Monday, 13 March 2017

Learn java easily with "Core Java Tutorials"


Cover art


   Core Java Tutorials- screenshot     Core Java Tutorials- screenshot     Core Java Tutorials- screenshot



   Core Java Tutorials- screenshot     Core Java Tutorials- screenshot     Core Java Tutorials- screenshot


Feature
★ Offline Java interactive Tutorials with Example,Quiz,Tips.
★ Beautiful programs with output, syntax highlighting and detailed comments for better understanding.
★ 1100+ Java Questions Complete OCJP/SCJP package with all varieties of question asked in exam (Single correct MCQ ,Multiple correct MCQ,Output based & arrangement based )
★ Detailed Analysis of your progress Topic wise.
★ Java Interview with detailed explanation with images,programs & Output.
★ Very simple user interface following material design guidelines.
★ You can ask Your doubt/Question On stack and Get answer from experts.
★ Java Dictionary which contains detailed explanation with images,codes for (Java keywords,Java Common Error,Java Common Exception ,Detailed Glossary for Explanation ). 


★★★ Also we have Active Challenges so that you can compete among your peers★★★





Sunday, 19 June 2016

Java OCJP +:Our new App To test Your Java Skills



 
 


OCJP+ is a JAVA application that allows you to train to pass OCJP/SCJP certification exams online.
One of the most comprehensive JAVA application with 850+ Quiz question with constant Update.
The JAVA questions are displayed in random batches and a score is given at the end.
You can also Give Topic wise Test.
You can ask Your doubt/Question On stack and get answer from experts.
you can also post an answer to someone's Question.

We also Brings you the collection JAVA programs Packed which are updated in out database , which are very useful for anyone who wants to learn JAVA Programming.
This app helps you refer to a great collection JAVA programs on the go and Helps you improve Logical thinking of various problems related to java Programming .
Its an Application to give source code and output for various JAVA Programs.
Features:
1. Constantly upadate programs with Outputs,(saved offline)
2. Explanation how JAVA program works.
3. You can ask Your doubt/Question in program On stack and get answer from experts.
4. With Search Feature to easily find the JAVA Programs you want from a huge list of java programs.
Also for all those preparing for java interviews, this app consists of some of the most important java questions that are most frequently asked in technical rounds of interviews.
-This app is also a must have for beginners who are new to java.
-We constantly update java question which can saved offline.
-you can sort list questions and save it to your favorite list .
-Output based java questions are also incorporated in the question set for users to apply their theoretical java knowledge to practice.

DOWNLOAD NOW FROM PLAYSTORE  IT'S FREE

Saturday, 3 October 2015

How Amazon Employee bought 'Google.com' Domain for Only $12 from Google


buy google domain
Difficult to believe this, as we hardly come across such news.

But trust me, a person managed to buy no ordinary .com domain, but — Google.com and that too for one whole minute.

Sanmay Ved, an ex-Google employee and current-Amazon employee, experienced something of a shock when he found that the world's largest search engine website, Google.com, was "available" for purchase.

What's Even More Shocking?


It's the cost of the most-trafficked domain in the world — Only $12.

Expecting to get an error message, Ved added the domain to his shopping cart and made payment. The entire purchasing process went through without any difficulty.

Within moments, his inbox and Google Webmaster Tools were flooded with webmaster related messages confirming his ownership for Google.com.
"The scary part was I had access to the webmaster controls for a minute," Ved said.
However, soon he received an order cancellation email and refund from Google Domains, as Google personally owns Google Domains, so it can still control all purchases made through it and revoke them if needed.

Google Forgot to Renew Ownership. Really?

google-domain-buy.png
It is still unclear what exactly happened – if it was due to a bug in Google Domains or the company really "forgot" to renew ownership of its address using its own domain service.

Whatever the reason, the experience of owning the search engine giant Google.com does indeed sound great.

Ved has posted all the ordeal along with screenshots on his LinkedIn account blog post.

Tuesday, 11 August 2015

A New Company Called Alphabet Now Owns Google; Sundar Pichai Becomes New CEO


Alphabet Now Owns Google
Well, this was a very unexpected move by Google.

