Tuesday, May 26, 2009

File Delete Problem:

How to delete a file when the windows displays file access denied, "file in use' error, cant delete the file,etc

Here i Present you the solution of this common problem:

Despite all its quirks, Windows does do some things for a good reason. Some files need to be locked down when they are in use, otherwise you risk damaging the file or harming the Operating System. Unfortunately Windows XP seems to be plagued by files that cannot be deleted. These are frequently simple files like videos (AVI), MP3s or other seemingly harmless files. You try to delete the file, Windows waits a few seconds before announcing that access is denied, the file is currently in use and cannot be deleted. However, you know it's not in use and you just want it deleted.

If you have encountered this problem, here is a step-by-step process for trying to purge the files you can't delete. It starts with the basics for Windows XP and moves on to more involved tricks. The process will work for all recent Windows releases, but Windows XP has been causing the most the problems, so we will focus on it. Please note: we are assuming that the file is not crucial to the operation of Windows - deleting important system files can cause havoc.

  1. Is the file in use? It sounds obvious but it happens. If it is being used or open, close the file and the application that opened it. For example, if it is a Word document, close Microsoft Word.
  2. If the file was opened in an application (and subsequently closed), but the program is still running, try quitting the program. Windows will lock a file because the application hasn't yet released it. This is not always Windows fault and can be the fault of the program.
  3. If the file is an AVI, in particular a DivX AVI, try renaming it and then deleting it. DivX files don't get on very well with Windows XP and sometimes renaming the file can trick Windows into releasing it.
  4. Reboot your PC and don't start any programs. Go directly to the file and delete it.
  5. In Windows Explorer, switch to View-Details and then select View-Choose Details. Uncheck everything except the file name. This stops Windows XP trying to read the file - this problem affects many video, audio and graphics files.
  6. Still no luck? OK, here is the best trick of all. Most sites give you cryptic Windows registry and DOS commands to remove a file, but the answer is so much simpler. Get a copy of MoveOnBoot. It's free and this simple tool allows you to Move, Copy or Delete files before Windows can lock or alter the files. The changes are made to your hard drive before Windows starts, hence it requires a restart of your system after you give MoveOnBoot its instructions. There are no messy boot or DOS commands, just a simple 3-step process.

    Step 1: Locate the name of the file that is causing your problems.

    Step 2: Decide if you want to copy, move or delete the file.

    Step 3. Choose a destination for moving the file, or a new file name for the rename option (this option won't appear if you are deleting a file).

    Click OK to confirm you want to process. The nice thing is that the program doesn't make you reboot straight away. It's a good idea to reboot ASAP, but if you are in the middle of something and want to wait, the program will simply run next time you start Windows.
  7. If the file reappears again (check its creation date to ensure it is being recreated) and you can't make it budge, you may have trouble with spyware or a virus on your system (don't overlook the possibility it may also be an important system file). In this case you should get a good spyware removal program to scan your system.

CRC Errors

Data errors or ‘Cyclic Redundancy Check’ (CRC) errors occur to ensure that your data is intact when being transferred. If the data has been damaged this checking procedure immediately identifies it. When CRC messages are displayed on your screen, it means that the files are being read by the system or the software has failed, but it does not indicate towards the complete loss of data.

Data are generally transferred in small blocks and each block is assigned a CRC value. If there is something amiss while the data is being transferred from the source to the destination, the CRC reaching the source fails to match the calculation at the destination, resulting into appearance of and CRC error. These errors are usually thrown out when the system tries to read data from a damaged CD or DVD. The respective drive may grind or whirl away and your system may slowdown just before a CRC error is displayed. System crashes, incomplete download and buggy software can also cause this error.

For the case of your CDs and DVDs, if the drive gets a CRC message, it tries to read the disk again and after repeated failed attempts, it throws out a CRC error. A problem related to hardware, software or damaged media causes this error. You can try cleaning the disc to fix it but if the problem persists, it can be attributed to a hardware issue. You can check the discs in another drive. Poorly burnt discs or USB burners burnt at a very high speed also can cause this problem. Using a reliable recovery tool is advisable to recover data from damaged discs.

