28, నవంబర్ 2012, బుధవారం
27, నవంబర్ 2012, మంగళవారం
London, Nov 22 (ANI): One in five people searching for designer products at low cost actually end up buying counterfeit goods, according to a report.
According to the new consumer report conducted by MarkMonitor,
20 per cent of people shopping from the U.S. and Europe are tricked
into purchasing products from fraudulent websites while looking for a
good deal on the Internet.
The report also said that most of
the time people have absolutely no idea that they are purchasing
counterfeit products, the Daily Mail reports.
According to WWD, MarkMonitor
surveyed online users in six countries over a period of nine months,
monitoring close to 9 million shopping sessions through approximately
9,000 different websites.
The study revealed that for every one customer intentionally purchasing fake goods, 20 were just hoping to find a bargain.
The report pointed out that
shoppers taken to scam sites are simply searching terms like 'cheap,'
'discount' and 'outlet' in front of a designer product name.
And the fake sites, which often use real photos of designer items, offer 25 to 50per cent below regular retail prices. (ANI)https://www.google.com.et/search?hl=en&tbo=d&output=search&sclient=psy-ab&q=latest+frauds+on+web&btnG=
WASHINGTON (Reuters) - U.S. and European authorities seized 132 domain names in a counterfeit goods crackdown linked to Cyber Monday, the online bargain day, the head of U.S. Immigration and Customs Enforcement said.
ICE agents seized 101 domain names in the United States and 31 were taken over by officers in Britain, Romania, Belgium, France and Denmark and by Europol, the European Police Office, ICE Director John Morton said.
The sites, many linked to organized crime, were selling fake goods that ranged from National Football League jerseys and Nike Inc shoes to Adobe Systems Inc software, he said.
"There is much money to be made out there duping
consumers and that is what is going on," Morton said on a conference
call.Investigations are ongoing and more sites will be seized in coming days.
In the United States, 41 rights owners' merchandise was being sold on the seized sites, Morton said.
ICE said in a statement that one U.S. arrest had been made.
The crackdown marks
the third year that ICE has targeted websites selling counterfeit goods
on Cyber Monday, the online shopping spree. It is the first time the
agency has carried out the operation with European police.
The Cyber Monday
seizures raise the total number of U.S. sites taken over to 1,630 since
ICE began its anti-counterfeit campaign in June 2010.
PayPal accounts
identified with the sites and holding a total of more than $175,000 are
being targeted for seizure, the ICE statement said.
Morton put the
scale of online piracy in the billions of dollars. Much of the online
counterfeiting is in China and other parts of Asia, and U.S. authorities
are working with China on the problem, he said.
(Reporting by Ian Simpson; Editing by Dan Grebler)
Diffie-Hellman Example
#include <stdio.h>
#include <math.h>
void main()
{
int q,alpha,xa,xb,ya,yb,ka,kb, x,y,z,count,ai[20][20];
printf("Enter a Prime Number \"q\":");
scanf("%d",&q);
printf("Enter a No \"xa\" which is lessthan value of q:");
scanf("%d",&xa);
printf("Enter a No \"xb\" which is lessthan value of q:");
scanf("%d",&xb);
for(x=0;x<q-1;x++) //Primitive Root Calculation
for(y=0;y<q-1;y++)
ai[x][y] = ((int)pow(x+1,y+1))%q;
