September 6, 2009

How TinyURL work's !!

The service tinyurl accepts a long URL string (presumably the location of a web document or something else such) and creates a permanent shortcut for it.


to




The question is, how does the service create such a small shortcut for any of the virtually thousands of web URLs out there? Does it compress the URL? Does it store it somewhere?

A little judicious observation can reveal some of the little "secrets" behind this service. The first "obvious fact" is that the shortcut has always a fixed length. In fact, the effective length looks as if it is exactly six (last 6 characters). The second "obvious fact" is that the shortcut consists of only small-caps letters and the digits 0-9.

The above observations quickly lead to the conclusion that the number of all possible configurations of the second part of the shortcut string is bounded above by 366 = (26 letters + 10 digits)6. This number equals 2176782336 and is close to maxlongint (or max int in Java).

Therefore, all one has to do to create such a service is have a Java program with the following (pseudo) declaration:

T=array[1..int] of string;

Considering the maximum length of any string allocated to be 255, an upper bound for the memory of this table will then be 2147483647 * 255 = 547608329985 bytes. That's roughly 510 Gigabytes of storage space and is doable with large capacity drives.

so, TinyURL variations are not limitless but they are close !!!

will have more posts regarding URL shortening services soon :)

Read more...

June 14, 2009

How to write HTML code in your post

When we want to write our HTML code in our post , unfortunately we cannot write the code directly as we type.This is because whatever we write is executed in HTML and PHP form and thereby , making the actual code disappear.

There are coupleof methods and in this post we discuss one of them



firstly we need to convert following HTML parts in our code to the following

  1. Replace all & symbol with &
  2. Replace all <> with &lt; &gt;
  3. and finally all " with &quot;

for example- if we need to post



<code><strong>techQE code</strong></code>



we replace all to get the following code to be written



&lt ;code&gt ;&lt ;strong&gt ;techQE code&lt ;/strong&gt ;&lt ;/code&gt ;



other methods will crop up in later posts .

for any DBTS plz comment

Read more...

June 10, 2009

NoKia - unKNOWN codes

Secret Codes Of Nokia Mobiles:

These special key sequences entered fromkeyboard of phone allow you to get some important information like IMEI number, release date, software version and much more.
You
can also choose default language, activatenetmonitor ect.

1610/1630
*#170602112302# (software version)
1610/1611

IMEI number: -*# 0 6 #
Software version: -* # 1 7 0 6 0 2 1 1 2 3 9 2 #
Simlock status: - # 9 2 7 0 2 6 8 9 #

2110
*#9999# (software version)

2110i/2110e
*#170602112302# or (depends on model)*#682371158412125# (software version)

NOKIA3110
*#06# -IMEI
*#3110# -Software version
##002# - allows to turn off voice mail.
*#7780# - restore factory settings
*#746025625#(or *#sim0clock#) - to check if clock of sim (SIM-Clock) can be
stopped (SIM-Clock-stop is akind of standby mode which saces battery)
*#92702689# (or *#war0anty#) -"warranty code:"- you have to enter one of the
following codes:
6232 (OK)displays month and year of production date (ie "0198")
7332 (OK) - displays date of last repair - if there is (ie. "DATE NOT SAVED")
7832 (OK) - displays date of purchase - if there is (ie. "DATE NOT SAVED")
9268 (OK) -displays serial number
37832 (OK) -sets purchase date in format MMYY (MM - month, YY - year)- attention:
you can set it only once, so beware !
87267 (OK)-displays message "Confirm Transfer?" - meaning is unknown (?)
* # 9 2 7 0 2 6 8 9 # -Simlock info
*#31# (call) -sets if your phone no. will be hidden or not (works only in some
networks)
*#76# (call) -sets if target phone number when you call should be displayed (works
only in some networks)
*#77# (call) -(work s only in some networks)
*#33/35# (call -displays message "Service not active".
**31# (call) -your no. will not be showed to others when you make a call

3210
*#06# -IMEI
*#0000# -software version
*#92702689# (or *#war0anty#)- enters service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system Enhanced Full Rate .
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.
xx# -Replace xx with desired phonebook entry - press # and you will see it on
display.

51XX
*#06# -IMEI
*#0000# - Software version
*#92702689#( or *#war0anty#) Enter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.
#pw+1234567890+1 -provider lock status
#pw+1234567890+2 -Network lock status
#pw+1234567890+3 -Provider lock status
#pw+1234567890+4 - SimCard lock status

NOKIA 61XX
*#06# -IMEI
*#0000# ;-*#99 99# (Nokia 6130)
*#92702689# (or *#war0anty#) Software versionEnter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.

