What Ford was doing at CTIA Fall 2010

                                                                                       As an attendant of CTIA Fall 2010, I couldn’t figure out what Ford Motor company was doing there. As it turns out, they were promoting the MyFord Touch. I got to get behind a tricked-out dashboard, and saw why they wanted to show off.




The set-up for MyFord Touch reminded me of the Earth-friendly dashboard I reported on over a year ago. I had one of their spokespersons show it to me, and I’ll do my best to convey my experience to you.
That screen that you see in the photo is a full touchscreen, and it allows the user/driver full control of Navigation, Climate, Entertainment and Phone. Each of these functions have a different color-code, accessible on the four corners of the screen. MyFord Touch also has two 4.2 inch LCD screens that flank the central speedometer for information to the driver at a glance.
Green is the color code for Navigation and it will guide you with turn-by-turn, and will even allow for vocal search. So if you say “Find Ice Cream”, and you can select several options. You can even call the place, as it links with the Phone (which is Yellow color-coded).
The Entertainment (Red color code) is also vocally controlled, and tunes can be taken from an SD card and USB port. The last color code is Blue, for Climate control.
The SYNC is available on the 2011 Edge, and will be available on the Explorer later this year.

RedMere makes some skinny HDMI cables

 


Most of you have probably used HDMI cable for your home theater, and this thick cable is going to be more in demand.

After all, many phones like the Nokia N8 have an HDMI port so video files on the phone can be viewed on bigger screens. If every phone has this feature, then not only will it increase the demand for HDMI cables, but create a need for them to be thinner, lighter, and more portable. 

It would appear that a company called Red Mere is ahead of the curve as they are making thinner HDMI cables. Guess which one of the HDMI cable cross-sections in the photo above is a RedMere. 

How is this possible? I talked to RedMere at CTIA Fall 2010, and they use some sort of chip that fits in the HDMI plug itself. They wanted to show me the chip, but they seemed to have lost it at their booth. 

I’m not certain what to think of that, but I won’t hold it against the company. In fact, I think RedMere is going to have a lucrative future when everyone needs an HDMI cable. Perhaps there will come a day when all phones have an HDMI cable that can stretch and retract, and RedMere will be the supplier.

Body Organs Send Out Information To Your Phone


When going to the doctor you could find out all sorts of surprising info and usually if there’s a problem it’s been going on longer than you realize.  Instead of making the problem wait until your next physical, you could always make your body text you when there’s an issue.  Thanks to some researchers at the Dutch facility, IMEC, that could be very possible.

Having some experience with surprise problems, (although having select parts of your organs sending out text messages might be an idea that some people would take getting used to) this would have come in very handy a couple months ago.  I had an extremely close call with my gallbladder, close enough that the doctor mentioned that death would have been a distinct possibility had I not stumbled into the hospital that day.  Oops.  See, texting insides are not so bad.  It uses Human++ BAN, which is a wireless body area network.  It’ll send you texts that can be shared with your doctor and an alarm will sound should any of the readings come back abnormal. Of course, this will not work with all body organs at the moment, but who are we to say that things won’t change in the future?

Halo Intersceptor is a car, copter, plane, and boat

 


I’m sure you are probably thinking that this is a pretty cool car. It sort of reminds me of the futuristic Audi that Will Smith drove around in I, Robot

This concept auto, known as the Halo Intersceptor, is one of the most advanced cars that I have ever seen. In fact, it isn’t just a car, but a plane, boat, and helicopter. Yes, that does sound more like a cartoon than an actual car. Just to let you know, the Halo Interceptor doesn’t have any hidden wings or rotors like some spy car on M.A.S.K. That was a cartoon from the eighties, in case you don’t get that reference. Think about what would happen if G.I. Joe and Transformers were mixed in a blender and you would get M.A.S.K..

The way the Halo Intersceptor works is that the car parks and locks itself in a different chassis. There is a video after the jump if you want to see it in action. It is pretty neat, and it’s definitely something Batman if he didn’t mind having the Batmobile being used for the Bat-plane, the Bat-copter, and the Bat-boat. 

I would imagine James Bond would get a kick out of this too. This is one of those things that I would have to see before I believed it. 

Video Link: Click Here
indoor pool


Over the years we’ve reported on some pretty cool swimming pool gadgets, from huge infinity pools to motorised bumper boats and many more. This next one is something special, it’s an outdoor terrace that converts into an indoor pool (yes you did read that correctly). Below is a photo before (in terrace mode) whilst above shows the terrace mid transformation.

Terrace Pool





To fully appreciate it you need to check out the following video:
Video Link: Click Here

Biometric Vehicle Starter




It used to be the only way to start up a car was with that shiny key, but now there are other options. The most common alternative is pushing a button.  Well if you’re not a fan of that route, now you can make sure you’re the only one that can start your car.  Instead of pushing buttons or turning a key, you just have to put your pointer finger right up to that tiny scanner.  If you’d like to allow a couple of other people to drive your car, you can have their fingerprints stored in the database.

Should you have a thief that’s watched too many spy movies and cuts off your finger in order to use it for the car, they’ll still be hosed.  After the fingerprint is confirmed it’ll then check for a pulse, blood pressure and body temperature, cut off fingers don’t have a pulse I’m afraid.  It even goes as far as to scan the capillary patterns underneath of the skin.  Despite that it checks several things, it won’t actually take long for all that information to be stored.  Being such an in depth gadget, this isn’t exactly a cheap item.  No, you’ll get stuck paying $699.95 for it at Sky Mall.

The Invisible, Inflatable, Airbag Helmet

 



Whether you know it or not, this lady is wearing a helmet. It is concealed in her scarf.


I realize that sounds pretty unbelievable, as most helmets are pretty hard and cover the whole head. Yet this Invisible Airbag Helmet is crumpled up in the lady’s neck with an airtank, apparently. 

There is a video after the jump so you can see how it protects. You will notice how it can somehow detect a sudden impact in a few milliseconds and create this perfect shape of a helmet around the user’s head. 

You’ll notice from the video how the helmet can protect the user from all kinds of spills. Think of it as the airbag in the car, designed for your head. 

There is clearly some bugs to work out before this is used on real people. For example, how does the helmet know what is a real accident and what is a harmless stumble. In other words, it could go off at any moment. Worse yet, it could not go off when it absolutely needs to. 

Well, this is probably going to take a while before we can ride without traditional helmets. Until then, I believe that helmets are required by bicyclists.

