::: WELCOME TO ALL VISITORS ! ::: IF ANY ONE WANT TO PUBLISH THERE ( SOFTWARES /NOTES / ENGINEERING MATERIALS ) THEN FEEL FREE TO COMMENT US ON BLOG OR MAIL US @ DHINCHAKDEVELOPERS@GMAIL.COM WE PUBLISH IT @ OUR BLOG/WEBSITE ON YOUR BEHALF..

CRACKED WORKING LICENCE KEYS OF SOFTWARES

VISIT US  @ FB

Helo everyone ,today we will publish  some cracked keys of some important softwares,here u will find most of important softwares keys which will help u to carry on in ur  work.

  Licence Keys of Many S/w:
            ---------------------------------------------


 Avast 6.0 License Key:
 W6754380R9978A0910-4TZ59467

Avast 4.8 Professional EDT:
Key: W93319295H1200A0712-9F38B28T

Avast 25 years serial key:
W9740570R9942A0910-8NB2E62T

Avast internet security 6:
W9927164R9995L1167-U1AKZ2WF

Avast 7.0 internet secuitry:
w6754380r9978a0916-4tz59467


Avg 2013:
(1) 8MEH-RQEZT-BQJG3-E64FA-9TMAE-6EMBR-ACED
(2) 8MEH-RJR4R-7WAJ6-NL3DA-CG2VH-JEMBR-ACED
(3) 8MEH-RPDWL-THRLY-O8Z3R-4HB7E-4EMBR-ACED


AVG Antiviruse:
8MEH-RU7JQ-ACDRM-MQEPR-G3S23-FEMBR-ACED
8MEH-RW2ZU-29S4F-26QCR-WT482-BEMBR-ACED
8MEH-RNZLL-2Y4QX-79PPA-MMOKE-AEMBR-ACED
8MEH-RREY3-L2LQA-LUMOR-UDTZ4-6EMBR-ACED
8MEH-RF3MY-BZ7CJ-9LUAR-ST99N-CEMBR-ACED
8MEH-RMXLW-HN44A-BABPA-S9NQF-PEMBR-ACED
8MEH-RGM33-K474L-6FGRR-8RR7K-UEMBR-ACED
8MEH-RREY3-L2LQA-LUMOR-UJXN3-6EMBR-ACED
8MEH-RJXR4-2CKYP-2GB3A-DBMAD-PEMBR-ACED
8MEH-RU7JQ-ACDRM-MQEPR-G3S23-FEMBR-ACED
8MEH-RGM33-K474L-6FGRR-8NVPP-UEMBR-ACED
8MEH-RXYFD-JUV72-8922R-F283Z-QEMBR-ACED
8MEH-RNHNX-A4CNU-49DOA-3DB2F-9EMBR-ACED
8MEH-RQX93-WYZKW-BE2FR-QOJPE-PEMBR-ACED


Tune up utilities 2014 keys::
DONTHA-TETHEH-ACKERH-ATETHE-CODE12
WK63DB-XBQ5X1-AY2PTF-NB9TNY-J1R3PA-9X95R5
Q9RAD3-WJQQNR-68NKP0-8WDK62-4MDEJV-JRVWTY
W5FN6C-HR8QF1-X8FVT0-2YKN0Y-88KQJ3-R9V80W


AVG 2014 Internet security:
8MEH-RFR8J-PTS8Q-92ATA-O4WHO-JEMBR


USB Disk Security 5.3.0.12
Name: M.A.SUMON
License Key: 44282-C6C43-74504-2E615-15186-77827-5BB48-19619


Adobe Illustrator 10
S.NO 1034-1003-4400-0000-1115-2040


Adobe Illustrator CS 11.0
Serial No:
1034-1050-8697-5540-0366-7862


Adobe PhotoShop 7.0
Serial : 1045-1209-6738-4668-7696-2783


Adobe Acrobat 9 Pro Extended serial:
1380-1601-7539-9354-7032-1203


ADOBE_ACROBAT_WRITER_50
KWW500R7150122-128


GIF Movie Gear v4.01
Name:crsky
Code:mg37mca4744


StepAhead AnFX v 5.3.2.9
76695 1943711361


Active Desktop Calendar 7.13

DC971-47E81-7F15F
DCA38-91E36-4821E
DC932-30D42-E7FC4
DC9BC-64196-B7F3D
DCB55-FC191-0AE34


Word to PDF Converter 3.0
TeaM aCMe
7bd4-6e4c-8521-a129

   
MS Office 2002
cdkey: FM9FY TMF7Q KCKCT V9T29 TBBBG


MS Office 2003
Serial No:
GWH28 - DGCMP - P6RC4 - 6J4MT - 3HFDY


MS Office 2007
Install Key: KGFVY-7733B-8WCK9-KTG64-BC7D8


My Eclipse Enterprise WorkBench 3.84

License Name : FALLEN License Key : SL6789|839-66|545454|6861734532


Kaspersky Internet security 2013 key:

EFF9H-9SWSX-HBNW4-BYKTG


Web Page Maker v3.12
19915-17104-62916-68973
28135-21234-58786-60753


Power Screen Capture 7.0.1.3
sn;PSCP0011587


Ultra Screen Capture Expert v2.0
Name: Prince | AT4RE Code: SCREENCAPTUREEXPERT9888


