CMS
Content Management System can be used by any newbie to build websites.
There are variety of CMS available over internet. which includes most hot ones (druapl & joomla)
about drupal
Drupal is an Open Source Content Management System which is used to build beautiful and pleasant Websites with few clicks away.
Drupal.org is the official website of Drupal, an open source content management platform.
Equipped with a powerful blend of features, Drupal supports a variety of websites ranging from personal weblogs to large community-driven websites.
* About Drupal
* Screenshots
* Features
* Demo
* Hosting
* Paid services
* Events
* Jobs
About joomla
What Can You Do With a Template?
A template is used to manipulate the way content is delivered to a web browser or screen reader. Here are some ways you can employ this on your Joomla!-powered site.
Layout
The template is the place where the design of the main layout is set for your site. This includes where you place different elements (components, modules, and plugins), which are responsible for different types of content. For example:
1. The various menus (you can chose from existing options and create your own)
2. Advertising banners
3. Polls
4. The main body of the page (you can select from different styles such as typical blog layout, a news article, etc.)
If the template is designed to provide choices, you can also "dynamically" alter the content placement on your site, perhaps putting the main menu on the right or left side of the screen.
Color Scheme
Using CSS within the template design, you can change the colors of your backgrounds, text, links or just about anything that you could within your ordinary (x)html code.
Images and Effects
You can also control the way images are displayed on the page, and even create flash-like effects or include AJAX applications such as drop-down menus.
Fonts
The same applies to fonts. The designs for these are all set within the template's CSS file(s) to create a uniform look across your entire site, which makes it fantastically easy to change the whole look just by altering one or two files rather than every single page.
Browser Specific Solutions
A template can be designed to alter how it displays on different web browsers, allowing you to take full advantage of the latest developments without making your site inaccessible to those who are not able to run "up-to-the-minute" system upgrades (such as certain companies who limit what software their employees can use).
Friday, May 14, 2010
Infosys Schlorships
PLEASE SPREAD THE NEWS
Infosys Scholarship for Poor Students who completed 10th std.-Pls. Read & Forward to benefit the needy
Dear Friends,
If you have come across any bright students coming from poor financial background who have finished their 10th standard this year (April 2009-2010) and scored more than 80%, please ask them to contact the NGO-Prerana (supported by Infosys foundation). The NGO is conducting a written test and those who clear the test will be eligible for financial help for their further studies.
Please ask the students to contact the people mentioned below to get the form
Mrs. Saraswati (9900906338 begin_of_the_skype_highlighting 9900906338 end_of_the_skype_highlighting)
#580, Shubhakar ,
44th cross,1st ‘A’ main road,jayanagar 7th block Bangalore
Mr. Shivkumar ( 9986630301 begin_of_the_skype_highlighting 9986630301 end_of_the_skype_highlighting) - Hanumanthnagar office
Ms. Bindu (9964534667 begin_of_the_skype_highlighting 9964534667 end_of_the_skype_highlighting )-Yeshwantpur office
Even if you don’t know anyone, please pass on this info, someone might be in need of this help desperately.
Infosys Scholarship for Poor Students who completed 10th std.-Pls. Read & Forward to benefit the needy
Dear Friends,
If you have come across any bright students coming from poor financial background who have finished their 10th standard this year (April 2009-2010) and scored more than 80%, please ask them to contact the NGO-Prerana (supported by Infosys foundation). The NGO is conducting a written test and those who clear the test will be eligible for financial help for their further studies.
Please ask the students to contact the people mentioned below to get the form
Mrs. Saraswati (9900906338 begin_of_the_skype_highlighting 9900906338 end_of_the_skype_highlighting)
#580, Shubhakar ,
44th cross,1st ‘A’ main road,jayanagar 7th block Bangalore
Mr. Shivkumar ( 9986630301 begin_of_the_skype_highlighting 9986630301 end_of_the_skype_highlighting) - Hanumanthnagar office
Ms. Bindu (9964534667 begin_of_the_skype_highlighting 9964534667 end_of_the_skype_highlighting )-Yeshwantpur office
Even if you don’t know anyone, please pass on this info, someone might be in need of this help desperately.
Thanks & Regards,
Monday, April 27, 2009
History of Trojan Horse (Virus,Worm)
History of Traojan is as ancient as civilization.
In a one line definition these are deceptive software programs. Suppose a Software program on front /user end very useful and beautiful but in background its transfering some critical information to its coder. (s/w developer)
Trojan horses can be installed through the following methods:
* Websites containing executable content (e.g., a Trojan horse in the form of an ActiveX control)
* Software downloads (e.g., a Trojan horse included as part of a software application downloaded from a file sharing network)
* Email attachments
* Application exploits (e.g., flaws in a web browser, media player, messaging client, or other software that can be exploited to allow installation of a Trojan horse)
Also, there have been reports of compilers that are themselves Trojan horses.[citation needed] While compiling code to executable form, they include code that causes the output executable to become a Trojan horse.
In a one line definition these are deceptive software programs. Suppose a Software program on front /user end very useful and beautiful but in background its transfering some critical information to its coder. (s/w developer)
Trojan horses can be installed through the following methods:
* Websites containing executable content (e.g., a Trojan horse in the form of an ActiveX control)
* Software downloads (e.g., a Trojan horse included as part of a software application downloaded from a file sharing network)
* Email attachments
* Application exploits (e.g., flaws in a web browser, media player, messaging client, or other software that can be exploited to allow installation of a Trojan horse)
Also, there have been reports of compilers that are themselves Trojan horses.[citation needed] While compiling code to executable form, they include code that causes the output executable to become a Trojan horse.
Subscribe to:
Comments (Atom)
