Saturday, October 20, 2012

Split-value Cryptographic Authentication: Building Advanced Threat-Resistant Software

RSA’s newly announced Distributed Credential Protection (DCP) is a perfect illustration of the innovative design that helps build software that better resists Advanced Threats.



For almost 40 years, multiple generations of security architecture for distributed systems have been built around the concept of a Trusted Third Party, a server trusted by all parties involved in the secure communication exchange. Examples include the key server in the Needham–Schroeder Symmetric Key Protocol or in Kerberos as well as the Certification Authority in Public Key Cryptosystems.

With Advanced Threats, trusted third parties have become a “single point of security failure.” If attackers control the trusted system, the game is over.

We need new security designs for this new world.  Split-value cryptographic authentication, as implemented in RSA Distributed Credential Protection exemplifies an Advanced Threat-resistant security design. It was invented by RSA Labs several years ago as a way to store and verify authentication secrets in a way that cannot be compromised even if any one of the systems involved in the authentication process is compromised. The principle is pretty straightforward and involves the use of random numbers and XOR transformations:



1)      Before it is stored, the password is transformed with a random number. The random number is stored in one server (“red” server) and the transformed password in a different server (“blue” server). Compromising one server is not sufficient to compromise the password.

2)      At regular time intervals, a new random number is generated and both servers are updated with the new random number value, adding a time-based layer of protection:  Both servers must be compromised at the same time for the password to be compromised.

3)      When an application needs to verify a password, the claimed password transformed with a new random number is sent to the “blue” server while the random number is sent to the “red” server. Each server can execute a new transformation involving the stored data and validate whether the claimed password matches the stored password without exposing the legitimate password

Split-value cryptographic authentication opens new opportunities to software developers worldwide to start developing Advanced Threat-resistant software.

This is just a start. Advanced Threats are changing our trust assumptions and have technical and operational impact on how we approach security. In the area of secure application design, we should expect more innovations like split-value cryptographic authentication to emerge to help build Advanced Threat-resistant software.




[source]If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Troubleshoot Problems with Problem Step Recorder


Windows 7 has got an in-built problem steps recorder. Yes, if you want to troubleshoot issues or to find out what exactly happened, you can record the steps with exactly mouse clicks, UI changes, etc. The problem steps recorder is a small app you can open by typing PSR in the search. Or you can start > run > psr.exe in the run command.
Problem steps recorder app opens up and you can start recording. It is similar to the screen capture software, but has advanced functions like recording the key strokes, mouse clicks; gather technical details behind the interface etc. Finally it saves the output file zip format with a MHTML report page. If you open up the report page, you can find details of the errors.






[source]If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Thursday, October 18, 2012

[How to] Bypass PayPal’s Security Code login

Pirate Bay Becomes Raid-Proof | WOW !

The Pirate Bay has made an important change to its infrastructure. The world’s most famous BitTorrent site has switched its entire operation to the cloud. From now on The Pirate Bay will serve its users from several cloud hosting providers scattered around the world. The move will cut costs, ensure better uptime, and make the site virtually invulnerable to police raids — all while keeping user data secure.


The biggest challenge for the operators of the site was that all infrastructure was located in one central location in the beginning. It took a while after the 2006 police raid to change that, but once the decision was made, there was no going back to the old ways anymore.

In recent years changes were made to the tracker and how torrents were offered on the site. That however did not take care of the server issue. Few days back, the Pirate Bay announced a change that is improving the site’s protection against raids and hardware related issues.



The servers have been moved to cloud hosting companies in two different countries. At those companies, virtual machine instances are run which can easily be replaced should one of the providers drop the Pirate Bay.


What’s even more interesting than this is the fact that Cloud hosting provides do not know that they are hosting the Pirate Bay. Even if you would find out about it somehow, they would not be able to monitor the traffic, and thus user IPs and activities on the site, because all traffic is encrypted.

The Pirate Bay operates a load balancer, a disk-less server that is running in RAM, and a transit-router, which are both operating in different countries. All communication is encrypted, and the worse case scenario would be if access to both the transit router and load balancer is lost at the same time. What’s interesting in this regard is that the virtual servers shut down automatically if they were not able to communicate with the load balancer in an eight hour period.

