Beware of spam mail

What steps can I take to minimize spam email? What is spam email? Why is spam email an issue? Spam email is generally annoying, and can slow down computer networks and the delivery of legitimate email, and increase your download Spam mailcosts.

Why is spam email an issue?

Have you ever observed that you are getting few mails based on your search criteria. Even Google does so. In my Gmail inbox i find suggested mail based on my search on Google. Sometime you will get message like "Congrats! you won the lottery and so and so…", play this video, its amazing or some power point slides (either from your friend or from strangers).

Do you check these stuffs through any anti-virus before opening it?

I guess more than 75% users will say no. What if on click on such things will crash your system or will leak your personal information. Have you even thought about it? if not then start thinking….. This is what we call spam and through Social engineering it is very easy to get information about you and about your system.

You might have read or heard about web security that is being provided by any banks. They use "https" protocol to make it safe and a lot of security features are there. You might have read these few  lines somewhere which is written below: We are committed to developing online and electronic products to help taxpayers meet their obligations and make the experience easier, cheaper and more personalized. We place significant effort and resources into ensuring the security and privacy of tax information and the integrity of our systems. However, it is equally important that you know about, and can minimize the risk of, certain information technology issues that could:

  • cause you significant inconvenience or costs
  • impact on your ability to deal with us electronically or online
  • result in the loss or damage of your electronic information, or
  • lead to your electronic records or tax details being misused.

If you manage your tax affairs using a computer system, or use the Internet or e-commerce systems to deal with the tax office, then you should be aware of spam email.

What is spam email?

Spam email is the electronic equivalent of junk mail. It is email that is not requested and usually not wanted. It is typically used to promote a particular product or service. The amount of spam being sent has increased significantly over the past few years. Some authorities claim that spam may account for up to 80% of all email in the world.

Spam email is generally annoying, and can slow down computer networks and the delivery of legitimate email, and increase your download costs.

Most significantly, spam email may be used to distribute computer viruses, spy ware or Trojans that could affect your computer or allow others to access your personal information. Related publications available are:

What steps can I take to minimize spam email?

  • Delete all spam mail. Do not ask to be removed from a mailing list or follow hyperlinks to unsubscribe from further email. This just indicates your email address is active and you'll most likely receive even more unsolicited email.
  • Never purchase anything from a company that sends you spam email. This only supports the activity.
  • If you need to provide details to a particular website, review their privacy policies. Make sure you know what they will do with your email address and personal details. Do not provide your email address to any organisation you do not trust.
  • Set up a spam filter if your email program has this functionality. This can reduce spam by marking, blocking or deleting spam email.
  • Spam from Australian companies or individuals can be reported to the Australian Communications Authority (ACA) which administers the Spam Act 2003.

Spam emails produce as much greenhouse gas emissions each year as 3.1million cars, according to new research. A study for computer protection company McAfee showed that globally, spam uses 33 billion kilowatt hours (KWh) a year – enough energy to power 2.4million homes.

The research also found that the UK was the joint fourth biggest emitter of CO2 from spam in the world, creating 50,000 tonnes of carbon dioxide a year.
Greenhouse gases: Spam uses 33 billion kilowatt hours a year – enough energy to power 2.4million homes, claims the research. The Carbon Footprint of Spam study by researchers ICF said that nearly four-fifths of the energy use associated with the emails was in end-users deleting spam and searching for legitimate emails.

The report also claimed that spam filtering currently saved enough energy to reduce emissions equivalent to taking 13 million cars off the road.

More…

Jeff Green, senior vice president of product development and McAfee Avert Labs, said: 'As the world faces the growing problem of climate change, this study highlights that spam has an immense financial, personal and environmental impact on businesses and individuals.

'Stopping spam at its source, as well as investing in state-of-the-art spam filtering technology, will save time and money and will pay dividends to the planet by reducing carbon emissions as well.'

Note: I liked this article and read it somewhere a month ago, so thought to share with you people.

 

Uncategorized

WSS Object Model

Server and Site Architecture: Object Model Overview
Windows SharePoint Services offers a highly structured server-side object model that makes it easy to access objects that represent the various aspects of a SharePoint Web site. From higher-level objects, you can drill down through the object hierarchy to obtain the object that contains the members you need to use in your code.

