tag:blogger.com,1999:blog-14666615503955945112024-02-20T00:46:45.949-08:00Mobile and Web BlogSuresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.comBlogger115125tag:blogger.com,1999:blog-1466661550395594511.post-70480885433870269002008-07-27T20:14:00.000-07:002008-07-27T20:27:27.603-07:00Microsoft tries BrowserRank to replace Google PageRankA research paper <a href="http://research.microsoft.com/users/tyliu/files/fp032-Liu.pdf" target="_blank">BrowseRank: Letting Web Users Vote for Page Importance </a> delivered at a conference in Singapore this week, highlights <a href="http://research.microsoft.com/aboutmsr/labs/asia/default.aspx" target="_blank">Microsoft Asia Research's</a> alternative to Google's PageRank algorithm, BrowserRank - "The more visits of the page made by the users and the longer time periods spent by the users on the page, the more likely the page is important. We can leverage hundreds of millions of users' implicit voting on page importance,". <br/><br/><div align="center"><img src="http://blackefx.com/blogimages/Microsoft_BrowseRank.png" style="border-width:0px;" align="center" border="0" alt="Microsoft BrowserRank"/></div><br/>The new process, in theory, ranks sites based on their usage, and user behavior patterns. Google's algorithmic stew for rankings remains a great mystery, and an ever changing set of goalposts that are constantly gamed by companies looking to leverage search results to drive traffic, and drive revenues. Microsoft sees Google's strength in this regard as being its weakness, too, arguing that web developers have many opportunities to influence the ranking system, unfairly. BrowserRank, on the other hand, would actually try and take a look at user behavior on a site, Microsoft arguing that the more people are engaged by a site, the more likely it is that it has relevance.<br/><br/>Search is of tremendous importance to the Internet for many reasons. For one thing, search engines are highly influential middlemen that steer users to Web sites they may not be able to find on their own. For another, queries typed into search engines can be powerful -- and in Google's case highly profitable -- indications of what type of advertisement to place next to the search results. <br/><br/>But Microsoft lags leader Google and No. 2 Yahoo in search. It's trying hard to catch up, for example with unsuccessful proposals to acquire Yahoo or its search business that would cost the company billions of dollars. And Microsoft just bought search start-up Powerset.<br/><br/>Google isn't putting all its eggs in the PageRank basket, though. <br/> <br/>"It's important to keep in mind that PageRank is just one of more than 200 signals we use to determine the ranking of a Web site," the company said in a statement. "Search remains at the core of everything Google does, and we are always working to improve it." <br/><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com3tag:blogger.com,1999:blog-1466661550395594511.post-90484999574535875372008-07-24T06:13:00.000-07:002008-07-24T06:27:48.136-07:00Pizza - the Top Trend Mobile Search<a href="http://www.v-enable.com" target="_blank">V-Enable</a>, a voice-enabled mobile 411 system, conducted a study by taking a random sampling of 20,000 searches in major metropolitan areas from customers of several V-Enable partner carriers including Alltel and MetroPCS. The findings clearly represent interesting trends caused by the recession. For one thing, people are eating more pizza! The results for the top restaurant searches for the period between October 2007 and June 2008 are:<br/><br/><blockquote><p>1. Pizza Hut<br>2. McDonald’s<br>3. Domino’s Pizza<br>4. Starbucks<br>5. Papa John’s Pizza<br>6. Little Caesars Pizza<br>7. Taco Bell<br>8. Burger King<br>9. Wendy’s<br>10. Denny’s</p></blockquote><br/><p>Sit-down restaurants like Olive Garden, Applebee’s and Red Lobster, have dropped off the list, while recession-proof comfort food like Pizza Hut and Domino’s shoot to the top of the list. 380% more searches for Pizza Hut have been conducted during the period, and searches for Domino’s Pizza have increased 980%. High gas prices are keeping people at home ordering in, and they are opting for cheaper alternatives. Financial analysts have explored this area extensively, and have <a href="http://www.fool.com/investing/dividends-income/2008/06/27/recession-proof-stocks-yum-brands.aspx" target="_blank">deemed</a> <a href="http://financialadvice.co.uk/news/5/investments/7279/Domino%27s-Pizza-Beats-The-Gloom.html" target="_blank">several</a> of these restaurant chains "recession-proof stocks."</p><br/><p>There are several other search-related economic indicators from V-Enable. U-Haul, a company that was never on any top 50 list, jumped to #23 in general search, possibly because of a rise in foreclosures. Macy’s dropped from #17 to #49 in retail, a direct correlation to the fact that people just don’t have the discretionary income that they used to. Motel 6 has never showed up on a top 50 list, but they are now #37 in general search, quite possibly because travelers can’t afford the costly alternatives. Mobile search happens in real-time and is unaffected by SEO, making these statistics arguably more reflective of consumer sentiment than web search. </p><br/><p>V-Enable is a mobile information system, where users can speak the name of a restaurant or residential listing and receive location and contact information. The company also has live operators working behind the scenes so that users can call and <a href="http://www.techcrunch.com/2008/04/11/v-enalbe-adds-real-humans-for-new-411-pitch/" target="_blank">get human assistance</a>, if necessary. V-Enable sent us <a href="http://www.techcrunch.com/2007/12/18/american-shoppers-cant-find-walmart-but-v-enable-helps-them/" target="_blank"> similar retail statistics</a> in December. The company is backed by $10.1 million over 3 rounds from Siemens Mobile Acceleration Corporation, Sorrento Ventures, SoftBank Capital and Palisades Ventures.</p><br/>credit : <a href="http://www.techcrunch.com/2008/07/23/mobile-search-trends-show-economic-decline-and-rise-in-pizza" target="_blank">techcrunch</a><br/><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com1tag:blogger.com,1999:blog-1466661550395594511.post-24323607606147862902008-07-21T17:30:00.000-07:002008-07-21T17:47:18.444-07:00Google Search Tips - part1<div><b>1. Google can be your phone book.</b> Type the person's name, city and state directly into the search box, Google will deliver phone and address at the top of the results. This feature works for business listing too.<br/><br/> Google can also work as the reverse directory; if you have phone number, type in the search box, and google will deliver the results that matches the phone number.<br/><br/><b>2. Google can be your calculator.