Monday, March 28, 2016

Virus: Worms

Worm, the creature that all of us are familiar of.  An animal that live inside soil they dig holes into soil and live in it most of the times they construct tunnels that can enter at one position an exit in another

what is the similarity of  this with Virus Worms, well it does the same, The virus worm as you know it dig a tunnel from your machine/Server to out side. so any one can come in to your machine/Server. Most of the times it is able to penetrate firewalls since connection is initiated inside your server and firewalls are allowing that, so some one can use the tunnel that the worm has made and do some damage to your system. or spy on your servers or your activities.

Thursday, March 17, 2016

Trojan Horse Viirus and web development

Trojan, according to Greek methodology City of troy is attacked by Trojans because of a dispute over a women they fort for about 20 years but the walls of troy is impenetrable after 20 years Trojans device a plan they made a large wooden horse and put some of their finest worriers inside and send a message to troy, that they have given up the war, and as a gift of troys victory. they offer this horse and all went and hid them self. the people of troy came and see that no one is there and find the note and was very happy. they pull the horse inside the gates and begin to celebrate all men took wine and other alcohol and was drunk in the mid night

when they got drunk the worriers in side the horse come out and open the gate letting rest of them to come in and to finish the drunken worriers

so how this apply to the Trojan Horse Virus well it attack in slimier fashion, it will arrive to you as a gift and you will accept it since it is a gift and when opening it will attack your system. for an example you will receive a computer game or utility program which is very useful but underneath that there will be a virus that attack your computer setting or give control of your system to another user, so while you play the game or use the utility, it will damage your system or give control to another

so how this apply to web see most of the websites today are build by popular web developing softwere like joomla or wordpress with these you get the ability to attach plugins so you can give functionality to program or make it looks better, better yet most of them are free. so some one can write a plugging and embedded a Trojan inside. plugin is nice has lot of functionality so you are bound to use it, and when you dose it will give the developer of plugin, access to the server and make a security hole so he will be able to manipulate your system through access given by plugin he will be able to upload files like php scripts or run commands linux or windows on your server(if your operating system is one of them) even delete using del command DOS or rm in linux and you will never know what happen.

Friday, March 11, 2016

Enlightenment & Middle Path

Enlightenment & Middle Path All over the world the people think that good & evil are two separate things and been so good will drive the evil away, but as I began to realize things, I began to search myself what is good what is evil and what separates them. Long I search I realize that they are not two but two ends of an same entity, jest as string has two ends, they exist hand to hand with each other, make one end bigger and other will follow, and make one end shorter so as the other, so how do you get rid of the evil if the good and evil exist with side by side, I was searching for an answer for many years of my times. If they both are two ends of one string how are we going to lose one end each time I try to find out I could not get an answer, and suddenly it strikes me you can’t lose one end of a string without losing the other, that is to lose one end, you have to lose the whole string itself, in order to lose evil you have not only lose evil but good itself, such a person will be no good neither evil, and he will do no good no evil, he will act on no good nor evil, no good and no evil act on him. This realize me of one thing one thing that we all was thought from our child hood the teaching of lord Buddha himself the enlightenment & the Middle Path, which many try to find. Is this what he talk about what middle path is, it is not a path between middle of good and evil but a path with no good and no evil, And men who achieve it will see things as it is. He will see the continuation of life flow of nature and many things, more you hang on to one end the other will hang on to you. So giving up both of them will make you free of everything. Free to feel the world from all earthly things, things that the mere mortal will never understands, I wish I would know.

