Technology Summit

114
The truth behind the veil Copyright, 2010 - Rajesh Menon

description

Technology for everyone

Transcript of Technology Summit

Page 1: Technology Summit

The truth behind the veil

Copyright, 2010 - Rajesh Menon

Page 2: Technology Summit

Technology – Introduction, About the course, Q & A

History of Computing

Hardware

Operating Systems / Programming Languages

Databases

Networks (includes introduction to Internet)

Internet – What was, What is and What will (covering Wireless also)

Security

How Technology applies to You and Benefits of using itCopyright, 2010 - Rajesh Menon

Page 3: Technology Summit

Best Friend

Tool

Catalyst

Productivity Enhancer

Shortcut to Goals

Efficiency Improver

Communication Channel and Enhancer

Learning Enabler

Interactive (some)

Copyright, 2010 - Rajesh Menon

Page 4: Technology Summit

I feel the need, the need for speed – Raise your adrenalin levels

Your guide to the technology ocean

Learn technology types and uses

When we say technology – mostly in relation to Computing

Although you will see that Computing is a subset of Technology

Learn some terms, some concepts, some applications

How is technology my best friend

Understand technology landscape

How to make use of Technology in my profession

Copyright, 2010 - Rajesh Menon

Page 5: Technology Summit

Copyright, 2010 - Rajesh Menon

Page 6: Technology Summit

Abacus

Difference Engine / Analytical Engine – Charles Babbage

Lady Ada Lovelace – The first Programmer

Mainframes – IBM

Minicomputers – DEC

Microcomputers

The Hardware is the Computer

The software is the Computer

The network is the Computer

Copyright, 2010 - Rajesh Menon

Page 7: Technology Summit

• beads on rods to count and calculate• still widely used in Asia!

Copyright, 2010 - Rajesh Menon

Page 8: Technology Summit

• Difference Engine c.1822 – huge calculator, never

finished

• Analytical Engine 1833– could store numbers– calculating “mill” used

punched metal cards for instructions

– powered by steam!– accurate to six decimal

placesCopyright, 2010 - Rajesh Menon

Page 9: Technology Summit

• born on 10 December

1815.• named after Byron's half

sister, Augusta, who had been his mistress.

• After Byron had left for the Continent with a parting shot -- 'When shall we three meet again?' -- Ada was brought up by her mother.

Courtesy : Tim Bergin. Computing History Museum, American University Copyright, 2010 - Rajesh Menon

Page 10: Technology Summit

Mainframes

Courtesy : Tim Bergin. Computing History Museum, American University Copyright, 2010 - Rajesh Menon

Page 11: Technology Summit

Minicomputers – PDP 11 - 1970

Courtesy : Tim Bergin. Computing History Museum, American University Copyright, 2010 - Rajesh Menon

Page 12: Technology Summit

Microcomputer - Altair 8800 Computer

Courtesy : Tim Bergin. Computing History Museum, American University Copyright, 2010 - Rajesh Menon

Page 13: Technology Summit

First Microprocessor – 1971

• The 4004 had 2,250 transistors

• four-bit chunks (four 1’s or 0’s)

• 108Khz

• Called “Microchip”

Copyright, 2010 - Rajesh Menon

Page 14: Technology Summit

Taken from Mugil Technologies Website

Copyright, 2010 - Rajesh Menon

Page 15: Technology Summit

Taken from Click.in

Copyright, 2010 - Rajesh Menon

Page 16: Technology Summit

Questions & Answers

Copyright, 2010 - Rajesh Menon

Page 17: Technology Summit

Vaccum TubesTransistorsIntegrated CircuitsVery Large Integrated Circuits (Chips)MicroprocessorsSupport ChipsMotherboardChipSetSpecialized Microprocessors (Graphics and Sound)Input Output DevicesInput (Keyboard / Mouse and others)Output (Display, Printer and others)Wireless DevicesNetwork Devices (Switches / Hubs / Bridges / Gateways)Thought Readers , Robots, Prosthetic DevicesMicrocode

Copyright, 2010 - Rajesh Menon

Page 18: Technology Summit

Vacuum Tubes - 1941 - 1956

• First Generation Electronic Computers used Vacuum Tubes

• Vacuum tubes are glass tubes with circuits inside.

• Vacuum tubes have no air inside of them, which protects the circuitry.