</b> Type a math problem into the search box and google will compute and display the result. You can spell out the equation in words (one plus one, six divided by two), use numbers and symbols (4*5,6/2), or type in a combination of both (ten million *pi, 15% of six).<br/><br/><b>3. Longer queries is better, but shorter is okay.</b> Google is designed to deliver high quality result even if you are searching for one or two word queries, so its better to keep your search short. But adding a few more words will yield better result.<br/><br/> For Example : When you are searching information on applying to colleges, include the word <em>admissions </em> after the name of the university you are searching to get more relevent results.<br/><br/><b>4. Use quotation marks when precision matters.</b> Typing "<em>the truth of linux</em>" into the google search box will yield Web pages about the linux truth - but leaving off the quotes will produce an assortment of unrelated pages.<br/><br/> The reason behind this : adding quote marks around the search query tells google to look for occurrences of the exact phrase as it was typed. That makes quote marks especially helpful when searching for song lyrics, people's name or expressions such as "<em>to be or not to be</em>" that include very common words.<br/><br/><b>5. Google can be your dictionary.</b> Type <em>define</em> followed by any English word into the search box, and google will deliver a quick definition at the top of the result.<br/><br/> <b>6. Forgot plural.</b> Google automatically search for all the stems of a word , so you don't need to do separate searches for <em>sleep, sleeps, sleeping</em>. Just type one of the words into the search box, and google will take care of the rest, giving you results all in one list.</div><br/><b> Next Post : </b> Google Search Tips - part2<br/><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com4tag:blogger.com,1999:blog-1466661550395594511.post-58307933458476327732008-07-20T18:00:00.000-07:002008-07-20T18:20:17.104-07:00Google's Bigtable<div><img src="http://www.smh.com.au/ffximage/2005/02/02/60_google.jpg" align="left" border="0" style="border-width: 0px;Float:left;" /> <a href="http://labs.google.com/papers/bigtable.html" target="_blank">Big Table</a> is an ongoing research project to create a structured database that will operate in a distributed environment. It is a distributed storage system for managing structured data that is designed to scale to a very large size: petabytes of data across thousands of commodity servers.<br/><br/>It is like a spreadsheet with hugh limitless rows and columns, each rows will be identified by key. It is different from traditional Hierarchy Database where it will have lot of tables and each table will be linked by keys. BigTable will have only one table with limitless rows and columns. We can perform joins, sub selects and other queries in bigtable similar to Traditional hierarchial tables, but in a different way.<br/><br/>Many projects at Google store data in Bigtable, including web indexing, Google Earth, and Google Finance.Bigtable has successfully provided a flexible, high-performance solution for all of these Google products.</div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com0tag:blogger.com,1999:blog-1466661550395594511.post-32737462342346403662008-07-19T09:17:00.000-07:002008-07-19T09:22:24.351-07:00Eight Reasons for Linux OS Is Like a Religion<div><b>1.</b> Christianity has Jesus as Lord and Savior. Linux has Linus Torvalds.<br/><br/><b>2.</b> Jesus Christ was followed by the disciples, while Linux Torvalds was assisted by the original programmers.<br/><br/><b>3.</b> Christianity has different Denominations. Linux has Distributions.<br/><br/><b>4.</b> Accepting Jesus as your savior saves you from the fires of hell and demons, while installing Linux on your computer will protect you from the hell of data loss, viruses, and malware.<br/><br/><b>5.</b> Christianity views Satan as the being of ultimate evil, while Linux perceives Bill Gates as the Evil One.<br/> <br/><b>6.</b> Linux is defined by its source code, while Christianity follows the Bible.<br/><br/><b>7.</b> Christianity offers salvation for no cost at all other than the occasional tithe and charity donation. Linux is also free with only the occasional shipping charge or support fee.<br/><br/><b>8.</b> Religious folks are instructed to go out into the world and teach others the good news. Linux users also do their part in converting those that have been drawn in to the evil darkness of Microsoft.</div><br/>Credit : <a href="http://www.divinecaroline.com/article/22279/52496-eight-reasons-linux-os-religion" target="_blank">divinecaroline.com</a><br/><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com2tag:blogger.com,1999:blog-1466661550395594511.post-59350152316356069292008-07-18T03:35:00.000-07:002008-07-19T03:57:04.803-07:00Benefits Of Adobe AIR<div><img src="http://blog.paranoidferret.com/files/air_icon.gif" border="0" align="left" style="border-width: 0px;Float:left;" />With the Adobe® AIR™ runtime, you can deliver branded rich Internet applications (RIAs) on the desktop that give you a closer connection to your customer.<br/><br/>Adobe AIR uses the same proven, cost-effective technologies used to build web applications, so development and deployment is rapid and low risk. You can use your existing web development resources to create engaging, branded applications that run on all major desktop operating systems.<br/><br/>The benefits are extensive. By using Adobe AIR as part of your RIA strategy, you can boost productivity, extend your market reach, enhance customer satisfaction, improve customer retention, lower costs, and increase profits.<br/><br/><h4>Business Benefits</h4><br/>Companies like eBay, AOL, and NASDAQ are already using Adobe AIR to deliver engaging RIAs to their users' desktops. With Adobe AIR, you can:<br/> <ul><li>Establish a more persistent connection with existing customers.</li><li> Deliver fully branded experiences with desktop functionality.</li><li>Leverage existing personnel, processes, and infrastructure.</li><li>Develop and deliver RIAs efficiently using proven Adobe technology.</li><li>Increase the ROI of your web investments.</li></ul><b>If you have any AIR Usage Benefits, please share with us through comment.</b><br/><br/> </div>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com0tag:blogger.com,1999:blog-1466661550395594511.post-40020140788346267302008-07-17T20:30:00.000-07:002008-07-17T20:45:19.567-07:00Preventing Phishing attacks<div><h4>Phishing Attack</h4><br/>Phishing is a type of attack wherein the attacker impersonates a valid site and steals sensitive information entered by the customer on the fake site. <br/><br/>The attacker sends the victim a forged e-mail having the link of a fake page. The fake page looks exactly like a valid page of the original site. These e-mails have upsetting or exciting (but false) statements to get the customer to react immediately. When the customer clicks the link, he is asked to provide his credentials to login and update his personal information. This reveals important information to the attackers.