Archive for 2008
This post about Twitter used jQuery plug-in JavaScript code in registration page username Availability check and update Screen name.This is very useful stuff, this is the best way to implement it...
Transmission Control Protocol (TCP) Hijack
Sabtu, 20 Desember 2008
Posted by Unknown
Tag :
C prorgramming,
Hacking
This guide is meant for ethical hacking or audit with authorization purposes only. The author is not responsible for any consequences otherwise. The material is copyrighted.Requirements: Linux OS, Connect...

Great Free Hacking Softwares? take a look at this list with some of my favourite hacking tools which you can download and use it carefully.1. Nmap Security ScannerNmap ("Network Mapper") is a free and...

Are you looking for some useful tips to improve your web projects security? In this post I suggest you some interesting points about this topic.Hacking is very interesting topic you can improve programming...
Delicious Database Design: create tables and relationships with SQL
Rabu, 19 November 2008
Posted by Unknown
In the previous lesson we have seen how to design the relationship-entities model for a database to be used in a del.icio.us-like web site project. Our R-E model is:Now we implement the database using...
This lesson explains how to project a typical relationships-entities model for a database to be used in our web projects. My approach is:1. Define database entities (tables)2. Identify attributes for...

Before the development of Object Oriented programming, the variables were considered as isolated entities. For example, suppose a program needs to handle data in car manufacturing company, here testing...
Creative way to Explain Technology in Videos.
Minggu, 09 November 2008
Posted by Unknown
Tag :
technology

Are you looking for a easy way to understand technology? This videos is an usefull inspiration.Yesterday I was looking for something interseting and original to make a short video clips to explain RSS...
“We the people, in order to form a more perfect union."Two hundred and twenty one years ago, in a hall that still stands across the street, a group of men gathered and, with these simple words, launched...

There were 3 citizens living on this island country. "A" owned the land. "B" and "C" each owned 1 dollar. "B" decided to purchase the land from "A" for 1 dollar. So, "A" and "C" now each own 1 dollar...
A Web Server takes a Client request and gives something back to the Client.A web browser lets a user request a resource. The web server gets the request, finds the resource, and returns something to the...
Yesterday i was designed one poster to promote my blog in occasion of two thousand visits i almost caught up after my one month on-line(at this moment my statcounter counter display 5,000 visits). So...

Inheritance involves creating new classes from the existing ones. it provides the ability to take the data and methods from an existing class and derive a new class. The keyword extends is used to inherit...

Have you updated your copy of Windows and received the "This copy of Windows is not genuine" notification. Have you ever wondered how to get rid of it?The Windows Genuine Advantage notification checks...

JAVAC.EXE"javac" is the standard compiler in JDK. "-sourcepath" specifies places where to search for source definitions of new types."-classpath" specifies places where to search for class definitions...
Why Java is The Most Popular Language now?
Jumat, 24 Oktober 2008
Posted by Unknown
Tag :
Java,
technology

Java is definitely the most popular programming language now, why? Why C,C++ and C# is not popular like Java?Every Operating system having some executable formats Eg. Windows - .exe, .cmd, .batEg. Linux...
The behavior of printf is undefined if there is insufficient no. of arguments for the format string when i am initializing a variable it print variable value, consider this:main(){int a=10;printf("%d");}ANSWER...

A modifiers assigns characteristics to the methods, data and variables. It specifies the availability of the method to other methods or classes. Variables and methods can be at any of the following access...