Wednesday, January 6, 2016

Inventory Control System

Tuesday, January 5, 2016

āļ¸āļąāˇƒ ⎄ා āļ‘⎄ි āļš්‍āļģිāļēාāļšාāļģීāļ­්⎀āļē

āļšāˇ€ුāļģුāļą් ⎄ෝ āļ‡āˇƒු⎀ ⎄ොāļ­් āļ¸ේāļŊෝāļšāļēේ āļˇāļēාāļąāļšāļ¸ āļ†āļēුāļ°āļē āļšුāļ¸āļš්āļ¯ āļēāļą්āļą āļļො⎄ෝ āļ¯ෙāļąාāļœේ āļ´ිāļŊිāļ­ුāļģ⎀āļą්āļąේ āļą්‍āļē⎂්āļ§්āļš āļļෝāļ¸්āļļ, āļĸෛ⎀ āļģ⎃ාāļēāļąිāļš āļ†āļēුāļ°, ⎃āļ¸āˇ„āļģ āļ´āļģ්āļēේ⎁āļĢ āˇ€āļŊිāļą් āļąිāļ´āļ¯āˇ€ා āļ‡āļ­ැāļēි āļšිāļēāļą āļĸාāļą āˇ€ිāļšෘāļ­්āļ­ි āļšāļģāļĢ āļŊāļ¯ āļļැāļš්āļ§ීāļģිāļēා ⎀ෛāļģ⎃් āļŊෙ⎃ āļ´ිāļŊිāļ­ුāļģු āļŊැāļļෙāļąු āļ‡āļ­.

āļąāļ¸ුāļ­් āļ¸ාāļœේ āļ¸āļ­āļēāļąāļ¸් āļ¸ේ āļŊෝāļšāļēේ āļ´āˇ€āļ­ිāļą āļˇāļēාāļąāļšāļ¸ āļ†āļēුāļ°āļē ⎀āļą්āļąේ āļ¸ිāļąි⎃් āļ¸āļąāˇƒāļēි. āļ¸āļš් āļąි⎃ාāļ¯āļēāļ­් āļ‘āļ¸ āļ¸ිāļąි⎃් āļ¸āļąāˇƒ āļ…āļ¯ āļąොāļ´ැ⎀āļ­ිāļēාāļąāļ¸ි āļ‰āˇ„āļ­ āļšී āļšි⎃ිāļ¯ු āļˇāļēාāļąāļš āļ†āļēුāļ° āļ…āļ´āļ§ āļ¯āļš්āļąāļ§ āļąොāļŊැāļļෙāļą āļļැ⎀ිāļąි.
āļ…āļ´ි āļ¸āļąāˇƒේ āļš්‍āļģිāļēාāļšාāļģීāļ­්⎀āļē ⎃ොāļēාāļļāļŊāļ¸ු. āļļāļ§āˇ„ිāļģ ⎀ිāļ¯්‍āļēා⎀āļ§ āļ…āļąු⎀ āļ‘āļē āļ´්‍āļģ‍āļ°ාāļą āˇ€āˇāļēෙāļą් āļšොāļ§āˇƒ් āļ¯ෙāļšāļšි āļ‘āļąāļ¸් conscious mind,subconscious mind (āļ´ිāļē⎀ි ⎃ි⎄ිāļē āļ‡āļ­ි āļšොāļ§āˇƒ ⎄ා āļ´ිāļē⎀ි ⎃ි⎄ිāļēāļ§ āļēāļ§ිāļą් āļ‡āļ­ි āļšොāļ§āˇƒ) āļŊෙ⎃āļēි āļļුāļ¯්āļ° āļ°āļģ්āļ¸āļē āļ…āļąු⎀ āļ¸āļąāˇƒ āļ ෛāļ­ි⎃ිāļšāļēāļą් āļœෙāļą් āļœොāļŠāļąැāļœුāļąු āļ¯ෙāļēāļš් āļŊෙ⎃ ⎀ිāļœ්‍āļģ‍⎄ āļšāļģāļĢ āļ…āļ­āļģ āļ‘⎄ි ⎀ි⎀ිāļ° āļ ිāļ­්āļ­ āļ´āļģāļ¸ිāļ´āļģා āļ‡āļ­ි⎀ීāļ¸ āļąැāļ­ි ⎀ීāļ¸ āļœැāļą āļ¯ේ⎁āļĢාāļšāļģāļēි. āļ‘āļŊෙ⎃āļ¸ āˇ€ි⎀ිāļ¯ āˇƒිāļ­් āļ´āˇ€āļ­ිāļą āļļ⎀ āļ¯ේ⎁āļąාāļšāļģāļą āļ…āļ­āļģ āļ¸ිāļąි⎃ුāļą්āļœේ ⎃ිāļ­ු⎀ිāļŊි āļ…āļąු⎀ āļ’⎀ා ⎀ෙāļąāˇƒ් ⎀āļą āļļ⎀ āļšāļ­ාāļšāļģāļēි.