NOKIA8810
*#06# - IMEI
*#0000# -Software version
*#92702689# (or *#war0anty#) Enter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy
#4720# -Turns off battery save mode - saves about 30 % of energy

NOKIA99OO
*#06# -IMEI
*#682371158412125# -Software version
*#3283# -Displays week and year of manufacture, ie. 1497 means 14th week of 1997.

NOKIA 911O
*#06# IMEI
*#0000# SOFTWARE VERSION
*3370# Turns on sound encoding system - Enhanced Full Rate.
#3370# Turns off sound encoding system - Enhanced Full Rate.
*4720# Turns on battery save mode - saves about 30 % of energy.
#4720# Turns off battery save mode.

NOKIA 81XX
*#06# IMEI
*#8110# Software version
xx# Replace xx with desired phonebook entry - press # and you will see it on
display
*#92702689# (or *#warOanty#)

"Warranty code:" - you have to enter one of the following codes:
9268 (OK) displays IMEI (International Mobile Equipment Identification)
6232 (OK) displays date of manufacture in format MMYY (MM - month, RR - year)
7832 (OK) displays date of purchase
7332 (OK) displays date of repair or upgrade
37832 (OK) sets date of purchase in format MMYY (MM - month, RR - year) -
attention: you can set it only once, so beware !!!
87267 (OK) transmits user data/move data do service PC

Read more...

How To Take Screenshot Linux ( Ubuntu )

There are several ways to take a screenshot Linux in general.
If you aren't using GNOME, then the GNOME-specific items won't work.


One way to take a screenshot in Ubuntu is to go to the main menu:
Applications —> Accessories —> Take Screenshot.




How to Take a Screenshot in Linux With the PrintScreen Button

You can also take a screenshot of the entire screen by pushing the
"Print Screen" (PrtSc) button on your keyboard. To get a screenshot of
only the active window, use Alt-PrtSc.


How to Take a Screenshot in Linux With the Terminal (ImageMagick)

If you need a delay before taking the screenshot (for example,
to get a screenshot of a menu that would disappear if you took
a screenshot with GNOME) ImageMagick is the best way.

make sure you have ImageMagic installed: type import -version in the terminal.
If ImageMagick is installed, you will see the ImageMagick version number.
To install ImageMagick in Ubuntu (or any Debian-based distro),
just type sudo apt-get install imagemagick.

To take a screenshot in the terminal with ImageMagick,
type the following line into a terminal and then click-and-drag
the mouse over a section of the screen:

import MyScreenshot.png

GNOME will beep once when the screenshot begins, and once again when the
screenshot is complete. Then type eog MyScreenshot.png in the terminal to
view your screenshot. "eog" is the command to start Eye of GNOME.

To capture the entire screen after a delay (so you can open some menus or whatever),
type sleep 10; import -window root MyScreenshot2.png.
The first part of that line, sleep 10; will give you a 10 second delay before
the screenshot begins. The next part, import -window root,
tells ImageMagick to import the "root" window — that is, the entire screen.
The last part MyScreenshot2.png is the name of your screenshot.



How to Take a Screenshot in Linux With the Terminal (scrot)


To install scrot (on Ubuntu) type:
sudo aptitude install scrot

To take a screenshot in Linux from the terminal with scrot type:
scrot MyScreenshot.png

To get a screenshot and immediately open it in the GIMP, type:
scrot -q 85 -d 5 screenshot.png && gimp screenshot.png &

The -q option sets the quality. The -d sets the delay.
The && means that if the first command is true, then execute the second.
The final & means to run the commands in the background so that you
can still use that terminal for other commands.



How to Take a Screenshot With the GIMP

To take a screenshot with the GIMP,
find the following menu option: File —> Acquire —> Screen Shot.
You will then be offered some options for the screenshot such as length
of delay and whether you want to take a screenshot of the entire screen, or just a window.




How to Take a Screenshot of a Web Page With Firefox

Snapper Firefox Screenshot Extension

to take a screenshot of a section of a web page, use Snapper.

A great Firefox extension for taking screenshots is called ScreenGrab.
ScreenGrab will take screenshots of entire web pages
even the parts that run off the screen.

Read more...

How to take Screenshots

This document describes how to capture an image of the screen in Windows (all versions).