ZD Soft Screen Recorder v 2.6.4.0
License Name: Twisted EndZ
License Code: FPAE-NDIF-OVGP-VRTX


BSR Screen Recorder v4.2
Username:
NiTROUS
Key:
15N210K71082C16E685E


Avast Antivirus Pro v4.8.1335 Lifetime Licence
client:
C3985991R9946A0911-3H3R5PPJ,
C5263093R9963A0911-YLWJ5ANL,
C8144081R9952A0912-23E7HYUX
server:
S2912937R9950A0912-21768JYV,
S8869028R9958A0911-XWM2CN2H,
S6363585R9954A0910-JLK7K10V


workstation:
W5289296R9955A0911-0HKMYR5F,
W5104049R9956A0912-5B4YM3PY,
W2680454R9955A0912-LPX3J0UR


Easy GIF Animator Pro v 5.0.2.42

Password..: GIFAN4PRES


Moyea flv to video converter v 2.0.2.0
Serial : EA74ECD06B0A759660DDBBB5


Advanced Office Recovery v2.0

Email: Team@ ARN.com
Serial: 823af196983aa9aa5ba96734e7b35967


Adobe Photoshop 7.0
104512096738466876962783


Electronic Arts - Need For Speed Hot Pursuit 2
CLS0FLT1RULE9Q7B


Internet Download Manager
YOGE3-IF2C6-QSD3N-TNR9I


Microsoft Internet explorer
2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G


Microsoft MSDN 9.0
jwfmgdgvmwkpvd39rx6pw2gqy


Microsoft Office 2010
VYBBJ-TRJPB-QFQRF-QFT4D-H3GVB


Microsoft Visual Basic 2005 Express
76541-000-0000011-00124

DANGEROUS SECURITY THREADS FOR IT ASSETS

IN TODAYS MODERN TECHNICAL WORLD WE MUST AWARE WITH DANGEROUS THREADS ATTACHED WITH DIGITAL DATA .VIRUSES ARE  OF MANY KIND AND KNOWNING THEIR PREVENTION IS HELPFUL TO PROTECT OUR IMPORTANT FILES/DATA/PC/COMPUTER SYSTEM..There are numerous threats to security of applications and data. With the increasing use of internet and the advancing IT, applications are becoming increasingly vulnerable to threats that could be a malicious code, viruses, worms, etc.
Some of the security threats are as follows:-

Virus Attack

VIRUS MADE PC CORRUPT
A computer virus is a man-made program or piece of code that is loaded onto one‘s computer without the victims‘ knowledge and runs against his/her wishes.
Viruses can also replicate themselves over and over again and is relatively easy to produce. Even a simple virus is dangerous because it corrupts the system.
An even more dangerous type of virus is the one capable of transmitting itself across networks and bypassing security systems.
Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD.
The sender of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus
. Some viruses wreak havok as soon as their code is executed while other viruses lie dormant until circumstances cause their code to be executed by the computer.
E-mail viruses:
An e-mail virus travels as an attachment to e- mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click they launch when you view the infected message in the preview pane of your e-mail software.
The different damages a virus can cause:
• An annoying message appearing on the computer screen.
• Reduce memory or disk space.
• Modify existing data.
• Overwrite or Damage files.
• Erase hard drive.

PROTECTION TIPS:

VARIOUS ANTIVIRUS SOFTWARES USED 
• Use anti-virus from good brands like Mc-Afee or Kaspersky.
• Turn on ‗auto update‘ option for your browser and plug-ins.
• Install Anti- malware.
• For extra security, run anti-malwares by different brands.
• Set a strong password for your FTP.
• Configure FTP client settings. Activate the option to ―Always use SFTP‖.
• Avoid sites that do not look trustworthy.
• Avoid sites in which ‗https‘ is clearly striked out.
• Quick Scan pen drives and flash drives when you insert them into your systems.
• Scan your systems frequently.

Worm

Computer worms are standalone malware programs that will use your computer network to replicate themselves in order to spread to other computers. Unlike a computer virus, it does not need to attach itself to any program, file or document.
In some ways worms are more deadly than viruses because they don‘t need to lodge themselves into programs to replicate. Worms can replicate independently through your system.
Once in your system, worms will look scan your network for other machines that may have similar security holes. If the worm finds one, it will copy itself into the new computer and start the process all over again.
Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks. Worms can perform a variety of operations according to how it has been designed.
• It can cause a denial of service attack
• It gets attached to Microsoft outlook or any such mailing facility and sends mails to everybody on the address list (replicates itself and passes on the worm to everyone in the address list),
• overwrites your files and documents, and
• Makes your computer slow and dis-functional.

Illustration:

The ILOVEYOU virus comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book and, perhaps more seriously, the loss of every JPEG, MP3, and certain other files on the recipient's hard disk.
As Microsoft Outlook is widely installed as the e-mail handler in corporate networks, the ILOVEYOU virus can spread rapidly from user to user within a corporation. On May 4, 2000, the virus spread so quickly that e-mail had to be shut down in a number of major enterprises such as the Ford Motor Company. The virus reached an estimated 45 million users in a single day.

PROTECTION TIPS:

Use anti-virus from good brands like Mc-Afee or Kaspersky.
• Turn on ‗auto update‘ option for your browser and plug-ins.
• Install Anti- malware.
• For extra security, run anti-malwares by different brands.