Video Link: Click Here

Balance disorder treated via implantable device



Have you ever heard of Meniere’s disease before? It is an inner ear disorder which affects about one percent of folks living in the US, and is a particularly disabling condition since attacks of vertigo can occur without any prior warning. In order to treat it, ordinary folks are required to lay still for several hours at a time before they can get back on their feet again. Since it strikes like a thief in the night, this ever-present possibility will inevitable cause sufferers to avoid certain activities, situations and perhaps, even careers. Both medication and lifestyle changes will do their bit to alleviate the situation, but it will not solve it completely. Of course, there is always the alternative to go under the knife, but that typically results in depleted hearing and/or balance functions of the affected ear. Good thing for progress though as a team of scientists from the University of Washington Medical Center are currently working on a new cochlear implant on their first human test subject. The main idea? To remove the patient’s symptoms without sacrificing functionality in either ear.

Some Cool Informations For U

  • OnlineTips:
    Want you to track your Sim
    youur mobile
    your mobile number
    your network
    your location
    !
    visit
    www.Numberingplans.Com


  • OnlineTips:
    Want2convert any text in2 speech,Mp3 or Wma?
    Then use"Text to Mp3 Speaker"
    You can set relief while some1 reads for you
    by this create your audio book.


  • OnlineTips:
    want increase up ur computer speed 300%
    go
    http://www.speeditupfree.com
    and download speeditupfree software and enjoy super fast computing.

  • OnlineTips:
    Mobile site of great beautiful themes
    fighting games
    wallpapers
    amazing videos
    downloading is easy
    support all models
    http://m.zedge.com

AUTO-REBOOT ON SYSTEM CRASH

Auto Reboot On System Crash

By default, when the Windows XP operating system crashes an automatic reboot of the system occurs. While this behavior can be convenient, the downside is the error message accompanying the crash is not visible. 

Often times this information can be a great help in troubleshooting the source of the crash. This behavior can be modified in two ways; via the registry or using the System Properties property sheet.


[Start] [Run] [Regedit]
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl
Set\Control\CrashControl
Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.
Data Type: Dword // Value Name: AutoReboot
Setting for Value Data: [0 = AutoReboot Disabled / 1 = AutoReboot Enabled]
Exit Registry and Reboot



To avoid the inherent danger of editing the registry, the same results may be obtained by using the procedure detailed below.


Open System Properties via Start > Control Panel > Performance and Maintenance > System
[ System Properties may also be opened using the WinKey+Pause key combination ]
Select the Advanced tab and then click Settings in the Startup and Recovery section
In System Failure section, clear the checkbox next to Automatically Restart
Click OK and OK to exit

HIDDEN USER ACCOUNT IN WINDOWS

Create A Hidden User Account

This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000.

#[Start] [Run] [Regedit]
#Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wi
ndowsNT\CurrentVersion\
Winlogon\SpecialAccounts\UserList
#Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.
#Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden
#Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]
#Exit Registry and Reboot...

While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups.

Disable Plug and Play && USB Devices

Disable Plug and Play && USB Devices : :

  • DISABLE PLUG AND PLAY DEVICES

Disable UnPnP Discovery Service
Open your registry and find the key
HKEY_LOCAL_MACHINE\SYSTEM\CurrentContro
lSet\Services\SSDPSRV
Set the value of "Start" to "4" to disable the service, or "3" to enable it.

  • DISABLE USB PORTS OF COMPUTER

Disable Universal Plug and Play Device Host
Open your registry and find the key
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\upnphost
Set the value of "Start" to "4" to disable the service, or "3" to enable it.

Complete Oracle Solution Here

Complete Oracle Solution Here :
Search and Download Oracle Database, Application Server, and Collaboration Suite Documentation

LINK : http://tahiti.oracle.com/

SHUTDOWN PC WITH TIMER BUT WITHOUT ANY SOFTWARE

SHUTDOWN PC WITH TIMER BUT WITHOUT ANY SOFTWARE

  • METHOD 1

Do you know that you can make your PC shutdown at a time u wish to?
Here is the trick!!
How To Make A Shutdown Timer!

Step 1:

Right click on your desktop and choose "New=>shortcuts".

Step 2:

In the box that says "Type the location of the shortcut",
type in "shutdown -s -t 3600" without the quotation marks and click next.

Note: 3600 are the amount of seconds before your computer shuts down. So , 60secs*60mins=3600secs.

Step 3:

Make up a name for the shortcut and you're done.
You can change the icon by right clicking=>properities=>change icon=>browse.

To abort:

To make an abort key to stop the shutdown timer just create another shortcut and make
the "location of the shortcut" to " shutdown -a" without the quotes.


  • METHOD 2

Here is another trick to shutdown at a specific time, for example you wish to shutdown at 11:35am. Type this in
start=>Run

Type Code: at 11:35 shutdown -s


to abort

Code:

shutdown -a


take note: all time are in 24hr, example u would like to shutdown at 8:30pm, you should type

"at 20:30 shutdown -s" without quote


  • METHOD 3

you can use a batch for that as well it makes it easier to use
just run the batch and enter the time you want it to shutdown

shutdown.bat
Type Code:
@echo off
title Scheduled Shutdown Batch Example by chacha1234
color A
echo Enter Time To Shutdown (example 18:20)
set /p stime=
cls
at %stime% ""shutdown -s -t 00"" >nul
echo Your PC Will Auto Shutdown At %stime%
echo Press Any Key To Exit
pause >nul
exit



also you can add -c "desired message" at the end of the shutdown command
for example
shutdown -s -t 60 -c "Shutdown Pc"


using this command u can also schedule ur pc to restart
for example
shutdown -r -t 60 -c "Restarting Pc"

SOME WEBSITE COLLECTIONS

  • 3D Graphics:
3Delight Free - http://www.3delight.com/index.htm
Anim8or - http://www.anim8or.com/
Aqsis - http://www.aqsis.com/
Blender - http://www.blender3d.org/
Houdini (Free Edition) - http://www.sidefx.com/apprentice/index.html
Now3D - http://digilander.libero.it/giulios/Eng/homepage.htm
OpenFX - http://www.openfx.org
POV-Ray - http://www.povray.org/
SOFTIMAGE|XSI EXP - http://www.softimage.com/products/exp/v3/
Terragen - http://www.planetside.co.uk/terragen/
Toxic - http://www.toxicengine.org/
Wings 3D - http://www.wings3d.com/

  • Anti-Virus:
A-squared - http://www.emsisoft.com/en/software/free/
AntiVir - http://www.free-av.com/
Avast - http://www.avast.com/i_idt_1018.html
AVG - http://free.grisoft.com/
BitDefender - http://www.bitdefender.com
ClamWin - http://www.clamwin.com/

