Friday, 28 April 2017

Voice Command Control Android Calculator

Hi Om Shanti.


After long break I am writing this post.You may think why I have taken such a long break, meanwhile I was working on an Android application named VOICE CALCULATOR.

  Voice Calculator- screenshot thumbnail     Voice Calculator- screenshot thumbnail
Voice calculator app is a calculator that work over voice command Offline and Online  both.
This app can perform MULTIPLICATION, DIVISION, ADDITION AND SUBTRACTION.
It almost taken an year to work properly.

After my graduation in 2016 (September) I started full time work on this application.
On 15 Jan I uploaded it on play store for free without advertisement. I uploaded on that day because on that day we gift things to people with respect.
So I uploaded this voice calculator for free  for all .


It required minimum 5.0 Android System,very less memory.

PLEASE DOWNLOAD IT FROM BELOW LINK AND LET ME KNOW YOUR IMPORTANT SUGGESTIONS.


https://play.google.com/store/apps/details?id=com.utsavg.voicecalculator

Friday, 19 February 2016

BIG DATA

WHAT IS BIG DATA? 

Hello, my friends after long time I am posting a new post about BIG DATA.
There is so much BUZZ about BIG DATA.
So i am sharing a © Copy Right presentation  on Big Data.

Click ↓↓↓↓ here ↓↓↓↓to ↓↓↓↓check↓↓↓↓ it ↓↓↓↓ out ↓↓↓↓ .

Tuesday, 3 March 2015

FIREWALL

Firewalls are basically a barrier between your computer (or a network) and the Internet
(outside world). A firewall can be simply compared to a security guard who stands at the
entrance of your house and filters the visitors coming to your place. He may allow some
visitors to enter while deny others whom he suspects of being intruders. Similarly a
firewall is a software program or a hardware device that filters the information
(packets) coming through the Internet to your personal computer or a computer network.

How Firewall Works?

Firewalls may decide to allow or block network traffic between devices based on the rules
that are pre-configured or set by the firewall administrator. Most personal firewalls such as
Windows firewall operate on a set of pre-configured rules which are most suitable under
normal circumstances, so that the user need not worry much about configuring the
firewall.


Personal firewalls are easy to install and use and hence preferred by end-users to secure
their personal computers. However, in order to meet customized needs large networks and
companies prefer those firewalls that have plenty of options to configure.
For example, a company may set up different firewall rules for FTP servers, telnet
servers and web servers. In addition, the company can even control how the employees
connect to the Internet by blocking access to certain websites and restricting the transfer of
files to other networks. Thus, in addition to security, a firewall can give the company a
tremendous control over how people use their network.


Firewalls use one or more of the following methods to control the incoming and outgoing
traffic in a network:

1. Packet Filtering: In this method, packets (small chunks of data) are analyzed against
a set of filters. Packet filters has a set of rules that come with accept and deny actions
which are pre-configured or can be configured manually by the firewall
administrator. If the packet manages to make it through these filters then it is allowed
to reach the destination; otherwise it is discarded.

2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the
packets. Instead, it compares certain key aspects of each packet to a database of
trusted source. Both incoming and outgoing packets are compared against this
database and if the comparison yields a reasonable match, then the packets are
allowed to travel further. Otherwise they are discarded.

Firewall Configuration:

Firewalls can be configured by adding one or more filters based on several conditions as
mentioned below:

1. IP addresses: In any case, if an IP address outside the network is said to be
unfavourable, then it is possible to set filter to block all the traffic to and from
that IP address. For example, if a certain IP address is found to be making too
many connections to a server, the administrator may decide to block
traffic from this IP using the firewall.

2. Domain names:  Since it is difficult to remember the IP addresses, it is an
easier and smarter way to configure the firewalls by adding filters based on
domain names. By setting up a domain filter, a company may decide to block all
access to certain domain names, or may provide access only to a list of
selected domain names.

3. Ports/Protocols: If the services running on a given port is intended for the
public or network users, they are usually kept open. Otherwise they are blocked
using the firewall so as to prevent intruders from using the open ports for
making unauthorized connections.

4. Specific words or phrases: A firewall can be configured to filter one or more
specific words or phrases so that both the incoming and outgoing packets are
scanned for the words in the filter.

For example, you may set up a firewall rule to filter any packet that
contains an offensive term or a phrase that you may decide to block from
entering or leaving your network.

Hardware vs. Software Firewall:

Hardware firewalls provide higher level of security and hence preferred for servers where
security has the top most priority. The software firewalls on the other hand are less
expensive and hence preferred in home computers and laptops.
Hardware firewalls usually come as an in-built unit of a router and provide maximum
security as it filters each packet at the hardware level itself even before it manages to enter
your computer. A good example is the Linksys Cable/DSL router.

Friday, 13 February 2015

Role Of Management In Software Development

Role Of Management In Software Development

There are 4 P's of  management .

                                     

  • People

Software development requires good mangers a good manager can not insure the success of the project but can increase the probability of process.

Manager selection is crucial & critical it is the responsibility of a manager to manage,motivate,incaurage,guid & control the people of the team.

  • Product
Product is the solution to customer problem .

