Documente Academic
Documente Profesional
Documente Cultură
Contents
JOURNEY SO FAR... Reviews of CSI-SAKEC events
PC assembly.......................................................................1
Photoshop ..........................................................................2
Apache, MySQL, PHP.........................................................2
Workshop on C/C++............................................................3
Virtual DJ.............................................................................3
Invent‘09..............................................................................4
Contributed Articles
1.How Google googles?....................................................15
-Sujay Narsale
2.Ethical Hacking...............................................................17
-Jugal Thakkar
3.Cloud Computing............................................................19
-Anilkumar Panda
-Dhaval Savla
4.Cryptography..................................................................21
-Rushabh Pasad
Editspeak
The Editorial Team
Dear Readers,
ÆAishwarya
We feel privileged to be writing the editorial for the debut issue of
CACHE, the CSI-SAKEC magazine. What started as a simple suggestion
from one of the professors during the June 2009, AMP' event, has resulted
Neelakantan
in the release of the first edition of the of CSI-SAKEC magazine. Achieving
this has been no mean feat. This edition is the result of the hard work in ÆRidhi Maru
terms of creativity and research, put in by the editorial team through a
period of nearly eight months. ÆSujay Narsale
The tagline 'the knowledge repository' aptly describes the ÆTanvi Dedhia
magazine's content. It is our endeavour to bring to you the various
advancements in the fields of engineering, latest gizmos and events at our ÆTwinkle Savla
centre till date. The technical articles included in this issue have been
contributed by both professors and students from our college. It is our vision
to be the platform where the budding researchers at SAKEC can showcase
ÆVaibhavi Shah
their talent. In our future editions, we hope to serve as a medium, through
which our professors can share their experiences and research with their
students.
CACHE gives you a glimpse into the successful run of CSI-SAKEC
since its inception in 2007. The workshops like PC Assembly, Java and
competitions like Website Designing, help students build their technical
skils professionally. One such event worth mentioning is the CSI Regional
Convention, INVENT'09. CSI-SAKEC was a part of the collaborative effort
put in by eight other colleges in organizing this event of gigantic proportions.
Lastly, we would like to thank the entire support system behind
CSI-SAKEC, the management, the faculty, the lab assistants and other
non-teaching staff, as well as the SAKEC-students for extending their
valuable support, helping ”CSI-SAKEC” reach its current status and all
those people whose cumulative efforts have made this magazine possible.
Till next time.........!!
The Editorial Team,
CACHE
CSI-SAKEC
From the
Trustee’s Desk
Mr M.L.Shah
Trustee & hon.Jt.secretary
Mahavir Education Trust
Dear Members,
From the
Staff Co-ordinator Prof. Rekha Ramesh
CSI-SAKEC Staff Coordinator
Dear members,
CSI-SAKEC student centre was established in our college in the year 2007 and was
formally inaugurated on 24th April 2007. Today it has a strength of over 180 students. I am
happy to announce that Education Directorate of CSI has approved our CSI-SAKEC as a
student branch of CSI. This will facilitate to promote student branch activities like conducting
of workshop, meetings, seminars, IT symposia, IT quiz, etc.
The objective of the CSI-SAKEC is to facilitate knowledge sharing, learning and
training the students, while simultaneously inspiring and preparing them to meet the
challenges of the fast changing IT industry. The young and vibrant CSI-SAKEC has been
striving to improve the technical skills of budding engineers in a professional manner. In
achieving this objective, it has organized various workshops and seminars in our college. And so
far it has succeeded in imparting value added technical skills supplementing the classroom
teaching. Senior students are also encouraged to organize events and seminars to provide a
better interaction and synergy among the student community. Some of the popular events
organized by CSI-SAKEC are workshops on 'PC assembly, OS installation & Troubleshooting',
'Microprocessors and Microcontrollers', Adobe Flash and Dreamweaver', 'VB', 'Virtual DJ', 'Fun
with JAVA', ' Working with MATLAB' etc. The overwhelming response in every workshop
from the students as well as from the faculty encouraged us to organize more such events with
renewed vigor and enthusiasm. For better involvement of the participants, every workshop
concluded with a small contest and prizes for the winners of first, second and third positions.
CSI-SAKEC also had the honor of being an active partner in the organization of the
International Student Convention – 'Invent 09' hosted by the Mumbai Chapter of Computer
Society of India. Two intercollegiate events 'Eureka-Technical Quiz' and 'I-Developer-an
Application Development in VB6' were conducted on 7th March '09, wherein student teams
from different engineering colleges participated. This year also we are hosting an event of
'Technical Paper Presentation' for International Student Convention 2010 on behalf of Mumbai
Chapter of Computer Society of India.