Sunday, May 24, 2009

List of Free Open Source Software’s For Windows:

For web browsing:

Mozila Firefox: click here

For Video Player/Video Podcasting:

Miro: click here

For instant Messaging

Pidgin: click here

For Emailing:

Mozila Thunderbird: click here

Video playback:

VLC: click here

Mplayer: click here

Media Player Classic: click here

DVD ripping:

Media Coder:click here

Word Processing / Office Suites:

Openoffice.org: click here

AbiWord:click here

Personal Finance:

TurboCASH: click here

3D Graphics And Modelling:

Blender: click here

Free File Hosting:
CC Publisher: click here

Security Tools:

True Crypt:click here

NMap:click here

Pigs in Cyberspace:

Start with the concepts of telepresence and virtual reality. You wear a harness that, with optical, acoustical, mechanical and chemical devices controls all that you sense, and measures all of your actions. Its machinery presents pictures to your eyes, sounds to your ears, pressures and temperatures to your skin, forces to your muscles and even smells and tastes for the remaining senses. Telepresence results when the inputs and outputs of this harness connect to a distant machine that looks like a humanoid robot. The images from the robot's two camera eyes appear on your "eyeglass" viewscreens, and you hear through its ears, feel through its skin and smell through its chemical sensors. When you move your head or body, the robot moves in exact synchrony. When you reach for an object seen in the viewscreens, the robot reaches for the object, and when it makes contact, your muscles and skin feel the resulting weight, shape, texture and temperature. For most practical purposes you inhabit the robot's body -- your senseof consciousness has migrated to the robot's location, in a true "out of body" experience.
Virtual reality retains the harness, but replaces the remote robot with a computer simulation of a body and its surroundings. When connected to a virtual reality, the location you seem to inhabit does not exist in the usual physical sense, rather you are in a kind of computer-generated dream. If the computer has access to data from the outside world, the simulation may contain some "real" items, for instance representations of other people connected via their own harnesses, or even views of the outside world, perhaps through simulated windows.


One might imagine a hybrid system where a virtual "central station" is surrounded by portals that open on to views of multiplereal locations. While in the station one inhabits a simulated body, but when one steps through a portal, the harness link is seamlessly switched from the simulation to a telepresence robot waiting at that location.


The technical challenges limit the availability, "fidelity" and affordability of telepresence and virtual reality systems today -- in fact, they exist only in a few highly experimental demonstrations. But progress is being made, and its possible to anticipate a time, a few decades hence, when people spend more time in remote and virtual realities than in their immediate surroundings, just as today most of us spend more time in artificial indoor surroundings than in the great outdoors. The remote bodies we will inhabit can be stronger, faster and have better senses than our "home" body. In fact, as our home body ages and weakens, we might compensate by turning up some kind of "volume control." Eventually, we might wish to bypass our atrophied muscles and dimmed senses altogether, if neurobiology learns enough to connect our sensory and motor nerves directly to electronic interfaces. Then all the harness hardware could be discarded as obsolete, along with our sense organs and muscles, and indeed most of our body. There would be no "home" experiences to return to, but our remote and virtual existences would be better than ever.

The picture is that we are now is a "brain in a vat," sustained by life-support machinery, and connected by wonderful electronic links, at will, to a series of "rented" artificial bodies at remote locations, or to simulated bodies in artificial realities. But the brain is a biological machine not designed to function forever, even in an optimal physical environment. As it begins to malfunction, might we not choose to use the same advanced neurological electronics that make possible our links to the external world, to replace the gray matter as it begins to fail? Bit by bit our brain is replaced by electronic equivalents, which work at least as well, leaving our personality and thoughts clearer than ever. Eventually everything has been replaced by manufactured parts. No physical vestige of our original body or brain remains, but our thoughts and awareness continue. We will call this process, and other approaches with the same end result, the downloading of a human mind into a machine. After downloading, our personality is a pattern impressed on electronic hardware, and we may then find ways to move our minds to other similar hardware, just as a computer program and its data can be copied from processor to processor. So not only can our sense of awareness shift from place to place at the speed of communication, but the very components of our minds may ride on the same data channels. We might find ourselves distributed over many locations, one piece of our mind here, another piece there, and our sense of awareness at yet another place. Time becomes more flexible -- when our mind resides in very fast hardware, one second of real time may provide a subjective year of thinking time, while a thousand years of real time spent on a passive storage medium may seem like no time at all. Can we then consider ourselves to be a mind without a body? Not quite.