  • Press the PrintScreen key on the keyboard
(generally located in the top right hand corner)
to capture an image of the entire screen and store it in the Windows clipboard.

  • Press Alt & Print Screen (sometimes labeled as Prt Sc)
to capture an image of only the active window and store it in the Windows clipboard.


When the desired image is stored in the windows clipboard
(only one image can be stored at a time), it can be extracted
by opening a word process program (Microsoft Word, Microsoft Publisher, etc.)
or an image manipulation program (such as Adobe Photoshop or Microsoft Paint),
and selecting
Paste from the Edit menu or press Control & V.


In Windows Vista

In Vista (except in Home Basic), there is a tool called the Snipping Tool.
To open it, click on the start menu, type 'snip', then hit enter.
The Snipping Tool opens, and a white mask is applied on the screen.
In the drop-down menu for the 'New' button, choose from a free-form snip,
rectangular snip, window snip, or full-screen snip.
In free-form snip mode, draw around the area you want to be captured.
Drag a rectangle in rectangular snip mode. For window snip mode,
select the window you want to capture. In full-screen mode, just selecting it
from the drop-down menu makes the capture.
The snipped image is then opened within the Snipping Tool, but is also copied
to the Windows clipboard for use in other applications.

Read more...

June 9, 2009

Introducing - Computer worm

In computer terminology, a Worm is a self-replicating threat that travels
through a network and settles in a computer via a variety of online applications
like e-mails, chat clients, P2P clients, etc. A worm does not attach itself to any
program that explicitly needs to be executed for its spread. Instead, it travels
through networked applications and primarily replicates itself up to a point
where the network is clogged with its clones, preventing it from being used by
legitimate applications.

The different types of worms you could encounter are:

http://computerrepairmaintenance.com/images/computer-virus-picturejpg.jpg

E-mail worm:

This type of worm uses e-mail as its vehicle. When an infected e-mail reaches
your inbox, it does nothing unless the e-mail is opened to be read. When you
open the mail, you may see an attachment or a link to a real or fictitious web site.
The moment you click on the link and visit the web site, the worm gets triggered.
Once activated, it starts searching your address book and sends e-mails to your
contacts. It can even fake the sender’s address, so that the recipient assumes that
the mail is not from someone he knows. Clearly, across an office network consisting
of tens or hundreds of users, the numbers of ficticious e-mails traversing the mail
servers grow exponentially over a short time. E-mail worms often bring down
mail servers and clog their functioning.

File sharing network worm:

This worm generally proliferates through a shared folder of a machine.
It creates a copy of itself and masks its intent by using a seemlingly harmless
and unassuming name. The moment you connect to a networking site like ‘kazaa.com’
and your sharing folder gets accessed, the copy of the worm moves from your computer
to other computers in the file sharing network. With millions of computers actively
being used to access files from peer-to-peer networks, these worms can proliferate
very quickly. Another popular type of worm is the instant messaging worm
(similar to the email worm, but uses an instant messenger service as its vehicle).

Trojan:

Trojans are malicious programs that pose as legitimate applications.
When users execute such programs, blissfully unaware of their real intent,
the host computer gets infected. Once on your computer, it may strike in a
variety of ways, ranging from capturing what you see on your screen to logging
what you type. The captured information is then sent to the author of that
malware through the Internet. You could therefore stand to lose precious data,
bank passwords and the like. The different types of Trojans include remote access
Trojans, where others can gain access to and even take over your machine,
data sending Trojans that scan your computer and send data to the author, and
destructive Trojans that simply delete files on the host computer. Trojans can also
infect your computer and you may face denial of service (unavailability of data).
Trojans even have the potential to counter anti-virus software by changing their
coding DNA (a process known as polymorphism), making it harder to detect.
Some Trojans are developed such that they will only be activated on particular
dates, or when certain pre-defined conditions are met by the computer.
These Trojans are known as ‘Time bombs’ and ‘Logic bombs’ respectively.
Spyware Like Trojans, Spyware is also a type of computer application, developed
with the intention of stealing information from your computer. These applications
can steal data including the history of web sites you have visited, passwords that
you have used to access online secure services, etc . However, unlike Trojans and
worms, spyware cannot replicate but it does exploit the host computer for
commercial gain. These include everything from throwing unsolicited
pop-up advertisements, capturing your web browser’s home page and
directing it elsewhere. This type of application cannot spread by itself,
therefore its efficacy depends solely on whether you choose to install the
software. Since users wouldn’t intentionally install applications that are
detrimental to their interest, spyware represents itself as a utility application,
for example, a web accelerator, a free image utility, etc. Spyware often piggy-backs
on to shareware applications found on download web sites or application CDs.