CSI-SAKEC has taken a significant step in transforming CSI into a vibrant and active
organization with the launch of annual magazine and a dedicated web site for CSI-SAKEC. This
will provide a platform for each one of you to interact, discuss and debate on technology. This
development will surely add substantial value to all members. And I invite all of you to take
advantage of the immense learning and personality development opportunity that the CSI-
SAKEC provides.
I thank the highly motivated CSI-SAKEC student committee as well as all student
members for contributing to the successful journey of our branch since its inception. I also
sincerely thank the Director, Principal and Management of SAKEC for their constant support
and guidance. I am looking forward to have the same type of cooperation and enthusiasm from
you in the coming years also.
You might be wondering who I am with an article almost at the beginning of this magazine. Most of you probably
haven't even heard of me considering that I passed out of Shah & Anchor Kutchhi Engineering College in May 2007. So let
me introduce myself. I am Rishi Popat. And I am a very lucky person. That's because I had the good fortune of being one of the
founding members and the very first Chairman of CSI-SAKEC!
At the very outset, let me congratulate you on being a part of this prestigious organization called Computer
Society of India-SAKEC. As our Bairi Sir famously puts it, CSI-SAKEC is an organization of the student, by the students
and for the students! If you are a student of SAKEC, then surely you must have observed CSI-SAKEC's strive for excellence
and professionalism in all the activities it undertakes. This has been its hallmark since day one, which reminds me of the day
it was founded...
CSI-SAKEC had a very humble beginning in the spring of 2007. Since my initial days in SAKEC, like most of my
fellow students, I always felt that there was very little on offer to students, in terms of co-curricular activities. Sure we had a
fantastic cultural festival in Verve and a ravishing technical festival in Nucleus, but that mostly came under the domain of
extra-curricular. But there was nothing really to complement our theoretical studies with practical exposure. Such
practical exposure would definitely be a boon when facing real projects and problems in the industry.
Then, in my very final semester, Prof. Bairi approached me with the idea of starting an organization under the CSI
banner which would cater exactly to this lacuna. I was a bit hesitant at the start. Because only after you come into the final
year of B.E., do you realize how much workload one has! I had my hands already full with project and academics. But I
decided to go and give it my best. And in hindsight, I am very glad I did! I distinctly remember the long meetings I had with
Bairi Sir, Rekha Ma'am and Jyoti Ma'am; trying to hammer out the details of CSI-SAKEC's working, its objectives and so
on. We already had two excellent organizations in place at SAKEC and it was important that CSI-SAKEC compliments
their work ably.
The first task at hand was to establish a team of students to get CSI-SAKEC up and running. And again I proved
lucky as I was blessed with the best team one could have asked for. Even though they had no previous experience they handled
the various departments like Logistics, Publicity and Event Management extremely well. Soon their efforts paid off and
how! Right at our debut, CSI-SAKEC registered an astounding 181 members! But the real challenge was to live upto such
expectations. But we managed to do that admirably by conducting three workshops during the summer, namely on Matlab,
Web Technologies and C Programming. Prof Uma Rao, Prof Dhanashree Toradmalle and Prof Milind Khairnar were kind
enough to take up Introduction to Matlab and Web Technologies. But the high point for me was when 3 final year students
from our own college Dinesh Dhongade, Kaushak Satra and Raj Thakkar came up and conducted the workshop on C
Programming. It really seemed to highlight our motto as I had mentioned above itself: CSI-SAKEC is an organization of
the students, for the students, by the students.
But this was just the tip of the ice berg. I have been in touch with the CSI-SAKEC committees every year and I
observed that each committee brings with it, great new ideas to improve CSI-SAKEC. Every committee seems committed
to better the work done by the last. This magazine being a prime example! I just hope and pray the torch of CSI gets passed on
to as able hands, batch after batch, and each year I feel a little bit more proud to say: Yes, I am a pioneer of CSI-SAKEC.
R...
S O FA
N E Y We take through the
UR journey of CSI-SAKEC right
JO from its inception uptill now. CSI-
SAKEC has made enhancing the technical
knowledge of the students of sakec its priority. In
the following section we describe a few of our sucessful
workshops held in the academic year 2009-2010.
