Here is the thing about the botnets that they are the networks of compromised computers controlled by the remote attackers. They can attack in such
Year: 2013
3D Printing Robot Produces Chairs And Tables From Recycled Waste
See on Scoop.it – Talks 4 tech Two years ago, a Dutch student named Dirk Vander Kooij was designing furniture and preparing for his graduation
WordPress app for windows 8
Posting this blog via windows 8 app of wordpress.com. Its just amazing. Those who are using windows 8 I request them to install this app
Skipping the lock screen in windows 8
As we start the machine having windows 8, we see a start screen with the pictures. This gives OS a load to load that image.
Developing windows 8 apps
[slideshare id=17557525&doc=developingwindows8apps-130323123218-phpapp02]
Data Flow Diagram ( DFD )
Data flow diagram is usually used to show model the system’s data processing. All the processing steps are shown in the diagram through the system.
Context Modeling : An approach to the system modeling
Context modeling is basically the modeling, that is used to illustrate the operational context of the system that is to be made. This modeling shows
Blogging: share and grow
[slideshare id=17335793&w=427&h=356&sc=no] BLOGGING from Chandan Gupta
Software Quality
Basically if we talk about the software quality there is no clear answer to it. The answer varies from person to person. So following any
System Analysis: A step to system development
All of us know what the system is? But if some one asks us what the system analysis is most of us fail to answer