<br/><br/><h4>Steps to prevent these Attack </h4><br/>The best way to prevent phishing attacks is by creating <b>customer awareness</b>. Some important points that need to be communicated to the customers includes:<br/><br/><b>1.</b> Organizations should constantly remind their customers that they will never request for sensitive information via e-mails. Moreover all email communications should address the customer by first and last name.<br/><br/><b>2.</b> Customers need to be educated not to click on URL of critical website (e.g. Internet banking website) that comes via email but visit these websites by directly typing the address in the browser. <br/><br/><b>3.</b> Customers should be educated on identifying secure websites, like https in URL or ‘Lock’ icon, before submitting username, password, credit card number and other sensitive information.<br/><br/><b>4.</b> Customers should be educated about choosing strong passwords and the importance of changing them regularly. <a href="http://suresh-mobileweb.blogspot.com/2008/06/google-warns-against-weak-passwords.html" target="_blank">How to choose a Strong Password</a><br/><br/><b>5.</b> Customers should be educated to be suspicious of any e-mail with urgent request for personal information. <br/><br/><b>6.</b> Customers should be provided with easy methods to report phishing incidents.<br/><br/><b>if you have any other steps to prevent phishing attacks, please share with us by comments.</b><br/><br/></div>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com1tag:blogger.com,1999:blog-1466661550395594511.post-79957770594802562022008-07-16T19:30:00.000-07:002008-07-16T19:51:26.618-07:00Predictions for Next Gen iPhone<div align="center"><img src="http://blackefx.com/blogimages/iphone3g.jpg" border="0" align="center" alt="iphone 3G" style="border-width:0px;"/></div>The latest shiny new iPhone with its super fast 3G web browsing is here and selling out fast – but that may in part be due to low initial stocks in the stores as well as consumer demand. The launch was not smooth with problems in the <a title="USA problems" href="http://news.cnet.com/8301-17938_105-9988807-1.html" target="_blank">USA with AT&T activation server crashes</a><span style="color: rgb(0, 0, 128);"> </span>and with <a title="O2 problems" href="http://www.guardian.co.uk/media/2008/jul/14/mediabusiness.mobilephones?gusrc=rss&feed=media" target="_blank">O2 in the UK</a><span style="color: rgb(0, 0, 128);"> </span>causing <a title="Gizmodo iPhone reviews" href="http://gizmodo.com/5024882/iphone-3g-reviews" target="_blank">Gizmodo to call the event “iPocalypse”</a>. But, dispite the problems, <a title="Apple" href="http://www.apple.com" target="_blank">Apple</a><span style="color: rgb(0, 0, 128);"> are</span> already claiming to have <a title="1 million iPhone sales" href="http://blogs.zdnet.com/BTL/?p=9315" target="_blank">sold 1 million iPhones </a>over Friday, Saturday and Sunday – higher than expected and over 7 days less than the first release – but then they had 28 operators in 22 countries this time. <br/><br/>Time will tell if this new model, with its new features and lower prices will deliver the success that Apple initially planned. Like many other people this weekend, I found myself testing out the latest iPhone features in the local store… The prospect of super-fast browsing on a large mult-touch screen and the promise of upcoming <a title="iPhone TomTom" href="http://www.reuters.com/article/topNews/idUSB46553120080609" target="_blank">TomTom navigation</a> using the new GPS capabilities is very tempting – probably a good job they had none in stock.<br/><br/>So is that it for Apple? Do they have the perfect phone? Well, of course not – there are plenty of niggles and many things they should be looking at for their seemingly annual phone release, especially with new versions of Microsoft Mobile and the new Google Android looming on the horizon. The new <a title="Apple App Store" href="http://www.apple.com/iphone/appstore" target="_blank">App Store</a> is a great start and will give customers a steady fix of new iPhone goodness until the next big release. It opens the opportunities for third parties to start filling the gaps by adding more value (hurry up TomTom).<br/><br/>Last year I was predicting that Santa Jobs would deliver GPS and 3G, but like many others I was also asking for a decent camera. This seems to be the most obvious omission from the new device, especially since we are seeing 5 megapixels fast becoming the standard. We are even seeing a few 8 megapixel super-shooters and even entry level phones are coming with 3.2 megapixels these days. This makes the 2 measlypixel Apple a clear year out of date right from the start. I wouldn’t mind the low pixel count if the quality was good, but so far many sites are reporting low quality too compared with other mass market handsets. So <strong>prediction number 1</strong> would be that 5 megapixel camera with auto-focus and flash – perhaps with face recognition for exposure and focus.<br/><br/><a href="http://blog.bango.com/2008/07/14/next-gen-iphone-%e2%80%93-where-next-for-apple/" target="_blank">Read more>></a><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com1tag:blogger.com,1999:blog-1466661550395594511.post-80572529127099820592008-07-15T19:35:00.000-07:002008-07-15T19:57:15.938-07:00Top 5 Reasons to love iphone 3G<div align="center"><img src="http://blackefx.com/blogimages/iphone3g.jpg" border="0" align="center" alt="iphone 3G" style="border-width:0px;"/></div>After finally getting my iPhone 3G ,I spent most of my time playing with the Apps and App Store. It’s early days but there already some amazing Apps available for the iPhone. This list features top 5 reasons to love or live with iphone 3G.<br/><br/><b>1. Looks (and feels) amazing</b><br/><br/>Whatever you think of the feature set, and the chances of your fat fingers destroying that shiny big screen, the iPhone looks amazing, and it probably feels amazing in the palm of your hand, too. It's sleek, curvy, bright and shiny , slim and sexy, with on-screen icons and buttons that just ooze and drip class.<br/><br/><b>2. Touch screen</b><br/><br/>That touchscreen is a mixed blessing. Fingers are messy things (some people's more than others) and sweeping and tapping them all over a glossy screen is sure to take its toll eventually. Plus, fingers are much fatter than a stylus, so you can't help but obscure what you're interacting with. You'll also have to invest in your own screen protection, as first-generation iPhone doesn't have its own.