CSI SAKEC Student's computers. This was followed present on the motherboard the
Center organized a workshop on by the various types of installation of the Operating
'PC Assembly, OS Installation microprocessors along with an system on the assembled PC
a n d Tr o u b l e s h o o t i n g ' o n introduction about the various hardware. The operation
Saturday 12th September, 2009. components of the PC consisted of powering the
The session was conducted by motherboard. From here on all computer, deleting all partitions,
'St Angelo's IT Graduate ' (SAIG) the components of the creating a new partition and
Mumbai. The workshop motherboard including the selecting the disk drive to install
began with a brief introduction OS.
on activities of CSI-SAKEC, The third session was
following which the SAIG guests basically a continuation of
and faculty of Shah and
PC session-2 and it dealt with
Anchor were felicitated. The
workshop primarily comprised
Assembling troubleshooting. Troubleshooting
is a technique of problem solving
of three sessions: the first most often applied to repair of
session comprised of hands-on failed products or functional
PC Assembling, wherein all the Expansion slots, socket, processes. The workshop ended
participants were given an e x t e r n a l p o r t s , U S B we r e with all the participants gaining
opportunity to practice. The explained in detail. After going an insight of the details and
session was taken up by Mr Ranjit through the functionality of p r o c e s s e s i n vo l ve d i n t h e
V i s h w a k a r m a o f each and every component Assembling of a PC.
SAIG faculty. At the beginning, present on the motherboard by
all the participants were given the various types of
a brief introduction of the microprocessors along with an
various generations of introduction about the various
computers, starting from components of the PC
transistor assembly units to the motherboard. From here on all
supercomputer mainframes the components of the
comprising 5th generation of motherboard including the
Whether one is an
amateur DJ striving to improve,
VIRTUAL DJ the workshop. The response
received from students was
or an accomplished DJ, the Bharath gave an overview of impressive. They came up with
virtual DJ can be used by anyone Virtual-DJ, its tools, functions wonderful remixes.From among
from absolute musical neophyte and also described the 25 participants, three winners
to the expert performer. Virtual- implementation of Mixcraft. were announced.
DJ is a digital panel that you can Mixcraft is a multitask Apart from being a
install on your computer. application for Windows and is a technical event, it was also a fun
With Virtual DJ, you can music loop remix program. event comprising both the junior
do all your DJing on your PC, A large library of virtual and senior students from all
drag and drop your tracks from instruments, loops, sound effects, engineering streams. Its immense
your music database to the and audio effects is included in popularity among students
turntables, adjust the sound the Mixcraft. Bharath then laid encouraged CSI-SAKEC to
levels, synchronize the songs by emphasis on how to remix the organize such events in future.
adjusting pitch, smoothly drag original sound tracks, play with
the cross fader to create the the lyrics, enhance the music
transition between the tracks. quality and come up with a
To get the students melodious song.
acquainted with the art of sound A Competition on
mixing, the workshop on Virtual remixing of original sound tracks
DJ was conducted in two sessions. was held in the second session of
JOU
RNE
Y
!NVENT '09 SO F
A R....
Since 1999, the Mumbai conducted under INVENT'09 celebrating 10 years of CSI
Chapter of the Computer Society were technical competitions like Conventions. It was an eventful
of India (CSI) has been Programming Contest, Circuit day consisting of seminars such as
instrumental in organizing Designing, Technical Paper Wi-Fi Security Systems by
Student Conventions for the Presentation, Technical Quiz, Mr.Jatin Parikh from Airtight
benefit of its student members. It Software Development, Security, Internet Marketing by
has been organizing student Technical Debate and fun events Vishal Prabhukhanolkar-Director,
conventions since a decade. It like LAN and PS Gaming, Online Quetzal Verify Private Limited,
started with eConnect '99 being Treasure Hunt, which tested not Panel Discussion on “The future
hosted at VESIT which was a great only one's technical skills and of IT in this period of meltdown.”
success and it was the genesis of knowledge but also one's ability by Mr. Anand Jhaveri (Founder,
the idea that other colleges could to deliver when it matters. Chairman and CEO Rave
also be a part of the growing G r a b b i n g t h i s Technologies), Ms. Rajashri
student activity. It is from here opportunity to truly enter the Hazare (Director - Cerebrus
that the Mumbai chapter sowed inter-collegiate level, CSI-SAKEC Consultants) and Mr. Kunal
the concept of student activity conducted two events: - eUreka- Gursahani (Director for Global
centers in every engineering Technical Quiz and iDeveloper- Strategy and Marketing-Alpha
college. Thus the activity centers an Application Development Plus Technologies) and an
grew and with it started the yearly competition which were held on intensive Linux Workshop.
conventions. eMerge 2000, eSense 7th March 2009. Mr. Shirkant The final round of eUreka
2001, eNable 2002, iMagine 2003, Karode, IT Head, Crompton was held in parallel to a full house.
iDeas 2004, iDeas 2005 and G r e a ve s , t h e c h i e f g u e s t , The five teams were quizzed on
iNnovate 2006 were some of the inaugurated the SAKEC leg of topics ranging from digital logic
earlier conventions to name a few. I n v e n t ' 0 9 . to microprocessors to
Last year, CSI-SAKEC was Out of thirty participating programming. The audience was
privileged to be invited to become teams in eUreka, five were kept captivated by the brain
a part of the organizing team of shortlisted based on an online test tingling questions and excellent
INVENT'09 - the Annual CSI that tested the contestants on hosting.
