1 / 3
2 / 3
3 / 3

Showing posts with label Programming. Show all posts
Showing posts with label Programming. Show all posts

Monday, June 27, 2016

Top 7 Highest-Paying IT Certifications

Hi friends,
If you are intent on making IT your career choice, then there are a host of certifications available that you should consider pursuing. These certifications are for various fields in IT like networking, security and hacking, or systems administration and can help launch or enhance your career.

At the end of the day, everything depends on the $$$ you aspire to earn by opting for a career in IT. With that in mind, this article lists the top seven highest-paying IT certifications, what each job pays, and what the work entails.
The list has been prepared based on the salary data by Global Knowledge, a learning services and professional development solutions provider. You can zero down on the certification program you like and visit Global Knowledge website for more details.
Read More

Tuesday, June 21, 2016

10-year-old Kid Scores 100 Percent in Java Exam, Completes 150 Minute Paper in 18 Minutes





















Hello Friends, Some say prodigies are born. Yes! it’s true. They are born to surprise the world with the achievements that have never been attempted or broken before. Here is the story of Ronil Shah, a 10-year-old student from Ahmedabad, who proved himself to be a child prodigy by scoring 100% in Java exam.
Read More

Top 20 Most Important Programming Languages in The World

Hello friends,

1. ALGOL

Created in 1958, ALGOL stands for Algorithmic Language. This was one of the first attempts made to create a programming language that could be used on different machines.

Today, the use of ALGOL is minimal but the roots of many major programming languages could be traced back to it.

Read More

Saturday, June 16, 2012

Which programming Language you should choose?

People often ask me, “What language should I learn? PHP, Perl, ASP, Python, Java, C, C++, Objective C?” It seems like what they’re really asking is, “What is the ‘best’ language?” And the answer is that there is no “best.”
The most common reason for choosing one language over another is that a client, customer, or environment may demand one or a selection from a small set of languages. That makes the choice easy. But what if there are no such restrictions imposed? If you really have free choice, how do you choose one language over all the others?
Different languages have different strengths and weaknesses. They’ve usually been designed for a particular purpose, or to replace another language or set of tools that became cumbersome or inefficient after years of use.
For example, the C language was designed in the early 1970s as a general purpose language for writing operating systems and systems-level tools. Before C, most of this work was done in assembly language. In 1972, Dennis Ritchie was working on new operating systems at Bell Labs and needed a language that could be easily ported to different architectures and operating systems. Existing languages were either too big or not flexible enough. So, he created C (named after its predecessor, B). Because C is small, powerful, and portable, it remains remarkably popular after 40 years of use.
By the mid 1980s, a lot of systems administration tools were being created using a combination of shell scripts and other tools such as awk, sed, and grep. In 1987, an engineer named Larry Wall decided that there was a need for a more cohesive and robust tool for this purpose, so he created Perl. Since then, Perl has grown and evolved, and remains a viable language for scripting and even for mid-sized web application projects.
Today there are hundreds of languages available, dozens of which have a large enough footprint to be considered for any given project. So, given the chance, how do you choose?

Criteria for Choosing a Computer Language

First, what is your application? You will need a different kind of language for writing a desktop application, such as a word processor or a web browser, than if you are building system administration utilities, such as a whois client or configuration manager, or building web tools, such as a content management system or a database maintenance backend.
Desktop applications tend to be resource-intensive and use a lot of operating system features, such as graphics, widgets, dialog boxes, etc. These applications often require the use of a software development kit (SDK) that matches your operating system, so you will likely need to use a language that’s compatible with that SDK. For Microsoft Windows, that could be C++, or for Mac OS X it could be Objective C. Sometimes you can get around that limitation and use a different language, but it’s usually a lot more convenient to use the language that matches the SDK.
For web applications, a scripting language is usually called for. The dynamic nature of the scripting languages (Perl, PHP, Python) works well for web applications. Web servers tend to be dynamic creatures and a language that can easily move from one environment to another can be a real advantage. Also, these applications tend to get updated frequently, so the short development cycle of a scripting language that doesn’t require a separate compilation step helps a lot.
Sysadmin tools, like web applications, can also benefit from the more dynamic interpreted languages. Perl and Python were designed specifically for this purpose. Python’s superior object model makes it an ideal choice for larger sysadmin and web projects, while Perl’s long legacy and large installed base makes it a great choice for projects that require a larger programming staff or ready availability of skilled developers.