āļļෞāļ¯්āļ° āļ¸āļ­āļēෙāļą් āļ§ිāļšāļš් āļļැ⎄ැāļģ⎀ āļ¸āļ¸ āļ‘āļē āļļāļ§āˇ„ිāļģ āļ¸āļąො⎀ිāļ¯්‍āļēා⎀āļ§ āļ…āļąු⎀ ⎀ිāļœ්‍āļģ‍⎄āļēāļš් āļ¸ෙ⎄ිāļ¯ී āļšිāļģීāļ¸āļ§ āļļāļŊාāļ´ොāļģāļ­්āļ­ු ⎀ෙāļ¸ි. āļ¸āļš්āļąි⎃ාāļ¯āļēāļ­් āļļො⎄ෝ āļ…āļē āļ‘āļē ⎀āļģāļ¯āˇ€ා āļ­ේāļģුāļ¸් āļœෙāļą āļ‡āļ­ි āļļ⎀āļēි āļ¸ාāļœේ āļ¸āļ­āļēāļēි.
āļļāļ§āˇ„ිāļģ ⎀ිāļ¯්‍āļēා⎀āļ§ āļ…āļąු⎀ āļ¸āļąāˇƒේ āļ´ිāļē⎀ි⎃ි⎄ිāļē āļ‡āļ­ි āļšොāļ§āˇƒ āļ…āļ´āļœේ āļ‘āļ¯ිāļąෙāļ¯ා āļĸී⎀ිāļ­āļēේ āļš්‍āļģිāļēා⎀āļą් āļ´ාāļŊāļąāļē āļšāļģāļąāˇ€ා āļ…āļ´ි ⎄ිāļ­āļą āļ´āļ­āļą āļ¯ෑ āļ¯āˇ€āˇƒේ āļšāļģāļĢ āļš්‍āļģිāļēා⎀āļą් āļ´ාāļŊāļąāļē ⎀āļą්āļąේ āļ¸ෙāļēිāļą්.

āļąāļ¸ුāļ­් āļ´ිāļē⎀ි ⎃ි⎄ිāļēāļ§ āļąොāļ¸ැāļ­ි⎀ āļ‡āļ­ි āļšොāļ§āˇƒ āļ’āļē āļœැāļą āļ…āļ¯්‍āļēāļąāļē āļšිāļģීāļ¸ āˇ„ා ⎀ිāļœ්‍āļģ‍⎄āļē āļ¸āļ¯āļš් āļ…āļ´āˇ„āˇƒුāļēි āļļāļ§āˇ„ිāļģ ⎀ිāļ¯්‍āļēා⎀āļ§ āļ…āļąු⎀ āļ¸ෙāļ¸ āļšොāļ§āˇƒේ āļ¸ිāļąි⎃ුāļą් ⎃ාං⎃ාāļģිāļšāˇ€ āļšāļŊ ⎄ොāļ¯ āļąāļģāļš āļ¸ෙāļą්āļ¸ āļ‹āļ´āļēාāļœāļ­් āļ¯ේ āļ¯ āļ­ැāļ¸්āļ´āļ­් ⎀ී āļ­ිāļļෙāļąāˇ€ා āļēāļ¸් āļšෙāļąෙāļšුāļ§ āļ¸ෙāļ¸ āļšොāļ§āˇƒāļ§ āļ‡āļ­ුāļŊ්⎀ීāļ¸āļ§ āˇ„ැāļšිāļąāļ¸ි āļ”⎄ුāļœේ āļ†āļ­්āļ¸ āˇ€āļŊ āļ‹āļ´āļēාāļœāļ­් āļ¯ේ āļ…āļąු⎀ āļ”⎄ුāļ§ āļļො⎄ෝ āļ¯ේ āļąැ⎀āļ­ āļŊāļļාāļœāļ­ āˇ„ැāļšිāļēි.

