tag:blogger.com,1999:blog-54476674072019814852024-02-20T01:49:04.373-08:00Brightways.orgAnonymoushttp://www.blogger.com/profile/16277482798513430878noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-5447667407201981485.post-45096569612402621172016-12-15T01:23:00.001-08:002016-12-18T08:51:35.018-08:00Java History : Who, When and How the Java Programming is Developed<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "Times New Roman", serif; font-size: 13pt;">Java is a simple, object
oriented, distributed, interpreted, robust, secure, architecture neutral,
portable, high-performance, multithreaded, and dynamic language. </span><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-fareast-font-family: "Times New Roman";">Today Java is not only used as Internet Language, but is
also invisible force behind many of the applications and devices that we use in
our day-to-day lives, From mobile phones to handheld devices, games and
navigation systems to e-business solution, Java can be found everywhere! It has
really wide range of applications, much wider than that of C and C++. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "Times New Roman", serif; font-size: 13pt;">In 1990, James Gosling
and Patrick Naughton of Sun Microsystems, decided to create a pure object
oriented development environment that would be based on C++, but much easier to
learn and use than C++. Initially they named their project "Green
Project" and their team was called "Green team". Other major
contributors to the development of Java language were Mike Sheridan, Chris
Warth and Ed Frank. Also Bill Joy, Arthur van Hoff, Jonathan Payne, Frank
Yellin, and Tim Lindholm were the key players. The team led by <b>James Gosling</b> worked and created the
programming language that revolutionized our world -Java! Firstly, it was
called <b>"Green talk"</b> by <b>James Gosling</b> and file extension was <b>.gt.</b>, After that, it was called <b>Oak</b> and was
developed as a part of the Green project. The original name of JAVA is <b>OAK</b>, Which is a tree name. In the year
1995, <b>OAK</b> was revised and developed
software called <b>JAVA</b>. Oak was
renamed as "<b>Java</b>" because it was already a trademark
by Oak Technologies. Java is an <b>island
of Indonesia</b> where first coffee was produced. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "Times New Roman", serif; font-size: 13pt;">The Green team
demonstrated their new language with an interactive, handheld home
entertainment controller that was originally targeted at digital cable
television industry, For the green team members, it was an advance concept
at that time. But, it was suited for internet programming which was just
starting to take off. When Java was developed, nobody thought of it for a
platform like Internet, Instead, the primary motivation was the need for a
platform independent language that could be used to create software to
be embedded in various consumer electronic devices, such as microwave ovens and
remote controls. Later, Java technology as incorporated by Netscape. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;">
<span style="font-family: "Times New Roman", serif; font-size: 13pt;">Java is more than just
another programming language. It is both a language and a platform for
developing applications to run on the Internet or in corporate intranet
environments. Java is a Simple and yet Powerful object oriented programming
language, well suited to designing various kinds of applications including the
special web applications i.e. the applications that run on internet, called
applets.<o:p></o:p></span></div></div>
Anonymoushttp://www.blogger.com/profile/16277482798513430878noreply@blogger.com0tag:blogger.com,1999:blog-5447667407201981485.post-29611017135869526242014-01-10T05:30:00.002-08:002014-01-10T05:30:16.002-08:00<div dir="ltr" style="text-align: left;" trbidi="on">
<br /><br /><span class="Apple-style-span" style="color: blue;"><b> Cybercrime </b></span><br /><div>
Cybercrime i.e. The crime done through Computers and Internet. Cybercrime is any criminal activity involving computers and networks.Cybercrime is one of the fastest growing areas of crime. More and more criminals are exploiting the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activities. These include attacks against computer data and systems, identity theft, the distribution of child sexual abuse images, internet auction fraud, the penetration of online financial services, as well as the deployment of viruses, and various email scams such as phishing. <br /><br />The global nature of the Internet has allowed criminals to commit almost any illegal activity anywhere in the world, making it essential for all countries to adapt their domestic offline controls to cover crimes carried out in cyberspace. The use of the Internet by terrorists, poses a serious threat to national and international security. <br /><br /> Cyber crime cases in the country registered under the IT Act last year rose by about 61 percent to 2,876 with Maharashtra recording the most number of cases, Parliament was informed recently. <br /> <br />The country had witnessed 1,791 cases registered under the Information Technology (IT) Act in 2011, Minister of State for Communication and IT Milind Deora said in a written reply to Rajya Sabha. <br /><br /> "As per the cyber crime data maintained