for(x=0;x<q-1;x++)
{
count = 0;
for(y=0;y<q-2;y++)
{
for(z=y+1;z<q-1;z++)
if(ai[x][y] == ai[x][z])
{
count = 1;
break;
}
if(count == 1)
break;
}
if (count == 0 )
{
alpha = x+1;
break;
}
}
printf("alpha = %d\n",alpha);
ya = ((int)pow(alpha,xa))%q; yb = ((int)pow(alpha,xb))%q;
ka = ((int)pow(yb,xa))%q; kb = ((int)pow(yb,xb))%q;
printf("ya = %d\nyb = %d\nka = %d\nkb = %d\n",ya,yb,ka,kb);
#include <math.h>
void main()
{
int q,alpha,xa,xb,ya,yb,ka,kb, x,y,z,count,ai[20][20];
printf("Enter a Prime Number \"q\":");
scanf("%d",&q);
printf("Enter a No \"xa\" which is lessthan value of q:");
scanf("%d",&xa);
printf("Enter a No \"xb\" which is lessthan value of q:");
scanf("%d",&xb);
for(x=0;x<q-1;x++) //Primitive Root Calculation
for(y=0;y<q-1;y++)
ai[x][y] = ((int)pow(x+1,y+1))%q;
for(x=0;x<q-1;x++)
{
count = 0;
for(y=0;y<q-2;y++)
{
for(z=y+1;z<q-1;z++)
if(ai[x][y] == ai[x][z])
{
count = 1;
break;
}
if(count == 1)
break;
}
if (count == 0 )
{
alpha = x+1;
break;
}
}
printf("alpha = %d\n",alpha);
ya = ((int)pow(alpha,xa))%q; yb = ((int)pow(alpha,xb))%q;
ka = ((int)pow(yb,xa))%q; kb = ((int)pow(yb,xb))%q;
printf("ya = %d\nyb = %d\nka = %d\nkb = %d\n",ya,yb,ka,kb);
if(ka == kb)
printf("The keys exchanged are same");
else
else
printf("The keys exchanged are not same");
}
}
- Here is an example of Duffie-Hellman using small numbers.
- The eavesdropper monitors what is sent between the sender and
the recipient, but does not alter the contents of their communications.
a = sender's private key a = 3 b = recipient's private key b = 4 g = public base g = 1 p = public (prime) number p = 5 s = shared secret key s = 1
- The eavesdropper monitors what is sent between the sender and
the recipient, but does not alter the contents of their communications.
|
|
|
RSA algorithm in C
Public-key systems–or asymmetric cryptography–use two different keys with a mathematical relationship to each other. Their protection relies on the premise that knowing one key will not help you figure out the other. The RSA algorithm uses the fact that it’s easy to multiply two large prime numbers together and get a product. But you can’t take that product and reasonably guess the two original numbers, or guess one of the original primes if only the other is known. The public key and private keys are carefully generated using the RSA algorithm; they can be used to encrypt information or sign it.
Key generation
1) Pick two large prime numbers p and q, p != q;
2) Calculate n = p × q;
3) Calculate ø (n) = (p − 1)(q − 1);
4) Pick e, so that gcd(e, ø (n)) = 1, 1 < e < ø (n);
5) Calculate d, so that d · e mod ø (n) = 1, i.e., d is the multiplicative inverse of e in mod ø (n);
6) Get public key as KU = {e, n};
7) Get private key as KR = {d, n}.
1) Pick two large prime numbers p and q, p != q;
2) Calculate n = p × q;
3) Calculate ø (n) = (p − 1)(q − 1);
4) Pick e, so that gcd(e, ø (n)) = 1, 1 < e < ø (n);
5) Calculate d, so that d · e mod ø (n) = 1, i.e., d is the multiplicative inverse of e in mod ø (n);
6) Get public key as KU = {e, n};
7) Get private key as KR = {d, n}.
Encryption
For plaintext block P < n, its ciphertext C = P^e (mod n).
Decryption
For ciphertext block C, its plaintext is P = C^d (mod n).
/* C program for the Implementation Of RSA Algorithm Encrypt the text data and Decrypt the same */For plaintext block P < n, its ciphertext C = P^e (mod n).
Decryption
For ciphertext block C, its plaintext is P = C^d (mod n).
