There are about 600 crores people in the world. If we divide total population of the world in 12 parts we arrive at figure of 50 crores. Predictions on the basis of sun signs means predicting same for 50 crores people of different age, cast, creed & religion. Whereas FACT IS TWO TWINS ARE DIFFERENT.
According to the principles of Nadi Astrology the Zodiac is divided into 12 equal sub divisions of Signs with equal subdivisions of the 27 Nakshatras. These Nakshatras are further subdivided into unequal "Sub lords". Nadi Astrology lays greater emphasis on the sub lord which is stronger than the Nakshatra & in the same sequence the Nakshatra is stronger than the Planet.
The experience shows that the system of study of Astrology through the Sign, Nakshatra & Sub lord gives most accurate results because this system judges every planet on three platforms. This system cast's the horoscope of the native by taking date, time & place of birth by drawing Lagan chart & Nirayana Bhava chalit chart. For predicting each event not a single House but combination of Houses is taken into consideration. For Timing each event Vimshottari Dasa is used with Transits.
Saturday, November 18, 2006
WHAT IS MY MOON SIGN (RAASI) ?
WHAT IS MY MOON SIGN (RAASI) ?
" WHY DO WE USE THE MOON SIGN INSTEAD OF SUN SIGN / ZODIAC SIGN "
In Astrology Moon is the signifactor of the MIND. Since Moon is the HEAVENLY BODY CLOSEST TO THE EARTH, the magnetic influences of all other planets reach EARTH through the Moon.
Also since the mind is ruled by Moon and all influences on the HUMAN BEING whether PHYSICAL, MENTAL, PSCHYOLOGICAL OR SUPERNATURAL effect the HUMAN MIND. The HUMAN BODY which is ruled by SUN may or may not respond to the mental / psychological / supernatural influences.
THIS IS THE REASON THAT INDIAN ASTROLOGY RECKONS THE PLANETORY MOVEMENTS BASED ON YOUR MOON SIGN (RAASI).
" WHY DO WE USE THE MOON SIGN INSTEAD OF SUN SIGN / ZODIAC SIGN "
In Astrology Moon is the signifactor of the MIND. Since Moon is the HEAVENLY BODY CLOSEST TO THE EARTH, the magnetic influences of all other planets reach EARTH through the Moon.
Also since the mind is ruled by Moon and all influences on the HUMAN BEING whether PHYSICAL, MENTAL, PSCHYOLOGICAL OR SUPERNATURAL effect the HUMAN MIND. The HUMAN BODY which is ruled by SUN may or may not respond to the mental / psychological / supernatural influences.
THIS IS THE REASON THAT INDIAN ASTROLOGY RECKONS THE PLANETORY MOVEMENTS BASED ON YOUR MOON SIGN (RAASI).
What is sun sign ?
Western astrology employs the tropical zodiac which divides the ecliptic into twelve signs of equal length starting at the first point of Aries, which is defined as the point at which the ecliptic (the apparent path of the Sun through the heavens) crosses the celestial equator at the spring equinox. It is important to note that these signs are completely independent of the astronomical constellations after which they were originally named and no longer bear any relationship to them
What is vedic astrology ?
Jyotish, referring to jyot, or "light" and "isha", or "lord", is the contemplation of the divinity expressing as time and space. Also known as Vedic astrology, it is the extant form of ancient astrology still practiced in India. Jyotish is the instructional element of the Rig Veda, and as such is a Vedanga, or "body part" of the Vedas. Jyotish is called the Eye of the Veda, for its ability to see into the future. ...
What is Numerology?
By Anupam V Kapil
-Numerology is the study of numbers, and the occult manner in which they reflect certain aptitudes and character tendencies, as an integral part of the cosmic plan. Each letter has a numeric value that provides a related cosmic vibration. The sum of the numbers in your birth date and the sum of value derived from the letters in the name provide an interrelation of vibrations. These numbers show a great deal about character, purpose in life, what motivates, and where talents may lie. Experts in numerology use the numbers to determine the best time for major moves and activities in life. Numerology is used to decide when to invest, when to marry, when to travel, when to change jobs, or relocate. I'm not claiming that this website is going to make an expert of you so that all these questions can be answered, but we can at least get you on the way.
The first question I asked when numerology was exposed to me was why does it work. The second question was how does it work. Well, if we could answer these questions it wouldn't be an occult study, would it? Is it a God force? Do numbers have vibrations or something like that? Who knows? Just be objective and give it a try.
Pythagoras, the Greek mathematician who live from 569-470 B.C., is said by many to be the originator of much of what we call numerology today. The actual origins of numerology predate Pythagoras, the most popular being the very old Hebrew Kabbala. In the twentieth century, the old science seems to magically reappear in the form of a series of books published from 1911-1917 by L. Dow Ballet and it was helped along in the 30s by Florence Campbell, and within the next few decades a wealth of literature was available to the public. Indeed, if you look at the past 90 years, it would seem that the science has moved very rapidly. But perhaps all of this was known at a much earlier time, and it was just hiding from us for a while.
Introduction to numerology attempts to explain the basics of this interesting discipline. It teaches how to change the letters in your name to numbers which reveal much about your personality and potentials. You'll get the feel of the numbers from the thumbnail sketch in the numerology keywords. Next you'll find a worksheet to help get organized and prepared for the task of assembling a complete reading of the numbers in your name and birth date. Following the format template, you'll be able to set up a reading that will include your Life Path number and the lifepath periods, your Expression number, your Soul Urge, birthday, inner dreams, pinnacles, challenges, gifts and limitations. Your personal year will lend clues as to what kind of a year to expect this year and next.
-Numerology is the study of numbers, and the occult manner in which they reflect certain aptitudes and character tendencies, as an integral part of the cosmic plan. Each letter has a numeric value that provides a related cosmic vibration. The sum of the numbers in your birth date and the sum of value derived from the letters in the name provide an interrelation of vibrations. These numbers show a great deal about character, purpose in life, what motivates, and where talents may lie. Experts in numerology use the numbers to determine the best time for major moves and activities in life. Numerology is used to decide when to invest, when to marry, when to travel, when to change jobs, or relocate. I'm not claiming that this website is going to make an expert of you so that all these questions can be answered, but we can at least get you on the way.
The first question I asked when numerology was exposed to me was why does it work. The second question was how does it work. Well, if we could answer these questions it wouldn't be an occult study, would it? Is it a God force? Do numbers have vibrations or something like that? Who knows? Just be objective and give it a try.
Pythagoras, the Greek mathematician who live from 569-470 B.C., is said by many to be the originator of much of what we call numerology today. The actual origins of numerology predate Pythagoras, the most popular being the very old Hebrew Kabbala. In the twentieth century, the old science seems to magically reappear in the form of a series of books published from 1911-1917 by L. Dow Ballet and it was helped along in the 30s by Florence Campbell, and within the next few decades a wealth of literature was available to the public. Indeed, if you look at the past 90 years, it would seem that the science has moved very rapidly. But perhaps all of this was known at a much earlier time, and it was just hiding from us for a while.
Introduction to numerology attempts to explain the basics of this interesting discipline. It teaches how to change the letters in your name to numbers which reveal much about your personality and potentials. You'll get the feel of the numbers from the thumbnail sketch in the numerology keywords. Next you'll find a worksheet to help get organized and prepared for the task of assembling a complete reading of the numbers in your name and birth date. Following the format template, you'll be able to set up a reading that will include your Life Path number and the lifepath periods, your Expression number, your Soul Urge, birthday, inner dreams, pinnacles, challenges, gifts and limitations. Your personal year will lend clues as to what kind of a year to expect this year and next.
What is palmistry?
What is palmistry?
Palmistry is a method of counselling that originated in India over 3,000 years ago. It is a part of a vast field of study, referred to as Samudrik Shastra, which literally means the ocean of knowledge. Palmistry is a sub-section of Samudrik Shastra and deals specifically with the study of the hand.
Is palmistry fortune-telling?
In a word: no. The original intent of palmistry was for personality assessment and counselling. One's emotional tendencies, social attitudes, conscious awareness and subconscious fears, blockages and strengths can be understood in great detail through this in-depth system.
Can you make predictions through palmistry?
You cannot make predictions with palmistry. However, since there is a definate mind-body connection, we know that negative or positive thinking affects our well-being. As well, due to our habitual way of thinking, we often repeat the same behaviour in the future as we exhibit in the present. If we can understand the pattern of our habits and thinking, then we can begin to isolate the negative cycles of behaviour and can replace them with positive new ones. Palmistry can help you see these patterns. With this information, you can shape own destiny.
How does palmistry work?
Palmistry is best seen as a dynamic process. The lines of the hand are not carved in stone. Since the lines of the hand reflect our thinking, as our attitudes and behaviour patterns change, the lines reflect these changes. The lines physically change as our thinking changes. In fact, you can see distinct changes in as little as three months.
Which hand do you read?
It is important to look at both hands during a reading. Depending on which hand is active (usually seen as the hand you write with),in combination with the inactive hand, shows where you have been (passive),and where you are likely headed (active) in this life.
Palmistry is a method of counselling that originated in India over 3,000 years ago. It is a part of a vast field of study, referred to as Samudrik Shastra, which literally means the ocean of knowledge. Palmistry is a sub-section of Samudrik Shastra and deals specifically with the study of the hand.
Is palmistry fortune-telling?
In a word: no. The original intent of palmistry was for personality assessment and counselling. One's emotional tendencies, social attitudes, conscious awareness and subconscious fears, blockages and strengths can be understood in great detail through this in-depth system.
Can you make predictions through palmistry?
You cannot make predictions with palmistry. However, since there is a definate mind-body connection, we know that negative or positive thinking affects our well-being. As well, due to our habitual way of thinking, we often repeat the same behaviour in the future as we exhibit in the present. If we can understand the pattern of our habits and thinking, then we can begin to isolate the negative cycles of behaviour and can replace them with positive new ones. Palmistry can help you see these patterns. With this information, you can shape own destiny.
How does palmistry work?
Palmistry is best seen as a dynamic process. The lines of the hand are not carved in stone. Since the lines of the hand reflect our thinking, as our attitudes and behaviour patterns change, the lines reflect these changes. The lines physically change as our thinking changes. In fact, you can see distinct changes in as little as three months.
Which hand do you read?
It is important to look at both hands during a reading. Depending on which hand is active (usually seen as the hand you write with),in combination with the inactive hand, shows where you have been (passive),and where you are likely headed (active) in this life.
What is zodiac sign ?
Western astrology employs the tropical zodiac which divides the ecliptic into twelve signs of equal length starting at the first point of Aries, which is defined as the point at which the ecliptic (the apparent path of the Sun through the heavens) crosses the celestial equator at the spring equinox. It is important to note that these signs are completely independent of the astronomical constellations after which they were originally named and no longer bear any relationship to them.
WHAT IS A BIRTHCHART?
WHAT IS A BIRTHCHART?
Each moment in time has its own unique signature reflected in the arrangement of the Sun, Moon, and Planets. The Birthchart, also referred to as the Natal Chart, is a pictorial representation of the positions of the Sun, Moon and Planets in relation to each other. The chart is drawn from the perspective of the exact Time, Date, and Geographical Location of your birth.
The chart is drawn as a circle because it is a symbol of wholeness.
Each of us is born with a particular planetary configuration.
Every parent knows that a child is born with a very definite personality.
A good Astrologer empowers clients by helping them to recognize and acknowledge all the disparate parts of themselves and to find ways to accommodate and honour all of those parts.
The patterns created by the Planets (and the Sun and Moon) represent the structure of the mind. Each of them symbolizes a particular psychological function; Moon, emotional nature;
Mercury, intellect; Venus, capacity for intimacy; and so on.
In order to understand how each of these Planets operates, it must be seen in the context of a Sign and House placement. The Signs provide descriptions of certain characteristics and qualities, while the Houses describe arenas of Life Experience.
Put very simply, the Planets describe the What, the Signs the How and Why, and the Houses where the Energies will be Felt and Expressed. As with each person, each Birthchart is unique. While each chart contains the same components, those components take on an infinite variety of arrangements.
A Birthchart is like a blueprint, a map.
It describes your inherent personality traits and the lens through which you perceive your reality.
Each moment in time has its own unique signature reflected in the arrangement of the Sun, Moon, and Planets. The Birthchart, also referred to as the Natal Chart, is a pictorial representation of the positions of the Sun, Moon and Planets in relation to each other. The chart is drawn from the perspective of the exact Time, Date, and Geographical Location of your birth.
The chart is drawn as a circle because it is a symbol of wholeness.
Each of us is born with a particular planetary configuration.
Every parent knows that a child is born with a very definite personality.
A good Astrologer empowers clients by helping them to recognize and acknowledge all the disparate parts of themselves and to find ways to accommodate and honour all of those parts.
The patterns created by the Planets (and the Sun and Moon) represent the structure of the mind. Each of them symbolizes a particular psychological function; Moon, emotional nature;
Mercury, intellect; Venus, capacity for intimacy; and so on.
In order to understand how each of these Planets operates, it must be seen in the context of a Sign and House placement. The Signs provide descriptions of certain characteristics and qualities, while the Houses describe arenas of Life Experience.
Put very simply, the Planets describe the What, the Signs the How and Why, and the Houses where the Energies will be Felt and Expressed. As with each person, each Birthchart is unique. While each chart contains the same components, those components take on an infinite variety of arrangements.
A Birthchart is like a blueprint, a map.
It describes your inherent personality traits and the lens through which you perceive your reality.
Each moment in time has its own unique signature reflected in the arrangement of the Sun, Moon, and Planets. The Birthchart, also referred to as the Natal Chart, is a pictorial representation of the positions of the Sun, Moon and Planets in relation to each other. The chart is drawn from the perspective of the exact Time, Date, and Geographical Location of your birth.
The chart is drawn as a circle because it is a symbol of wholeness.
Each of us is born with a particular planetary configuration.
