Rss Feed Like Us on facebook Google Plus

February 16, 2012

NIIT gets 300 crore Project from Union Home Ministry

Infotech Solutions vendor NIIT Technologies today said it has bagged a deal worth Rs 300 crore to implement a Union Home Ministry project called the "Crime and Criminal Tracking Network System (CCTNS)", which will be part of the proposed Natgrid.

The company has been selected as the system integrator in Tamil Nadu, Jharkhand and Uttar Pradesh. It is in active pursuit of similar opportunities in other states as well, a senior company official said. Execution of work is already on in Tamil Nadu and Jharkhand.

"These wins are an endorsement of our leadership in providing IT solutions to the government. We have a history of successful implementations with IT programmes in Defence and home affairs," NIIT Technologies chief executive Arvind Thakur said here on the sidelines of the Nasscom leadership summit.

The CCTNS is a comprehensive and integrated nationwide system designed to help the police investigate crime and detect criminals, on which the Union Home Ministry plans to spend Rs 2,000 crore.

The system is expected to connect and share real-time information and data on crime and criminals from across the country thus strengthening the information base of investigating officers.

After the implementation of the system throughout the country, over 14,000 police stations spanning 6,000 district police headquarters, fingerprint bureaux and forensic science laboratories will be linked to a common IT platform enabling investigating officials to get the data of any criminal at the click of a mouse.

"FIRs and photographs can be made available from any police station to any other police station in real-time, after the project is completed across the country," a company official said.

Recently, NIIT Tech also commissioned a Rs 228-crore 'Intranet Prahari' project for the Border Security Force.
Read More

C Sharp(#) Interview Questions

A representative of a high-tech company in United Kingdom sent this in today noting that the list was used for interviewing a C# .NET developer. Any corrections and suggestions would be forwarded to the author. I won’t disclose the name of the company, since as far as I know they might still be using this test for prospective employees. 

 Correct answers are in green color.

1) The C# keyword .int. maps to which .NET type?
  1. System.Int16
  2. System.Int32
  3. System.Int64
  4. System.Int128
2) Which of these string definitions will prevent escaping on backslashes in C#?
  1. string s = #.n Test string.;
  2. string s = ..n Test string.;
  3. string s = @.n Test string.;
  4. string s = .n Test string.;
3) Which of these statements correctly declares a two-dimensional array in C#?
  1. int[,] myArray;
  2. int[][] myArray;
  3. int[2] myArray;
  4. System.Array[2] myArray;
4) If a method is marked as protected internal who can access it?
  1. Classes that are both in the same assembly and derived from the declaring class.
  2. Only methods that are in the same class as the method in question.
  3. Internal methods can be only be called using reflection.
  4. Classes within the same assembly, and classes derived from the declaring class.
5) What is boxing?
a) Encapsulating an object in a value type.
b) Encapsulating a copy of an object in a value type.
c) Encapsulating a value type in an object.
d) Encapsulating a copy of a value type in an object.
6) What compiler switch creates an xml file from the xml comments in the files in an assembly?
  1. /text
  2. /doc
  3. /xml
  4. /help
7) What is a satellite Assembly?
  1. A peripheral assembly designed to monitor permissions requests from an application.
  2. Any DLL file used by an EXE file.
  3. An assembly containing localized resources for another assembly.
  4. An assembly designed to alter the appearance or .skin. of an application.
8) What is a delegate?
  1. A strongly typed function pointer.
  2. A light weight thread or process that can call a single method.
  3. A reference to an object in a different process.
  4. An inter-process message channel.
9) How does assembly versioning in .NET prevent DLL Hell?
  1. The runtime checks to see that only one version of an assembly is on the machine at any one time.
  2. .NET allows assemblies to specify the name AND the version of any assemblies they need to run.
  3. The compiler offers compile time checking for backward compatibility.
  4. It doesn.t.
10) Which .Gang of Four. design pattern is shown below?
public class A {
    private A instance;
    private A() {
    }
    public
static
 A Instance
 {
        get
        {
            if ( A == null )
                A = new A();
            return instance;
        }
    }
}
  1. Factory
  2. Abstract Factory
  3. Singleton
  4. Builder
11) In the NUnit test framework, which attribute must adorn a test class in order for it to be picked up by the NUnit GUI?
  1. TestAttribute
  2. TestClassAttribute
  3. TestFixtureAttribute
  4. NUnitTestClassAttribute
12) Which of the following operations can you NOT perform on an ADO.NET DataSet?
  1. A DataSet can be synchronised with the database.
  2. A DataSet can be synchronised with a RecordSet.
  3. A DataSet can be converted to XML.
  4. You can infer the schema from a DataSet.
13) In Object Oriented Programming, how would you describe encapsulation?
  1. The conversion of one type of object to another.
  2. The runtime resolution of method calls.
  3. The exposition of data.
  4. The separation of interface and implementation.
Read More

