Friday, December 21, 2007

FFMPEG

FFmpeg is a collection of software libraries that can record, convert and stream digital audio and video in numerous formats. It includes libavcodec, an audio/video codec library used by several other projects, and libavformat, an audio/video container mux and demux library. The name of the project comes from the MPEG video standards group, together with "FF" for "fast forward".[1]

The project was started by Fabrice Bellard (using the pseudonym “Gerard Lantau”), and is now maintained by Michael Niedermayer. Many FFmpeg developers are also part of the MPlayer project, and FFmpeg is hosted at the MPlayer project server.

FFmpeg is developed under Linux, but it can be compiled under most operating systems, including Microsoft Windows. There are no releases. Instead, FFmpeg developers recommend using the latest Subversion snapshot as development maintains a constantly stable trunk.[citation needed] Released under the GNU Lesser General Public License or GNU General Public License (depending on which sub-libraries one would include), FFmpeg is free software.

COMPONENTS:-
The project is made of several components:

* ffmpeg is a command line tool to convert one video file format to another. It also supports grabbing and encoding in real time from a TV card.
* ffserver is an HTTP (RTSP is being developed) multimedia streaming server for live broadcasts. Time shifting of live broadcast is also supported.
* ffplay is a simple media player based on SDL and on the FFmpeg libraries.
* libavcodec is a library containing all the FFmpeg audio/video encoders and decoders. Most codecs were developed from scratch to ensure best performance and high code reusability.
* libavformat is a library containing demuxers and muxers for audio/video container formats.
* libavutil is a helper library containing routines common to different parts of FFmpeg.
* libpostproc is a library containing video postprocessing routines.
* libswscale is a library containing video image scaling routines.

CODECS AND FORMAT SUPPORTED:-
* ATRAC3[2]
* H.261,[2] H.263[2] and h.264/MPEG-4 AVC[2]
* Indeo 2 and 3[2]
* QDesign Music Codec 2, used by many QuickTime movies prior to QuickTime 7.
* Sorenson 3 Codec used by many QuickTime movies
* Theora (together with Vorbis makes a base for the .ogg format)
* Truespeech
* TXD[3]
* VP5[2] and VP6[2]
* Vorbis
* Windows Media Audio
* Some Windows Media Video codecs, including WMV1, WMV2 and WMV3

The default MPEG-4 codec used by FFmpeg for encoding has the FourCC of FMP4.

FFMPEG

FFmpeg is a collection of software libraries that can record, convert and stream digital audio and video in numerous formats. It includes libavcodec, an audio/video codec library used by several other projects, and libavformat, an audio/video container mux and demux library. The name of the project comes from the MPEG video standards group, together with "FF" for "fast forward".[1]

The project was started by Fabrice Bellard (using the pseudonym “Gerard Lantau”), and is now maintained by Michael Niedermayer. Many FFmpeg developers are also part of the MPlayer project, and FFmpeg is hosted at the MPlayer project server.

FFmpeg is developed under Linux, but it can be compiled under most operating systems, including Microsoft Windows. There are no releases. Instead, FFmpeg developers recommend using the latest Subversion snapshot as development maintains a constantly stable trunk.[citation needed] Released under the GNU Lesser General Public License or GNU General Public License (depending on which sub-libraries one would include), FFmpeg is free software.

COMPONENTS:-
The project is made of several components:

* ffmpeg is a command line tool to convert one video file format to another. It also supports grabbing and encoding in real time from a TV card.
* ffserver is an HTTP (RTSP is being developed) multimedia streaming server for live broadcasts. Time shifting of live broadcast is also supported.
* ffplay is a simple media player based on SDL and on the FFmpeg libraries.
* libavcodec is a library containing all the FFmpeg audio/video encoders and decoders. Most codecs were developed from scratch to ensure best performance and high code reusability.
* libavformat is a library containing demuxers and muxers for audio/video container formats.
* libavutil is a helper library containing routines common to different parts of FFmpeg.
* libpostproc is a library containing video postprocessing routines.
* libswscale is a library containing video image scaling routines.

CODECS AND FORMAT SUPPORTED:-
* ATRAC3[2]
* H.261,[2] H.263[2] and h.264/MPEG-4 AVC[2]
* Indeo 2 and 3[2]
* QDesign Music Codec 2, used by many QuickTime movies prior to QuickTime 7.
* Sorenson 3 Codec used by many QuickTime movies
* Theora (together with Vorbis makes a base for the .ogg format)
* Truespeech
* TXD[3]
* VP5[2] and VP6[2]
* Vorbis
* Windows Media Audio
* Some Windows Media Video codecs, including WMV1, WMV2 and WMV3

The default MPEG-4 codec used by FFmpeg for encoding has the FourCC of FMP4.

FFMPEG

FFmpeg is a collection of software libraries that can record, convert and stream digital audio and video in numerous formats. It includes libavcodec, an audio/video codec library used by several other projects, and libavformat, an audio/video container mux and demux library. The name of the project comes from the MPEG video standards group, together with "FF" for "fast forward".[1]

The project was started by Fabrice Bellard (using the pseudonym “Gerard Lantau”), and is now maintained by Michael Niedermayer. Many FFmpeg developers are also part of the MPlayer project, and FFmpeg is hosted at the MPlayer project server.

FFmpeg is developed under Linux, but it can be compiled under most operating systems, including Microsoft Windows. There are no releases. Instead, FFmpeg developers recommend using the latest Subversion snapshot as development maintains a constantly stable trunk.[citation needed] Released under the GNU Lesser General Public License or GNU General Public License (depending on which sub-libraries one would include), FFmpeg is free software.

COMPONENTS:-
The project is made of several components:

* ffmpeg is a command line tool to convert one video file format to another. It also supports grabbing and encoding in real time from a TV card.
* ffserver is an HTTP (RTSP is being developed) multimedia streaming server for live broadcasts. Time shifting of live broadcast is also supported.
* ffplay is a simple media player based on SDL and on the FFmpeg libraries.
* libavcodec is a library containing all the FFmpeg audio/video encoders and decoders. Most codecs were developed from scratch to ensure best performance and high code reusability.
* libavformat is a library containing demuxers and muxers for audio/video container formats.
* libavutil is a helper library containing routines common to different parts of FFmpeg.
* libpostproc is a library containing video postprocessing routines.
* libswscale is a library containing video image scaling routines.

CODECS AND FORMAT SUPPORTED:-
* ATRAC3[2]
* H.261,[2] H.263[2] and h.264/MPEG-4 AVC[2]
* Indeo 2 and 3[2]
* QDesign Music Codec 2, used by many QuickTime movies prior to QuickTime 7.
* Sorenson 3 Codec used by many QuickTime movies
* Theora (together with Vorbis makes a base for the .ogg format)
* Truespeech
* TXD[3]
* VP5[2] and VP6[2]
* Vorbis
* Windows Media Audio
* Some Windows Media Video codecs, including WMV1, WMV2 and WMV3

The default MPEG-4 codec used by FFmpeg for encoding has the FourCC of FMP4.

