Monday 29 April 2013
Saturday 27 April 2013
Guesses of ERP
The three tables on slide AM6(10), AM5(13, 17) are in paper for sure. So make sure you know how they are working.
AM1 (2,15,11,8)
AM2 (3,4, 6-7)
AM3 (6,10,7-9)
AM4 (2,3)
AM5 (6,2-4,7-9,11-12,15-16,22-24)
AM6 (2-8)
AM1 (2,15,11,8)
AM2 (3,4, 6-7)
AM3 (6,10,7-9)
AM4 (2,3)
AM5 (6,2-4,7-9,11-12,15-16,22-24)
AM6 (2-8)
Tuesday 23 April 2013
Thursday 18 April 2013
Edit funtion in PHP
<?php
error_reporting(0);
include("db.php");
$editId;
if($_REQUEST['id'] != ""){
$id = $_REQUEST['id'] ;
$GLOBALS[$editId] = $id;
}
?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Edit Document</title>
<script type="text/javascript">
function editDone(){
<?php
$id = $_REQUEST['name'];
$email = $_REQUEST['email'];
$password = $_REQUEST['password'];
echo "id = $id + email = $email + pass = $password";
?>
}
</script>
</head>
<body>
<table>
<tr>
<td>Name</td>
<td><input type="text" name="name" /></td>
</tr>
<tr>
<td>Email</td>
<td><input type="text" name="email" /></td>
</tr>
<tr>
<td>Password</td>
<td><input type="password" name="password" /></td>
</tr>
<tr>
<td>
<input type="submit" value="Edit Record" onclick="editDone();" />
</td>
</tr>
</table>
</body>
</html>
error_reporting(0);
include("db.php");
$editId;
if($_REQUEST['id'] != ""){
$id = $_REQUEST['id'] ;
$GLOBALS[$editId] = $id;
}
?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Edit Document</title>
<script type="text/javascript">
function editDone(){
<?php
$id = $_REQUEST['name'];
$email = $_REQUEST['email'];
$password = $_REQUEST['password'];
echo "id = $id + email = $email + pass = $password";
?>
}
</script>
</head>
<body>
<table>
<tr>
<td>Name</td>
<td><input type="text" name="name" /></td>
</tr>
<tr>
<td>Email</td>
<td><input type="text" name="email" /></td>
</tr>
<tr>
<td>Password</td>
<td><input type="password" name="password" /></td>
</tr>
<tr>
<td>
<input type="submit" value="Edit Record" onclick="editDone();" />
</td>
</tr>
</table>
</body>
</html>
Code for Database Connection confirmation PHP+HTML
<html>
<head>
<title> web page 2</title>
</head>
<body>
<?php
error_reporting(0);
$con=mysql_connect("localhost","root","");
if($con){
mysql_select_db('one',$con);
echo "connection successfully";
}
else{
echo "connection fail";
}
$id=$_REQUEST['id'];
$name=$_REQUEST['name'];
$email=$_REQUEST['email'];
$password=$_REQUEST['password'];
$query="INSERT INTO `db1`.`one` (`id`, `name`, `email`, `password`) VALUES (NULL, '$name', '$email', '$password'); ";
$r = mysql_query($query);
if($r)
{echo "inserted";}
else
{echo "error";}
?>
</body>
</html>
<head>
<title> web page 2</title>
</head>
<body>
<?php
error_reporting(0);
$con=mysql_connect("localhost","root","");
if($con){
mysql_select_db('one',$con);
echo "connection successfully";
}
else{
echo "connection fail";
}
$id=$_REQUEST['id'];
$name=$_REQUEST['name'];
$email=$_REQUEST['email'];
$password=$_REQUEST['password'];
$query="INSERT INTO `db1`.`one` (`id`, `name`, `email`, `password`) VALUES (NULL, '$name', '$email', '$password'); ";
$r = mysql_query($query);
if($r)
{echo "inserted";}
else
{echo "error";}
?>
</body>
</html>
Database connect with php
<?php
error_reporting(0);
include("db.php");
if($_REQUEST['id'] != ""){
$id = $_REQUEST['id'] ;
$del = "delete from one where id = $id";
$dd = mysql_query($del);
}
$q = "select * from one;";
$res = mysql_query($q);
?>
<html>
<head>
<title>3rd page</title>
</head>
<body>
<table border="2" cellpadding="2" cellspacing="2">
<tr>
<td>ID</td>
<td>Name</td>
<td>Email</td>
<td>Password</td>
<td>Delete</td>
<td>Edit</td>
</tr>
<?php
while($row = mysql_fetch_array($res)){
