor have paved the way for a Microsoft that’s much more willing to take calculated chances on hardware. One could argue that devices like the Zune and Surface/Surface Pro tablets are more reactions to shifts in the consumer tech industry rather than game-changing innovations in their own right, but that’s not necessarily a problem when it comes to mass market gadgetry. The winner isn’t usually the company that does things first, it’s the company that does things best. For all we know, Microsoft could be the company best equipped to take the smartwatch concept and bring it to the masses, but we’ll have to wait and see if Redmond actually rises to that particular challenge first.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/

Sunday 14 April 2013

How to Dual-Boot Windows 8 and Ubuntu 12.10

Today It is very ambitious for everybody to use more than one operating systems in a single Computer. So i made this for you very simple and easy.  In my previous post I have already given the tutorial  How to dual boot ubuntu 12.10 and windows 7 . Now I am going to show you How to Dual-Boot Windows 8 and Ubuntu 12.10 with same easy and simple steps.


So let's start the lesson.

First in windows 8 you have to create a partition on C drive. So go >> to My Computer icon, right click and Select Manage and then click on disk management. Here on your C drive right click and select shrink volume. See the figure below
Shrink

 After this you can select the size of the partition. Give your desired partition space and then click on shrink.
 
Now insert the ubuntu 12.10 DVD into the optical drive and restart the computer. When you restart you should be able to see press any key to boot from CD or DVD.

After this the ubunto Welcome Screen will open select your language and click on install ubunto
and continue the next process.

Install Ubuntu

 Now select your installation type as: something else

Now here you select the partition which you have recently created and click on the + signbutton give your desired partition size and use the partition as logical and location as beginning of this space and select swap area on (use as) and click Ok, see the figure below.

Now again click on the free space and then click on the + button and now select the primary partition and location as beginning of this space and use as (Exr4 journalling file system) and mount point as ( / ) and click Ok. to understand clearly, again see the figure below

Create Partition

Now in the next prompt, select the ext4 / partition and click on install now.

After this the simple and usual installation procedure will come. You will do easily your next installation process.





Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/

Friday 12 April 2013

A futuristic gadget design: Konect Tokyo USB Concept Watch

This will reminisces you of a gadget straight from a Sci-fi movie, wherein all the aliens in flashy robotic suits zoom around in their highly mechanised flying soccer’s. But precisely, with everything becoming so portable these days, this USB watch doesn’t lessen your mobility quotient even by an ounce.



Just like a regular USB key, The Konect Tokyo USB Concept Watch comes with features like skype, MP, Bluetooth and memory space for storing data or music of your choice.


You can also plug in your headphones and groove to the music. Indeed an uncanny design attempt that more looks like a gadget for tomorrow with its unique shape.


So, next time you want to score points in front of your girlfriend, then just flash your hands with this cool thing on!
 

 


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/

 
 
 

Which Android smartphones can get Facebook Home?

Which Android smartphones can get Facebook Home?

Facebook Home is now available in Google Play, but not for every Android device. Facebook says it'll be adding more in the near future. (And if you don't mind a little hackery, you should be able to get it onto your phone easily enough.)

Here is the list of phones that are officially able to run Facebook Home. We will post updates as more devices are supported. (Facebook Home currently is only officially available in the United States.)

Android phones that are supported by Facebook Home:

    HTC First
    HTC One (officially supported, but not yet available)
    HTC One X
    HTC One X+
    Samsung Galaxy Note 2
    Samsung Galaxy S3
    Samsung Galaxy S4 (officially supported, but not yet available)

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/


Thursday 11 April 2013

6 Steps Of Your Business App Development



A working application of the highest quality is a result of a process, that takes much time and efforts. The simplest mobile apps take about a month up to deployment. The more complex an app is, the more time it takes. But this period can be reduced. It depends on how well the customer is prepared, when starts his/her cooperation with the software developer. Here are the steps that should be taken by the customer.

1. Purpose and user audience
The customer should define the purpose of the application and its target user audience. Before saying ''it's for everyone'' or ''it's for any adult woman'', the customer should portrait a person the app will reach. That is the combination of the characteristics that matter, such as region, age, gender, social layer, occupation.

2. Project documentation
This is the customer's vision of the app. There can be various documentation useful for the project - specifications, mockups, wireframes. If they are available, the development will move on faster. If not, software developers can create them. Each demand should be discussed in detail.

3. Ways of implementation
Specialized developer teams get acquainted with the project. They may make suggestions that will help improve the future product. The final goal is defining the best technical ways to implement each requirement, taking the peculiarities of platforms and supporting devices into account. For special and complicated cases investigations can be performed.