Copyright, 2010 - Rajesh Menon

Page 19: Technology Summit

First Transistor

• Uses Silicon• developed in 1948• won a Nobel prize• on-off switch

• Second Generation Computers used Transistors, starting in 1956

Copyright, 2010 - Rajesh Menon

Page 20: Technology Summit

Integrated Circuits

• Third Generation Computers used Integrated Circuits (chips).

• Integrated Circuits are transistors, resistors, and capacitors integrated together into a single “chip”

Copyright, 2010 - Rajesh Menon

Page 21: Technology Summit

Very Large Integrated Circuits - CHIPS

Taken from WikipediaCopyright, 2010 - Rajesh Menon

Page 22: Technology Summit

Copyright, 2010 - Rajesh Menon

Page 23: Technology Summit

Taken from ComputerMusuem.li

Copyright, 2010 - Rajesh Menon

Page 24: Technology Summit

http://www.build-your-own-computer.net/motherboard-diagram.html

Copyright, 2010 - Rajesh Menon

Page 25: Technology Summit

Copyright, 2010 - Rajesh Menon

Page 26: Technology Summit

Taken from : Laptopshop.co.uk

Copyright, 2010 - Rajesh Menon

Page 27: Technology Summit

http://blogs.digitalmediaonlineinc.com/dvdconverter/?page=1

Copyright, 2010 - Rajesh Menon

Page 29: Technology Summit

http://pusine.wordpress.com/2008/10/02/input-and-output-devices/

http://www.samsung.com/pl/products/monitor/tft/images/940fn_l1a.jpg

Copyright, 2010 - Rajesh Menon

Page 30: Technology Summit

Taken from : static.howstuffworks.comslipperybrick.com

Copyright, 2010 - Rajesh Menon

Page 31: Technology Summit

http://www.adobe.com/devnet/coldfusion/articles/coldfusion_scalability.html

Copyright, 2010 - Rajesh Menon

Page 32: Technology Summit

klaxxx.comhttp://www.sony.net/SonyInfo/News/Press/199905/99-046/index.htmlmedgadget.com Copyright, 2010 - Rajesh Menon

Page 33: Technology Summit

Taken from Mugil Technologies Website

Copyright, 2010 - Rajesh Menon

Page 34: Technology Summit

Questions & Answers

Copyright, 2010 - Rajesh Menon

Page 35: Technology Summit

What is Operating System (OS) ?Why an OS ?Popular Operating Systems in the MarketStrengths and WeaknessComplimentary ProgramsNew Trends – Network OS , VirtualizationThe future of OSWhat is a Programming Languages (PL) What does it do ?Generations of PL’sWhat PL’s are in vogue today ?The next generation PLAbstractions and Annihilation of PL’s

Copyright, 2010 - Rajesh Menon

Page 36: Technology Summit

An OS is a software program which has the following features

It talks to hardwareIt manages the CPUIt manages the MemoryIt manages all I/OIt also talks to different Software Subsystems OS works in the backgroundOS for different hardware is differentIt talks to other devices using internal knowledge or programs called device drivers

Copyright, 2010 - Rajesh Menon

Page 37: Technology Summit

We cannot understand binary language very wellWe cannot remember details of all devicesWe cannot manage memory efficientlyWe need a human understanding interface to machinesWe need somebody to co-ordinate all activities that take place inside the machine

Copyright, 2010 - Rajesh Menon

Page 38: Technology Summit

PC - OS

WindowsLinuxMacOS

Mobile OS

SymbianPalmOSWindows CE

Network OS

Chrome OS

Copyright, 2010 - Rajesh Menon

Page 39: Technology Summit

Strengths Weakness

Simplicity Is getting bulkier day by dayAbstraction Too many choicesUser Friendly Vulnerable to threatsNon intimidating If buggy, can erode some valueEye for detail Sometimes not trustworthyDevice agnostic Too many API’sCommunicatorCollaboratorSchedulerMultitasking and MultiProgrammingInterrupt Handler

Copyright, 2010 - Rajesh Menon

Page 40: Technology Summit

Programming Languages

Databases

Utilities

Extenders like Device Drivers

Network

Copyright, 2010 - Rajesh Menon

Page 41: Technology Summit

Network OS

A lightweight OS which acts as a interface to the internetE.g: Chrome OS

Vitualization

Software Program which makes use of the CPU efficiently. Complements the OS.E.g: VMWare

