Showing posts with label application. Show all posts
Showing posts with label application. Show all posts

Thursday, August 18, 2011

SOME SECRET APPLICATION IN WINDOWS XP

SOME SECRET APPLICATION IN WINDOWS XP. Here's some secret application that exists in Windows XP. Some applications may already we know beforehand but there are some applications that may be new and alien to us. Application forms — application we can use to perform the optimization and monitoring system Windows XP us.

Some of the applications in question are as follows.

1. Disk Cleanup = Cleanmgr.exe


Used to cleanup disk


2. Character Map = charmap .exe
Used to search for characters that are not common


3. Dr. Watson = Drwtsn32.exe
Used for troubleshooting the PC.


4. DirectX Diagnostic = Dxdiag.exe
Used for the diagnosis of audio for your video card


5. Private character editor = eudcedit .exe
Used to create new characters on your windows


6. the IExpress Wizard = iexpress exe
Used to create a self-extracting/self installing package. like a Zip file


7. Microsoft Synchronization Manager = mobsync .exe
Used to create sincronisasi.


8. Clipboard Viewer = clipbrd .exe
Used to view content from the Windows clipboard


9. Windows Media Player 5.1 = mplay32. exe
Used to open Windows Media Player version 5.1


10. ODBC Data Source Administrator = odbcad32. exe
Used for the purposes of the database


11. Object Packager = packager .exe
Used to insert the object into a file.


12. System Configuration Editor = sysedit .exe
Used to modify the system.ini and win.ini


13. Syskey = syskey .exe
Used for configuring an account in windows.


14. Microsoft Telnet Client = telnet .exe
Used to connect the internet prior to any browser.


15. the Driver Verifier Manager = verifier is
Used for monitoring drivers in your windows


16. Windows for Workgroups Chat = winchat .exe
Used for chat sec


5. System configuration = Msconfig.exe
Used to control startup programs


18. System Monitor = perfmon .exe
Used to monitor your PC.


7. Program Manager = progman .exe
A legacy of Windows 3.x desktop shell


20. gpedit.msc
Used to manage group policy and authorization, if you are using Active Directory.


21. Remote Access phone book = rasphone exe
An application such as a phone book


22. the Registry Editor Regedt32.exe = [also Regedit.exe]
Used for tweaking and editing the windows registry


23. the Network shared folder wizard = shrpubw .exe
Used to create a shared folder on a network


24. siganture File verification tool = sigverif .exe
Used to verify signature


25. Volume Control sndvol32.exe = exe
Used to display the sound control in the System Tray


How to run such applications are as follows.

Click > [Start] [All Programs] > [Accessories] > [Command Prompt]

Or

Click > [Start] [Run]


Then type the command to write the name of the application and proceed with OK or press ENTER. Unless the Gpedit.msc, in type the command, do not need to write down the name of the application to complete.

Example:


If we want to run the MSCONFIG.EXE then we are only able to write (type) MSCONFIG only (without followed .exe).

More aboutSOME SECRET APPLICATION IN WINDOWS XP

Saturday, August 6, 2011

Trellis Desk, help desk and technical support web application

In large companies where there are dozens or more then absolutely necessary employees Office help or technical support that handles certain parts. A manual system where support requests by telephone and then indicated on the form will add to the workload of the Division of technical support. Required applications are able to work automation technical support section to receive requests and search for the most popular or technical support with technical support. The application is good enough trelis Desk e.g. Accord5.

Featured

Trelis Desk has a pretty full as a help desk application that can help to facilitate the work of the technical support. Here are some of the applications featured Trelis Desk:

  • Distribution of tickets based on Department
    Trelis Desk multi departement featureWith this feature then all the Department may receive applications for support and not closed for part of it. For example the Department of Supply Chain Management that address the issue of the inventory of the goods and the movement of goods can use the application to manage the demand for goods of the Department or the other branch.
  • Priority tickets
    Tickets can be created and priorities if the ticket is important or poor. Thus receiving tickets can support with precision according to priority.
  • Transfer of tickets
    Tickets can be redirected to specific staff so that tickets can be handled by the staff and responsible for the completion of this note.
  • Definition of group permissions
    This application has access level are divided according to the group, which has a level of security of a good use
  • Notes RSS
    We easily create RSS feeds on a ticket which has become our responsibility. Thus, we simply check if there are new tickets aimed at us fast.
  • Multi language
    By default, this has the appearance of the application with the United Kingdom. However, we can easily translate the application into another language, we want to. Simply fill in the translation of phrases are used in the application.
  • Knowledge Base
    Trelis Desk knowledge base featureHave a basic knowledge or the integrated knowledge base. This makes it easy for us in the search for a settlement before entering stage of tickets. The star gave advice solutions available until we enter the ticket will help to increase the work efficiency because it reduces frekuasi in dealing with the same problem.

Features that are fairly complete as an application of Office help makes Trelis reliable Desk assistance in your diperusahaan desktop applications. And the cost of completeness featured issued is zero free alias. Then why are not you seeks to implement this application in your company.