A human totally deprived of bodily senses does not do well. After twelve hours in a sensory deprivation tank (where one floats in a body-temperature saline solution that produces almost no skin sensation, in total darkness and silence, with taste and smell and the sensations of breathing minimized) a subject will begin to hallucinate, as the mind, somewhat like a television tuned to a nonexistent channel, turns up the amplification, desperately looking for a signal, becoming ever less discriminating in the theories it offers to make sense of the random sensory hiss it receives. Even the most extreme telepresence and virtual reality scenarios we have presented avoid complete bodylessness by always providing the mind with a consistent sensory (and motor) image, obtained from an actual remote robot body, or from a computer simulation. In those scenarios, a person may sometimes exist without a physical body, but never without the illusion of having one.



But in our computers there are already many entities that resemble truly bodiless minds. A typical computer chess program knows nothing about physical chess pieces or chessboards, or about the staring eyes of its opponent or the bright lights of a tournament. Nor does it work with an internal simulation of those physical attributes. It reasons instead with a very efficient and compact mathematical representation of chess positions and moves. For the benefit of human players this internal representation is sometimes translated to a recognizable graphic on a computer screen, but such images mean nothing to the program that actually chooses the chess moves. For all practical purposes, the chess program's thoughts and sensations -- its consciousness -- is pure chess, with no taint of the physical, or any other, world. Much more than a human mind with a simulated body stored in a computer, a chess program is a mind without a body.


So now, imagine a future world where programs that do chess, mathematics, physics, engineering, art, business or whatever, have grown up to become at least as clever as the human mind. Imagine also the most of the inhabited universe has been converted to a computer network -- a cyberspace -- where such programs live, side by side with downloaded human minds and accompanying simulated human bodies. Suppose that all these entities make their living in something of a free market way, trading the products of their labor for the essentials of life -- in this world memory space and computing cycles. Some entities do the equivalent of manual work, converting undeveloped parts of the universe into cyberspace, or improving the performance of existing patches, thus creating new wealth. Others work on physics or engineering problems whose solutions give the developers new and better ways to construct computing capacity. Some create programs that can become part of one's mental capacity. They trade their discoveries and inventions for more working space and time. There are entities that specialize as agents, collecting commissions in return for locating opportunities and negotiating deals for their clients. Others act as banks, storing and redistributing resources, buying and selling computing space, time and information. Some we might class as artists, creating structures that don't obviously result in physical resources, but which, for idiosyncratic reasons, are deemed valuable by some customers, and are traded at prices that fluctuate for subjective reasons. Some entities in the cyberworld will fail to produce enough value to support their requirements for existence -- these eventually shrink and disappear, or merge with other ventures. Others will succeed and grow. The closest present day parallel is the growth, evolution, fragmentation and consolidation of corporations, whose options are shaped primarily by their economic performance.

A human would likely fare poorly in such a cyberspace. Unlike the streamlined artificial intelligences that zip about, making discoveries and deals, reconfiguring themselves to efficiently handle the data that constitutes their interactions, a human mind would lumber about in a massively inappropriate body simulation, analogous to someone in a deep diving suit plodding along among a troupe of acrobatic dolphins. Every interaction with the data world would first have to be analogized as some recognizable quasi-physical entity: other programs might be presented as animals, plants or demons, data items as books or treasure chests, accounting entries as coins or gold. Maintaining such fictions increases the cost of doing business, as does operating the mind machinery that reduces the physical simulations into mental abstractions in the downloaded human mind. Though a few humans may find a niche exploiting their baroque construction to produce human-flavored art, more may feel a great economic incentive to streamline their interface to the cyberspace.