Regional Student Convention. basic concepts which are To conclude, we, at CSI-
Our college was one of the eight common to all branches of SAKEC, treasure the experience
premier engineering colleges in engineering. got from direct interaction with
Mumbai that came together to The Convention Finale the CSI Mumbai Chapter and
showcase the technical was held on 17th March, 2009 at with the other CSI Student
extravaganza of colossal K.J. SIMSR and was inaugurated Centers. We hope to continue
proportions. The other colleges by the chief guest, Mr. S. being a part of this technical
were NMIMS, TSEC, VESIT, M a h a l i n g a m - C F O , Ta t a extravaganza in the years to come.
FCRCE, Atharva, VCET and Consultancy Services & Vice
UMIT. President Computer Society of
Each college volunteered India. It was followed by the
to conduct an event. The events release of the magazine Epoch '09
e nt
in m
ta Decode clustering, Discover
ch how to combat your fear of coding,
T e hack with principles, the logic behind page
ranking... learn all this and much more in the
following section containing articles contributed by
both professors and students of SAKEC.
following characteristics
· It should be strictly one pass.
· It can be paused any time to TEC
view current structure of the H TAI
clusters. next window as a starting N MEN
· It can be resumed again. solution.
· It must take current trends into
T
consideration while clustering. Local Clustering approach:
from 'm' and use it in new window,
1. Fix no. of centers (k), initial
add new centers with weight=1.
Single pass clustering points (m), size of window (n)
5. Continue with steps 3 and 4.
technique: 2. Randomly initialize 'm' cluster
6. When final clusters are
This technique is means for window.
recorded, Group m centers from
summarized as follows: 3. Fill the window with new
step 5 into k centers to create final
1. Divide large data-set into points.
clusters.
chunks (windows) 4. Perform iteration of k-means
Fitness criteria in step 4
2. For each window, initialize clustering on the points in the
may be depending upon type of
with random cluster seeds and window till it converges.
application in hand. It can be
assign each point to its closest 5. Give weights to each center
possibly a threshold, comparing
center. based on number of points in it.
weights of the centers. If weight of
3. When all points in the window (Summarization)
the center is less than threshold, a
are assigned to cluster centers, 6. Adjust cluster centers of the
center can be discarded.
adjust weight to each cluster window, accordingly
center by the number of points 7. Repeat from step 2 Considering new trends:
assigned to it. As seen in both the
4. When all windows are 2. Incremental Approach: techniques above, it becomes
clustered, Cluster these weighted Incremental clustering necessary to devise techniques for
cluster centers from each window algorithms employ division of maintaining summaries or
into final desired number of stream in windows. They use synopses of the history of the
clusters. weighted windows and treat stream. Most research until now
Above technique is fine them as generation. It adjusts has focused on techniques for
for clustering large database in cluster centre as and when new building summaries of all the data
single pass but cannot be used p o i n t a r r i ve s ; b u t seen so far. However, in most
directly for streaming data as it merging/splitting is done at the applications very old data points
considers that the whole data is end of the generation. This gives are considered less useful and
available, though large, before time to evaluate current relevant than more recent data.
clustering process begins. generation, recognize new trends Thus it is necessary that old or
The above idea can be and thus can locate outliers and “stale” data does not
further explored to suit for the patterns in current data easily. overly.influence the statistics.
streaming data. In general two Sliding window approach
approaches are considered for Incremental clustering
considers new trends in a good
streaming data: techniques
manner. This can be further fine-
1. Local Clustering and 1. Fix no. of clusters (k), initial
tuned, according to the specific
2. Incremental Clustering points (m), size of window (n)
requirements by reducing
2. Randomly select 'm' cluster
weights of the old windows
1. Local Clustering Approach: centers for window.
exponentially and thus to have a
Local clustering is based 3. Assign points to these m centers
control in the manner in which
on processing the complete and increment wt accordingly.
trends should be handled.
window to generate the clusters Adjust centers with each point.
Conclusion:
(local to that window). These 4. Once entire window is
In the case of incremental
clusters may be utilized in the processed decide fittest centers
1. Go 2 the paint...
2. Select the HELP...help topic OR F1.
3. Right click on the title bar in the help window and the select the context
command ' jump to URL'
4. Enter the complete web address in the subsequently dialog as the
'http: //www.yahoo.com' click ok....
5. Then again open the dialog box 'http://www.yahoo.com' right on upper
side......and more blank space left....u write the website..and got it...