The move makes the Pirate Bay less vulnerable to raids or hardware failures. Site visitors on the other hand won’t likely notice any differences other than an improved availability of the site.


[source]If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Earn money with social networking : Zurker

What Is Zurker And Do You Need To Know About It?




Since the name first started circulating around in February, there has been much speculation and interest in the new start-up and it has only continued to grow.
Zurker
Shares
Becoming a member of Zurker automatically makes you an owner and investor in the site. By inviting friends to join the network you earn a vShare. Now, these don’t count as real shares until Zurker becomes a publicly traded company but it’s still a pretty good start.
Obviously, you’ll want to refer as many friends as you can so that you get more shares, which in turn allows the social network to expand. You can also purchase vShares so you can invest as little or much as you want.
Zurker Vs Facebook
As soon as any new social networking site is released, it will instantly be compared to the almighty Facebook.  With the announcement that Facebook is to become a publicly traded company, it has definitely got us all thinking about who is making all the money from this?
As Facebook has grown so have the investor’s bank balances. However, it really does go to show how much a small start-up can come in a few years and the amount of money that is continuing to be invested in the world of social media. What’s to say that the users can’t be the ones to profit from social networking? Now that the question has been thrown out there, it’s hard to avoid.


Can it work?
On paper this seems like the best idea. We’re all going to be multi-millionaires by 2016! Before we get too carried away we need to remember the facts. It doesn’t yet have a mobile app or a developer API. From using the site, I can see that it is still in its early stages.
While the interface is simple to use, it doesn’t have an overly attractive design. However, I think this can be improved as the site continues to grow. After all, does anyone remember the initial Facebook design?
Yes, the whole Facebook thing has already been done and many would argue that it would be difficult to see another social network have the same level of growth and success. But the beauty of social media is that anything is possible and you’re never 100% of sure how the general public will react.


If you want invitation, go here http://www.zurker.in/i-118764-slarngscql ... This is my referral ID.


[Source]If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Wednesday, October 17, 2012

UEFI Secure Boot System for Linux

          When Microsoft announced Secure Boot for Windows 8, it received lots of flak from the Linux community because of fears that secure boot would effectively shut out Linux distributions on PCs running the operating system. The biggest problem in regards to Secure Boot was that Microsoft gave OEMs the power the decide whether to include an off-switch for Secure Boot or not. Disabling Secure Boot in UEFI frees the PC from restrictions, so that operating systems that do not support Secure Boot can be installed and run on the PC.

          The primary purpose of the protocol is to prevent the loading of unsigned drivers or operating system loaders. It needs to be mentioned that Secure Boot is only available on PCs that use UEFI, while PCs that use BIOS are not affected by this at all.

          Few days back the Linux Foundation announced that they have found a way to make Linux and other open source distributions work with Secure Boot.
          
          In a nutshell, the Linux Foundation will obtain a Microsoft Key and sign a small pre-bootloader which will, in turn, chain load (without any form of signature check) a predesignated boot loader which will, in turn, boot Linux (or any other operating system).

The source code for the pre-bootloader is available in git://git.kernel.org/pub/scm/linux/kernel/git/jejb/efitools.git

          The Linux Foundation notes that it may take a while to obtain a signature from Microsoft. Once it has been acquired, the pre-bootloader will be made available on the Linux Foundation website from where it can be downloaded freely. The bootloader will run a “present user” test to protect the system against attacks targeting the boot process. It is not clear how this will work out, and if it will lead to certain access restrictions. The loader does not offer any security enhancements over booting Linux with UEFI Secure Boot turned off. It is good news for PC users who want to run a dual or triple boot system on a PC with UEFI that includes Windows 8 and at least one Linux distribution or open source operating system.






[source]If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Wednesday, October 3, 2012

[How to] Test website in older version of Internet Explorer

If you're a web developer, this post is for you. If  you want to see how website looks in older versions of Internet Explorer, then you don't need to install older versions of the browser. In IE9 ( Internet Explorer version 9 ) you have an option to make your browser as version 7 or 8 i.e. It shows your website view as in IE7 / IE8.

Below are the steps :


  1. Open your website in IE9.
  2. Go to developer tools option in settings or hit F12
  3. Now a toolbar similar to firebug opens at the bottom
  4. Go to Browser Mode  
  5. Change it to the one you want. ( For Example : Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 9 compatibility view )
So called drawback : IE 6 view not available.