FFMPEG

FFmpeg is a collection of software libraries that can record, convert and stream digital audio and video in numerous formats. It includes libavcodec, an audio/video codec library used by several other projects, and libavformat, an audio/video container mux and demux library. The name of the project comes from the MPEG video standards group, together with "FF" for "fast forward".[1]

The project was started by Fabrice Bellard (using the pseudonym “Gerard Lantau”), and is now maintained by Michael Niedermayer. Many FFmpeg developers are also part of the MPlayer project, and FFmpeg is hosted at the MPlayer project server.

FFmpeg is developed under Linux, but it can be compiled under most operating systems, including Microsoft Windows. There are no releases. Instead, FFmpeg developers recommend using the latest Subversion snapshot as development maintains a constantly stable trunk.[citation needed] Released under the GNU Lesser General Public License or GNU General Public License (depending on which sub-libraries one would include), FFmpeg is free software.

COMPONENTS:-
The project is made of several components:

* ffmpeg is a command line tool to convert one video file format to another. It also supports grabbing and encoding in real time from a TV card.
* ffserver is an HTTP (RTSP is being developed) multimedia streaming server for live broadcasts. Time shifting of live broadcast is also supported.
* ffplay is a simple media player based on SDL and on the FFmpeg libraries.
* libavcodec is a library containing all the FFmpeg audio/video encoders and decoders. Most codecs were developed from scratch to ensure best performance and high code reusability.
* libavformat is a library containing demuxers and muxers for audio/video container formats.
* libavutil is a helper library containing routines common to different parts of FFmpeg.
* libpostproc is a library containing video postprocessing routines.
* libswscale is a library containing video image scaling routines.

CODECS AND FORMAT SUPPORTED:-
* ATRAC3[2]
* H.261,[2] H.263[2] and h.264/MPEG-4 AVC[2]
* Indeo 2 and 3[2]
* QDesign Music Codec 2, used by many QuickTime movies prior to QuickTime 7.
* Sorenson 3 Codec used by many QuickTime movies
* Theora (together with Vorbis makes a base for the .ogg format)
* Truespeech
* TXD[3]
* VP5[2] and VP6[2]
* Vorbis
* Windows Media Audio
* Some Windows Media Video codecs, including WMV1, WMV2 and WMV3

The default MPEG-4 codec used by FFmpeg for encoding has the FourCC of FMP4.

FFMPEG

FFmpeg is a collection of software libraries that can record, convert and stream digital audio and video in numerous formats. It includes libavcodec, an audio/video codec library used by several other projects, and libavformat, an audio/video container mux and demux library. The name of the project comes from the MPEG video standards group, together with "FF" for "fast forward".[1]

The project was started by Fabrice Bellard (using the pseudonym “Gerard Lantau”), and is now maintained by Michael Niedermayer. Many FFmpeg developers are also part of the MPlayer project, and FFmpeg is hosted at the MPlayer project server.

FFmpeg is developed under Linux, but it can be compiled under most operating systems, including Microsoft Windows. There are no releases. Instead, FFmpeg developers recommend using the latest Subversion snapshot as development maintains a constantly stable trunk.[citation needed] Released under the GNU Lesser General Public License or GNU General Public License (depending on which sub-libraries one would include), FFmpeg is free software.

COMPONENTS:-
The project is made of several components:

* ffmpeg is a command line tool to convert one video file format to another. It also supports grabbing and encoding in real time from a TV card.
* ffserver is an HTTP (RTSP is being developed) multimedia streaming server for live broadcasts. Time shifting of live broadcast is also supported.
* ffplay is a simple media player based on SDL and on the FFmpeg libraries.
* libavcodec is a library containing all the FFmpeg audio/video encoders and decoders. Most codecs were developed from scratch to ensure best performance and high code reusability.
* libavformat is a library containing demuxers and muxers for audio/video container formats.
* libavutil is a helper library containing routines common to different parts of FFmpeg.
* libpostproc is a library containing video postprocessing routines.
* libswscale is a library containing video image scaling routines.

CODECS AND FORMAT SUPPORTED:-
* ATRAC3[2]
* H.261,[2] H.263[2] and h.264/MPEG-4 AVC[2]
* Indeo 2 and 3[2]
* QDesign Music Codec 2, used by many QuickTime movies prior to QuickTime 7.
* Sorenson 3 Codec used by many QuickTime movies
* Theora (together with Vorbis makes a base for the .ogg format)
* Truespeech
* TXD[3]
* VP5[2] and VP6[2]
* Vorbis
* Windows Media Audio
* Some Windows Media Video codecs, including WMV1, WMV2 and WMV3

The default MPEG-4 codec used by FFmpeg for encoding has the FourCC of FMP4.

FFMPEG

FFmpeg is a collection of software libraries that can record, convert and stream digital audio and video in numerous formats. It includes libavcodec, an audio/video codec library used by several other projects, and libavformat, an audio/video container mux and demux library. The name of the project comes from the MPEG video standards group, together with "FF" for "fast forward".[1]

The project was started by Fabrice Bellard (using the pseudonym “Gerard Lantau”), and is now maintained by Michael Niedermayer. Many FFmpeg developers are also part of the MPlayer project, and FFmpeg is hosted at the MPlayer project server.

FFmpeg is developed under Linux, but it can be compiled under most operating systems, including Microsoft Windows. There are no releases. Instead, FFmpeg developers recommend using the latest Subversion snapshot as development maintains a constantly stable trunk.[citation needed] Released under the GNU Lesser General Public License or GNU General Public License (depending on which sub-libraries one would include), FFmpeg is free software.

COMPONENTS:-
The project is made of several components:

* ffmpeg is a command line tool to convert one video file format to another. It also supports grabbing and encoding in real time from a TV card.
* ffserver is an HTTP (RTSP is being developed) multimedia streaming server for live broadcasts. Time shifting of live broadcast is also supported.
* ffplay is a simple media player based on SDL and on the FFmpeg libraries.
* libavcodec is a library containing all the FFmpeg audio/video encoders and decoders. Most codecs were developed from scratch to ensure best performance and high code reusability.
* libavformat is a library containing demuxers and muxers for audio/video container formats.
* libavutil is a helper library containing routines common to different parts of FFmpeg.
* libpostproc is a library containing video postprocessing routines.
* libswscale is a library containing video image scaling routines.

CODECS AND FORMAT SUPPORTED:-
* ATRAC3[2]
* H.261,[2] H.263[2] and h.264/MPEG-4 AVC[2]
* Indeo 2 and 3[2]
* QDesign Music Codec 2, used by many QuickTime movies prior to QuickTime 7.
* Sorenson 3 Codec used by many QuickTime movies
* Theora (together with Vorbis makes a base for the .ogg format)
* Truespeech
* TXD[3]
* VP5[2] and VP6[2]
* Vorbis
* Windows Media Audio
* Some Windows Media Video codecs, including WMV1, WMV2 and WMV3

The default MPEG-4 codec used by FFmpeg for encoding has the FourCC of FMP4.