  • Anti Spyware:
Ad-aware - http://www.lavasoft.de/software/adaware/
Bazooka - http://www.kephyr.com/spywarescanner/index.html
Hijackthis - http://www.spywareinfo.com/~merijn/downloads.html
SpyBot Search & Destroy - http://spybot.safer-networking.de/
SpywareBlaster - http://www.javacoolsoftware.com/spywareblaster.html
SpywareGuard - http://www.wilderssecurity.net/spywareguard.html
WinPatrol - http://www.winpatrol.com/

  • Audio Creation
Gungirl Sequencer - http://ggseq.sourceforge.net/pmwiki.php/Main/HomePage
HammerHead - http://www.threechords.com/hammerhea…od
uction.shtml
Jesusonic - http://www.jesusonic.com/soft.php
KRISTAL Audio Engine - http://www.kreatives.org/kristal/index.php
orDrumbox - http://ordrumbox.sourceforge.net/
Tu2 - http://www.brambos.com/news.html

  • Audio Players:
1by1 - http://www.rz.uni-frankfurt.de/~pesch
Billy - http://www.sheepfriends.com/?page=billy
CoolPlayer - http://coolplayer.sourceforge.net/
DeejaySystem MK1 - http://www.deejaysystem.com/prod_mk1.asp
DeliPlayer. http://www.deliplayer.com/
Foobar 2000 - http://www.foobar2000.org/
iTunes - http://www.apple.com/itunes/
Jet Audio Basic - http://www.jetaudio.com/
Mixere - http://mixere.sourceforge.net/
Mixxx - http://mixxx.sourceforge.net/
monoRAVEik - http://www.mono211.com/monoraveik/mr1200.html
MoreAmp - http://sourceforge.net/projects/moreamp/
Musik - http://musik.berlios.de/
musikCube - http://www.musikcube.com/
QCD Player - http://www.quinnware.com/
Sonique - http://sonique.lycos.com/
Winamp - http://www.winamp.com/
XMPlay - http://www.un4seen.com/xmplay.html
Zinf - http://www.zinf.org/

  • Audio Tools:
Audacity - http://audacity.sourceforge.net/
AudioShell - http://www.softpointer.com/AudioShell.htm
BeSweet - http://dspguru.doom9.net/
CDex - http://cdexos.sourceforge.net/
dBpowerAMP Music Converter - http://www.dbpoweramp.com/dmc.htm
EAC - http://www.exactaudiocopy.de/
Encounter 2003 - http://www.waschbusch.com/
GermaniXEncoder - http://www.germanixsoft.de/
K-MP3 - http://www.katarncorp.com/
KraMixer - http://www.kramware.com/
MP3 Book Helper - http://mp3bookhelper.sourceforge.net/
MP3 Tag - http://www.mp3tag.de/
Mp3 Tag Tools - http://massid3lib.sourceforge.net/
mp3DirectCut - http://www.rz.uni-frankfurt.de/~pesch/
MP3Gain - http://www.geocities.com/mp3gain/
mp3Trim - http://www.logiccell.com/~mp3trim/
MusicBrainz - http://musicbrainz.org/
Rarewares - http://rarewares.hydrogenaudio.org/
SoundEngine Free - http://www.cycleof5th.com/en/index.htm
TagScanner - http://xdev.narod.ru/tagscan_e.htm
The GodFather - http://users.otenet.gr/~jtcliper/tgf/
TigoTago - http://www.tigotago.com/

  • CD/DVD Burning:
Burn4Free - http://www.burn4free.com/
Burnatonce - http://www.burnatonce.com/
Burrrn - http://www.burrrn.net/
CDBurnerXP - http://www.cdburnerxp.se/
CDRDAO - http://cdrdao.sourceforge.net/
CDR Tools Frontend - http://demosten.com/cdrfe/
Deepburner - http://www.deepburner.com/
DVD Decrypter: http://fileforum.betanews.com/downlo…r/
1011845169/1
Easy Burning, DropCD & Audio CD - http://www.paehl.de/cdr
ImgBurn - http://www.imgburn.com/

  • Compression / Decompression:
7-zip - http://www.7-zip.org/
bzip2 - http://sources.redhat.com/bzip2/index.html
ExtractNow - http://www.extractnow.com/
FilZip - http://www.filzip.com/
Info-Zip - http://www.info-zip.org/
IZArc - http://www.florida.plus.com/izarc/
QuickZip - http://www.quickzip.org/
TUGZip - http://www.tugzip.com/
UPX - http://upx.sourceforge.net/
Zip&Go - http://www.handybits.com/zipngo.htm
Zipgenius - http://www.zipgenius.it/

  • Defrag Software:
DIRMS & Buzzsaw - http://www.dirms.com/
OpenVMS - http://www.execsoft.com/freeware/freeware.asp

  • Photo manipulation and image design:
ArtRage - http://www.ambientdesign.com/artrage.html
Artweaver - http://www.artweaver.de/index.php?en_version
ColorPic - http://www.iconico.com/colorpic/
Delineate - http://delineate.sourceforge.net/
Inkscape - http://www.inkscape.org/
JPEGCrops - http://ekot.dk/programmer/JPEGCrops/
Paint .NET - http://www.eecs.wsu.edu/paint.net/
Pixia - http://www.ab.wakwak.com/~knight/
Pixie - http://www.nattyware.com/pixie.html
PhotoFiltre - http://www.photofiltre.com/
Sodipodi - http://www.sodipodi.com/
The Gimp - http://www.gimp.org/
Tuxpaint - http://www.newbreedsoftware.com/tuxpaint
Wax - http://www.debugmode.com/wax/
Wink - http://www.debugmode.com/wink/
WinMorph - http://www.debugmode.com/winmorph/

  • Web browsers:
Firefox - http://www.getfirefox.com
K-Meleon - http://kmeleon.sourceforge.net/
Mozilla - http://www.mozilla.org/
Netscape - http://channels.netscape.com/ns/browsers/default.jsp
Opera - http://www.opera.com

  • Web servers:
Abyss - http://abyss.sourceforge.net/
Apache - http://httpd.apache.org
Apache2Triad - http://apache2triad.net/
HTTP File Server - http://www.rejetto.com/sw/
Sambar - http://www.sambar.com/
Savant - http://savant.sourceforge.net/
SimpleServer:WWW - http://www.analogx.com/contents/down…wo

ADDING APPLICATION TO THE RIGHT CLICK

ADDING AN APPLICATION TO RIGHT CLICK

Here is how to add any application to the Context Menu when you right click on any Folder. This way you do not have to always go to the Start Menu. When you right click on any folder, you can have access to that application, the same as using Sent To.