Copyright, 2010 - Rajesh Menon

Page 42: Technology Summit

Plug and play OS

Configurable

Lots of value adding components talking to multiple OS’s

Universal hooks

Faster and Intelligent

Copyright, 2010 - Rajesh Menon

Page 43: Technology Summit

A way for us to communicate with computers

A Program is a set of instructions

Programming is the art and science of writing good programs

Language is like a protocol that is used to communicate with the machine

Hence PL is nothing but the art and science of writing programs that adhere to a protocol

Copyright, 2010 - Rajesh Menon

Page 44: Technology Summit

A programming language (PL) is like any other language like say English

It helps us to explain to the computer the problem that we are trying to solve

It helps us achieve goals

It makes us happy, when we see the goal achieved.

It may contain bugs which have to be debugged in order to achieve the goal

Hence debugging is a intrinsic part of writing a PL

Creation, Preservation and Annihilation of a PL is similar to Life

Copyright, 2010 - Rajesh Menon

Page 45: Technology Summit

First Generation Machine Language

Second Generation Assembly Language

Third Generation Procedural Language

Fourth Generation Non-Procedural Language

Fifth Generation Object Oriented Language

Sixth Generation AI languages

Seventh Generation ????

Copyright, 2010 - Rajesh Menon

Page 46: Technology Summit

C , C++ , C#, Java

PHP, Python

Lisp, Ruby on Rails

Copyright, 2010 - Rajesh Menon

Page 47: Technology Summit

Simple to use

Intelligent Constructs

Auto Correcting

Self Modifying

User FX

Platform Agnostic

Secure Constructs

Copyright, 2010 - Rajesh Menon

Page 48: Technology Summit

Abstraction

Hiding details and exposing a very friendly interface to the userHuman LikePredictiveAnalyticalQualitative, at times

Annihilation

Future is for non programming productsAuto program writing programsEasy pick and choose interfaceEnd of Programming as we know itEase of Programming – actually the term is value adding

Copyright, 2010 - Rajesh Menon

Page 49: Technology Summit

Questions & Answers

Copyright, 2010 - Rajesh Menon

Page 50: Technology Summit

What is a databaseWhy a database is requiredTypes of DatabasesDatabases in the current MarketWhat is an indexOLTP, DSS, RealTime databasesWhat is SQLWhat are different SQL StatementsStandardsRollback Transactions (Undo)LockingObject Relational DatabasesDataTypesRelation between a database and a networkThe future of database

Copyright, 2010 - Rajesh Menon

Page 51: Technology Summit

A database is a repository of dataLike the Ocean has water, the database has dataData means the smallest unit of informationBase means foundationThus database means a foundation made of dataDatabases can be classified functionally or in other ways for eg: locationwiseDatabases can also be compared to DNA

Copyright, 2010 - Rajesh Menon

Page 52: Technology Summit

Where else can you keep your dataWithout data there is nothing in this worldData needs to be stored somewhereData needs to be classified in order to organize it betterSometimes data about data is also required (Description or Metadata)Data also needs to be retrieved in order to achieve some goal

Copyright, 2010 - Rajesh Menon

Page 53: Technology Summit

Hierarchical databaseNetwork databaseRelational DatabaseObject Relational DatabasePure Object DatabaseInformation Database (Abstraction 1)Knowledge Database (Abstraction 2)

Copyright, 2010 - Rajesh Menon

Page 54: Technology Summit

ORACLE, SQL Server, DB2MySQL, PostGreSQL (Open Source)

Copyright, 2010 - Rajesh Menon

Page 55: Technology Summit

An index is a signpostTo say it in a better way, it is a pointerStill better, it’s an efficient way of organizing dataIndexes help to retrieve the required data in a flash (As compared to sequential access)There are different kinds of indexes like Binary Tree index, Hashes etcThe downside of index is that it takes up some space in the database for its own existence

Copyright, 2010 - Rajesh Menon

Page 56: Technology Summit

OLTP – Online Transaction Processing

Indicates a kind of a database on which Add/Modify/Delete operations are being performed

DSS – Decision Support System

Indicates a kind of a database on which a Query is being performed

RealTime

A database where the time difference between stimulus and response is very low. In short, a fast database.