āļ‹āļ¯ා⎄āļģāļĢāļēāļš් āļŊෙ⎃ āļ¸āļ¸ āļ‘āļŠ්āļœා āļšේ⎃ි āļœෙāļą āļ¯ෙāļą්āļąāļ¸ි. āļ”⎄ු āļ…⎀ු 5000 āļšāļ§ āļ´ෙāļģ ⎀ි⎃ූ āļ‰āļ­ා āļļāļŊāļœāļ­ු āļ´ූāļĸāļšāļēෙāļš් ⎀ෙāļąāˇ€ා āļ”⎄ු āļēāļ¸් āļšෙāļąෙāļš් āļ”⎄ු ⎀ෙāļ­ āļ´ැāļ¸ිāļĢි⎀ිāļ§ āˇƒ්⎀ං āļ¸ො⎄āļąāļē āļ¸āļœිāļą් āļ­āļ¸āļą් āļœේ āļ¸āļąāˇƒ āļ…āļģ āļ…⎀ු 5000 āļ§ āļšāļŊිāļą් āļ­ිāļļූ āļ­āļ­්⎀āļēāļ§ āļģුāļœෙāļą āļēāļąāˇ€ා. āļ´āˇƒු⎀ āļ‘āļ¸ āļ¸āļąāˇƒිāļą් āļ”⎄ු āļ¯ෙ⎃ āļļāļŊා āļ”āļļ āļ‰āˇ„āļ­ āļ†āļ­්āļ¸āļēāļšāļ¯ී āļ¸ෙ⎀ැāļąි āļš්‍āļģිāļēා ⎃ිāļ¯ු āļšිāļģීāļ¸ āˇ„ේāļ­ු⎀ෙāļą් āļ”āļļāļœේ āļ…āļ¯ āļ­āļ­්⎀āļē āļ‹āļ¯ා⎀ී āļ…āļ­ිāļļ⎀āļ­් āļ‘⎀ා āļēෙāļą් āļ¸ිāļ¯ීāļ¸āļ§ āļĸී⎀ිāļ­āļē āļšෙ⎃ේ ⎀ෙāļąāˇƒ් āļšāļģāļœāļ­āļēුāļ­ුāļ¯ āļēāļą්āļą āļ´ිāļŊිāļļāļ¯āˇ€ āļ´ැ⎄ැāļ¯ිāļŊිāļšāļģ āļ¯ෙāļąāļŊāļ¯ි.

āļ‡āļ­්āļ­āļ§āļ¸ āļšිāļēāļąāˇ€ාāļąāļ¸් āļļāļ§āˇ„ිāļģ āļ¸āļąෝ⎀ිāļ¯්‍āļēා⎀āļ§ āļ…āļąු⎀ ⎃ිāļ­් āļšිāļē⎀ීāļ¸ "āļ…āļ­ි āļ‰āļą්āļ¯්‍āļģීāļē āļĨාāļĢāļē" (ESP- Extra Sensory Perception) ⎀ැāļąි āļ¯ේ āļ¸ිāļąි⎃ුāļą්āļ§ āļšිāļģීāļ¸āļ§ āˇ„ැāļšිāļēා⎀ āļŊැāļļෙāļą්āļąේ āļ”⎀ුāļą්āļœෙ āļ¸ෙāļ¸ āļēāļ§ි āˇƒිāļ­ āļ‰āļ­ා ⎁āļš්āļ­ිāļ¸āļ­් ⎀ූ ⎀ිāļ§āļēි. āļļුāļ¯ු āļ¯āˇ„āļ¸āļ§ āļ…āļąු⎀ āļ¸āļ§ āļ‘āļē ⎀්āļœ්‍āļģ‍⎄ āļšිāļģීāļ¸ āļ…āļ´āˇ„āˇƒුāļēි āļ‘⎄ ⎄āļģිāļēāļ§ āļ…āļ´āļœේ āļ¸āļąāˇƒāļ§ āļēāļ§ිāļą් āļˇāˇ€ාංāļœ āļœāļ­āˇ€ී āļ‡āļ­ි ⎄ිāļ­āļš් āļŊෙ⎃ ⎄āļ¯ුāļą්⎀āļą්āļą āļ´ුāļŊු⎀āļą්
āļ‡āļ­්āļ­āļ§āļ¸ āļ¸āļąāˇƒ āļēāļąු āļ‰āļ­ා āļ…āļģුāļ¸ āļ´ුāļ¯ුāļ¸ āˇ€āˇƒ්āļ­ු⎀āļšි āļ‘āļē āļšොāļ´āļ¸āļą āļ‹āļœෙāļą āļœැāļąීāļ¸āļ§ āļ‹āļ­්āˇƒāˇ„ āļšāļģāļ­් āļ‘⎄ි āļąිāļ¸āļš් āļąොāļ¸ැāļ­ි āļļ⎀āļēි āļ´ෙāļąී āļēāļą්āļąේ.