Interview Questions for C# Developers

Useful for preparation, but too specific to be used in the interview.
  1. Is it possible to inline assembly or IL in C# code? - No.
  2. Is it possible to have a static indexer in C#? - No. Static indexers are not allowed in C#.
  3. If I return out of a try/finally in C#, does the code in the finally-clause run? - Yes. The code in the finally always runs. If you return out of the try block, or even if you do a “goto” out of the try, the finally block always runs:
    using System; 
     
    class main
    {
     public static void Main()
     {
      try
      {
       Console.WriteLine(\"In Try block\");
       return;
      }
      finally
      {
       Console.WriteLine(\"In Finally block\");
      }
     }
    } 
    Both “In Try block” and “In Finally block” will be displayed. Whether the return is in the try block or after the try-finally block, performance is not affected either way. The compiler treats it as if the return were outside the try block anyway. If it’s a return without an expression (as it is above), the IL emitted is identical whether the return is inside or outside of the try. If the return has an expression, there’s an extra store/load of the value of the expression (since it has to be computed within the try block).
  4. I was trying to use an “out int” parameter in one of my functions. How should I declare the variable that I am passing to it? - You should declare the variable as an int, but when you pass it in you must specify it as ‘out’, like the following: int i; foo(out i); where foo is declared as follows: [return-type] foo(out int o) { }
  5. How does one compare strings in C#? - In the past, you had to call .ToString() on the strings when using the == or != operators to compare the strings’ values. That will still work, but the C# compiler now automatically compares the values instead of the references when the == or != operators are used on string types. If you actually do want to compare references, it can be done as follows: if ((object) str1 == (object) str2) { … } Here’s an example showing how string compares work:
    using System;
    public class StringTest
    {
     public static void Main(string[] args)
     {
      Object nullObj = null; Object realObj = new StringTest();
      int i = 10;
      Console.WriteLine(\"Null Object is [\" + nullObj + \"]\n\"
       + \"Real Object is [\" + realObj + \"]\n\"
       + \"i is [\" + i + \"]\n\");
       // Show string equality operators
      string str1 = \"foo\";
      string str2 = \"bar\";
      string str3 = \"bar\";
      Console.WriteLine(\"{0} == {1} ? {2}\", str1, str2, str1 == str2 );
      Console.WriteLine(\"{0} == {1} ? {2}\", str2, str3, str2 == str3 );
     }
    }
    
    Output:
    Null Object is []
    Real Object is [StringTest]
    i is [10]
    foo == bar ? False
    bar == bar ? True
    
    
  6. How do you specify a custom attribute for the entire assembly (rather than for a class)? - Global attributes must appear after any top-level using clauses and before the first type or namespace declarations. An example of this is as follows:
    using System;
    [assembly : MyAttributeClass] class X {}
    
    Note that in an IDE-created project, by convention, these attributes are placed in AssemblyInfo.cs.
  7. How do you mark a method obsolete? -
    [Obsolete] public int Foo() {...}
    or
    [Obsolete(\"This is a message describing why this method is obsolete\")]
     public int Foo() {...}
    Note: The O in Obsolete is always capitalized.
  8. How do you implement thread synchronization (Object.Wait, Notify,and CriticalSection) in C#? - You want the lock statement, which is the same as Monitor Enter/Exit:
    lock(obj) { // code }
    
    translates to
    try {
     CriticalSection.Enter(obj);
     // code
    }
    finally
    {
     CriticalSection.Exit(obj);
    }
  9. How do you directly call a native function exported from a DLL? - Here’s a quick example of the DllImport attribute in action:
    using System.Runtime.InteropServices; \
    class C
    {
     [DllImport(\"user32.dll\")]
     public static extern int MessageBoxA(int h, string m, string c, int type);
     public static int Main()
     {
      return MessageBoxA(0, \"Hello World!\", \"Caption\", 0);
     }
    }
    
    This example shows the minimum requirements for declaring a C# method that is implemented in a native DLL. The method C.MessageBoxA() is declared with the static and external modifiers, and has the DllImport attribute, which tells the compiler that the implementation comes from the user32.dll, using the default name of MessageBoxA. For more information, look at the Platform Invoke tutorial in the documentation.
  10. How do I simulate optional parameters to COM calls? - You must use the Missing class and pass Missing.Value (in System.Reflection) for any values that have optional parameters.
Read More

February 15, 2012

Angry birds now officially on facebook

Angry Birds fans have a special gift this Valentine's Day — the wildly popular pig-flying game made its official debut on Facebook.