4. Approval
The customer approves the project so it could be brought to development. Any further changes should be minimized. They may cause delays of the project deadline.

5. Development
There are three possible ways of development:
- A prototype - if the customer is still unsure of details, or is within a limited budget;
- Divided functionality - several versions of the app, with each new one bringing new features;
- A full version of the application.

6. Further changes
Changes during the development cause rewriting the code and time delay as a result. So if there are any, consulting with the development team will help the customer with further decisions. Such changes will affect the deadline. They can be applied with minimal delay if they are insignificant for the code. But sometimes the smallest visual changes can require much code rewritten. Thus it will take longer.

If the changes are critical, they still can be applied, but the application will require additional costs and time. On the other hand, there is an option of finishing the app as was approved, with the further QA and launch, for the customer would have a ready product on the market. Thereafter the customer may launch an app project that will incorporate these critical changes.

These steps facilitate the cooperation and the development of the software product. They are the best way of expressing the idea. Thus a software developer can understand what the customer wants, and create it with maximum quality and precision.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/

Mobile Websites Vs Mobile Applications




In this age of technology, it will be hard to get away from mobile phones or cell phones. These devices are everywhere, and are used by a large number of people. In order to take advantage of the opportunities presented by the mobile communications market, businesses around the world have started creating mobile websites and mobile applications. The mobile websites are those sites which can be accessed from the cell phones, with the help of a GPS or internet connection. On the other hand, a mobile application is an application which can be installed and directly used from the cell phone itself.

In order to have a better understanding of what would be more beneficial to a business, let us discuss the various advantages and disadvantages of mobile websites and mobile applications.

Mobile Website

Advantages

The various advantages are -
  • Requires fewer resources in comparison to an application.
  • It is easier and faster to launch a mobile website.
  • It can be created by reusing much of the structure of the actual (regular) web page.
  • It is accessible to all devices with Internet access.
  • It is easy to promote a website in comparison to an application.
  • The updates can be uploaded at any time and can be made available immediately.

Disadvantages

The various disadvantages are -
  • A website cannot be tailored to suit the features of a cell phone (smartphone), in addition, most mobile browsers are extremely simple.
  • A mobile website will be less attractive, and will never be as complex and dynamic as an application.

Mobile Application

Advantages

The various advantages are -
  • Within an application, we may include some features that cannot be included on a mobile website.
  • Even if we do not have access to Wi-Fi or 3G, we can use the application that is installed in our mobile device.
  • An application can use the entire screen of the device and provide a better interface to the user.
  • The application is always visible on the desktop of the device, so the chances of using it are greater.

Disadvantages

The various disadvantages are -
  • For a user to use an application, he or she must first download it, requiring greater knowledge and brand loyalty.
  • It requires more money and resources to develop an application.
  • Applications are not available to be downloaded on all mobile devices.
  • Updating an application is not as easy as updating a website.

Thus, we can see that mobile websites and mobile applications can both be beneficial to a business and its customers.
 
Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
 

Benefits of iPad Application Development to Businesses

When it comes to talk about the most popular and powerful gadgets maker, Apple is the only word that strikes in everyone’s mind as it is on the top list of offering innovative gadgets like iPhone, iPad, iPod, Mac and more. However, iPad is one of the advanced devices for businessmen that they can carry wherever they go. Equipped with exceptional features and latest technologies, iPad is one such device that aids businessmen to perform their different tasks. Now, they don’t have to wait to go office as they are able to carry-out their task from their home, traveling or any other place.

Checking emails, getting stock market updates, performing business transactions, carrying important data and docs and many more become extremely easy for business with this small and powerful device iPad. With the increase in the demand for iPad, the demand for iPad application development is also increasing as businessmen are looking to get business applications for their iPad to perform different tasks. Now, when they are on a business tour or holidays, they can carry their iPad and stay connected with their business updates. Without spending their huge time, they can easily send and receive emails and get other business information and reports.

So this device is completely best for businessmen as they can enjoy many benefits. In short, iPad business applications bring innovatory changes in the mode of managing and accessing the business as there are lots of iPad business apps that are extremely helpful for businessmen to take their workspace with them. Apart from its business uses, iPad is also a complete entertaining device as it allows you to enjoy social and games apps by which you can stay connected with your friends and associates. You can play a variety of games in your iPad and get an ultimate gaming experience.