Every parent knows that a child is born with a very definite personality.
A good Astrologer empowers clients by helping them to recognize and acknowledge all the disparate parts of themselves and to find ways to accommodate and honour all of those parts.
The patterns created by the Planets (and the Sun and Moon) represent the structure of the mind. Each of them symbolizes a particular psychological function; Moon, emotional nature;
Mercury, intellect; Venus, capacity for intimacy; and so on.
In order to understand how each of these Planets operates, it must be seen in the context of a Sign and House placement. The Signs provide descriptions of certain characteristics and qualities, while the Houses describe arenas of Life Experience.
Put very simply, the Planets describe the What, the Signs the How and Why, and the Houses where the Energies will be Felt and Expressed. As with each person, each Birthchart is unique. While each chart contains the same components, those components take on an infinite variety of arrangements.
A Birthchart is like a blueprint, a map.
It describes your inherent personality traits and the lens through which you perceive your reality.
Each moment in time has its own unique signature reflected in the arrangement of the Sun, Moon, and Planets. The Birthchart, also referred to as the Natal Chart, is a pictorial representation of the positions of the Sun, Moon and Planets in relation to each other. The chart is drawn from the perspective of the exact Time, Date, and Geographical Location of your birth.
The chart is drawn as a circle because it is a symbol of wholeness.
Each of us is born with a particular planetary configuration.
Every parent knows that a child is born with a very definite personality.
A good Astrologer empowers clients by helping them to recognize and acknowledge all the disparate parts of themselves and to find ways to accommodate and honour all of those parts.
The patterns created by the Planets (and the Sun and Moon) represent the structure of the mind. Each of them symbolizes a particular psychological function; Moon, emotional nature;
Mercury, intellect; Venus, capacity for intimacy; and so on.
In order to understand how each of these Planets operates, it must be seen in the context of a Sign and House placement. The Signs provide descriptions of certain characteristics and qualities, while the Houses describe arenas of Life Experience.
Put very simply, the Planets describe the What, the Signs the How and Why, and the Houses where the Energies will be Felt and Expressed. As with each person, each Birthchart is unique. While each chart contains the same components, those components take on an infinite variety of arrangements.
A Birthchart is like a blueprint, a map.
It describes your inherent personality traits and the lens through which you perceive your reality.
What is horoscope ?
From the Greek words hora, meaning "hour" and skopos, meaning "watcher", a horoscope is a diagram of the heavens, specifically the Zodiac, which charts positions of the Sun, Moon and planets as they appeared at a given moment and in relation to a given place on earth. The word Horoscope also refers to the analysis and interpretation of that chart. Today, the term Horoscope has come to mean the daily prediction for Sun signs, found in Newspapers, Magazines and the internet.
What is astrology ?
Astrology is a long-established method of exploring ourselves, our relationships and our place within the world. It works by taking a look at the significant environmental influences operating in a particular place at a given time - as expressed through the horoscope in the symbolic relationships of the heavenly bodies. Astrology, the science of the stars, can give us insight into all manner of situations, from the personal to the political and from the most intim
What is Article Marketing?
What is Article Marketing?
Simply put article marketing is advertising your web site through the use of articles. This choose of advertising is preferable over others for the simple fact that it's free. There are many article directories that allow you to submit your articles for free. They allow you to have a resource box at the end of your article that you can plug your site and products with. Not only that but if you are into building links this is a great way of doing it. If your article is chosen by publishers they will republish your article on there websites giving you even more publicity and exposure. A well written article can give you massive exposure.
Can't write? There are services that will "ghost write" an article for you. Avoid purchasing article packs, these are pre written articles that you can purchase, slap your name on them and publishes them. The reason I say avoid such means is that you want your articles to be original, not something thousands of other people have put there names on previously. Besides, most article directories know these articles by heart and reject them on sight. So make sure your work is original.
Avoid a strong sales pitch. Start off with a hard sales pitch will only discourage potential customers. There will be plenty of space to pitch to them in your resource box. Show your knowledge of the subject and give your readers valuable information pertaining to the subject. If the reader sees the professionalism of your work they will be more inclined to read the entire article and visit your links.
Research and construct a list of all the free article directories you can find so that you can simply submit your articles to the sites on your list when you've finished writing. There are tons of these directories to chose from. Instead of submitting to all of them (unless you have the time) submit your article to the most important ones on your list. Be sure to carefully read the terms of service and editorial guidelines of each directory and format your article accordingly. The more articles you write, the better your chances are of getting visitors to your site. Article marketing is a great way to increase your name recognition and build links to your site so give it a try. Who knows, you might like it.
Simply put article marketing is advertising your web site through the use of articles. This choose of advertising is preferable over others for the simple fact that it's free. There are many article directories that allow you to submit your articles for free. They allow you to have a resource box at the end of your article that you can plug your site and products with. Not only that but if you are into building links this is a great way of doing it. If your article is chosen by publishers they will republish your article on there websites giving you even more publicity and exposure. A well written article can give you massive exposure.
Can't write? There are services that will "ghost write" an article for you. Avoid purchasing article packs, these are pre written articles that you can purchase, slap your name on them and publishes them. The reason I say avoid such means is that you want your articles to be original, not something thousands of other people have put there names on previously. Besides, most article directories know these articles by heart and reject them on sight. So make sure your work is original.
Avoid a strong sales pitch. Start off with a hard sales pitch will only discourage potential customers. There will be plenty of space to pitch to them in your resource box. Show your knowledge of the subject and give your readers valuable information pertaining to the subject. If the reader sees the professionalism of your work they will be more inclined to read the entire article and visit your links.
Research and construct a list of all the free article directories you can find so that you can simply submit your articles to the sites on your list when you've finished writing. There are tons of these directories to chose from. Instead of submitting to all of them (unless you have the time) submit your article to the most important ones on your list. Be sure to carefully read the terms of service and editorial guidelines of each directory and format your article accordingly. The more articles you write, the better your chances are of getting visitors to your site. Article marketing is a great way to increase your name recognition and build links to your site so give it a try. Who knows, you might like it.
What is Art .... ?
ART has not always been what we think it is today. An object regarded as Art today may not have been perceived as such when it was first made, nor was the person who made it necessarily regarded as an artist. Both the notion of "art" and the idea of the "artist" are relatively modern terms.
Many of the objects we identify as art today -- Greek painted pottery, medieval manuscript illuminations, and so on -- were made in times and places when people had no concept of "art" as we understand the term. These objects may have been appreciated in various ways and often admired, but not as "art" in the current sense.
ART lacks a satisfactory definition. It is easier to describe it as the way something is done -- "the use of skill and imagination in the creation of aesthetic objects, environments, or experiences that can be shared with others" (Britannica Online) -- rather than what it is.
The idea of an object being a "work of art" emerges, together with the concept of the Artist, in the 15th and 16th centuries in Italy.
During the Renaissance, the word Art emerges as a collective term encompassing Painting, Sculpture, and Architecture, a grouping given currency by the Italian artist and biographer Giorgio Vasari in the 16th century. Subsequently, this grouping was expanded to include Music and Poetry which became known in the 18th century as the 'Fine Arts'. These five Arts have formed an irreducible nucleus from which have been generally excluded the 'decorative arts' and 'crafts', such as as pottery, weaving, metalworking, and furniture making, all of which have utility as an end.
But how did Art become distinguished from the decorative arts and crafts? How and why is an artist different from a craftsperson?
In the Ancient World and Middle Ages the word we would translate as 'art' today was applied to any activity governed by rules. Painting and sculpture were included among a number of human activities, such as shoemaking and weaving, which today we would call crafts.
During the Renaissance, there emerged a more exalted perception of art, and a concomitant rise in the social status of the artist. The painter and the sculptor were now seen to be subject to inspiration and their activities equated with those of the poet and the musician.
In the latter half of the 16th century the first academies of art were founded, first in Italy, then in France, and later elsewhere. Academies took on the task of educating the artist through a course of instruction that included such subjects as geometry and anatomy. Out of the academies emerged the term "Fine Arts" which held to a very narrow definition of what constituted art.
The institutionalizing of art in the academies eventually provoked a reaction to its strictures and definitions in the 19th century at which time new claims were made about the nature of painting and sculpture. By the middle of the century, "modernist" approaches were introduced which adopted new subject matter and new painterly values. In large measure, the modern artists rejected, or contradicted, the standards and principles of the academies and the Renaissance tradition. By the end of the 19th century and the beginning of the 20th, artists began to formulate the notion of truth to one's materials, recognizing that paint is pigment and the canvas a two-dimensional surface. At this time the call also went up for "Art for Art's Sake."
In the early 20th century all traditional notions of the identity of the artist and of art were thrown into disarray by Marcel Duchamp and his Dada associates. In ironic mockery of the Renaissance tradition which had placed the artist in an exalted authoritative position, Duchamp, as an artist, declared that anything the artist produces is art. For the duration of the 20th century, this position has complicated and undermined how art is perceived but at the same time it has fostered a broader, more inclusive assessment of art.
Many of the objects we identify as art today -- Greek painted pottery, medieval manuscript illuminations, and so on -- were made in times and places when people had no concept of "art" as we understand the term. These objects may have been appreciated in various ways and often admired, but not as "art" in the current sense.
ART lacks a satisfactory definition. It is easier to describe it as the way something is done -- "the use of skill and imagination in the creation of aesthetic objects, environments, or experiences that can be shared with others" (Britannica Online) -- rather than what it is.
The idea of an object being a "work of art" emerges, together with the concept of the Artist, in the 15th and 16th centuries in Italy.
During the Renaissance, the word Art emerges as a collective term encompassing Painting, Sculpture, and Architecture, a grouping given currency by the Italian artist and biographer Giorgio Vasari in the 16th century. Subsequently, this grouping was expanded to include Music and Poetry which became known in the 18th century as the 'Fine Arts'. These five Arts have formed an irreducible nucleus from which have been generally excluded the 'decorative arts' and 'crafts', such as as pottery, weaving, metalworking, and furniture making, all of which have utility as an end.
But how did Art become distinguished from the decorative arts and crafts? How and why is an artist different from a craftsperson?
In the Ancient World and Middle Ages the word we would translate as 'art' today was applied to any activity governed by rules. Painting and sculpture were included among a number of human activities, such as shoemaking and weaving, which today we would call crafts.
During the Renaissance, there emerged a more exalted perception of art, and a concomitant rise in the social status of the artist. The painter and the sculptor were now seen to be subject to inspiration and their activities equated with those of the poet and the musician.
In the latter half of the 16th century the first academies of art were founded, first in Italy, then in France, and later elsewhere. Academies took on the task of educating the artist through a course of instruction that included such subjects as geometry and anatomy. Out of the academies emerged the term "Fine Arts" which held to a very narrow definition of what constituted art.
The institutionalizing of art in the academies eventually provoked a reaction to its strictures and definitions in the 19th century at which time new claims were made about the nature of painting and sculpture. By the middle of the century, "modernist" approaches were introduced which adopted new subject matter and new painterly values. In large measure, the modern artists rejected, or contradicted, the standards and principles of the academies and the Renaissance tradition. By the end of the 19th century and the beginning of the 20th, artists began to formulate the notion of truth to one's materials, recognizing that paint is pigment and the canvas a two-dimensional surface. At this time the call also went up for "Art for Art's Sake."
In the early 20th century all traditional notions of the identity of the artist and of art were thrown into disarray by Marcel Duchamp and his Dada associates. In ironic mockery of the Renaissance tradition which had placed the artist in an exalted authoritative position, Duchamp, as an artist, declared that anything the artist produces is art. For the duration of the 20th century, this position has complicated and undermined how art is perceived but at the same time it has fostered a broader, more inclusive assessment of art.
What is Animal Abuse?
When you think of animal abuse you may only think of people beating their animals or not feeding their animals, but there is so much more to it. Legally, some of these things may not be considered “abuse” but they should be!
People should not leave their pets tied up outside year round, or loose outside. This should be animal abuse. Domesticated pets are bred to live in doors not outside. Yes, you should take your dogs out for walks or have a fenced yard for them to play in, but that shouldn’t be their permanent home. They are not wild animals that are made to survive the different weather changes. Ask yourself this: would you leave your child tied up outside with an open doghouse to sleep in during rain and snow? Would you want to be left in that situation? If for some reason you have a pet that once you were able to keep in the house with you and are now no longer able there are many resources in which to find your pet a good home that doesn’t consist of living outside for the rest of it’s life. Try finding a family member or friend that will take the pet of your hands or research some shelters that can find the pet a new home for you. If it is an older pet that you are worried may not get adopted out wouldn’t it be better the animal go to a shelter and get put to sleep peacefully than be forced to live the last of it’s life freezing or burning up outside?
Another form of animal abuse that should be more widely considered is not taking your pet to the vet for regular check-ups and vaccinations. Domesticated animals, just like humans, need to see their doctor (in the animals case, their veterinarian) regularly to ensure optimal health. If you do not get your dogs and cats vaccinated they are susceptible to numerous illnesses and diseases that can be fatal and easily transferred to other pets. When you start to come down with something don’t you go to the doctor? When it is time for your children to go to school don’t you take them for their annual vaccinations? Most people think of their pets as family members, but this should be something done by all people, not just most.
As you now see, animal abuse doesn’t have to just entail someone beating or starving his or her pet. Treat your pet like they are a valuable member of your family and take care of them as such! They will thank you for it with cuddles and kisses!
Bookmark this page (?)
People should not leave their pets tied up outside year round, or loose outside. This should be animal abuse. Domesticated pets are bred to live in doors not outside. Yes, you should take your dogs out for walks or have a fenced yard for them to play in, but that shouldn’t be their permanent home. They are not wild animals that are made to survive the different weather changes. Ask yourself this: would you leave your child tied up outside with an open doghouse to sleep in during rain and snow? Would you want to be left in that situation? If for some reason you have a pet that once you were able to keep in the house with you and are now no longer able there are many resources in which to find your pet a good home that doesn’t consist of living outside for the rest of it’s life. Try finding a family member or friend that will take the pet of your hands or research some shelters that can find the pet a new home for you. If it is an older pet that you are worried may not get adopted out wouldn’t it be better the animal go to a shelter and get put to sleep peacefully than be forced to live the last of it’s life freezing or burning up outside?