My Comment : Stop developing websites for IE 6. You can give support up to IE 7. Because, IE 7 is great improvement of IE 6. Its far better.






If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Friday, September 28, 2012

Web Design Blunders and How to Avoid Them


Doing Too Much
Too much design and too much content can be damaging to your website and your business. Save the lengthy copy for product pages or the company blog. You want to make sure your website loads quickly so you don’t lose visitors. Having too many technical tricks can slow things down and cause a poor user experience. LogoGarden says, “Research shows that you have just three seconds to communicate your message on a web page to visitors before they’ll click away.” Don’t lose someone because they spent that time waiting for your site to load. A clean message and a few relevant images or a single video are the best way to spark interest and encourage your visitor to stay on the page.

Becoming Negligent
Having current, relevant information on your site should be of the utmost important. Customers will look at a website before buying to do research about what they are looking for. Making sure your pricing, stock and information are current is essential. In fact, 83% of U.S. consumers go online to research products before buying those items in brick-and-mortar stores, according to a 2012 report from PricewaterhouseCoopers LLP, a professional services firm. Being current doesn’t just apply to products, your blog needs to be updated at least once a week. What you choose to write about is up to you, but make sure it’s relevant. As a final note, don’t ignore spelling and grammar. Poor spelling and grammar could drive readers away.

Being Inconsistent
Just as you want your blog to be relevant, you want posting to be on a consistent basis. Consistency doesn’t just apply to your activity on the site; it applies to every aspect of a good web design. You don’t want to confuse your customers or readers. They shouldn’t feel lost when clicking from one page to the next because you’ve decided to change the font and colors. From each page’s layout to a familiar font, you want to make sure you’re consistent on your website. Place your logo in the same spot on each page, use the same colors and fonts, and keep the design of each page relatable to the next.

Hiding Links/Text
Make sure to include a relevant anchor text on your links. This will ensure that the reader knows where they are going by clicking on the links. Not only that, linking with anchor text will create SEO benefits for the external site where the link is pointing. Don’t cloak your links either. People like being able to see where exactly they are going in their browser’s status bar. Use a contrasting color and/or underlining to indicate the word or phrase is a link. You should also design your website so that after a link has been clicked, it changes color. Clicked links that change color help the user to locate where he/she is more easily, making sure not to end up visiting the same pages unintentionally.

When designing a website, you want to focus on branding and the user experience. After all, the potential customer is the one who will be visiting, navigating, and spending time on your site. Keep things clean and concise to avoid over doing the design. Interesting, relevant and current information from contact info to product copy is essential and not something to be forgotten. The content of your website plays an important role in its success and the design is just the start.

[Source]If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged



Monday, September 24, 2012

.psd thumbnails with Photo shop CS6

After removing old versions of Adobe photoshop and installing CS6, my windows explorer made thumbnails invisible ( doesn't appear ) for .PSD ( Photo Shop Document ) files.

Why ?

The psicon.dll file that was included in versions prior to CS5 was removed by Adobe as it was causing too many problems.

Solution

To get back those thumbnails, here is the most suitable solution. There are quite a few fixes for this but the most reliable fix seems to be to run the free Mystic Thumbs program from here. Both 32 bit and 64bit versions are available.







If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

[How to] Replace " powered by drupal "


We have to admit that we all love Drupal and it is for us more than a web development tool or a CMS , it is more like a way of thinking and coding for the internet However It is really annoying to see the Powered by Drupal at the end of the footer region , after searching on google i did not find a quick solution to replace this text to be Powered by Nilewebsites which is my website so after some trials Jquery as usual solved it easily
The Solution : Replacing powered by drupal using jquery in 2 simple steps.
1. We find the span in which it contains the powered by using the ID of the footer :
jQuery("#footer").find("span a").text().replace("Powered by Drupal","Globalsoftbay");
2. We replace the URL also so it points to your website instead of pointing to Drupal.org :
jQuery("#footer").find("a").attr("href", "http://www.globalsoftbay.tk/");
Make sure that the jquery executed successfully then it should be replaced.
RE-EDIT :


  1. Just go to Structure -> blocks -> Add block.
  2. Give block title as you wish to display or " <none> " for leaving it blank.
  3. Fill block description like " Custom Footer " or any other if you want
  4. In Block body, add some code like " hai this is  footer ". 
  5. After doing this set your new block region as footer and give same row weight as that of default footer.
  6. Change default footer's region as none. 
  7. Click on Save blocks.