āļ¸ෙāļ¸ āˇ€āˇƒ්āļ­ු⎀āļ§ āļšොāļ´āļ¸āļą āˇ„ැāļšිāļēා⎀āļš් āļļāļŊāļēāļš් āļ­ිāļļේāļ¯ āļēāļą්āļą āļ‘āļē āļąිāļ­āļģ āļˇා⎀ිāļ­ාāļšāļģāļą āļ”āļļ⎀āļ­් āļąො āļ¯āļą්āļąāˇ€ා ⎀ෙāļą්āļą āļ´ුāļŊු⎀āļą්. āļ‡āļ­්āļ­āļ§ āļ¸ āļļො⎄ෝ āļ´ොāļ­්⎀āļŊ āļ¯āļš්⎀āļą්āļąේ āļ¸āļąāˇƒ āļ”āļļේ ⎃āļģ්⎀ āļļāļŊāļ°ාāļģී āļ¯ෙ⎀ිāļēා āļļ⎀āļēි. āļ‡āļ­්āļ­āļ§āļ¸ āļšිāļēāļąāˇ€ා āļąāļ¸ි āļ‘āļē āļ‘āˇƒේāļ¸āļēි. āļ”āļļ āļēāļ¸āļš්āļ¯ැāļŠි⎀ ⎀ි⎃්⎀ා⎃ āļšāļŊ⎄ොāļ­් āļēāļ¸āļš් āļ”āļļāļ§ āļŊැāļļෙāļą āļļ⎀ ⎄ැāļœුāļą āˇ„ොāļ­් āļ‘āˇƒේ⎀āļąāļļ⎀ āļ”āļļāļ¯ āļ¯ැāļąී āļ­ිāļļෙāļąāˇ€ාāļ¯? āļ‡āļ­්āļ­āļ§āļ¸ āļ”⎀ු āļ”āļļේ āļ¸āļąāˇƒ āļ”āļļ āļ‰āļŊ්āļŊāļą āļ•āļąැāļ¸ āļ¯ෙāļēāļš් āļ”āļļāļ§ āļ¯ෙāļą්āļą āļŊැ⎃්āļ­ිāļēි. āļ”āļļ ⎀ිāļˇාāļœāļēāļš් ⎃āļ¸āļ­්⎀āļą āļļ⎀ āļ¯ැāļŠිāļŊෙ⎃ ⎀ි⎃්⎀ා⎃ āļšāļģāļą්āļą. āļ‘⎀ිāļ§ āļ”āļļේ āļ¸āļąāˇƒ āļ‘āļ¸ āˇ€ිāļˇාāļœāļē ⎃āļ¸āļ­්⎀ීāļ¸ āˇƒāļ¯āˇ„ා āļ”āļļ ⎃ුāļ¯ාāļąāļ¸් āļšāļģා⎀ි āļ”āļļāļ§ āˇ€ිāļąාāļŠිāļēāļš්⎀āļ­් āļąිāļšāļģුāļąේ āļšාāļŊāļē āļœāļ­ āļšිāļģීāļ¸āļ§ āļąො⎃ිāļ­ේ⎀ි ⎃ැāļ¸ āļ¸ො⎄ොāļ­āļšāļ¸ āļ´ාāļŠāļ¸් āļšිāļģීāļ¸āļ§ āˇ„ිāļ­ේ⎀ේ. āļ”āļļේ ⎃ිāļ­ āļ”āļļ⎀ āļš්‍āļģ‍āļ¸ āļš්‍āļģ‍āļ¸ āļēෙāļą් āļ’ āļ¯ෙ⎃āļ§ āļēොāļ¸ුāļšāļģා⎀ි.