Another form of animal abuse that should be more widely considered is not taking your pet to the vet for regular check-ups and vaccinations. Domesticated animals, just like humans, need to see their doctor (in the animals case, their veterinarian) regularly to ensure optimal health. If you do not get your dogs and cats vaccinated they are susceptible to numerous illnesses and diseases that can be fatal and easily transferred to other pets. When you start to come down with something don’t you go to the doctor? When it is time for your children to go to school don’t you take them for their annual vaccinations? Most people think of their pets as family members, but this should be something done by all people, not just most.
As you now see, animal abuse doesn’t have to just entail someone beating or starving his or her pet. Treat your pet like they are a valuable member of your family and take care of them as such! They will thank you for it with cuddles and kisses!
Bookmark this page (?)
What is alternative medicine?
The term alternative medicine is commonly used to refer to all types on non-mainstream medicine. Other terms commonly used in the same way are holistic medicine, natural medicine and integrated or integrative medicine.
However, strictly speaking alternative medicine is an alternative to mainstream medicine. Alternative therapies include
* osteopathy, and
* chiropractic.
Complementary medicine complements mainstream medicine. It includes a wide range of disciplines including
* acupuncture,
* Alexander technique,
* aromatherapy,
* reiki,
* herbal medicine,
* homeopathy,
* hypnotherapy,
* massage therapies,
* naturopathy and nutrition,
* reflexology, and many more.
Together complementary and alternative medicine are known as CAM. The CAM disciplines tend to treat the patient as a whole, rather than treating a specific ailment, recognising the link between mind and body in maintaining health. This is where the terms holistic medicine and integrative medicine originate. Additionally many of the therapies use natural substances and non-invasive techniques, leading to the term natural medicine.
Although complementary medicine and alternative medicine by their definition fall outside of orthodox medicine, some GP's, nurses and other traditionally trained health professionals may also train in and practise in a complementary discipline. Additionally there are many therapists who are qualified to practise one or many of the CAM therapies.
"
However, strictly speaking alternative medicine is an alternative to mainstream medicine. Alternative therapies include
* osteopathy, and
* chiropractic.
Complementary medicine complements mainstream medicine. It includes a wide range of disciplines including
* acupuncture,
* Alexander technique,
* aromatherapy,
* reiki,
* herbal medicine,
* homeopathy,
* hypnotherapy,
* massage therapies,
* naturopathy and nutrition,
* reflexology, and many more.
Together complementary and alternative medicine are known as CAM. The CAM disciplines tend to treat the patient as a whole, rather than treating a specific ailment, recognising the link between mind and body in maintaining health. This is where the terms holistic medicine and integrative medicine originate. Additionally many of the therapies use natural substances and non-invasive techniques, leading to the term natural medicine.
Although complementary medicine and alternative medicine by their definition fall outside of orthodox medicine, some GP's, nurses and other traditionally trained health professionals may also train in and practise in a complementary discipline. Additionally there are many therapists who are qualified to practise one or many of the CAM therapies.
"
What is Affiliate Marketing?
If you've been online for any length of time, you may have heard terms you're not familiar with. The most common is "Affiliate Marketing" but you could have heard references to other variations as well, such as Affiliate Programs, Associate Programs, and just plain affiliate or associates.
So what exactly do these terms mean? Well quite simply, affiliate marketing is a way to make money online just by promoting other people's products. You don't have to create a product of your own, and you don't have to find wholesalers to buy products from either.
Instead, you simply find online stores and services which offer an affiliate program. Then you sign up for that program - and signing up for an affiliate program is usually free by the way.
Once you've signed up for the affiliate program, you usually have a special login area where you can go to get ready made ads for promoting the store or service you've signed up with. Now, there are many types of advertisements ready and waiting for you. Some affiliate programs will only have a few, but some will have many.
Some of the types of advertisements they'll have available for you to use include website banners and buttons, product pictures, pre-written emails, and pre-written articles.
I won't go into the details of how to use each of these yet, but suffice it to say that most affiliate programs have tools to make getting started much easier for you.
Once you've signed up for the affiliate program you'll want to start promoting it. There are tons of ways to do this online easily, cheaply, and often even for free. The goal for you is to get targeted traffic to the affiliate program you signed up with. And when people buy a product or service through your affiliate link, you'll earn money.
This money is referred to as sales commissions. In fact, affiliate programs are very much like independant sales jobs. You simply advertise or market the products and services to targeted consumers. And when those consumers make a purchase, you are credited with the sale.
Most affiliate programs pay once each month, but there are several which pay every two weeks. And a few only pay once every three months. I'd recommend avoiding those in the beginning, because it's discouraging to start earning money only to realize it will be months before that money actually reaches your bank account.
Using affiliate programs is a great way to get started making money online. And I'll go into much further details about how it all works in future articles.
So what exactly do these terms mean? Well quite simply, affiliate marketing is a way to make money online just by promoting other people's products. You don't have to create a product of your own, and you don't have to find wholesalers to buy products from either.
Instead, you simply find online stores and services which offer an affiliate program. Then you sign up for that program - and signing up for an affiliate program is usually free by the way.
Once you've signed up for the affiliate program, you usually have a special login area where you can go to get ready made ads for promoting the store or service you've signed up with. Now, there are many types of advertisements ready and waiting for you. Some affiliate programs will only have a few, but some will have many.
Some of the types of advertisements they'll have available for you to use include website banners and buttons, product pictures, pre-written emails, and pre-written articles.
I won't go into the details of how to use each of these yet, but suffice it to say that most affiliate programs have tools to make getting started much easier for you.
Once you've signed up for the affiliate program you'll want to start promoting it. There are tons of ways to do this online easily, cheaply, and often even for free. The goal for you is to get targeted traffic to the affiliate program you signed up with. And when people buy a product or service through your affiliate link, you'll earn money.
This money is referred to as sales commissions. In fact, affiliate programs are very much like independant sales jobs. You simply advertise or market the products and services to targeted consumers. And when those consumers make a purchase, you are credited with the sale.
Most affiliate programs pay once each month, but there are several which pay every two weeks. And a few only pay once every three months. I'd recommend avoiding those in the beginning, because it's discouraging to start earning money only to realize it will be months before that money actually reaches your bank account.
Using affiliate programs is a great way to get started making money online. And I'll go into much further details about how it all works in future articles.
What is Aerobics Cardio ?
Cardio is the medical term that refers the heart and the term aerobic denotes air or oxygen. So aerobics-cardio refers to the role of oxygen in maintaining the function of heart or energy generating process of heart. The flow of oxygen into lungs strengthens the heart muscle in pumping more and more blood into the heart or in other words improves the circulatory system. The articles here describes all kinds of information related to cardiovascular problems and their effective treatments by using cardio exercises that strengthen heart muscles, increase lung capacity, burn fats, increase HDL cholesterol (good cholesterol) and reduce calories. You can also find information about cardio vascular exercise equipments, advantages and disadvantages of those workouts, cardio workouts at home and many more.
What is Aerobic Exercise and Why should I do it?
What is Aerobic Exercise and Why should I do it?
by Lisa Balbach
Definition of Aerobics:
Using the same large muscle group, rhythmically, for a period of 15 to 20 minutes or longer while maintaining 60-80% of your maximum heart rate.
Think of aerobic activity as being long in duration yet low in intensity. Aerobic activities include: walking, biking, jogging, swimming, aerobic classes and cross-country skiing. Anaerobic activity is short in duration and high in intensity. Anaerobic activities include: racquetball, downhill skiing, weight lifting, sprinting, softball, soccer and football.
Aerobic means with air or oxygen. You should be able to carry on a short conversation while doing aerobic exercise. If you are gasping for air while talking, you are probably working anaerobically. When you work anaerobically, you will tire faster and are more likely to experience sore muscles after exercise is over.
Cardiovascular Benefits
Aerobic exercise conditions the heart and lungs by increasing the oxygen available to the body and by enabling the heart to use oxygen more efficiently. Exercise alone cannot prevent or cure heart disease. It is only one factor in a total program of risk reduction; examples of other factors are high blood pressure, cigarette smoking and high cholesterol level.
Additional Benefits of Aerobic Exercise
In addition to cardiovascular benefits, other benefits of aerobic exercise include:
- Control of body fat. (Aerobic exercise in conjunction with strength training and a proper diet will reduce body fat.)
- Increased resistance to fatigue and extra energy.
- Toned muscles and increased lean body mass.
- Decreased tension and aid in sleeping.
- Increased general stamina.
- Psychological benefits - exercise improves mood, reduces depression and anxiety.
Avoid the Aerobic Curve.
The aerobic curve occurs when you begin exercising, increase your intensity level, hit the high point and gradually decrease your intensity level. The goal when exercising aerobically is to hit your target heart rate and maintain it for the entire exercise session. This works the heart muscle more effectively and burns more calories. Think of riding a bike, running or swimming - you start, hit your pace (or target zone), then you maintain your pace until the cool down. As your heart becomes conditioned, you will have to work harder to reach the target zone. Less conditioned athletes will reach their target zones quickly because their heart muscle isn't used to the workload.
Aerobic Classes (step, hi/low, slide, interval etc...)
In an aerobic class, you can do moves in low intensity or high intensity. The level of intensity depends upon how high you bring your arms (not whether the class is low impact or high impact). Aerobic instructors should show class members how to do moves in high or low intensity. Participants should choose their own level of intensity dependent upon their level of fitness and how frequently they exercise.
If you are too tired to continue exercising in an aerobic class, march in place for a while until you can resume exercising. IT IS NOT OK to stop in the middle of an aerobic class because your body is sending extra blood to the muscles. Stopping suddenly can lead to muscle cramping and dizziness (this is why all aerobic classes have a cool down at the end of the aerobic section).
Exercise Frequency
Cardiovascular fitness is an ongoing process and requires consistent reinforcement. To maintain your current level of fitness you should do aerobic exercise at least 3 times a week. To increase your level of fitness, try exercising 4 to 5 times per week.
by Lisa Balbach
Definition of Aerobics:
Using the same large muscle group, rhythmically, for a period of 15 to 20 minutes or longer while maintaining 60-80% of your maximum heart rate.
Think of aerobic activity as being long in duration yet low in intensity. Aerobic activities include: walking, biking, jogging, swimming, aerobic classes and cross-country skiing. Anaerobic activity is short in duration and high in intensity. Anaerobic activities include: racquetball, downhill skiing, weight lifting, sprinting, softball, soccer and football.
Aerobic means with air or oxygen. You should be able to carry on a short conversation while doing aerobic exercise. If you are gasping for air while talking, you are probably working anaerobically. When you work anaerobically, you will tire faster and are more likely to experience sore muscles after exercise is over.
Cardiovascular Benefits
Aerobic exercise conditions the heart and lungs by increasing the oxygen available to the body and by enabling the heart to use oxygen more efficiently. Exercise alone cannot prevent or cure heart disease. It is only one factor in a total program of risk reduction; examples of other factors are high blood pressure, cigarette smoking and high cholesterol level.
Additional Benefits of Aerobic Exercise
In addition to cardiovascular benefits, other benefits of aerobic exercise include:
- Control of body fat. (Aerobic exercise in conjunction with strength training and a proper diet will reduce body fat.)
- Increased resistance to fatigue and extra energy.
- Toned muscles and increased lean body mass.
- Decreased tension and aid in sleeping.
- Increased general stamina.
- Psychological benefits - exercise improves mood, reduces depression and anxiety.
Avoid the Aerobic Curve.
The aerobic curve occurs when you begin exercising, increase your intensity level, hit the high point and gradually decrease your intensity level. The goal when exercising aerobically is to hit your target heart rate and maintain it for the entire exercise session. This works the heart muscle more effectively and burns more calories. Think of riding a bike, running or swimming - you start, hit your pace (or target zone), then you maintain your pace until the cool down. As your heart becomes conditioned, you will have to work harder to reach the target zone. Less conditioned athletes will reach their target zones quickly because their heart muscle isn't used to the workload.
Aerobic Classes (step, hi/low, slide, interval etc...)
In an aerobic class, you can do moves in low intensity or high intensity. The level of intensity depends upon how high you bring your arms (not whether the class is low impact or high impact). Aerobic instructors should show class members how to do moves in high or low intensity. Participants should choose their own level of intensity dependent upon their level of fitness and how frequently they exercise.
If you are too tired to continue exercising in an aerobic class, march in place for a while until you can resume exercising. IT IS NOT OK to stop in the middle of an aerobic class because your body is sending extra blood to the muscles. Stopping suddenly can lead to muscle cramping and dizziness (this is why all aerobic classes have a cool down at the end of the aerobic section).
Exercise Frequency
Cardiovascular fitness is an ongoing process and requires consistent reinforcement. To maintain your current level of fitness you should do aerobic exercise at least 3 times a week. To increase your level of fitness, try exercising 4 to 5 times per week.
by Lisa Balbach
Definition of Aerobics:
Using the same large muscle group, rhythmically, for a period of 15 to 20 minutes or longer while maintaining 60-80% of your maximum heart rate.
Think of aerobic activity as being long in duration yet low in intensity. Aerobic activities include: walking, biking, jogging, swimming, aerobic classes and cross-country skiing. Anaerobic activity is short in duration and high in intensity. Anaerobic activities include: racquetball, downhill skiing, weight lifting, sprinting, softball, soccer and football.
Aerobic means with air or oxygen. You should be able to carry on a short conversation while doing aerobic exercise. If you are gasping for air while talking, you are probably working anaerobically. When you work anaerobically, you will tire faster and are more likely to experience sore muscles after exercise is over.