The streamlining could begin with the elimination of the body- simulation along with the portions of the downloaded mind dedicated to interpreting sense-data. These would be and replaced with simpler integrated programs that produced approximately the same net effect in one's consciousness. One would still view the cyber world in terms of location, color, smell, faces, and so on, but only those details we actually notice would be represented. We would still be at a disadvantage compared with the true artificial intelligences, who interact with the cyberspace in ways optimized for their tasks. We might then be tempted to replace some of our innermost mental processes with more cyberspace-appropriate programs purchased from the AIs, and so, bit by bit, transform ourselves into something much like them. Ultimately our thinking procedures could be totally liberated from any traces of our original body, indeed of any body. But the bodiless mind that results, wonderful though it may be in its clarity of thought and breadth of understanding, could in no sense be considered any longer human.

So, one way or another, the immensities of cyberspace will be teeming with very unhuman disembodied superminds, engaged in affairs of the future that are to human concerns as ours are to those of bacteria. But, once in a long while, humans do think of bacteria, even particular individual bacteria seen in particular microscopes. Similarly, a cyberbeing may occasionally bring to mind a human event of the distant past. If a sufficiently powerful mind makes a sufficiently large effort, such recall could occur with great detail -- call it high fidelity. With enough fidelity, the situation of a remembered person, along with all the minutiae of her body, her thoughts, and feelings would be perfectly recreated in a kind of mental simulation: a cyberspace within a cyberspace where the person would be as alive as anywhere. Sometimes the recall might be historically accurate, in other circumstances it could be artistically enhanced: it depends on the purposes of the cybermind. An evolving cyberspace becomes effectively ever more capacious and long lasting, and so can support ever more minds of ever greater power. If these minds spend only an infinitesimal fraction of their energy contemplating the human past, their sheer power should ensure that eventually our entire history is replayed many times in many places, and in many variations. The very moment we are now experiencing may actually be (almost certainly is) such a distributed mental event, and most likely is a complete fabrication that never happened physically. Alas, there is no way to sort it out from our perspective: we can only wallow in the scenery.

Saturday, May 23, 2009

How to Fix the Rundell Error:


DLL files form part of a large record of codes and information that are used by many of the programs on your computer system. They are all linked to the Windows Registry and help to enhance the speed and memory effectiveness of your computer by using an identical code to run various tasks processed by various programs at a time. Hence, the rundll error arises when a program is not granted access to this particular code.

"Error Loading C:\windows\system 32\bridge.dll " is the kind of rundll error message that you can get.

Why does this happen?
Soln: This error can arise because a DLL file has been infected by a virus or is missing on the system due to a spyware. As the programs using this file will not be able to access it, there will be a rundll error to tell your system that the program cannot be loaded due to the missing code/file.

How to fix a rundll error?
Soln: To be able to locate where the error comes from, you can make use of internet tools or choose to fix it manually.

Solution 1: Reboot your computer
Sometimes, simply rebooting your computer can fix this problem. If it does not, you can choose from the other solutions below.

Solution 2: Install and Remove the program
This problem could have happened due to an incorrect program removal procedure. You can hence try to fix it by installing the program that has been removed and to correctly uninstall it either with the Uninstall option proposed by the program itself or through the â€Å“Add/Remove” feature found in the Control Panel menu.
1. Go to the Start menu and open Control Panel
2. Select Add/ Remove program option and locate for the program that you want to remove and click Remove.
3. When the procedure is over, delete any shortcuts that could have stayed and empty the Recycle Bin.
4. Reboot your system

Solution 3: Locate the error with System Configuration
1. Go to your Start menu and select the â€Å“Run” command
2. Enter â€Å“msconfig” to load the System Configuration Utility
3. When it shows up, choose the Selective Startup option and enable only one of its options.
4. Apply the changes and restart the computer.
5. If an error message appears concerning the specific option selected, you can either proceed to solution 4. Else, continue the same procedures until the rundll error appears for any specific selected option from the list.

Solution 4: Run an antispyware program or get online help
You should download a good an antispyware program and try to locate the malware or spyware that is corrupting the code or file needed to process the program.






Friday, May 22, 2009

Unit conversion in Windows 7


In Windows 7 you don't have to rely on search engines or downloadable software to perform conversions between units of power, time, volume, and mass. Just use the built-in calculator.
1. Open the Calculator - click the Start button, select "All Programs", "Accessories", and then "Calculator".
2. When the Calculator appears select the "View" menu then "Unit Conversion". Or, press Ctrl + U.