#include<stdio.h>
#include<conio.h>
int phi,M,n,e,d,C,FLAG;
int check()
{
int i;
for(i=3;e%i==0 && phi%i==0;i+2)
{
FLAG = 1;
return;
}
FLAG = 0;
}
void encrypt()
{
int i;
C = 1;
for(i=0;i< e;i++)
C=C*M%n;
C = C%n;
printf(“\n\tEncrypted keyword : %d”,C);
}
void decrypt()
{
int i;
M = 1;
for(i=0;i< d;i++)
M=M*C%n;
M = M%n;
printf(“\n\tDecrypted keyword : %d”,M);
}
void main()
{
int p,q,s;
clrscr();
printf(“Enter Two Relatively Prime Numbers\t: “);
scanf(“%d%d”,&p,&q);
n = p*q;
phi=(p-1)*(q-1);
printf(“\n\tF(n) phi value\t= %d”,phi);
do
{
printf(“\n\nEnter e which is prime number and less than phi \t: “,n);
scanf(“%d”,&e);
check();
}while(FLAG==1);
d = 1;
do
{
s = (d*e)%phi;
d++;
}while(s!=1);
d = d-1;
printf(“\n\tPublic Key\t: {%d,%d}”,e,n);
printf(“\n\tPrivate Key\t: {%d,%d}”,d,n);
printf(“\n\nEnter The Plain Text\t: “);
scanf(“%d”,&M);
encrypt();
printf(“\n\nEnter the Cipher text\t: “);
scanf(“%d”,&C);
decrypt();
getch();
}
Overview
Key Generation
Publish e and n as the public key.
Keep d and n as the secret key. |
EncryptionC = Pe % n |
DecryptionP = Cd % n | |
x % y means the remainder of x divided by y |
I'll now go through a simple worked example.
Key Generation
1) Generate two large prime numbers, p and q
To make the example easy to follow I am going to use small numbers, but this is not secure. To find random primes, we start at a random number and go up ascending odd numbers until we find a prime. Lets have:
p = 7
q = 19
q = 19
2) Let n = pq
n = 7 * 19
= 133
= 133
3) Let m = (p - 1)(q - 1)
m = (7 - 1)(19 - 1)
= 6 * 18
= 108
= 6 * 18
= 108
4) Choose a small number, e coprime to m
e coprime to m, means that the largest number that can exactly divide both e and m (their greatest common divisor, or GCD) is 1. Euclid's algorithm is used to find the GCD of two numbers, but the details are omitted here.
e = 2 => GCD(e, 108) = 2 (no)
e = 3 => GCD(e, 108) = 3 (no)
e = 4 => GCD(e, 108) = 4 (no)
e = 5 => GCD(e, 108) = 1 (yes!)
e = 3 => GCD(e, 108) = 3 (no)
e = 4 => GCD(e, 108) = 4 (no)
e = 5 => GCD(e, 108) = 1 (yes!)
5) Find d, such that de % m = 1
This is equivalent to finding d which satisfiesde = 1 + nm
where n is any integer. We can rewrite this as d = (1 + nm) / e
. Now we work through values of n until an integer solution for e is found:
n = 0 => d = 1 / 5 (no)
n = 1 => d = 109 / 5 (no)
n = 2 => d = 217 / 5 (no)
n = 3 => d = 325 / 5
= 65 (yes!)
To do this with big numbers, a more sophisticated algorithm called extended Euclid must be used.n = 1 => d = 109 / 5 (no)
n = 2 => d = 217 / 5 (no)
n = 3 => d = 325 / 5
= 65 (yes!)
Public Keyn = 133e = 5 |
Secret Keyn = 133d = 65 |
Communication
Encryption
The message must be a number less than the smaller of p and q. However, at this point we don't know p or q, so in practice a lower bound on p and q must be published. This can be somewhat below their true value and so isn't a major security concern. For this example, lets use the message "6".
C = Pe % n
= 65 % 133
= 7776 % 133
= 62
= 65 % 133
= 7776 % 133
= 62
Decryption
This works very much like encryption, but involves a larger exponentiation, which is broken down into several steps.
P = Cd % n
= 6265 % 133
= 62 * 6264 % 133
= 62 * (622)32 % 133
= 62 * 384432 % 133
= 62 * (3844 % 133)32 % 133
= 62 * 12032 % 133
We now repeat the sequence of operations that reduced 6265 to 12032 to reduce the exponent down to 1.= 6265 % 133
= 62 * 6264 % 133
= 62 * (622)32 % 133
= 62 * 384432 % 133
= 62 * (3844 % 133)32 % 133
= 62 * 12032 % 133
= 62 * 3616 % 133
= 62 * 998 % 133
= 62 * 924 % 133
= 62 * 852 % 133
= 62 * 43 % 133
= 2666 % 133
= 6
And that matches the plaintext we put in at the beginning, so the algorithm worked!= 62 * 998 % 133
= 62 * 924 % 133
= 62 * 852 % 133
= 62 * 43 % 133
= 2666 % 133
= 6
at another example
RSA Encryption
PUBLIC KEY ENCRYPTION
• RSA encryption is the modern standard for sending secure information.• RSA is based on the modular arithmetic of primes.