Cardiovascular Benefits
Aerobic exercise conditions the heart and lungs by increasing the oxygen available to the body and by enabling the heart to use oxygen more efficiently. Exercise alone cannot prevent or cure heart disease. It is only one factor in a total program of risk reduction; examples of other factors are high blood pressure, cigarette smoking and high cholesterol level.
Additional Benefits of Aerobic Exercise
In addition to cardiovascular benefits, other benefits of aerobic exercise include:
- Control of body fat. (Aerobic exercise in conjunction with strength training and a proper diet will reduce body fat.)
- Increased resistance to fatigue and extra energy.
- Toned muscles and increased lean body mass.
- Decreased tension and aid in sleeping.
- Increased general stamina.
- Psychological benefits - exercise improves mood, reduces depression and anxiety.
Avoid the Aerobic Curve.
The aerobic curve occurs when you begin exercising, increase your intensity level, hit the high point and gradually decrease your intensity level. The goal when exercising aerobically is to hit your target heart rate and maintain it for the entire exercise session. This works the heart muscle more effectively and burns more calories. Think of riding a bike, running or swimming - you start, hit your pace (or target zone), then you maintain your pace until the cool down. As your heart becomes conditioned, you will have to work harder to reach the target zone. Less conditioned athletes will reach their target zones quickly because their heart muscle isn't used to the workload.
Aerobic Classes (step, hi/low, slide, interval etc...)
In an aerobic class, you can do moves in low intensity or high intensity. The level of intensity depends upon how high you bring your arms (not whether the class is low impact or high impact). Aerobic instructors should show class members how to do moves in high or low intensity. Participants should choose their own level of intensity dependent upon their level of fitness and how frequently they exercise.
If you are too tired to continue exercising in an aerobic class, march in place for a while until you can resume exercising. IT IS NOT OK to stop in the middle of an aerobic class because your body is sending extra blood to the muscles. Stopping suddenly can lead to muscle cramping and dizziness (this is why all aerobic classes have a cool down at the end of the aerobic section).
Exercise Frequency
Cardiovascular fitness is an ongoing process and requires consistent reinforcement. To maintain your current level of fitness you should do aerobic exercise at least 3 times a week. To increase your level of fitness, try exercising 4 to 5 times per week.
by Lisa Balbach
Definition of Aerobics:
Using the same large muscle group, rhythmically, for a period of 15 to 20 minutes or longer while maintaining 60-80% of your maximum heart rate.
Think of aerobic activity as being long in duration yet low in intensity. Aerobic activities include: walking, biking, jogging, swimming, aerobic classes and cross-country skiing. Anaerobic activity is short in duration and high in intensity. Anaerobic activities include: racquetball, downhill skiing, weight lifting, sprinting, softball, soccer and football.
Aerobic means with air or oxygen. You should be able to carry on a short conversation while doing aerobic exercise. If you are gasping for air while talking, you are probably working anaerobically. When you work anaerobically, you will tire faster and are more likely to experience sore muscles after exercise is over.
Cardiovascular Benefits
Aerobic exercise conditions the heart and lungs by increasing the oxygen available to the body and by enabling the heart to use oxygen more efficiently. Exercise alone cannot prevent or cure heart disease. It is only one factor in a total program of risk reduction; examples of other factors are high blood pressure, cigarette smoking and high cholesterol level.
Additional Benefits of Aerobic Exercise
In addition to cardiovascular benefits, other benefits of aerobic exercise include:
- Control of body fat. (Aerobic exercise in conjunction with strength training and a proper diet will reduce body fat.)
- Increased resistance to fatigue and extra energy.
- Toned muscles and increased lean body mass.
- Decreased tension and aid in sleeping.
- Increased general stamina.
- Psychological benefits - exercise improves mood, reduces depression and anxiety.
Avoid the Aerobic Curve.
The aerobic curve occurs when you begin exercising, increase your intensity level, hit the high point and gradually decrease your intensity level. The goal when exercising aerobically is to hit your target heart rate and maintain it for the entire exercise session. This works the heart muscle more effectively and burns more calories. Think of riding a bike, running or swimming - you start, hit your pace (or target zone), then you maintain your pace until the cool down. As your heart becomes conditioned, you will have to work harder to reach the target zone. Less conditioned athletes will reach their target zones quickly because their heart muscle isn't used to the workload.
Aerobic Classes (step, hi/low, slide, interval etc...)
In an aerobic class, you can do moves in low intensity or high intensity. The level of intensity depends upon how high you bring your arms (not whether the class is low impact or high impact). Aerobic instructors should show class members how to do moves in high or low intensity. Participants should choose their own level of intensity dependent upon their level of fitness and how frequently they exercise.
If you are too tired to continue exercising in an aerobic class, march in place for a while until you can resume exercising. IT IS NOT OK to stop in the middle of an aerobic class because your body is sending extra blood to the muscles. Stopping suddenly can lead to muscle cramping and dizziness (this is why all aerobic classes have a cool down at the end of the aerobic section).
Exercise Frequency
Cardiovascular fitness is an ongoing process and requires consistent reinforcement. To maintain your current level of fitness you should do aerobic exercise at least 3 times a week. To increase your level of fitness, try exercising 4 to 5 times per week.
What is Advertising?
What is Advertising?
Advertising is a non-personal form of promotion that is delivered through selected media outlets that, under most circumstances, require the marketer to pay for message placement. Advertising has long been viewed as a method of mass promotion in that a single message can reach a large number of people. But, this mass promotion approach presents problems since many exposed to an advertising message may not be within the marketer’s target market, and thus, may be an inefficient use of promotional funds. However, this is changing as new advertising technologies and the emergence of new media outlets offer more options for targeted advertising.
Advertising also has a history of being considered a one-way form of marketing communication where the message receiver (i.e., target market) is not in position to immediately respond to the message (e.g., seek more information). This too is changing. For example, in the next few years technologies will be readily available to enable a television viewer to click a button to request more details on a product seen on their favorite TV program. In fact, it is expected that over the next 10-20 years advertising will move away from a one-way communication model and become one that is highly interactive.
Another characteristic that may change as advertising evolves is the view that advertising does not stimulate immediate demand for the product advertised. That is, customers cannot quickly purchase a product they see advertised. But as more media outlets allow customers to interact with the messages being delivered the ability of advertising to quickly stimulate demand will improve.
Advertising is a non-personal form of promotion that is delivered through selected media outlets that, under most circumstances, require the marketer to pay for message placement. Advertising has long been viewed as a method of mass promotion in that a single message can reach a large number of people. But, this mass promotion approach presents problems since many exposed to an advertising message may not be within the marketer’s target market, and thus, may be an inefficient use of promotional funds. However, this is changing as new advertising technologies and the emergence of new media outlets offer more options for targeted advertising.
Advertising also has a history of being considered a one-way form of marketing communication where the message receiver (i.e., target market) is not in position to immediately respond to the message (e.g., seek more information). This too is changing. For example, in the next few years technologies will be readily available to enable a television viewer to click a button to request more details on a product seen on their favorite TV program. In fact, it is expected that over the next 10-20 years advertising will move away from a one-way communication model and become one that is highly interactive.
Another characteristic that may change as advertising evolves is the view that advertising does not stimulate immediate demand for the product advertised. That is, customers cannot quickly purchase a product they see advertised. But as more media outlets allow customers to interact with the messages being delivered the ability of advertising to quickly stimulate demand will improve.
What is AAA (Authentication, Authorization, and Accounting)?
AAA (Authentication, Authorization, and Accounting) is a model for access control.
Authentication
Authentication is proving who you are.
Authentication answers the question Who is this person?
Authorization
Authorization is defining what you are allowed (and not allowed) to do.
Authorization answers the question What is this person authorized to do?
Accounting
Accounting is keeping track of what you do.
Accounting answers the question What did this person do?
Authentication
Authentication is proving who you are.
Authentication answers the question Who is this person?
Authorization
Authorization is defining what you are allowed (and not allowed) to do.
Authorization answers the question What is this person authorized to do?
Accounting
Accounting is keeping track of what you do.
Accounting answers the question What did this person do?
What is a packet sniffer?
What is a packet sniffer?
Packet Sniffing
Packet sniffing is listening (with software) to the raw network device for packets that interest you. When your software sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting packet is one that contains words like "login" or "password."
To do packet sniffing, you will have to obtain or code a packet sniffer that is capable of working with the type of network interface supported by your operating system:
Network interfaces include:
* LLI
* NIT (Network Interface Tap)
* Ultrix Packet Filter
* DLPI (Data Link Provider Interface)
* BPF (Berkeley Packet Filter)
LLI was a network interface used by SCO, which has been augmented with DLPI support as of SCO OpenServer Release V.
NIT was a network interface used by Sun, but has been replaced in later releases of SunOS/Solaris with DLPI.
Ultrix supported the Ultrix Packet Filter before Digital implemented support for BPF.
DLPI is supported under current releases of System V Release 4, SunOS/Solaris, AIX, HP/UX, UnixWare, Irix, and MacOS. DLPI is partially supported under Digital Unix. Sun DLPI version 2 supports Ethernet, X.25 LAPB, SDLC, ISDN LAPD, CSMA/CD, FDDI, Token Ring, Token Bus, and Bisync as data-link protocols. The DLPI network interface provided with HP/UX supports Ethernet/IEEE 802.3, IEEE 802.5, FDDI, and Fibre Channel.
BPF is supported under current releases of BSD and Digital Unix, and has been ported to SunOS and Solaris. AIX supports BPF reads, but not writes. A BPF library is available for Linux.
Packet Sniffers
Commercial, bundled, and free packet sniffers are available for most operating systems:
Free Packet Sniffers
Ethereal
Platform(s): Most
License: Open Source GPL
Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product. Its open source license allows talented experts in the networking community to add enhancements. It runs on all popular computing platforms, including Unix, Linux, and Windows.
tcpdump
Platform(s): Most
License: BSD License
Tcpdump prints out the headers of packets on a network interface that match the boolean expression. It can also be run with the -w flag, which causes it to save the packet data to a file for later analysis, and/or with the -b flag, which causes it to read from a saved packet file rather than to read packets from a network interface. In all cases, only packets that match expression will be processed by tcpdump.
Natas
Platform(s): Windows
License: Free
Natas is a free Windows 2000 network packet sniffer with several options. Sourcecode (C++) included.
nfswatch/
Platform(s): Unix
License: Open Source
nfswatch is a packet sniffer which is dedicated to sniffing NFS (Network File System) traffic. nfswatch lets you monitor NFS requests to any given machine, or the entire local network. It mostly monitors NFS client traffic (NFS requests); it also monitors the NFS reply traffic from a server in order to measure the response time for each RPC.
Web Packet Sniffer
Platform(s): Unix
License: Open Source
Web Packet Sniffer is a pair of Perl scripts that together will:
* Listen to all TCP/IP traffic on a subnet.
* Intercept all outgoing requests for Web documents and display them.
* Intercept all incoming requests for Web documents and display them.
* Decode the Basic authentication passwords, if any.
Sniffit
Platform(s): Linux, SunOS, Solaris, FreeBSD and Irix
License: Open Source
sniffit is a packet sniffer for TCP/UDP/ICMP packets. sniffit is able to give you very detailed technical info on these packets (SEQ, ACK, TTL, Window, ...) but also packet contents in different formats (hex or plain text, ...).
Bundled Packet Sniffers
Microsoft Network Monitor
Platform(s): Windows
License: Bundled with Microsoft Windows
Microsoft Network Monitor is the packet sniffer which is bundled with Microsoft Windows.
Network Monitor is a component of Microsoft� Systems Management Server (SMS) that enables you to detect and troubleshoot problems on LANs, WANs, and serial links running the Microsoft� Remote Access Server (RAS). Network Monitor provides real-time and post-capture modes of network data analysis.
In real-time analysis, network traffic is examined by real-time monitors. These monitors test network traffic for a specific set of conditions, and when those conditions are detected, display events, which may prompt end-user action. For example, a monitor can detect conditions that indicate a SYN attack and aid a network administer to respond to the potential attack.
In post-capture analysis, network traffic is saved in a proprietary capture file so that the captured data can be analyzed later. In this case, analysis can be in the form of protocol parsers picking out specific network frame types and displaying the frame data in the Network Monitor UI; or analysis can be in the form of experts examining the network data and displaying a report (experts may also manipulate the network data).
Network Monitor provides the following types of functionality:
* Captures network data in real-time or delayed mode.
* Provides filtering capabilities when capturing data.
* Uses monitors for real-time analysis and security.
* Uses experts and parsers for detailed post-capture analysis.
snoop
Platform(s): Solaris
License: Bundled with Solaris
snoop is the packet sniffer which is bundled with the Solaris Operating System.
snoop captures packets from the network and displays their contents. snoop uses both the network packet filter and streams buffer modules to provide efficient capture of packets from the network. Captured packets can be displayed as they are received, or saved to a file for later inspection.
snoop can display packets in a single-line summary form or in verbose multi-line forms. In summary form, only the data pertaining to the highest level protocol is displayed. For example, an NFS packet will have only NFS information displayed. The underlying RPC, UDP, IP, and ethernet frame information is suppressed but can be displayed if either of the verbose options are chosen.
nettl / netfmt
Platform(s): HP-UX
License: Bundled with HP-UX
The nettl and netfmt packet sniffing utilities are bundled with the HP-UX operating system.
Commercial Packet Sniffers
LanWatch
Platform(s): DOS/Windows
License: Commercial
LANWatch is a software-based network packet analyzer. Easy to install and use, LANWatch monitors traffic in real time and displays a wide range of statistics. With LANWatch, network administrators can quickly identify problems and keep networks running at peak performance. Support and QA Personnel can determine the origin of network problems. Network Application and Protocol Developers can easily monitor, examine and verify network protocols in both hexadecimal and formatted views.
