jump to navigation

Image Processing September 30, 2006

Posted by tunisiait in Articles, English, Français, IT articles.
1 comment so far

Image processing is not the artistic handling of images neither to using some sophisticated softwares like Paint Shop Pro or Adobe photoshop. It is a discipline which tends to make the image intelligent in order to interpret it and to analyze it for concrete and real applications. In a factory, we can control if a bottle is deformed by a system (camera and processing unit) which takes an image for each bottle and calculates deformation rate.

Image processing uses several skills such as mathematics (partial derivative equations, group theory, statistics…) and computer science (programming: C/C++ and matlab) and physics (optical flow). Among Image processing elementary operations, one can cite segmentation and pattern recognition and image registration …

The image processing operates in several fields like:

  • Remote sensing: satellite and radar image processing
  • Medical imagery: contribute to the diagnosis, 3D human organs reconstruction, computation of organs volumes and aeras …
  • Safety: objects tracking and biometrics and faces recognition
  • Controlling industrial processes
  • Archaeology
  • Sonar Imagery: Detection of marine mines

Several concepts which appear vague in this post will be explained later.


 

 

 

 

—————————————————

Version française (more…)

Understanding Computer Viruses 4 newbies September 30, 2006

Posted by tunisiait in English, IT articles.
add a comment

The last decade has been one of tremendous upheaval in the world of computers. As processing powers and networks have increased and so have the viruses.

They have become far more complex and difficult to detect. Everyday the world is confronted with new damaging viruses. With the opening up of information technology viruses are now finding it easier to spread themselves.

Today viruses spread through floppies, mobile disks, Cd , especially from Internet downloading and E-mails. So, in this short article we will speak about some aspects of this threat and other similar one’s as Trojan Horses in the windows operating system.

Viruses overview

Let’s look at this short definition of a computer virus, to have clear idea about it:

It’s a computer program hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs and that performs a malicious action (as destroying data, sending personal data,…)

So, viruses hadn’t complicated working mechanism, so what makes them spread easily? The response is that the main security problem come from operating systems holes, as for example the MS-Windows one’s, and desperately Linux OS based or Mac OS too .

Virus History

The Viruses History has very “tremendous” events, with viruses who make big companies loose many money or those make users hilarious, so it’s better to speak in this short article about the first known virus, and that was in 1981 where the first virus in the wild has appeared.

As described in Robert Slade’s history, the first virus predated the experimental work that defined current-day viruses. It was spread on Apple II floppy disks (which contained the operating system) and reputed to have spread from Texas A&M. The virus was named Elk Cloner and displayed a little funny rhyme on the screen:

It will get on all your disks

It will infiltrate your chips

Yes it’s Cloner!

It will stick to you like glue

It will modify ram too

Send in the Cloner !

Nowadays ,there are tenths viruses who appears every day in the world, and the total number of harmful one’s is estimated to be at least 90,000 !!

Let’s go into computer viruses details

As we said before a virus is a computer program which has the ability to make copies of itself, also it can be transferred from PC to PC via :

– Mobile Disk & Flash memory

– Floppy Disk

– Communications lines

– Networks (local networks, internet,…)

=> Any storage or communication medium, who allows reading/writing/transferring data

With the aid of these communications channels or carriers, viruses can spread between computers from:

– Desk to desk

– Office to office

– Company to company

– Country to country

– Continent to continent

– Earth to March (in next years ;-) )

-….

So you can find a virus in your Office applications ,games, multimedia players,…and generally activated when you execute a virus-corrupted application.

Now, let’s look at the viruses origin

Viruses fall into two general categories: “boot sector” and “file-infecting” viruses:

Boot viruses dwell in the boot sector of the hard or floppy disk that carries them. These execute as your computer starts or whenever your computer reads information from an infected storage disk. Once they copy themselves into your computer’s memory, they can then spread to other disks or other computers over a network, each time leaving copies of themselves that can repeat the cycle.

File-infecting viruses become active only when you execute the program that carries them or, in the case of macro and script viruses, when a program opens a data file that carries them. Typically, such viruses infect files with extensions such as .EXE, .COM, or .DLL, and non-executable files such as Microsoft Word .DOC files or Excel .XLS data and template files. A huge increase in the variety and scope of new viruses over the last few years, however, has expanded this list to cover nearly any type of file even some plain text files in certain circumstances. Once it executes, the file virus also loads itself into your computer’s memory, replicates, then attaches itself to other executable programs.