Uncategorized

ZEKE U7SVC Concepts

There are lot of scheduling tools like CA-7 , CA-11, Control M and ZEKE where the jobs are scheduled to run at particular time in Mainframe. ZEKE scheduling tool doesn’t have development version and it is used to schedule the job in production environment.If you code the command STEPNAME EXEC U7SVC in the JCL and want to test the JCL in development environment ,it will trigger the job in production environment provided that the the job which you are testing in develpoment already have a copy in production.

Uncategorized

VSAM Concepts

VSAMVSAM stands for Virtual Storage Access Method. As the name implies, it is a method by which different type of datasets can be accessed quickly and efficiently. It is used to organize, store, catalog, retrieve and delete datasets. The access method will work only in these two conditions: • DATA • Method of getting the data To understand VSAM, the following things everyone should know: • We need to see how data is organized in VSAM dataset • We need to understand how to use the utility that are available in AMS. • We need to know how to use the power of VSAM in COBOL.Advantages of VSAM: • Data can be accessed faster because of the way VSAM dataset is organized. • Records are physically deleted from disk (instead of being logically removed). • Records can be inserted in more efficient manner.

Disadvantages of VSAM: • VSAM data sets require more storage space than other type of datasets. This is because VSAM datasets carry control information in them, in addition to actual data that they are comprised of.

DATA ORGANISATION IN VSAM DATASETS: VSAM supports four types of file organizations: • Key Sequenced Data Sets (KSDS) • Entry Sequenced Data sets (ESDS) • Relative Record Data Sets (RRDS) • Linear Data Sets (LDS) The efficiency with which the data is accessed depends upon the data that is organized in these VSAM files.

Concepts: VSAM was, by several accounts, intended to replace all of the earlier data management systems in use by IBM’s operating systems. Conventional (non-VSAM) access methods generally provide only a single type of dataset organization. VSAM provides three: Key Sequenced Data Set (KSDS), where each record is identified for access by specifying its key value – a sequence of characters embedded in each data record which uniquely identify that record from all other records in the dataset. KSDS datasets are similar to Indexed Sequential Access Method (ISAM) datasets, with many of the same characteristics, but also having distinct advantages over ISAM. Entry Sequenced Data Set (ESDS), where each record is identified for access by specifying its physical location – the byte address of the first data byte of each record in relationship to the beginning of the dataset. ESDS datasets are similar to Basic Sequential Access Methid (BSAM) or Queued Sequential Access Method (QSAM) datasets. Relative Record Data Set (RRDS), where each record is identified for access by specifying its record number – the sequence number relative to the first record in the dataset. RRDS datasets are similar to Basic Direct Access Method (BDAM) datasets. VSAM datasets are frequently referred to as clusters. A KSDS cluster consists of two physical parts, an index component, and a data component. ESDS and RRDS clusters consist of only a single component, the data component.

KSDS Cluster Components Each record in the data component of a KSDS cluster contains a key field, which must be the same number of characters and occur in the same relative position in each record. The records are stored in the data component in logical sequence based upon their key field value. The index component of the KSDS cluster contains the list of key values for the records in the cluster with pointers to the corresponding records in the data component. The records in a KSDS may be accessed sequentially, in order by key value, or directly, by supplying the key value of the desired record. The records of a KSDS cluster may be fixed length or variable length. Records may be added or deleted at any point within a KSDS cluster, and the affected record is inserted or removed, and the surrounding records will be reorganized as required to maintain the correct logical sequence.

ESDS Cluster Components The records in an ESDS cluster are stored in the order in which they are entered into the dataset. Each record is referenced by its relative byte address (RBA). In an ESDS dataset of 100 byte records, the RBA of the first record is 0, the RBA of the second record is 100, the RBA of the third record is 200, etc. The records in an ESDS may be accessed sequentially, in order by RBA value, or directly, by supplying the RBA of the desired record. The records of an ESDS cluster may be fixed length or variable length. Records may not be deleted from an ESDS cluster, and they may only be added (appended) to the end of the dataset, following records previously written.

RRDS Cluster Components The records in an RRDS cluster are stored in fixed length slots. Each record is referenced by the number of its slot, which is a number varying from 1 to the maximum number of records which may be contained in the dataset. The records in an RRDS cluster may be accessed sequentially, in relative record number order, or directly, by supplying the relative record number of the desired record. The records of an RRDS cluster must be of fixed length. Records may be added to an RRDS cluster by writing a new record’s data into an empty slot, and records may be deleted from an RRDS cluster, thereby leaving an empty slot where the record that was deleted was previously stored.