Copyright, 2010 - Rajesh Menon

Page 57: Technology Summit

SQL stands for Structured Query Language

It is based on relational theory in mathematics

Actually it is not just a Query language, but offers other features also.

SQL is a non procedural language

Every statement itself is complete in itself

There are languages like PL/SQL which extend the functionality of basic SQL

In short, it adds a programming layer

Copyright, 2010 - Rajesh Menon

Page 58: Technology Summit

DDL : Data Definition Language. Eg: CREATE, DROP

DML : Data Manipulation Language. Eg: INSERT,DELETE,UPDATE

DCL : Data Control Language. Eg: GRANT, REVOKE

DQL : Data Query Language. Eg: SELECT

Transaction Processing Statements: Eg: ROLLBACK, COMMIT

Copyright, 2010 - Rajesh Menon

Page 59: Technology Summit

ISO/ANSI

SQL-92

Copyright, 2010 - Rajesh Menon

Page 60: Technology Summit

Are used to undo the earlier action(s)

One way this is achieved using what are called Redo Log Files

There are rollback segments internal to the database

Rollback can be till a particular time or a particular point in code

Rollback points can be specified

Copyright, 2010 - Rajesh Menon

Page 61: Technology Summit

Locking is used to give controlled access to data

There are many kinds of locks

Exclusive LocksRead Only LocksPart read only and Part Exclusive locks

These locks can be at different levels

Some locks are on entire database, some on Files, some on a set of data

A deadlock or a deadly embrace is when 2 users have locked out each other

Modern databases automatically resolve such situations

Copyright, 2010 - Rajesh Menon

Page 62: Technology Summit

A relational database that incorporates object oriented paradigm

Certain statements within SQL now are having object level meanings

Objects support concepts such as Abstraction, Inheritance, Polymorphism

Copyright, 2010 - Rajesh Menon

Page 63: Technology Summit

Are fundamental units which depict what the type of data is

Some of the datatypes are

NUMBER, STRING, XML etc.

Data within a database is stored in columns of a specific datatype, as given above

Copyright, 2010 - Rajesh Menon

Page 64: Technology Summit

Database is nature

And

Network is nurture

We are all born with a database and realize the network around us.

As time passes by …

Copyright, 2010 - Rajesh Menon

Page 65: Technology Summit

Databases will become more complex in terms of type of content

Songs, Videos etc will be embedded within a database – I mean new data types

There will be programs which help disparate databases to talk to each other

Information and Knowledge would be stored within a database

Meta data will become very important

Databases will grow in size

Redundancy would be taken care by some programs, although the trend is to increase

Code will also be interspersed with data in a database

Copyright, 2010 - Rajesh Menon

Page 66: Technology Summit

Questions & Answers

Copyright, 2010 - Rajesh Menon

Page 67: Technology Summit

What is a networkWhy a network is requiredOSI Network LayerNetwork TopologiesBridges, Hubs, Routers, Switches, GatewaysLAN, WAN, MANNetworking ProtocolsConnecting Devices in a NetworkIntelligence in a NetworkThe internet – The mother of all networksWhy the internetARPANET, MILNET, InternetBulletin Boards, Archie , VeronicaWorld Wide Web

Copyright, 2010 - Rajesh Menon

Page 68: Technology Summit

Copyright, 2010 - Rajesh Menon

Page 69: Technology Summit

Two or more devices and/or people connected to each other forms a networkNature itself is synonymous to networkWe are connected to each other through a bond that is not visibleIn a peoples network, we just have six degrees of separation from one anotherThere are networking sites on the internet

