Ad Dispenser Server

Ad Dispenser Server

Ad Dispenser Server

A robust ad server is developed for automating the advertisements on various websites is called Ad Dispenser Server. By using this proposed software, we can serve our text ads about products or companies in websites. It is useful for the companies to develop their business and earn more profit. We can use different text styles of Google Ads in our text ads to attract people about our services or products.

Read more about Ad Dispenser Server

SMS Controlled Industrial Controller

SMS Controlled Industrial Controller

SMS Controlled Industrial Controller

A project which is developed to control the process in the industry and to check the status of the each process the proposed project i.e. SMS Controlled Industrial Controller is developed. Here we implemented this project using the LAB VIEW. Using this project we can monitor any number of process parameters in the industry. In the existing system it is very difficult for the user to monitor all the process in the industry because he has to be present all   the time and maintain system manually. If user is not present, entire system will get damaged.  To solve all these drawbacks and disadvantages of existing system proposed, new system is developed. The hardware requirements of the process are fulfilled by the hardware unit of this system.

Read more about SMS Controlled Industrial Controller

Cold Boot Attack

Cold Boot Attack

Most of peoples believe that, in situations like during power failure in modern computers, at room temperature and even when DRAM is removed from its motherboard, DRAMs will retain their contents for few seconds. But DRAMs are not so reliable because hackers can retrieve usable full-system memory images and important contents of DRAMs when DRAMs are not immediately erased/when they are not refreshed. Surprisingly, researches made by the Researchers of Princeton University have clearly shown that the contents of RAM in modern computers remain undamaged after the system BIOS or boot code has finished running, and these can be exploited. To explain this, at the beginning we need to switch off the system and then we will try to capture and analyze the memory of DRAMs.

Read more about Cold Boot Attack