Buffer overflow exploits have been and continue to remain to be a major threat to computer security. In order to have better understand on this, this paper discuss about the topics that related to buffer overflow. The paper begins with the explanation what is buffer overflow all about and then a little bit about the types of buffer overflow. Next is briefly explains about how buffer overflow happened. This paper also discussing a little bit about buffer overflow exploit and finally in depth...
Modulation is very important block in communication system to transmit the data through channel without loss of data & to reduce size of antenna incase of wireless communication it is also important aspect for FDM. Because of these requirements many models are proposed to design a stable & low power modulator because the requirement of the sine wave as carrier most of the previously proposed models uses the analog circuitry for modulators but the stability of the analog system very much...
iOS is operating system distributed and developed by Apple Inc, in 2007, and at this time it was called iPhone operating system iPhone OS, this operating system developed at first for iPhone devices, after that iPhone OS was run on the other mobile devise use touch screen developed by Apple Inc, such as the iPod touch, the iPad, and more recently the apple TV, there devises are call (iDevise), after then was renamed iPhone OS to ( iOS) to better reflect the fact that it runs on other...
Mobile commerce, in other words, online commerce over mobile devices has gained attention of IS research community and an has become an important priority for many business organizations as evidence shows that people have not found PC-based commerce up to their expectation level and also the adoption is not on a large scale (Prabhaker, 162 and Ropers, 54). In this paper, the researcher therefore has discussed m-commerce and the issue of value creation in m-commerce along with the drawbacks...
The aim of this analysis is on various security issues and solution of Mobile Bluetooth technology. As this is relatively new technology as compared to other wireless technologies and has more popular practical application. Keywords: Personal Area Networks, Asynchronous connection Link, Ultra Wide Band, Special Interest group, Bluetooth Technology, piconet, scatternetThe Basic:Bluetooth is an open wireless technology for data exchanging in shorter distances for mobile phones with some levels of...
Initial computer buses were parallel electrical wires with several connections, but the term is now applied for any physical layout that offers the similar logical functionality as a parallel electrical bus. Current computer buses can use both parallel as well as bit serial connections, and can be wired in either a multidrop (electrical parallel) or daisy chain topology, or linked by switched hubs, as in the case of USB. Buses function in units of cycles, messages and transactions. Talking...
Computer organisation is a study of computer architecture that includes CPU, memory, registers and so on. Data processing takes place in a CPU of a computer. A CPU consists of three major parts and they are as follows: Arithmetic Logic Unit (ALU) Control Unit Register Set ALU ALU is a part of a computer processor that performs arithmetic and logical operations on data. Arithmetic operations are addition, subtraction, division and multiplication. Whereas, logical operation is comparing letters,...
In the era of digital data transaction, in order to transact the data in a sophisticated manner the need for a cryptographic algorithm cannot be compensated by any other computing techniques. In this computing world we have huge numbers of cryptographic algorithms which makes the system resistant from the attacks of intruders and eavesdroppers. RivestCipher4 is the cryptographic algorithms which are very well known for their performance, simplicity, strong key generation. In this paper, we...
Puzzle games can be very enjoyable and is popular amongst kids as well as adults. Many of you may know the game Sudoku; where by the goal of the game is to fill in the remaining empty cells with each number from 1-9 appearing no more than once from each column, each row and each of the nine sub-grids. Sudoku is a type of logic-based numerical puzzle game that has a unique solution once completed. The most common form of a Sudoku is constructed as a 9x9 grid with nine 3x3 sub-grids and is...
Introduction Before we try to understand how a beam vibrates it is essential for us to understand what exactly a beam is and how it behaves. We can define a beam as a structural element that carries loads primarily in bending. The term structural element is used to separate complex structures into their simple elements (Waddell, J.A.L. 1916). Some examples of these elements are rods, ties, beams and shells and it will be the beam element that we will be investigating in this paper. The...