Shaik Nafeez Banu
- Krakow, Malopolskie
- [email protected]
Enthusiastic fresher with highly motivated and leadership skills having bachelors of engineering degree in Computer Science and Engineering.
- Expert in implementation of each step of project.
- Eager to learn new technologies and methodologies.
- Always willing to innovate the new things which can existing to the new technology.
In SSC 76%
A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard. As a hardware device, a keylogger is a small battery-sized plug that serves as a connector between the user's keyboard and computer. Because the device resembles an ordinary keyboard plug, it is relatively easy for someone who wants to monitor a user's behavior to physically hide such a device "in plain sight." (It also helps that most workstation keyboards plug into the back of the computer.) As the user types, the device collects each keystroke and saves it as text in its own miniature hard drive. At a later point in time, the person who installed the keylogger must return and physically remove the device in order to access the information the device has gathere
Type of wireless technology that provides wireless internet service over longer distances than standard Wi-Fi. WiMax is based on standard IEEE 802.16 technology and can provide broadband wireless access up to 30 miles. WiMax uses fixed and mobile stations to provide users with access to high-speed voice, data, and Internet connectivity. WiMax technology has not been widely accepted by the technology community, but its popularity continues to grow asbusinesses and consumers seek out better ways to constantly stay connected.
We humans can see the things around us, differentiate between colours then why can’t machine? And that thought leads us to design “sixth sense Botz”.
For processing of the images, we use a tool called as MATLAB, which is widely used inindustries.
Hacking" is the word that shakes everyone whenever it is said or heard by someone. Everyone born in this world with attitude wants to be a Hacker. But it is not a job of a new born baby or an old grown lady. A Hacker needs a brilliant mind to hack anything. His skills should be so powerful that no other hacker can hack him. A Hacker doesn't need a software to hack. There are many rules that he should learn to become an Ethical Hacker
The security of information systems is generally related to the deployed tools to protect the network infrastructure from attacks. These latter are based on detection components that analyze the information transmitted through the network. The existing systems do not provide a full protection and present a high rate of false positives that could result from a lack in the analysis of the collected information (events). Thus, useful information should be determined to perform accurate detection and hence perform good protection.
Windows Server 2003/2008
SQL Server 2005/2008
Technology used : MS .NET
Data Base : SQL SERVER2008
Cooperative Communication has received tremendous interest for wireless networks. Most existing works on Cooperative Communications are focused on link-level physical layer issues. Consequently, the impacts of Cooperative Communication on network level upper layer issues, such as Topology Control , Routing and Network capacity, are largely ignored we propose a Capacity –Optimized Cooperative (COCO)Topology control scheme to improve network capacity in MANETs by jointly considering both upper layer capacity and physical layer cooperative communication. We propose topology control scheme to substantially improve the network capacity in MANETs with cooperative communications.
Phone: +48- 692083517
Email Id: [email protected]
Date of Birth: 6th October 1991.
Languages Known: English, Hindi and Telugu
(Shaik Nafeez Banu)