FFMPEG

FFmpeg is a collection of software libraries that can record, convert and stream digital audio and video in numerous formats. It includes libavcodec, an audio/video codec library used by several other projects, and libavformat, an audio/video container mux and demux library. The name of the project comes from the MPEG video standards group, together with "FF" for "fast forward".[1]

The project was started by Fabrice Bellard (using the pseudonym “Gerard Lantau”), and is now maintained by Michael Niedermayer. Many FFmpeg developers are also part of the MPlayer project, and FFmpeg is hosted at the MPlayer project server.

FFmpeg is developed under Linux, but it can be compiled under most operating systems, including Microsoft Windows. There are no releases. Instead, FFmpeg developers recommend using the latest Subversion snapshot as development maintains a constantly stable trunk.[citation needed] Released under the GNU Lesser General Public License or GNU General Public License (depending on which sub-libraries one would include), FFmpeg is free software.

COMPONENTS:-
The project is made of several components:

* ffmpeg is a command line tool to convert one video file format to another. It also supports grabbing and encoding in real time from a TV card.
* ffserver is an HTTP (RTSP is being developed) multimedia streaming server for live broadcasts. Time shifting of live broadcast is also supported.
* ffplay is a simple media player based on SDL and on the FFmpeg libraries.
* libavcodec is a library containing all the FFmpeg audio/video encoders and decoders. Most codecs were developed from scratch to ensure best performance and high code reusability.
* libavformat is a library containing demuxers and muxers for audio/video container formats.
* libavutil is a helper library containing routines common to different parts of FFmpeg.
* libpostproc is a library containing video postprocessing routines.
* libswscale is a library containing video image scaling routines.

CODECS AND FORMAT SUPPORTED:-
* ATRAC3[2]
* H.261,[2] H.263[2] and h.264/MPEG-4 AVC[2]
* Indeo 2 and 3[2]
* QDesign Music Codec 2, used by many QuickTime movies prior to QuickTime 7.
* Sorenson 3 Codec used by many QuickTime movies
* Theora (together with Vorbis makes a base for the .ogg format)
* Truespeech
* TXD[3]
* VP5[2] and VP6[2]
* Vorbis
* Windows Media Audio
* Some Windows Media Video codecs, including WMV1, WMV2 and WMV3

The default MPEG-4 codec used by FFmpeg for encoding has the FourCC of FMP4.

FFMPEG

FFmpeg is a collection of software libraries that can record, convert and stream digital audio and video in numerous formats. It includes libavcodec, an audio/video codec library used by several other projects, and libavformat, an audio/video container mux and demux library. The name of the project comes from the MPEG video standards group, together with "FF" for "fast forward".[1]

The project was started by Fabrice Bellard (using the pseudonym “Gerard Lantau”), and is now maintained by Michael Niedermayer. Many FFmpeg developers are also part of the MPlayer project, and FFmpeg is hosted at the MPlayer project server.

FFmpeg is developed under Linux, but it can be compiled under most operating systems, including Microsoft Windows. There are no releases. Instead, FFmpeg developers recommend using the latest Subversion snapshot as development maintains a constantly stable trunk.[citation needed] Released under the GNU Lesser General Public License or GNU General Public License (depending on which sub-libraries one would include), FFmpeg is free software.

COMPONENTS:-
The project is made of several components:

* ffmpeg is a command line tool to convert one video file format to another. It also supports grabbing and encoding in real time from a TV card.
* ffserver is an HTTP (RTSP is being developed) multimedia streaming server for live broadcasts. Time shifting of live broadcast is also supported.
* ffplay is a simple media player based on SDL and on the FFmpeg libraries.
* libavcodec is a library containing all the FFmpeg audio/video encoders and decoders. Most codecs were developed from scratch to ensure best performance and high code reusability.
* libavformat is a library containing demuxers and muxers for audio/video container formats.
* libavutil is a helper library containing routines common to different parts of FFmpeg.
* libpostproc is a library containing video postprocessing routines.
* libswscale is a library containing video image scaling routines.

CODECS AND FORMAT SUPPORTED:-
* ATRAC3[2]
* H.261,[2] H.263[2] and h.264/MPEG-4 AVC[2]
* Indeo 2 and 3[2]
* QDesign Music Codec 2, used by many QuickTime movies prior to QuickTime 7.
* Sorenson 3 Codec used by many QuickTime movies
* Theora (together with Vorbis makes a base for the .ogg format)
* Truespeech
* TXD[3]
* VP5[2] and VP6[2]
* Vorbis
* Windows Media Audio
* Some Windows Media Video codecs, including WMV1, WMV2 and WMV3

The default MPEG-4 codec used by FFmpeg for encoding has the FourCC of FMP4.

FFMPEG

FFmpeg is a collection of software libraries that can record, convert and stream digital audio and video in numerous formats. It includes libavcodec, an audio/video codec library used by several other projects, and libavformat, an audio/video container mux and demux library. The name of the project comes from the MPEG video standards group, together with "FF" for "fast forward".[1]

The project was started by Fabrice Bellard (using the pseudonym “Gerard Lantau”), and is now maintained by Michael Niedermayer. Many FFmpeg developers are also part of the MPlayer project, and FFmpeg is hosted at the MPlayer project server.

FFmpeg is developed under Linux, but it can be compiled under most operating systems, including Microsoft Windows. There are no releases. Instead, FFmpeg developers recommend using the latest Subversion snapshot as development maintains a constantly stable trunk.[citation needed] Released under the GNU Lesser General Public License or GNU General Public License (depending on which sub-libraries one would include), FFmpeg is free software.

COMPONENTS:-
The project is made of several components:

* ffmpeg is a command line tool to convert one video file format to another. It also supports grabbing and encoding in real time from a TV card.
* ffserver is an HTTP (RTSP is being developed) multimedia streaming server for live broadcasts. Time shifting of live broadcast is also supported.
* ffplay is a simple media player based on SDL and on the FFmpeg libraries.
* libavcodec is a library containing all the FFmpeg audio/video encoders and decoders. Most codecs were developed from scratch to ensure best performance and high code reusability.
* libavformat is a library containing demuxers and muxers for audio/video container formats.
* libavutil is a helper library containing routines common to different parts of FFmpeg.
* libpostproc is a library containing video postprocessing routines.
* libswscale is a library containing video image scaling routines.

CODECS AND FORMAT SUPPORTED:-
* ATRAC3[2]
* H.261,[2] H.263[2] and h.264/MPEG-4 AVC[2]
* Indeo 2 and 3[2]
* QDesign Music Codec 2, used by many QuickTime movies prior to QuickTime 7.
* Sorenson 3 Codec used by many QuickTime movies
* Theora (together with Vorbis makes a base for the .ogg format)
* Truespeech
* TXD[3]
* VP5[2] and VP6[2]
* Vorbis
* Windows Media Audio
* Some Windows Media Video codecs, including WMV1, WMV2 and WMV3

The default MPEG-4 codec used by FFmpeg for encoding has the FourCC of FMP4.