The Facebook app is similar to the original mobile version, with the addition of social components, brand new power-ups, and exclusive new levels. The added social aspect allows players to compete with their Facebook friends for gold, silver, and bronze crowns in any level. Players can also brag about their scores on the social network and give their Facebook friends "mystery gifts" of power-ups.


                    -- PLAY NOW --

The Facebook version includes four new power-ups, including "sling scope" (for better targeting), "king sling" (for more power and velocity), "super seeds" (to super-size your bird, turning it into a ""pig popping giant), and "birdquake" (to shake the battlefield and bring down pigs' defenses). Besides being gifted with power-ups, players can earn them through game play or purchase them.

And — even better — anyone who plays the game between now and Feb. 16 will receive 14 free power-ups as a special Valentine's Day gift from Angry Birds developer Rovio.
Rovio said it is lining up even more features and gameplay for the Facebook version of the game in the coming weeks.

"This launch is just the beginning for Angry Birds on Facebook," Petri Järvilehto, Rovio's senior vice president of game publishing, said in a statement.

The mobile version of Angry Birds has garnered more than 700 million downloads to date, making it one of the most popular games in history.
Read More

8 much needed techies for a IT company startup

The number of start-ups is increasing every day, and with it, positions that need techies who are well-versed with new and upcoming technologies.

Here are a number of positions that tech startups will be looking out for, according to a report from Mashable, a site that covers digital media, and technology. The site interviewed a panel of entrepreneurs to predict the IT skills that will be in demand.

SEO Experts: These techies optimize web-sites’ traffic. An experienced SEO expert will help you create back-links so the ranking of your page is improved on search engines like Google. Having an expert in SEO allows startups to target their core markets through keyword research, and makes sure that every piece of content created enhances the brand and the web presence of the company, according to Andrew Saladino from Just Bath Vanities.

Communication Experts:  These IT personnel go through every part of content before it is published, and take care of communicating ideas and techniques to other employees. In the viewpoint of Matt Cheuvront from Proof Branding, by being a techie who is comfortable and proficient in communicating efficiently, you cut down the need for a middle person while improving the efficiency and productivity of the company.

Dev-Ops: 
These techies bridge the gap between development professionals and operations. The requirement for these professionals rose when a number of IT organizations understood the emerging need and interdependence of both areas to meet goals of rapidly producing software products and services. “Because consumers are becoming more tech-hungry, and startups are using ‘lean methodologies’ to build fast, new startups are looking for people, who can combine the skills that help to scale businesses intelligently,” said Doreen Bloch from Poshly Inc.

User Experience Specialists:
These techies are curious and continuously question themselves about how users’ experience can be made better. Although they don’t see the production of a product from beginning to end, their inputs are invaluable. Benjamin Leis from Sweat EquiTees notes that user experience designers are becoming much sought after. He says, “These individuals help to streamline processes while working towards maximizing return for their clients. Mobile apps, online stores, brick and mortar stores, airline terminals, etc. — all can benefit from exceptional UX design.”

Cloud Specialists:
Startups no longer fear having to build physical servers, especially since the cloud offers an elegant solution. Eric Bahn from Beat The GMAT however notes, “Managing a strong, cloud-based server infrastructure requires some special skills and management. I expect that a lot of startups will be looking for people who know how to user cloud services like Amazon AWS and Rackspace this year.”

Data Specialists: Data specialists assist social scientists in social science research. They prepare tables, graphs, and reports summarizing research results, based on internet research. Arjun Arora from ReTargeter said that having a dedicated resource specialized in analytics will not only help transform company data into workable insights, but will also ensure that the data doesn’t impose a burden on other employees.

