Sunday, February 15, 2009

ROBOT CONTROLLING WITH MOBILE

ABSTRACT

In this project we are going to use the robot to monitor the surrounding areas. And here we are controlling the Robot using GSM mobile phones. The surroundings are monitored through the Wireless camera and are viewed at the PC with the help of the receiver. Here the mobile signals are decoded through a DTMF receiver and are sent to the microcontroller at the Robot section to awake the robot to change its direction. Beyond controlling the robot direction through the mobile here we are also controlling the position of the camera. Here the DC motors are used as the wheels of the robot as well as for position controlling of the camera since because of the load effective problems.

Wednesday, February 11, 2009

CRYPTOGRAPHY & NETWORK SECURITY

The common problem today faced by all the computer professionals around the world is the security of their computers. Now, why is it that computer professional need security? What are they afraid of? Well the answer is very simple and one which is well Known, a Hacker.

Hacking is a perennial concern for anyone who is into computer technology, either as a novice or an expert. ‘Hacking’ and ‘Hackers’ are terms that generally tend to have a negative effect on people. The wrong notion that people have is that ‘Hackers” are computer criminals or people who cause harm to systems, release viruses, etc. The media is also responsible for wrongly using the term “Hacker” referring computer criminals.

Our opinions do not go hand in hand with the media and the people who refer computer criminals as ‘Hackers’. Simultaneously is no way do we blame them for holding such a negative opinion. The fact is that one tends to accept what is being fed to him. Well, ‘Hackers’ in reality are actually good, pleasant and extremely intelligent people, who by using their knowledge in a constructive manner, helping organizations to secure documents and company secrets, helping the government to protect national documents of strategic importance and even sometimes helping justice to meet its ends by ferreting out electronic evidence. These are the people who help to keep computer criminals on the run. And that is why it is a must that every one who is somehow involved in computer technology need to know the hacking skills to protect his/her system from other hackers. A soldier well equipped with weapons is sent to the war and not a farmer. Similarly mean computer security starts with an educated user. This paper throws light on the important techniques of Ethical Hacking to counter the Unethical Hacking

Sunday, February 1, 2009

RFID

Abstract:
The technology for radio frequency identification (RFID) enables data to be transmitted by a tiny portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. It is only recently that the technology has begun to take off in the mass market. Analysts predict that RFID will revolutionize areas of industry, such as supply chain management and the retail business, for example by reducing costs with better stock management. This paper focuses on the application of RFID technology in mobile telecommunication services. Several ideas for applications as well as possible areas for standardization efforts are presented. Apart frompurely technical concepts, the challenging aspects of security and privacy are discussed