Monday, 10 June 2013

How to install java and run program on it

How to install and run program on java
 First you have to download java development kit I,e, jdk from http://www.oracle.com/technetwork/java/index.html  download java se (java standard edition).Then install it on ur system.Then you see there is a file name java on c:\programs files open it and u see there is two folder created name
jdk1.7.0_21
jre7(depend on ur java version)    

             Then open cmd and type

                                C:\>javac
If it gives error message then manually you have to create a path for java
After creating a path it shows like this
C:/>javac          
To create path just right click on my computer and click properties
You can see advanced system setting click on it and then click on environment variable
Then input variable name path and in place of variable value right location of bin file ie, goto c:/>program files/java/jdk/bin copy the addres it is something like C:\Program Files\Java\jdk1.7.0_21\bin
And then click on and its done. And now if you open cmd and type javac then it shows this screen.
And now its time to run a simple program in java language .
For this make a folder java or anything as per your choice in c drive ie,
 I make java folder in c drive .Then open notepad and type this program
And save as apple.java in java folder in c drive .
Now open cmd
And browse to java folder I,e,
C:/>cd java
C:/>java>
Then first compile ur program
C:/>java>javac apple.java
then it shows nothing if no error and if there is any error in code then it shows the error message after compilation type
c:/>java>java apple
then it print ur program result
I,e,
And now u have successfully installed and run program in java . If you have any doubt please leave a comment..
WITH THANKS!

Tuesday, 29 January 2013

Windows XP password Hack


windows XP password Hack


You can change windows password without knowing the current password .Means when 

you can a system which is open and you want to change the password of that system then 

through cmd prompt u can set password .for this just goto->run type cmd and hit enter then 

in cmd prompt type
C:/>net user
// it display all the account on that system
suppose u want to change the password of Administrator or some user which name is 

shown u can change it through this cmd 
C:/>net user Administrator *
// if u want to change password of user name raj u can change it through 
c:/>net user raj *
// it will prompt to add password write password and ya u cant see the word but it is type 

again write same word and then enter then it will set that password.
This is how you can change password by cmd prompt .if you get access of cmd then u will

break any password or change the password so how can u get cmd prompt in login screen

where we enter password to unlock system .
As per my knowledge only sticky key will open in login screen so if we anyhow open cmd

prompt then we break the password for this just make setting when the system is open

.Follow these steps to set cmd prompt i,e,when we press shift key five or more times then

instead of sticky keys cmd prompt will open .
step 1:> goto c:\windows\system32
here u will find cmd just copy cmd and paste it on desktop and rename it to sethc and then

cut it and paste it in system32 folder here it prompt yes replace or no click on yes and u r

done. Now whenever you press shift key continuously then cmd prompt will open instead of

sticky keys and you can easily change the password using cmd prompt.


Monday, 28 January 2013

PROXY SERVER

As u all know that IP address is Ur identity in the network .You visited website and Ur IP address is traced when u do some illegal thing then with the help of Ur IP address u will be caught.
Proxy server acts as a mask which masking Ur identies. Say for example in real life when we wear mask in our face nobody recognized me .That same happen with proxy server it sniff Ur identities i.e, Ur IP address from traced.

Some online proxy server are:-
1.www.anonymizer.ru // u can also open block website through this example:-www.funmaza.com/fun_mailer.html or www.kat.ph which is block in india but u can open it through www.anonymizer.ru 
here is the snapshot of kat.ph website which is open by using proxy server.
Just open www.anonymizer.ru and write any website which u want to open and ur ip is not traced .for check  ur ip is not traced simply open www.ipmango.com without using anonymizer.ru then u can see ur real ip is display and again open www.ipmango.com by using www.anonymizer.ru u can see ur ip is not display instead of ur ip it display some other ip of other country.through anonymizer u can access blocked websites.
some other proxy websites are www.anonymouse.org , www.trycatchme.com the best proxy server is TOR browser u can download tor browser from www.filehipppo.com or www.softpedia.com and open it and serve the internet with proxy ips not ur original ip.

MAKE IDM FULL VERSION

As u all know IDM (internet download manager) is best software to download moives,songs or anythings .But it comes for trial version and its expire in one months.here is simple trick through which u can make ur IDM full version .just edit ur hosts file u will know more about what is hosts file from my previous post url redirection. To make idm full version open ur IDM and then goto registration and write any key from these key:-

RLDGN-OV9WU-5W589-6VZH1
HUDWE-UO689-6D27B-YM28M
UK3DV-E0MNW-MLQYX-GENA1
398ND-QNAGY-CMMZU-ZPI39
GZLJY-X50S3-0S20D-NFRF9
W3J5U-8U66N-D0B9M-54SLM
EC0Q6-QN7UH-5S3JB-YZMEK
UVQW0-X54FE-QW35Q-SNZF5
FJJTJ-J0FLF-QCVBK-A287M
 and enter ur name and email id(good to use fake name i,e, anything and id rahul@gmail.com or whatever u want) then it shows u register ur idm with fake key .the one more thingh is edit ur hosts file it is located at :-
c:\windows\system32\drivers\etc and make these entry in it.