Etherpeek
Platform(s): Windows, Macintosh
License: Commercial
EtherPeek is an Ethernet network traffic and protocol analyzer designed to make the complex tasks of troubleshooting and debugging mixed-platform, multi-protocol networks easy. EtherPeek sets the industry standard for ease-of-use while delivering all the superior diagnostic and analysis capabilities expected of a full-featured analyzer at an affordable price.
Sniff'em
Platform(s): Windows
License: Commercial
Sniff'em captures, monitors and analyzes network traffic, detecting bottlenecks and other network related problems. Using this information, a network manager can keep traffic flowing efficiently. The Sniff'em packet sniffer can also be used legitimately or illegitimately to capture data being transmitted over a network.
Sniff'em is a competitively priced, performance minded Windows based Packet sniffer, Network analyzer and Network sniffer, a revolutionary new network management tool designed from the ground up with ease and functionality in mind.
Sniffer Pro
Platform(s): Windows
License: Commercial
The Sniffer Portable family of network fault and performance management solutions enables network professionals to maintain, troubleshoot, fine tune, and expand multi-topology and multi-protocol networks. Capable of insertion wherever needed in the network, Sniffer Portable identifies and analyzes performance problems automatically and recommends corrective action. Sniffer Portable supports virtually all LAN and WAN topologies plus a wide range of network and application protocols, and immediately alerts administrators of attempted intrusions.
EffeTech HTTP Sniffer
Platform(s): Windows
License: Commercial
EffeTech HTTP Sniffer is a HTTP packet sniffer, protocol analyzer and file reassembly software based on windows platform. Unlike most other sniffers, it is dedicated to capture IP packets containing HTTP protocol, rebuild the HTTP sessions, and reassemble files sent through HTTP protocol. Its smart real-time analyzer enables on-the-fly content viewing while capture, analyze, parse and decode HTTP protocol.
Iris
Platform(s): Windows
License: Commercial
Iris is a powerful yet intuitive network traffic analyzer which allows system administrators to examine the inner workings of their network, simplifying the detective work of pinpointing a security breach or resolving a performance problem.
Iris takes network traffic and returns it to its original format, dramatically reducing the time previously spent examining individual packets. Utilizing Iris, security professionals are able to; read the actual text of an email, as well as any attachments, exactly as it was sent, reconstruct the actual HTML pages that your users have visited and even simulate cookies for entry into password-protected websites.
Iris provides automated filters that can be set up to flag and record specific network traffic that contains a particular MAC or IP address, unacceptable words or websites, and more, to ensure whether company security is being compromised or corporate policies are abused. Iris also provides a variety of statistical measurements allowing you to proactively identify, and take the steps to eliminate, performance issues before they can result in downtime.
Packet Sniffing
Packet sniffing is listening (with software) to the raw network device for packets that interest you. When your software sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting packet is one that contains words like "login" or "password."
To do packet sniffing, you will have to obtain or code a packet sniffer that is capable of working with the type of network interface supported by your operating system:
Network interfaces include:
* LLI
* NIT (Network Interface Tap)
* Ultrix Packet Filter
* DLPI (Data Link Provider Interface)
* BPF (Berkeley Packet Filter)
LLI was a network interface used by SCO, which has been augmented with DLPI support as of SCO OpenServer Release V.
NIT was a network interface used by Sun, but has been replaced in later releases of SunOS/Solaris with DLPI.
Ultrix supported the Ultrix Packet Filter before Digital implemented support for BPF.
DLPI is supported under current releases of System V Release 4, SunOS/Solaris, AIX, HP/UX, UnixWare, Irix, and MacOS. DLPI is partially supported under Digital Unix. Sun DLPI version 2 supports Ethernet, X.25 LAPB, SDLC, ISDN LAPD, CSMA/CD, FDDI, Token Ring, Token Bus, and Bisync as data-link protocols. The DLPI network interface provided with HP/UX supports Ethernet/IEEE 802.3, IEEE 802.5, FDDI, and Fibre Channel.
BPF is supported under current releases of BSD and Digital Unix, and has been ported to SunOS and Solaris. AIX supports BPF reads, but not writes. A BPF library is available for Linux.
Packet Sniffers
Commercial, bundled, and free packet sniffers are available for most operating systems:
Free Packet Sniffers
Ethereal
Platform(s): Most
License: Open Source GPL
Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product. Its open source license allows talented experts in the networking community to add enhancements. It runs on all popular computing platforms, including Unix, Linux, and Windows.
tcpdump
Platform(s): Most
License: BSD License
Tcpdump prints out the headers of packets on a network interface that match the boolean expression. It can also be run with the -w flag, which causes it to save the packet data to a file for later analysis, and/or with the -b flag, which causes it to read from a saved packet file rather than to read packets from a network interface. In all cases, only packets that match expression will be processed by tcpdump.
Natas
Platform(s): Windows
License: Free
Natas is a free Windows 2000 network packet sniffer with several options. Sourcecode (C++) included.
nfswatch/
Platform(s): Unix
License: Open Source
nfswatch is a packet sniffer which is dedicated to sniffing NFS (Network File System) traffic. nfswatch lets you monitor NFS requests to any given machine, or the entire local network. It mostly monitors NFS client traffic (NFS requests); it also monitors the NFS reply traffic from a server in order to measure the response time for each RPC.
Web Packet Sniffer
Platform(s): Unix
License: Open Source
Web Packet Sniffer is a pair of Perl scripts that together will:
* Listen to all TCP/IP traffic on a subnet.
* Intercept all outgoing requests for Web documents and display them.
* Intercept all incoming requests for Web documents and display them.
* Decode the Basic authentication passwords, if any.
Sniffit
Platform(s): Linux, SunOS, Solaris, FreeBSD and Irix
License: Open Source
sniffit is a packet sniffer for TCP/UDP/ICMP packets. sniffit is able to give you very detailed technical info on these packets (SEQ, ACK, TTL, Window, ...) but also packet contents in different formats (hex or plain text, ...).
Bundled Packet Sniffers
Microsoft Network Monitor
Platform(s): Windows
License: Bundled with Microsoft Windows
Microsoft Network Monitor is the packet sniffer which is bundled with Microsoft Windows.
Network Monitor is a component of Microsoft� Systems Management Server (SMS) that enables you to detect and troubleshoot problems on LANs, WANs, and serial links running the Microsoft� Remote Access Server (RAS). Network Monitor provides real-time and post-capture modes of network data analysis.
In real-time analysis, network traffic is examined by real-time monitors. These monitors test network traffic for a specific set of conditions, and when those conditions are detected, display events, which may prompt end-user action. For example, a monitor can detect conditions that indicate a SYN attack and aid a network administer to respond to the potential attack.
In post-capture analysis, network traffic is saved in a proprietary capture file so that the captured data can be analyzed later. In this case, analysis can be in the form of protocol parsers picking out specific network frame types and displaying the frame data in the Network Monitor UI; or analysis can be in the form of experts examining the network data and displaying a report (experts may also manipulate the network data).
Network Monitor provides the following types of functionality:
* Captures network data in real-time or delayed mode.
* Provides filtering capabilities when capturing data.
* Uses monitors for real-time analysis and security.
* Uses experts and parsers for detailed post-capture analysis.
snoop
Platform(s): Solaris
License: Bundled with Solaris
snoop is the packet sniffer which is bundled with the Solaris Operating System.
snoop captures packets from the network and displays their contents. snoop uses both the network packet filter and streams buffer modules to provide efficient capture of packets from the network. Captured packets can be displayed as they are received, or saved to a file for later inspection.
snoop can display packets in a single-line summary form or in verbose multi-line forms. In summary form, only the data pertaining to the highest level protocol is displayed. For example, an NFS packet will have only NFS information displayed. The underlying RPC, UDP, IP, and ethernet frame information is suppressed but can be displayed if either of the verbose options are chosen.
nettl / netfmt
Platform(s): HP-UX
License: Bundled with HP-UX
The nettl and netfmt packet sniffing utilities are bundled with the HP-UX operating system.
Commercial Packet Sniffers
LanWatch
Platform(s): DOS/Windows
License: Commercial
LANWatch is a software-based network packet analyzer. Easy to install and use, LANWatch monitors traffic in real time and displays a wide range of statistics. With LANWatch, network administrators can quickly identify problems and keep networks running at peak performance. Support and QA Personnel can determine the origin of network problems. Network Application and Protocol Developers can easily monitor, examine and verify network protocols in both hexadecimal and formatted views.
Etherpeek
Platform(s): Windows, Macintosh
License: Commercial
EtherPeek is an Ethernet network traffic and protocol analyzer designed to make the complex tasks of troubleshooting and debugging mixed-platform, multi-protocol networks easy. EtherPeek sets the industry standard for ease-of-use while delivering all the superior diagnostic and analysis capabilities expected of a full-featured analyzer at an affordable price.
Sniff'em
Platform(s): Windows
License: Commercial
Sniff'em captures, monitors and analyzes network traffic, detecting bottlenecks and other network related problems. Using this information, a network manager can keep traffic flowing efficiently. The Sniff'em packet sniffer can also be used legitimately or illegitimately to capture data being transmitted over a network.
Sniff'em is a competitively priced, performance minded Windows based Packet sniffer, Network analyzer and Network sniffer, a revolutionary new network management tool designed from the ground up with ease and functionality in mind.
Sniffer Pro
Platform(s): Windows
License: Commercial
The Sniffer Portable family of network fault and performance management solutions enables network professionals to maintain, troubleshoot, fine tune, and expand multi-topology and multi-protocol networks. Capable of insertion wherever needed in the network, Sniffer Portable identifies and analyzes performance problems automatically and recommends corrective action. Sniffer Portable supports virtually all LAN and WAN topologies plus a wide range of network and application protocols, and immediately alerts administrators of attempted intrusions.
EffeTech HTTP Sniffer
Platform(s): Windows
License: Commercial
EffeTech HTTP Sniffer is a HTTP packet sniffer, protocol analyzer and file reassembly software based on windows platform. Unlike most other sniffers, it is dedicated to capture IP packets containing HTTP protocol, rebuild the HTTP sessions, and reassemble files sent through HTTP protocol. Its smart real-time analyzer enables on-the-fly content viewing while capture, analyze, parse and decode HTTP protocol.
Iris
Platform(s): Windows
License: Commercial
Iris is a powerful yet intuitive network traffic analyzer which allows system administrators to examine the inner workings of their network, simplifying the detective work of pinpointing a security breach or resolving a performance problem.
Iris takes network traffic and returns it to its original format, dramatically reducing the time previously spent examining individual packets. Utilizing Iris, security professionals are able to; read the actual text of an email, as well as any attachments, exactly as it was sent, reconstruct the actual HTML pages that your users have visited and even simulate cookies for entry into password-protected websites.
Iris provides automated filters that can be set up to flag and record specific network traffic that contains a particular MAC or IP address, unacceptable words or websites, and more, to ensure whether company security is being compromised or corporate policies are abused. Iris also provides a variety of statistical measurements allowing you to proactively identify, and take the steps to eliminate, performance issues before they can result in downtime.
What is an Intrusion Detection System (IDS)?
An Intrusion Detection System (IDS) is a system for detecting misuse of network or computer resources.
An IDS will have a number of sensors it utilizes to detect intrusions. Example sensors may be:
* A sensor to monitor TCP connection requests.
* Log file monitors.
* File integrity checkers.
The IDS system is responsible for collecting data from it's sensors and analyzing this data to give the security administrator notice of malicious activity on the network.
IDS technologies are commonly divided into NIDS (Network Intrusion Detection Systems) and HIDS (Host Intrusion Detection Systems).
Newer NIDS also attempt to act as NIPS (Network Intrusion Prevention Systems).
Snort is an excellent open source Network Intrusion Detection System.
Snort 2.0 Intrusion Detection Intrusion Detection with Snort
An IDS will have a number of sensors it utilizes to detect intrusions. Example sensors may be:
* A sensor to monitor TCP connection requests.
* Log file monitors.
* File integrity checkers.
The IDS system is responsible for collecting data from it's sensors and analyzing this data to give the security administrator notice of malicious activity on the network.
IDS technologies are commonly divided into NIDS (Network Intrusion Detection Systems) and HIDS (Host Intrusion Detection Systems).
Newer NIDS also attempt to act as NIPS (Network Intrusion Prevention Systems).
Snort is an excellent open source Network Intrusion Detection System.
Snort 2.0 Intrusion Detection Intrusion Detection with Snort
What is a DMZ?
DMZ is short for DeMilitarized Zone.
In military jargon, a DMZ is an area of land that serves as a buffer between two enemies. The most well known DMZ in the world is the DMZ that protects South Korea from North Korea.
In network security jargon, a DMZ is a network that serves as a buffer between a secure protected internal network and the insecure Internet.
A DMZ usually contains servers which provide services to users from the Internet, such as web, ftp, email (SMTP, POP3 and IMAP4), and DNS servers. Although these servers must be open to limited access from the Internet, they should also be protected by a firewall.
The term Perimeter Network is also used to describe a DMZ.
How to Create a DMZ
The most simple method of creating a DMZ is to utilize a firewall with three or more network interfaces. Each interface is assigned a specific role:
* Internal trusted network
* DMZ network
* External un-trusted network (the Internet)
Using a 4-port Ethernet card in your firewall will enable you to create a network in this configuration, or even enable you to create a network with two separate DMZ's.
Separating your DMZ hosts into multiple DMZ's will help to limit the damage that can be done if one of your DMZ hosts is compromised.
DMZ Firewall Rules
A firewall will normally be configured to protect the Internal network from the Internet.
To create a DMZ, the firewall should also enforce rules to protect the DMZ from the Internet and rules to protect the Internal network from the DMZ.
This will make it more difficult for an attacker to penetrate your Internal network, even if they do manage to gain access to your DMZ hosts.
In military jargon, a DMZ is an area of land that serves as a buffer between two enemies. The most well known DMZ in the world is the DMZ that protects South Korea from North Korea.
In network security jargon, a DMZ is a network that serves as a buffer between a secure protected internal network and the insecure Internet.