<br/><br/><b>3. iPod</b> <br/><br/>With its beautiful 3.5-inch widescreen display and Multi-Touch controls, iPhone is also one amazing iPod. Browse your music in Cover Flow and watch widescreen video with the touch of a finger.<br/><br/>Scroll through songs, artists, albums, and playlists with a flick. Browse your music library by album artwork using Cover Flow. Even view song lyrics that you’ve added to your library in iTunes. Get a call while listening to music? A pinch of the microphone on your iPhone headset pauses the tune and answers the call.<br/><br/><b>4. Wi-fi</b><br/><br/>Of course wi-fi isn't everywhere, but it's increasingly easy to hook up to the Internet at home and work, as well as plenty of other places: cafés, libraries, and urban hotspots. iPhone certainly isn't the only handset to include it, but it's a great addition. <br/><br/><b>5. Third party Applications</b><br/><br/>iphone 3G provides lot of third party apps to users.here are the most favorite third party apps.<ul><li> FileMagnet</li><li>Shazam </li><li>Vicinity</li> <li>Things</li><li>OmniFocus</li> <li>Twitterific</li><li>NetNewsWire</li><li>Remote</li><li>Super Monkeyball</li><li> Cube Runner</li></ul><b>please share your comments for 'why you love iphone 3G?'. </b><br/><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com4tag:blogger.com,1999:blog-1466661550395594511.post-63865075093773176102008-07-14T18:49:00.000-07:002008-07-14T18:57:53.106-07:00The Web's Future is in Personalization, Not in Search<div>At the <a href="http://2007.thenextweb.org/home/" target="_blank">Next Web</a> conference in Amsterdam over the weekend, Tapan Bhat, the Yahoo! vice president of Front Doors, told attendees that search would not dominate the web in the future. "The future of the web is about personalization. Where search was dominant, now the web is about 'me.' It's about weaving the web together in a way that is smart and personalized for the user," he said.<br/><br/>Interestingly, Google appears to have similar ideas. A couple of weeks ago, Google's CEO Eric Schmidt told the <a href="http://www.ft.com/cms/s/c3e49548-088e-11dc-b11e-000b5df10621.html" target="_blank">Financial Times</a> that personalization was a key area of research for Google. "We are very early in the total information we have within Google. The algorithms will get better and we will get better at personalization," he said. "The goal is to enable Google users to be able to ask the question such as ‚ÄòWhat shall I do tomorrow?‚Äô and ‚ÄòWhat job shall I take?‚Äô"<br/><br/>Both Google and Yahoo! are hoping to take data about user behavior aggregated from across their properties (think: search history, del.icio.us bookmarks, Flickr photos, Upcoming events, Answers questions, etc.) in order to learn more about what each user wants. The ultimate goal is to deliver a more personalized experience to the user.<br/><br/> Privacy fears aside, if Google and Yahoo! are right, and personalization is where the web is headed, then Google might be more vulnerable than anyone thinks. According to Compete, the stickiest site on the web -- the one that demands most of our attention -- is MySpace, followed by Yahoo! and eBay. Google is actually 5th (based on February 2007 numbers). Facebook, which was 8th in February according to Compete, is likely to make a big push as their new platform adds more useful applications for users, giving them less of a reason to ever leave the site.<br/><br/>Why is attention important? Because the more time you have to interact with users, the more chance you have to gather information about them. The more information you have about them, the more useful and personalized you can make your service and the better you can target advertising and capture a users' ecommerce spending. If the web paradigm is indeed shifting from search to personalization, then it would appear that Yahoo! and social networking sites like MySpace and Facebook might be in a better position to take advantage of that than Google.<br/><br/>What do you think? Is search dead? Is personalization the next big thing? Is this a tacit admission of defeat by Yahoo! or is it visionary foresight? Who is in the best position to dominate the personalized web?.<br/><br/>credit : <a href="http://www.readwriteweb.com" target="_blank">Read/Write Web</a></div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com0tag:blogger.com,1999:blog-1466661550395594511.post-85126627301768322008-07-13T19:13:00.000-07:002008-07-13T19:26:32.935-07:00Google can crawl text in Flash files<div>Google has been developing a new algorithm for indexing textual content in Flash files of all kinds, from Flash menus, buttons and banners, to self-contained Flash websites. Recently, we've improved the performance of this Flash indexing algorithm by integrating <a href="http://www.adobe.com/aboutadobe/pressroom/pressreleases/200806/070108AdobeRichMediaSearch.html" target="_blank">Adobe's Flash Player technology</a>.<br/><br/>In the past, web designers faced challenges if they chose to develop a site in Flash because the content they included was not indexable by search engines. They needed to make extra effort to ensure that their content was also presented in another way that search engines could find.<br/><br/>Now that we've launched our Flash indexing algorithm, web designers can expect improved visibility of their published Flash content, and you can expect to see better search results and snippets. There's more info on the <a href="http://googlewebmastercentral.blogspot.com/2008/06/improved-flash-indexing.html" target="_blank">Webmaster Central blog</a> provides more technical details about the Searchable SWF integration.</div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com0tag:blogger.com,1999:blog-1466661550395594511.post-9128182080139991472008-07-12T05:10:00.000-07:002008-07-12T05:30:25.348-07:00iphone 3G Missing Features<div align="center"><img src="http://blackefx.com/blogimages/iphone3g.jpg" border="0" align="center" alt="iphone 3G" style="border-width:0px;"/></div>New and Improved iphone 3G from Apple has lot of exciting features. Here are the missing Features, hope will be available in the future version. <ul><li>No video recording.</li><li>No card slot.</li><li>No MMS.</li><li>No copy&paste.</li><li>No voice dailing.</li><br /><li>No Stereo Bluetooth.</li><li>No user replacable battery.</li> <li>No more online sale and activation.</li></ul><b>If i have missed any featues that fit in the above list, please let me know.</b><br/><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com4tag:blogger.com,1999:blog-1466661550395594511.post-32304236748860183282008-07-11T08:36:00.000-07:002008-07-11T08:47:11.602-07:00Mobile Flash becomes free - Adobe<div>Today Adobe announced a series of changes to its emerging web applications platform. The changes include:<br /><br />--The next version of the mobile Flash runtime will be free of license fees. Adobe also confirmed that the mobile version of the Air runtime will be free. <br /><br />--Adobe changed its licensing terms and released additional technical information that will make it easier for companies to create their own Flash-compatible products.