In recent years, the line between these two divisions has blurred considerably. Many viruses combine both file-infecting and boot sector-infecting features. These often use a variety of tricks and techniques to conceal themselves from anti-virus software. Newer virus types rely partly on unorthodox methods, including user psychology, to help them spread quickly and widely, while some have elements that classify them not as viruses, but under a more general heading of “malicious software” or “hostile code.”

Examples of the latter include software that anti-virus researchers classify as “worms” or Trojan horse programs. These agents, because they do not technically reproduce, are not viruses. But they can often have equally harmful effects and spread just as fast, if not faster, than “ordinary” computer viruses.One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

Other agents have worm-like or Trojan-like characteristics, who are malicious programs and scripts as Java Scripts & Applets or ActiveX controls, when you download software from suspicious sites in the internet.

Where do they come from ?

People create viruses for a number of reasons:

-From idle curiosity

-To deliberate criminal intent.

-Nationalism & economical reasons (for example in 2001 a French guy make a virus who affected only the Windows2000 English Version)

-Stupidiy

-To show superiority

-…

The challenge from modern techniques used by viruses

The challenge for virus creators is finding subtle ways to disguise or hide their programs so that they can spread undetected. Therefore, virus authors have always been trying to fool the existing virus scanners. The techniques used by them include:

-Polymorphic nature: Most of the scanners detect viruses by a unique signature for each virus. To evade such style, new generation viruses keep on changing their code. This poly (many) morphic (forms) nature makes the virus identification a difficult task.

-Stealth methodology: For a normal computer user, one method to detect a virus is to look at file sizes. Since the file size increases after a virus attack, the user can suspect a virus in the file and take corrective measures. Recent viruses are smart enough to hide such information and furnish the ideal information when they are active in the memory.

-Anti-debug code: To make the study difficult for the anti-virus persons, many viruses employ anti-debug techniques. By using few techniques, the viruses change themselves the moment somebody tries to study them using debugging tools.

By using combinations of the above techniques, a virus can remain undetected and spread effectively.

How can you recognize a virus activity and avoid them ?

There are some very obvious ways. In many cases your computer starts behaving differently. This primarily happens because the virus often fiddles with the basic computer formats, directories etc.

It can:

-Format the hard disk

-Encrypt the hard disk data

-Corrupt file allocation table

-Change screen display

-Hang the system

-Lock keyboard & floppy drives and much more.

-Displaying annoying messages.

-Sending your personal data via Email or internet without your agreement.

With some care and the right computer protection, you can keep viruses at bay, but there are important idea that you must keep in mind all Anti Virus Software together can’t catch all the virus who exists in the world since there are very much one’s who appears every day but can stop the majority of them, so there are some basis things to do to avoid having a virus in your computer:

-It’s imperative that computers are fitted with comprehensive anti-virus software that is also easily upgradeable and has the information of the newer types of viruses afloat.

-Update your Anti-virus software as usually as you can.

Perform a manual scan of your hard disk periodically.

Scan all floppy disks before first use.


Don’t open email messages and email attachments from people you don’t know. Verify that the “author” of the email has sent the attachments. Newer viruses can send email messages that appear to be from a person you know.


Don’t download programs from suspicious sites, because many programs hide a virus inside them.


Don’t go to suspicious sites because many virus are executed by displaying pages containing harmful java applet & scripts…so configure your browser not to execute such scripts when you access suspicious site.

What viruses don’t do

Viruses do not:

– Damage hardware, such as keyboards or monitors. Though you may experience strange behaviors such as screen distortion or characters not appearing when typed, a virus has merely affected the programs that control the display or keyboard.

– Damage your disks who are already physically damaged, but damage just what’s stored on them. Viruses can only infect files and corrupt data.

– Infect write-protected disks or text-based email messages.

– Eat your dog or cat emoticon


Conclusion


Users must keep in mind that not everything that goes wrong with a computer is caused by a computer virus or worm. Both hardware and software failure is still a leading cause of computer problems especially in the Intel/Windows platform. Never the flow of new computer viruses can be stopped ,it’s like ache it exists forever.


Written by SwiftY


–Critics & comments are welcome–



Mindography:
– General culture!



Netography:
– Internet Sites:


www.Astalavista.com


www.Webgurru.com


www.cknow.com
– Norton (www.Symantec.com) and McAffee (www.McAffee.com) Help section.