Mobile Developers:  With more of the customer base being increasingly accessible via mobile devices like smartphones and tablets, the need for mobile developers is widening beyond the reach of companies were conventionally expected to have this need. Ben Lang from Epic Launch said that companies are going to continue wanting to exploit the trend of consumers focusing on mobile devices, with new apps for smartphones and tablets. “This market is only going to evolve and become more and more advanced,” he said.

Business IT Specialists:
Startups usually have a lot of technical talent built in to them by default, but another important part of its structure lies in business support. This fact points to a current need for IT specialists “who are used to working with project management, accounting and other business software”, says Thursday Bram from Hyper Modern Consulting.
Read More

Programming Languages that Tech Entrepreneurs started with

Ever wonder where the biggest inventions started out, and by whom? Here is a list of programming languages, and frameworks that are behind some of the greatest technologies.
 

Facebook


Name of Developer: Mark Zuckerberg


Year:2004


Framework or Programing Language: PHP



This social networking site, which is the largest in the world, uses the PHP hypertext processor that is used for server-side scripting. Mark Zuckerberg wrote the site’s code and launched then named Thefacebook in 2004, when he was still a student at Harvard. His idea for Thefacebook came from his first attempt in late 2003, named Facemash. Facemash was later shut down by the universities’ administration.


LinkedIn


Name of Developer: Reid Hoffman


Year:2002


Framework or Programing Language: Java, C++



 Reid Hoffman, an employee at Paypal left to start this social networking site and was joined by Chris Saccheri and Lee Hower. The front end of this site is built on Java, and C++ helps take care of a few of its in-memory caches. The site allows users to connect via a “gated-access approach” which requires professionals on the site to have a pre-existing relationship, or the intervention of a common contact to connect. The site meant for professionals became popular very quickly, as a result of its strictly vocational interests, and went public last year.





iOS


Name of Developer: Steve Jobs


Year: 2007


Framework or Programing Language: Mac OSX, Darwin OS



This smooth operating system is used on the iPod Touch, iPhone, iPad and other Apple devices that have a touch-based interface. It is a derived operating system that is based on the Mac OSX. Both Mac OSX and the iOS have their roots in the Darwin operating system which was developed on UNIX predominantly by Apple, but also had contributions from NeXTSTEP, BSD, and other free software projects.



Android


Name of Developer: Andy Rubin


Year: 2003


Framework or Programing Language: Linux



This OS which is popularly used on smartphones, and tablets, is a Linux-based system that was developed by Andy Rubin and Rich Miner along with Nick Sears and Chris White in 2003. Their vision, according to Rubin, was to develop “smarter mobile devices that are more aware of its owner's location and preferences”. Development for the OS is now undertaken by the Open Handset Alliance which is piloted by Google.



WiFi


Name of Developer: Vic Hayes


Year: 1999


Framework or Programing Language: IEEE 802.11 family



WiFi is the brand name used for products that comply with the IEEE 802.11 family of standards. Vic Hayes, who developed a number of primary standards within the IEEE is known as the “Father of WiFi”. Since 2000, the internet was made available anywhere and at anytime because of the widespread use of this technology. This mechanism which allowed devices to exchange data wirelessly changed the face of technology and allowed laptops to become more popular than even desktop computers.




Linux


Name of developer: Linus Torvalds


Year:1991


Framework or Programing Language:inspired by MINIX



This Unix-like OS was initiated by Linus Torvalds in an attempt to build a portable operating system that was similar to the MINIX system. Since the scope of the MINIX system was limited to educational use, Linus started working on the kernel of the Linux system in 1991, and has contributed to about 2 percent of the entire system. The Linux system is built on the free and open source software development model and Torvalds retains the rights to determine which properties are retained by the kernel. Linux is one of the most preferred operating systems in the world, with a number of super- computers running on it.





Ruby


Name of Developer: Yukihiro Matsumoto


Year: 1990’s


Framework or Programing Language: Inspired by Perl



This programming language, developed in the 1990’s by Yukihiro Matsumoto from Japan, was inspired by the Perl and Eiffel languages, and has a couple of features from the Smalltalk OOPs. The specifications of Ruby language are developed by the Open Standards Promotion Center of the Information-Technology Promotion Agency (in Japan). Matsumoto stated that he decided to create the language because of the need for a "...language that was more powerful than Perl, and more object-oriented than Python."