So, What Language Should You Learn Next?

Why can’t I just answer your question and tell you what language to learn?
If you’d like to learn Perl or Python, you’re in luck! I’ve just finished my Perl 5 Essential Training course on lynda.com, and I’m working on a similar Python 3 course to be released later this year. So I’m happy to recommend those languages. But I would never recommend them for systems work.
If you want to become a well-rounded programmer, I will always recommend that you start as low-level as possible, which for most people is C. You will get a great introduction to how computers work and develop skills that will serve you well as you learn other languages later on.
Where you go from there depends on your goals. For applications coding, I suggest C++ or Objective C; for web or sysadmin work, I suggest Perl and Python (both, not either). Object-oriented (OO) programming is here to stay, so C++ and Objective C will serve you well for years to come, and Python’s OO model is superb. Perl is simply essential because so much existing code is written in it, and it’s a great language for smaller projects that don’t require a lot of indirection or OO patterns.
Please note my biases here: I’ve never been a fan of PHP or ASP. These languages exist for purposes that have little to do with their merits, and their design and implementation show this. The question asks for my opinions, and my recommendations necessarily reflect them. That said, I have worked in both PHP and ASP and will continue to do so when clients or development environments require those languages.
The bottom line: learn as many languages as you can and pay attention to their distinctions and commonalities. As you do so, you will necessarily develop an eye for patterns and paradigms that can be borrowed from one environment and shoe-horned into another, making you a more effective and more efficient programmer. You will also gain satisfaction from your growing mastery along the way.
Read More

Wednesday, April 11, 2012

Hack a Yahoo Account While Chatting

Hi Friends,
 I have a trick to hack yahoo in chatting But i am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol

Following are the Steps : -

1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.

2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
Read More

Tuesday, April 3, 2012

What is MD5 Hash, and How to Use It

Hi friends,
Today I will explain you about one of my favorite and interesting cryptographic algorithm called MD5 (Message-Digest algorithm 5). This algorithm is mainly used to perform file integrity checks under most circumstances. Here I will not jump into the technical aspects of this algorithm, rather will tell you about how to make use of this algorithm in your daily life. Before I tell you about how to use MD5, I would like to share one of my recent experience which made me start using MD5 algorithm.

Recently I made some significant changes and updates to my website and as obvious I generated a complete
Read More

Tuesday, March 20, 2012

Some Interesting Registry Tricks in Window Xp


Hi Friends,
I have some Cool Tricks of Registry, enjoy It........

1)How to remove recycle bin from your desktop :

Open Regedit by going to START – RUN and type Regedit and hit enter. Then you should navigate to following entry in registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E} and delete it. This action will remove recycle bin from your desktop.
Read More

Tuesday, January 31, 2012

Remove autorun.inf by cmd

Hi friends....
m posted a tick how to Remove autorun.inf by cmd this post mr. Nikhil Ghorley send to us.....


1st.   open cmd 

 2nd.    write
" del /a:rhs [urdriveletter]:\autorun.inf " (without inverted comma)


 for example if the virus is on ur D drive the commad will be

del /a:rhs D:\autorun.inf

 then after restart ur computer.

hi fnds if u r interest to post ur trick send us on our mail  "help@justhackitnow.com" &  post on facebook page https://www.facebook.com/justhackitnow.
Read More

Monday, January 30, 2012

What are Mail Bombers

hi fnd mail bomber is the software that floods user’s e-mail with big number of mails. Mails can contain different information: from the simple newsletter to the offer to enlarge your body parts.

Mail bombers sometimes are used as mass mailing software and in that case are legal programs used for business improvement. Individual users also are able to use these programs.


Most popular programs are:

Avalanch 3.6, Aenima 2.0, Bomsquad, Extreme Mail, Hacktec, KaBoom 3.0, Unabomber, Homicide, Digital Destruction Beta, Euthanasia, Ghost Mail 5.1, Saddamme 0.2, X-Mail, etc. Most of them are free.

Read More

Monday, December 19, 2011

Task Manager Disabled By Administrator(Error )

Pressing Ctrl+Alt+Del yields a pop-up saying it has been disabled by Admin.
 To fix it.