(This is an old article written by me at the end of 2001 and a little reviewed at the beginning of 2004,it’s information are still valid,but I must make something new and updated and more PROVersion 1.0 November 2001,Version 1.1 February 2004,Version 1.2 March 2006)

-LA VERSION Française saura disponible prochainement –

SwiftY

Understanding Computer Viruses 4 newbies September 30, 2006

Posted by tunisiait in Uncategorized.
1 comment so far

The last decade has been one of tremendous upheaval in the world of computers. As processing powers and networks have increased and so have the viruses.

They have become far more complex and difficult to detect. Everyday the world is confronted with new damaging viruses. With the opening up of information technology viruses are now finding it easier to spread themselves.

Today viruses spread through floppies, mobile disks, Cd , especially from Internet downloading and E-mails. So, in this short article we will speak about some aspects of this threat and other similar one’s as Trojan Horses in the windows operating system.

(more…)

The Mozilla Project September 30, 2006

Posted by tunisiait in Uncategorized.
add a comment

The Mozilla Project is an open source software project that was founded in order to create the next-generation Internet suite for Netscape. The Mozilla Organization was founded in 1998 to create the new suite. On July 15, 2003, the organization was formally registered as a not-for-profit organization, and became Mozilla Foundation. The foundation now creates and maintains the Mozilla Firefox browser and Mozilla Thunderbird email application, among other products.

Mozilla Firefox:

Mozilla Firefox is a Web browser. The 1.5.0.6 is the last released version and developers are preparing the Mozilla Firefox 2.0. Firefox includes an integrated pop-up blocker, tabbed browsing, live bookmarks, support for open standards, and an extension mechanism for adding functionality.

Firefox has attracted attention as an alternative to other browsers such as Microsoft Internet Explorer and Apple Safari, which are included as standard browsers with versions of Microsoft Windows and Mac OS X, respectively. As of July 2006, estimates suggest that Firefox’s usage share is around 12% of overall browser usage (see market adoption below), with its highest usage in Germany (about 39% as of July 2006)

Mozilla Thunderbird:

Mozilla Thunderbird is e-mail client presented by Mozilla as a concurrent of Microsoft Outlook express and Eudora Mail. Thunderbird is also a newsgroup and news feed client. Additional features, if needed, are often available via extensions.

Thunderbird can manage multiple e-mail and newsgroup accounts and supports multiple identities within accounts. Features like quick search, saved search folders (“virtual folders”), advanced message filtering, message grouping, and labels can help manage and find messages. On Linux-based systems, system mail (movemail) accounts are supported.

The suite contains other less famous software like:

  • Bugzilla is a bug tracking system, server software designed to help teams manage software development. Hundreds of organizations across the globe are using this powerful tool to get organized and communicate effectively.
  • Camino is a Web browser optimized for Mac OS X with a Cocoa user interface, and powerful Gecko layout engine. It’s the simple, secure, and fast browser for Mac OS X.
  • Calendar Project is a project for cross-platform calendar application.
  • Minimo is a small, simple, powerful, and innovative web browser for mobile devices.

My personal experience with Mozilla:

I’ve been using Mozilla Thunderbird and Firefox for the two years. They are very practical and easy to configure. Mozilla was the pioneer to present a Tab system in a web browser which prevent from opening many windows at  the same time. It’s also easy to organise your favourite websites in folders and read RSS feeds using the integrated RSS Reader and Notifier. In addition, we can customize Mozilla Thunderbird and Firefox by downloading several extensions and skins from the official site. My favourite one is the mouse gesture.

 

 

Sources: Wikipédia, Mozilla official site

Bidules

Le néfaste TTM (!!TEST article!!) June 12, 2006

Posted by tunisiait in Articles.
1 comment so far

Le sacro-saint time-to-market dit que:

il vaut mieux être le premier sur le marché en offrant des produits mal ficelés que d’être le second avec le meilleur produit du monde (qui connaît encore le nom du deuxième aviateur qui a traversé l’Atlantique?)

La conséquence est que les logiciels sont bâclés, les programmeurs oublient les critères de qualité les plus élémentaires et ils ne vérifient ni la longueur, ni le contenu de l’information que le logiciel reçoit de l’extérieur. Les versions bêta n’aident pas, puisqu’elles permettent de découvrir des erreurs fonctionnelles, pas des défauts de sécurité ou de qualité du logiciel.

HI :-) ! May 8, 2006

Posted by tunisiait in Uncategorized.
add a comment

a preview about this simple blog maintained by an IT guy,a swifty man from earth :

Unix,Linux,HP-UX,MS-Windows…

&

JAVA,Corba,J2EE,web related technologies (xml,xslt…),some network technologies
&

Tutorials

&

IT news and general articles

and WELCOME FOR ALL !