3. A unit conversion pane appears to the right of the calculator. Underneath "Select the type of unit you want to convert", click the pull-down and select your unit type.
4. Underneath "From" type in the value of the beginning unit.
Convert between units of area, energy, temperature, volume, and more in Windows 7.

5. Underneath the value of the beginning unit, click the pull-down to choose the unit type.
6. Below "To", click the pull-down to choose the ending unit type.
When all values have been selected, the text box below "To" shows the value of the calculation. You can select the value with your mouse, then select "Edit" - "Copy" (or press Ctrl + C) to copy the resulting value. It can then be pasted into the main calculator window, Notepad, a word processing document, etc.

How to remove Shutdown Virus:

first remove the virus from memory and system.
open command prompt, if system shutdown dialog
box appears, then type
shutdown -a
Then, in the command prompt, goto the windows folder
c:\>cd C:\windows
c:\windows>attrib -h -s -r system.bat
c:\windows>edit system.bat

Now, search and remove any line containing
shutdown -t -3000
or similar line containaing shutdown command.
similarly, remove the line from config.nt file
c:\>cd C:\windows\system32
c:\windows>attrib -h -s -r config.nt
c:\windows>edit config.nt
search and remove the line
save the file(s) and restart the computer.

Tuesday, May 5, 2009

INSURANCE

In law and economics insurance is a form of risk management primarily used to be saved from the risk of a contingent loss. Insurance is defined as the equitable transfer of the risk of a loss, from one entity to another, in exchange for a premium, and can be thought of as a guaranteed small loss to prevent a large, possibly devastating loss. An insurer is a company selling the insurance. An insured is the person or entity buying the insurance. The insurance rate is a factor used to determine the amount to be charged for a certain amount of insurance coverage, called the premium. Risk management, the practice of appraising and controlling risk, has evolved as a discrete field of study and practice.
ADVANTAGES OF INSURANCE:
A large number of homogeneous exposure units:
The vast majority of insurance policies are provided for individual members of very large classes. Automobile insurance, for example, covered about 175 million automobiles in the United States in 2004.The existence of a large number of homogeneous exposure units allows insurers to benefit from the so-called “law of large numbers,” which in effect states that as the number of exposure units increases, the actual results are increasingly likely to become close to expected results. There are exceptions to this criterion. Lloyd's of London is famous for insuring the life or health of actors, actresses and sports figures. Satellite Launch insurance covers events that are infrequent. Large commercial property policies may insure exceptional properties for which there are no ‘homogeneous’ exposure units. Despite failing on this criterion, many exposures like these are generally considered to be insurable.
Definite Loss:
The event that gives rise to the loss that is subject to the insured, at least in principle, take place at a known time, in a known place, and from a known cause. The classic example is death of an insured person on a life insurance policy. Fire, automobile accidents, and worker injuries may all easily meet this criterion. Other types of losses may only be definite in theory. Occupational disease, for instance, may involve prolonged exposure to injurious conditions where no specific time, place or cause is identifiable. Ideally, the time, place and cause of a loss should be clear enough that a reasonable person, with sufficient information, could objectively verify all three elements.
Accidental Loss:
The event that constitutes the trigger of a claim should be fortuitous, or at least outside the control of the beneficiary of the insurance. The loss should be ‘pure,’ in the sense that it results from an event for which there is only the opportunity for cost. Events that contain speculative elements, such as ordinary business risks, are generally not considered insurable.
Large Loss:
The size of the loss must be meaningful from the perspective of the insured. Insurance premiums need to cover both the expected cost of losses, plus the cost of issuing and administering the policy, adjusting losses, and supplying the capital needed to reasonably assure that the insurer will be able to pay claims. For small losses these latter costs may be several times the size of the expected cost of losses. There is little point in paying such costs unless the protection offered has real value to a buyer.
Affordable Premium:
If the likelihood of an insured event is so high, or the cost of the event so large, that the resulting premium is large relative to the amount of protection offered, it is not likely that anyone will buy insurance, even if on offer. Further, as the accounting profession formally recognizes in financial accounting standards, the premium cannot be so large that there is not a reasonable chance of a significant loss to the insurer. If there is no such chance of loss, the transaction may have the form of insurance, but not the substance.
Calculable Loss:
There are two elements that must be at least estimable, if not formally calculable: the probability of loss, and the attendant cost. Probability of loss is generally an empirical exercise, while cost has more to do with the ability of a reasonable person in possession of a copy of the insurance policy and a proof of loss associated with a claim presented under that policy to make a reasonably definite and objective evaluation of the amount of the loss recoverable as a result of the claim. Limited risk of catastrophically large losses. The essential risk is often aggregation. If the same event can cause losses to numerous policyholders of the same insurer, the ability of that insurer to issue policies becomes constrained, not by factors surrounding the individual characteristics of a given policyholder, but by the factors surrounding the sum of all policyholders so exposed. Typically, insurers prefer to limit their exposure to a loss from a single event to some small portion of their capital base, on the order of 5 percent. Where the loss can be aggregated, or an individual policy could produce exceptionally large claims, the capital constraint will restrict an insurer's appetite for additional policyholders.
The classic example is earthquake insurance, where the ability of an underwriter to issue a new policy depends on the number and size of the policies that it has already underwritten. Wind insurance in hurricane zones, particularly along coast lines, is another example of this phenomenon. In extreme cases, the aggregation can affect the entire industry, since the combined capital of insurers and reinsurers can be small compared to the needs of potential policyholders in areas exposed to aggregation risk. In commercial fire insurance it is possible to find single properties whose total exposed value is well in excess of any individual insurer’s capital constraint. Such properties are generally shared among several insurers, or are insured by a single insurer who syndicates the risk into the reinsurance market.