by National Crime Records Bureau (NCRB), a total of 288, 420, 966, 1,791 and 2,876 cyber crime cases were registered under IT Act during 2008, 2009, 2010, 2011 and 2012, respectively". <br /><br /> Maharashtra registered a total of 471 cases in 2012 followed by Andhra Pradesh (429), Karnataka (412), Kerala (269) and Uttar Pradesh (205) under the IT Act. <br /><br /> <b><span class="Apple-style-span" style="color: blue;">Types of Cybercrime:-- </span></b><br /><span class="Apple-style-span" style="color: blue;"> 1 ) Assault by Threat</span> – threatening a person with fear for their lives or the lives of their families or persons whose safety they are responsible for (such as employees or communities) through the use of a computer network such as email, videos, or phones. <br /> <br /><span class="Apple-style-span" style="color: blue;">2 ) Child pornography</span> – the use of computer networks to create, distribute, or access materials that sexually exploit underage children. <br /> <br /><span class="Apple-style-span" style="color: blue;">3 ) Cyber contraband</span> – transferring illegal items through the internet (such as encryption technology) that is banned in some locations. <br /> <br /><span class="Apple-style-span" style="color: blue;">4 ) Cyberlaundering</span> – electronic transfer of illegally-obtained monies with the goal of hiding its source and possibly its destination. <br /> <br /><span class="Apple-style-span" style="color: blue;">5 ) Cyberstalking</span> – express or implied physical threats that creates fear through the use of computer technology such as email, phones, text messages, webcams, websites or videos. <br /> <br /><span class="Apple-style-span" style="color: blue;">6 ) Cyberterrorism</span> – premeditated, usually politically-motivated violence committed against civilians through the use of, or with the help of, computer technology. <br /><br />Cybertheft is using a computer to steal. This includes activities related to: breaking and entering, DNS cache poisoning, embezzlement and unlawful appropriation, espionage, identity theft, fraud, malicious hacking, plagiarism, and piracy. <br /><br /><span class="Apple-style-span" style="color: blue;"> 7 ) Cybertresspass</span> – accessing a computer’s or network’s resources without authorization or permission from the owner, but does not alter, disturb, misuse, or damage the data or system. This is hacking for the purpose of entering an electronic network without permission. Examples might include: <br /><br />Using a wireless internet connection at a hotel at which you are staying and accessing the hotel’s private files without disturbing them because they are available. <br /><br />Reading email, files, or notice which programs are installed on a third-party's computer system without permission just for fun, because you can. This is sometimes simply called snooping. <br /><br /><span class="Apple-style-span" style="color: blue;"> 8 ) Cybervandalism</span> - Damaging or destroying data rather than stealing or misusing them (as with cybertheft) is called cybervandalism. This can include a situation where network services are disrupted or stopped. This deprives the computer/network owners and authorized users (website visitors, employees) of the network itself and the data or information contained on the network. Examples: <br /><br />Entering a network without permission and altering, destroying, or deleting data or files. <br /><br />Deliberately entering malicious code (viruses, rootkits, trojans) into a computer network to monitor, follow, disrupt, stop, or perform any other action without the permission of the owner of the network. <br /><br />Attacking the server of the computer network (DDoS attack) so the server does not perform properly or prevents legitimate website visitors from accessing the network resources with the proper permissions. <br /><br /> <b><span class="Apple-style-span" style="color: blue;">Cyber Crime Prevention Tips:-- </span></b> <br /><b><span class="Apple-style-span" style="color: blue;">1 )Use Strong Passwords</span></b> <br /> <br />Use different user ID / password combinations for different accounts and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters (minimum 10 characters in total) and change them on a regular basis. <br /><br /> <b><span class="Apple-style-span" style="color: blue;">2 )Secure your computer</span></b> <br /> <span class="Apple-style-span" style="color: blue;"> a )Activate your firewall </span><br /> Firewalls are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers. <br /> <span class="Apple-style-span" style="color: blue;">b )Use anti-virus/malware software </span><br /> Prevent viruses from infecting your computer by installing and regularly updating anti-virus software. <br /> <span class="Apple-style-span" style="color: blue;">c )Block spyware attacks</span> <br /> Prevent spyware from infiltrating your computer by installing and updating antispyware software. <br /> <b><span class="Apple-style-span" style="color: blue;">3 )Be Social-Media Savvy</span></b> <br /> <br />Make sure your social networking profiles (e.g. Facebook, Twitter, Youtube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is there forever! <br /> <br /><b><span class="Apple-style-span" style="color: blue;">4 )Secure your Mobile Devices</span></b> <br /> <br />Be aware that your mobile device is vulnerable to viruses and hackers. Download applications from trusted sources. <br /> <br /><b><span class="Apple-style-span" style="color: blue;">5 )Install the latest operating system updates</span></b> <br /><br /> Keep your applications and operating system (e.g. Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older software. <br /> <br /><b><span class="Apple-style-span" style="color: blue;">6 )Protect your Data</span></b> <br /> <br />Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in another location. <br /> </div>