<br /><br />--The company announced a new consortium called Open Screen supporting the more open versions of Flash and Air. Members of the new group include the five leading handset companies, three mobile operators (including NTT DoCoMo and Verizon), technology vendors (including Intel, Cisco, and Qualcomm), and content companies (BBC, MTV, and NBC Universal). Google, Apple, and Microsoft are not members. It's not clear to me what the consortium members have actually agreed to do. My guess is it's mostly a political group.<br /><br />Adobe said that the idea behind the announcements is to create a single consistent platform that lets developers create an application or piece of content once and run it across various types of devices and operating systems. That idea is very appealing to developers and content companies today. It was equally appealing two years ago, when then-CEO of Adobe Bruce Chizen made the exact same promise (<a href="http://mobileopportunity.blogspot.com/2006/05/flash-versus-windows-can-adobe-break.html" target="_blank">link</a>):<br /><br /><blockquote>If we execute appropriately we will be the engagement platform, or the layer, on top of anything that has an LCD display, any computing device -- everything from a refrigerator to an automobile to a video game to a computer to a mobile phone.</blockquote><br />If Adobe had made the Open Screen announcement two years ago, I think it could have caught Microsoft completely flat-footed, and Adobe might have been in a very powerful position by now. But by waiting two years, Adobe gave Microsoft advance warning and plenty of runway room to react -- so much so that ArsTechnica today called Adobe's announcement a reaction to Microsoft Silverlight (<a href="http://arstechnica.com/news.ars/post/20080501-adobe-seeks-to-extend-reach-of-flash-nukes-licensing-fees.html" target="_blank">link</a>). <br /><br />Also, the most important changes appear to apply to the next version of mobile Flash and the upcoming mobile version of Air -- meaning this was in part a vaporware announcement. Even when the new runtime software ships, it will take a long time to get it integrated into mobile phones. So once again, Microsoft has a long runway to maneuver on.<br /><br />Still, the changes Adobe made are very useful. There's no way Flash could have become ubiquitous in the mobile world while Adobe was still charging fees for it. The changes to the Flash license terms remove one of the biggest objections I've seen to Flash from open source advocates (<a href="http://www.sauria.com/blog/2008/05/01/the-open-screen-project/" target="_blank">link</a>). The Flash community seems excited (<a href="http://www.peterelst.com/blog/2008/05/01/adobe-announces-open-screen-project/" target="_blank">link</a>, <a href="http://labs.findsubstance.com/2008/05/01/adobes-open-screen-project-and-the-future-of-interactive-development/" target="_blank"> link</a>). And the list of supporters is impressive. Looking through the obligatory quotes attached to the Adobe release, two things stand out:<br /><br />--Adobe got direct mentions of Air from ARM, Intel, SonyEricsson, Verizon, and Nokia (although Nokia promised only to explore Air, while it's on the record promising to bundle Silverlight mobile).<br /><br />--The inclusion of NBC Universal in the announcement will have Adobe people chuckling because Microsoft signed up NBC to stream the Olympics online using Silverlight. So NBC is warning Microsoft not to take it for granted, and Adobe gets to stick its tongue out.<br/><br/><b>credit </b> : <a href="http://mobileopportunity.blogspot.com/2008/05/adobe-frees-mobile-flash-its-about-time.html" target="_blank">Mobile Opportunity</a></div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com0tag:blogger.com,1999:blog-1466661550395594511.post-53890540741052037772008-07-10T22:29:00.000-07:002008-07-11T05:37:35.151-07:00Google ratproxy Web Application Tool<div>A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex web 2.0 environments.<br/><br/>Detects and prioritizes broad classes of security problems, such as dynamic cross-site trust model considerations, script inclusion issues, content serving problems,insufficient XSRF and XSS defenses, and much more.<br/><br/>Ratproxy is currently believed to support Linux, FreeBSD, MacOS X, and Windows (Cygwin) environments.<br/><br/>For more details and download ,please visit google official site <a href="http://code.google.com/p/ratproxy/" target="_target"/>here</a>.<br/><br/><img src="http://www.builderau.com.au/i/s/GoogleRatProxy.jpg" align="center" border="0" alt="ratproxy" style="border-width: 0px; float: left;" width="500" height="425"/></div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com0tag:blogger.com,1999:blog-1466661550395594511.post-43613320253591838522008-07-09T23:58:00.000-07:002008-07-09T22:54:03.668-07:0010 Linux Commands You Use More Offen<div><h4>cat</h4><br/><em>cat</em> tells the system to "concatenate" the content of a file to the standard output, usually the screen. If that file happens to be binary, the cat gets a hairball and the output can be a bit ugly. Typically, this is a noisy process as well. what is actually happening is that the cat command is scrolling the characters of the file, and the terminal is doing all it can to interpret and display the data in the file. The interpretation can include the character used to create the bell signal, which is where the noise comes from. the cat command have the following format. <br/><br/><div style="border: 1px solid #000000;background-color: #E1E1E1;"> # cat filename</div> <br/><h4>cd</h4><br/> <em>cd</em> stands for change directory. You will find this command extremely useful. There are three typicla ways you can use this command<ul><li>cd .. : Move one directory up the directory tree.</li> <li>cd - : Moves to your home directory from wherever you currently are.</li> <li>cd directory name : Change to a specific directory. This can be directory relative to your current location or can be based on the root directory by placing the forward slash(/) before the directory name. </li></ul><h4>cp</h4><br/><em>cp</em> command is the abbrevation for copy; therefore , this command enables to copy objects. For eg : to copy the file from <em>file1</em> to <em>file2</em>, issue the following command. <br/><br/><div style="border: 1px solid #000000;background-color: #E1E1E1;"> # cp file1 file2</div> <br/><h4>find</h4><br/> The <em>find</em> command will look in whatever directory you tell it to, as well as subdirectories under that directory, for that file specified. In the following example, the <em>find</em> command searches for files ending with <em>.pl</em> in the current directory.