āļ’āļšāļēි āļ¸ිāļąි⎃ුāļą් āļ´āˇ€āˇƒāļą්āļąේ ⎀ි⎃්⎀ා⎃āļēāļ§ āˇ€ි⎁ාāļŊ āļļāļŊāļēāļš් āļ‡āļ­ිāļļ⎀, āļļො⎄ෝ⎀ිāļ§ āļ”āļļ āļ…āˇƒාāļ‡āļ­ි āļ¸āļ¸ āļ’āļš āˇ€ි⎃්⎀ා⎃ āļšāļŊා āļ’āļš āļ’⎀ිāļ°ි⎄āļ§āļ¸ āļ‹āļąා āļēāļą්āļą. āļ‘āˇƒේ ⎀āļą්āļąේ āļ”āļļ⎀ āļēāļ¸් āļ¯ෙ⎀ිāļēෙāļš් ⎄ෝ āļēāļš්⎂āļēෙāļš් āļ¸ෙ⎄ෙāļē⎀āļą āļąි⎃ා āļąො⎀ේ āļ”āļļ āļ‘āļē āļ¯ැāļŠි⎀ ⎀ි⎁්⎀ා⎂āļšāļģāļąāˇ€ිāļ§ āļ”āļļāļœේ āļ¸āļąāˇƒ āļ’ āļ¯ෙāļē āļšිāļģීāļ¸āļ§ āļ”āļļ⎀ āļ´ෙāļŊāļļ⎀āļą āļąි⎃ා āļ‡āļ­්āļ­āļ§āļ¸ āļ”āļļ⎀ āļ¸ෙ⎄ෙāļē⎀āļą āļ¯ෙ⎀ිāļēා ⎄ෝ āļēāļš්⎂āļēා āļ”āļļāļœේ ⎃ිāļ­āļēි.