FFMPEG

FFmpeg is a collection of software libraries that can record, convert and stream digital audio and video in numerous formats. It includes libavcodec, an audio/video codec library used by several other projects, and libavformat, an audio/video container mux and demux library. The name of the project comes from the MPEG video standards group, together with "FF" for "fast forward".[1]

The project was started by Fabrice Bellard (using the pseudonym “Gerard Lantau”), and is now maintained by Michael Niedermayer. Many FFmpeg developers are also part of the MPlayer project, and FFmpeg is hosted at the MPlayer project server.

FFmpeg is developed under Linux, but it can be compiled under most operating systems, including Microsoft Windows. There are no releases. Instead, FFmpeg developers recommend using the latest Subversion snapshot as development maintains a constantly stable trunk.[citation needed] Released under the GNU Lesser General Public License or GNU General Public License (depending on which sub-libraries one would include), FFmpeg is free software.

COMPONENTS:-
The project is made of several components:

* ffmpeg is a command line tool to convert one video file format to another. It also supports grabbing and encoding in real time from a TV card.
* ffserver is an HTTP (RTSP is being developed) multimedia streaming server for live broadcasts. Time shifting of live broadcast is also supported.
* ffplay is a simple media player based on SDL and on the FFmpeg libraries.
* libavcodec is a library containing all the FFmpeg audio/video encoders and decoders. Most codecs were developed from scratch to ensure best performance and high code reusability.
* libavformat is a library containing demuxers and muxers for audio/video container formats.
* libavutil is a helper library containing routines common to different parts of FFmpeg.
* libpostproc is a library containing video postprocessing routines.
* libswscale is a library containing video image scaling routines.

CODECS AND FORMAT SUPPORTED:-
* ATRAC3[2]
* H.261,[2] H.263[2] and h.264/MPEG-4 AVC[2]
* Indeo 2 and 3[2]
* QDesign Music Codec 2, used by many QuickTime movies prior to QuickTime 7.
* Sorenson 3 Codec used by many QuickTime movies
* Theora (together with Vorbis makes a base for the .ogg format)
* Truespeech
* TXD[3]
* VP5[2] and VP6[2]
* Vorbis
* Windows Media Audio
* Some Windows Media Video codecs, including WMV1, WMV2 and WMV3

The default MPEG-4 codec used by FFmpeg for encoding has the FourCC of FMP4.

Security Tips For Business

1. You can't turn shovelware into reliable software by patching it a whole lot.
2.You shouldn't mix production systems with non-production systems.
3. You actually have to know what's going on in your networks.
4. If you run your computers with an open execution runtime model you'll always get viruses, spyware and Trojan horses.
5. You can pass laws about locking barn doors after horses have left, but it won't put the horses back in the barn.
6.Security has to be designed in, as part of a system plan for reliability, rather than bolted on afterward.

Security Tips For Business

1. You can't turn shovelware into reliable software by patching it a whole lot.
2.You shouldn't mix production systems with non-production systems.
3. You actually have to know what's going on in your networks.
4. If you run your computers with an open execution runtime model you'll always get viruses, spyware and Trojan horses.
5. You can pass laws about locking barn doors after horses have left, but it won't put the horses back in the barn.
6.Security has to be designed in, as part of a system plan for reliability, rather than bolted on afterward.

Security Tips For Business

1. You can't turn shovelware into reliable software by patching it a whole lot.
2.You shouldn't mix production systems with non-production systems.
3. You actually have to know what's going on in your networks.
4. If you run your computers with an open execution runtime model you'll always get viruses, spyware and Trojan horses.
5. You can pass laws about locking barn doors after horses have left, but it won't put the horses back in the barn.
6.Security has to be designed in, as part of a system plan for reliability, rather than bolted on afterward.

Security Tips For Business

1. You can't turn shovelware into reliable software by patching it a whole lot.
2.You shouldn't mix production systems with non-production systems.
3. You actually have to know what's going on in your networks.
4. If you run your computers with an open execution runtime model you'll always get viruses, spyware and Trojan horses.
5. You can pass laws about locking barn doors after horses have left, but it won't put the horses back in the barn.
6.Security has to be designed in, as part of a system plan for reliability, rather than bolted on afterward.

Security Tips For Business

1. You can't turn shovelware into reliable software by patching it a whole lot.
2.You shouldn't mix production systems with non-production systems.
3. You actually have to know what's going on in your networks.
4. If you run your computers with an open execution runtime model you'll always get viruses, spyware and Trojan horses.
5. You can pass laws about locking barn doors after horses have left, but it won't put the horses back in the barn.
6.Security has to be designed in, as part of a system plan for reliability, rather than bolted on afterward.

Security Tips For Business

1. You can't turn shovelware into reliable software by patching it a whole lot.
2.You shouldn't mix production systems with non-production systems.
3. You actually have to know what's going on in your networks.
4. If you run your computers with an open execution runtime model you'll always get viruses, spyware and Trojan horses.
5. You can pass laws about locking barn doors after horses have left, but it won't put the horses back in the barn.
6.Security has to be designed in, as part of a system plan for reliability, rather than bolted on afterward.

Security Tips For Business

1. You can't turn shovelware into reliable software by patching it a whole lot.
2.You shouldn't mix production systems with non-production systems.
3. You actually have to know what's going on in your networks.
4. If you run your computers with an open execution runtime model you'll always get viruses, spyware and Trojan horses.
5. You can pass laws about locking barn doors after horses have left, but it won't put the horses back in the barn.
6.Security has to be designed in, as part of a system plan for reliability, rather than bolted on afterward.

Security Tips For Business

1. You can't turn shovelware into reliable software by patching it a whole lot.
2.You shouldn't mix production systems with non-production systems.
3. You actually have to know what's going on in your networks.
4. If you run your computers with an open execution runtime model you'll always get viruses, spyware and Trojan horses.
5. You can pass laws about locking barn doors after horses have left, but it won't put the horses back in the barn.
6.Security has to be designed in, as part of a system plan for reliability, rather than bolted on afterward.

Security Tips For Business

1. You can't turn shovelware into reliable software by patching it a whole lot.
2.You shouldn't mix production systems with non-production systems.
3. You actually have to know what's going on in your networks.
4. If you run your computers with an open execution runtime model you'll always get viruses, spyware and Trojan horses.
5. You can pass laws about locking barn doors after horses have left, but it won't put the horses back in the barn.
6.Security has to be designed in, as part of a system plan for reliability, rather than bolted on afterward.

Security Tips For Business

1. You can't turn shovelware into reliable software by patching it a whole lot.
2.You shouldn't mix production systems with non-production systems.
3. You actually have to know what's going on in your networks.
4. If you run your computers with an open execution runtime model you'll always get viruses, spyware and Trojan horses.
5. You can pass laws about locking barn doors after horses have left, but it won't put the horses back in the barn.
6.Security has to be designed in, as part of a system plan for reliability, rather than bolted on afterward.