Link

http://www.Accord5.com.

http://www.Accord5.com/trellis

More aboutTrellis Desk, help desk and technical support web application

Friday, August 5, 2011

Web Application development methodology

The methodology is the way used by a person regularly by filling out a job. Which is in my opinion. The word methodology widely used in project management. Due to the success of the project is also determined by the selection of the methodology to be used in this project. In the same way in our Web applications development projects require an appropriate methodology to produce the desired result web application.

In the world of software engineering, a more conventional methodology consists of 5 phases, namely:

  1. Phases of the requirement or the need for research, in this phase, we know exactly what the hell is seeking is required, the object of an application development project, and this kind of results you want.
  2. The analysis phase, at this stage based on the results returned need, then we will decide what type of application you want made, featured anything is required, a problem that is likely to face us, everything we need in the development process, etc..
  3. Phase of design at this stage, we will make a plan or design of the application to be based on the results of the previous analysis. By example, based on the results of our analysis will create multiple applications features, now, we need to design a database in the table is approximately required for featured. In addition, the results of the analysis, we make the appearance of the application. The structure of the necessary application kayaking how, what functions will be created, etc.
  4. The phase of development, the stages of the implementation of the results, analysis and design. At this stage, we will write the appropriate code that had been planned earlier in the design phase. At this stage also carried out tests of a function has been run as desired.
  5. The installation phase, after ensuring that all functions have been going well and have met the criteria that you want in a phase of requirement then would be the installation application on the server or the computer that will be used to run this application.

The above is the phase of the standard which is dynamic. Not forever each phase will be ignored. Sometimes, we return to a previous step to correct the deficiencies that exist. There are also several phases which are combined to make it more simple or separated for more details.

It is a classic of the methodology of application development projects. What is web application development projects. Essentially because the applications and methodology above can also be used. But sometimes we need a special method that is for us more comfortable. I myself have a separate method in the process of developing web applications. But actually adopted the method above, but with some changes or simply change the words to fit my way.

Here is a typical web development methodology to use:

  1. Requirement of phase, similar to the method above. In this phase, I try to discover some of the following questions:
    • What is needed?
    • What is the purpose of this request?
    • what you want to accomplish?
    • is there a reference or an example?
    • that is the target of the use of this application?

    After obtaining the answer to this question, then I just starts the next phase.

  2. Determination of phase feature and function, at this stage of your search results based on the needs of the application, then I define the features and functions that will be created to meet the needs that exist. Featured are divided in part major or large features first, and then was defined as the smallest. For example, on the application of the CMS, one of the main feature is a blog, then blog features has been defined as features of tagging, category, comment, etc. At this stage of the note is if the list of features and functions that are created have needs of desired.
  3. Phases of data collection, content, images and other files needed for the development of the application. Based on a list of features and functions that will be developed, then I will collect the data and files required for the functions and features.
  4. Analysis of phase and design, at this stage, I am analysing the data which were collected in the previous steps and in a draft of the analysis of the results. For example, on the basis of the existing features then I designed the database tables required by each feature. Based on existing data and content, I also did the design of display applications. In addition, I have also compiled application such as a menu structure, sitemap, etc.
  5. The coding phase, at this stage that I began to write program code. Usually begins by changing the file image in html light fireworks template. After that create a framework for applications such as the structure of files and folders and began development for each feature functions.
  6. The phase of installation and testing, at this stage, that I did the installation on the server where the web application will run. Of course after that do test your premises and machinery first make sure that all functions are okay. On the server will be also made tests in order to ensure the application can be run on the server. At this stage will also conducted beta test where some people will try to use the applications and give comments or related to the operation of the application.
  7. Phases of launch, on this phase after a certain application is running on the server and then I will make a good socialization in the real world or virtual worlds. Some of them make a post on the forums, the applications of social network such as facebook, post to other blogs and socialization.

This is the method I use in my web application development. As before each phase of the non-binding but as much as possible of the existing stream. In reality the methodology above also my adaptation of one of the Agile development the Feature Driven Development (FDD)methods. FDD is a method of developing application mengfokuskan on the feature or function you want to develop.

Fundamentally the methodology developed to make the results of work for the better. But of course the methodology that you use should match the yourself. Use a method that suits you best and see if the best results. If it does not consider other methodology while remaining compatible with you.

Reference:

More aboutWeb Application development methodology

Monday, July 11, 2011

Application Smart Samsung TV service passes


Samsung made an announcement indicating the success of Smart TV App Store company. In accordance with the Declaration, the Smart TV App store has managed to exceed the 5 million download milestone.

The company offers 550 Samsung Apps. They are targeted for smart TV series from Samsung which is currently available. According to the statement issued by the Korean electronics giant, the Smart TV App service played exceptionally since it was launched about 14 months earlier.