• Set a strong password for your FTP.
• Configure FTP client settings. Activate the option to ―Always use SFTP‖.
• Avoid sites that do not look trustworthy.
• Avoid sites in which ‗https‘ is clearly removed.
• Scan pen drives and flash drives when you insert them into your systems.
• Scan your systems frequently.

Trojan


In the 12th century BC, Greece declared war on the city of Troy. The dispute was caused due to the fact that the prince of Troy and the Queen of Sparta eloped. Hence declaring that they intend to marry.
The Greeks besieged Troy for 10 years but met with no success as Troy was very well fortified.
In a last effort, the Greek army pretended to be retreating, and left behind a huge wooden horse. The people of Troy saw the horse and thought it was a gift from the Greeks.
They pulled the horse into their city, unaware that the hollow wooden horse had some of the best Greek soldiers hiding inside it.
Under the cover of night, the soldiers snuck out and opened the gates of the city, and later, together with the rest of the army, besieged and destroyed Troy. Similar to the wooden horse, a Computer Trojan (also referred to as Trojan Horse program) pretends to do one thing while actually doing something completely different.
A Trojan horse program is a program that appears to have some useful or benign purpose, but really masks some hidden malicious functionality.
Today‘s Trojan horses try to sneak past computer security fortifications (such as firewalls), by employing like-minded trickery. By looking like normal software, Trojan horse programs are used for the following goals:
• Duping a user or system administrator into installing the Trojan horse in the first place. In this case, the Trojan horse and the unsuspecting user becomes the entry vehicle for the malicious software on the system.
• Blending in with the ―normal‖ programs running on a machine. The Trojan horse camouflages itself to appear to belong on the system so users and administrators continue their activity, unaware of the malicious code‘s presence.
Attackers have devised a myriad of methods for hiding malicious capabilities inside their wares on your computer. These techniques include
• employing simple, yet highly effective naming games,
• using executable wrappers,
attacking software distribution sites,
• manipulating source code,

• co-opting software installed on your system, and
• disguising items using polymorphic coding techniques.
As we discuss each of these elements, we must bear in mind that the attackers‘ main goal is to disguise the malicious code so that the victims do not realize what the attacker is up to.

Types of Trojans

The most common types of Trojans found today are:
1. Remote Administration Trojans (RATs)
These are the most popular Trojans. They let a hacker access the victim's hard disk, and also perform many functions on his computer (shut down his computer, open and shut his CD-ROM drive etc.).
Modern RATs are very simple to use. They come packaged with two files - the server file and the client file. The hacker tricks someone into running the server file, gets his IP address and gets full control over the victim computer.
Some Trojans are limited by their functions, but more functions also mean larger server files. Some Trojans are merely meant for the attacker to use them to upload another Trojan to the target's computer and run it; hence they take very little disk space. Hackers also bind Trojans into other programs, which pear to be legitimate, e.g. a RAT could be bound with an e- greeting card.
Most RATs are used for malicious purposes - to irritate or scare people or harm computers. There are many programs that detect common Trojans. Firewalls and anti-virus software can be useful in tracing RATs.
RATs open a port on your computer and bind themselves to it (make the server file listen to incoming connections and data going through these ports). Then, once someone runs his client program and enters the victim's IP address, the Trojan starts receiving commands from the attacker and runs them on the victim's computer.
Some Trojans let the hacker change this port into any other port and also put a password so only the person who infects the specific computer will be able to use the Trojan. In some cases the creator of the Trojan would also put a backdoor within the server file itself so he'll be able to access any computer running his Trojan without the need to enter a password.
This is called "a backdoor within a backdoor" e.g. CIA, Netbus, Back Orifice, Sub7.
2. Password Trojans
Password Trojans search the victim‘s computer for passwords and then send them to the attacker or the author of the Trojan. Whether it's an Internet password or an email password there is a Trojan for every password. These Trojans usually send the information back to the attacker via email.
3. Privileges-Elevating Trojans
These Trojans are usually used to fool system administrators. They can either be bound into a common system utility or pretend to be something harmless and even quite useful and appealing. Once the administrator runs it, the Trojan will give the attacker more privileges on the system. These Trojans can also be sent to less-privileged users and give the attacker access to their account.
4. Key loggers
These Trojans are very simple. They log all of the victim‘s keystrokes on the keyboard (including passwords), and then either save them on a file or email them to the attacker once in a while. Key loggers usually don't take much disk space and can masquerade as important utilities, thus becoming very hard to detect.
5. Joke Programs
Joke programs are not harmful. They can either pretend to be formatting your hard drive, sending all of your passwords to some hacker, turning in all information about illegal and pirated software you might have on your computer to the police etc. In reality, these programs do not do anything.

Logic Bomb

A logic bomb is a piece of code intentionally inserted into a software system which when triggered will set off a malicious task such as reformatting, and/or deleting, altering or corrupting data on a hard drive. It's secretly inserted into the code of a computer's existing software, where it lies dormant until that event occurs.
A program in which damage is delivered when a particular logical condition occurs; e.g., not having the author's name in the payroll file. Logic bombs are a kind of Trojan Horse and most viruses are logic bombs.

PROTECTION TIPS:

• Always change passwords frequently. They save users from a lot of trouble.
• Use security measures to detect insider threats in your system. Basic anti-viruses are not efficient enough.