Security Reminder

This week, the orkut team discovered that a user had exploited a bug in our scrapbook feature. As a result, many of you likely received scraps from friends of yours that they actually didn't send, and friends may have received scraps that appeared to come from you.

The orkut team responded quickly, and worked late into the night to fix the underlying issue and contain the spread of these scraps.

We believe that this action has been effectively stopped and you should no longer receive any more of these unintended messages. We appreciate your understanding in this case and hope that this did not create too much of an inconvenience for you or your fellow orkut friends.

-Abhi

Security Reminder

This week, the orkut team discovered that a user had exploited a bug in our scrapbook feature. As a result, many of you likely received scraps from friends of yours that they actually didn't send, and friends may have received scraps that appeared to come from you.

The orkut team responded quickly, and worked late into the night to fix the underlying issue and contain the spread of these scraps.

We believe that this action has been effectively stopped and you should no longer receive any more of these unintended messages. We appreciate your understanding in this case and hope that this did not create too much of an inconvenience for you or your fellow orkut friends.

-Abhi

Security Reminder

This week, the orkut team discovered that a user had exploited a bug in our scrapbook feature. As a result, many of you likely received scraps from friends of yours that they actually didn't send, and friends may have received scraps that appeared to come from you.

The orkut team responded quickly, and worked late into the night to fix the underlying issue and contain the spread of these scraps.

We believe that this action has been effectively stopped and you should no longer receive any more of these unintended messages. We appreciate your understanding in this case and hope that this did not create too much of an inconvenience for you or your fellow orkut friends.

-Abhi

Security Reminder

This week, the orkut team discovered that a user had exploited a bug in our scrapbook feature. As a result, many of you likely received scraps from friends of yours that they actually didn't send, and friends may have received scraps that appeared to come from you.

The orkut team responded quickly, and worked late into the night to fix the underlying issue and contain the spread of these scraps.

We believe that this action has been effectively stopped and you should no longer receive any more of these unintended messages. We appreciate your understanding in this case and hope that this did not create too much of an inconvenience for you or your fellow orkut friends.

-Abhi

Security Reminder

This week, the orkut team discovered that a user had exploited a bug in our scrapbook feature. As a result, many of you likely received scraps from friends of yours that they actually didn't send, and friends may have received scraps that appeared to come from you.

The orkut team responded quickly, and worked late into the night to fix the underlying issue and contain the spread of these scraps.

We believe that this action has been effectively stopped and you should no longer receive any more of these unintended messages. We appreciate your understanding in this case and hope that this did not create too much of an inconvenience for you or your fellow orkut friends.

-Abhi

Security Reminder

This week, the orkut team discovered that a user had exploited a bug in our scrapbook feature. As a result, many of you likely received scraps from friends of yours that they actually didn't send, and friends may have received scraps that appeared to come from you.

The orkut team responded quickly, and worked late into the night to fix the underlying issue and contain the spread of these scraps.

We believe that this action has been effectively stopped and you should no longer receive any more of these unintended messages. We appreciate your understanding in this case and hope that this did not create too much of an inconvenience for you or your fellow orkut friends.

-Abhi

Security Reminder

This week, the orkut team discovered that a user had exploited a bug in our scrapbook feature. As a result, many of you likely received scraps from friends of yours that they actually didn't send, and friends may have received scraps that appeared to come from you.

The orkut team responded quickly, and worked late into the night to fix the underlying issue and contain the spread of these scraps.

We believe that this action has been effectively stopped and you should no longer receive any more of these unintended messages. We appreciate your understanding in this case and hope that this did not create too much of an inconvenience for you or your fellow orkut friends.

-Abhi

Security Reminder

This week, the orkut team discovered that a user had exploited a bug in our scrapbook feature. As a result, many of you likely received scraps from friends of yours that they actually didn't send, and friends may have received scraps that appeared to come from you.

The orkut team responded quickly, and worked late into the night to fix the underlying issue and contain the spread of these scraps.

We believe that this action has been effectively stopped and you should no longer receive any more of these unintended messages. We appreciate your understanding in this case and hope that this did not create too much of an inconvenience for you or your fellow orkut friends.

-Abhi

Security Reminder

This week, the orkut team discovered that a user had exploited a bug in our scrapbook feature. As a result, many of you likely received scraps from friends of yours that they actually didn't send, and friends may have received scraps that appeared to come from you.

The orkut team responded quickly, and worked late into the night to fix the underlying issue and contain the spread of these scraps.

We believe that this action has been effectively stopped and you should no longer receive any more of these unintended messages. We appreciate your understanding in this case and hope that this did not create too much of an inconvenience for you or your fellow orkut friends.

-Abhi

Security Reminder

This week, the orkut team discovered that a user had exploited a bug in our scrapbook feature. As a result, many of you likely received scraps from friends of yours that they actually didn't send, and friends may have received scraps that appeared to come from you.

The orkut team responded quickly, and worked late into the night to fix the underlying issue and contain the spread of these scraps.

We believe that this action has been effectively stopped and you should no longer receive any more of these unintended messages. We appreciate your understanding in this case and hope that this did not create too much of an inconvenience for you or your fellow orkut friends.

-Abhi

Security Rules Employers Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employers Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employers Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employers Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employers Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employers Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employers Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employers Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employers Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employers Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employees Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employees Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employees Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employees Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employees Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employees Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employees Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employees Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employees Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Security Rules Employees Like To Break

1. Copying confidential information onto a USB memory stick: Eighty-seven percent of respondents believe their company’s policy forbids it, yet 51 percent say they do it anyway.

2. Accessing web-based e-mail accounts from a workplace computer: Forty-five percent of those surveyed use webmail at work; 74 percent say there is no stated policy that forbids it.

3. Losing a portable data-bearing device: Thirty-nine percent of respondents say they have lost or misplaced such a device, and 72 percent of them did not report the lost device immediately.

4. Downloading personal software onto a company computer: Sixty percent of respondents say there is no stated policy that forbids downloading personal software, a practice that 45 percent of respondents admit to.

5. Sending workplace documents as an attachment in e-mail: Thirty-three percent of respondents send work documents as attachments, and 48 percent aren’t even sure whether or not that violates policy.

6. Disabling security and firewall settings: Eighty percent of those surveyed don’t know whether disabling security is against policy; 17 percent of respondents do it.

7. Sharing passwords with co-workers: Sixty-seven percent say the company’s policy forbids sharing passwords, but 46 percent of them do it anyway.


-Abhi

Saturday, November 24, 2007

welcome Song



-Abhi

welcome Song



-Abhi

welcome Song



-Abhi

welcome Song



-Abhi

welcome Song



-Abhi

welcome Song



-Abhi

welcome Song



-Abhi

welcome Song



-Abhi

welcome Song



-Abhi

welcome Song



-Abhi

Firfox Beta is Out

I have been using firefox 3 alpha since last 2 months, I am happy with the speed it offers but till a certain extent it didnt work well, ofcourse it was alpha version. But the latest beta release looks promising with lots of features and memory leak issues fixed.