Among the most popular Samsung Apps download, YouTube application holds the number one position. The application has been topping graphics downloads in the United Kingdom, we and many other countries. Kang-hyun Kwon, Senior Vice President of the Media Center Solution for samsung Electronics said that applications Smart TV has a possibility to the lists of top of the download page for global and regional.  He added that, since the TV is a family based device, adding social features such as games of chance and networking, will create a whole new world of possibilities to the users.

Progress has step however, day to the next. After the service was launched, it took them almost 11 months to reach the 2 million. The mark of $ 2 million was completed in January of this year. But during the next four months, the progress was stiff and reached an additional $ 3 million download. Now, Samsung Apps are available in 120 countries and sees an average of 100,000 downloads every four days.

According to Kevin Kyungshik Lee, Vice President of Visual Display Business - Samsung Electronics, the applications that are specifically designed to improve the experience of television have managed to achieve the status of "living room norm". He added that applications Smart TV by Samsung are a revolutionary change in the living room entertainment and their diversity and the experience that they have to offer will continue to grow.

More aboutApplication Smart Samsung TV service passes

Thursday, June 23, 2011

Denim Group releases Application Security remediation Resource Center

By Dan Cornell Denim Group announced the first application security remediation Resource Center. There are many resources to it: video, a practical guide on sanitation of the software, the slidedecks and links to all the posts on this blog clean....
More aboutDenim Group releases Application Security remediation Resource Center

Wednesday, June 22, 2011

N-Stalker is winning 2009′s the web application, database security security software, said!

SECURITY-database, one of the entities of more accredited in the world dedicated to identify and evaluate web security threats (and the best tools available on the market to combat them) named N-STALKER as winner of the 2009's in the assessment tools web application security. It is the result of 10 years, entirely dedicated to the creation, design and development [...]
More aboutN-Stalker is winning 2009′s the web application, database security security software, said!

The State of Application Security: key findings - a webcast from Forrester & Microsoft

HI all - Doug here

Earlier this year, Microsoft has worked with Forrester Consulting and Dr. Chenxi Wang, analyst on secure development of applications, to assess the current state of the security of applications among the largest companies in the United States and the Canada 150.  I discussed in February when we publish it on this blog. Report has proven to have a lot of very interesting data, that which some we talked about earlier when we published State of the application - security A Forrester Consulting Thought Leadership paper commissioned by Microsoft on our Web site.

Microsoft is hosting a webcast on Monday, May 23 at 11 PAH with Mr. Wang talk about the results and recommendations based on the information contained in the study.  I will follow her presentation with a brief presentation of my own discussing the similar benefits that we have seen in our interactions with other organizations. Both presentations will demonstrate that the SDL as a process from end to end that engages all stakeholders within an organization can have a significant impact.

The current context of security and compliance is the engine of many organizations look at their own secure application development practices.  The results of this study and the information in the retransmission can help provide key elements of the justification for the company to start a secure application development program which is more than just compliance.  The findings of this study are very clear that there is a commercial advantage not only doing better security of the application, but also in the King of the evolution of business around the software development culture.  It is an excellent opportunity for your business decision makers to hear the facts and help you make your case.

Come and listen to and have the opportunity to ask questions.  You can register here, Business Insights Webcast: the State of application security: key findings.

More aboutThe State of Application Security: key findings - a webcast from Forrester & Microsoft

Tuesday, June 21, 2011

Return on investment (ROI) and Secure application development: a holistic approach can save money and increase productivity?

Doug cavity here to speak to a presentation, that I give to the Conference RSA with the results of a consultation of Forrester think paper of leadership that we have recently published. 

We're often asked, "what is the real return on investment for a program of developing secure in place application?" Wisdom is that the development of secure applications is more expensive that do, the probability of having hacked is low and most organizations really do not have the time or resources to the right. In other secure development organizations is recognized as important; but in practice, the corners are cut and only some activities requested in global security, processes are really ended. There are many examples of the failure of these philosophies in the news.   

We thought about it for some time now. and we have concluded that the Microsoft SDL process does in fact provide return on investment beyond the costs of implementation. To this day however, we did not examined systematically outside the company to confirm our belief that the holistic process shall benefit from a bottom line of the organization.

We have worked with Forrester Research to refine our thoughts and test our premises with 150 Fortune 1000 companies. Forrester concluded that most of the companies in the study does not use a process of development of global security. However, those who have a process (such as the Microsoft SDL), many saw improvements in the overall - especially when King compared to those using ad hoc solutions or approaches to the "list". 

This report provides an overview of the security of the current applications of development practices, exposes gaps in common in the process, and addresses issues that can arise to do not with a comprehensive approach to ensure the development of software. In addition, the report provides guidance on possible improvements in the process and suggests ways to measure development security King. The report can be found here: Forrester Consulting State of Application Security Thought Leadership white paper.

At 16: 10 a.m. on Tuesday 15 February, I will explore this topic more in depth in the booth of Microsoft at RSA. If you are at the RSA Conference, stop and tell us what you think!

More aboutReturn on investment (ROI) and Secure application development: a holistic approach can save money and increase productivity?