It helps the manager to select the best approach within constrains (Delivery dead lines, budget, man power availability) without well define requirements it is difficult to define cost estimation and development time.

  • Process 
Process is the way in which we produce software. It provides a framework for software development if the process is weak the end product will suffer.

C.M.M (Capability maturity model ) is became a standard for process framework.

  • Project
 A proper planning is required to monitor the status of development & to control the complexity.

 In order to manage a successful project , it must understood what can go wrong and how to do it right . There should be planning mechanism to give warning before occurrence of any surprise. 

Thursday, 12 February 2015

Software Myths

There are number myths about software. Today I would like to discuss some of the myths and there reality.

                                           

  • Software is easy to change

Reality ;- Source code file are easy to to edit but software is not easy to change .Every change requires that the complete system should be re-verified .This become extremely tedious and expensive.

  • Computer provide greater reliability than the devices they replace
Reality :- Taking an example of journal,ledger.These ledgers are not perfectly accurate because of human error.The computerize system can also contain software error as well.

  • Testing the software ca remove all the errors  
Reality:- Testing can only show the presence of errors ,it cannot show the absence of error.The aim of testing to design effective cases to find out maximum errors.

  • Software with more features is a better software

Reality:- A better Software is the one which performs the required functionality in a proper manner.

  • Addition of more software engineer will make up the delay
Reality :- This is not true as the new member need time to understand the system.

Sunday, 19 October 2014

Today I am going to Show a Simple Calculator using VB.Net .

Write a program to develop a calculator using select case.

 *(Select case work Same as Switch case)


Module Module1

    Sub Main()
        Dim a, b, c, ch As Integer        // Declaration a,b,c,ch variable Integer type 
                  
        Console.WriteLine("Enter the two numbers")

        a = Integer.Parse(Console.ReadLine())      //Taking first number from user
        b = Integer.Parse(Console.ReadLine())     //Taking second number from user

        Console.WriteLine("CALCULATOR")                     /*        Showing output To User  
        Console.WriteLine("1.ADDITION")
        Console.WriteLine("2.SUBTRACTION")
        Console.WriteLine("3.MULTIPLICATION")
        Console.WriteLine("4.DIVISION")
        Console.WriteLine("Enter your choice(1-4)")                             */
      
        ch = Integer.Parse(Console.ReadLine())        //Taking value from user to select an option 
        Select Case ch                                                 //select case work same as Switch
            
            Case 1
                c = a + b
                Console.WriteLine("Addition of {0} and {1} is {2}", a, b, c)
            Case 2
                c = a - b
                Console.WriteLine("subtraction of {0} and {1} is {2}", a, b, c)
            Case 3
                c = a * b
                Console.WriteLine("Multiplication of {0} and {1} is {2}", a, b, c)
            Case 4
                Console.WriteLine("division of {0} and {1} is {2}", a, b, c)   /*{0},{1},{2} defines the                                                                                                                            position of variable here {0}                                                                                                                       points 'a' , {1} points 'b' and                                                                                                                                          {3} points 'c' */
            Case Else
                Console.WriteLine("INVALID CHOICE")
        End Select
        Console.Read()
    End Sub

End Module


**WHOLE PROGRAM IN VB.NET DOES'T CONTAIN TERMINATOR ";" 


Output



Friday, 13 June 2014

HACKERS DICTIONARY

ACRONYMS OF HACKING WORLD


  • SQL > Structured Query Language. It usually goes along with a word  after it , such as "SQL Injection

  • FUD> Fully Undetectable.

  • Nix>unix based operating system, usually referred to here when referring to DoS'ing.
  • VPN > Vistual Private Network.
  • DDoS>Distributed Denial of Service.
  • skid>Script kid/Script Kiddle.
  • Malware > Malicious Software.

  • XSS(CSS)> Cross Site Scripting.
  • FTP > File Transport Protocol. Used for transfering files over an FTP server.
  • SSH >Secured Shell , used to connect to Virtual Private Server.
  • HTTP > Hyper Text Transfer Protocol. The foundation of data communication for the world wide web.
  • SE > Social Engineering .
  • VPS > Virtual Private Server.
  • DrDoS > Distributed Reflection Denial of Service Attack ,uses a list of refelection  servers or other methods such as DNS  to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.

  • R.A.T > Remote Administration Tool.remote administration tool (a RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses,






































WORDS

FUD  >  It stand for software that cannot be detected by anti-viruses when a scan is performed. The term is used in hacker circles to refer to something that appears to be clean to many anti-viruses, even though it is a hacking tool. FUD is also a more commonly used acronym for "Fear, Uncertainty and Doubt".



 LOIC   > LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.


TROJAN  >  In computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.

A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer

ROOT  >  Highest permission level on a computer , able to modify anything on a system without any restriction.

BOTNET > Computer infected by worms and trojan and taken over by hacker and brought into network to send spam, more viruses , or launch denial of service attack.


WAZER > Software privacy.


SQL Injection > An SQL injection is a method often used to hack SQL database via a website , and  gain admin control on the site.

IP Grabber > A link that grabs someone's IP when they visit it.