<br/><br/><div style="border: 1px solid #000000;background-color: #E1E1E1;"> # find *.pl</div><br/><h4>grep</h4><br/> The <em>grep</em> (global regular expression parse) command searches the object you specify for the text that you specify. The syntax for the following command.<br/> <br/><div style="border: 1px solid #000000;background-color: #E1E1E1;"> # grep text file</div><br/> <h4>ls</h4><br/>The <em>ls</em> command lists the contents of the directory. The format of the output is manipulated with options. In the following example, the <em>ls</em> command, with no options, list all unhidden files (the file that begin with a dot is a hidden file) in a alphabetical order, filling as many column as will fit in the window. <br/><br/><div style="border: 1px solid #000000;background-color: #E1E1E1;"> # ls</div><br/><h4>more</h4><br/> <em>more</em> is a filter for paging through text one screen at a time. This command can only page down through the text, as apposed to less, which can page both up and down through the text.<br/><br/><h4>rm</h4><br/> <em>rm</em> is used to delete specified files. with the <em>-r</em> option (Warning: This can be dangerous!), <em>rm</em> will recursively remove files. therefore if as root, when you type <em>rm -r</em> , all your files will be gone. By default, rm command will not remove directories.<br/><br/><h4>tar</h4><br/><em> tar </em> is an archiving program designed to store and extract files from an archive file. This tarred file (called as tar file) can be archived to any media including a tape drive and a hard disk. the syntax for the tar command as follows <br/><br/><div style="border: 1px solid #000000;background-color: #E1E1E1;"> # tar action optional functions file(s)/director(ies).</div> <br/><h4>vi</h4><br/> <em>vi</em> is an extremely powerful text editor (not to be confused with a word processor). Using <em>vi</em>,you can see your file on the screen (this is not the case with a line editor, for example), move from point to point in the file, and make changes. But that's where the similarities end. Cryptic commands, a frustrating user interface, and the absence of prompts can all drive you up a wall. Still, if you focus on a few basics, you'll get the job done.<br/><br/> <b>If i have missed any Linux command that fit in the above list, please let me know.</b></div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com3tag:blogger.com,1999:blog-1466661550395594511.post-82392299333993278392008-07-09T02:12:00.000-07:002008-07-09T02:22:02.765-07:00Can AIR Appliations run in a Web Browser<div>Yes, You can test the AIR Applications in the web browser. AIR uses the same rendering engine as Apple's Safari, so that browser will provide the most accurate results (and it's available on both Mac OS X and Windows, as of version 3). Firefox, which also run on both platforms, should also work as well. Firefox has an additional benefit - its excellent Javascript debugging tools.<br/><br/>Although you could, theoretically, test your applications in Internet Explorer, I would advise against doing so for two reasons. <br/><br />1) The Javascript may not behave the same in IE as it will in your AIR apps (this is a common Ajax Problem).<br/><br />2) IE is a notoriously tricky browser that makes even Web development and testing much harder than it should be(in my opinion).</div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com1tag:blogger.com,1999:blog-1466661550395594511.post-40203329384410160532008-07-08T10:15:00.000-07:002008-07-08T10:24:03.122-07:00Ten Commandments of Collecting Email Addresses on Website<div>As anyone who runs a website these days knows, or should know, the recently enacted CAN-SPAM Act of 2003 makes it incumbent on emailers to either be able to establish a certain type of relationship with an email recipient or to adhere to certain mailing standards if no such relationship exists. Failure to do so can land one in Federal (or state) court.<br/><br/>However beyond that there is the court of Internet public opinion, and beyond even that is the high court of spam filters and spam blocking. Truly, you don’t want to run afoul of any of these.<br/> <br/>The safest way to ensure that you stay on the good side of the law, and spam filters, particularly when building a list of email addresses to which you wish to send business, commercial, or other correspondence related to your website, is to follow this simple list of ten DOs and DON’Ts:<br/><br/><h4>DON’Ts:</h4><br/>1. DON’T trap a website visitor’s email address and then add it to a mailing list without their permission.<br><br />2. DON’T use other identifying website visitor information, such as IP address, computer name, etc., to ‘reverse engineer’ or otherwise divine or guess at their email address, and then add it to a mailing list.<br><br />3. DON’T pre-check a check box which “opts in” to your mailings, requiring the visitor to <u>uncheck</u> it in order to not receive your mailing or be added to your mailing list.<br><br />4. DON’T be coy, cute, or evasive about what your intent and policy are with respect to any email address your visitor provides.<br><br />5. DON’T add an email address, even if freely provided, to your mailing list unless you have provided a way for the visitor to clearly indicate that they want to be added to your mailing list, and they so indicate.<br/><br/><h4>DOs:</h4><br/>1. DO state very clearly what you will do with any email address provided by a visitor, including your privacy policy.<br><br />2. DO scrupulously adhere to what you have said you will do with their email address, and never, ever share it with someone else without their explicit permission.<br><br />3. DO collect and store, with the email address submitted, the source IP address, the date and time of the submission, and any other unique identifying information; store it along with the indication of permission the visitor has provided for you to add their address to your mailing list. I cannot stress this enough. When accused of spamming (and you will be), having this information available to refresh the memory of your accuser, and to prove to your ISP that you were not spamming them, will save your hide. An ounce of prevention here is worth a ton of trying to get off a spam blocking list without this exculpatory information.<br><br />4. DO honour opt-out requests religiously, and immediately.<br><br />5. DO pick up ISIPP’s <a href="http://www.isipp.com/can-spam-pack.php" target="_blank"> CAN-SPAM Compliance Pack</a>, chock full of practical advice and tips, and even audio speeches from lawyers from the FTC and a major ISP, to make sure that you get, are, and remain CAN-SPAM compliant. If not that, at <u>least</u> pick up their <a href="http://www.isipp.com/can-spam-and-you.php" target="_blank">CAN-SPAM and You: Emailing Under the Law</a> eBook.