 āļ¸ා āļ…āˇƒා āļ­ිāļļෙāļąāˇ€ා āļšිāļ­ුāļąු āļ†āļœāļ¸āˇ„ි āļ´āˇ€āˇƒāļąāˇ€ා āļ”āļļāļ§ āļ¯ෙ⎀ිāļēāļą් āļšෙāļģෙ⎄ි āļ…āļļ āļ‡āļ§āļēāļš් āļ­āļģāļ¸්⎀āļ­් ⎀ි⎁්⎀ා⎃āļēāļš් āļ‡āļ­්āļąāļ¸් āļœāˇƒ āļ¸ෙāļ­āļąිāļą් āļœො⎃් āļ¸ු⎄ුāļ¯ āļ¸ැāļ¯ āļ´ැāļŊ⎀ෙ⎀āļēි āļ´ැāˇ€āˇƒු⎀ ⎄ොāļ­් āļ‘āļē āļ‘āˇƒේ⎀āļą āļļ⎀ āļ‡āļ­්āļ­āļ§āļ¸ āļ‘āļēිāļą් āļ´āˇ€āˇƒāļą්āļąේ ⎀ි⎃්⎀ා⎃āļēේ āļ‡āļ­ි āļļāļŊāļēāļēි. āļ­āˇ€āļ¯ āļ”āļļ āļļෝāļ°ිāļ´ූāļĸා ⎀ැāļąි ⎀āļ­ා⎀āļ­් āļšāļģ āļ­āļ¸āļą් āļœේ āļ¯ැāļą් āļ´āˇ€āļ­ිāļą āļ­āļ­්⎀āļēāļą් āļ¸ිāļ¯ිāļē ⎄ැāļšිāļēāļēි āļšāļŊ්āļ´āļąාāļšāļģ āļ‘āļē āļšāļģāļēි āļąāļ¸ි. āļ‘āļē āļ¯ැāļŠි⎀ ⎀ි⎃්⎀ා⎃ āļšāļģāļēි āļąāļ¸ි. āļ‘āļē āļ‘āˇƒේāļ¸ āˇ€ෙāļąāˇ€ා. āļ¸ොāļšāļ¯ āļ”āļļ āļēāļ¸් āļ¯ෙāļēāļš් ⎀ි⎁්⎀ා⎃ āļšāļģāļą āˇ€ිāļ§ āļ”āļļāļœේ āļ¸āļąāˇƒ āļ‘āļē āļ”āļļāļ§ āļ‰āļ§ුāļšāļģāļœැāļąීāļ¸āļ§ āļ‹āļ¯āˇ€ු ⎀ෙāļąāˇ€ා. āļ¸ෙāļē ⎃āļ¸āˇ„āļģ āļģොāļœීāļ­āļ­්⎀āļēāļą් ⎃ු⎀ āļšිāļģීāļ¸් ⎀āļŊāļ¯ී āļ¯ āļēොāļ¯ාāļœāļą්āļą āˇ€ා. āļģොāļœීāļēාāļ§ āļ¯ෙāļą āļļෙ⎄ෙāļ­් ⎀āļŊිāļą් āļœුāļąāļēāļš් āļ‡āļ­ි āļļ⎀ āļ’āļ­්āļ­ු āļœැāļą්⎀ීāļ¸ āļ¸āļœිāļą් ⎃āļ¸āˇ„āļģ āļģෝāļœ āļ‰āļļෙāļ¸ āˇƒු⎀ āļšිāļģීāļ¸āļ§ āˇ„ැāļšි āļļ⎀āļ§ āļ…āļ¯ āļ´āļģ්āļēේ⎂āļĢ āļ¸āļ§්āļ§āļ¸ිāļą් āļ´āˇ€āļ­ිāļąāˇ€ා. āļ”⎀ුāļą්āļ§ āˇ€ිāļ§āļ¸ිāļą් āļ´ෙāļ­ි⎀ැāļąි āļļෙ⎄ෙāļ­් āļąිāļģ්āļ¯ේ⎁āļšāļģ āļ‘āļē āļ­āļ¸ āļģෝāļœāļē āļąිāļ§්āļ§ා⎀āļ§ āļ¸ āˇƒු⎀⎀āļą āļļ⎀ āļģෝāļœීāļēාāļ§ āļ’āļ­්āļ­ු āļœැāļą්⎀ු⎀ිāļ§ āļ”⎀ුāļą් āļ‰āļļෙāļ¸ āˇƒු⎀⎀āļą āļļ⎀āļ§ āļ´āļģ්āļēේ⎁āļą āļ¸āļœිāļą් āļ…āļ¯ āļ”āļ´්āļ´ු⎀ී āļ´āˇ€āļ­ිāļąāˇ€ා. https://en.wikipedia.org/wiki/Placebo āļ¸ෙāļē āļ´්āļŊ⎃ීāļļෝ(Placebo) effect āļŊෙ⎃ ⎀ෛāļ¯්‍āļē ⎀ිāļ¯්‍āļēා⎀ේāļ¯ි ⎄āļ¯ුāļą්⎀āļąු āļŊāļļāļąāˇ€ා. (http://www.cancer.org/treatment/treatmentsandsideeffects/treatmenttypes/placebo-effect)

āļ’āļšāļēි āļ…āļ´ේ āļ´ැāļģැāļą්āļąෝ āļšි⎀ු⎀ේ ⎄ිāļ­ āļ‡āļ­්āļąāļ¸් āļ´āļ­ āļšුāļŠාāļ¯ āļšිāļēāļŊා. āļ‡āļ­්āļ­āļ§āļ¸ āļ‘āļē āļ…āļ´ූāļģු āˇ€āˇƒ්āļ­ු⎀āļš් āļ’⎀āļœේāļ¸ āļ”āļļāļœේ āļ¸ෙāļ¸ āļ¯ෙ⎀ිāļēා āļ”āļļ āļ‰āļŊ්āļŊāļą āļ¯ේ āļŊāļļා āļ¯ෙāļąāˇ€ා āļ‘āļļැ⎀ිāļą් āļ”āļļ āļ´āļģි⎃්⎃āļ¸් ⎀්āļē āļēුāļ­ුāļēි. āļ”āļļ āļ”āļļāļ§ āļąු⎃ුāļ¯ු⎃ු āļ¯ෙāļēāļš් āļ‰āļŊ්āļŊු⎀⎄ොāļ­් āļ”āļļāļœේ āļ¸ේ āļ¯ෙ⎀ිāļēා āļ”āļļāļ§ āļ‘āļē āļąි⎃āļšāˇ€āļ¸ āļŊāļļා āļ¯ෙāļą āļļැ⎀ිāļą් āļ‘āļļැ⎀ිāļą් āļ­āļ¸āļą් āļ¯ැāļŠි⎀ ⎀ි⎃්⎀ා⎃ āļšāļģāļĢ āļ¯ේāļœැāļą āļ´්‍āļģ⎀ේ⎃āļ¸්⎀āļą්āļą āļ¸ොāļšāļ¯ āļ‘āļē āļąāļ´ුāļģු āļ ේāļ­āļąා⎀āļšිāļą් āļšāļģāļą āļ‘āļšāļš්āļąāļ¸් āļ”āļļāļ§āļ¯ āļ”āļļ⎀āļ§ා āļ‰āļą්āļą āļ…āļē⎀āļŊුāļą්āļ§āļ¯ āļ¸āˇ„ා ⎀ිāļąා⎁āļēāļšāļ§ āļ¸āļœ āļ´ාāļ¯āļąුāļ‡āļ­.