Phishing & Spoofing attacks
In the 19th century, British comedian Arthur Roberts invented a game called Spoof, which involved trickery and nonsense. This gave the English speaking world a new word that today symbolizes a gamut of hacking technologies.
Spoofing attacks primarily include e-mail spoofing, SMS spoofing, IP spoofing, and web spoofing. Spoofing attacks are used to trick people into divulging confidential information (e.g. credit card data) or doing something that they would usually not do (e.g. installing malicious software on their own computers).
Such use of spoofing attacks is commonly referred to as Phishing.
Sending an e-mail from somebody else‘s e-mail ID is the simplest form of Email spoofing. Innumerable tools exist on the Internet which can easily be used to send e-mails appearing to have been sent by somebody else. The effects are intense.
Case: Many customers received an email from their bank asking them to verify their usernames and passwords for the bank records. The emails were spoofed, but thousands of customers clicked on the link in the email and submitted the information at the webpage that opened up. On investigation, it is found that the emails were sent by a disgruntled employee.
Case: Thousands of employees of a global IT company ended up installing viruses on their computers when they executed an attachment appearing to have been sent out by their officers. The employees even disabled the anti-virus software because the email said that ―the attachment may be incorrectly detected as a virus!‖ On investigation, it was found that the emails had been sent out by a rival company.

SMS spoofing is very similar to e-mail spoofing. The major difference being that instead of an email ID, a cell phone number is spoofed and instead of a spoofed e-mail, a spoofed SMS is sent.
Case: A young lady received an SMS from her husband‘s cell phone informing her that he had had an accident and was at the hospital and urgently needed money. On receiving the SMS, she rushed out of the house with the money. She was attacked and robbed by the person who had sent her the spoofed SMS.
An IP address (e.g. 75.125.232.93) is the primary identification of a computer connected to a network (e.g. the Internet). A criminal usually uses IP spoofing to bypass IP based authentication or to mislead investigators by leaving a trail of false evidence. IP spoofing can be accomplished using proxy servers and simple PHP scripts that are readily and freely available online.
Case: Internet users in many countries use proxy servers to bypass Government imposed Internet censorship. (We are not passing any comment on whether is it right or wrong to impose Internet censorship or bypass it, as the case may be.)
DNS spoofing involves manipulating the domain name system to take unsuspecting victims to fake websites (that look identical to the original ones). Sitting at the computer you may type in www.asianlaws.org but the site that opens up may be a fake site!
This can and has been done at the local organizational level (e.g. by host file rewriting or by a network administrator with malicious intentions) or at the national or international level (by hackers exploiting vulnerabilities in the BIND software that runs most of the world‘s domain name servers).
Case: Hundreds of employees at a global financial services company received emails from a popular online store about a huge discount on some popular books and DVDs. On clicking the link in the email, users were taken to what appeared to the website of the online store. Most of the recipients of the emails placed orders using their credit cards. No one got the books or the DVDs, all got was a hefty credit card bills at the end of the month.
On investigation it was uncovered that the network administrators had connived to carry out a simple Phishing attack. It was a fake email and a fake website. None of the victims (most of whom were advanced computer users) realized that something was amiss.

PROTECTION TIPS:

• Enable authentication based on the key exchange on your network. IPsec will significantly reduce the risk of spoofing.
• Ensure you use access control to deny private IP addresses on your downstream interface.
• Filter inbound and outbound traffic.
• Preferably, in cases of suspicion, always ensure if the sender actually sent the mail or sms.

Malware (Malicious Software)

Malware, short for malicious software, is software used or created by hackers to infiltrate or damage or disrupt computer operation, gather sensitive information, or gain access to private computer systems. While it is often software, it can also appear in the form of scripts or code. 'Malware' is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.
Malware includes computer, worms, trojan horses, spyware, adware, most rootkits, and other malicious programs. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. Some malware is disguised as genuine software, and may come from an official company website.
Malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others. It can also hijack your browser, redirect your search attempts, serve up nasty pop-up ads, track what web sites you visit etc. Malware is sometimes used broadly against corporations to gather guarded information, but also to disrupt their operation in general. Many malwares will reinstall themselves even after you think you have removed them, or hide themselves deep within Windows, making them very difficult to clean.
Left un-guarded, personal and networked computers can be at considerable risk against malware threats.
As per an analysis done in the Kaspersky lab, the following is the result.

PROTECTION TIPS:

• Use a firewall.
• Keep track and control your emails.
• Use up-to date antivirus software.
• Scan your computer frequently to detect unknown malicious programs running.
• Secure your browser.

VI MOST COMMON PASSWORD CRACKING METHODS AND THEIR DEFENSIVE RESPONSE

There are number of methods out their used by hackers to hack your account or get your personal information. Today in this post we will share with you guys 6 Most commonly used method to crack password and their countermeasures. You must check out this article to be safe and to prevent your online accounts from hacking.AS Hacking is one of the serious crime in IT industry.PASSWORD cracking is one of the method used by Hackers to break codes and theft important data/information.

  • BruteForce Attack

Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the rightpassword is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.
Countermeasure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.IN INDIA most of  common mans use simple passwords to secure their personal data but it is not good enough to secure their data.more simpler your password MORE is THE CHANCE to GUESS/HACKED. 
Example: Passwords like "iloveu" or "password" can be cracked easily whereas computer will take years to crack passwords like "aN34l00"


  • Social Engineering


SOCIAL ENGINEERING MEANS to APPLY THE PHYSOCOLOGY 
PRINCIPLES TO THE HUMAN DURING MANUFACTURING PROCESS SUCH THAT IT MAKES EASIER TO USE AND HANDLE. Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be frombank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.
Countermeasure: If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.