1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key to the "Shell" Key and name it anything you like.
4. Give it a default value that will appear when you right click a folder, i.e. NewKey (use an "&" without the quotes, in front of any character and it will allow you to use the keyboard)
5. Click on the Key HKEY_CLASSES_ROOT\Folder\shell\NewKey
6. Add a New Key named Command
7. Set the (Default) value of the application you want to run
8. For example: c:\program files\internet explorer\iexplore.exe (Include the full path and parameters if you need them)

RECOVER WHEN FOLDER OPTIONS VANISHES

METHOD 1 :

1: Here's how you can get Folder Options back..

1: Open Start menu and from there select Run

2: type gpedit.msc and hit enter

3: now in the Group Policy window, from the left pane, select user configuration->Administrative Tempelates->windows components->Windows Explorer by highlighting it with the mouse cursor..

4: now in the right side you will see an option which says "Removes the Folder Options menu item from the Tools menu"

5: right click on this option and select properties

6: now in the properties under Setting tab, select Disabled and hit OK

METHOD 2 :

>>gpedit.msc

>>user configuration

>>administrative templates

>>system

disable "prevent access to registry editing tools"

METHOD 3 :

registry and find the key [HKEY_CURRENT_USER\Software\Microsoft\Wi
ndows\CurrentVersion\Policies\Explorer]Create a new DWORD value,

or modify the existing value named "NoFolderOptions" and

set it to equal "1" to hide the options or "0" to show the options.

Log-off or restart Windows for the changes to take effect

HIDE YOUR DATA/MUSIC IN IMAGE

Hide your Data in an Image
Hide Your Files In An Image ♫ ♫ ♫

All you need is WinRAR INSTALLED ON Windows XP.Gather all your files.Now add those files in a RAR Archive
For example Secret.rar

Now copy the RaR file to a folder.
For Example : C:/hidden/

Now copy any image which is in JPEG format to the same folder above.
For Example logo.jpg

Now Open MS-DOS
Go to : C:/Hidden/


then type this
COPY /b logo.jpg + secret.rar output.jpg

Now you will see a output.jpg in that "C:\Hidden\" folder.
Now only winrar can open it.You can also Open it by changing Extension to .rar.

LifeBook C Series BIOS Setup Manual

  • LifeBook C Series BIOS Setup Manual
LINK: http://www.fujitsu.com/downloads/COMP/fpcap/uguide/bios/winter06/C1410_BIOS.pdf

  • Bios Utilities Reloaded 6in1 (AIO)

    • 1. Bios Agent v3.45
      2. Magic Bios v2.0
      3. BIOS Patcher v4.00 RC 7.1
      4. Bios v1.35.1
      5. BIOS Information Tool v1.1
      6. CmosPwd v4.6

LINK : http://www.mininova.org/get/375045

SOME OF THE FULL PROJECTS FOR U

SOME OF THE FULL PROJECTS FOR YOU





Password cracker 2008

Password cracker 2008:
It is the best password cracker software.
It cracks the password the moment you want in just few seconds not instantly but it provide the correct answer

So try it
It worth your precious time.

Now you can look into the anyone secrets


LINK : http://rapidshare.com/files/107921330/Passwordcracker_2008.rar

Rapidshare Toolkit New

Rapidshare Toolkit New

Bypass 1 hour Limit
Credit card generator 2007 NEW
Grabber 1.4.7 C
no. 1 proxy
Rapiddown 5.9 SE Cracked NEW
RApidshare Downloder ( Download as premium)
Rapidshare Premium Accounts NEW
Rapidshare.com Hack (unlimited Downloads).
And Much more

LINK :http://www.orbitfiles.com/download/id1932215772.html

OR

http://s2.orbitfiles.com/index.php?link=1932215772&sid=0bd98e973af33790aa683417237bad5c&force=1

Change Apache Tomcat port 8080 to 80 or another port number

Change Apache Tomcat port 8080 to 80 or another port number. Whether it is Apache Tomcat 5 or Tomcat 6, by default Apache Tomcat runs on port 8080. But there can be situations where there are some other servers running on this same port forcing you to change the port of one of the servers. This article explains how to change this port 8080 on Tomcat (we tested this against Apache Tomcat 5.5 and 6.0 versions).
Here we’ll be using label to denote the folder where Tomcat is installed. In our systems, tomcat is installed in the following path.
=C:\Java\Tomcat_x.x
We need to edit the file named server.xml inside \conf folder.

In the server.xml file; locate the following segment.
By changing this 8080 value of port attribute, server would start listening on new port number.
After saving the changed server.xml file, Tomcat server must be restarted 
(stop then start) to activate the change.    

Networking E-Book Here

  • Windows Server 2008 Networking and Network Access Protection (NAP)
http://www.filefactory.com/file/069586/

  • Networking with Microsoft Windows Vista
http://rapidshare.com/files/133523791/NMV_www.softarchive.net.rar

  • 802.11 WLANs and IP Networking
http://rapidshare.com/files/47530617/AH8WAIN05EB.Lemon



  • Wireless Home Networking for Dummies
http://rapidshare.com/files/133816272/Wireless.Home.Networking.for.Dummies-_By_southsider_.rar

  • Cisco Networking Simplified - 2nd Edition
http://rapidshare.com/files/132591516/Cisco_Networking_Simplified_2nd_Edition_www.softarchive.net.rar

  • Network+ Study Guide (2nd Edition)
http://depositfiles.com/files/5580888

  • IT Essentials: PC Hardware and Software Companion Guide, 3rd Edition
http://www.mediafire.com/?yizzlddyvwt

  • Applications, Technology, Security, and Privacy
http://www.mediafire.com/?yizzlddyvwt


  • MCSE
http://rapidshare.com/files/65991308/073562061X.rar

  • CCNA
http://rapidshare.com/files/128551127/0071497285.rar


  • HP IT Essentials I: PC Hardware and Software V4.0

http://rapidshare.com/files/113283834/HP_IT_Essentials_I-PC_Hardware_and_Software_V4.0.part1.rar
http://rapidshare.com/files/113283835/HP_IT_Essentials_I-PC_Hardware_and_Software_V4.0.part2.rar
http://rapidshare.com/files/113283836/HP_IT_Essentials_I-PC_Hardware_and_Software_V4.0.part3.rar
http://rapidshare.com/files/113283837/HP_IT_Essentials_I-PC_Hardware_and_Software_V4.0.part4.rar
http://rapidshare.com/files/113283838/HP_IT_Essentials_I-PC_Hardware_and_Software_V4.0.part5.rar


  • Network Consultants Handbook
http://svetulcho.org/docs/CISCO/Cisco%20-%20Network%20Consultants%20Handbook.pdf

English to Tamil Converter

Some of the English to Tamil Converter link given below..