Google Co-Founder Larry Page announced a restructuring of the whole company, revealing the creation of the umbrella "Alphabet" corporation.

But, don’t worry… Google isn’t dead! Rather, Google will become part of Alphabet.

Why Google Rebrands As ‘Alphabet’


Over time, Google, the Mountain View company has become a lot more than just a Search Engine.

Google created and acquired a large number of other popular Internet services, including Android, YouTube and Gmail, that makes too much difficult for a single company to manage all of them effectively.

According to Google Founders, it’s time, when different projects require different leaders, different company cultures, and different types of resources.
"Our model is to have a strong CEO, who runs each business, with Sergey and me in service to them as needed," Page wrote.
So the founders decided to create an all new parental brand that will manage both Google as well as its other far-flung projects — called ‘Alphabet’, going to be the biggest tech company most people have never heard of.

As a part of the new structure, Alphabet will manage Google and all of its other products, including:
Google
  • Calico, an anti-aging biotech Research Division
  • Nest, Google's Smart-Home project
  • Sidewalk, a company, focused on Smart Cities
  • Fiber, Company for High-speed Internet services
  • Investment arms, such as Google Capital and Google Ventures
  • R&D unit, such as Google X, developing Self-driving cars and Drones.

Alphabet Inc. will replace Google Inc. as the publicly traded company on the Nasdaq Stock Exchange, and shareholders will get one Alphabet share for every Google share they previously owned.

G is for 'Google' and 'Sundar Pichai 'is New CEO


Google’s senior vice president Sundar Pichai (Pichai Sundararajan), currently senior vice president of products, will be the new CEO of the Search Engine.
alphabet-google-company
Google is now a more coherent company than it was previous. Google will now include the company's core businesses, including:
  • Search Engine
  • Advertising, Adwords, and Adsense
  • Google Maps
  • YouTube, the Video Service
  • Android, Mobile operating system
  • Chrome operating system
  • related technical infrastructure.

And the current CEO Larry Page will become Alphabet’s CEO. Co-founder Sergey Brin will be its president, and Eric Schmidt will be the executive chairman of Alphabet.
"It is clear to us and our board that it is time for Sundar to be CEO of Google," Larry Page wrote in the open letter announcing the creation of Alphabet.
"Google itself is also making all sorts of new products and I know Sundar will always be focused on innovation—continuing to stretch boundaries. I know he deeply cares that we can continue to make big strides on our core mission to organize the world's information."
The 43-year-old Sundar Pichai rose quickly at Google, from working with the Chrome team to lead both the team as well as Android as senior vice president of Products.

The Launch of Alphabet Inc. will not affect you at all, but Good news… the company’s shares jumped 6 percent after hours, adding tens of billions of dollars to its value.

Kali Linux 2.0 Released — Download Most Powerful Penetration Testing Platform


kali Linux 2.0 Download
Offensive Security, the creators of Swiss army knife for Security researchers, Penetration testers and Hackers have finally released the much awaited and most powerful version of Kali Linux 2.0.

Kali Linux 2.0 (Codename ‘Kali Sana’), an open-source penetration testing platform brings hundreds of Penetration Testing, Forensics, Hacking and Reverse Engineering tools together into a Debian-based Linux distribution.

Kali Linux 2.0 offers a redesigned user interface for streamlined work experience, along with a new multi-level menus and tool categories options.

Kali Linux 2.0 is now a rolling distribution, means users will receive tools and core system updates frequently.

Kali Linux 2.0 Features:


  • Runs on Linux kernel 4.0, 
  • use full Gnome 3 Desktop instead of gnome-fallback, 
  • improved hardware and wireless driver coverage, 
  • support for a variety of Desktop Environments, 
  • updated desktop environment and tools, 
  • Featuring new cutting-edge wireless penetration tools, 
  • Kali Linux now added desktop notifications, so that you do not miss anything, 
  • Support Ruby 2.0, which will make Metasploit will load much faster, 
  • Kali 2.0 added inbuilt screencasting tool so that you can record desktop.