A DMZ usually contains servers which provide services to users from the Internet, such as web, ftp, email (SMTP, POP3 and IMAP4), and DNS servers. Although these servers must be open to limited access from the Internet, they should also be protected by a firewall.
The term Perimeter Network is also used to describe a DMZ.
How to Create a DMZ
The most simple method of creating a DMZ is to utilize a firewall with three or more network interfaces. Each interface is assigned a specific role:
* Internal trusted network
* DMZ network
* External un-trusted network (the Internet)
Using a 4-port Ethernet card in your firewall will enable you to create a network in this configuration, or even enable you to create a network with two separate DMZ's.
Separating your DMZ hosts into multiple DMZ's will help to limit the damage that can be done if one of your DMZ hosts is compromised.
DMZ Firewall Rules
A firewall will normally be configured to protect the Internal network from the Internet.
To create a DMZ, the firewall should also enforce rules to protect the DMZ from the Internet and rules to protect the Internal network from the DMZ.
This will make it more difficult for an attacker to penetrate your Internal network, even if they do manage to gain access to your DMZ hosts.
What is a packet sniffer?
What is a packet sniffer?
Packet Sniffing
Packet sniffing is listening (with software) to the raw network device for packets that interest you. When your software sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting packet is one that contains words like "login" or "password."
To do packet sniffing, you will have to obtain or code a packet sniffer that is capable of working with the type of network interface supported by your operating system:
Network interfaces include:
* LLI
* NIT (Network Interface Tap)
* Ultrix Packet Filter
* DLPI (Data Link Provider Interface)
* BPF (Berkeley Packet Filter)
LLI was a network interface used by SCO, which has been augmented with DLPI support as of SCO OpenServer Release V.
NIT was a network interface used by Sun, but has been replaced in later releases of SunOS/Solaris with DLPI.
Ultrix supported the Ultrix Packet Filter before Digital implemented support for BPF.
DLPI is supported under current releases of System V Release 4, SunOS/Solaris, AIX, HP/UX, UnixWare, Irix, and MacOS. DLPI is partially supported under Digital Unix. Sun DLPI version 2 supports Ethernet, X.25 LAPB, SDLC, ISDN LAPD, CSMA/CD, FDDI, Token Ring, Token Bus, and Bisync as data-link protocols. The DLPI network interface provided with HP/UX supports Ethernet/IEEE 802.3, IEEE 802.5, FDDI, and Fibre Channel.
BPF is supported under current releases of BSD and Digital Unix, and has been ported to SunOS and Solaris. AIX supports BPF reads, but not writes. A BPF library is available for Linux.
Packet Sniffers
Commercial, bundled, and free packet sniffers are available for most operating systems:
Free Packet Sniffers
Ethereal
Platform(s): Most
License: Open Source GPL
Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product. Its open source license allows talented experts in the networking community to add enhancements. It runs on all popular computing platforms, including Unix, Linux, and Windows.
tcpdump
Platform(s): Most
License: BSD License
Tcpdump prints out the headers of packets on a network interface that match the boolean expression. It can also be run with the -w flag, which causes it to save the packet data to a file for later analysis, and/or with the -b flag, which causes it to read from a saved packet file rather than to read packets from a network interface. In all cases, only packets that match expression will be processed by tcpdump.
Natas
Platform(s): Windows
License: Free
Natas is a free Windows 2000 network packet sniffer with several options. Sourcecode (C++) included.
nfswatch/
Platform(s): Unix
License: Open Source
nfswatch is a packet sniffer which is dedicated to sniffing NFS (Network File System) traffic. nfswatch lets you monitor NFS requests to any given machine, or the entire local network. It mostly monitors NFS client traffic (NFS requests); it also monitors the NFS reply traffic from a server in order to measure the response time for each RPC.
Web Packet Sniffer
Platform(s): Unix
License: Open Source
Web Packet Sniffer is a pair of Perl scripts that together will:
* Listen to all TCP/IP traffic on a subnet.
* Intercept all outgoing requests for Web documents and display them.
* Intercept all incoming requests for Web documents and display them.
* Decode the Basic authentication passwords, if any.
Sniffit
Platform(s): Linux, SunOS, Solaris, FreeBSD and Irix
License: Open Source
sniffit is a packet sniffer for TCP/UDP/ICMP packets. sniffit is able to give you very detailed technical info on these packets (SEQ, ACK, TTL, Window, ...) but also packet contents in different formats (hex or plain text, ...).
Bundled Packet Sniffers
Microsoft Network Monitor
Platform(s): Windows
License: Bundled with Microsoft Windows
Microsoft Network Monitor is the packet sniffer which is bundled with Microsoft Windows.
Network Monitor is a component of Microsoft� Systems Management Server (SMS) that enables you to detect and troubleshoot problems on LANs, WANs, and serial links running the Microsoft� Remote Access Server (RAS). Network Monitor provides real-time and post-capture modes of network data analysis.
In real-time analysis, network traffic is examined by real-time monitors. These monitors test network traffic for a specific set of conditions, and when those conditions are detected, display events, which may prompt end-user action. For example, a monitor can detect conditions that indicate a SYN attack and aid a network administer to respond to the potential attack.
In post-capture analysis, network traffic is saved in a proprietary capture file so that the captured data can be analyzed later. In this case, analysis can be in the form of protocol parsers picking out specific network frame types and displaying the frame data in the Network Monitor UI; or analysis can be in the form of experts examining the network data and displaying a report (experts may also manipulate the network data).
Network Monitor provides the following types of functionality:
* Captures network data in real-time or delayed mode.
* Provides filtering capabilities when capturing data.
* Uses monitors for real-time analysis and security.
* Uses experts and parsers for detailed post-capture analysis.
snoop
Platform(s): Solaris
License: Bundled with Solaris
snoop is the packet sniffer which is bundled with the Solaris Operating System.
snoop captures packets from the network and displays their contents. snoop uses both the network packet filter and streams buffer modules to provide efficient capture of packets from the network. Captured packets can be displayed as they are received, or saved to a file for later inspection.
snoop can display packets in a single-line summary form or in verbose multi-line forms. In summary form, only the data pertaining to the highest level protocol is displayed. For example, an NFS packet will have only NFS information displayed. The underlying RPC, UDP, IP, and ethernet frame information is suppressed but can be displayed if either of the verbose options are chosen.
nettl / netfmt
Platform(s): HP-UX
License: Bundled with HP-UX
The nettl and netfmt packet sniffing utilities are bundled with the HP-UX operating system.
Commercial Packet Sniffers
LanWatch
Platform(s): DOS/Windows
License: Commercial
LANWatch is a software-based network packet analyzer. Easy to install and use, LANWatch monitors traffic in real time and displays a wide range of statistics. With LANWatch, network administrators can quickly identify problems and keep networks running at peak performance. Support and QA Personnel can determine the origin of network problems. Network Application and Protocol Developers can easily monitor, examine and verify network protocols in both hexadecimal and formatted views.
Etherpeek
Platform(s): Windows, Macintosh
License: Commercial
EtherPeek is an Ethernet network traffic and protocol analyzer designed to make the complex tasks of troubleshooting and debugging mixed-platform, multi-protocol networks easy. EtherPeek sets the industry standard for ease-of-use while delivering all the superior diagnostic and analysis capabilities expected of a full-featured analyzer at an affordable price.
Sniff'em
Platform(s): Windows
License: Commercial
Sniff'em captures, monitors and analyzes network traffic, detecting bottlenecks and other network related problems. Using this information, a network manager can keep traffic flowing efficiently. The Sniff'em packet sniffer can also be used legitimately or illegitimately to capture data being transmitted over a network.
Sniff'em is a competitively priced, performance minded Windows based Packet sniffer, Network analyzer and Network sniffer, a revolutionary new network management tool designed from the ground up with ease and functionality in mind.
Sniffer Pro
Platform(s): Windows
License: Commercial
The Sniffer Portable family of network fault and performance management solutions enables network professionals to maintain, troubleshoot, fine tune, and expand multi-topology and multi-protocol networks. Capable of insertion wherever needed in the network, Sniffer Portable identifies and analyzes performance problems automatically and recommends corrective action. Sniffer Portable supports virtually all LAN and WAN topologies plus a wide range of network and application protocols, and immediately alerts administrators of attempted intrusions.
EffeTech HTTP Sniffer
Platform(s): Windows
License: Commercial
EffeTech HTTP Sniffer is a HTTP packet sniffer, protocol analyzer and file reassembly software based on windows platform. Unlike most other sniffers, it is dedicated to capture IP packets containing HTTP protocol, rebuild the HTTP sessions, and reassemble files sent through HTTP protocol. Its smart real-time analyzer enables on-the-fly content viewing while capture, analyze, parse and decode HTTP protocol.
Iris
Platform(s): Windows
License: Commercial
Iris is a powerful yet intuitive network traffic analyzer which allows system administrators to examine the inner workings of their network, simplifying the detective work of pinpointing a security breach or resolving a performance problem.
Iris takes network traffic and returns it to its original format, dramatically reducing the time previously spent examining individual packets. Utilizing Iris, security professionals are able to; read the actual text of an email, as well as any attachments, exactly as it was sent, reconstruct the actual HTML pages that your users have visited and even simulate cookies for entry into password-protected websites.
Iris provides automated filters that can be set up to flag and record specific network traffic that contains a particular MAC or IP address, unacceptable words or websites, and more, to ensure whether company security is being compromised or corporate policies are abused. Iris also provides a variety of statistical measurements allowing you to proactively identify, and take the steps to eliminate, performance issues before they can result in downtime.
Packet Sniffing
Packet sniffing is listening (with software) to the raw network device for packets that interest you. When your software sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting packet is one that contains words like "login" or "password."
To do packet sniffing, you will have to obtain or code a packet sniffer that is capable of working with the type of network interface supported by your operating system:
Network interfaces include:
* LLI
* NIT (Network Interface Tap)
* Ultrix Packet Filter
* DLPI (Data Link Provider Interface)
* BPF (Berkeley Packet Filter)
LLI was a network interface used by SCO, which has been augmented with DLPI support as of SCO OpenServer Release V.
NIT was a network interface used by Sun, but has been replaced in later releases of SunOS/Solaris with DLPI.
Ultrix supported the Ultrix Packet Filter before Digital implemented support for BPF.
DLPI is supported under current releases of System V Release 4, SunOS/Solaris, AIX, HP/UX, UnixWare, Irix, and MacOS. DLPI is partially supported under Digital Unix. Sun DLPI version 2 supports Ethernet, X.25 LAPB, SDLC, ISDN LAPD, CSMA/CD, FDDI, Token Ring, Token Bus, and Bisync as data-link protocols. The DLPI network interface provided with HP/UX supports Ethernet/IEEE 802.3, IEEE 802.5, FDDI, and Fibre Channel.
BPF is supported under current releases of BSD and Digital Unix, and has been ported to SunOS and Solaris. AIX supports BPF reads, but not writes. A BPF library is available for Linux.
Packet Sniffers
Commercial, bundled, and free packet sniffers are available for most operating systems:
Free Packet Sniffers
Ethereal
Platform(s): Most
License: Open Source GPL
Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product. Its open source license allows talented experts in the networking community to add enhancements. It runs on all popular computing platforms, including Unix, Linux, and Windows.
tcpdump
Platform(s): Most
License: BSD License
Tcpdump prints out the headers of packets on a network interface that match the boolean expression. It can also be run with the -w flag, which causes it to save the packet data to a file for later analysis, and/or with the -b flag, which causes it to read from a saved packet file rather than to read packets from a network interface. In all cases, only packets that match expression will be processed by tcpdump.
Natas
Platform(s): Windows
License: Free
Natas is a free Windows 2000 network packet sniffer with several options. Sourcecode (C++) included.
nfswatch/
Platform(s): Unix
License: Open Source
nfswatch is a packet sniffer which is dedicated to sniffing NFS (Network File System) traffic. nfswatch lets you monitor NFS requests to any given machine, or the entire local network. It mostly monitors NFS client traffic (NFS requests); it also monitors the NFS reply traffic from a server in order to measure the response time for each RPC.
Web Packet Sniffer
Platform(s): Unix
License: Open Source
Web Packet Sniffer is a pair of Perl scripts that together will:
* Listen to all TCP/IP traffic on a subnet.
* Intercept all outgoing requests for Web documents and display them.
* Intercept all incoming requests for Web documents and display them.
* Decode the Basic authentication passwords, if any.
Sniffit
Platform(s): Linux, SunOS, Solaris, FreeBSD and Irix
License: Open Source
sniffit is a packet sniffer for TCP/UDP/ICMP packets. sniffit is able to give you very detailed technical info on these packets (SEQ, ACK, TTL, Window, ...) but also packet contents in different formats (hex or plain text, ...).
Bundled Packet Sniffers
Microsoft Network Monitor
Platform(s): Windows
License: Bundled with Microsoft Windows
Microsoft Network Monitor is the packet sniffer which is bundled with Microsoft Windows.
Network Monitor is a component of Microsoft� Systems Management Server (SMS) that enables you to detect and troubleshoot problems on LANs, WANs, and serial links running the Microsoft� Remote Access Server (RAS). Network Monitor provides real-time and post-capture modes of network data analysis.
In real-time analysis, network traffic is examined by real-time monitors. These monitors test network traffic for a specific set of conditions, and when those conditions are detected, display events, which may prompt end-user action. For example, a monitor can detect conditions that indicate a SYN attack and aid a network administer to respond to the potential attack.
In post-capture analysis, network traffic is saved in a proprietary capture file so that the captured data can be analyzed later. In this case, analysis can be in the form of protocol parsers picking out specific network frame types and displaying the frame data in the Network Monitor UI; or analysis can be in the form of experts examining the network data and displaying a report (experts may also manipulate the network data).
Network Monitor provides the following types of functionality:
* Captures network data in real-time or delayed mode.
* Provides filtering capabilities when capturing data.