     Hope this will solve your problem.



[Source]


If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Forgot Android Unlock Pattern: How To Open

  1. Enter Google Account Username and Password
    Besides Emergency call, there is option to enter Google account credentials. It is generally at the bottom of the screen in most of the devices. Enter username and password of Google account (the one you used to login Gmail).

    How To Open What if Device isn’t connected to Internet?
    Even if Data connection or Wi-Fi isn’t enabled on device, no need to worry. Just enter the details and device will be unlocked. This happens because device stores account details offline.
  2. I have 2 Step Verification Enabled 
    For Google accounts with 2 Step verification enabled, the application specific passwords are used to login. These passwords are somewhat like: fgjh-ghfs-yuip-gflv-port Problem is about remembering them. Moreover, for security reasons, these passwords aren’t shown again by Google.
    So, you are left with no option other than Factory Reset Android Device.
  3. I forgot Google Account used to Sign in 
    If you have forgotten Google password too, of the account used to sign in Android, solution is Factory reset only. Even if you reset Google account password from some other device but Android has stored old password and there is no chance to get old password from Google.
I didn’t use Google Account on Android 
Now, this is again a difficult situation. You will gain back access on device only after Hard reset of Android phone.


How to Factory Reset Android when Locked  

In unlocked condition, it is easy to wipe / Factory reset device but when it is locked, here’s how you can do it:

  • Press Volume UP+Home+Power button at a time till Samsung logo appears. 
  • This enters Recovery mode of Android device. 
  •  Second option is “Wipe Data/ Factory Reset”. Depending on the Recovery you have installed, it might be third or fourth. galaxy ace cwm1 Forgot Android Unlock Pattern: How To Open
  • Reboot.

    Note: Touch screen doesn’t work in recovery mode, you have to use volume rocker to move up and down. To select, press power or Home key. Factory reset won’t delete anything from SD Card Memory but it will remove all the user apps installed and remove custom settings if any. Default apps are there itself like Gmail, Play Store, etc however you will need to configure with Google account again.





If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Sunday, August 26, 2012

How to exit a crashing application [in ubuntu] ?

I must tell you something, when it comes to closing crashed applications, in Ubuntu is very easy, compared with your Ctrl+Alt+Delete alternative in Windows. In order to close your crashed application just go to Terminal (Applications > Accessories > Terminal) and type xkill, a skull pointer will appear on the screen, press on the crashed application and it will imediatly close.





If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Thursday, August 23, 2012

[How to] Extract Camera settings and Picture information from a image file


ExifTool is a Perl module with an included command-line application for reading and writing meta information in image, audio and video files. Modern Digital Camera including Canon, Minolta,Konica, Nikon, Pentax store all the settings you used, such as aperture or shutter speed along with the picture. For extracting the camera settings and Picture information , you can use ExifTool. ExifTool is required for profesional editing of some Picture Files.

How to Install :

Open the terminal by pressing CTRL+ALT+T and run the below command to install it :
$ sudo apt-get install libimage-exiftool-perl
For illustration , Let’s check the settings of UNS_1850.JPG  image through exiftool.
$ exiftool UNS_1850.JPG
ExifTool Version Number : 7.30
File Name : UNS_1850.JPG
Directory : .
File Size : 4 MB
File Modification Date/Time : 2009:08:21 11:25:32
File Type : JPEG
MIME Type : image/jpeg
Exif Byte Order : Big-endian (Motorola, MM)
Make : NIKON CORPORATION
Camera Model Name : NIKON D200
Orientation : Horizontal (normal)
X Resolution : 300
Y Resolution : 300
Resolution Unit : inches
Software : Ver.2.00
Modify Date : 2009:08:21 10:55:30
Y Cb Cr Positioning : Co-sited
Exposure Time : 1/200
F Number : 10.0
Exposure Program : Manual
ISO : 200
Exif Version : 0221
Date/Time Original : 2009:08:21 10:55:30
Create Date : 2009:08:21 10:55:30
and more…………….