LINK1 : http://www.azhagi.com/sai/Azhagi-Free-Setup.exe

LINK2: http://www.higopi.com/ucedit/Tamil.html

LINK 3: http://www.funworld.frih.net/tamil/tamil.html

LINK4: http://suratha.com/reader.htm

LINK5 : http://jaffnalibrary.com/tools/Unicode.htm

LINK6 : http://www.murasu.com/downloads/a2kse_full.exe

Multimedia E-Book

  • Maya 2008 Reference Guide
http://rapidshare.com/files/106344943/Maya2008_reference_guide.rar.html

  • Introducing Maya 8 3D for Beginners
http://rs111cg.rapidshare.com/files/63364003/Introducing_Maya_8-3D_for_Beginners.rar

  • Learning 3ds Max 2008 Foundation
part1 http://depositfiles.com/files/3513188

part2 http://depositfiles.com/files/3513181

  • An Introduction to Computer Graphics and Creative 3-D Environments
http://www.paid4share.net/file/8509/9781848000414-1848000413-rar.html

  • Blender 3D Architecture, Buildings, and Scenery
http://rapidshare.com/files/129292003/Packt_Pub_B3D_ABaS___pjk.rar

  • Mastering Photoshop CS3 for Print Design and Production
http://rapidshare.com/files/133843849/Potochop.rar.html

  • How to Cheat in Photoshop Elements 6
http://rapidshare.com/files/128638832/how.to.cheat.ps6.rar
  • Digital Art Magazine - June 2008
http://rapidshare.com/files/121301929/cw-digital_arts_magazine.rar

  • The Photoshop Anthology 101 Web Design Tips Tricks Techniques
http://technophilebooks.blogspot.com/2008/07/photoshop-anthology-101-web-design-tips.html

  • Java: The Complete Reference, J2SE 5 Edition
http://depositfiles.com/files/5583140

Hide ur folders..Disguise them to "Recycle Bin"

Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}

Example,
if u've a folder rasheed then right click then select the rename in the pop up menu

then type, "rasheed.{645FF040-5081-101B-9F08-00AA002F954E}"

then see the magic....

to go to original form,
remove the extension using
"ren rasheed.{645FF040-5081-101B-9F08-00AA002F954E} rasheed" in dos or as a bat file

Java Decompiler

SOME OF THE JAVA DECOMPILER HERE

  • Decafe Pro - Java Decompiler 3.6
          ftp://ftp.simtel.net/pub/simtelnet/win95/java/decafe38.zip

  • JDecompiler (Java Decompiler) 1.0
          http://www.brothersoft.com/d.php?soft_id=45214&url=http%3A%2F%2Fusoft.100free.com%2Fdownload.html

RARE EBOOK CONTENT



  • Collection of Interview Books:
http://lovecalc0.tripod.com/interview.html


  • Computer and communication networks
    ISBN: | 656 pages | Nov 02, 2006 | CHM | 11 Mb


    A Must have book!
    This essential reference begins by providing a solid foundation in TCP/IP schemes, wireless networking, Internet applications, and network security. The author then delves into the field's analytical aspects and advanced networking protocols.

    Students and researchers will find up-to-date, comprehensive coverage of fundamental and advanced networking topics, including:

    Packet-switched networks and Internet Network protocols

    Links

    LAN Protocols

    Wireless Networks

    Transport Protocols

    Applications and Management

    Network Security

    Delay Analysis

    QoS

    High speed protocols

    Voice over IP

    Optical Networks

    Multicasting Protocols

    Compression of Voice and Video

    Sensor/Mesh Networks

    Rapidshare Link:
    CODE
    http: //rapidshare. com/files/111043421/Computer_And_Communi
    cation_Networks__2006__www .allday-warez.com.rar


    MegaUpload Link:
    CODE
    http: //www.megaupload. com/?d=ZF4EYS5E

How to Hide a File/Files in an Image

How to Hide a File/Files in an Image

(Winrar required )

1. Gather the file you wish to bind, and the image file, and place them in a folder. For the sake of this demonstration, I will be using
C:\New Folder
-The image will hereby be referred to in all examples as fluffy.jpg
-The file will hereby be referred to in all examples as New Text Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar . From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\New Folder]

5. Type [copy /b fluffy.jpg + secret.rar fluffy.jpg] (remove the brackets)

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are two options that you can take

a) Change the file extension from fluffy.jpg to fluffy.rar, then open and your file is there
b) Leave the file extension as is, right click, open with WinRar and your file is there

Increase your Net ( BroadBand/Dial-Up ) Speed

Xp reserves 20% bandwith,
to unreserve it,follow following steps:


1. Click Start

2. Run:"gpedit.msc"

3. Goto:>Local Computer Policy
-------–>Computer Configuration
-------–>Administrative Templates
-------–>Network–>QOS Packet Scheduler
-------–>Limit Reservable Bandwidth

4. Double click on Limit Reservable bandwidth

5. Select Enable

6. Change 20% to 0%

7. Click Apply

HIDDEN PROGRAM IN WINDOW XP

Programs :

1. Private Character Editor :

Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit

2. Dr. Watson :

This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32

3. Media Player 5.1 :

Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32

4. iExpress :

Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress

Using Multiple IDs At The Same Time On Ur Yahoo Messanger

Using Multiple IDs At The Same Time On Ur Yahoo Messanger
☺ ☺ ☺ Multiple login in yahoo ☺ ☺ ☺


You can login with multiple ID's on the same yahoo messenger.

Follow these steps : ==>>

* Go to Start ==> Run ==>> Type regedit,hit enter

* Go to HKEY_CURRENT_USER ==>> Software ==>> Yahoo ==>> pager ==>>Test

* On the right pane ==>> right-click and choose new Dword value .

* Rename it as Plural.

* Double click and assign a decimal value of 1.

* Now close registry and restart yahoo messenger.

* For signing in with new id open another messenger .

☺ ☺ Enjoy ☺ ☺

Disable or Remove Shutdown



=> remove shutdown from start menu and also from all other possible options.
=> hide shutdown from start menu
=> disable shutdown all together
learn to do it now!!! (it takes less than a minute to do so)

Disclaimer: this is an article which just brings out the fact that removing the shut down menu option from the start menu is possible. If you however get caught by your manager or college system administrator, and get whipped in your ass, I cannot be held responsible. This tool is a inbuilt tool present in windows XP, just like msgconfig. So you got to execute this command using run.

1 . Start ->run and type gpedit.msc The gpedit stands for group policy and you can do wonders using this. Also if
you a minute with your pal’s system and this pal tries to flirt your girl friend
- You can make a lot of changes to his system in the time he leaves you alone
with his system, to have him go bonkers.