Read More

February 14, 2012

10 Commandments of Software Testing

"Software Testing is a systematic activity but it also involves economics and human psychology." - Glenford J. Myers

Economics of software testing is to determine and predict the faults of the system early by using foreseeable models and applying structured test strategies and test methodologies to discover those at early phases of the software development life cycle.

Psychology of testing is to destructively test the application by identifying as many exceptional or out of the box scenarios or sometimes called as the third vision.

A set of good test scenarios evaluates every possible permutations and combinations of a program during ideal conditions. In addition, Software Test Engineer needs the proper vision to successfully test a piece/whole application to comply with the Standards and the Quality.

Whenever Software Test Engineer tests a program, they should add some value in it rather than performing only the requirements conformance and validation. A systematic and well planned test process adds the value of quality and reliability of the software program.

The most important considerations in the software testing are the issues of psychology, leading to the set of principles and guidelines to evaluate software quality:

1. Testing is the process of experimenting a software component by using a selected set of test cases, with the intent of revealing defects and evaluate quality Software Test Engineer executes the software using test cases to evaluate properties such as reliability, usability, maintainability, and level of performance. Test results are used to compare the actual properties of the software to those specified in the requirements document as quality goals.

Deviations or failure to achieve quality goals must be addressed. Software Testing has a broader scope rather being only limited to the execution of program or detecting errors more rigorously as described in the test process improvement models such as TMMi framework models.

2. When the test objective is to detect defects, then a good test case is one that has a high probability of revealing a yet undetected defect(s).

Principle 2 supports a strong and robust designing of test cases. This means that each test case should have a goal to identify or detect a specific type of defect. Software Test Engineer approaches the scientific method of designing the tests to prove or disapprove the hypothesis by the means of test procedures.

3. A test case must contain the expected output or result. Principle 3 supports the fact that a test case without expected result is of zero value. Expected output or result determines whether a defect has been revealed or the conditions have been passed during the execution cycle.

4. Test cases should be developed for both valid and invalid input conditions. Use of test cases that are based on invalid inputs is very useful for revealing defects since they may exercise the code in unexpected ways and identify unexpected software behaviour. Invalid inputs also help developers and Software Test Engineers to evaluate the robustness of the software, that is, its ability to recover when unexpected events occur (in this case an erroneous input).

For example, software users may have misunderstandings, or lack information about the nature of the inputs. They often make typographical errors even when complete/correct information is available. Devices or software program may also provide invalid inputs due to erroneous conditions and malfunctions.

5. The probability of the existence of additional defects in a software component is proportional to the number of defects already detected in that component. Principle 5 supports to the fact that the higher the number of defects already detected in a component, the more likely it is to have additional defects when it undergoes further testing.

For example, if there are two components A and B, and Software Test Engineers have found 20 defects in A and 3 defects in B, then the probability of the existence of additional defects in A is higher than B. This empirical observation may be due to several causes and degree of influence of the software factors. Defects often occur in clusters and often in code that has a high degree of complexity and is poorly designed.

6. Test Cases must be repeatable and reusable. Principle 6 is utmost important and plays a vital role supporting the fact that it is also useful for tests that need to be repeated after defect repair. The repetition and reuse of tests is also necessary during regression test (the retesting of software that has been modified) in the case of a new release of the software.

7. Testing should be carried out by a group that is independent of the development group. This principle holds true for psychological as well as practical reasons and does not say that it is impossible for a programming organization to find some of its errors, because organizations do accomplish this with some degree of success. Rather, it implies that it is more economical for testing to be performed by an objective, independent party which gives a direction of the third vision by the means of test cases. Finally, independence of the testing group does not call for an adversarial relationship between developers and Software Test Engineers.

8. Test Activities should be well planned. Test plans should be developed for each level of testing, and objectives for each level should be described in the associated plan. The objectives should be stated as quantitatively as possible. Plans, with their precisely specified objectives, are necessary to ensure that adequate time and resources are allocated for testing tasks, and that testing can be monitored and managed.

Test planning must be coordinated with project planning. A test plan is a roadmap for the testing which should be mapped to organizational goals and policies pertaining to the software program.

Test risks must be evaluated at each levels of testing. Careful test planning avoids wasteful "throwaway" tests and unproductive and unplanned "test-patch-retest" cycles that often lead to poor-quality software and the inability to deliver software on time and within budget.