Source : Tuxtree



If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Wednesday, August 22, 2012

Extract DAA Files In Ubuntu


Most often when you download a huge file from a P2P network, it is compressed in the .daa format. When you click on it, you will find that there is no application in Ubuntu that can handle it.
If you are wondering, DAA (Direct-Access-Archive) is actually a proprietary file format created by PowerISO to compress, password protect and to split a huge file to multiple volumes. To decompress a .daa file, you have to use the PowerISO application.
Download PowerISO for Linux
Extract the tar file
cd /usr/bin
sudo tar -xf [path-to-poweriso-tar-file]
To extract .daa file
poweriso extract /input-file.daa / -od /extracted-file-path
Extract DAA Files In Ubuntu is a post from: Tuxtree






If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Thursday, August 16, 2012

How to hack your own computer

How to hack your own computer (or make registry changes to customize your experience)



Delve beneath the bonnet of Microsoft Windows and you'll find powerful customization options. The key is accessing the registry – the operating system's engine room – via the registry editor. Click Start, then Run, enter regedit.exe and press Enter.
The registry editor is a powerful piece of software that provides full control over the operating system, so be careful. But if you want to customize Windows to make it your own, there’s no better way to do it. These top five tweaks from IT support company Conosco will help you get started.
Easily encrypt and decrypt your files
Windows Vista and 7 allow you to protect data with encryption tools, but these are hard to find. This hack makes them more accessible. In the registry editor, locate the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced registry key, then right-click in the right-hand pane and create a 32-bit DWORD value called EncryptionContextMenu. Give it a value of 1. Now, whenever you right-click on a file, you'll find encryption options as standard.
Add an application to the right-click desktop menu
Scroll down to the HKEY_CLASSES_ROOT\Directory\Background\shell registry key. Create a sub-key with the name of your chosen application e.g. Notepad, then create a sub-key underneath this one called Command. Locate the application you want to launch on your hard drive and copy the full path e.g. C:\Windows\System 32\notepad.exe. Back in the registry, left-click on the Command key, double-click the (Default) text that appears in the right-hand pane, and paste the application path into the box. Your application will now appear when you right-click on the desktop.
Display a start-up message


This is a cool hack, allowing you to display a custom message when the computer boots. Find the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced key and double-click on legalnoticecaption. Enter the headline of your start-up message, then click OK and double-click on legalnoticetext. Add your message and click OK. The message will appear the next time you restart your computer.
Disable pop-up notifications
This tweak will disable all bubble notifications that pop up near the system clock. Make sure you keep your system – including anti-virus programs - up to date, as your computer will no longer offer reminders. Open the registry, locate the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced key and set the EnableBalloonTips value to 0. To reverse the tweak, change the value back to 1.
Stop Windows Update from rebooting your computer
Sometimes Windows Update gets mad and announces it's going to reboot the computer. This can be frustrating if you're right in the middle of something. To disable this option, locate the HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU key and create a new 32-bit DWORD in the right-hand pane called NoAutoRebootWithLoggedOnUsers. Give it a value of 1. This will prevent automatic restart when the computer is being used. To put things back to normal, delete the DWORD you created.




If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Wednesday, July 4, 2012

Ubuntu not logging in after username / password screen

Yesterday, when I started my Ubuntu, I got a login screen. After typing correct password, I hit enter. To my surprise, again the same login screen returned. I thought that I many have mistyped my password and so reentered it. Again the same screen returned. Then tried to login to Guest account and my attempt was successful.

Then, I've googled it and found the solution which is as follows:

  1. Goto root shell prompt by pressing ctrl+alt+f1.
  2. type username password when asked.
  3. Delete the hidden file named Xauthority by typing the below command. 
  4.      rm ~/.Xauthority     
  5. That worked for me. 






If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Friday, May 18, 2012

Install the GNOME desktop in Ubuntu


  1. Type sudo apt-get  install ubuntu-desktop to download and install.
  2. Type startx to start the GNOME






If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

How to release a service running on some port and assign new task in Ubuntu?

I have been running some service on my port 8080 and then tried to install Apache Tomcat server on the same port. It doesn't show me any output related to new installation when checked in the URL http://localhost:8080/ . The service that is already running on my 8080 port is not at all necessary for me. So I decided to kill it. Below are the steps.