3.Computer TEC
H TAI
Animation N MEN
T
Ms.Dhanashree K Toradmalle
Asst Professor
(IT Dept)
Animation is the rapid no equipment existed to show the who can be considered the
display of a sequence of images of images in motion, such a series of "creator" of the art of film
2-D or 3-D artwork or model i m a g e s c a n n o t b e c a l l e d animation, as there were several
positions in order to create an animation in a true sense of the people doing several projects
illusion of movement. It is an word. which could be considered
optical illusion of motion due to T h e p h e n a k i s t o s c o p e , various types of animation all
the phenomenon of persistence of praxinoscope, as well as the around the same time.
vision, and can be created and common flip book were early Georges Méliès was a
demonstrated in a number of popular animation devices creator of special-effect films; he
ways. The most common method invented during the 1800s, while a was generally one of the first
of presenting animation is as a Chinese zoetrope-type device was people to use animation with his
motion picture or video program, invented already in 180 AD. These technique. He discovered a
although several other forms of devices produced movement technique by accident which was
presenting to stop the camera
animation also rolling to change
exist. something in the
E a r l y scene, and then
examples of continue rolling
attempts to the film. This idea
capture the was later known
phenomenon of as stop-motion
motion drawing animation. Méliès
can be found in discovered this
paleolithic cave t e c h n i q u e
paintings, where accidentally
animals are when his camera
depicted with broke down
multiple legs in while shooting a
superimposed bus driving by.
positions, clearly An Egyptian burial chamber mural, approximately 4000 years old, showing When he had
a t t e m p t i n g t o wrestlers in action. Even though this may appear similar to a series of animation fixed the camera,
c o n v e y t h e drawings, there was no way of viewing the images in motion. It does, however, indicate a h e a r s e
p e r c e p t i o n o f the artist's intention of depicting motion. happened to be
motion. passing by just
A 5,200 year old earthen from sequential drawings using as Méliès restarted rolling the film,
bowl found in Iran in Shahr-i technological means, but his end result was that he had
Sokhta has five images of a goat animation did not really develop managed to make a bus transform
painted along the sides. This has much further until the advent of into a hearse. This was just one of
been claimed to be an example of cinematography. the great contributors to
early animation. However, since There is no single person animation in the early years.
EN T
N M
TAI
TEC
H
4.Code'Oh’Phobia!!!
- Harshad M. Mande
Ex-Lecturer I.T.
As a lecturer in the completely understand this What I just presented to
I n f o r m a t i o n Te c h n o l o g y program and you can ask me any you are two situations which a so
department of Shah and Anchor question you want on this piece of called IT engineering student
Kutchhi Engineering College for code.” After a few ifs-and-buts finds him in. One is when he
more than a year now, I know one she confessed that she couldn't knows the theory, and the other
thing for sure, not many of us are write a program, but she knew all one is when he can put things to
comfortable when it comes to the the syntaxes well. She knew all practice without knowing much
word 'coding'. As a student it was the intricacies of Java of the theory. Often students ask
C programming, as a teacher now programming. She basically me, “Sir, I am very weak in C
its Java programming, thanks or knew the theory well, but she programming. Which book
no thanks to the new pattern of couldn't create something called should I refer to?” It's one of those
the syllabus. as a working program. situations where I cannot conjure
As a student I had a Now is another situation: up a considerable advice. A
colleague who used to finish this one is kind of personal. I reasonable answer to such a
his practical session in one question is another question:
hour flat and I used to take “Which exam are you preparing
about a day. I definitely felt an When you are placed for?” If the answer is say exam A,
inferiority complex creeping then I would give him a decent
in an IT firm and all enough book to read, some links
inside me and that to a certain
extent did motivate me, but to you have to do from to refer to, but if the answer is I-
most of us it's quite perplexing. I 9:00 am to 5:00 pm is just-want-to-learn-programming.
knew I had to clear the air on a Then my answer would take a
fiddle around with a completely different form. The
topic like this because I came
across a very peculiar situation piece of code, you are fact is you cannot learn
lately. I was conducting my Bound to figure a programming by reading a lot of
practical session and while most literature. It's just like
way around it.
students were struggling doing assimilating a lot of knowledge
their programs, I noticed this one but not knowing where to use it.
once gave a technical
girl who never bothered to even In the case of programming you
interview and was asked
try. All of a sudden, when it was have to follow the adage: If you
about a project which I had
about time to leave, she had a want to learn to swim, u should
implemented using VB.net. The
program ready and fit for just jump directly into the well.
interviewer asked me to elaborate
execution. I knew at once it was a This is how many infamous
on the .net framework. I didn't
case of much neglected swimmers learn how to swim.
have much of a say, because I
plagiarism in Mumbai University. Start with a set of programs and
really didn't know what it meant,
I asked her, “Listen, I know you keep hitting your keyboard is the
but I could write any program in
haven't written this program on mantra.
.net given the MSDN library and
your own. How can I possibly Now many people get to a
an Internet connection. I was
grade your work?” She was very very fantastic start. They are
obviously given negative marks
q u i c k i n r e p l y i n g , “ S i r, I really spirited when it comes to
for such an answer.