</div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com0tag:blogger.com,1999:blog-1466661550395594511.post-89342028430693740022008-07-04T00:02:00.000-07:002008-07-04T00:12:10.513-07:00Tips for improving your Web security<div>Here are a handful specific techniques for improving your Web security.<br/> <ul><li>Make it your job to study, follow, and abide by security recommendations. </li><li>Don’t use user-supplied names for uploaded files.</li><li>Watch how database references are used. For example, if a person’s user ID is their primary key from the database and this is stored in a cookie, a malicious user just needs to change that cookie value to access another user’s account.</li><li>Don’t show detailed error messages in the website.</li><li>Reliably and consistently protect every page and directory that needs it. Never assume that people won’t find sensitive areas just because there’s no link to them. If access to a page or directory should be limited, make sure it is.</li> <li>Don’t store credit card numbers, social security numbers, banking information, and the like. The only exception to this would be if you have deep enough pockets to pay for the best security and to cover the lawsuits that arise when this data is stolen from your site (which will inevitably happen).</li><li>Use SSL, if appropriate. A secure connection is one of the best protections a server can offer a user.</li></ul>My final recommendation is to be aware of your own limitations. As the programmer, you<br />probably approach a script thinking how it should be used. This is not the same as to how it will be used, either accidentally or on purpose. Try to break your site to see what happens.Do bad things, do the wrong thing. Have other people try to break it, too (it’s normally easy to find such volunteers). When you code, if you assume that no one will ever use a page properly, it’ll be much more secure than if you assume people always will.</div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com1tag:blogger.com,1999:blog-1466661550395594511.post-65062498116495337952008-07-03T01:09:00.000-07:002008-07-03T01:25:19.441-07:00Changing the PHP Session Behavior<div>As part of PHP’s support for sessions, there are over 20 different configuration options you can set for how PHP handles sessions. Here I’ll highlight a few of the most important ones here. Note two rules about changing the session settings:<br/><br/>1. All changes must be made before calling session_start().<br/> 2. The same changes must be made on every page that uses sessions.<br/><br/><div style="border: 1px solid #000000;background-color: #E1E1E1;"> ini_set (parameter, new_setting);</div><br/>For example, to require the use of a session cookie (as mentioned, sessions can work without cookies but it’s less secure), use <br/><br/> <div style="border: 1px solid #000000;background-color: #E1E1E1;"> ini_set ('session.use_only_cookies', 1);</div><br/>Another change you can make is to the the name of the session (perhaps to use a more userfriendly one). To do so, use the session_name() function.<br/><br/><div style="border: 1px solid #000000;background-color: #E1E1E1;"> session_name('YourSession');</div><br/>The benefits of creating your own session name are twofold: it’s marginally more secure and it may be better received by the end user (since the session name is the cookie name the end user will see). The session_name() function can also be used when deleting the session cookie: <br/><br/><div style="border: 1px solid #000000;background-color: #E1E1E1;"> setcookie (session_name(), '', time()-3600);</div><br/>Finally, there’s also the session_set_cookie_params() function. It’s used to tweak the settings of the session cookie.<br/><br/><div style="border: 1px solid #000000;background-color: #E1E1E1;"> session_set_cookie_params(expire, path, host, secure, httponly); </div><br/> Note that the expiration time of the cookie refers only to the longevity of the cookie in the Web browser, not to how long the session data will be stored on the server. </div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com0tag:blogger.com,1999:blog-1466661550395594511.post-51546608612943818492008-07-02T00:47:00.000-07:002008-07-02T00:53:19.607-07:00How To Prevent Brute Force Attacks<div>A brute force attack is an attempt to log into a secure system by making lots of attempts in the hopes of eventual success. It’s not a sophisticated type of attack, hence the name "brute force." For example, if you have a login process that requires a username and password, there is a limit as to the possible number of username/password combinations. That limit may be in the billions or trillions, but still, it’s a finite number. Using algorithms and automated processes, a brute force attack repeatedly tries combinations until they succeed.<br/><br/>The best way to prevent brute force attacks from succeeding is requiring users to register with good, hard-to-guess passwords: containing letters, numbers, and punctuation; both<br />upper and lowercase; words not in the dictionary; at least eight characters long, etc. Also, don’t give indications as to why a login failed: saying that a username and password combination isn’t correct gives away nothing, but saying that a username isn’t right or that the password isn’t right for that username says too much.<br/><br/>To stop a brute force attack in its tracks, you could also limit the number of incorrect login attempts by a given IP address. IP addresses do change frequently, but in a brute force attack, the same IP address would be trying to login multiple times in a matter of minutes. You would have to track incorrect logins by IP address, and then, after X number of invalid attempts, block that IP address for 24 hours (or something). Or, if you didn’t want to go that far, you could use an “incremental delay” defense: each incorrect login from the same IP address creates an added delay in the response (use PHP’s sleep() function to create the delay). Humans might not notice or be bothered by such delays, but automated attacks most certainly would.</div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com0tag:blogger.com,1999:blog-1466661550395594511.post-2198655175817855512008-06-30T21:45:00.000-07:002008-06-30T22:08:00.062-07:00Sessions vs. Cookies<div><h4>Cookies</h4><br/>Cookies are a way for a server to store information on the user’s machine. This is one way that a site can remember or track a user over the course of a visit. Think of a cookie as being like a name tag: you tell the server your name and it gives you a sticker to wear.Then it can know who you are by referring back to that name tag.<ul><li>Cookies are limited to about 4 KB of total data, and each Web browser can remember a limited number of cookies from any one site. This limit is 50 cookies for most of the current Web browsers.