1) Check the Process ID (PID) of the unwanted service running on 8080 by issuing the following command.


sudo fuser -n tcp 8080


2) It replies the PID of the service if it is running currently.

For example : 8080/tcp: 3660 in my case
Kill it by issuing the following command.


sudo kill 3660

3) Now assign your new service i.e Apache Tomcat server restart in my case. Thats it! It works ! :)



If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

No JDK found - please set JAVA_HOME error while starting Apache tomcat in ubuntu

If you have already installed JDK and JRE in your system and encountered this error, then follow below steps.

1) Type sudo gedit ~/.bashrc in the terminal
2) Add export JAVA_HOME=/usr/lib/jvm/java-7-oracle  at the end of the file.  Here the path may vary depending upon your installation.  Open /usr/lib/jvm and check for the folder name and replace accordingly.  It is java-7-oracle in my case. This is nothing but setting up environmental path for java.


Check out if your Apache tomcat is starting.  If the same error encounters again, goto next step

3) Type sudo gedit /etc/default/tomcat6  in the terminal and hit enter.
( Type password if asked ).
4) Search for the word something similar to this JAVA_HOME=/usr/lib/jvm/java-7-oracle
If this line is commented, uncomment it and give the same path which you have given previously in .bashrc file.
5) Save the file and try to start the server again. It works!



If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

How to install Tomcat in Ubuntu ?


1) Find a correct tomcat package to install



sudo apt-cache search tomcat

2) For example, if you find tomcat6 in the output of above command, Install all Tomcat packages with following commands

sudo apt-get install tomcat6-webapps
sudo apt-get install tomcat6-admin
sudo apt-get install tomcat6

3) In order to start your Apache tomcat server, first install java i.e both JRE and JDK. To install JRE, go with this link.



4) But in order to start you need JDK too. Just open synaptic manager and search for oracle-jdk7-installer if you've followed above link to install JRE on your machine.


5) Start your Apache tomcat by using the following command



/etc/init.d/tomcat6 start

6) If you want t stop,

execute /etc/init.d/tomcat5.5 stop
if you want to restart the service

execute /etc/init.d/tomcat5.5 restart











If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Thursday, May 17, 2012

Which one is better ? open-jre or sun java ?

On a whole, open java and sun java are 99 % similar. As oracle purchased sun company, java is taken into oracle and tried to make it proprietary. Open jdk / open jre is under GNU Public License and is free (free in terms of freedom not as in price). So whatever may be the issue, there are currently no major issues running both of them side by side. 


But today, as I re-installed my Operating system i.e Ubuntu, I need to check for java plugin support for browser. I've already installed open-jre in my system but it don't enable jre in browser i.e java plugin in browser. i didn't find any browser specific plugins on the internet. Tried installing sun java from oracle.com but couldn't succeed because I've downloaded a Linux version .tar.gz file which is self extracting archive. Oracle.com suggested to execute .bin file in that folder and surprisingly it is missing (Amazing support !).


Finally discovered a way on the internet and below are the steps.


sudo add-apt-repository ppa:webupd8team/java


sudo apt-get update


sudo apt-get install oracle-java7-installer


sudo apt-get update

Voila ! that works ! :)

Consider this before choosing.



If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Saturday, January 28, 2012

What is the difference between rand and randn in MATLAB ?

We have two functions in MATLAB namely rand() and randn() to generate random numbers.  There exists a small difference between these two which lets us easy to use but complex to understand.

rand gives value from standard uniform distribution. That is they are in range [0,1].

randn gives value from standard normal distribution. A distribution with mean 0 and variance 1 is nothing but Standard Uniform Distribution. These are also in range [0,1]

In general we will use randn for generating random numbers.





If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Thursday, January 26, 2012

Login to Google Account on Any Public Computer Without Password

Google moved a step forward in the field of security. We already know about the 2 step verification of our Google accounts login. Now in order to get rid of the keylogger problem, it introduced a new feature in fact. Its nothing but GOOGLE SESAME


The amazing thing here is you don't need to enter your password on a computer. If you need to access your google account on a public computer like an internet cafe or so, there is problem with keyloggers which are Fully UnDectactable (FUD).


