Basic of Java

Introduction

        Java is an object oriented programming language and a platform developed by the  James GoslingMike Sheridan, and Patrick Naughton initiated the Java language project. The small team of sun engineers called Green Team. in June 1991.
It is a fully platform independent language  

Platform Independent  Any hardware or software environment in which a program runs, known as a platform. Since Java has its own Runtime Environment (JRE) and API, it is called platform
                    Thus the system which have a support to the java platform can run the java program their is no any changes is required in the program. Their is only the java class files are used which are a intermediate code generated by the compiler.
                      In java the Intermediate code is generated by the Compiler are used by the Java Virtual Machine (JVM)  and it  converts its into the machine code to execute the program.

Kernal : The Heart of OS



             The KERNAL was initially written for the Commodore PET by John Feagans, who introduced the idea of separating the BASIC routines from the operating system. It was further developed by several people, notably Robert Russell added many of the features for the VIC-20 and the C64.
             In computing Kernal is the main component of most operating system. The kernal also known as the heart of an OS.It is working as a bridge between the application and the actual data processing done at the hardware level.
            As a collection of programs written in 'C language'  that directly interact with hardware and most of manages the task like memory management , task scheduling, process management, Device management and file management, etc ....but the kernal is a program that constitutes the central core of the computer OS.It has complete control over everything that occurs in the system.
           When the system starts, the kernal is being first loaded into the memory during the boot time and it should be remains their for the entire duration of the computer session, because the services of the kernal requires continuously. The kernal is the part of OS which is responsible for all other operations.
           Unix kernal is directly above the hardware kernal manages all hardware  devices and controls programs run on the computer it is loaded into the memory when system is booted.

How Kernal works?


          When a computer boots up, it goes through some initialization functions (Like Memory checking). Then it loads the kernal and switch the control to it. Then the kernal starts up  all the required processes needed to communicate with the user and the rest of the environment (e.g. LAN).
          The kernal itself does not interact  directly with the user but rather interacts with the shell and other programs as well as with the hardware device on the system including the CPU, Memory and Disk drive.
A kernal can be contrasted with a, which is the program that interacts with user commands.
       

Way to keep secure E-mail


E-mail is the most widely used forms of communication today. E-Mail is a method of exchanging the digital information from one end to another end. We know that E-Mails are very popular in our daily routine. In the past, when we don’t have an Internet, What we do for the communication? Yeah, Off Course letters being sent from one place to another place or one person to another person, but the letters aren’t secure, but how?

Suppose someone sent you a letter which contains your confidential information and there may be a chance that it may be lost or theft by someone. So these aren’t secure way to transfer the confidential information. Later when we enter into the world of internet then E-Mails are used to exchange messages but with the advancement of internet there is a risk of theft your E-Mail or Hack your E-Mail.

So, To Prevent from E-mail Hijacking we must keep our E-Mails Safe. In this article we are going to read How can we keep our E-Mail Safe ?

There are total 5 ways from which you can keep your E-Mails Safe and minimizing the mishappening with your mail list. 

Go Off Records

If you really want to keep your E-Mails secret then just activate the Go Off Record button from your G-Mail chat box. If you are using Gmail then you can also activate this feature from the GTalk or other IM Chat Messenger. After activating this features whatever you typed-in from the keyboard will not save in your E-Mail Account.

Stop using Draft

If you are using the draft service to save your message or private information so you should stop it from now. Because it can be read by anyone, but how? Let’s discuss with an example

Suppose you have an urgent piece of work on the internet and your internet is not working, what will you do? Off course you have to go to the cyber cafe, and in the cafe you open your E-Mail account and by mistake you didn’t log-out your E-Mail account, now anyone who sits on your seat can open your E-Mail account, check your draft folder and theft your confidential information.

Use 2-Step Verification

This is the best way to keep your E-Mail Safe. If you are using G-Mail then there is a best option for you to activate 2-step Verification in your G-Mail account. After activating this option no one can log-in into your G-Mail account even though he/she knows your password.

Use password protected zip files

If you are sending some private or confidential information to anyone then always use password protected zip files. This will keep your E-Mail message safe. By chance if anyone theft your file which is password protected then he/she cannot open that file. So this is how, you can safe your E-Mails safe.

Hide your files in image

There is an another cool way to keep your E-mail safe i.e. hide your files with images then send it to the recipient. But how is this possible? Yeah, it is possible let’s see,

To hide files in image you have to go through some steps so get ready-

Gather all files (which you want to hide) in a specific folder I recommend C:\private

Then compress all files to .rar extension and named it like hello.rar and this hello.rar should also be in the same directory i.e. private.

Now pick any .jpeg file (for ex- abc.jpeg) from your computer and put that image file into that directory.

Open command prompt (click on start-> Run-> cmd) and go to the present working directory that is C:\private

Then type a simple command

copy /b abc.jpeg + hello.rar output.jpeg

now your hello.rar folder is hidden in the output.jpeg and if you click on the output.jpeg file then an image will be open. This is the best way to keep your E-Mail safe, if your E-Mail is hijacked even then no one can theft your confidential information.

Watch YouTube videos on slow connection.


Friends when I was  bought a slow internet connection for the first time. I was new to the internet and when i used to watch videos on YouTube, I used to get irritated as it took more time to buffer than the actual time period of video.

I think this is the most common problem that every slow internet users all are facing. Am I right?