2. User configuration -> administrative Templates -> start menu and taskbar ->

3. This option opens up a pane on the right hand side. Identify the option named
- Remove SHUT DOWN on the start menu .


4. Double click Remove SHUT DOWN on the start menu option


5. a small screen pops up and you may like to read about the explanation in the
EXPLAIN TAB before you change the settings.


6. Just change the radio button TO ENABLED and say apply.
7. DONE. No need to log off or restart the system. (You may however have to find
a way to restart your system.)

8. This option disables the log off option from the system. From the start menu, also from the life saver – three buttons CTRL - ALT - DEL options. This option goes well with the HIDING THE LOG OFF FROM START MENU… (To shut down ur system:-without using frm shut down menu) The solution is that u can switch user thru task manager (alt+ctrl+del) or by pressing winkey+L where u get the option to turn off ur compy/restart/stand
by.
or u may create a shortcut using this shortcut location

to shutdown ur sys
%windir%\system32\shutdown.exe -s

to restart, u can use this shortcut
%windir%\system32\shutdown.exe -r

Notepad Trick Here

Notepad Trick !



Step 1: Open Notepad
Step 2: Write following line in the notepad.
this app can break
Step 3: Save this file as xxx.txt
Step 4: Close the notepad.
Step 5: Open the file again.



or

1> Open Notepad
2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters
3> DON'T hit enter at the end of the line.
4> Save the file.
5> Close Notepad.
6> Reopen Notepad.
7> Open the file you just saved.

or

Open a note pad
type Bush hid the facts
save that file,
close it
again open and see...


NOTEPAD "world trade centre trick".. :Rajesh


Did you know that the flight number of the plane that had hit WTC ...on
9/11 was Q33N ....Open your Notepad in ur computer and type the flight
number i.e Q33N... Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.

log trick !! make ur Notepad a diary !!

Sometimes we want to insert current data and time, whenever we open the file in the notepad. If you are a lazy person like me, who don’t like to press F5 whenever you open a notepad. Then here is a trick to avoid this. Just add a .LOG in the first line of your text file and close it.
Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.

WHY?

The reason this happens:

In notepad, any other 4-3-3-5 letter word combo will have the same results.
It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a "Byte-Order Mark" (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.

1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)
2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)
This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your code page) 16-bit UNICODE characters



Changing Header and Footer

Ever printed the little text you wrote in Notepad? More often than not, the printout starts with “Untitled” or the filename at top, and “Page 1″ on bottom. Want to get rid of it, or change it? Click on File, Page Setup. Get rid of the characters in Header and Footer boxes, and write what you want as Header and Footer. Use the following codes.

&l Left-align the characters that follow
&c Center the characters that follow
&r Right-align the characters that follow
&d Print the current date
&t Print the current time
&f Print the name of the document
&p Print the page number

Print tree root

a. Open NOTEPAD and enter {print tree root}
b. After that hit enter and type C:\windows\system
c. After that hit enter and type {print C:\windows\system\winlog
d. Hit enter and type 4*43″$@[455]3hr4~
e. Then save the file as teekids in C:\windows\system.

FOLDER AND SYSTEM ORIENTED TRCKS

Do you know, how can create a folder without any name!

When you create or rename a folder do following:

press "Alt" and type 255 and then press Enter.
be successful !
-------------******-------------

Create a new folder with the name X.
Open the command prompt and rename it to one of the following:

.{20D04FE0-3AEA-1069-A2D8-08002B30309D} (= My Computer)
.{450D8FBA-AD25-11D0-98A8-0800361B1103} (= My Documents)
.{208D2C60-3AEA-1069-A2D7-08002B30309D} (= My Network Places)
.{645FF040-5081-101B-9F08-00AA002F954E} (= Recycle Bin)
.{871C5380-42A0-1069-A2EA-08002B30309D} (= Internet Explorer)
.{21EC2020-3AEA-1069-A2DD-08002B30309D} (= Control Panel)
.{D20EA4E1-3957-11D2-A40B-0C5020524153} (= Administrative Tools)
.{00020D75-0000-0000-C000-000000000046} (= Inbox)
.{D20EA4E1-3957-11D2-A40B-0C5020524152} (= Fonts)
.{7007ACC7-3202-11D1-AAD2-00805FC1270E} (= Network Connections)
.{2227A280-3AEA-1069-A2DE-08002B30309D} (= Printers and Faxes)
.{7BE9D83C-A729-4D97-b5A7-1B7313C39E0A} (= Programs Folder)
.{E211B736-43FD-11D1-9EFB-0000F8757FCD} (= Scanners and Cameras)
.{D6277990-4C6A-11CF-8D87-00AA0060F5BF} (= Scheduled Tasks)
.{48E7CAAB-B918-4E58-A94D-505519C795DC} (= Start Menu Folder)
.{7BD29E00-76C1-11CF-9DD0-00A0C9034933} (= Temporary Internet Files)
.{BDEADF00-C265-11d0-BCED-00A0C90AB50F} (= Web Folders)
.{6DFD7C5C-2451-11D3-A299-00C04F8EF6AF} (= Folder Options)
.{00020801-0000-0000-C000-000000000046} (= Folder)
.{00021400-0000-0000-C000-000000000046} (= Another Folder)

Important: include the point and nothing before that!

Example: "rename X .{20D04FE0-3AEA-1069-A2D8-08002B30309D}"

You can make a shortcut to that folder, change the target and icon and you have a nameless shortcut.

The "My Computer","My Network Places" and "My Documents" folders will disappear when you place it on your desktop. (it's still there but you can't see it)

I discovered this a long time ago while I was using Windows 98 & WinHacker.
With WinHacker it was possible to create an expanding Control Panel in the Start Menu, but something went wrong and I got one without a name.
I wanted to recreate that and I did.