Wednesday, April 22, 2009

GOD GEOMETRICS

Biologists think they are biochemists, Biochemists think they are Physical Chemists, Physical Chemists think they are Physicists, Physicists think they are Gods, And God thinks he is a Mathematician.

FUNNY FORMULA

The limit as 3 goes to 4 of 3^2 is 16. (For native LaTex speakers: $$\lim_{3 \rightarrow 4} 3^2 = 16$$)
1 + 1 =3, for sufficiently large one's.
The combination of the Einstein and Pythagoras discoveries: E= m c^2= m ( a^2 + b^2)
2 and 2 is 22
The limit as n goes to infinity of sin (x) /n is 6. Proof: cancel the n in the numerator and denominator.
As x goes to zero, the limit of 8 /x is 00 (infinity), then the limit (as x goes to zero) of Z /x is N

THE BANKING INDUSTRY

If there is one industry that has the stigma of being old and boring, it would have to be banking; however, a global trend of deregulation has opened up many new businesses to the banks. Coupling that with technological developments like internet banking and ATMs, the banking industry is obviously trying its hardest to shed its lackluster image.
There is no question that bank stocks are among the hardest to analyze. Many banks hold billions of dollars in assets and have several subsidiaries in different industries. A perfect example of what makes analyzing a bank stock so difficult is the length of their financials - they are typically well over 100 pages. While it would take an entire textbook to explain all the ins and outs of the banking industry, here we'll shed some light on the more important areas to look at when analyzing a bank as an investment. (For background reading, there are two major types of banks in North America:
Regional (and Thrift) Banks - These are the smaller financial institutions, which primarily focus on one geographical area within a country. In the U.S., there are six regions: Southeast, Northeast, Central, etc. Providing depository and lending services is the primary line of business for regional banks.
Major (Mega) Banks - While these banks might maintain local branches, their main scope is in financial centers like New York, where they get involved with international transactions and underwriting.
Could you imagine a world without banks? At first, this might sound like a great thought! But banks (and financial institutions) have become cornerstones of our economy for several reasons. They transfer risk, provide liquidity, facilitate both major and minor transactions and provide financial information for both individuals and businesses. Running a bank is just as difficult as analyzing it for investment purposes. A bank's management must look at the following criteria before it decides how many loans to extend, to whom the loans can be given, what rates to set, and so on:
Capital Adequacy and the Role of Capital
Asset and Liability Management - There is a happy medium between banks overextending themselves (lending too much) and lending enough to make a profit.
Interest Rate Risk - This indicates how changes in interest rates affect profitability.
Liquidity - This is formulated as the proportion of outstanding loans to total assets. If more than 60-70% of total assets are loaned out, the bank is considered to be highly illiquid.
Asset Quality - What is the likelihood of default?
Profitability - This is earnings and revenue growth. Perhaps the biggest distinction that sets the banking industry apart from others is the government's heavy involvement in it. Besides setting restrictions on borrowing limits and the amount of deposits that a bank must hold in the vault, the government (mainly the Federal Reserve) has a huge influence on a bank's profitability.