* Uses monitors for real-time analysis and security.
* Uses experts and parsers for detailed post-capture analysis.
snoop
Platform(s): Solaris
License: Bundled with Solaris
snoop is the packet sniffer which is bundled with the Solaris Operating System.
snoop captures packets from the network and displays their contents. snoop uses both the network packet filter and streams buffer modules to provide efficient capture of packets from the network. Captured packets can be displayed as they are received, or saved to a file for later inspection.
snoop can display packets in a single-line summary form or in verbose multi-line forms. In summary form, only the data pertaining to the highest level protocol is displayed. For example, an NFS packet will have only NFS information displayed. The underlying RPC, UDP, IP, and ethernet frame information is suppressed but can be displayed if either of the verbose options are chosen.
nettl / netfmt
Platform(s): HP-UX
License: Bundled with HP-UX
The nettl and netfmt packet sniffing utilities are bundled with the HP-UX operating system.
Commercial Packet Sniffers
LanWatch
Platform(s): DOS/Windows
License: Commercial
LANWatch is a software-based network packet analyzer. Easy to install and use, LANWatch monitors traffic in real time and displays a wide range of statistics. With LANWatch, network administrators can quickly identify problems and keep networks running at peak performance. Support and QA Personnel can determine the origin of network problems. Network Application and Protocol Developers can easily monitor, examine and verify network protocols in both hexadecimal and formatted views.
Etherpeek
Platform(s): Windows, Macintosh
License: Commercial
EtherPeek is an Ethernet network traffic and protocol analyzer designed to make the complex tasks of troubleshooting and debugging mixed-platform, multi-protocol networks easy. EtherPeek sets the industry standard for ease-of-use while delivering all the superior diagnostic and analysis capabilities expected of a full-featured analyzer at an affordable price.
Sniff'em
Platform(s): Windows
License: Commercial
Sniff'em captures, monitors and analyzes network traffic, detecting bottlenecks and other network related problems. Using this information, a network manager can keep traffic flowing efficiently. The Sniff'em packet sniffer can also be used legitimately or illegitimately to capture data being transmitted over a network.
Sniff'em is a competitively priced, performance minded Windows based Packet sniffer, Network analyzer and Network sniffer, a revolutionary new network management tool designed from the ground up with ease and functionality in mind.
Sniffer Pro
Platform(s): Windows
License: Commercial
The Sniffer Portable family of network fault and performance management solutions enables network professionals to maintain, troubleshoot, fine tune, and expand multi-topology and multi-protocol networks. Capable of insertion wherever needed in the network, Sniffer Portable identifies and analyzes performance problems automatically and recommends corrective action. Sniffer Portable supports virtually all LAN and WAN topologies plus a wide range of network and application protocols, and immediately alerts administrators of attempted intrusions.
EffeTech HTTP Sniffer
Platform(s): Windows
License: Commercial
EffeTech HTTP Sniffer is a HTTP packet sniffer, protocol analyzer and file reassembly software based on windows platform. Unlike most other sniffers, it is dedicated to capture IP packets containing HTTP protocol, rebuild the HTTP sessions, and reassemble files sent through HTTP protocol. Its smart real-time analyzer enables on-the-fly content viewing while capture, analyze, parse and decode HTTP protocol.
Iris
Platform(s): Windows
License: Commercial
Iris is a powerful yet intuitive network traffic analyzer which allows system administrators to examine the inner workings of their network, simplifying the detective work of pinpointing a security breach or resolving a performance problem.
Iris takes network traffic and returns it to its original format, dramatically reducing the time previously spent examining individual packets. Utilizing Iris, security professionals are able to; read the actual text of an email, as well as any attachments, exactly as it was sent, reconstruct the actual HTML pages that your users have visited and even simulate cookies for entry into password-protected websites.
Iris provides automated filters that can be set up to flag and record specific network traffic that contains a particular MAC or IP address, unacceptable words or websites, and more, to ensure whether company security is being compromised or corporate policies are abused. Iris also provides a variety of statistical measurements allowing you to proactively identify, and take the steps to eliminate, performance issues before they can result in downtime.
What is an Intrusion Detection System (IDS)?
What is an Intrusion Detection System (IDS)?
An Intrusion Detection System (IDS) is a system for detecting misuse of network or computer resources.
An IDS will have a number of sensors it utilizes to detect intrusions. Example sensors may be:
* A sensor to monitor TCP connection requests.
* Log file monitors.
* File integrity checkers.
The IDS system is responsible for collecting data from it's sensors and analyzing this data to give the security administrator notice of malicious activity on the network.
IDS technologies are commonly divided into NIDS (Network Intrusion Detection Systems) and HIDS (Host Intrusion Detection Systems).
Newer NIDS also attempt to act as NIPS (Network Intrusion Prevention Systems).
Snort is an excellent open source Network Intrusion Detection System
An Intrusion Detection System (IDS) is a system for detecting misuse of network or computer resources.
An IDS will have a number of sensors it utilizes to detect intrusions. Example sensors may be:
* A sensor to monitor TCP connection requests.
* Log file monitors.
* File integrity checkers.
The IDS system is responsible for collecting data from it's sensors and analyzing this data to give the security administrator notice of malicious activity on the network.
IDS technologies are commonly divided into NIDS (Network Intrusion Detection Systems) and HIDS (Host Intrusion Detection Systems).
Newer NIDS also attempt to act as NIPS (Network Intrusion Prevention Systems).
Snort is an excellent open source Network Intrusion Detection System
What is a firewall?
What is a firewall?
A firewall is a system that is set up to control traffic flow between two networks. Firewalls are most commonly specially configured Unix systems, but firewalls have also been built out of many other systems, including systems designed specifically for use as firewalls. The most common commercial firewall today is CheckPoint FireWall-1, but competitors such as Cisco's PIX are quickly catching up on CheckPoint.
Many people disagree on the definition of a firewall, and in this discussion I will use the term loosely.
The Packet Filtering Firewall
One type of firewall is the packet filtering firewall. In a packet filtering firewall, the firewall examines five characteristics of a packet:
* Source IP address
* Source port
* Destination IP address
* Destination port
* IP protocol (TCP or UDP)
Based upon rules configured into the firewall, the packet will either be allowed through, rejected, or dropped. If the firewall rejects the packet, it sends a message back to the sender letting him know that the packet was rejected. If the packet was dropped, the firewall simply does not respond to the packet. The sender must wait for the communications to time out. Dropping packets instead of rejecting them greatly increases the time required to scan your network. Packet filtering firewalls operate on Layer 3 of the OSI model, the Network Layer. Routers are a very common form of packet filtering firewall.
An improved form of the packet filtering firewall is a packet filtering firewall with a stateful inspection engine. With this enhancement, the firewall "remembers" conversations between systems. It is then necessary to fully examine only the first packet of a conversation.
The Application-Proxy Firewall
Another type of firewall is the application-proxy firewall. In a proxying firewall, every packet is stopped at the firewall. The packet is then examined and compared to the rules configured into the firewall. If the packet passes the examinations, it is re-created and sent out. Because each packet is destroyed and re-created, there is a potential that an application-proxy firewall can prevent unknown attacks based upon weaknesses in the TCP/IP protocol suite that would not be prevented by a packet filtering firewall. The drawback is that a separate application-proxy must be written for each application type being proxied. You need an HTTP proxy for web traffic, an FTP proxy for file transfers, a Gopher proxy for Gopher traffic, etc... Application-proxy firewalls operate on Layer 7 of the OSI model, the Application Layer.
The Application-Gateway Firewall
Application-gateway firewalls also operate on Layer 7 of the OSI model. Application-gateway firewalls exist for only a few network applications. A typical application-gateway firewall is a system where you must telnet to one system in order telnet again to a system outside of the network.
The SOCKS Firewall
Another type of application-proxy firewall are SOCKS firewalls. Where normal application-proxy firewalls do not require modifications to network clients, SOCKS firewalls requires specially modified network clients. This means you have to modify every system on your internal network which needs to communicate with the external network. On a Windows or OS/2 system, this can be as easy as swapping a few DLL's.
A firewall is a system that is set up to control traffic flow between two networks. Firewalls are most commonly specially configured Unix systems, but firewalls have also been built out of many other systems, including systems designed specifically for use as firewalls. The most common commercial firewall today is CheckPoint FireWall-1, but competitors such as Cisco's PIX are quickly catching up on CheckPoint.
Many people disagree on the definition of a firewall, and in this discussion I will use the term loosely.
The Packet Filtering Firewall
One type of firewall is the packet filtering firewall. In a packet filtering firewall, the firewall examines five characteristics of a packet:
* Source IP address
* Source port
* Destination IP address
* Destination port
* IP protocol (TCP or UDP)
Based upon rules configured into the firewall, the packet will either be allowed through, rejected, or dropped. If the firewall rejects the packet, it sends a message back to the sender letting him know that the packet was rejected. If the packet was dropped, the firewall simply does not respond to the packet. The sender must wait for the communications to time out. Dropping packets instead of rejecting them greatly increases the time required to scan your network. Packet filtering firewalls operate on Layer 3 of the OSI model, the Network Layer. Routers are a very common form of packet filtering firewall.
An improved form of the packet filtering firewall is a packet filtering firewall with a stateful inspection engine. With this enhancement, the firewall "remembers" conversations between systems. It is then necessary to fully examine only the first packet of a conversation.
The Application-Proxy Firewall
Another type of firewall is the application-proxy firewall. In a proxying firewall, every packet is stopped at the firewall. The packet is then examined and compared to the rules configured into the firewall. If the packet passes the examinations, it is re-created and sent out. Because each packet is destroyed and re-created, there is a potential that an application-proxy firewall can prevent unknown attacks based upon weaknesses in the TCP/IP protocol suite that would not be prevented by a packet filtering firewall. The drawback is that a separate application-proxy must be written for each application type being proxied. You need an HTTP proxy for web traffic, an FTP proxy for file transfers, a Gopher proxy for Gopher traffic, etc... Application-proxy firewalls operate on Layer 7 of the OSI model, the Application Layer.
The Application-Gateway Firewall
Application-gateway firewalls also operate on Layer 7 of the OSI model. Application-gateway firewalls exist for only a few network applications. A typical application-gateway firewall is a system where you must telnet to one system in order telnet again to a system outside of the network.
The SOCKS Firewall
Another type of application-proxy firewall are SOCKS firewalls. Where normal application-proxy firewalls do not require modifications to network clients, SOCKS firewalls requires specially modified network clients. This means you have to modify every system on your internal network which needs to communicate with the external network. On a Windows or OS/2 system, this can be as easy as swapping a few DLL's.
What is the use of infrared in cell phone?
Theres a port on your cellphone which is the infrared port. Its like the port on yout tv remote control. This infrared port allows you to share certain data with compatible phones & pc's with infrared ports. The data which can be transferred are pictures, music, messages & contact details.
To use the tool, you will need to activate the infrared ports on both devices & hold the devices with the infrared ports facing each other & not more than about 30 - 45cm away from each other without an obstruction in between them.
To use the tool, you will need to activate the infrared ports on both devices & hold the devices with the infrared ports facing each other & not more than about 30 - 45cm away from each other without an obstruction in between them.
What is Wipro Technologies ?
Wipro Technologies is an IT service company established in 1980 in India, it is a subsidiary of Wipro Limited NYSE: WIT (incorporated 1946, in operation since 1945). It is headquartered in Bangalore. As of 2004, it was the 4th largest company in the world in terms of market capitalization in IT services.
The current chairman is Azim Premji.
The current chairman is Azim Premji.
What is Infosys ?
Infosys Technologies Limited (NASDAQ: INFY) is an information technology (IT) company founded in Bangalore, India in 1981 by N. R. Narayana Murthy. It is headquartered in Electronic City, Bangalore, it operates nine development centers in India and has over 30 offices in 20 other nations. In fiscal year 2006 annual revenues exceeded US $2.15 billion with a Market Capitalization of over US $30 billion. With over 70,000 employees now[1] worldwide, Infosys is one of India's largest IT companies and its headquarters at Bangalore, is one of the largest IT campuses in the world.
What is IBM ?
Short for International Business Machines, the largest computer company in the world. IBM started in 1911 as a producer of punch card tabulating machines. In 1953, it introduced its first computer, the 701. During the 60's and 70's, IBM came to dominate the new field of mainframe and minicomputers. In 1981, IBM launched its first personal computer, called the IBM PC, which quickly became the standard. However, IBM underestimated the market for PCs and lost market share to vendors of PC compatibles, such as Compaq.
What is Microsoft ?
Founded in 1975 by Paul Allen and Bill Gates, Microsoft Corporation is one of the largest and most influential companies in the personal computer industry. In addition to developing the de facto standard operating systems -- DOS and Windows -- Microsoft has a strong presence in almost every area of computer software, from programming tools to end-user applications.
What is Microsoft Excel ?
Microsoft Excel (full name Microsoft Office Excel) is a spreadsheet program written and distributed by Microsoft for computers using the Microsoft Windows operating system and for Apple Macintosh computers. It features an intuitive interface and capable calculation and graphing tools which, along with aggressive marketing, have made Excel one of the most popular microcomputer applications to date. It is overwhelmingly the dominant spreadsheet application available for these platforms and has been so since version 5 in 1993 and its bundling as part of Microsoft Office.
What is Microsoft Word ?
Microsoft Word, or Microsoft Office Word, is Microsoft's flagship word processing software. It was first released in 1983 under the name Multi-Tool Word for Xenix systems.[1] Versions were later written for several other platforms including IBM PCs running DOS (1983), the Apple Macintosh (1984), SCO UNIX, OS/2 and Microsoft Windows (1989). It became part of the Microsoft Office suite, in which it is referred to as Microsoft Office Word, although it is still also sold as a standalone product or bundled with Microsoft Works.
What is microsoft active directory ?