In the mid 1970s, three MIT researchers, Ron Rivest, Adi Shamir, and Leonard Adleman, discovered a new method of encryption that relies on the properties of primes and modular arithmetic. This system, RSA (initials of the discoverers), has remained secure for over 20 years, although countless people have attempted to breach it. In 1982, Rivest, Shamir, and Adleman founded RSA Security, a company that would go on to provide the standard in data encryption used worldwide on the Internet.
RSA encryption relies not on one key, as in our previous Caesar cipher examples, but on two. One of these keys is made public, and the other is kept private. If you wish someone to send you an encrypted message, you simply tell them your public key, and they can then encrypt their message so that only you can read it. They do not need to know your private key for this system to work. Here is a brief, and somewhat simplified, description of the process.
As we have seen throughout this unit, multiplying two primes together is easy to do, but factoring a large number into primes is a nightmarish trial-and-error scenario if the number has only two large primes as factors. This property of primes provides the basis of the RSA encryption scheme.
In general, to encrypt a message using the RSA method, we choose two large primes, p and q, and multiply them to produce a number N. The number N will be the modulus of our system and will be made public. This is fine; because p and q are both large and prime, their product, N, will be practically impossible to factor and can be confidently made public knowledge. We will now use p and q to make our public and private keys.
To make our keys, we first subtract 1 from both p and q and then multiply the results: (p-1)(q-1) = T. At this point, we will choose our public key, which can be any number less than T that shares no factors with it. This public key is what we referred to in the previous section as e. To construct our private key, we need to identify a number, d, such that when it is multiplied by e, the public key, it is congruent to 1 mod T. In other words, the following congruence must hold:
d × e ≡ 1 mod T
Now, if we want someone to send us a message that only we can read, we tell them the modulus, N, and the encryption key, e. They then convert their message from letters to a series of number strings, or "words," just as we have been doing in previous sections of this text. We must be careful that none of the words are larger than the modulus, which would result in some words being indecipherable. Let's say this word is the number M. The encrypter raises each word to the "eth" power, mod N. This new word, let's call it C, is now encrypted and can be sent to us. In mathematical terms, we have:
C ≡ Me mod N
We receive the coded number C. To decrypt it, all we have to do is raise it to the "dth" power, mod N. This works because Cd ≡ (Me)d mod N, and Rivest, Shamir, and Adleman were able to show that Med ≡ M mod N. Recall that we chose e and d such that, d times e triple equal 1 mod T (d × e = 1 mod T), so there is some mathematics hidden in this statement! Thus, our private key, known
only to us, undoes the encryption of the public key. Anyone who knows e and N can send us a message that only we, because we know d, can decrypt. To get a better idea, let's look at an example.
A WORKED EXAMPLE OF RSA ENCRYPTION
Real RSA encryption uses very large numbers, which would be very difficult— not to mention less than illuminating—to use here. In this example, we'll use smaller numbers that are not at all realistic but that illustrate how the method works.First, let's choose the primes that form the foundation of our scheme, p and q:
p = 17 and q = 19
By multiplying p and q, we get our modulus, N:
N = 17 × 19 = 323
Now, we find T by subtracting 1 from both p and q and multiplying:
T = (p-1) × (q-1) = (16) × (18) = 288
Next, we can select the encryption key, the public key, e, so that it has no common factors with 288. Let's let e = 11.
To find the decryption key, d, we need a number that, multiplied by e, gives a product that is congruent to 1 mod 288. Expressed mathematically, we need to find a number d such that:
11 × d = 1 + n(288)
Using trial and error, we find that 131 works because 11 × 131 = 1 + 5(288).
So, our public key is N = 323 and e = 11.
The private key is d = 131.