Procedure : 



  1. Goto this URL on the computer
  2. QR Code (Quick Response Code) will be generated and displayed in the webpage
  3. We need to scan this QR Code using our mobile phone(Smartphones only). The smartphone can be  Android / iOS / Windows / Blackberry  or any other.
  4. This code is decoded into some URL on your mobile. You need to enter this URL on your mobile browser.
  5. It asks for your credentials like username and password.
  6. Type your login details.
  7. After that click on the button " Start with Gmail " or " Start with iGoogle ". 
  8. By doing the step - 7, you will be logged in automatically on your computer web browser.
  9. That's it !
The only appearing disadvantage is actual availability of a smart phone with every Google account user. 

Except this, Sesame is just amazing. But Let's wait and see until the highly self trained monkeys(Hackers) find some vulnerabilities. Till then, this is said to be most secure.






If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Saturday, January 21, 2012

Matlab filename.m run error

I've started learning and using MATLAB. Installed version 7.9.0 (R2009b). After learning few basics, moved to .m files. I created a file named 1.m and trying to run the file. But I couldn't. The error message is

" File C:\Users\RaviTeja\Documents\MATLAB\1.m is not found in the current directory or on the matlab path. "

It also offers some explanation i.e

" To run this file, you can either change the MATLAB current directory or add its directory to the MATLAB path "


Actually this error message and explanation, both are misleading in my case.

There are three things you need to check. They are :


  1. Change current directory to the file directory i.e to  C:\Users\RaviTeja\Documents\MATLAB\ in my case. If this is done, skip to step 3.
  2. Even by ignoring the above step, you can proceed. Goto file --> Set Path --> Add Folder --> select the folder in which your files are stored. This is preferable.
  3. File-names with .m as extension should start with a letter. This is the wrong step I did. So renaming my file 1.m to a.m solved my problem. Surely, this works for you .






PS : I'll start posting the errors which I've encountered daily from now on. Keep visiting

If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Monday, January 16, 2012

ctrl + A not working in Ubuntu

I've been suffering with this since few days. now i found the solution

most likely, you've changed the key theme to Emacs or any other in which ctrl + a doesn't mean select all.
So,
Run gnome-tweak-tool, "theme", and change key theme to default.





If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Network location settings vanish after restart / reboot

This is all in windows 7 . I've been trying to connect two PCs with a network card in a LAN. I want to connect them offline i.e not through modem / router. So in order to make connection working, we should set the network location to Home.
  1. If you already know how to setup LAN, skip this step and goto step 2. Otherwise, continue reading. Open Network and Sharing Center --> Choose homegroup and sharing options. If you've already created a homegroup on some other system, it displays a " Join Now " button. Else, you'll have a button to " Create a new homegroup ". Before this, you need to select network location to " HOME " by clicking on " what is network location ? " hyperlink. Do the same to other system too. If already home group is created , Join it. After checking your connectivity, goto next step
  2. Sometimes, this network location changes to public after rebooting the system / PC . In order to retain those settings, following changes have to be applied.
    • Open run by pressing " windows button + R "
    • Type " services.msc " without quotes and hit enter
    • Check the services named " Peer Name Resolution Protocol " , " Peer Networking Grouping ", " Peer Networking Identity Manager " and " Homegroup Listener ", " Homegroup Provider "
    • All these five should be set to either Automatic or Manual.
    • Make sure that all the above five were started
Now reboot  your PCs and check that your changes retained.
If any problem encounters while setting up a LAN, please comment below






If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Thursday, January 12, 2012

How to Start a Program at High Priority Using Maximum Resources


Step I: First open Notepad and type:
Start “program name” /high “C:\Program Files\Program Location\Program.exe”
Here the program name stands for the program which you want to run, for example:
Start “flashget” /high “C:\Program Files (x86)\FlashGet\flashget.exe”
Step II: Now save it as program name.bat
For example: flashget.bat
If you click on the file command prompt will flash for a second and your program will run.
Now your task is finished (Do note that don’t use these steps on programs like flashget or any other programs that doesn’t need high priority). It is preferable for software like Photoshop or any Video converter which takes up more resources.





If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged

Thursday, January 5, 2012

Music maza | mp3dad

Here is cool music application. Mp3dad is an easy way to listen and download music. You can find your favorite songs in the multimillion database of quality mp3 links. It provides fast and relevant searches. You can also get the embed code of your favorite music to post on your blog.

Have a look at it. :)




If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged