http://freevideolectures.com/blog/2010/07/20-cs-programming-online-courses-with-video-lectures/
Monday, October 31, 2011
Wednesday, January 12, 2011
Bootable PenDrive
unetbootin-windows/LINUX
Unetbootin is a good software to make bootable USB drive; it is licensed under the GNU General Public License (GPL) Version 2 or above.
http://unetbootin.sourceforge.net/
Unetbootin is a good software to make bootable USB drive; it is licensed under the GNU General Public License (GPL) Version 2 or above.
http://unetbootin.sourceforge.net/
Tuesday, June 1, 2010
Monday, May 31, 2010
Create a disposable email address and fight against Spams
Few steps to generate a new temporary email address
1.
http://www.jetable.org/en/index
follow the link.
2.
Give your legitimate email address to jetable.org
3.
Specify the time period in hours, days or moth as per your requirement.
4.
And click on the create button.
5.
Copy the created email address and give it to anywhere on net and anonymize your email address.
:)
Some other mail providers are also available which provide more or less same facility:
# 10minutemail.com
It gives you a fake email address only for 10 minutes by default, if you want more 10 minute it can give the time but not more than that.
# 12hourmail.com
It give you an email address for 12 hours as the name suggest, after 12 hour all the mails will be deleted from the Inbox.
# emailinator.com
It is also a free disposable e-mail address service with no registration required.
# www.guerrillamail.com
This website also provides you the same email service which expire after 15 Minutes.
# mailcatch.com/
# www.tempinbox.com/
# spamfree24.org
There may be many more but definitely for the same purpose. Use and enjoy :)
1.
http://www.jetable.org/en/index
follow the link.
2.
Give your legitimate email address to jetable.org
3.
Specify the time period in hours, days or moth as per your requirement.
4.
And click on the create button.
5.
Copy the created email address and give it to anywhere on net and anonymize your email address.
:)
Some other mail providers are also available which provide more or less same facility:
# 10minutemail.com
It gives you a fake email address only for 10 minutes by default, if you want more 10 minute it can give the time but not more than that.
# 12hourmail.com
It give you an email address for 12 hours as the name suggest, after 12 hour all the mails will be deleted from the Inbox.
# emailinator.com
It is also a free disposable e-mail address service with no registration required.
# www.guerrillamail.com
This website also provides you the same email service which expire after 15 Minutes.
# mailcatch.com/
# www.tempinbox.com/
# spamfree24.org
There may be many more but definitely for the same purpose. Use and enjoy :)
Sunday, May 30, 2010
LITIGATION THAT IS COMMONLY CONCERNED WITH EMAIL
Litigation, civil and criminal, can arise from the
use and misuse of email in many different ways:
1. The civil and criminal offences of harassment under the Protection from Harassment Act involve a course of conduct that causes distress. The sending of harassing emails can amount to a course of conduct.
2. A libel occurs where a person makes a statement to another about a third party that causes the other to think less of the third party. Obviously, emails can be used to communicate libelous statements.
3. The Malicious Communications Act criminalizes the sending of ‘hate mail’, which includes the sending of hate email.
4. person can breach their duty of confidence in confidential email through the sending of an email to another person.
5. Emails can be used to send infringing copies of copyright protected materials.
6. Unlawfully obtaining personal data contained in emails is a criminal offence under the Data Protection Act.
7. Using a computer without permission to gain access to emails is a hacking offence under the Computer Misuse Act.
8. Disclosing emails without permission or lawful authority can infringe a person’s right to privacy under the Human Rights Act.
9. Intercepting emails without lawful authority is a criminal offence under the Regulation of Investigatory Powers Act.
10. Distance contracting by email where the seller neglects to provide core information about themselves and their business is unlawful under the Consumer Protection Distance Selling Regulations.
11. The sending of spam emails is unlawful under the Privacy and Electronic Communications(EC
Directive) Regulations. Within a fractured environment the organization carries an unascertained risk of breaching the law in literally thousands of different ways.
use and misuse of email in many different ways:
1. The civil and criminal offences of harassment under the Protection from Harassment Act involve a course of conduct that causes distress. The sending of harassing emails can amount to a course of conduct.
2. A libel occurs where a person makes a statement to another about a third party that causes the other to think less of the third party. Obviously, emails can be used to communicate libelous statements.
3. The Malicious Communications Act criminalizes the sending of ‘hate mail’, which includes the sending of hate email.
4. person can breach their duty of confidence in confidential email through the sending of an email to another person.
5. Emails can be used to send infringing copies of copyright protected materials.
6. Unlawfully obtaining personal data contained in emails is a criminal offence under the Data Protection Act.
7. Using a computer without permission to gain access to emails is a hacking offence under the Computer Misuse Act.
8. Disclosing emails without permission or lawful authority can infringe a person’s right to privacy under the Human Rights Act.
9. Intercepting emails without lawful authority is a criminal offence under the Regulation of Investigatory Powers Act.
10. Distance contracting by email where the seller neglects to provide core information about themselves and their business is unlawful under the Consumer Protection Distance Selling Regulations.
11. The sending of spam emails is unlawful under the Privacy and Electronic Communications(EC
Directive) Regulations. Within a fractured environment the organization carries an unascertained risk of breaching the law in literally thousands of different ways.
Subscribe to:
Posts (Atom)