Sadly, Kali team has removed the Metasploit Community and Pro packages. Instead, now just offers open-source Metasploit-framework package pre-installed.

Video Teaser:


Upgrade to Kali 2.0

Kali Linux users can upgrade their Kali 1.x to Kali 2.0 without reinstalling whole operating system from scratch. To do this, you will need to edit your source.list entries, and run a dist-upgrade as shown below. 

cat << EOF > /etc/apt/sources.listdeb http://http.kali.org/kali sana main non-free contribdeb http://security.kali.org/kali-security/ sana/updates main contrib non-freeEOF
apt-get updateapt-get dist-upgrade # get a coffee, or 10.reboot

Download Kali 2.0 Penetration Testing Platform


Kali Linux 2.0 is available to download in following flavors...
  • Kali Linux 64 bit
  • Kali Linux 32 bit
  • Kali Linux VMWare or VirtualBox images
  • Kali 2.0 for ARM architecture

…from the official website. You can download it either from direct download link or using Torrents.

Saturday, 1 August 2015

How Spies Could Unmask Tor Users without Cracking Encryption


How Spies Could Unmask Tor Users without Cracking Encryption
The Onion Router (Tor) is weeping Badly!

Yes, Tor browser is in danger of being caught once again by the people commonly known as "Spies," who's one and only intention is to intrude into others’ network and gather information.

A team of security researchers from Massachusetts Institute of Technology (MIT) have developed digital attacks that can be used to unmask Tor hidden services in the Deep Web with a high degree of accuracy.

The Tor network is being used by journalists, hackers, citizens living under repressive regimes as well as criminals to surf the Internet anonymously. A plethora of nodes and relays in Tor network is used to mask its users and make tracking very difficult.

Any user when connects to Tor, the connection gets encrypted and routed through a path called a"circuit." The request first reaches an entry node, also known as a 'Guard' that knows the actual IP address of the user, and then goes through every hop in the route and finishes off a communication circuit via "exit nodes."

However, in some cases, an attacker could passively monitor Tor traffic to figure out the hidden service accessed by a user and even reveal the servers hosting sites on the Tor network.

Revealing identities without decrypting the TOR Traffic


Recently, Net Security team from MIT and the Qatar Computing Research Institute claimed to find a new vulnerability in the Tor's Guard gateway that can be exploited to detect whether a user is accessing one of Tor's hidden services.

They explained, Tor's Guard Gateways could be masqueraded and the packets coming from the user could be made to travel through attacker’s malicious ‘setup’ node acting as an Entry node.

In a proof-of-concept attack published this week, the researchers described this technique as "Circuit Fingerprinting,"...

...kind of behavior biometric, which includes series of passive attacks, allowing spies to unmask Tor users with 88 percent accuracy even without decrypting the Tor traffic.

This new alternative approach not only tracks the digital footprints of Tor users but also reveals exactly which hidden service the user was accessing; just by analyzing the traffic data and the pattern of the data packets.
"Tor exhibits fingerprintable traffic patterns that allow an [enemy] to efficiently and accurately identify and correlate circuits involved in the communication with hidden services," says the team.

"Therefore, instead of monitoring every circuit, which may be costly, the first step in the attacker's strategy is to identify suspicious circuits with high confidence to reduce the problem space to just hidden services."
The technique nowhere breaks down the layered encrypted route of Tor network, so being encrypted doesn't make your identity anonymous from others.

Does the vulnerability Really utter Truth?


The Tor project leader Roger Dingledine raises a question to the researchers asking about genuineness of the accuracy that the Traffic fingerprinting technique delivers....

... leaving the researchers and the users confused.

As for the Tor, it is considered to be a popular browser that protects your Anonymity while accessing the Internet. However, with the time and successful breaches, it seems that this phenomenon of the Tor network could get depleted.

According to the MIT News article, the fix was suggested to Tor project representatives, who may add it to a future version of Tor.

Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
TRICKS AND TIPS CREATED BY SUSHIL UPADHYAY| Grants for single moms