  • Rats And Keyloggers


In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.
Countermeasure: Never login to your bank account from cyber cafe or someone else computer. If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated.
  •  Phishing

Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.
Countermeasure: Phishing attacks are very easy to avoid. The url of this phishing pages are different from the real one. For example URL of phishing page of facebook might look like facbbook.com (As you can see There are two "b"). Always make sure that websites url is correct.


  • GUESSING
https://www.facebook.com/DhiNNchAak?ref=hl


This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess yourpassword. Hacker can also use combination of Social Engineering and Guessing to acquire your password.
Countermeasure: Don't use your name, surname, phone number or birthdate as yourpassword. Try to avoid creating password that relates to you. Create complex and longpassword with combination of letters and numbers.

















CREATE WEBSITE EASILY WITH JOOMLA

Joomla versions are either standard term or long term supported (STS and LTS). A standard term supported release is good for 7 months, a long term support release for 22 months. Every 6 months a new STS will be released.
You can recognize a long term release by the .5 in the version.

  • Joomla 2.5 is the actual long term support release and will be replaced by Joomla 3.5 in September 2013
  • Joomla 3.0 is the actual standard term support release and will be replaced by Joomla 3.1 in March 2013
  • Joomla 3.1 will be the next short term supported release from March 2013 to September 2013
  • Joomla 3.5 will be the next long term supported release from September 2013 to March 2015
Long term releases are the proposed path for productive websites.
Standard term releases are a kind of playground for site builders and developers and if you start to build a website from scratch the proposed entry point (Figure 1).




http://dhinchakdev.blogspot.in/
                                                                        fig : 1




What's new in Joomla 3.0?

There are many improvements behind the scenes.
The most significant changes for site builders and users are:

  • Joomla goes mobile with new responsive templates. Your Joomla website will be displayed nicely on every mobile device browser (Figure 2).
    Joomla has a new user interface
  • Joomla uses the JavaScript library jQuery
  • The webinstaller is easier and only a 3 steps procedure
  • Language packages can be installed directly from the extension manager (Figure 3)
  • Smart Search, which was introduced with Joomla 2.5 got many improvements
  • TinyMCE WYSIWYG Editor comes in a newer version (3.5.6)
  •   Some technical changes are not that visible but more than useful and appreciated
  •   Saving blank articles allowed
  •   With the PHP Memcached Driver Joomla performance can be accelerated
    JOOMLA ON MOBILE DEVICES.
  •    Use of another library (JFeed) for feed management rather than SimplePie
  •    Continued clean up of older unused code, files and database fields and tables and improved     standardization of tables.
  • Extensive work on code style standardisation and consistency
  • Unit testing in the CMS
  • Updated system tests in the CMS
and many more

What can you do with Joomla?

All kinds of dynamic websites can be created with Joomla. These websites consist of web pages containing content such as text, images, video and audio. The pages changes or customizes themselves frequently and automatically, based on certain criteria. Take the frontpage as an example. Usually it displays the newest articles automatically on top.
As all the sites in the world wide web are based on the same principles websites can be roughly divided in


BLOGS

 A blog is a discussion or informational site consisting of articles (posts, blog entries). The most recent articles appears first.






















Brand building sites

 A site with the purpose of creating an experience of a brand online. These sites usually do not sell anything, but focus on building the brand.
















Celebrity sites



 

Personal websites

 

600,000,000 websites

Did you ever ask yourself How Many Websites Are There in 2012 ? There are a lot, but nobody knows the exact answer to that question.
As you may have noticed, most of the example sites are not the big fishes in the world wide web but they fulfil the needs of their creators and their clients. This does not mean, that Joomla is only useful for smaller websites, it just means that most of the websites are made with limited resources on time and budget and for that reason people often build them with open source systems like Joomla, WordPress and Drupal.
Bigger websites like Facebook, Flickr, YouTube, Google, Apple, or Microsoft are usually not using one open source content management system for their websites. These companies usually have thousands of developers that create often hundred of websites by selecting and combining all the ideas and solutions available on the market. It is usually not about the technique, it’s more about business models and ideas.

Amateurs versus Professionals

The above listed websites are created by people that I want to divide in amateurs and professionals.

  • Amateurs are trying to get around. They usually do not want to know one’s stuff, they are happy if succeeded.
  • Professionals try to get to the ground of what they are doing to be able to provide solutions which can be optimized over time. They try to transfer knowledge to strengthen others and build their business around the topic.
For Joomla it doesn’t matter whether you are an amateur or a professional. Both can deal with Joomla and often amateurs become professionals over time and professionals start to get more involved to make Joomla CMS and Framework better and better.
Time for the first and the last advice in this book!

Ignore people talking about what you have to do. Focus on moving toward what you like to do instead

What are the common parts in all these websites?

Even if the listed example websites are all very different, they have a few things in common:

  • they are displaying content (text, images, video, audio)
  • they have individual designs, layouts and colors. Individual doesn’t mean perfect or tasteful or artistic. It just means “individual” :)
  • visitors can interact in some ways with the site. Sometimes they have to create a user account in advance
  • the common static words are available in different languages, sometimes the content too.