T 1.How
ME N
AIN
TEC
H T Google googles?
-Sujay Narsale
B.E.(Computers)
For as far as most of us can the pages which are related to currently is quite complicated
remember now, we have used that keyword are listed as results. and a closely guarded secret, but
only one tool for starting of our As one can imagine, the problem the formula used when Google
quests into the great World Wide here is that each keyword will was still being developed was:
Web. A simple page with just one give millions of results majority
text box and a few buttons hides of which will be useless to the PR(A) = (1-d) + d(PR(t1)/C(t1) + ... +
behind it a mammoth machinery PR(tn)/C(tn))
which has compelled millions of Here, A = Current Page,
users to set it as their home page t1….tn = pages linking to A,
and use it innumerable times per The trick is PR(X) = PageRank of page X,
day. I am of course talking about C(X) = Number of outbound links from
therefore to sort
Google, the undisputed King of page X,
Search. With its simplistic the [million] results d = dampening factor.
interface and clean and accurate correctly. This
results it has firmly lodged itself In simple words, this means:
as one of the most powerful Is exactly what · If a page has a large number of
entities on the Internet. So much PageRank does and pages linking to it, it gets a
so that searching on the net is higher rank: This is the basic
often colloquially referred to as
does it very well.
criteria of PageRank. If only this
'Googling'! criterion was applied anyone
So how does Google do it? c o u l d h a ve i n c r e a s e d t h e
The secret behind it is a user. The trick is therefore to sort PageRank of their webpage but
combination of simple logic and the results correctly. This is exactly just paying to put up their links on
some basic mathematics. Google what PageRank does and does it as many websites as possible. But
calls this secret, the PageRank very well. Google is not fooled as easily.
A l g o r i t h m . To u n d e r s t a n d PageRank implements a · If a page is linked to by a page
ranking method that no other which itself has a high PageRank,
PageRank, we will first see how
search engine had thought of it gets a higher rank: This ensures
most modern Search Engines
before it. Basically, it determines that pages recommended by sites
search the Web: which are well known, get better
how good a page is by the number
They make use of something PageRank.
of web pages linking to it. That
called as a Crawler (or Search-bot · If a page is linked to by a page
means, if a certain webpage has a
or Web-bot or spiders). These which does not have links to a lot
large number of websites giving
crawlers move through the World of other pages, it gets a higher
links to it, it will be ranked higher.
Wide Web from page to page rank: This ensures that no page
This logic is based on simple
through Hyperlinks (links to gets a higher rank just by having
common sense that if a page is
other webpages). Each time they its links in otherwise empty sites.
linked to more, it must be more
encounter a new page they index If a page is listed in a Link Farm (a
popular and therefore more
the information in that page and it website which has no real content
relevant. Though this is the major
is stored in a central database. of its own but only holds links to
criteria PageRank uses, it is
Whenever the user types in a other websites), it is penalized by
definitely not the only one. The
query, the query or keyword is a decrease in its PageRank.
actual algorithm used by Google
searched against the database and
N M EN T 2.‘Ethical’
TAI
TEC
H
Hacking! Jugal Thakker
B.E.(Computer)
The term 'hacking' sounds hacker has is unlimited curiosity. know how the internet works,
interesting to today's geeky He constantly thrives to discover how the computers communicate,
generation. So how many of us unknown features, characteristics, and should know the in and out of
know what hacking actually is? tips and tricks. A hacker has to be networking concepts and rules.
How many know what the dedicated to knowledge and Moreover to be good hacker, you
purpose of hacking is? Let's research in his field. He also is need to have the basics of UNIX,
together try to recognize these highly creative and innovative. since all good security experts
queries. All these traits are necessity for will encounter UNIX at some time.
To know who or what a being a hacker. After knowing this, Most appropriately to catch a
hacker is, we shall first see, what a it's not bizarre to term the greats criminal you need to become one,
hacker is not? First and foremost hence, a hacking attitude, which
a hacker IS NOT A CRIMINAL! is to have criminal or a crooked
Hackers are neither the ones who mind, is a prerequisite.
break the laws nor do they steal White hat hackers Let us have a look at the
credit card information. Likewise have prior following good real world
hackers don't belong to the breed analogy to hacking. Assume the
permissions from
of people who release viruses on ultimate goal is breaking into a
the internet. Interestingly, a the administrator safe (the safe is a database, a
hacker may not always be a to exploit the password file, confidential
computer wizard. All the above records or whatever). The safe is
loopholes!