If someone wants to send us the message "ABC" securely, using this scheme, we tell them N and e. They first convert "ABC" to "123" and then do the following arithmetic:
123e = (123)11 mod 323 = 81
The sender could then send the message, "81," over a public line of communication with confidence.
To decrypt the code, "81," we can use N and d as follows:
81d = (81)131 mod 323 = 123
The message "81" becomes "123" after decryption, which we can then easily convert to "ABC," which was the intended message.
Notice that in order to break this scheme, a hacker would have to find the two numbers that when multiplied together yield 323. The square root of 323 is a little less than 18, so they would have to try a maximum of 7 divisors before they would be guaranteed to break the modulus into the original primes that were used to find the public and private keys. Using a computer, this would not be difficult, so real RSA encryption uses numbers that are sufficiently large so that even the fastest computers would take longer than a human lifespan to factor them. It is upon this foundation, the difficulty of factoring products of two large prime numbers, that modern data encryption rests.
23, నవంబర్ 2012, శుక్రవారం
DEAR RAMANJANEYULU DAYINABOYINA (LOGIN ID: D_RAMU2002@YAHOO.COM), HERE ARE NEW JOBS MATCHING YOUR PROFILE.
Dear RAMANJANEYULU DAYINABOYINA (Login ID: d_ramu2002@yahoo.com), Here are new jobs matching your profile. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
You last updated your profile on 25th Oct, 2012. Remember, employers prefer recently updated profiles | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Double your visibility and enhance your job search. Call 1800-102-5557 (toll free) now! | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
You last updated your profile on 25th Oct, 2012. Remember, employers prefer recently updated profiles | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Unsubscribe | Report a problem You have received this mail because your e-mail ID is registered with Naukri.com. This is a system-generated e-mail, please don't reply to this message. The jobs sent in this mail have been posted by the clients of Naukri.com. IEIL has taken all reasonable steps to ensure that the information in this mailer is authentic. Users are advised to research bonafides of advertisers independently. IEIL shall not have any responsibility in this regard. We recommend that you visit our Terms & Conditions and the Security Advice for more comprehensive information |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
14, నవంబర్ 2012, బుధవారం
WINDOWS 8: DIFFERENT VERSIONS EXPLAINED AND INDIAN PRICING
Ramu dayinaboyina Oct
26, 2012, 07.51AM IST
(The new OS is significantly…)
NEW DELHI: Windows 8 has been launched. The new OS is
significantly different from Windows 7 or
Windows XP. It has a number of new features that will -- for good or bad --
change the way you work with computers. We highlighted some of the changes in
a feature here as well as talked about how Windows 8
fares in day-to-day usage.
If you are planning to get Windows 8, you should read them
and then decide whether you want or not. But just to recap, here are a few
points that may help you reach a decision:
1-Windows 8 has some learning curve associated with it, but
once you get hang of how it works (it will take around a week or two), you will
find that Windows 8 is overall much simpler to use and is much better looking
compared to earlier Windows.
2-Windows 8 works best if you have computer or laptop with a
touchscreen.
3-If you like the simplicity and user interface of tablets,
you will likely love Windows 8.
4-Overall, Windows 8 is faster and smoother compared to
Windows 7.
5-Microsoft has tried to simplify the OS. In some cases this
means lots of options used by power users are buried deep inside the system.
For example, even Start button has been removed. You may not like Windows 8 if
you are a power user.
6-Currently, the Windows Store doesn't have many apps that
you may use on daily basis. But whatever apps it has are beautiful and simple
to use. Though some users may find the apps too simple.
So, after carefully weighing everything you decided to get
Windows 8? Ok. But before we talk about availability, let's take a look at
different versions of Windows 8.
Windows RT: Pay special attention to this
version. A consumer won't be able to buy it in the open market but it is
important that you know about it. Windows RT is the most basic version of
Windows 8. It is meant ONLY for computers or tablets that run on ARM
processors. This means, if a tablet or computer runs on AMD or Intel processor it
can't be powered by Windows RT. At least, not at the moment.