Wednesday, December 2, 2015

IT Service My Definition

Tuesday, December 1, 2015

ISO – OSI (International Standard Organization - Open Systems Interconnection model) what is it?

ISO – OSI is a standard for communication between network devices that is impose by ISO (International Standard Organization) it consist of 7  layers


  • Application
  • Presentation
  • Session
  • Transport
  • Network
  • Data link
  • Physical
All the network devices have one or more of these layers to perform a network task to communicate data with one end to another it needs to implement this at the both ends.

Devices such as Computers has implemented all the seven layers while   switch has ether Network, Data Link , Physical or Data Link Physical layers depending of the type of the switch which you may come across as L2 Switch and L3 Switch stands for Layer 2 switch and Layer 3 Switch which is the number of layers from the bottom of the list. L3 switch is mostly know as manageable switch since you can use them to program the flow of the data in and out of it. And the routers the things that we use to route our packets through network works on Network layer meaning Network, Data Link and Physical are implement on them.

So Let’s look at the layers from top to bottom

Application
This refer to the actual application that you use to communicate with the network google chrome, Mozzila Fire Fox, Putty, File Zella are some example of applications that you may already use to communicate with the network.

Presentation
This is the data representation system conversion since different system have different way of representing things so it converts to a format that every one recognize and wise versa


Session
Session is a layer that contains session details like session Id. which is reference to one of the connection of the same application since there can be more than one for example google chrome can have many tabs opened and it says which tab the data needed to go

Transport
This layer controls the end to end delivery it use TCP (Transmission Control Protocol and UDP (User Datagram Protocol) to achieve that. TCP is a connection oriented one so end to end delivery is guaranteed and UDP is not connection oriented so it is not that reliable for sending data. In this phrase that TCP Header is added to the data which is telling that destination that it is a TCP packet or UDP packet also it have some flags that can be set one if syn another is ack and also fin which is use by the three way hand shake of the TCP to successfully establish a connection.

Network
The data with the TCP header is send to this layer which adds another header to it which is the Network Header it contains the source IP address, Destination IP address, source port and destination port. In this the packet is fragmented that is divided to small parts if it is too big to send as one. This header is use for transferring the packets end to end.

Data Link
 In data link layer it adds another header which is data link header it consist of two mac (Media access control) address of host and a destination this use to navigate through the network the destination and source mac are not always the address of the beginning and end nodes it is hop to hop that mean if you send data from your computer and if it goes through router A,B,C and Destination then fist source mac is of your computer and destination is of router A and when it get to the router A it check it for the destination IP by opening the IP layer and it finds that the packet need to send to router B to get to the destination so it does not change IP Header but when it come to data link it change it now the source mac is the mac of router A and destination mac is the mac of router B and this process goes on until it reach the destination. The data is also segmented at the if it is big and if is known as a frame error control and flow control is added by this stage. This layer is further divided to LLC and Mac

Physical Layer
Till now the data is of bits and it is not physical thing and we need to convert is to a physical thing so we can send it across a physical media Physical Layer dose this for wire Cables it converts to electrical Current for Wireless it convert to wireless signals for fiber cables it convert to laser light etc.



At the other end the data is reached by the physical layer which convert it to bits and pass to data link which check for errors and then pass to network which check for destination and Transport for connection  session to find out which instance presentation convert the data back to local application type and finally application which you will see the result at your PC