-------------******-------------

Create a Password Protected Folder Without Any Special Software
Now, here we will see how to create a folder that will not just be invisible, but also require a password to reveal it and open it. The best part is that you don’t need any special software to do this. Just plain old Notepad is all that you need.
Here is the code that you need:
cls
@ECHO OFF
title Folder Personal
if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK
if NOT EXIST Personal goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p “cho=>”
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Personal “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
attrib +h +s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
echo Folder locked
goto End
:UNLOCK

echo Enter password to Unlock folder
set/p “pass=>”
if NOT %pass%==pwd123 HERE goto FAIL
attrib -h -s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
ren “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” Personal
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Personal
echo Personal created successfully
goto End
:End

Now here is what you need to do:
Just copy the above code and paste it into Notepad. Save it by giving it any name you choose. Assuming, the file is called secret.txt, change the extension to ‘.bat‘ so that the new name becomes secret.bat. What you get is a batch file. You could actually save one step by saving the file in Notepad directly as secret.bat by enclosing the file name like this: “secret.bat” . This batch file is the one that you need. You can edit this batch file to change the folder name and the password. To change the name of the folder that is created, change the ‘Personal’ (in bold in the above code) to any another name you choose. Likewise change the ‘pwd123′ (in red in the code) to anything else.
Now let’s see how to use it. Place the file in the location where you would like to create your protected folder. Run the batch file by double clicking on it. This will create a folder named Personal in the same location as the batch file. You can now open this folder and place any files in it. Once you are finished, run the batch file again. You will be asked whether you want to lock the folder. Entry ‘Y’ (for Yes) and hit Enter. The folder becomes invisible. To retrieve the folder, run the batch file again. You will be prompted to enter the password. Enter the password, hit enter and voila! the folder appears.
Important: The batch file acts like a key to open the locked folder. So once you have created and locked a folder, do not keep the batch file in the same location since anybody can open the batch file and view your password. So I would suggest that you keep the batch file in a separate and safe place or better still keep it on your pen drive or flash drive. That way when you want to open the folder just copy the batch file to the location where you have your protected folder and run it.
Do remember that the above method is not intended to act as a substitute for the numerous free and commercial softwares that are specifically designed to provide security and encryption to your data.

-------------******-------------

Lost your Windows password? Here’s what you can do to get around.

Due to the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.
If you have access to another user account with administrator rights, you can use that account to change the password of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.
First you need to boot the system into Safe Mode.
  1. Restart your system.
  2. When you see the blue screen, press the ( F8 ) key about 3 times a second.
  3. You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode).
  4. Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
  5. The system should boot to Safe Mode.


-------------******-------------

How To Create An Executable JAR File

Today I will show you how to create an executable jar file. I do not know whether this topic is introduced by any other member. Using this method one can build graphical user interface program with java which will behave similar to Executable files i.e., the program can be started with double clicks. It is an easy alternative. Otherwise to run a java program one has to run it through comand prompt(in windows) using java command or by creating java executalbes which are very difficult to make. So lets begin:
Frist of all, we will create a simple java application using java foundation class popularly known as java Swing. Let the file name be JarExample.


CODE
import java.awt.*;
import java.awt.event.*;
import javax.swing.*;

public class JarExample {

private static void createAndShowGUI() {
JFrame.setDefaultLookAndFeelDecorated(true);

JFrame frame = new JFrame("Window");
frame.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);

JLabel emptyLabel = new JLabel("");
emptyLabel.setPreferredSize(new Dimension(175, 100));
frame.getContentPane().add(emptyLabel, BorderLayout.CENTER);

frame.pack();
frame.setVisible(true);
}

public static void main(String[] args) {
javax.swing.SwingUtilities.invokeLater(new Runnable() {
public void run() {
createAndShowGUI();
}
});
}
}


Now compile the java file. JDK will produce two class files namely (a)JarExample.class ( JarExample$1.class.
All the years we have been doing this.Your question might be what new? Its coming.
Now we will create a Manifest File. If you have done java beans then you are quite familiar with the term.
Let write our Manifest File:-
The name of the file is :- jex.mf

CODE
Manifest-Version: 1.0
Main-Class: JarExample

We are now ready to create our JAR file.
create a folder, keep the class files (JarExample.class,JarExample$1.class) and the manifest file in that folder.
Now open command prompt. Say for example your folder name is jar and you have kept it in C DRIVE. Now change directory using CD jar command.
Now we will create jar file using following command.
c:\jar>jar cfm jarex.jar jex.mf *.class
It will create jarex.jar .
I wish you will be able to create jar file using this method.

Some Of The Use ful Info About JAVA &J2EE

  • What is JAVA ?
Java is a pure object oriented programming language, which has derived C syntax and C++ object oriented programming features. Is a compiled and interpreted language and is platform independent and Can do graphics, networking, multithreading. It was initially called as OAK.

  • Encapsulation : Nothing but data hiding, like the variables declared under private of a particular class are accessed only in that class and cannot access in any other the class.

  • Inheritance : Is the process in which one object acquires the properties of another object, ie., derived object.

  • Polymorphism: One method different forms, ie., method overriding and interfaces are the examples of polymorphism.


  • What are Java Buzzwords ?
Simple : Easy to learn.
Secure : Provided by firew alls between networked applications.
Portable : Can be dynamically downloaded at various platforms in internet.
OOP : Four Corner stones.
Multithread : Can perform more than one task concurrently in a single program.
Robust : overcomes problems of de-allocation of memory and exceptions.
Interpreted : Convert into byte code and the executes by JVM.
Distributed : Concept of RMI.
Dynamic : Verifying and accessing objects at run time.

  • Scope and lifetime of variables ?
scope of variables is only to that particular block lifetime will be till the block ends.

  • Explain about Static ?
When a member is declared as static it can be accessed before any objects of its class are created and without any reference to any object. these are global variables, no copy of these variables can be made. static can also be declared for methods. and cannot refer to this or super.

  • method overloading : same method name with different arguments.
  • method overriding : same method name and same number of arguments

  • How Exception handling is done in Java ?
Is managed via 5 keywords :
try : statements that you want to monitor the exceptions contain in try block.
catch : the exception thrown by try is catched by this.
throw : to manually throw exception we go for this.
throws : Exception that is thrown out of a method must be specified by throws after the method declaration.
finally : This block is executed whether or not an exception is thrown. and also it is executed just before the method returns. and this is optional block.

  • What is the use of bin and lib in JDK?
Bin contains all tools such as javac, appletviewer, awt tool, etc., whereas lib contains API and all packages.

  • What is the difference between superclass and subclass?
A super class is a class that is inherited whereas sub class is a class that does the inheriting.

  • What is the difference between exception and error?
The exception class defines mild error conditions that your program encounters.
Ex: Arithmetic Exception, FilenotFound exception
Exceptions can occur when
- try to open the file, which does not exist
- the network connection is disrupted
- operands being manipulated are out of prescribed ranges
- the class file you are interested in loading is missing
The error class defines serious error conditions that you should not attempt to recover from.
In most cases it is advisable to let the program terminate when such an error is encountered.
Ex: Running out of memory error, Stack overflow error.

  • What is adapter class?
An adapter class provides an empty implementation of all methods in an event listener interface. Adapter classes are useful when you want to receive and process only some of the events that are handled by a particular event listener interface. You can define a new class to act listener by extending one of the adapter classes and implementing only those events in which you are interested.