Here's what you can expect from this release.

- antivirus software integration
- phishing protection through web site identity verification
- better handling of plugins and support for Vista parental controls
- file downloader has finally been improved, and it now enables download resuming (I’ve been waiting for this one for years)
- plugins are now managed better with the add-on manager
- web pages can be bookmarked with a single click and tagged with a double click
- Smart Places folder, which appears in your bookmarks toolbar, allows for better organization and easy browsing of tagged, bookmarked and frequently visited pages

-Abhi

Firfox Beta is Out

I have been using firefox 3 alpha since last 2 months, I am happy with the speed it offers but till a certain extent it didnt work well, ofcourse it was alpha version. But the latest beta release looks promising with lots of features and memory leak issues fixed.

Here's what you can expect from this release.

- antivirus software integration
- phishing protection through web site identity verification
- better handling of plugins and support for Vista parental controls
- file downloader has finally been improved, and it now enables download resuming (I’ve been waiting for this one for years)
- plugins are now managed better with the add-on manager
- web pages can be bookmarked with a single click and tagged with a double click
- Smart Places folder, which appears in your bookmarks toolbar, allows for better organization and easy browsing of tagged, bookmarked and frequently visited pages

-Abhi

Firfox Beta is Out

I have been using firefox 3 alpha since last 2 months, I am happy with the speed it offers but till a certain extent it didnt work well, ofcourse it was alpha version. But the latest beta release looks promising with lots of features and memory leak issues fixed.

Here's what you can expect from this release.

- antivirus software integration
- phishing protection through web site identity verification
- better handling of plugins and support for Vista parental controls
- file downloader has finally been improved, and it now enables download resuming (I’ve been waiting for this one for years)
- plugins are now managed better with the add-on manager
- web pages can be bookmarked with a single click and tagged with a double click
- Smart Places folder, which appears in your bookmarks toolbar, allows for better organization and easy browsing of tagged, bookmarked and frequently visited pages

-Abhi

Firfox Beta is Out

I have been using firefox 3 alpha since last 2 months, I am happy with the speed it offers but till a certain extent it didnt work well, ofcourse it was alpha version. But the latest beta release looks promising with lots of features and memory leak issues fixed.

Here's what you can expect from this release.

- antivirus software integration
- phishing protection through web site identity verification
- better handling of plugins and support for Vista parental controls
- file downloader has finally been improved, and it now enables download resuming (I’ve been waiting for this one for years)
- plugins are now managed better with the add-on manager
- web pages can be bookmarked with a single click and tagged with a double click
- Smart Places folder, which appears in your bookmarks toolbar, allows for better organization and easy browsing of tagged, bookmarked and frequently visited pages

-Abhi

Firfox Beta is Out

I have been using firefox 3 alpha since last 2 months, I am happy with the speed it offers but till a certain extent it didnt work well, ofcourse it was alpha version. But the latest beta release looks promising with lots of features and memory leak issues fixed.

Here's what you can expect from this release.

- antivirus software integration
- phishing protection through web site identity verification
- better handling of plugins and support for Vista parental controls
- file downloader has finally been improved, and it now enables download resuming (I’ve been waiting for this one for years)
- plugins are now managed better with the add-on manager
- web pages can be bookmarked with a single click and tagged with a double click
- Smart Places folder, which appears in your bookmarks toolbar, allows for better organization and easy browsing of tagged, bookmarked and frequently visited pages

-Abhi

Firfox Beta is Out

I have been using firefox 3 alpha since last 2 months, I am happy with the speed it offers but till a certain extent it didnt work well, ofcourse it was alpha version. But the latest beta release looks promising with lots of features and memory leak issues fixed.

Here's what you can expect from this release.

- antivirus software integration
- phishing protection through web site identity verification
- better handling of plugins and support for Vista parental controls
- file downloader has finally been improved, and it now enables download resuming (I’ve been waiting for this one for years)
- plugins are now managed better with the add-on manager
- web pages can be bookmarked with a single click and tagged with a double click
- Smart Places folder, which appears in your bookmarks toolbar, allows for better organization and easy browsing of tagged, bookmarked and frequently visited pages

-Abhi

Firfox Beta is Out

I have been using firefox 3 alpha since last 2 months, I am happy with the speed it offers but till a certain extent it didnt work well, ofcourse it was alpha version. But the latest beta release looks promising with lots of features and memory leak issues fixed.

Here's what you can expect from this release.

- antivirus software integration
- phishing protection through web site identity verification
- better handling of plugins and support for Vista parental controls
- file downloader has finally been improved, and it now enables download resuming (I’ve been waiting for this one for years)
- plugins are now managed better with the add-on manager
- web pages can be bookmarked with a single click and tagged with a double click
- Smart Places folder, which appears in your bookmarks toolbar, allows for better organization and easy browsing of tagged, bookmarked and frequently visited pages

-Abhi

Firfox Beta is Out

I have been using firefox 3 alpha since last 2 months, I am happy with the speed it offers but till a certain extent it didnt work well, ofcourse it was alpha version. But the latest beta release looks promising with lots of features and memory leak issues fixed.

Here's what you can expect from this release.

- antivirus software integration
- phishing protection through web site identity verification
- better handling of plugins and support for Vista parental controls
- file downloader has finally been improved, and it now enables download resuming (I’ve been waiting for this one for years)
- plugins are now managed better with the add-on manager
- web pages can be bookmarked with a single click and tagged with a double click
- Smart Places folder, which appears in your bookmarks toolbar, allows for better organization and easy browsing of tagged, bookmarked and frequently visited pages

-Abhi

Firfox Beta is Out

I have been using firefox 3 alpha since last 2 months, I am happy with the speed it offers but till a certain extent it didnt work well, ofcourse it was alpha version. But the latest beta release looks promising with lots of features and memory leak issues fixed.

Here's what you can expect from this release.

- antivirus software integration
- phishing protection through web site identity verification
- better handling of plugins and support for Vista parental controls
- file downloader has finally been improved, and it now enables download resuming (I’ve been waiting for this one for years)
- plugins are now managed better with the add-on manager
- web pages can be bookmarked with a single click and tagged with a double click
- Smart Places folder, which appears in your bookmarks toolbar, allows for better organization and easy browsing of tagged, bookmarked and frequently visited pages

-Abhi

Firfox Beta is Out

I have been using firefox 3 alpha since last 2 months, I am happy with the speed it offers but till a certain extent it didnt work well, ofcourse it was alpha version. But the latest beta release looks promising with lots of features and memory leak issues fixed.

Here's what you can expect from this release.