<div>
<b><span class="Apple-style-span" style="color: blue;">7 )Secure your wireless network</span></b> <br /> <br />Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are also vulnerable. Avoid conducting financial or corporate transactions on these networks. <br /> <br /><b><span class="Apple-style-span" style="color: blue;">8 )Protect your e-identity</span></b> <br /><br /> Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites). <br /><br /> <b><span class="Apple-style-span" style="color: blue;">9 )Avoid being scammed </span></b><br /><br /> Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password. <br /><br /> <b><span class="Apple-style-span" style="color: blue;">10 ) Call the right person for help</span></b> <br /> </div>
<div>
Don’t panic! If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police. If you need help with maintenance or software installation on your computer, consult with your service provider or a certified computer technician. <br /><br /> </div>
</div>
Anonymoushttp://www.blogger.com/profile/16277482798513430878noreply@blogger.com0tag:blogger.com,1999:blog-5447667407201981485.post-35560630056054713922014-01-09T03:28:00.001-08:002014-01-09T03:28:21.078-08:00<div dir="ltr" style="text-align: left;" trbidi="on">
<h3 class="post-title entry-title" itemprop="name">
Information Storage in QR codes--A New Era
</h3>
<div class="post-header">
</div>
<div class="MsoNormal">
<b>What is QR Codes?</b></div>
<br />
<div class="MsoNormal">
QR Code (Quick Response Code) is also known as two Dimensional Matrix Code first design for automotive industry in Japan.
The BAR code is used to store the information of an item. The QR code
can store information in the shape of character, numeric and binary data
or any type of data. The QR code is become popular outside the
automotive industry due to need of fast readability and great storage
capacity as compared to old code. A QR code consists of black module
arranged in square grid on white background which can be read by an
image device or smart phones. Data in QR code may be in horizontal and
vertical manner in it.</div>
<div class="MsoNormal">
<h2 style="background-color: white; line-height: 15pt; margin: 0in 0in 3.75pt;">
<span style="color: #444444; font-family: Tahoma; font-size: 12pt;">How do you generate a code?</span></h2>
<div class="MsoNormal">
</div>
<div style="background-color: white; line-height: 15pt; margin: 0in 0in 0.0001pt;">
<span style="color: #444444; font-family: Helvetica; font-size: 11.5pt;">You can easily generate a QR code using a site like<span class="apple-converted-space"> </span><a href="http://qrcode.kaywa.com/"><span style="color: #555555;">Kaywa.com</span></a><span class="apple-converted-space"> </span>or
you can use the Open Source code to generate codes for you if you have a
smart developer on hand. Google also has a tool to generate the QR
code.</span></div>
<h2 style="background-color: white; color: #444444; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin: 0px 0px 5px; padding: 0px;">
How could you use a QR code?</h2>
<div style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px; padding: 0px;">
Your business, no matter how small or large, could use QR codes in a
number of ways. You might auto generate one next to every product on
your web site containing all the product details, the number to call and
the URL link to the page so they can show their friends on their cell
phone. You could add one to your business card containing your contact
details so its easy for someone to add you to their contacts on their
cell phone.</div>
<div style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px; padding: 0px;">
Add them to any print advertising, flyers, posters, invites, TV ads etc containing:</div>
<ul style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 1.5em; margin: 5px 0px 10px 10px; padding: 0px 0px 0px 15px;">
<li style="font-size: 15px; line-height: 1.5em; margin: 0px; padding: 0px 2px;">Product details</li>
<li style="font-size: 15px; line-height: 1.5em; margin: 0px; padding: 0px 2px;">Contact details</li>
<li style="font-size: 15px; line-height: 1.5em; margin: 0px; padding: 0px 2px;">Offer details</li>
<li style="font-size: 15px; line-height: 1.5em; margin: 0px; padding: 0px 2px;">Event details</li>
<li style="font-size: 15px; line-height: 1.5em; margin: 0px; padding: 0px 2px;">Competition details</li>
<li style="font-size: 15px; line-height: 1.5em; margin: 0px; padding: 0px 2px;">A coupon</li>
<li style="font-size: 15px; line-height: 1.5em; margin: 0px; padding: 0px 2px;">Twitter, Facebook, MySpace IDs</li>
<li style="font-size: 15px; line-height: 1.5em; margin: 0px; padding: 0px 2px;">A link to your YouTube video</li>
</ul>
</div>
</div>
Anonymoushttp://www.blogger.com/profile/16277482798513430878noreply@blogger.com0