</li><li>Each browser treats cookies in its own way. Be sure to test your Web sites in multiple browsers on different platforms to ensure consistency.</li><li>users can reject cookies or turn them off in the Web Browsers.</li></ul><br/><h4>Sessions</h4> <br/>Data is stored on the server, not in the Web browser, and a session identifier is used to locate a particular user’s record (the session data). This session identifier is normally stored in the user’s Web browser via a cookie, but the sensitive data itself—like the user’s ID, name, and so on—always remains on the server.<br/><br/>Sessions have the following advantages over cookies.<ul><li>They are generally more secure (because the data is being retained on the server).</li> <li>They allow for more data to be stored.</li><li>They can be used without cookies.</li></ul>Whereas cookies have the following advantages over sessions. <br/><ul><li>They are easier to program.</li><li>They require less of the server.</li></ul>In general, to store and retrieve just a couple of small pieces of information, use cookies. For most of your Web applications, though, you’ll use sessions.</div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com1tag:blogger.com,1999:blog-1466661550395594511.post-37602251608238993122008-06-29T02:41:00.000-07:002008-07-14T10:10:54.346-07:00TinyUrl Creator :: Firefox Add-ons<div>TinyUrl brings the http://tinyurl.com functionality into your browser. It takes a long URL as input, and gives you a short URL to use in it's place.<br/><br/> For more details ,visit this site <a href="https://addons.mozilla.org/en-US/firefox/addon/126" target="_blank">https://addons.mozilla.org/en-US/firefox/addon/126</a></div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com2tag:blogger.com,1999:blog-1466661550395594511.post-71886542601967348852008-06-29T00:10:00.000-07:002008-06-29T01:12:54.929-07:0010 Reasons why i love GIMP Graphics Tool?<div>One of the best and the most widely used graphics tool for linux is GIMP , the GNU Image Manipulation Program. This GIMP is a full featured image editing program with many menus, tools and filters.<br/><br/><img src="http://www.tasi.ac.uk/images/02gimp.png" alt="GIMP" width="300" height="250" border="0" align="middle"/> <br/> <br/> Below summarize my ten reason 'WHY I LOVE GIMP'.<br/><ul><li> Floating Menus (which you access by right-clicking an image window. </li><li> Graphics Layer (so that effects can be superimposed.</li><li> More than 100 plug-in filters and tools.</li><li> More than 20 editing tools.</li><li> Multiple image windows (for cutting and pasting graphics, or for multiple views of a file).</li><li> Multiple undo levels.</li><li> Scripting language to automate image processing or to create new filters.</li><li> More than six floating tools, brush, colors and pattern windows.</li><li>Support for importing and exporting of 24 graphics format.</li><li> Multi-Platform Support (GIMP runs in windows, linix and MAC).</li></ul></div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com0tag:blogger.com,1999:blog-1466661550395594511.post-80198903224222415212008-06-27T22:09:00.000-07:002008-07-14T10:19:51.289-07:00Click the wrong link and wind up in jail<div>In the 10 Things blog, Deb Shinder recently pointed out <a target="_blank" href="http://blogs.techrepublic.com.com/10things/?p=356">10 ways you might be breaking the law </a>with your computer and not even know it. There’s yet another way that wasn’t mentioned in that article. Specifically it has to do with recent arrests made by the FBI in suspected child pornography cases.<br/><br/>As has been reported in News.com and elsewhere, the FBI has been recently <a target="_blank" href="http://www.news.com/8301-13578_3-9899151-38.html?tag=bl">employing fake Web sites</a> to lure people into child pornography. A suspect doesn’t have to have any child pornography on his computer either. Merely clicking the link is enough to trigger an investigation, search warrants, and the resultant perp walk, whether or not there was any intent to indeed consume child pornography as part of the clicking. <br/><br/><h4>Improbable cause</h4><br/>But what if the user didn’t know the images were on the computer? Or what if the user didn’t know what the Web site was before it was clicked?<br/><br/>Sorry. That doesn’t count. The link got clicked. The images are on the computer. Go to jail. Go directly to jail. Don’t pass Go. Don’t collect $200.<br/><br/>Certainly such a thing wouldn’t happen, right? The only way someone could go to a kiddie porn site was to find the link and intentionally click it. As an IT leader you do, or should, know better.<br/><br/>There are many, many different ways users can be tricked into clicking things or winding up on sites they shouldn’t have. First, there’s the obvious things that can happen when viruses or other malware redirect browsers to go places they’re not supposed to. Someone could program a simple redirect in a Web site, maybe through something as simple as a clear gif, forwarding a browser to the target Web site. Even something as simple as creating a link in <a target="_blank" href="http://tinyurl.com/">TinyURL</a> that points to the site.<br/><br/>TinyURL is especially dangerous, because there’s no way to know exactly what the destination address is before the user goes there. It could be an easy tool for one user to use against another as a cruel joke or some form of retaliation.<br/><br/><a href="http://blogs.techrepublic.com.com/decisioncentral/?p=114" target="_blank">Read More</a></div><br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com1tag:blogger.com,1999:blog-1466661550395594511.post-73147473932499200412008-06-26T00:47:00.000-07:002008-06-26T01:24:58.778-07:008 Reasons why i love Ubuntu?<div>Here are the 8 Reasons 'why i love Ubuntu'?.<br/><ul><li>It's free and very fast. </li><li>It's based on Debian and it uses the fastest package manager out there, APT;</li><li>APT package management is sooo easy.</li><li>It's takes about 1 minute to install a software and 10 to 20 seconds to uninstall or completely remove a software.</li><li>Firefox, Open Office, Gimp, and a huge repository of free softwares</li><li>Live CD/Install combo- I liked being able to use the operating system before it even started installing!</li><li>It's KDE-based, i hate Gnome.</li><li>It's perfect for low-end PC's.</li></ul><br/>THE BEST ever Linux operating system out there; and this way, we can compete with big operating system like Windows and Mac. It's time for Linux users to have a strong, easy to use and powerful desktop operating system, and Ubuntu can help us.<br/><br/> please write your comment WHY YOU LOVE UBUNTU? . </div> <br/>Suresh Kumar Ahttp://www.blogger.com/profile/14017579764619667929noreply@blogger.com7