Joomla is the glue

All these websites are based on the ideas of their creators and the almost endless possibilities of the Joomla Content Management System. In this book, I want to cover the common parts of all these websites. You’ll be able to create a quite nice looking website on your own after you have read the next 9 chapters. And it’s up to you, whether you do it in the amateur or in the professional way :)

Source: http://cocoate.com/j3/what-is-joomla

IMPACT OF CYBER LAWS AND ITS PREVENTION IN IT INDUSTRY

 


Information technology is the technology used for manipulate or store the data ;digital data(0,1).today in the modern world with the increment in technology cyber crimes are increases too.we have to acquire some knowledge over technology rules and Ethics to use PC/COMPUTER and Internet.AS,computer Ethics term was 1st introduced in middle of 1970's some of the laws we should  know always ,which is described below --

What Is Patent Law?

 

Patent law is the area of law that relates to intellectual property rights. These are also often known as patent rights, and they are used to protect the rights of a group or individual over their own original inventions. Patent laws cover the regulation and enforcement of these intellectual property rights. Patent law in the US is also responsible for the creation of the US Patent and Trademark Office, which is the body that administers patent law.A patent is the right to a specific invention that is granted by a particular government. Patent rights can be held by an individual or by a group, such as a company. They may be held by the original inventor of the patented process or product, but they can also be transferred to another person or group. The patent laws prevent anyone other than the holder of the patent from making use of the protected idea, without obtaining permission from the patent holder. If someone does try to use the patented idea illegally, then the patent laws specify the legal action that the patent holder can take against them.Patent laws specify the types of inventions that can be patented and the process through which a patent can be obtained. Patent laws vary between different countries. In the United States, an invention must meet three criteria if it is going to be eligible for a patent. It must be a new idea, it must have some sort of use or purpose, and it must be non-obvious, so it is not possible to patent an idea that anyone could have.Patent law also specifies the process for dealing with the enforcement of patents in cases of patent infringement. If a patent holder feels that their rights have been violated, then they can make use of patent law in order to enforce their rights. However, pursuing this kind of legal action can be expensive and very complicated, so it can be difficult for small businesses or individual inventors to pursue claims against large companies.

Some attorneys specialize in patent law. It is possible to obtain a patent without using the services of a lawyer, but a patent attorney may be hired to help to ensure that the patent is obtained properly and that it will be enforceable under patent law. Patent attorneys can also provide up-to-date advice on patent law, which can be important, particularly when dealing with patents in areas of technology that are developing rapidly. Patent attorneys can also be used when dealing with patent infringement problems, when they can help the patent holder to deal with the complexities of the laws governing these types of cases.

Patent law is a complex, but important area of law. It provides important protection for anyone who has created an original idea and it determines which inventions can be made use of by other people. If you are interested in finding out more about what patent law means for inventors and businesses, then you may want to spend some time exploring the fedcirc.us website, where you will find some useful information about the importance of patents and how they work.

 

 PATENT LAW:

Patent law is a specific area of law that encompasses the legal regulation, jurisprudence, and
enforcement of specific intellectual property rights known as patent rights. A patent is a government
issued right granted to individuals or groups that protects their original inventions from being made,
used, or sold by others without their permission for a set period of time. While patents can be legally
obtained without the use of an attorney, an attorney who specializes in patent law can help ensure that
their client’s patent is enforceable by law. Because patent law pertains to intellectual property, which
is like any other property in that it can be legally sold, exchanged, traded, or abandoned, the finer
points of patent law are frequently amended as technology changes. This is another reason why an
attorney specializing in patent law is of significant use to those seeking a patent.
Basically, A Patent is a legal monopoly, which is granted for a limited time by a country to the owner
of an invention. Merely to have a patent does not give the owner the rights to use or exploit the
patented invention. That right may still be affected by other laws such as health and safety regulation
or the food and drugs regulation or even by other patents. The patent, in the eyes of the law, is a
property right and it can be given away, inherited, sold, licensed and can even be abandoned. As it is
conferred by the government, the government, in certain cases even after grant or even if it has been,
in the meantime, sold or licensed, can revoke it.

• A Patent gives an inventor the right for a limited period to stop others from making, using,
selling or importing an invention without the permission of the inventor. That is why patent is
called a "negative right"
• Patents are generally concerned with functional and technical aspects of products and
processes and must fulfill specific conditions to be granted.
• Most patents are for incremental improvements in known technology - evolution rather than
revolution. The technology does not have to be complex.
• Patent rights are territorial; an Indian patent does not give rights outside of India.
• Patent rights last for up to 20 years in India and in most countries outside India.
• Depending on where you wish your patent to be in effect, you must apply to the appropriate
body. In India, this is The Indian Patent Office. There are various Patent Offices around the
world. Alternatively, a Patent Agent can apply on your behalf.
 

REQUIREMENTS OF PATENT LAW:

The invention must be useful, novel (new), and non obvious. If so, the inventor is entitled to patent protection, and the government is obliged to give it. Patent protection excludes all others except the patent holder from making, using, selling or offering to sell the patented invention. However if another invention which has patent is used in the actual physical creation of the new invention, the patent owner may have to obtain certain rights from the first patent holder.