Adware:

Adware is more of an annoyance than a threat. Typically found in applications
downloaded from questionable web sites, it infects the host computer by
downloading and installing other advertising material and displaying it on
your computer via annoying popups that appear while you use Internet applications.
This is where adware generally gets confused with advertising-supported software.
The latter is not malicious and only displays an advertisement within the window of
the application program (such as trial or shareware versions of software). Adware,
on the other hand, displays advertisements randomly, often when you least expect it.

The last call:

This new breed of Internet threats may or may not be harmful to users,
but they do hamper the performance of computers. To protect computers
from today’s digital threats, an anti-virus program is a good place to start.
for application suites that specifically offer protection against all of these
threats and not just ones that offer plain vanilla virus protection. In today’s
world, data security requires blanket protection systems that do it all.
You can also install anti-spyware and adware application like NoAdware,
ErrorDoctor, Spynukke, AdAware, etc. Secondly, it is important to exercise
caution on what applications and fi les are downloaded. This includes your
mail attachments.
Chain mails with attachments (such as .exe, .com, .scr, .bat, or .pif),
download sites that contain links of questionable web sites, applications
that aren’t from trusted sources should all raise a user’s alarm bells.
Most of the time, the battle against malware can be won before
it even begins—all it takes is a bit of vigilance.

Read more...

Browse faster - simple tips

For those of you who have slower connections, here are the ways to speed up
your connection.Use the following tips to browse faster with a limited bandwidth.

Always use Firefox and Opera to browse the web: Both FF and Opera are faster
than IE and have got lots of Bandwidth saving features.
For instance, the new version of Gmail pre-fetches the emails for faster performance
which is a bandwidth sucker. It loads all emails including those which you have
no intention reading at that time.

Block unwanted Images:
Opera can block images via a button on the View bar.
A Firefox Add-on ImgLikeOpera does the same on Firefox.Most websites
usually contain lots of animations and images which we don’t even notice.
If you need any images, you can always load specific images
(Right click > View image on Opera and Right click > Load image on FF).
Use "Load cached images" option.

Block Flash and Adsense:
Use the Adblock Plus Firefox Add-on to block Adsense Ads and Flash animations.
A flash ad can be as big as 200 kb or even more! This add-on makes pages load
faster and saves on bandwidth. If you have ever been to Digg, you might have
noticed the number of Ads per page. How fast would the pages load if there
were no ads?

Remove the Bandwidth Intensive Plugins:
Some Firefox Add-on’s like those that bring you the Alexa ranks or Google PR,
connect with their server to bring you the stats. If you don’t need those stats,
disable those plugins. If you need the stats sometimes, but not every now and \then, then create a different Firefox profile with those plugins.

Hibernate Windows instead of Shutting Down:
Hibernation saves your desktop the way you left it
(Microsoft says that even the mouse location is saved).
Save your windows and continue work from last days end.
That’s saves a lot of unnecessary pageloads and saves bandwidth!

Use Desktop Clients like Pidgin and TweetDeck:
Pidgin is an open source chat client that can connect to multiple chat networks
at the same time. Moreover it’s a very light client that doesn’t suck bandwidth
the way Gtalk does. TweetDeck is a must have fo. It makes the twitter
experience more enjoyable by fetching the tweets so that you don’t have
to refresh your pages to see if you have new tweets.

Block Automatic Updates:
Most software have the automatic updates enabled by default.
The software detects when you are connected to the internet and checks
and downloads updates. So you loose control on your bandwidth.
Instead, Disable all automatic updates and all softwares towards
the end of the month, when you know how much usage remains.

Disable Opening of Files inline:
Browsers open PDF files and Video files inline. It might open a PDF without
telling you how big the file is. Worst part, the browser becomes non-responsive
until it completes loading the file.
Result: You waste bandwidth on a large PDF which you have no intention reading.
You can disable that in Firefox Options.

Monitor your usage:
Use a Network monitor to know how much you use and how much
bandwidth remains. It helps in planning things better.
Use a Free Bandwidth meter from ShaPlus. It’s a good one and has the necessary options.

Read more...

About This Blog

Lorem Ipsum

  © Blogger templates Newspaper III by Ourblogtemplates.com 2008

Back to TOP