Monday, September 2, 2013

Smart Phone Apps for Students

Touch Zebra!
No, don’t worry you are not going to touch the zebra, now we got a very good mobile app called “Algebra Touch”. This application is available for free on internet,  so students can download this app and do your algebra maths with your smart phone with a touch.

For Statistics Students
Quickgraph for iPhone users used for statistical data problem solving, experts say “this application is easy to operate and to manage the statistical data”.

For Chemistry Students
This mobile app also for iPhone users only and widely supports for Chemistry students. This app is called “Quick Periodic Table of the Element”. It has its periodic table and all its information in detail.

Astronomy for every one
Star Walk a IOS app gives details of astronomy useful for students who are interested in astrology and it is also helpful for astronomy research.

Saturday, August 31, 2013

Tips for Windows 7 Users

CREATE A WIRELESS HOTSPOT 
With some free software, you can convert your Windows 7 laptop (or desktop with a Wi-Fi card) into a wireless router to share internet with others. Just get Connectify (www. connectify.me) or Virtual Router (http://virtualrouter.codeplex.com) to enable this feature. Connectify and Virtual Router will not work on older editions of Windows.

VIRTUAL WINDOWS XP There are several reasons why you would want to run Windows XP virtually within Windows 7. Maybe you have programs that only work in XP or maybe you're nostalgic. Whatever your reasons, you can download the necessary files from http://goo.gl/DCOSq.

WINDOWS MEDIA CENTER
Windows Media Center (built into Windows 7 Home Premium, Professional, Enterprise and Ultimate editions) offers more than just multimedia. It offers a 10 foot interface so that you can connect your PC to a TV and enjoy your content on a larger screen. Plus, it displays album art nicely and can stream all sorts of free content.

PLAY NICE WITH XBOX 360
If you have a Xbox 360 connected to the same network as your Windows 7 PC, you can use Windows Media Center (WMC) to stream photos, music and videos. On the Xbox, note down the 8-digit key from the WMC section in Apps. In WMC, click Tasks > Add Extender and enter the 8-digit key. Now you can access content on the Xbox.

LAUNCH APPS QUICKLY

Users of older editions of Windows probably don't know that with Windows 7, you can launch programs by just typing their name. Just click the Start button, start typing the name of the program you want to launch and the results will appear real time as you type. Just highlight the correct one and hit the enter button.

PLAY GOD FOR YOUR PC
There are various settings available for Windows 7, sometimes in various places (like control panel, personalization, network settings menu and so on. With God Mode, you can have all settings in one place. Create a folder & name it GodMode. {ED7BA470-8E54-465E-825C-99712043E01C}. 

THE PROBLEM STEPS RECORDER
Sometimes when something goes wrong with your PC, you could spend all day trying to figure out the problem. Instead, use the Problem Steps Recorder to record what's going wrong and send it to someone more knowledgeable for a quick diagnosis. Click the start button and type PSR to bring up the Problem Steps Recorder (psr.exe) click on 'Start Record' and run through the problem again.

Friday, August 30, 2013

Java Security for Mobiles

The advent and popularity of Java has created a new paradigm: downloaded content can now also be executable. Java developers have tried to address security by implementing a few mechanisms, which are supposed to remove the risks of executing untrusted code:
  • Memory access.
  • The Java Sandbox.
  • The Byte-code Verifier.
  • The Applet Class Loader.
  • The Security Manager.
Memory Access
Java developers have often promoted Java as a secure language. At the lowest level, security goes hand in hand with robustness. Java programs cannot:
  • Forge pointers to memory
  • Overflow arrays
  • Read memory outside the bounds of an array or string
These features are supposed to be the main defenses against malicious code. It has been argued that by disallowing direct access to memory, a huge, messy class of security attacks is ruled out.

Byte-code Verification
The second line of defense against malicious code is the byte-code verification procedure that the Java interpreter performs on any untrusted code it loads. The verification procedure should ensure that the code is well formed. For example, it should not overflow or underflow the stack or contains illegal byte-codes. If the byte-code verification step was skipped, inadvertently corrupted or maliciously crafted byte-codes might be able to take advantage of implementation weaknesses in a Java interpreter.

Java Sandbox
Another layer of security protection is commonly referred to as the sandbox model: untrusted code is placed in a sandbox, where it can play safely and without doing any damage to the real world, or the full Java environment. When an applet or other untrusted code is running in the sandbox, there are a number of restrictions on what it can do. The most obvious of these restrictions is that it has no access to the local file system.

Security Manager
The Security Manager class enforces a number of other restrictions. All the core Java classes that perform sensitive operations, such as file system access, first have to ask permission of the currently installed security Manager. If the call is being made by untrusted code, the security manager throws an exception, and the operation is not permitted.