ADVANTAGES OF PATENT LAW:

Some of the more obvious advantages of patent law is that the patent owner holds exclusive right to the invention and that others must pay either a license fee or obtain some other type of right to produce or manufacture the patented item. Additionally a company may invent something that is not necessarily useful to the company’s overall goals at the time, and then they would have to decide whether the lengthy and sometimes expensive patent application process is in their best interest.


COPYRIGHT LAW:

The Copyright Act, established in 1976, is located in Title 17 of the U.S. Code, from sections 101
through 122.Copyright refers to laws that regulate the use of the work of a creator, such as an artist or
author. This includes copying, distributing, altering and displaying creative, literary and other types of
work. Unless otherwise stated in a contract, the author or creator of a work retains the copyright.
For a copyright to apply to a work, it must be an original idea that is put to use. The idea alone cannot
be protected by copyright. It is the physical use of that idea, such as an illustration or a written novel
that is covered under copyright law.
It is also be defined as, “As a copyright holder, you have the exclusive right to reproduce or make
copies of a creative work. You can also distribute or sell copies; make a derivative work (for example,
turn a novel into a movie); and perform or display the work publicly”.

Copyrightable Material are includes, Creative works, including literature, art and music, can be
copyrighted if they are original and have been put in tangible form. A copyright is a form of protection
by the laws of the United States to authors of “original works of authorship.” This includes literary,
dramatic, musical, artistic and certain other intellectual works. This protection is available to both
published and unpublished works. Material not protected by copyright (or otherwise protected) is
available for use by copyrighted work can prevent others from copying, performing or otherwise using
the work without the author’s consent.
There are four main forms of remedies in the event that copyright infringement takes place:
1. An injunction to stop the production of further copies.
2. A demand that all copies are surrendered to the copyright owner.
3. Damages for losses suffered by the copyright owner.
4. An account of profits made by the infringer.
 

ADVANTAGES OF COPYRIGHT LAW:

 1. LEGAL RESOURSE:

Federal copyright law prohibits authors from suing for breaches of copyright law unless the work has been registered with the U.S. Copyright Office. This means that if someone steals your work, you cannot file a lawsuit until the work has been registered. While you might think that you’ll be able to register the work as soon as copyright infringement is an issue, there will be added expense and time lost. You’ll have to pay more to expedite the copyrighting process, and filing your lawsuit will become more complicated. Not to mention, the judge or jury who hears your case will wonder why you didn’t initially copyright your work, which can work in the favor of the defendant in your case.

2. DAMAGES:

The plaintiff in a copyright infringement case can sue for the actual infringement of the copyright even if the registration was completed after the infringement occurred. However, the plaintiff will not be entitled to statutory damages and court fees unless the registration was completed in a “timely manner”. Currently, a timely manner is considered within three months of publication of the creative work. This means that if you don’t copyright your work, you will not be entitled to statutory damages when and if an infringement occurs. In this case, the plaintiff will be required to prove actual damages.

3. SPEED:

Typically, copyright infringement cases involve the perpetrator’s ability to profit from the use of a copyrighted creative work. If you win a copyright lawsuit in court, then the infringer will be required to take the copyrighted work off the market, but this could be months or years after the actual infringement took place. If, however, you have copyrighted your work by registration, then you are entitled to the removal of the copyrighted work from the market immediately. This means that gratification is much faster, and will expedite the process of removing the offending material from the market.


CYBER CRIME:

Information is a resource which has no value until it is extracted, processed and utilized. Information technology deals with information system, data storage, access, retrieval, analysis and intelligent decision making. Information technology refers to the creation, gathering, processing, storage, presentation and dissemination of information and also the processes and devices that enable all this to be done. Information technology is affecting us as individual and as a society. Information technology stands firmly on hardware and software of a computer and tele-communication infrastructure. But this is only one facet of the information Technology, today the other facets are the challenges for the whole world like cyber crimes and more over cyber terrorism. When Internet was first developed, the founding fathers hardly had any inkling that internet could transform itself into an all pervading revolution which could be misused for criminal activities and which required regulations. With the emergence of the technology the misuse of the technology has also expanded to its optimum level the examples of it are:

Cyber stalking  • Cyber harassment  • Cyber fraud  • Cyber defamation  • Spam  • Hacking  • Trafficking  • Distribution  • Posting and dissemination of obscene material including pornography   • Indecent exposure and child pornography etc.

The misuse of the technology has created the need of the enactment and implementation of the cyber laws but whether this cyber laws are capable to control the cyber crime activities, the question requires the at most attention. There can be no one exhaustive definition about Cybercrime. “Cyber terrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against property, government and people at large.” OR we can say  "Acts those are punishable by the Information Technology Act". A simple sturdy definition of cyber crime would be, "unlawful acts wherein the computer is either a tool or a target or both".





TYPES OF CYBER CRIME:

1. Privacy violation:

The law of privacy is the recognition of the individual's right to be let alone and to have his personal
space inviolate. The right to privacy as an independent and distinctive concept originated in the field of
Tort law, under which a new cause of action for damages resulting from unlawful invasion of privacy was
recognized. In recent times, however, this right has acquired a constitutional status, the violation of which
attracts both civil as well as criminal consequences under the respective laws. The intensity and
complexity of life have rendered necessary some retreat from the world. Man under the refining influence
of culture, has become sensitive to publicity, so that solitude and privacy have become essential to the
individual. Modern enterprise and invention have, through invasions upon his privacy, subjected him to
mental pain and distress, far greater than could be inflicted by mere bodily injury. Right to privacy is a
part of the right to life and personal liberty enshrined under Article 21 of the Constitution of India. With
the advent of information technology the traditional concept of right to privacy has taken new dimensions,
which require a different legal outlook. To meet this challenge recourse of Information Technology Act,
2000 can be taken.
The various provisions of the Act aptly protect the online privacy rights of the citizens. Certain acts have
been categorized as offences and contraventions, which have tendency to intrude with the privacy rights
of the citizens.