Business Networks like LinkedIn

Social Networks like Facebook

Communities

Forums

Copyright, 2010 - Rajesh Menon

Page 70: Technology Summit

Imagine how life would be without a network, all by yourself

There will be nothing to share or show off

There will be a feeling of loneliness

We see ourselves through the senses of other people, when conscious

Ditto with Computers

The more devices connected the more is the value of the network

Copyright, 2010 - Rajesh Menon

Page 71: Technology Summit

Taken From: http://www.webstepbook.com/supplements/slides/images/osi_model.png

Copyright, 2010 - Rajesh Menon

Page 72: Technology Summit

Bridge : Connects two networks

Hub : Central Point for connecting all computers

Router: An intelligent Switch

Switch : Used to connect 2 or more networks

Gateway: A Switch for dissimilar networks

Copyright, 2010 - Rajesh Menon

Page 73: Technology Summit

LAN : Local Area Network

WAN : Wide Area Network

MAN : Metropolitan Area Network

Copyright, 2010 - Rajesh Menon

Page 74: Technology Summit

TCP / IP Transmission Comtrol Protocol/Internet Protocol

UDP User Datagram Protocol

FTP File Transfer Protocol

SMTP / POP3 Simple Mail Transfer Protocol / Post Office Protocol

HTTP Hype Text Transfer Protocol

NetBEIU

NetBios

Copyright, 2010 - Rajesh Menon

Page 75: Technology Summit

The value of a network grows exponentially as more members are added to a network

This is called MetCalfe’s Law

The more devices you connect to each other, the more the value goes up

Devices may require to be installed or may be plug and play

The latter seems to be the trend for the future

Copyright, 2010 - Rajesh Menon

Page 76: Technology Summit

Intelligence resides in the devices on the network

Not in the wire that transmits data

Or the ether through which wireless signals flow

Intelligence will move to the periphery and middle wherever there are devices

Two or more devices may also have a collective intelligence

Intelligence modules will be available as plug and play in the future

Copyright, 2010 - Rajesh Menon

Page 77: Technology Summit

Taken from: http://static.howstuffworks.com/gif/webserver-backbone-sm.gif

Copyright, 2010 - Rajesh Menon

Page 78: Technology Summit

Like Sunlight is impartial, Knowledge should also be impartial

The internet is the first attempt towards this noble goal

The internet is evolving, it’s the mother of all networks on this blue planet

It’s Ubiquitous, Net Neutral and Powerful

Without internet, we would not be able to share so well

Information will reach people late

Some people may even not get the benefit of it

We are all 1 big humanity connected thru networks like the Internet

It accelerates change and provides us tools / info to be more productive

Copyright, 2010 - Rajesh Menon

Page 79: Technology Summit

ARPANET : Is the predecessor of the internet

MILNET: The military network on the internet

Internet: Grew from the two above and now embraces most of the networks

Copyright, 2010 - Rajesh Menon

Page 80: Technology Summit

Earlier Websites were called Bulletin Boards

Except that they were exclusive (not talking to other websites)

Eg: Compuserve, AOL etc

Archie and Veronica were tools to access the internet earlier before 1993

There were many other tools also

Till the time, the World Wide Web was not invented

Copyright, 2010 - Rajesh Menon

Page 81: Technology Summit

The internet as most of us know today is called World Wide Web

A term coined and invented by Tim Berners Lee

Web Browsers were made available and they could access the Web

The underlying language of the Web was HTML

The father of the Internet is Vint Cerf.

Thanks to efforts of all these people, that we get to access the internet

Copyright, 2010 - Rajesh Menon

Page 82: Technology Summit

Questions & Answers

Copyright, 2010 - Rajesh Menon

Page 83: Technology Summit

Building a WebsiteChoosing your Service ProviderChoosing the Platform (Microsoft or LAMP)Choosing the right planPayment details

Hosting your BlogBlogger or WordPressPaid Blogs Permalinks / Comments / Share

Fun with WikisWikipedia – Jimmy WalesAdding / Modifying Wiki Pages

Social NetworkingFacebook & LinkedIn

Getting Paid thru AdSense and AdWordsConsulting Sites (GLG / Nitron)Freelancing with eLance and Guru

Copyright, 2010 - Rajesh Menon

Page 84: Technology Summit

Building

a Websit

e

Copyright, 2010 - Rajesh Menon

Page 85: Technology Summit

Your Service Provider is your middleman to the internet

Learn more about the type of service provided by them

Go to their website

Read about them on blogs, forums, discussions etc.

