Saturday, September 3, 2011

Unified Communication with Lync

0 comments

 

Hi there, Yes ! Smile Finally I’ve found a time to write my blog. This time no more coding stuff. But recently I’ve been looking for  some information on this So called Lync. And Finally I’ve found it.

mslync-logo

Before identifying what is Lync we need to Identify what is Unified Communication

Wikipedia states that ,

Unified communications (UC) is the integration of real-time communication services such as instant messaging (chat), presence information, telephony (including IP telephony), video conferencing, data sharing (including web connected electronic whiteboards aka IWB's or Interactive White Boards), call control and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, e-mail, SMS and fax). UC is not a single product, but a set of products that provides a consistent unified user interface and user experience across multiple devices and media types.[1]

In its broadest sense UC can encompass all forms of communications that are exchanged via the medium of the TCP/IP network to include other forms of communications such as Internet Protocol Television (IPTV) and Digital Signage Communications as they become an integrated part of the network communications deployment and may be directed as one to one communications or broadcast communications from one to many.

UC allows an individual to send a message on one medium and receive the same communication on another medium. For example, one can receive a voicemail message and choose to access it through e-mail or a cell phone. If the sender is online according to the presence information and currently accepts calls, the response can be sent immediately through text chat or video call. Otherwise, it may be sent as a non real-time message that can be accessed through a variety of media

 

Lync Server is a solution for implementing the above communication method. and simply we can say Lync is a platform which providing facilities for ,

  • Instant Messaging
  • File Transfering
  • peer to peer facilities
  • Video & Voice Calling etc;

 

One key feature of this  server is there are several devices which is specially made for this technology. Such as,

  • Microsoft RoundTable is an audio and video conferencing device that provides a 360-degree view of the conference room and tracks the various speakers. This device is now produced and sold via Polycom under the product name CX5000.
  • LG-Nortel and Polycom also make IP phones in a traditional phone form factor that operate an embedded edition of Office Communicator 2007. The physical plastic phones as referred by Microsoft are also named Tanjay Phones.
  • SNOM has produced the first open SIP phone that also integrates to OCS

There are some eye catching videos about these features in Youtube.If you like you can just find from there.

 

References:-

Offical site for Lync
Wikipedia

Wednesday, March 2, 2011

Brute force….

5 comments

Hi there!, It’s quite late to write a new post due to my heavily busy weeks . Anyway recently I firemasterwas able to break down a windows password(Of course it’s simple as ABC Winking smile ) but I thought it might helpful to discuss about brute force attacking method.

There are several password finding methods,

1.Common and most time consuming one is so called ‘ Brute Force’
2. The other one is ‘Dictionary Attack’

 

and there are more ways, but it’s up to you to find .

So what is Brute Force.

According to Wikipedia…..

a brute force attack or exhaustive key search is a strategy that can in theory be used against any encrypted data[1] by an attacker who is unable to take advantage of any weakness in an encryption system that would otherwise make his/her task easier. It involves systematically checking all possible keys until the correct key is found. In the worst case, this would involve traversing the entire search space.

but how it works ? That’s the question, Here’s how it works

lets see the password is “CDE”

We can write a simple program or a Script to input the password by key by key ,related to ASCII value.(This is a simple way)

First the program will try from  

AAA
BAA
CAA
DAA   and so forth . Open-mouthed smile

Until it finds the ‘CDE’ character set.

It’s pretty time consuming task but there is a special version of brute force attack called ‘Rainbow Tables’ .I’ll write about them later .And there are number of ways to overcome this. One way is to encrypt the codes by “One type pad” cryptographic method. .

other common ways are,

-Add more characters other than letters or numbers such as ‘*’ ,’@’,’#’
-Use a bit long password. (But remember the password!)
-Imposing a 30 second delay between failed authentication attempts
-Locking the account after 5 failed authentication attempts

Like these things to find a key by brute force attack will take time than attacker expected! .

Tuesday, January 4, 2011

Use Your Camera to Stitch the World!

0 comments

Hi folks!, Very Happy New year.This time I’m not going to explain a developing tool ;).

logo This is just a web app by Microsoft and this thing have some amazing capabilities . So what is this ? This tool called Microsoft Photosynth. This will allow you to virtually build an Environment with the help of your captured photos.

You didn’t get it right? Yes . OK Imagine you are in TajMahal(Hope you are not Shah Jahan!!) Now you have a Digital Camera.What will you do . Shooting ,Shooting like this is the end of the world!. Then what will you do just uploading those to FB or someplace.

Imagine If you can visualize a 3D map with the help of your photos of TAJ MAHAL ! Now this is the place where the Photosynth comes in.

Photosynth can Generate the map.This is a remarkable technology.Just give it a try.

To view those synthed images you need Silverlight .So Install them. And there is a Guide on how to Shoot photos for photosynth.

Here is an Example.

This is the Guide

Happy Synthing!!!