127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com
after making entry ur hosts file looks like
and then save ur hosts file i,e, shortcut is ctrl+s or u can click on file then save option and done enjoy...

URL REDIRECTION and BLOCK WEBSITE


HOST FILE

The hosts file is a computer file used by an operating system to map host names to IP addresses. The hosts file is a plain text file, and is conventionally named hosts.
It’s location is c:\windows\system32\drivers\etc

It can be called a local DNS server it can be used for various purposes.
What can be done with host file
1.Blocking certain websites which contained bad things or whatever website u want to block like www.facebook.com
for blocking website just goto c:\windows\system32\drivers\etc
then u can see a file named hosts right click on that file and open it through notepad and then make entry in blank line in that hosts file
127.0.0.1 www.facebook.com
after making entry save ur file (ctrl+s).After editing ur hosts file looks like
2.Play with ur friends or someone to redirect most visited website into some embracing
website.  Facebook.com to playboy.com .For this we need the ip address of playboy.com to know ip address of any website just goto cmd prompt i,e goto run and type cmd and hit enter.
then cmd prompt open .use ping command to find ip address just type ping <websitename>
i,e, c:\>ping playboy.com
then u can get ip address of playboy.com just make a entry in hosts file first write ip of playboy.com then space then write www.facebook.com so whenever anyone type www.facebook.com then it will automatically redirected to playboy.com .

and then save ur file i,e, ctrl+s shortcut to save .so if you want to redirect google to facebook.com then justknow ip address of facebook through using ping facebook.com command and write ip address of facebook.com and space www.google.com in hosts file then when u open google then automatically facebook is open .to remove these setting just delete the entry which u make and then save ur hosts file.



Tuesday, 18 September 2012

OSI Model

The OSI (Open System Interconnection) model is developed by ISO(International Organization for standardization) in 1984 to provide a reference model for the complex aspects related to network communication. It divides the different functions and services provided by network hardware and software in 7 layers. This facilitates modular engineering, simplifies teaching and learning network technologies, helps to isolate problems and allows vendors to focus on just the layer(s) in which their hardware or software is implemented and be able to create products that are compatible, standardized and interoperable.


The diagram below shows the 7 layers of the OSI Model, to remember them in the correct order a common mnemonic is often used: All People Seem To NeedData Processing.

The Application, Presentation and Session layer are known as the Upper Layer and are implemented in software. The Transport and Network layer are mainly concerned with protocols for delivery and routing of packets to a destination and are implemented in software as well. The Data Link is implemented in hard- and software and the Physical layer is implemented in hardware only, hence its name. These last two layers define LAN and WAN specifications.

7.APPLICATION LAYER

The Application layer provides network services directly to the user's application such as a web browser, email software and Windows Explorer. This layer is said to be "closest to the user".
Protocols that operate on this layer include: TELNET, HTTP, FTP, TFTP, SMTP, NTP, SNMP, EDI.

6.PRESENTATION LAYER

This layer 'represents' the data in a particular format to the Application layer. It defines encryption, compression, conversion and other coding functions.
Specifications defined at this layer include: GIF, TIFF, JPEG, MPEG, MIME, and ASCII.


5.SESSION LAYER

Establishes, maintains and terminates end-to-end connections (sessions) between two applications on two network nodes. It controls the dialogue between the source and destination node, which node can send when and how long. Also provides error reporting for the Application, Presentation and Session layer.
 
Protocols/API's that operate on this layer include: RPC, SQL, NETBIOS.

4.TRANSPORT LAYER

This layer converts the data received from the upper layers into segments. The Transport layer is responsible for end-to-end (also called source-to-destination) delivery of entire messages. Provides end-to-end connectivity, it allows data to be transferred reliably and sequencing to guarantee that it will be delivered in the same order that it was sent. Provides services such as error checking and flow control (software).
Protocols that operate on this layer: TCP, UDP, NETBEUI, SPX.

These protocols are either
 connectionless or connection-oriented:

Connection-oriented means that a connection (a virtual link) must be established before data can be exchanged. This can guarantee that data will arrive, and in the same order it was sent. It guarantees delivery by sending acknowledgements back to the source when messages are received. TCP is an example of an connection-oriented transport protocol.

A common example of connection-oriented communication is a telephone call: you call, the 'destination' picks up the phone and acknowledges and you start talking (sending data). When a message or a piece of it doesn't arrive, you say: "What!?" and the sender will retransmit the data.