Check if there are Service Level Agreements (SLA’s)

Narrate your expectations to the Service Provider Contact

See if they can fulfill it

Preferably in writing

Copyright, 2010 - Rajesh Menon

Page 86: Technology Summit

Select a platform that is suitable for your website

For e.g: If your website has been developed on Microsoft Technologies, choose it

Else if say PHP, Python or other Linux Open Source is used, Choose that

If you have a plain brochureware, choose any one of the platforms

By this we mean a set of HTML pages

Once you select a platform, most of the service providers will not allow you to switch

Mostly, the decision for you is a technical one

Copyright, 2010 - Rajesh Menon

Page 87: Technology Summit

The plan typically has the following parameters

What do you plan to do with an internet connection

Size your requirement

Look for a corresponding plan with the service provider

Sizing involves bandwidth, which is the quantum of data flowing up and down through your computer

You can switch plans, as and when your requirement changes

Please check with Service Provider for this

Copyright, 2010 - Rajesh Menon

Page 88: Technology Summit

Normally you have to pay before you use a service

For a new connection, there is going to be an additional charge (for modems, cables etc)

Unless some scheme which waives off all charges is being offered

Mostly people choose to pay monthly

You can make payment by cheque / creditcard / Net Banking (depends on Service Provider)

The less risky is cheque, but it involves a clearing process

Choose the payment plan most suitable to you

Copyright, 2010 - Rajesh Menon

Page 89: Technology Summit

Hosting your Blog

Copyright, 2010 - Rajesh Menon

Page 90: Technology Summit

Both Bloggger and Wordpress are Blogging Sites

Blogger is Google owned

WordPress is independent

To start blogging, Blogger is good

WordPress gives more control over the blog and is slightly more complex

You can Blog from wherever there is a blog button to your blog site

Copyright, 2010 - Rajesh Menon

Page 91: Technology Summit

Some sites pay you for blogging

Typically they need you to

Blog on a subject that you like

Or

Blog on a subject that they want

It can be a product review or a topic

You can also activate AdSense on your Blog (More about this later)

The more the traffic the more popular your Blog and the more they pay you

That roughly is the equation

Copyright, 2010 - Rajesh Menon

Page 92: Technology Summit

Permalinks : Permanent Link to your Blog Address

Comments: Feedback from people who have read your blog

Share: You can share the blog with others on your network

Besides the above you will be able to mark them or click a ‘I like it’ icon

Depends on the blog

Remember to submit your blog to blog search engines to get a higher ranking

The more the traffic the better

Use a third party tool like Google Analytics to understand and predict traffic to your blog

Copyright, 2010 - Rajesh Menon

Page 93: Technology Summit

Copyright, 2010 - Rajesh Menon

Page 94: Technology Summit

WikiPedia is a collabortaive knowledge guide

Founded by Jimmy Wales

It is a reference guide

It has a map counterpart called WikiMapia

Similar to Google Earth

Anyone can edit Wikipedia articles

Copyright, 2010 - Rajesh Menon

Page 95: Technology Summit

Wikipedia is available in many languages

Choose your language and article

You can Edit any page.

Moderation is carried out and the page you edited or added becomes part of the Wikipedia knowledge base

Copyright, 2010 - Rajesh Menon

Page 96: Technology Summit

Social Networks are built with one aim : Share

Content can be anything – pictures, text, videos

The idea is to form a network of friends and share useful things with them

Facebook : Is the most popular Social Networking Sites

Others like Facebook : MySpace, Orkut

LinkedIn: Is a Social Networking Site for Business People

Others like LinkedIn: Ryze

Copyright, 2010 - Rajesh Menon

Page 97: Technology Summit

Adsense : is an advertising program for end users

AdWords: is an advertising program for advertisers

AdSense helps you to make money by providing Google’s taregted Ads on your site or blog

AdWords helps you to own certain keywords which will activiate your Ad on Adsense Pages

With Adsense you make money whenever somebody clicks on the targetted Ads

With Adwords, your Ad comes up first in the Advertisements on a Adsense Network. You have to Pay Google for this service. Advantage: Traffic

Copyright, 2010 - Rajesh Menon

Page 98: Technology Summit

You can also make money by offering your services on a time basis

GLG and Nitron are websites which list services to be fulfilled

And if you can take up a consulting assignment you get paid

Payment depends on your relation with them and experience

You can enlist in these sites and provide consulting assognments

Copyright, 2010 - Rajesh Menon

Page 99: Technology Summit

eLance and Guru are websites which advertise jobs

These need to be done and payment received thereof

There are many freelancing opportunities available.

You have to bid for them and once awarded, do the work and get paid.

Normally the projects are short and of value less than 5000 USD

Good Luck !