?>
<tr>
<td><?php echo $row['id']; ?></td>
<td><?php echo $row['name']; ?></td>
<td><?php echo $row['email']; ?></td>
<td><?php echo $row['password']; ?></td>
<td><button onClick="return confirm('Are you shure to delete Record No :<?php echo $row['id']; ?>')" href="DatabaseConnect.php?id=<?php echo $row['id']; ?>">Delete</button></td>
<td><a href="Edit.php?id=<?php echo $row['id']; ?>">Edit</a></td>
</tr>
<?php } ?>
</table>
</body>
</html>
error_reporting(0);
include("db.php");
if($_REQUEST['id'] != ""){
$id = $_REQUEST['id'] ;
$del = "delete from one where id = $id";
$dd = mysql_query($del);
}
$q = "select * from one;";
$res = mysql_query($q);
?>
<html>
<head>
<title>3rd page</title>
</head>
<body>
<table border="2" cellpadding="2" cellspacing="2">
<tr>
<td>ID</td>
<td>Name</td>
<td>Email</td>
<td>Password</td>
<td>Delete</td>
<td>Edit</td>
</tr>
<?php
while($row = mysql_fetch_array($res)){
?>
<tr>
<td><?php echo $row['id']; ?></td>
<td><?php echo $row['name']; ?></td>
<td><?php echo $row['email']; ?></td>
<td><?php echo $row['password']; ?></td>
<td><button onClick="return confirm('Are you shure to delete Record No :<?php echo $row['id']; ?>')" href="DatabaseConnect.php?id=<?php echo $row['id']; ?>">Delete</button></td>
<td><a href="Edit.php?id=<?php echo $row['id']; ?>">Edit</a></td>
</tr>
<?php } ?>
</table>
</body>
</html>
MOnte Carlito tool simulation
Tool for monte carlo provided by sir umer (ITPM)
MonteCarlito 1.10 --- Free Excel Tool for Monte Carlo Simulation
Thursday 11 April 2013
Assignment of Research Method
Performance
of Windows XP, Windows Vista and Apple’s
Leopard Computers under a Denial of Service Attack
SUMMARY
Abstract Distributed Denial of Service (DDOS)
attacks are increasing over the Internet. DDOS attacks were launched on servers
belonging to US and South Korean government. DDOS attacks are now considered a
prominent threat to the internet. ICMP is used to diagnose and report any error
in a network. ICMP is used by a user to verify the end to end Internet Path
operation, where ICMP Echo Reply packet to confirm that host is alive in the
network. IP Spoofing forms a platform for larger of DOS attacks.
When a victim computer is flooded with ICMP Echo
Requests having identical source and destination IP addresses, the victim
computer replies to itself for all Echo requests it receives. The exhaustion of
computing resources was recorded and compared for each operating system.
Window XP and Window Vista under ICMP based Land
Attack on the computer system. Window XP consumes a fixed amount of main
memory.
Window XP is more robust and more capable of
withstanding the DDOS attacks compared to Apple’s Leopard and Windows Vista
operating systems. Window Vista to crash at 30Mbps load attack was primarily
due to depletion of available space in the main memory. Windows XP operating
system was able to limit the processor exhaustion to a maximum of 50%
utilization and help survive DDOS attack.
Tuesday 9 April 2013
New Slides
Notes of Network Security
Data Encryption Standard
Click here for for further detail on DES
Assignment of Research method........
Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack
IT PM slides......
6) 4-Mar_ Estimate Cost determine Budget
7) 25-mar-2013_Quality management
8) 9-Aprl-2013_Procurement Management
The assignments from lecture slides are following
1) Requirement traceability matrix.
2) WBS
3) WBS Dictionary
4) Gantt Chart
5) Network Diagram
6) Milestone Chart
7) RACI CHART
8) Organizational Break Down structure
9) Issue Log
Please discuss in case of any ambiguity.
Subscribe to:
Posts (Atom)