  • What is meant by controls and what are different types of controls in AWT?
Controls are components that allow a user to interact with your application and the AWT supports the following types of controls:
Labels, Push Buttons, Check Boxes, Choice Lists, Lists, Scrollbars, Text Components.
These controls are subclasses of Component.

  • What is Bootstrapping in RMI?
Dynamic loading of stubs and skeletons is known as Boot Strapping.

  • What is servlet tunnelling?
Used in applet to servlet communications, a layer over http is built so as to enable object serialization.

  • What is the frontend in Java?.Also what is Backend?.
Frontend: Applet
Backend : Oracle, Ms-Access(Using JDBC).

  • What are theTools provided by JDK
(i) javac - compiler
(ii) java - interpretor
(iii) jdb - debugger
(iv) javap - Disassembles
(v) appletviewer - Applets
(vi) javadoc - documentation generator
(vii) javah - ' C' header file generator

  • What are the Java Primitive Data Types ?
Byte-8-bit, short-16-bit, int-32-bit, Long-64-bit, Float-32-bit floating point, Double-64-bit floating point, Char-16-bit Unicode

  • What are the packages in JDK?
There are 8 packages
(i) java.lang
(ii) java.util
(iii) java.io
(iv) java.applet
(v) java.awt
(vi) java.awt.image
(vii) java.awt.peer
(viii) java.awt.net

  • What is runnable?
Its an Interface through which Java implements Threads.The class can extend from any class but if it implements Runnable,Threads can be used in that particular application.

  • What is synchronization?.
Two or more threads trying to access the same method at the same point of time leads to synchronization.If that particular method is declared as synchronized only one thread can access it at a time. Another thread can access it only if the first thread' s task is complete.

  • What is a Skeleton ?
Skeletons are server side proxies and stubs are client side proxies. True

  • Who introduced Jscript ?
Netscape introduced JScript language

  • What is MIME ?
MIME(Multipurpose Internet Mail Extension) is a general method by which the content of different types of Internet objects can be identified.

  • What are different ways of Session-Tracking?.
(i) User-Authorization
(ii) Hidden Files
(iii) Persistant Cookies
(iv) URL Rewriting.

  • What are the four components in URL ?
http:// www. yahoo .com : 8080 / index.html
http: --- > is protocol
www. yahoo .com --- is IP address
8080 -- port number and is a pointer to memory location.
index.html -- file path to be loaded

  • What is a StringTokenizer ?
String Tokenizer provide parsing process in which it identifies the delimiters provided by the user , by default delimiters are spaces, tab, newline etc. and separates them from the tokens. Tokens are those which are separated by delimiters.

  • What are macros and Inline functions ? Which is best and Difference ?
Inline functions do Parameter passing, where as Macros do Text Substitution.
Its better to go for Inline functions than macros, else you may get different results.

  • What is Serialization ?
The process of writing the state of an object to a byte stream. and can restore these objects by using deserialization.Is also need to implement RMI, which allows a java object of one machine to invoke java object of another machine.ie., the object is passed as an argument by serializing it and the receiving machine deserializes it.

  • What is the difference between CGI and Servlet ?
CGI suffered serious performance problems. servlets performance is better.
CGI create separate process to handle client request. and Servlets do not.
CGI is platform dependent, whereas Servlet is platform-independent b’cauz written in java.
Servlets can communicate with applets, databases and RMI mechanisms.

  • What are Vector, Hashtable, LinkedList and Enumeration?
Vector : The Vector class provides the capability to implement a growable array of objects.
Hashtable : The Hashtable class implements a Hashtable data structure. A Hashtable indexes and stores objects in a dictionary using hash codes as the object' s keys. Hash codes are integer values that identify objects.
LinkedList : Removing or inserting elements in the middle of an array can be done using LinkedList. A
LinkedList stores each object in a separate link whereas an array stores object references in consecutive locations.
Enumeration : An object that implements the Enumeration interface generates a series of elements, one at a time.
It has two methods, namely hasMoreElements( ) and nextElement( ). HasMoreElemnts( ) tests if this enumeration has more elements and nextElement method returns successive elements of the series.

  • What is the difference between an applet and a servlet?
Servlets are to servers what applets are to browsers.
Applets must have graphical user interfaces whereas servlets have no graphical user interfaces.

  • What is the difference between doPost and doGet methods?
a) doGet() method is used to get information, while doPost( ) method is used for posting information.
b) doGet() requests can' t send large amount of information and is limited to 240 -255 characters. However, doPost( )requests passes all of its data, of unlimited length.
c) A doGet( ) request is appended to the request URL in a query string and this allows the exchange is visible to the client, whereas a doPost() request passes directly over the socket connection as part of its HTTP request body and the exchange are invisible to the client.

  • What is the life cycle of a servlet?
Each Servlet has the same life cycle:
a) A server loads and initializes the servlet by init () method.
b) The servlet handles zero or more client' s requests through service( ) method.
c) The server removes the servlet through destroy() method.

  • What are the different servers available for developing and deploying Servlets?
a) Java Web Server
b) JRun
g) Apache Server
h) Netscape Information Server
i) Web Logic

  • How do servlets handle multiple simultaneous requests?
The server has multiple threads that are available to handle requests. When a request comes in, it is assigned to a thread, which calls a service method (for example: doGet(), doPost( ) and service( ) ) of the servlet. For this reason, a single servlet object can have its service methods called by many threads at once.


  • What is the difference between TCP/IP and UDP?
TCP/IP is a two-way communication between the client and the server and it is a reliable and there is a confirmation regarding reaching the message to the destination. It is like a phone call. UDP is a one-way communication only betw een the client and the server and it is not a reliable and there is no confirmation regarding reaching the message to the destination. It is like a postal mail.

  • What is RMI and steps involved in developing an RMI object?
Remote Method Invocation (RMI) allows java object that executes on one machine and to invoke the method
of a Java object to execute on another machine.
The steps involved in developing an RMI object are:
a) Define the interfaces
b) Implementing these interfaces
c) Compile the interfaces and their implementations with the java compiler
d) Compile the server implementation with RMI compiler
e) Run the RMI registry
f) Run the application

  • What is RMI architecture?
a) Application layer ---- contains the actual object definition
b) Proxy layer ---- consists of stub and skeleton
c) Remote Reference layer ---- gets the stream of bytes from the transport layer and sends it to the proxy layer
d) Transportation layer ---- responsible for handling the actual machine-to-machine communication

  • What are Predefined variables or implicit objects?
To simplify code in JSP expressions and scriptlets, we can use eight automatically defined variables, sometimes called implicit objects. They are request, response, out, session, application, config, pageContext, and page.

LinkWithin

Related Posts Plugin for WordPress, Blogger...