Control Intervals In non-VSAM data management methods, the unit of data that is moved between memory and the storage device is defined by the block. In VSAM, the unit of data that is transferred in each physical I/O operation is defined as a control interval. A control interval contains records, control information, and (in the case of KSDS clusters) possibly free space which may later be used to contain inserted records. When a VSAM dataset is loaded, control intervals are created and records are written into them. With KSDS clusters, the entire control interval is usually not filled. Some percentage of free space is left available for expansion. With ESDS clusters, each control interval is completely filled before records are written into the next control interval in sequence. With RRDS clusters, control intervals are filled with fixed-length slots, each containing either an active record or a dummy record. Slots containing dummy records are available for use when new records are added to the dataset.

Control Areas Control intervals are grouped together into control areas. The rules used for filling and writing control areas are similar to those which apply for control intervals. For ESDS and RRDS clusters, control areas are filled with control intervals that contain records. For KSDS clusters, some of the control intervals in each control area may consist entirely of free space that can be used for dataset expansion.

VSAM Catalogs When a non-VSAM dataset is created, the user has the option, by means of the DISP=(,CATLG) JCL entry, of creating a catalog entry for the dataset. The catalog keeps track of the unit and volume on which the dataset resides and can be used for later retrieval of the dataset. With VSAM datasets, creation of a catalog entry to record the unit and volume, as well as many other characteristics of the dataset, is not optional. Prior to VSAM, catalog entries for non-VSAM datasets were contained in OS CVOLS (operating system control volumes). VSAM maintains its own catalog, which is itself a KSDS cluster, into which catalog entries describing VSAM clusters are recorded. The same VSAM catalog may also be used to contain the catalog entries for non-VSAM datasets.

VSAM ERROR PROCESSING: Because the way VSAM handles error condions, many I/O errors that cause the COBOL program to abend whne you use non VSAM access methods don't cause an abend when you use VSAM.  

File Status Code OPEN CLOSE READ WRITE REWRITE DELETE SATART Recommended action
0 File successfully opened File successfully closed File successfully read File successfully written File successfully rewritten File successfully deleted Successful Completion Continue processing
2     Vaild duplicate alternate key Vaild duplicate alternate key Vaild duplicate alternate key     Continue processing
10     End of file reached         Normal AT END processing
21       Record out of sequence (sequential access only)       Print error message and continue
22       Duplicate key       Print error message and continue
23     Record no found     Record no found Specified key not found Print error message and continue
24       No more Space allocated to file       Terminate the job
30 Uncorrectable I/O error Uncorrectable I/O error Uncorrectable I/O error Uncorrectable I/O error Uncorrectable I/O error Uncorrectable I/O error Uncorrectable I/O error Terminate the job
90 Unusable file;possibly an empty opened as INPUT as I-O VSAM logic error VSAM logic error VSAM logic error VSAM logic error VSAM logic error VSAM logic error Terminate the job
91 Password Failure             Terminate the job
92 File already opened File not open File not open or end of file already reached File not open ; incorrect key for EXTEND file File no open;no previous READ File no open;no previous READ(sequential access) Invalid request;probably file not open Terminate the job
93 Not enough storage for VSAM task, or file contention problem Not enough storage for VSAM task, or file contention problem Not enough storage for VSAM task, or file contention problem Not enough storage for VSAM task, or file contention problem Not enough storage for VSAM task, or file contention problem Not enough storage for VSAM task, or file contention problem Not enough storage for VSAM task, or file contention problem Terminate the job
95 Conflicting the attributes             Terminate the job
96 No DD or DLBL statement             Terminate the job
97 File not closed by previous job             Terminate the job

     

Links that may save your time on internet

Hi friends, whenever and whatever be the case, we usually do a lot of search for specific topic like downloading songs, movies, books etc., online tutorials related to programming, or any other area like Maths, Bio and so on . Now I tried to put few important links here so that you can save you time whilst searching such stuffs. I hope it would be very helpful to you internet guys.

  1. Songs/Movies (Audio/Video)

Minimal application that user should install after Windows Installation

Well this article is very useful for those users who don’t use computer and internet frequently or those who are not a frequent users or computWindows userer expert.

Although its very basic thing to know that what a computer users should install in their system(windows users), whatever they wish they can install but what matters is what are the  essential software amongst them.

I am listing few of them rest they can install according to their needs. After installing  one of the various versions of WINDOWS  (like XP/VISTA/ME etc) one should install