2. Secret information appropriation and data theft:

The information technology can be misused for appropriating the valuable Government secrets and data
of private individuals and the Government and its agencies. A computer network owned by the
Government may contain valuable information concerning defense and other top secrets, which the
Government will not wish to share otherwise. The same can be targeted by the terrorists to facilitate their
activities, including destruction of property. It must be noted that the definition of property is not
restricted to moveables or immoveable alone.

3. Demolition of e-governance base:

The aim of e-governance is to make the interaction of the citizens with the government offices hassle free
and to share information in a free and transparent manner. It further makes the right to information a
meaningful reality. In a democracy, people govern themselves and they cannot govern themselves
properly unless they are aware of social, political, economic and other issues confronting them. To enable
them to make a proper judgment on those issues, they must have the benefit of a range of opinions on
those issues. Right to receive and impart information is implicit in free speech. This, right to receive
information is, however, not absolute but is subject to reasonable restrictions which may be imposed by
the Government in public interest.

4. Distributed denial of services attack:

The cyber terrorists may also use the method of distributed denial of services (DDOS) to overburden the
Government and its agencies electronic bases. This is made possible by first infecting several unprotected
computers by way of virus attacks and then taking control of them. Once control is obtained, they can be
manipulated from any locality by the terrorists. These infected computers are then made to send
information or demand in such a large number that the server of the victim collapses. Further, due to this
unnecessary Internet traffic the legitimate traffic is prohibited from reaching the Government or its
agencies computers. This results in immense pecuniary and strategic loss to the government and its
agencies.
It must be noted that thousands of compromised computers can be used to simultaneously attack a single
host, thus making its electronic existence invisible to the genuine and legitimate citizens and end users.
The law in this regard is crystal clear.

5. Network damage and disruptions:

The main aim of cyber terrorist activities is to cause networks damage and their disruptions. This activity
may divert the attention of the security agencies for the time being thus giving the terrorists extra time and
makes their task comparatively easier. This process may involve a combination of computer tampering,
virus attacks, hacking, etc.

In India Information Technology Act, 2000 deals with the cyber crime problems. It has some positive as well as negative aspects.

 

Positive Aspects of the IT Act, 2000:

1. Prior to the enactment of the IT Act, 2000 even an e-mail was not accepted under the prevailing
statutes of India as an accepted legal form of communication and as evidence in a court of law. But the IT
Act, 2000 changed this scenario by legal recognition of the electronic format. Indeed, the IT Act, 2000 is
a step forward.
2. From the perspective of the corporate sector, companies shall be able to carry out electronic commerce
using the legal infrastructure provided by the IT Act, 2000. Till the coming into effect of the Indian Cyber
law, the growth of electronic commerce was impeded in our country basically because there was no legal
infrastructure to regulate commercial transactions online.
3. Corporate will now be able to use digital signatures to carry out their transactions online. These digital
signatures have been given legal validity and sanction under the IT Act, 2000.
4. In today’s scenario, information is stored by the companies on their respective computer system, apart
from maintaining a back up. Under the IT Act, 2000, it shall now be possible for corporate to have a
statutory remedy if any one breaks into their computer systems or networks and causes damages or copies
data. The remedy provided by the IT Act, 2000 is in the form of monetary damages, by the way of
compensation, not exceeding Rs. 1, 00, 00,000.
5. IT Act, 2000 has defined various cyber crimes which includes hacking and damage to the computer
code. Prior to the coming into effect of the Indian Cyber law, the corporate were helpless as there was no
legal redress for such issues. But the IT Act, 2000 changes the scene altogether.

The Grey Areas of the IT Act, 2000:

1. The IT Act, 2000 is likely to cause a conflict of jurisdiction.
2. Electronic commerce is based on the system of domain names. The IT Act, 2000 does not even touch
the issues relating to domain names. Even domain names have not been defined and the rights and
liabilities of domain name owners do not find any mention in the law.
3. The IT Act, 2000 does not deal with any issues concerning the protection of Intellectual Property
Rights I the context of the online environment. Contentious yet very important issues concerning online
copyrights, trademarks and patents have been left untouched by the law, thereby leaving many loopholes.
4. As the cyber law is growing, so are the new forms and manifestations of cyber crimes. The offences
defined in the IT Act, 2000 are by no means exhaustive. However, the drafting of the relevant provisions
of the IT Act, 2000 makes it appear as if the offences detailed therein are the only cyber offences possible
and existing. The IT Act, 2000 does not cove various kinds of cyber crimes and Internet related crimes.
This Include:-

a) Theft of Internet hours
b) Cyber theft   c) Cyber stalking  d) Cyber harassment   e) Cyber fraud g) Misuse of credit card numbers h) Chat room abuse 5. The IT Act, 2000 has not tackled several vital issues pertaining to e-commerce sphere like privacy.