1. Click on Start – Run.
 2. Type in REGEDIT and hit Enter.
 3. Open HKCU Software Microsoft Windows CurrentVersion Policies System.
 4. On the right panel, double click on DisableTaskManager and change it’s value to 0 from 1.
 5. Similarly, navigate to HKLM Software Microsoft Windows CurrentVersion Policies System.
 6. On the right panel, create a new DWORD value, name it as DisableTaskMgr and enter its value as 0...
Read More

BIOS Password Hacking



Standard BIOS backdoor passwords

The first, less invasive, attempt to bypass a BIOS password is to try on of these standard
 manufacturer’s backdoor passwords:
AWARD BIOS
 AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256,
 j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER,
 SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA,
 ZAAADA, ZJAAADC, djonet,
AMI BIOS
 AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder

Read More

Get rid of Windows Vista Administrative Password

 Method 1: System Restore
 This only works in cases where you changed your password to something new and then forgot it or deleted a user account by accident. In order for this to work, there must be a System Restore point at which a logon was successful for the problem account. Also, this is not a problem if you are in a domain environment because the Domain Administrator can always reset your password.
 1. The first thing you’ll need to do is make sure you have your Windows Vista DVD or a repair disc. Insert the disc and then restart the computer. When asked to “Press any key to boot from CD or DVD”, go ahead and press any key.
 2. Click Next until you get to the screen that has the option “Repair your computer”, select the operating system you want to repair and then click Next.
Read More

Remove autorun.inf manually

  I will tell u how to remove autorun.inf virus which is cause of opening
 of your drives in separate window when u click on the drive name in my computer

There is a Trojan/virus (either the Win32/Pacex virus or the Win32/PSW.Agent.NDP trojan) that uses those two files. Here is how you can get rid of them:

1) Open up Task Manager (Ctrl-Alt-Del)
 2) If wscript.exe is running, end it.
 3) If explorer.exe is running, end it.
 4) Open up “File | New Task (Run)” in the Task manager
 5) Run cmd
 6) Run the following command del #:autorun.* /f/a/s/q with other drives in turn
Read More

Wednesday, March 9, 2011

A Virus Program to Disable USB Ports


Virus to disable USB portsIn this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Read More

Monday, February 28, 2011

Powerful C++ Virus

 
This is a powerful C++ virus, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.
Warning: Do not try this on your home computer.
Read More

Sunday, February 6, 2011

How To Make A Virus


This is step by step tutorial that explains how to make a virus. Here you’ll teach how to make simplest virus called fork bomb and how to make a virus that will make an unlimmited amount of folders in any place you want.

1)How To Make The Simplest Virus – Fork Bomb
Launching fork bomb will lead to total CPU jam by opening about 500 process of command prompt . CPU usage will be overloaded and computer will freeze.
1) Launch notepad and type
Read More

Saturday, February 5, 2011

How To Make Harmless Virus That Open The Notepad File Continuously


This is step by step tutorial that explains how to make harmless virus that open the notepad file continuously.This is non-destructive virus to your computer system. If you want to have some fun with your friends , drop this cool harmless virus into his pc. .
Read More

ADF BC and ADF Libraries: The Library Private Property - Java

ADF Libraries are a very useful feature of JDeveloper 11g. They allow a master application, via the Resource Palette, to load Bounded Task Flows (BTFs) and the BTF's associated ADF Business Components from separate applications, without having to include the BTF and ADF BC objects in it's own application.
In the following picture you can see the Resource Palette exposing adflibChildBTF.jar, a BTF application containing both the ChildBTF bounded task flow, and it's associated Business Components including the ChildAppModule Application Module, Events Entity Object and so on:
Read More

Enterprise JavaBeans 3.1


Learn how to code, package, deploy, and test functional Enterprise JavaBeans with the latest edition of bestselling guide. Written by the developers of the JBoss EJB 3.1 implementation, this book brings you up to speed on each of the component types and container services in this technology, while the workbook in the second section provides several hands-on examples for putting the concepts into practice.
Read More

Hadoop: The Definitive Guide


Apache Hadoop is ideal for organizations with a growing need to store and process massive application datasets. With Hadoop: The Definitive Guide, programmers will find details for analyzing large datasets with Hadoop, and administrators will learn how to set up and run Hadoop clusters.
Read More

Search This Blog

Powered by Blogger.

Pages