Tuesday, December 27, 2005

Atlast things came out properly

Inbuilt feelings of no value seem to get a proper well defined so called meaningful shape when the language makes sure that it has enough words to express the abstractness of illusions and fears and the format of the creation gives rise to an encapsulated version of posterior relevance.
Two of my tamil poems
மேகம்
வானவில்

Sunday, December 04, 2005

Between happiness and fear

When one's life which was so far simple and calm begins to transform into a place where occurences with distinct behavior but contrary properties starts oscillating ,the inner conscious becomes a device which generates constant waves of fear which may look like a reflection of unknown happenings or known uncertainity...whts precisely rules our very existence and casual happenings is the known uncertainity unless the intellect takes a firm or uncertain decision to drive the life through the proper path...

Tuesday, October 25, 2005

My Kavithai

கோடு டெடா சேரும் நேரம்
அதை கம்பைல் செய்யும் சமயம்
கன்ஸோல் எர்ரரால் நிரையும்
ஆனால் ஒஉட்புட் கரெக்டாய் அமையும்
இதுதான் என் க்லாஸ் ஸ்டுடென்டின் ரகசியம்

Thursday, June 30, 2005

Huh! I found out .....

Ideally the concept of spiritually directed internal balance and career oriented goal formation with concrete pathways highlighting the entire professional work involved in the enrichment of one's attitude and redeeming the potential of one's self always prove to be essential prerequisites for success....and i strongly believe in it...

Friday, June 10, 2005

Threat Modeling Systems


With the increasing popularity of web applications to perform network related data transactions and other tasks , the need for security based design of applications has also increased .The various threats that an application faces while communicating with the server , clients and other web applications need to be identified to make the design more secure and less prone to vulnerabilities .Thus identification and resolution of such threats in web application is as important as the basic logic involved in it . Threat modeling is actually an engineering technique of developing highly secure web applications functioning in threat prone areas . Threat modeling approach aims at identifying security objectives and prominent threats . This modeling technique is carried out as an iterative procedure involving identification of serious threats , the point of occurrence of threats , how it disrupts the flow of logic, the way the logic is deviated from the path of achievement of security objectives , the state where the application tends to become inconsistent , etc,.
To identify the exact location where the threat is more prominent , decomposition of the application is necessary . This can also aid in the debugging required for modeling . This procedure should be applied in an iterative manner to successively generate better models and to identify the best model that resolves the threat completely.
Threat modeling is needed to reduce risks and to identify where the threats occur, kind of threats , their effects , and to know exactly the stability of web applications . Incremental threat modeling technique is required to develop secure applications with riskfree design such a design would require less maintenance .
The application should use cases and roles to identify serious threats and vulnerabilities because different application types, application usage, and roles can yield different threats and vulnerabilities. Relevancy is provided by Context-precision. Context precision means being specific about the context, application type, and application scenario to increase information relevancy. To ensure that the whole task of threat modeling gets completed in a finite amount of time there is a necessity to provide criteria for entry and exit to watch when the application is completely perfect(good).In addition this approach can be used as a communication and collaboration tool in different phases of application development ( design , coding , deployment , testing , marketing ) and more importantly in documentation to provide more information to the clients about the various threats in the personalized domain of the application. Categorized threat modeling is also a useful strategy to promote reuse of information and effective communication . Pattern based search techniques can be used to identify similar threats and categorize the solutions . This has indirectly led to the classification of threats which can be used in modeling the application more effectively .
Threat modeling can be either manually applied during or after application development . Alternatively an automata ( modeling application) can be designed to model these web applications to achieve precise security objectives . This kind of modeling application can identify the occurrence of threats , their kind and suggest measures (best ) to model the application or it can handle the application as a whole and resolve the threats .Hope the future sees web with threat free applications .

Sunday, May 08, 2005

Microsoft shifting its internal servers to 64 bit

We might all be aware of the prominent 2038 problem which is going to rock our entire network systems due to time_t funtionality in timing calculations.The core of this problem is due to the usage of 32 bit represenations.Now that Microsoft has announced this good news .
Danny Beck, Microsoft Windows client senior product marketing manager, confirmed on Friday that servers running the company's Web site and MSN Search and Messenger applications had been migrated to the 64-bit version of Windows Server 2003.
while Microsoft is keen to tout the server version's stability, the desktop version might have some issues, hardware makers have said.
Microsoft's next generation LongHorn operating System is expected to use this in wide.
Courtesy zdnetindia

Saturday, May 07, 2005

hiiiii
Welcome to a cool link
It will be interesting to know that life,mathematics,its neural implementations,physical movement,natural reaction,intelligence in connection with the so called mind and the eventual spirituality are closely interrelated .
There exists a profound integrity between the various disciplines which we consider as separate entities existing in this world to trouble us.
What and what will be integrates spirituality and science by making the simplest possible assumptions about the relationship between conscious experience and physical structure. These assumptions have their roots in mathematical and scientific understanding and have implications for those disciplines.
The assumptions come from pushing science and mathematics to their limits creating an opening for connecting the structure of science with the essence of spirituality.