descriptions that are seemingly located inside of a physical
familiar to the definition of a building (the computer that hosts
hacker are nothing more than a of Newton, Einstein and Edison the data). The building is located
misconception and a as hackers. These were the real inside a town (the computer is
misconstruction of the mass hackers who did things beyond connected to a network). There is
media and people. the average person's aptitude; a path/highway leading to the
So, who is a hacker? Most they flourished to challenge and town and the path connects the
of the hackers have these very stretch the limits. town to other towns and/or cities
interesting qualities and A hacker today, is by and (read Internet/Intranet). The
characteristics. He likes to think large associated with computers town/city is protected by a
out of the box. Everything he tries and computer security. The tollgate or an inspection point (the
to do is with the aim of testing his individualities that you need to network is protected by a firewall,
own limits! He always wants to have to become a modern-day- screening router etc.) There might
achieve things that so far people hacker are:- You need to excel in be certain residents (the police) in
have considered to be computer security. You need to the town looking for suspicious
unachievable or impossible. He know at least one programming activity, and reporting it to the
will, almost always, want to try language, which more often than town's mayor (the police reports
out things that are not written in not is, C++. You essentially have to attacks to the sysadmin).
the manual or the rule book. The be networking guru, you must B u i l d i n g s h a ve t h e i r o w n
most important ingredient that a protection methods, locks &
3.Cloud
M E NT
TE CH TAIN Computing Anilkumar Panda
T.E.(I.T.)
Dhaval Savla
T.E.(computers)
The other day I was the concept of cloud computing The basic technologies for
talking to one of my friend was present long ago it is poised cloud computing such as
regarding his graphics project. He to take off now. But the question is horizontal scaling, distributed
was complaining about his slow what is cloud computing? computing nodes, virtualization
processor and other hardware CLOUD COMPUTING have been available for some time.
constraints which severely refers to both the applications Virtualization the abstraction of
hampered the development and delivered as services over the computer resources is the
testing of his project . .Jokingly he Internet and the Hardware and cornerstone technology for all
asked me if he could get a faster systems software in the cloud architectures.
processor or bigger RAM for his datacenters that provide those Virtualization allows servers,
system on lease (since he could services. It delivers higher storage devices, and other
not afford to buy them efficiency, massive scalability, and hardware to be treated as a pool of
instantly)…so that he would use faster, easier software resources rather than discrete
them only while working on his development. special kind of systems, so that these resources
project and return them once not software called middleware. can be allocated on demand.
needed. I suggested him to go to In cloud computing your Techniques such as
the CLOUD. His problem is data is present on your machine paravirtualization which allows
similar to most of the small and but on a remote server of the a single server to be treated as
medium businesses (SMBs) as company providing you the multiple virtual servers, and
well as traditional enterprises in s e r vice. In order to access your clustering which allows multiple
verticals such as banking, servers to be treated as a single
financial services and insurance server.
(BFSI), and manufacturing. A cloud computing
These companies have a specific The foundations of system , consists two sections: the
IT requirement but need to invest The nextgeneration of front end and the back end. They
a considerable amount of their connect to each other through a
computing… A world network, usually the Internet .The
resources in acquiring and
maintaining the software and where the network is front end is the client's computer
and the applications required to
hardware for the company. Also the platform for access the cloud computing
sometimes they may require a
all Computing… system. On the back end of the
particular hardware or software system are the various
which may be costly so they either computers, servers and data
have to find an alternate way out data you just need to install the storage systems that create the
or use the resources of some other middleware software that will "cloud" of computing services.
company which delays the connect you to the cloud when Each application will have its own
development of the project. The needed and you can use the entire dedicated server. Central server
solution is a revolutionary services in the cloud (the net or administers the system,
concept called CLOUD the remote server) as per your monitoring traffic and client
COMPUTING [CC] . Although requirement). demands to ensure everything
r u n s s m o o t h l y. I t f o l l o w s
protocols and uses a Middleware
that allows networked TEC
computers to communicate with H TAI
each other. N MEN
Cloud Computing
provides the following three T
types of services:
1. Software as a Service (SaaS):
SaaS provides complete
application as a service to the
clients on demand via
paravirtualization.
E.g.:Salesforce.com
2.Platform as a Service
(PaaS):PaaS offerings can provide
for every phase of software
development and testing. Eg:
Google App Engine.
3. Infrastructure as a Service
(IaaS): Servers, storage systems,
switches, routers, and other
systems are pooled (through
virtualization technology, for
example) to handle specific types
of workloads from batch
processing to server/storage
augmentation during peak loads Fig 1: Cloud Computing Architecture
over the network. E.g.: Amazon
Web Services, Joyent. users having to worry for peak cloud computing suitable for
Major advantages of
loads. business continuity and disaster
cloud computing are:
recovery.