Connectionless is the opposite of connection-oriented; the sender does not establish a connection before it sends data, it just sends without guaranteeing delivery. UDP is an example of an connectionless transport protocol.

3.NETWORK LAYER

This layer converts the segments from the Transport layer into packets (or datagrams) and is responsible for path determination,
 routing, and the delivery of these individual packets across multiple networks without guaranteed delivery. The network layer treats these packets independently, without recognizing any relationship between those packets, it relies on upper layers for reliable delivery and sequencing. 
Also this layer is is responsible for
 logical addressing (also known as network addressing or Layer 3 addressing) for example IP addresses
Examples of protocols defined at this layer: IP, IPX, AppleTalk, ICMP, RIP, OSPF, BGP, IGRP, EIGRP, NLSP, ARP, RARP, X.25
Devices that operate on this layer: Routers, Layer 3 Switches.

Network layer addresses
Also known as Layer 3 or Logical addresses. These type of addresses are protocol-dependent, for example if the network protocol is IP, IP addressing will be used which is made up of a network part and a host part and needs a subnet mask to determine the boundaries of these parts. An example of an IP address is: 172.16.0.1 and a subnet mask: 255.255.0.0
Another example is Novell's IPX addressing, which uses a combination of a hexadecimal network address + the layer 2 MAC address to form a network layer address, for example" 46.0010E342A8BC

2.DATA LINK LAYER

The Data Links provides transparent network services to the Network layer so the Network layer can be ignorant about the physical network topology and and provides access to the physical networking media. Responsible for reassambling bits taken of the wire by the Physical layer to frames, makes sure they are in the correct order and requests retransmission of frames in case an error occurs. Provides error checking by adding a CRC to the frame, and flow control.
 Examples of devices that operate on this layer are switches, bridges, WAPs, and NICs.
 
DATA LINK LAYER SUB DIVIDED INTO TWO SUB LAYER:-
LLC sublayer
LLC is short for Logical Link Control. The Logical Link Control is the upper sublayer of the Data Link layer. LLC masks the underlying network technology by hiding their differences hence providing a single interface to the network layer. The LLC sublayer uses Source Service Access Points (SSAPs) and Destination Service Access Points (DSAPs) to help the lower layers communicate to the Network layer protocols acting as an intermediate between the different network protocols (IPX, TCP/IP, etc.) and the different network types (Ethernet, Token Ring, etc.) This layer is also responsible for frames sequencing and acknowledgements.
The LLC sublayer is defined in the IEEE standard 802.2.
MAC sublayer

The Media Access Control layer takes care of physical addressing and allows upper layers access to the physical media, handles frame addressing, error checking. This layer controls and communicates directly with the physical network media through the network interface card. It converts the frames into bits to pass them on to the Physical layer who puts them on the wire (and vice versa)
 

IEEE LAN standards such as 802.3, 802.4, 802.5 and 802.10 define standards for the MAC sublayer as well as the Physical layer.

Other standards on this layer include: X.25 and Frame Relay
Data Link layer addresses
Also known as layer 2 addresses, BIAs (Burned-in Address), physical address and most commonly referred to as MAC address. This is a fixed address programmed into a NIC or a router interface for example.
 
00-10-E3-42-A8-BC is an example of a MAC address. The first 6 hexadecimal digits (3 bytes) specify the vendor/manufacturer of the NIC, the other 6 digits (3 bytes) define the host.
The layer 2 broadcast address is FF-FF-FF-FF-FF-FF.
1.PHYSICAL LAYER

This layer communicates directly with the physical media, it is responsible for activating, maintaining and deactivating the physical link. It handles a raw bits stream and places it on the wire to be picked up by the Physical layer at the receiving node. It defines electrical and optical signaling, voltage levels, data transmission rates and distances as well as mechanical specifications such as cable lengths and connectors, the amount of pins and their function.
Devices that operate on this layer: HUBs/concentrators, repeaters, NICs, and LAN and WAN interfaces such as RS-232, OC-3, BRI, V.24, V.35, X.25 and Frame Relay.



Saturday, 15 September 2012

Change Facebook Theme


Everyone want to know how to change Facebook theme there is no any option provided by the Facebook to change theme but u can change Ur theme by installing plugin here i give step by step procedure to change the Facebook theme
Steps:


1.Go to this link http://userstyles.org/styles/browse? sort=popularity&sort_direction=desc
2.You may see many plugins of various themes.
3.Click the theme of your choice.
4.Now on the right top click on “Install as User Script“
5.Now login to your Facebook, you may customized with themes.
Note:
after installing facebook Dark + transparent ur profile look like this



These themes will only be visible if userstyles plugins are installed in the browsers.

Source: Userstyles.org