That is why I want to make this problem’s solution public, so that other people can also get benefited from it.


So here we go, just follow the procedure to watch the YouTube videos on a  slow Internet connection..

YouTube is a video-sharing website with millions of videos available on its servers. 

Registered and unregistered users can watch videos on YouTube and most of its videos were uploaded by individuals like us.

Even i love watching videos on YouTube but the greatest challenge I used to face is slow buffering and this usually happens because internet was slow, but just a few days ago I found out a solution to watch YouTube videos with my slow internet connection.

YouTube videos buffering can be speed up using “YouTube feather beta”. This helps to load YouTube video faster in a slow internet connection because it removes the entire information panel.  

Not only that, but also the sidebar related videos list, share button, comment, like and dislike button etc. From all YouTube video pages once it is activated.

To activate YouTube feather beta go to this link www.youtube.com/feather_beta and then click “Join Feather Beta” link to enable YouTube Feather beta on your account.

Yes this is it. You can now happily watch videos without having to wait.

Cloud Computing


                 What is Cloud computing?

Cloud computing is the use of computing resources like hardware and software which are available on the remote location and accessible over a network.
In cloud computing, the word cloud is used for "the internet" and computing  means " a type of internet-based computing".
Here  in cloud computing there is no any local servers or hardware to handle the application.
         


It should be runs through Interface software.All heavy lifting done by the web based services and the third party services holds all information like :
                             - Software       - Saved data       - Security                                                                              
                                                                       The cloud computing is used in online email services, storing online data.Cloud computing networks are large groups of servers and cloud service providers that usually take advantage of low-cost computing technology, with specialized connections to spread data-processing chores across them.  Virtualization techniques are often used to maximize the power of cloud computing.


Their are different types of cloud are their as below....


1) Public Cloud   : A public cloud can be accessed by any subscriber with an internet connection and access to the cloud space.

2) Private Cloud : A private cloud is established for a specific group or organization and limits access to just that group.

3)Community Cloud : A community cloud is stored among two or more organizations that have similar cloud requirements.

4) Hybrid Cloud : It is essentially a combination of at least two clouds, where the cloud included are mixture of public , private and community.


Some of the advantages of the cloud computing

- Unlimited, everywhere access
- Reduction in hardware and software cost.
- No physical space in office or home.
- Increase the computing process.
- Automatic redundancy.

Some of the disadvantages of the cloud computing

-  Change is hard.
-  Security & privacy
     -- User don't physically have data.
     -- Storage cloud be hacked.
-  Services Live and Die by their security reputation.
- Significally harder to infiltrate these system.


Protect USB Drive with password without 3rd Party Tool


 Today I'm gonna talk about USB Drives.
I'll show you a simple trick to lock your USB drive without using any 3rd party software.
Most of the people doesn't like other people checking their personal files and folder on USB, including me. This insecure situation creates a huge space to theft our personal data by someone. If you use password protection to your USB, you can reduce the data theft.

Lots of USB password protect software available in present market, but you want to pay money to use it for lifetime. If you're using Windows you don't need any software.



So let's see how to set a password protect on your USB without using any software I am showing this tutorial with window 7....
Insert your USB drive to computerOpen My Computer..... Then left click on USB drive.






Now click on Turn on BitLocker...
It opens one window, in that it asks for that password... 
Enter the strong password






        Now, after entering the password click on next button

Now Store your recovery key to somewhere on your harddrive
or take printout of the key



After storing the key click on the next....

It's open another window.... Now click on
Start Encryption



When you click on Start Encryption

It starts Encrypting your Drive.



That's all !!! :)
From right now if someone tries to access your USB, Windows will ask him/her to enter the current password.




Note : If you not find the option then jst follow bellow steps

Goto > Start menu 

In search just type BitLocker....

Then click Turn On BitLocker  for USb Drive.. Then follow above steps.





Best Smiley Collection for Facebook Chat







  Now a days, we should chat on Facebook lots,
 If we think chat without smiles than how boring 
so here i have some basic and some extra smiles 
to make your chat interesting... so for what are you waiting 
just open your chat box any try it.......i know you like it 



Classical Smiles




classical Facebook emoticons

New chat smiles.... 


Just copy past and see the migic....   ;)

[[f9.laugh]]
[[f9.sad]]

[[f9.angry]]

[[f9.sleepy]]

[[f9.shock]]

[[f9.kiss]]

[[f9.inlove]]

[[f9.pizza]]

[[f9.coffee]]

[[f9.rain]]

[[f9.bomb]]

[[f9.sun]]

[[f9.heart]]

[[f9.heartbreak]]

[[f9.doctor]]

[[f9.ghost]]

[[f9.brb]]

[[f9.wine]]

[[f9.gift]]

[[f9.adore]]

[[f9.angel]]

[[f9.baloons]]

[[f9.bowl]]

[[f9.cake]]

[[f9.callme]]

[[f9.clap]]

[[f9.confused]]

[[f9.curllip]]

[[f9.devilface]]

[[f9.lying]]

[[f9.rofl]]

[[f9.billiard]]

[[f9.cakepiece]]

[[f9.rosedown]]

[[f9.shutmouth]]

[[f9.shy]]

[[f9.silly]]

[[f9.tongue1]]

[[f9.fastfood]]

[[f9.ring]]


                          

Please post your comments .....
And help us to improving our blog.