- antivirus software integration
- phishing protection through web site identity verification
- better handling of plugins and support for Vista parental controls
- file downloader has finally been improved, and it now enables download resuming (I’ve been waiting for this one for years)
- plugins are now managed better with the add-on manager
- web pages can be bookmarked with a single click and tagged with a double click
- Smart Places folder, which appears in your bookmarks toolbar, allows for better organization and easy browsing of tagged, bookmarked and frequently visited pages

-Abhi

Tuesday, November 20, 2007

Microsoft releases new Visual Studio and .NET

Microsoft has this week made its top development tool, Visual Studio 2008, available for download to its professional developer subscribers.

The product line includes several editions, ranging from the low-end Visual Studio 2005 Express for students and hobbyists to Visual Studio Team System, a suite with a server geared at teams of programmers.

Formally code-named Orcas, Visual Studio has features for developer productivity, workflow, data handling, and front-end development for Windows Vista.

The release includes technology called Language Integrated Query (LINQ) which is aimed at making it easier to build applications that tap into different data sources.

The product also includes visual modelling tools, a step in the company's plans to simplify application modelling and make it mainstream. It is based on the latest version of the .NET Framework, the underlying software for developing and running applications written with Visual Studio.

S. Somasegar, vice president of Microsoft's tool division, said that the company sought to include regular customer feedback in the development process.

"When I look back over the last few years at how we were able to ship these two products, I truly believe that both our customer input and our renewed focus on intentional engineering allowed us to release a great product in the timeline that we originally set out to hit," he said in his blog.

Visual Studio 2008 will be formally launched on 27 February next year along with Windows Server 2008 and SQL Server 2008.

Microsoft releases new Visual Studio and .NET

Microsoft has this week made its top development tool, Visual Studio 2008, available for download to its professional developer subscribers.

The product line includes several editions, ranging from the low-end Visual Studio 2005 Express for students and hobbyists to Visual Studio Team System, a suite with a server geared at teams of programmers.

Formally code-named Orcas, Visual Studio has features for developer productivity, workflow, data handling, and front-end development for Windows Vista.

The release includes technology called Language Integrated Query (LINQ) which is aimed at making it easier to build applications that tap into different data sources.

The product also includes visual modelling tools, a step in the company's plans to simplify application modelling and make it mainstream. It is based on the latest version of the .NET Framework, the underlying software for developing and running applications written with Visual Studio.

S. Somasegar, vice president of Microsoft's tool division, said that the company sought to include regular customer feedback in the development process.

"When I look back over the last few years at how we were able to ship these two products, I truly believe that both our customer input and our renewed focus on intentional engineering allowed us to release a great product in the timeline that we originally set out to hit," he said in his blog.

Visual Studio 2008 will be formally launched on 27 February next year along with Windows Server 2008 and SQL Server 2008.

Microsoft releases new Visual Studio and .NET

Microsoft has this week made its top development tool, Visual Studio 2008, available for download to its professional developer subscribers.

The product line includes several editions, ranging from the low-end Visual Studio 2005 Express for students and hobbyists to Visual Studio Team System, a suite with a server geared at teams of programmers.

Formally code-named Orcas, Visual Studio has features for developer productivity, workflow, data handling, and front-end development for Windows Vista.

The release includes technology called Language Integrated Query (LINQ) which is aimed at making it easier to build applications that tap into different data sources.

The product also includes visual modelling tools, a step in the company's plans to simplify application modelling and make it mainstream. It is based on the latest version of the .NET Framework, the underlying software for developing and running applications written with Visual Studio.

S. Somasegar, vice president of Microsoft's tool division, said that the company sought to include regular customer feedback in the development process.

"When I look back over the last few years at how we were able to ship these two products, I truly believe that both our customer input and our renewed focus on intentional engineering allowed us to release a great product in the timeline that we originally set out to hit," he said in his blog.

Visual Studio 2008 will be formally launched on 27 February next year along with Windows Server 2008 and SQL Server 2008.

Microsoft releases new Visual Studio and .NET

Microsoft has this week made its top development tool, Visual Studio 2008, available for download to its professional developer subscribers.

The product line includes several editions, ranging from the low-end Visual Studio 2005 Express for students and hobbyists to Visual Studio Team System, a suite with a server geared at teams of programmers.

Formally code-named Orcas, Visual Studio has features for developer productivity, workflow, data handling, and front-end development for Windows Vista.

The release includes technology called Language Integrated Query (LINQ) which is aimed at making it easier to build applications that tap into different data sources.

The product also includes visual modelling tools, a step in the company's plans to simplify application modelling and make it mainstream. It is based on the latest version of the .NET Framework, the underlying software for developing and running applications written with Visual Studio.

S. Somasegar, vice president of Microsoft's tool division, said that the company sought to include regular customer feedback in the development process.

"When I look back over the last few years at how we were able to ship these two products, I truly believe that both our customer input and our renewed focus on intentional engineering allowed us to release a great product in the timeline that we originally set out to hit," he said in his blog.

Visual Studio 2008 will be formally launched on 27 February next year along with Windows Server 2008 and SQL Server 2008.

Microsoft releases new Visual Studio and .NET

Microsoft has this week made its top development tool, Visual Studio 2008, available for download to its professional developer subscribers.

The product line includes several editions, ranging from the low-end Visual Studio 2005 Express for students and hobbyists to Visual Studio Team System, a suite with a server geared at teams of programmers.

Formally code-named Orcas, Visual Studio has features for developer productivity, workflow, data handling, and front-end development for Windows Vista.

The release includes technology called Language Integrated Query (LINQ) which is aimed at making it easier to build applications that tap into different data sources.

The product also includes visual modelling tools, a step in the company's plans to simplify application modelling and make it mainstream. It is based on the latest version of the .NET Framework, the underlying software for developing and running applications written with Visual Studio.

S. Somasegar, vice president of Microsoft's tool division, said that the company sought to include regular customer feedback in the development process.

"When I look back over the last few years at how we were able to ship these two products, I truly believe that both our customer input and our renewed focus on intentional engineering allowed us to release a great product in the timeline that we originally set out to hit," he said in his blog.

Visual Studio 2008 will be formally launched on 27 February next year along with Windows Server 2008 and SQL Server 2008.

Microsoft releases new Visual Studio and .NET

Microsoft has this week made its top development tool, Visual Studio 2008, available for download to its professional developer subscribers.

The product line includes several editions, ranging from the low-end Visual Studio 2005 Express for students and hobbyists to Visual Studio Team System, a suite with a server geared at teams of programmers.

Formally code-named Orcas, Visual Studio has features for developer productivity, workflow, data handling, and front-end development for Windows Vista.

The release includes technology called Language Integrated Query (LINQ) which is aimed at making it easier to build applications that tap into different data sources.

The product also includes visual modelling tools, a step in the company's plans to simplify application modelling and make it mainstream. It is based on the latest version of the .NET Framework, the underlying software for developing and running applications written with Visual Studio.

S. Somasegar, vice president of Microsoft's tool division, said that the company sought to include regular customer feedback in the development process.

"When I look back over the last few years at how we were able to ship these two products, I truly believe that both our customer input and our renewed focus on intentional engineering allowed us to release a great product in the timeline that we originally set out to hit," he said in his blog.