1. It could bring hardware and 3. Batch processing can help
maintenance costs down. CC analyze blocks of terabytes of Thus, CC ushers in a new
systems give easy access to data simultaneously saving level of efficiency and economy in
software.. server hours. delivering IT resources on
2. Scalability via dynamic ("on- 4. Reliability is improved demand and thus creates new
demand") allocation of resources through the use of multiple market opportunities and
on a, self-service basis without redundant sites, which makes business models.
EN T
N M
H TAI 4.CRYPTOGRAPHY
TEC
Rushabh Pasad
T.E. (I.T.)
A C E last
An Interview is the
stage in placement
F
O leave anythingprocess, one cannot afford to
C E T to chance. Face to Face
A
F revealsgives an insight into the interview process and
how one can emerge from the grueling
Placement Interviews.This article has been written with the
help of excerpts from the interviews of Anish Venugopal, Sashank
Shah, Sagar Gupta, Akshay Rao, graduates from SAKEC.
D Z ! Bored of the
E N
R hand clock
common hour hand- minute
-T
TE CH display, dream of environ-
friendly comp... Nowdays there are gadgets
that solve every query, every whim of the
consumer. TECH-TRENDZ brings to you a plethora of
gadgets-from the ‘currently hot’ ones to the ‘soon to be
releasing ones....’
TEC
H -TR
E ND
Z!
CROSS-QUOTIENT
26. Synonym for cyber piracy.
27. Main trunk connections of the Internet.
29. Provide client station with access to shared resources
on n/w.
31. Device that forwards data packets between n/w.
33. One who attempts to gain infamy in chats or on
forums?
34. Unique visitor to the site from a campaign source.
35. Listing given by search engine in response to
keyword inquiry.
Down
1. Communication protocols used to connect host to the
Internet.
2. A fiber optic n/w transmitting data at 100 mbps.
3. Act of sending unsolicited bulk emails.
4. A http server& open source application.
Across 6. Web service that combines two or more tools to create
1. Keeping track of links to content. a new service.
2. Search retrieving matches for partially/misspelled 7. Java server side module.
words. 8. A hacker.
5. Evolving protocol for syndication & sharing of 9. A freeware browser.
contents. 13. Equivalent to 'Favorites' of Internet Explorer.
7. Optimizing website to get better results in search 14. Program used to view HTML documents.
engine. 16. s/w monitoring activities of user while he/she
8. Small text string stored on user's comp by a web navigates the Internet.
browser. 18. One who searches the Internet for references of
10. Favorite language of CGI programmers. himself?
11. n/w of educational sites separate from the Internet. 19. Etiquettes on the Internet.
12. Program that prowls internet for publicly accessible 20. A message or a message fragment.
resources. 21. An online dairy of journal.
15. s/w tool for locating people on other Internet sites. 22. Site, an exact copy of the Internet site.
17. Tool to test whether a host is reachable across an IP 27. Unit of data transmission speed.
n/w. 28. Method of moving caffeine across WANs.
23. Standard protocol for email retrieval. 30. Abbr, serial line Internet protocol.
24. Link between pages in a website. 32. A family of wed feed formats.
25. Location on which a website is placed.
UPLIFT
YOUR
IQ
7.This is a number crossword puzzle. Enter
one numeral character into each square. The
1.A man builds a house rectangular in
clue consists of mathematical operations.
shape. All sides have southern
(e. g. "D.6 x 3" means, that the number you
exposure. A big bear walks by,
are looking for is three times bigger than
what color is the bear? Why?
number D.6).
2.The day before yesterday I was 25 and the
next year I will be 28. This is true only one
day in a year. What day is my birthday?
CLICK = 100501100K
MILK = 1000150K
LOG = 50OG
LIFE = 501FE
ALIVE = A5015E
FOX = ==?==
CLUES
4.What word is represented by this Across:
arrangement of letters?
A.1 = D.6 x 3
HROOOBD
A.4 = A.7 x A.7
A.5 = (D.3 x 7) - 1
5.What number comes next in this sequence:
A.6 = A.1 + A.5
A.7 = D.3
1 23 124 1251 26127 128129 ==?==
Down:
6.Name an ancient invention, which is still D.1 = ?
used in some parts of the world today, that D.2 = A.7 x 6
allows people to see through walls. D.3 = D.6 + 6
What can this be? D.4 = A.4 - 210
D.6 = (D.2 + 9) x 1/7
E RS
CH IEV
D A
TE
EN CSI-SAKEC has been
TAL instrumental in conducting
competitions enabling students stretch their
limits and apply their knowledge.We take this
opportunity to congratulate the: 'Winners(2007-2009).’
Sudatta C Jithin T K
3rd position 1st position (Maverick)
Virtual DJ 1 iDeveloper
Anand biswas
1st position Saurabh Raje
Virtual DJ 2 2nd position (CodeMasters)
iDeveloper
Shruti Narain
3rd position
Virtual DJ 2