Copyright, 2010 - Rajesh Menon

Page 100: Technology Summit

Questions & Answers

Copyright, 2010 - Rajesh Menon

Page 101: Technology Summit

The race between the good and the badPrivacyEncryption – Private and Public KeyWhat happens when you boot up ?Malware – Adware, Spyware and Viruses (Trojans, Worms) Antivirus – what they can and what they cannot doZero day exploitsPhishingFirewalls, IDSDigital SignaturesHackingWhat next ?

Copyright, 2010 - Rajesh Menon

Page 102: Technology Summit

Since ages the cops have been chasing the criminals

As light is to darkness, so is cops to criminals

There are rules to follow – which is called dharma

When people do not follow the dharma, they fall into disgrace

The farther away from way of the dharma, the more they seem to have err-ed

People do wrong actions because of ignorance

The cops are our line of defence against the looming threat

Copyright, 2010 - Rajesh Menon

Page 103: Technology Summit

We treasure our privacy. There are some parts of our life,, which cannot be exposed as doing so will cause discomfort to ourselves

What to hide and what to expose varies from individual to individual

Privacy is a key attribute of modern computing systems

One way to have privacy is to authenticate the set of data that we need to make private

Authorization further restricts the access to required data

Privacy can be compromised by not just computers, but also people who are unaware

Copyright, 2010 - Rajesh Menon

Page 104: Technology Summit

Encryption is a way of changing data into an unreadable format

It works on the basis of keys that are the gatekeepers to data

Private encryption is typically a dataset and 1 key to decode the same

Public Key Encryption uses 2 keys (RSA)

Encryption is also referred to as Secured mode

For eg: https

The key strength may be 40 bit, 128 bit etc. The bigger the key the more difficult it is to break the code.

Copyright, 2010 - Rajesh Menon

Page 105: Technology Summit

Here’’s a typical PC boot up sequence

Start POSTLoad Boot RecordLoad Kernel of OSLoad Shell of OSLoad Applications on StartupGive control to application

Copyright, 2010 - Rajesh Menon

Page 106: Technology Summit

Adware is a program which typically shows ads on your system, without your permission

Spyware is more advanced. It can log in your keys , act as a part of a botnet

Viruses are nasty little programs that cause a lot of nuisance.

Trojans are a type of virus. E.g: E-mail attachments

Worms are runaway virus programs which multiply very fast

There are many other types of viruses like boot sector / file viruses

Copyright, 2010 - Rajesh Menon

Page 107: Technology Summit

Antivirus detects viruses and eradicates them

They work typically on virus signatures

Some work on heuristics

Most of the anti viruses are pretty good, but virus writers are one step ahead.

Eg: McAfee, Norton, AVG etc.

Copyright, 2010 - Rajesh Menon

Page 108: Technology Summit

Are the exploits written with 24 hours of launch of a product

Antivirus people are always on the lookout for these viruses

The exploit can be a weakness in a operating system, a patch or something else

Copyright, 2010 - Rajesh Menon

Page 109: Technology Summit

Gathering info thru social engineering is called Phishing

The data typically is used to do something harmful to the person who revealed this data

It can also be an organization or group instead of a person

The problem is human beings who are gullible to such attacks

The only solution is to be alert

Copyright, 2010 - Rajesh Menon

Page 110: Technology Summit

A firewall is a block between the outside network and your computer

IDS or intrusion detection system, detects suspicious activities

A firewall can restrict access to your computer by closing some ports or restricting certain protocols

Copyright, 2010 - Rajesh Menon

Page 111: Technology Summit

Are electronic equivalent of paper signatures

They are recognized to be legally binding in some countries

Typically organizations like Verisign issue the same

MS Word also has a provision for the same

Copyright, 2010 - Rajesh Menon

Page 112: Technology Summit

Hacking is the art of understanding a system in depth

When the knowledge that is gathered is used for bad purpose it is called black hat hacking

When the knowledge that is gathered is used for good purpose it is called white hat hacking (ethical hackers)

Those in between are called grey hat hackers

Copyright, 2010 - Rajesh Menon

Page 113: Technology Summit

To block a black hat hacker, you have to think like them

Prevention is better than cure

Being proactive matters

Take backup regularly

Viruses have started proliferating thru all channels like device drivers

As gadgets become more intelligent the chances of a virus infecting them is more

Social Engineering is something that needs to be tackled with more awareness

Copyright, 2010 - Rajesh Menon

Page 114: Technology Summit

Questions & Answers

Copyright, 2010 - Rajesh Menon