9. Avoid throwaway test cases unless the program is truly a throwaway program. Whenever the program has to be tested, the test cases must be reinvented. More often than not, since this reinvention requires a considerable amount of work, Software Test Engineer tends to avoid it. Therefore, the retest of the program is rarely as rigorous as the original test, meaning that if the modification causes a previously functional part of the program to fail, this error often goes undetected.

10. Test results should be inspected meticulously. This is probably the most obvious principle, but again it is something that is often overlooked.

Weve seen numerous tests that show many subjects failed to detect certain errors, even when symptoms of those errors were clearly observable on the output listings. Put another way, errors that are found on later tests are often missed in the results from earlier tests.

For example:
I. A failure may be overlooked, and the test may be granted a "PASS" status when in reality the software has failed the test. Testing may continue based on erroneous test results. The defect may be revealed at some later stage of testing, but in that case it may be more costly and difficult to locate and repair.

II. A failure may be suspected when in reality none exists. In this case the test may be granted a "FAIL" status. Much time and effort may be spent on trying to find the defect that does not exist. A careful re-examination of the test results could finally indicate that no failure has occurred.

Summarizing all the above principles, Testing is an extremely creative and intellectually challenging task. Creativity required in testing a large program exceeds the creativity required in designing or developing that program. We already have seen that it is impossible to test a program sufficiently to guarantee the absence of all errors. This requires a systematic test process and methodologies to design the robust test cases.

This principle supports that:

1. A Software Test Engineer needs to have comprehensive knowledge of the software engineering discipline.

2. A Software Test Engineer needs to have knowledge from both experience and education as to how software is specified, designed, and developed.

3. A Software Test Engineer needs to have knowledge of fault types and where faults of a certain type might occur in code constructs.

4. A Software Test Engineer needs to reason like a scientist and propose hypotheses that relate to presence of specific types of defects.

5. A Software Test Engineer needs to have a good grasp of the problem domain of the software that he/she is testing.

6. A Software Test Engineer needs to create and document test cases. To design the test cases the Software Test Engineer must select inputs often from a very wide domain.

7. A Software Test Engineer needs to design and record test procedures for running the tests.

8. A Software Test Engineer needs to execute the tests and is responsible for recording results.

9. A Software Test Engineer needs to analyze test results and decide on success or failure for a test. This involves understanding and keeping track of an enormous amount of detailed information.

10. A Software Test Engineer needs to know the method for collecting and analyzing test related measurements.

References:

The principles and the excerpts have been taken from the following books:
1. The Art of Software Testing by Glenford J. Myers
2. Software Testing Principle by Bertrand Meyer
3. Practical Software Testing by Ilene Burnstein
4. TMMi Framework by TMMi Foundation.
Read More

February 13, 2012

Know the Bad Guys of Internet

Because of users’ various connections and sharing habits, the Internet has become a social hub similar to a virtual neighborhood. However, not everyone on the Internet wants to socialize and create connections. There are people out there who craft online threats designed to steal your precious information, like your email address, social security details, credit card and banking credentials. These are the guys who are out to make a quick buck.

With millions of users going online every second, the Internet isn’t exactly the safest place to be. In light of this, have you ever asked yourself: how much do I know about my virtual neighbors?

Make no mistake about it: cyber-criminals are out there lurking around your online neighborhood. They may pretend to be a trusted contact, a well-known vendor, or even a new friend you made online.

For example, a social media scammer will have following characters.
Motive: Steal your social media login credentials
Modus Operandi: Spam the social media account with links to malicious videos, apps and promos.
Famous Line: "OMG! This is so FUNNY"

The attackers can vary from phishers, fake anti-virus creators, App trojanizers, spammers and Malvertisers.

The infographic also has details on how much money the cyber criminals make from stolen data in black market. They will get $15 for 1000 Facebook accounts, $8 for 1000 web mail accounts, $75 for 2200 Twitter accounts.

The price of credit card number will range from $1 to $10 depending on the regions. A hacker gets $1 to $3 for a U.S. credit card number while an Asian or Middle East credit card details will earn him $6 to $10. 

"The difference in value can be accounted for supply and demand", said Rik Ferguson, director of security at Trend Micro. "Security mechanisms for U.S. cards are, in general, much lower than European ones, Chip and PIN, for example, is hardly deployed at all in the U.S, which will make the work easy for criminals", he explained. 


Read More

© 2011-2016 Techimpulsion All Rights Reserved.


The content is copyrighted to Tech Impulsion and may not be reproduced on other websites.