Active Directory is an implementation of LDAP directory services by Microsoft for use in Windows environments. Active Directory allows administrators to assign enterprise-wide policies, deploy programs to many computers, and apply critical updates to an entire organization. An Active Directory stores information and settings relating to an organization in a central, organized, accessible database. Active Directory networks can vary from a small installation with a few hundred objects, to a large installation with millions of objects.
Active Directory was previewed in 1996, released first with Windows 2000, and saw some revision to extend functionality and improve administration in Windows Server 2003.
Active Directory was called NTDS (NT Directory Service) in older Microsoft documents. This name remains in some AD binaries as well.
Active Directory was previewed in 1996, released first with Windows 2000, and saw some revision to extend functionality and improve administration in Windows Server 2003.
Active Directory was called NTDS (NT Directory Service) in older Microsoft documents. This name remains in some AD binaries as well.
what is microsoft access ?
Microsoft Access (current full name Microsoft Office Access) is a relational database management system from Microsoft, packaged with Microsoft Office Professional which combines the relational Microsoft Jet Database Engine with a graphical user interface.
Microsoft Access can use data stored in Access/Jet, Microsoft SQL Server, Oracle, or any ODBC-compliant data container. Skilled software developers and data architects use it to develop application software. Relatively unskilled programmers and non-programmer "power users" can use it to build simple applications. It supports some object-oriented (OO) techniques but falls short of being a fully OO development tool.
Microsoft Access was also the name of a communications program from Microsoft, meant to compete with ProComm and other programs. This Microsoft Access proved a failure and was dropped. Years later Microsoft reused the name for its database software.
Microsoft Access can use data stored in Access/Jet, Microsoft SQL Server, Oracle, or any ODBC-compliant data container. Skilled software developers and data architects use it to develop application software. Relatively unskilled programmers and non-programmer "power users" can use it to build simple applications. It supports some object-oriented (OO) techniques but falls short of being a fully OO development tool.
Microsoft Access was also the name of a communications program from Microsoft, meant to compete with ProComm and other programs. This Microsoft Access proved a failure and was dropped. Years later Microsoft reused the name for its database software.
What is pentium microprocessor ?
A 32-bit microprocessor introduced by Intel in 1993. It contains 3.3 million transistors, nearly triple the number contained in its predecessor, the 80486 chip. Though still in production, the Pentium processor has been superseded by the Pentium Pro and Pentium II microprocessors. Since 1993, Intel has developed the Pentium III and more recently the Pentium 4 microprocessors.
What is intel celron ?
A Celeron is any of a large number of different budget x86 microprocessors produced by Intel and marketed as a budget/value CPU line. The Celeron family complements Intel's higher-performance (and more expensive) Pentium CPU family. Introduced in April 1998, the first Celeron was based on the Pentium II core. Later versions were based on the Pentium III, Pentium 4, and Pentium M. These processors are suitable for most applications, but their performance is somewhat limited when it comes to running intense applications, such as cutting edge games or graphical modeling programs, especially when compared to that of their high-end counterparts.
What is intelligence ?
There are probably as many definitions of intelligence as there are experts who study it. Simply put, however, intelligence is the ability to learn about, learn from, understand, and interact with one’s environment. This general ability consists of a number of specific abilities, which include these specific abilities:
* Adaptability to a new environment or to changes in the current environment
* Capacity for knowledge and the ability to acquire it
* Capacity for reason and abstract thought
* Ability to comprehend relationships
* Ability to evaluate and judge
* Capacity for original and productive thought
Additional specific abilities might be added to the list, but they would all be abilities allowing a person to learn about, learn from, understand, and interact with the environment.
* Adaptability to a new environment or to changes in the current environment
* Capacity for knowledge and the ability to acquire it
* Capacity for reason and abstract thought
* Ability to comprehend relationships
* Ability to evaluate and judge
* Capacity for original and productive thought
Additional specific abilities might be added to the list, but they would all be abilities allowing a person to learn about, learn from, understand, and interact with the environment.
What is internal medicine ?
Doctors of internal medicine ("internists") are medical specialists who focus on adult medicine and have had special study and training focusing on the prevention and treatment of adult diseases. At least three of their seven or more years of medical school and postgraduate training are dedicated to learning how to prevent, diagnose, and treat diseases that affect adults. Internists are sometimes referred to as the "doctor's doctor," because they are often called upon to act as consultants to other physicians to help solve puzzling diagnostic problems. While the name "internal medicine" may lead one to believe that internists only treat "internal" problems, this is not the case. Doctors of internal medicine treat the whole person, not just internal organs.
What is intranet ?
A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization. An intranet's Web sites look and act just like any other Web sites, but the firewall surrounding an intranet fends off unauthorized access.
Like the Internet itself, intranets are used to share information. Secure intranets are now the fastest-growing segment of the Internet because they are much less expensive to build and manage than private networks based on proprietary protocols
Like the Internet itself, intranets are used to share information. Secure intranets are now the fastest-growing segment of the Internet because they are much less expensive to build and manage than private networks based on proprietary protocols
What is a Browser?
What is a Browser?
A browser is a computer program that resides on your computer enabling you to use the computer to view WWW documents and access the Internet taking advantage of text formatting, hypertext links, images, sounds, motion, blogs, and other features. Firefox and Internet Explorer are currently the leading "graphical browsers" in the world (meaning they facilitate the viewing of graphics such as images and video and more). There are other browsers (e.g., Mozilla, Safari, Opera). Most offer many of the same features and can be successfully used to retrieve documents and activate many kinds of programs.
Browsers all rely on "plug-ins" to handle the fancier files you find on the Web. Plug-ins are sub-programs stored within a browser or elsewhere in your computer especially to support special types of files you may click on. If you click on a link, and your computer does not currently have the plug-in needed for the file you clicked on, you are usually prompted with an opportunity to get the plug-in. Most plug-ins are free, and easy and safe to install on your computer; follow the instructions you are given.
The main way in which browsers differ is in the convenience features they offer for navigating and managing the Web and all the URLs you may want to keep track of. Netscape and Internet Explorer both offer the ability to e-mail documents, download them to diskette, print them, and keep track of where you've been and sites you want to "bookmark" or "Add to Favorites" (Microsoft's name bookmarks).
A browser is a computer program that resides on your computer enabling you to use the computer to view WWW documents and access the Internet taking advantage of text formatting, hypertext links, images, sounds, motion, blogs, and other features. Firefox and Internet Explorer are currently the leading "graphical browsers" in the world (meaning they facilitate the viewing of graphics such as images and video and more). There are other browsers (e.g., Mozilla, Safari, Opera). Most offer many of the same features and can be successfully used to retrieve documents and activate many kinds of programs.
Browsers all rely on "plug-ins" to handle the fancier files you find on the Web. Plug-ins are sub-programs stored within a browser or elsewhere in your computer especially to support special types of files you may click on. If you click on a link, and your computer does not currently have the plug-in needed for the file you clicked on, you are usually prompted with an opportunity to get the plug-in. Most plug-ins are free, and easy and safe to install on your computer; follow the instructions you are given.
The main way in which browsers differ is in the convenience features they offer for navigating and managing the Web and all the URLs you may want to keep track of. Netscape and Internet Explorer both offer the ability to e-mail documents, download them to diskette, print them, and keep track of where you've been and sites you want to "bookmark" or "Add to Favorites" (Microsoft's name bookmarks).
What is the World Wide Web and what makes it work?
What is the World Wide Web and what makes it work?
The WWW incorporates all of the Internet services above and much more. You can retrieve documents, view images, animation, and video, listen to sound files, speak and hear voice, and view programs that run on practically any software in the world, providing your computer has the hardware and software to do these things.
When you log onto the Internet using a web browser (e.g., Internet Explorer, Firefox, Mozilla, Netscape, Opera, Safari), you are viewing documents on the World Wide Web. The basic foundation on which the WWW functions is the programming language called HTML. It is HTML and other programming imbedded within HTML that make possible hypertext. Hypertext is the ability to have web pages containing links, which are areas in a page or buttons or graphics on which you can click your mouse button to retrieve another document into your computer. This "clickability" using Hypertext links is the feature which is unique and revolutionary about the Web.
How do hypertext links work? Every document or file or site or movie or soundfile or anything you find on the Web has a unique URL (uniform resource locator) that identifies what computer the thing is on, where it is within that computer, and its specific file name. (More explanation on the structure of URLs.) Every Hypertext link on every web page in the world contains one of the URLs. When you click on a link of any kind on a Web page, you send a request to retrieve the unique document on some computer in the world that is uniquely identified by that URL. URLs are like addresses of web pages. A whole cluster of internationally accepted standards (such as TCP/IP and HTML) make possible this global information retrieval phenomenon that transcends all political and language boundaries.
The WWW incorporates all of the Internet services above and much more. You can retrieve documents, view images, animation, and video, listen to sound files, speak and hear voice, and view programs that run on practically any software in the world, providing your computer has the hardware and software to do these things.
When you log onto the Internet using a web browser (e.g., Internet Explorer, Firefox, Mozilla, Netscape, Opera, Safari), you are viewing documents on the World Wide Web. The basic foundation on which the WWW functions is the programming language called HTML. It is HTML and other programming imbedded within HTML that make possible hypertext. Hypertext is the ability to have web pages containing links, which are areas in a page or buttons or graphics on which you can click your mouse button to retrieve another document into your computer. This "clickability" using Hypertext links is the feature which is unique and revolutionary about the Web.
How do hypertext links work? Every document or file or site or movie or soundfile or anything you find on the Web has a unique URL (uniform resource locator) that identifies what computer the thing is on, where it is within that computer, and its specific file name. (More explanation on the structure of URLs.) Every Hypertext link on every web page in the world contains one of the URLs. When you click on a link of any kind on a Web page, you send a request to retrieve the unique document on some computer in the world that is uniquely identified by that URL. URLs are like addresses of web pages. A whole cluster of internationally accepted standards (such as TCP/IP and HTML) make possible this global information retrieval phenomenon that transcends all political and language boundaries.
What is the Internet?
What is the Internet?
The Internet is a network of networks, linking computers to computers sharing the TCP/IP protocols. Each runs software to provide or "serve" information and/or to access and view information. The Internet is the transport vehicle for the information stored in files or documents on another computer. It can be compared to an international communications utility servicing computers. It is sometimes compared to a giant international plumbing system. The Internet itself does not contain information. It is a slight misstatement to say a "document was found on the Internet." It would be more correct to say it was found through or using the Internet. What it was found in (or on) is one of the computers linked to the Internet.
Computers on the Internet may use one or all of the following Internet services:
* Electronic mail (e-mail). Permits you to send and receive mail. Provides access to discussion groups often called Listservs� after the software they operate under.
* Telnet or remote login. Permits your computer to log onto another computer and use it as if you were there.
* FTP or File Transfer Protocol. Allows your computer to rapidly retrieve complex files intact from a remote computer and view or save them on your computer.
* Gopher. An early, text-only method for accessing internet documents. Gopher has been almost entirely subsumed in the World Wide Web, but you may still find gopher documents linked to in web pages.
* The World Wide Web (WWW or "the Web"). The largest, fastest growing activity on the Internet.
* RSS readers, interpeting XML in a way analogous to how browsers interpret HTML
The Internet is a network of networks, linking computers to computers sharing the TCP/IP protocols. Each runs software to provide or "serve" information and/or to access and view information. The Internet is the transport vehicle for the information stored in files or documents on another computer. It can be compared to an international communications utility servicing computers. It is sometimes compared to a giant international plumbing system. The Internet itself does not contain information. It is a slight misstatement to say a "document was found on the Internet." It would be more correct to say it was found through or using the Internet. What it was found in (or on) is one of the computers linked to the Internet.
Computers on the Internet may use one or all of the following Internet services:
* Electronic mail (e-mail). Permits you to send and receive mail. Provides access to discussion groups often called Listservs� after the software they operate under.
* Telnet or remote login. Permits your computer to log onto another computer and use it as if you were there.
* FTP or File Transfer Protocol. Allows your computer to rapidly retrieve complex files intact from a remote computer and view or save them on your computer.
* Gopher. An early, text-only method for accessing internet documents. Gopher has been almost entirely subsumed in the World Wide Web, but you may still find gopher documents linked to in web pages.
* The World Wide Web (WWW or "the Web"). The largest, fastest growing activity on the Internet.
* RSS readers, interpeting XML in a way analogous to how browsers interpret HTML
Subscribe to:
Posts (Atom)
Blog Archive
-
▼
2006
(509)
-
▼
November
(509)
-
▼
Nov 18
(42)
- What is nadi astrology ?
- WHAT IS MY MOON SIGN (RAASI) ?
- What is sun sign ?
- What is vedic astrology ?
- What is Numerology?
- What is palmistry?
- What is zodiac sign ?
- WHAT IS A BIRTHCHART?
- What is horoscope ?
- What is astrology ?
- What is Article Marketing?
- What is Art .... ?
- What is Animal Abuse?
- What is alternative medicine?
- What is Affiliate Marketing?
- What is Aerobics Cardio ?
- What is Aerobic Exercise and Why should I do it?
- What is Advertising?
- What is AAA (Authentication, Authorization, and Ac...
- What is a packet sniffer?
- What is an Intrusion Detection System (IDS)?
- What is a DMZ?
- What is a packet sniffer?
- What is an Intrusion Detection System (IDS)?
- What is a firewall?
- What is the use of infrared in cell phone?
- What is Wipro Technologies ?
- What is Infosys ?
- What is IBM ?
- What is Microsoft ?
- What is Microsoft Excel ?
- What is Microsoft Word ?
- What is microsoft active directory ?
- what is microsoft access ?
- What is pentium microprocessor ?
- What is intel celron ?
- What is intelligence ?
- What is internal medicine ?
- What is intranet ?
- What is a Browser?
- What is the World Wide Web and what makes it work?
- What is the Internet?
-
▼
Nov 18
(42)
-
▼
November
(509)
Mr.Shashi kiran
- skiranks
- bangalore, India