Saturday 27 April 2013

Guesses of ERP

The three tables on slide AM6(10), AM5(13, 17)  are in paper for sure. So make sure you know how they are working.

AM1 (2,15,11,8)
AM2 (3,4, 6-7)
AM3 (6,10,7-9)
AM4 (2,3)
AM5 (6,2-4,7-9,11-12,15-16,22-24)
AM6 (2-8)


Thursday 18 April 2013

Hiring In Ufone Call Center


Edit funtion in PHP

<?php
error_reporting(0);
include("db.php");
$editId;
if($_REQUEST['id'] != ""){
$id = $_REQUEST['id'] ;
    $GLOBALS[$editId] = $id;
}

?>


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Edit Document</title>
<script type="text/javascript">
function editDone(){
<?php
$id = $_REQUEST['name'];
$email = $_REQUEST['email'];
$password = $_REQUEST['password'];
echo "id = $id + email = $email + pass = $password";

?>   
   
}
</script>
</head>

<body>
<table>
<tr>
<td>Name</td>
<td><input type="text" name="name" /></td>
</tr>
<tr>
<td>Email</td>
<td><input type="text" name="email" /></td>
</tr>
<tr>
<td>Password</td>
<td><input type="password" name="password" /></td>
</tr>
<tr>
<td>
<input type="submit" value="Edit Record" onclick="editDone();" />
</td>
</tr>
</table>
</body>
</html>

Code for Database Connection confirmation PHP+HTML

<html>
<head>
<title> web page 2</title>
</head>
<body>
<?php
error_reporting(0);
$con=mysql_connect("localhost","root","");
if($con){
    mysql_select_db('one',$con);
echo "connection successfully";
}
else{
    echo "connection fail";
}

$id=$_REQUEST['id'];
$name=$_REQUEST['name'];
$email=$_REQUEST['email'];
$password=$_REQUEST['password'];



$query="INSERT INTO `db1`.`one` (`id`, `name`, `email`, `password`) VALUES (NULL, '$name', '$email', '$password'); ";

$r = mysql_query($query);
if($r)
{echo "inserted";}
else
{echo "error";}

?>


</body>
</html>



Database connect with php

<?php
error_reporting(0);
include("db.php");
if($_REQUEST['id'] != ""){
$id = $_REQUEST['id'] ;
$del = "delete  from one where id = $id";
$dd = mysql_query($del);
   
}
$q = "select * from one;";
$res = mysql_query($q);

?>




<html>
<head>
<title>3rd page</title>
</head>

<body>
<table border="2" cellpadding="2" cellspacing="2">
<tr>
<td>ID</td>
<td>Name</td>
<td>Email</td>
<td>Password</td>
<td>Delete</td>
<td>Edit</td>
</tr>

<?php
while($row = mysql_fetch_array($res)){
?>
<tr>
<td><?php echo $row['id']; ?></td>
<td><?php echo $row['name']; ?></td>
<td><?php echo $row['email']; ?></td>
<td><?php echo $row['password']; ?></td>
<td><button onClick="return confirm('Are you shure to delete Record No :<?php echo $row['id']; ?>')" href="DatabaseConnect.php?id=<?php echo $row['id']; ?>">Delete</button></td>
<td><a href="Edit.php?id=<?php echo $row['id']; ?>">Edit</a></td>

</tr>

<?php } ?>
</table>
</body>
</html>

MOnte Carlito tool simulation

Tool for monte carlo provided by sir umer (ITPM)

MonteCarlito 1.10 --- Free Excel Tool for Monte Carlo Simulation

Thursday 11 April 2013

Assignment of Research Method





Performance of  Windows XP, Windows Vista and Apple’s Leopard Computers under a Denial of Service Attack

                                                  SUMMARY




Abstract Distributed Denial of Service (DDOS) attacks are increasing over the Internet. DDOS attacks were launched on servers belonging to US and South Korean government. DDOS attacks are now considered a prominent threat to the internet. ICMP is used to diagnose and report any error in a network. ICMP is used by a user to verify the end to end Internet Path operation, where ICMP Echo Reply packet to confirm that host is alive in the network. IP Spoofing forms a platform for larger of DOS attacks.
When a victim computer is flooded with ICMP Echo Requests having identical source and destination IP addresses, the victim computer replies to itself for all Echo requests it receives. The exhaustion of computing resources was recorded and compared for each operating system.
Window XP and Window Vista under ICMP based Land Attack on the computer system. Window XP consumes a fixed amount of main memory.
Window XP is more robust and more capable of withstanding the DDOS attacks compared to Apple’s Leopard and Windows Vista operating systems. Window Vista to crash at 30Mbps load attack was primarily due to depletion of available space in the main memory. Windows XP operating system was able to limit the processor exhaustion to a maximum of 50% utilization and help survive DDOS attack.

Tuesday 9 April 2013

New Slides


Notes of Network Security
                            Data Encryption Standard 
Click here for for further detail on DES

 Assignment of Research method........
Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack 

IT PM slides......

6) 4-Mar_ Estimate Cost determine Budget

7) 25-mar-2013_Quality management

8) 9-Aprl-2013_Procurement Management    



The assignments from lecture slides are following
1) Requirement traceability matrix.
2) WBS
3) WBS Dictionary
4) Gantt Chart
5) Network Diagram
6) Milestone Chart
7) RACI CHART
8) Organizational Break Down structure 
9) Issue Log 

Please discuss in case of any ambiguity.
 
//fb like box