Visual Studio 2008 will be formally launched on 27 February next year along with Windows Server 2008 and SQL Server 2008.

Microsoft releases new Visual Studio and .NET

Microsoft has this week made its top development tool, Visual Studio 2008, available for download to its professional developer subscribers.

The product line includes several editions, ranging from the low-end Visual Studio 2005 Express for students and hobbyists to Visual Studio Team System, a suite with a server geared at teams of programmers.

Formally code-named Orcas, Visual Studio has features for developer productivity, workflow, data handling, and front-end development for Windows Vista.

The release includes technology called Language Integrated Query (LINQ) which is aimed at making it easier to build applications that tap into different data sources.

The product also includes visual modelling tools, a step in the company's plans to simplify application modelling and make it mainstream. It is based on the latest version of the .NET Framework, the underlying software for developing and running applications written with Visual Studio.

S. Somasegar, vice president of Microsoft's tool division, said that the company sought to include regular customer feedback in the development process.

"When I look back over the last few years at how we were able to ship these two products, I truly believe that both our customer input and our renewed focus on intentional engineering allowed us to release a great product in the timeline that we originally set out to hit," he said in his blog.

Visual Studio 2008 will be formally launched on 27 February next year along with Windows Server 2008 and SQL Server 2008.

Microsoft releases new Visual Studio and .NET

Microsoft has this week made its top development tool, Visual Studio 2008, available for download to its professional developer subscribers.

The product line includes several editions, ranging from the low-end Visual Studio 2005 Express for students and hobbyists to Visual Studio Team System, a suite with a server geared at teams of programmers.

Formally code-named Orcas, Visual Studio has features for developer productivity, workflow, data handling, and front-end development for Windows Vista.

The release includes technology called Language Integrated Query (LINQ) which is aimed at making it easier to build applications that tap into different data sources.

The product also includes visual modelling tools, a step in the company's plans to simplify application modelling and make it mainstream. It is based on the latest version of the .NET Framework, the underlying software for developing and running applications written with Visual Studio.

S. Somasegar, vice president of Microsoft's tool division, said that the company sought to include regular customer feedback in the development process.

"When I look back over the last few years at how we were able to ship these two products, I truly believe that both our customer input and our renewed focus on intentional engineering allowed us to release a great product in the timeline that we originally set out to hit," he said in his blog.

Visual Studio 2008 will be formally launched on 27 February next year along with Windows Server 2008 and SQL Server 2008.

Microsoft releases new Visual Studio and .NET

Microsoft has this week made its top development tool, Visual Studio 2008, available for download to its professional developer subscribers.

The product line includes several editions, ranging from the low-end Visual Studio 2005 Express for students and hobbyists to Visual Studio Team System, a suite with a server geared at teams of programmers.

Formally code-named Orcas, Visual Studio has features for developer productivity, workflow, data handling, and front-end development for Windows Vista.

The release includes technology called Language Integrated Query (LINQ) which is aimed at making it easier to build applications that tap into different data sources.

The product also includes visual modelling tools, a step in the company's plans to simplify application modelling and make it mainstream. It is based on the latest version of the .NET Framework, the underlying software for developing and running applications written with Visual Studio.

S. Somasegar, vice president of Microsoft's tool division, said that the company sought to include regular customer feedback in the development process.

"When I look back over the last few years at how we were able to ship these two products, I truly believe that both our customer input and our renewed focus on intentional engineering allowed us to release a great product in the timeline that we originally set out to hit," he said in his blog.

Visual Studio 2008 will be formally launched on 27 February next year along with Windows Server 2008 and SQL Server 2008.

Microsoft releases new Visual Studio and .NET

Microsoft has this week made its top development tool, Visual Studio 2008, available for download to its professional developer subscribers.

The product line includes several editions, ranging from the low-end Visual Studio 2005 Express for students and hobbyists to Visual Studio Team System, a suite with a server geared at teams of programmers.

Formally code-named Orcas, Visual Studio has features for developer productivity, workflow, data handling, and front-end development for Windows Vista.

The release includes technology called Language Integrated Query (LINQ) which is aimed at making it easier to build applications that tap into different data sources.

The product also includes visual modelling tools, a step in the company's plans to simplify application modelling and make it mainstream. It is based on the latest version of the .NET Framework, the underlying software for developing and running applications written with Visual Studio.

S. Somasegar, vice president of Microsoft's tool division, said that the company sought to include regular customer feedback in the development process.

"When I look back over the last few years at how we were able to ship these two products, I truly believe that both our customer input and our renewed focus on intentional engineering allowed us to release a great product in the timeline that we originally set out to hit," he said in his blog.

Visual Studio 2008 will be formally launched on 27 February next year along with Windows Server 2008 and SQL Server 2008.

Operating System

An operating system or OS, is a software program that enables the computer hardware to communicate and operate with the computer software. Without a computer operating system, a computer and software programs would be useless. The image to the right is an example of Microsoft Windows XP, a popular operating system and what the box may look like if you were to visit a local retail store to purchase it.

Hibernate

Also known as smart battery, hibernate is a utility designed to keep the desktop settings and program settings currently being used or worked on when laptop computer loses its power. When the computer is turned back on, the hibernate feature restores your programs and settings exactly as you left them when the computer was turned off.
Users with laptops using Microsoft Windows 3.x, Windows 95, Windows 98 or Windows NT generally utilize PHDISK or HDPREP to set their computer into hibernate mode.
Users using laptops with later versions of Microsoft Windows, such as Microsoft Windows 2000 or Windows XP, commonly uses the hibernate utility included with the operating system. Windows 2000 and Windows XP users can enable the hibernate feature by following the below steps.
1.Open Control Panel.
2.Open the Power Icon.
3.Within the Power Options Properties window click the Hibernate tab and check the checkbox for enabling hibernation.

Operating System

An operating system or OS, is a software program that enables the computer hardware to communicate and operate with the computer software. Without a computer operating system, a computer and software programs would be useless. The image to the right is an example of Microsoft Windows XP, a popular operating system and what the box may look like if you were to visit a local retail store to purchase it.

Hibernate

Also known as smart battery, hibernate is a utility designed to keep the desktop settings and program settings currently being used or worked on when laptop computer loses its power. When the computer is turned back on, the hibernate feature restores your programs and settings exactly as you left them when the computer was turned off.
Users with laptops using Microsoft Windows 3.x, Windows 95, Windows 98 or Windows NT generally utilize PHDISK or HDPREP to set their computer into hibernate mode.
Users using laptops with later versions of Microsoft Windows, such as Microsoft Windows 2000 or Windows XP, commonly uses the hibernate utility included with the operating system. Windows 2000 and Windows XP users can enable the hibernate feature by following the below steps.
1.Open Control Panel.
2.Open the Power Icon.
3.Within the Power Options Properties window click the Hibernate tab and check the checkbox for enabling hibernation.