Along with these uses, iPad applications are also used to find destination, forecasting weather, music, video chat and so on. These are the supernatural iPad applications that augment the demand for iPad app development. Best part of iPad apps is that you can customize applications according to your requirements and get such application that meets your business needs. For getting your required iPad application, you need to search for an expert iPad developer from offshore mobile development company. By hiring a good and professional company, you can get iPad software development, iPad game development and many more services that are related to iPad.
- See more at: http://perceptionsystemweb.blogspot.in/2013/04/benefits-of-ipad-application.html#sthash.7DFgKjaa.r6iTNPSC.dpuf
When it comes to talk about the most popular and powerful gadgets maker, Apple is the only word that strikes in everyone’s mind as it is on the top list of offering innovative gadgets like iPhone, iPad, iPod, Mac and more. However, iPad is one of the advanced devices for businessmen that they can carry wherever they go. Equipped with exceptional features and latest technologies, iPad is one such device that aids businessmen to perform their different tasks. Now, they don’t have to wait to go office as they are able to carry-out their task from their home, traveling or any other place.

Checking emails, getting stock market updates, performing business transactions, carrying important data and docs and many more become extremely easy for business with this small and powerful device iPad. With the increase in the demand for iPad, the demand for iPad application development is also increasing as businessmen are looking to get business applications for their iPad to perform different tasks. Now, when they are on a business tour or holidays, they can carry their iPad and stay connected with their business updates. Without spending their huge time, they can easily send and receive emails and get other business information and reports.

So this device is completely best for businessmen as they can enjoy many benefits. In short, iPad business applications bring innovatory changes in the mode of managing and accessing the business as there are lots of iPad business apps that are extremely helpful for businessmen to take their workspace with them. Apart from its business uses, iPad is also a complete entertaining device as it allows you to enjoy social and games apps by which you can stay connected with your friends and associates. You can play a variety of games in your iPad and get an ultimate gaming experience.

Along with these uses, iPad applications are also used to find destination, forecasting weather, music, video chat and so on. These are the supernatural iPad applications that augment the demand for iPad app development. Best part of iPad apps is that you can customize applications according to your requirements and get such application that meets your business needs. For getting your required iPad application, you need to search for an expert iPad developer from offshore mobile development company. By hiring a good and professional company, you can get iPad software development, iPad game development and many more services that are related to iPad.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/

When it comes to talk about the most popular and powerful gadgets maker, Apple is the only word that strikes in everyone’s mind as it is on the top list of offering innovative gadgets like iPhone, iPad, iPod, Mac and more. However, iPad is one of the advanced devices for businessmen that they can carry wherever they go. Equipped with exceptional features and latest technologies, iPad is one such device that aids businessmen to perform their different tasks. Now, they don’t have to wait to go office as they are able to carry-out their task from their home, traveling or any other place.

Checking emails, getting stock market updates, performing business transactions, carrying important data and docs and many more become extremely easy for business with this small and powerful device iPad. With the increase in the demand for iPad, the demand for iPad application development is also increasing as businessmen are looking to get business applications for their iPad to perform different tasks. Now, when they are on a business tour or holidays, they can carry their iPad and stay connected with their business updates. Without spending their huge time, they can easily send and receive emails and get other business information and reports.

So this device is completely best for businessmen as they can enjoy many benefits. In short, iPad business applications bring innovatory changes in the mode of managing and accessing the business as there are lots of iPad business apps that are extremely helpful for businessmen to take their workspace with them. Apart from its business uses, iPad is also a complete entertaining device as it allows you to enjoy social and games apps by which you can stay connected with your friends and associates. You can play a variety of games in your iPad and get an ultimate gaming experience.

Along with these uses, iPad applications are also used to find destination, forecasting weather, music, video chat and so on. These are the supernatural iPad applications that augment the demand for iPad app development. Best part of iPad apps is that you can customize applications according to your requirements and get such application that meets your business needs. For getting your required iPad application, you need to search for an expert iPad developer from offshore mobile development company. By hiring a good and professional company, you can get iPad software development, iPad game development and many more services that are related to iPad.
- See more at: http://perceptionsystemweb.blogspot.in/2013/04/benefits-of-ipad-application.html#sthash.7DFgKjaa.r6iTNPSC.dpuf

Wednesday 10 April 2013

Google Glass (infographic) - How it works

How does it work, Google's new Glass? Why can you see with it a sharp image-layer? How does the image overlay the image of reality? The following infographic illustrates the optical principle - very simple and easy to understand.

what is Juice Jacking SCAM

  Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...