The difference between Windows RT and other versions of
Windows 8 is that on the device powered by Windows RT, you will not be able to
run legacy apps. If you are a geek, here is a better explanation: Windows RT
can't run X86 programmes. Only compatible programmes sold or distributed
through Windows Store will run on devices powered by Windows RT. This means if
you buy Microsoft Surface, a tablet which is powered by Windows RT, you can't
download and run VLC Player or Picasa or Firefox on it.
To be specific, Windows RT is meant for tablets. It will
offer probably better battery life and will be much simpler to use, but in
terms of functionality, it is likely to be limited compared to a proper
computer.
Windows 8 Enterprise: This
version is for customers who want volume licencing. The enterprise version has
several specific features that are important for system administrators in large
companies.
Windows 8: This is the vanilla version of the
new OS. And it lacks features like Encryption and Windows-To-Go. Currently,
Microsoft has not announced any pricing for it.
Windows 8 Pro: This is the version of Windows that
Microsoft is pushing in the market at the moment. It has almost all the
features of Windows 8. The only bits missing are the
ones used by enterprise customers. If you are buying a computer with Windows 8
or want to update the OS on your existing machine, this is the version you
should buy.
Hardware requirements: Microsoft
has said that any computer that is running Windows 7 can run Windows 8 with
ease. If you want to be specific, the company says that a machine should have:
1GHz or faster processor, 1GB RAM (32-bit) or 2GB RAM
(64-bit), 16GB available hard disk space (32-bit) or 20GB (64-bit), DirectX 9
graphics device with WDDM 1.0 or higher driver. For Modern UI apps a screen
with a resolution
of 1024x768 pixels is mandatory.
Now, let's talk about how you can get Windows 8.
Microsoft believes that most people will get the new OS when
they buy a new computer. So, it is focussing a lot on making sure that Windows
8 runs on all new computers sold in the market. According to the company, from
today onwards over 250 models of Windows 8-powered computers and tablets will
be available in Indian market.
But if you are someone who wants to buy Windows 8 for your
existing computer, you have three options at the moment.
If you bought your computer after June 2, 2012 you can pay
Rs 699 to upgrade to Windows 8 Pro. This offer will last until January 31,
2013.
If you use Windows XP, Windows Vista
or Windows 7, you can upgrade to Windows 8 Pro after paying Rs 1,999. This
offer will last until January 31, 2013. One important thing to note here is
that this offer is applicable only if you download the installation disk of
Windows 8 from Microsoft website.
If for some reason you cannot download the OS and need the
retail box, you can buy Windows 8 Pro at a price of around Rs 4,000. This offer
too is valid until January 31, 2013. After that the OS is likely to cost above
Rs 11,000.
Upgrade to Windows 8 Pro from your pirated Windows 7 Clean installation steps Rate Topic:
Yes, you can get Windows 8 Pro for just $39.99 USD even if you have non-legit pirated version of Windows 7. I'm not encouraging piracy. I'm just stating that it's the right time to convert/upgrade your pirated copy of Windows OS to genuine one.
Here are the steps for the clean installation of Windows 8 with the Upgrade license.
- Download Windows 8 Pro Upgrade Assistant. The file is 5 MB only.
- It will scan your Windows 7 license. SLIC injection passes the test.
- Chose the digital download and make payment via Credit Cards or PayPal.
- You will get your product key after the payment.
- After downloading the setup files, you will be asked to choose how you want the OS.
- It's recommended to build an ISO file and burn it to a DVD with built in DVD burner software, if you are upgrading from Windows 7 (legit or non-legit).
- After burning the DVD, turn off your PC, and set your DVD drive as the primary drive in BIOS.
- Start the PC and the installation will start. You can format the C: drive and recreate the partition at this stage.
- Installation is automated and will take a few minutes only. Enjoy your shiny new OS after the installation.
Remember, you don't have to backup your old copy of Windows 7 and it's product code. Just backup the DVD of Windows 8 and keep your product code at the safe place. Next time, whenever you need to re-install Windows 8, just pop-in the Windows 8 DVD.
This post has been edited by RamuDayinaboyina: 26 October 2012 - 01:12
PM
దీనికి సబ్స్క్రయిబ్ చేయి:
పోస్ట్లు (Atom)