SALARY THEOREM

statement:
The less you know, the more you make.
Proof:
Postulate 1: Knowledge is Power.
Postulate 2: Time is Money.
As every engineer knows: Power = Work / Time And since Knowledge = Power and Time = Money It is therefore true that Knowledge = Work / Money .
Solving for Money, we get: Money = Work / Knowledge Thus, as Knowledge approaches zero, Money approaches infinity, regardless of the amount of Work done.

Monday, March 23, 2009

Sunday, March 22, 2009

DEFINITION

Want to control of your business by your own? Then you have the solution. Online banking also called internet banking is the banking strategy that allows the customers to make their transactions and account access via the secure website provided by the respective financial institutions. This is the most popular technology in the modern world of science and technology. So this allows us to control our own business ourselves.

Now a day’s online banking is gaining popularity all over the world. Most of the financial institutions of the world use this technology. The use of online banking in today's computer technology gives you the option of bypassing the time-consuming, paper-based aspects of traditional banking to manage your finances more quickly and efficiently.

Online banking is banking at your convenience. Now a day’s all banks are encouraging their customers to use  online bank  rather than going to the bank and making transactions. This will be very powerful  to the customers to save money and time.

WORKING OF ONLINE BANKING:

Customer log on to the respective web sites provided by the banking instutions or financial instutions. Then they can view their account status. They can make transactions of their money to other account in online. For example I want buy a good from a production company, log on to the corresponding site,  select the good that I want to purchase. Then I specify  the payment to that company via my account. Then the good will be sent by the company to my address.

Similarly we can perform other operations corresponding  to the online system such as  transfering the money to other accounts, checking the bankin strategy, interests checkout, and so on.

Online banking is banking at your convenience. All banks today are encouraging customers to bank online rather than going to the bank and making transactions. This helps the customers to save money and time.

SECURITY SYSTEM IN ONLINE BANKING:

Now a day’s most of the financial instutions uses the two famous strategy for online banking:

1: The PIN/TAN System: Here the PIN represents the Password and the TAN represents the one time password to authenticate the transactions. These TANs can be distributed in different ways to the different users.one of the method is to send a list of TANs to the customer by postal letter. Another secure way of using TANs is to generate the TANS by need using a security token. These token generated TANs depend on the time and a unique secret, stored in the security token.This is called two-factor authentication or 2FA. Generally PIN/TAN is done via a web browser by using SSL secured connections.

2: Signature Based System: In signature based system all transactions are signed and encrypted digitally. The Keys for the signature generation and encryption can be stored on  any memory medium, on the basis of concrete implementation.

ADVANTAGE OF ONLINE BANKING

1: CONVENIENCE:

Unlike the  normal bank that used paper based financial records that may be closed sometime, online banking sites never close. They are available all time ie 24 hours a day, seven days a week, 365 days a year and they are just a mouse click away from you.

2: UBLIQUITY:

for example we are going somewhere and, when you are facing a money problem. then you can just log on to the internet and transfer money to the other accounts whom you need to pay the money. This helps you to make some shopping or other aggrement without having cash with you.

3: TRANSACTION SPEED:

Obviously the online banking helps you to have faster transactions

4:EFFICIENCY:

Feel free to access, manage and control all your bank accounts, including Individual Retirement Accounts, CDs, even securities, from one secure site. This is what you want to have in your life.

5: EFFECTIVENESS:

you can manage all your banking operations even without going to the bank. you get alert of transactions via mail.you can make bill payments online and transfer funds, all for free of cost.

Nepali Flag

Nepali Flag