<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6868448242849060978</atom:id><lastBuildDate>Fri, 01 Nov 2024 11:43:36 +0000</lastBuildDate><category>Tutorials</category><category>Tips n Tricks</category><category>Help Forum</category><category>Personal</category><category>Tech News</category><category>JIS College</category><category>ECIL</category><category>Friends' Posts</category><category>Hacking</category><category>Linux</category><category>E-Books</category><category>Interview</category><category>Mac OS X</category><category>PSU</category><category>Virtualization</category><title>Abhinav the Prince</title><description>A Blog Hosting Intra-engineering Notions of Academic Ventures.</description><link>http://abhinavtheprince.blogspot.com/</link><managingEditor>noreply@blogger.com (Abhinav Biswas)</managingEditor><generator>Blogger</generator><openSearch:totalResults>45</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>Copyright:</copyright><itunes:subtitle>A Blog Hosting Intra-engineering Notions of Academic Ventures.</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Gadgets"/></itunes:category><itunes:author>Abhinav Biswas</itunes:author><itunes:owner><itunes:email>noreply@blogger.com</itunes:email><itunes:name>Abhinav Biswas</itunes:name></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-5094564226864307125</guid><pubDate>Tue, 22 Aug 2017 04:59:00 +0000</pubDate><atom:updated>2017-08-22T10:58:02.708+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ECIL</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tips n Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR!</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcfRWp5aSN8BeJkO_1R9mFYrWO-h0GeTuAr0a8uNOr1Z7plGc_u7zO7YbB1_NgvB5fZD_VTuC0trZ_S6_61TX3f3Ug1dv-BCBZE_Qr3zI4tJ5W6miQShrbkCCpWlKjHY1MXTSJnUuxDATz/s1600/Abhinav_c0c0n+copy.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1019" data-original-width="1600" height="406" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcfRWp5aSN8BeJkO_1R9mFYrWO-h0GeTuAr0a8uNOr1Z7plGc_u7zO7YbB1_NgvB5fZD_VTuC0trZ_S6_61TX3f3Ug1dv-BCBZE_Qr3zI4tJ5W6miQShrbkCCpWlKjHY1MXTSJnUuxDATz/s640/Abhinav_c0c0n+copy.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Recently, I spoke at the &lt;a href="http://is-ra.org/c0c0n/" target="_blank"&gt;&lt;b&gt;C0C0N X&lt;/b&gt; Security &amp;amp; Hacking Conference&lt;/a&gt; 2017 held at Le Meridien, Kochi. The talk focussed on the '&lt;b&gt;Hiddenness&lt;/b&gt;' of &lt;b&gt;TOR Hidden Services&lt;/b&gt; specific to the detection of HS Directory Surveillance by injecting &lt;b&gt;&lt;i&gt;Decoys&lt;/i&gt;&lt;/b&gt; or &lt;b&gt;&lt;i&gt;Honeypots&lt;/i&gt;&lt;/b&gt; inside the TOR network. Here’s the digest of the presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What is TOR?&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;The Onion Router – Gateway to Anonymity&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;How TOR works?&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Establishing the Circuit&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Directory Authorities - The Gatekeepers of TOR&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Introduction to TOR Hidden Services (HS)&lt;span style="white-space: pre;"&gt; &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Why run a TOR HS? - Sneak peek into HS features&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;How TOR HS works? - HS Rendezvous Protocol&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Analysis of hiddenness of TOR HSs&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Research Hypothesis - Are TOR HS really Hidden?&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;The HS Honeypot Approach&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Setting up the Onion Decoy Project&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Live Demo&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Hosting Tor Hidden Service in seconds with Docker Containers&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;How to setup Honeypots (aka Onion Decoys) inside TOR Network&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Live probing of Onion Decoys to detect intrusions by attackers&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJtX_rxnRNKAZAvSYSy8jsBIYnwhE_g08PgSNuk8IUILth35X7isdoj_JJrDoG6P6J3iUM7KhtrXr6sI81jl4bP0Oe8K9OeEBafLuk3lJ_yQZBFvj-XNXBFu_h0WWJvpAILF5vr5kBHt7O/s1600/OnionDecoy.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="703" data-original-width="1054" height="133" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJtX_rxnRNKAZAvSYSy8jsBIYnwhE_g08PgSNuk8IUILth35X7isdoj_JJrDoG6P6J3iUM7KhtrXr6sI81jl4bP0Oe8K9OeEBafLuk3lJ_yQZBFvj-XNXBFu_h0WWJvpAILF5vr5kBHt7O/s200/OnionDecoy.png" width="200" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Results of the Onion Decoy Experiment&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Private Hidden Services are not really hidden&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Conclusion &amp;amp; Takeaways&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Everything can be a Honeypot, if you don’t know it fully&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;The more you hide, The more somebody wants to know why&lt;br /&gt;
&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The Source Code of the &lt;b&gt;Onion Decoy Project &lt;/b&gt;is available at &lt;a href="https://github.com/OnionDecoy"&gt;https://github.com/OnionDecoy&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Below is the presentation for the delivered talk.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="485" marginheight="0" marginwidth="0" scrolling="no" src="//www.slideshare.net/slideshow/embed_code/key/pnDQxP4KcwtFiM" style="border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;" width="595"&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;div style="margin-bottom: 5px;"&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://abhinavtheprince.blogspot.com/2017/08/are-tor-hidden-services-really-hidden.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcfRWp5aSN8BeJkO_1R9mFYrWO-h0GeTuAr0a8uNOr1Z7plGc_u7zO7YbB1_NgvB5fZD_VTuC0trZ_S6_61TX3f3Ug1dv-BCBZE_Qr3zI4tJ5W6miQShrbkCCpWlKjHY1MXTSJnUuxDATz/s72-c/Abhinav_c0c0n+copy.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-7750936369407286983</guid><pubDate>Mon, 26 Sep 2016 20:25:00 +0000</pubDate><atom:updated>2016-09-27T02:02:16.027+05:30</atom:updated><title>How the next Edward Snowden should access Internet for maintaining privacy? - Rethink VPN &amp; TOR</title><description>&lt;div style="text-align: justify;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrhlFLZrcX18nFCd1liQVUkqaGAve8iPG9Ya6ItUmr9fkiREvR0XILZB5u7Wzp05kMQV-AgpvL2oefy87iuzObRhj1ek39ITbE6rY4zQpF0VoW0barE9rp7VXbU8yzR_52iQGvK-eH2zJz/s1600/tor-vpn.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="210" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrhlFLZrcX18nFCd1liQVUkqaGAve8iPG9Ya6ItUmr9fkiREvR0XILZB5u7Wzp05kMQV-AgpvL2oefy87iuzObRhj1ek39ITbE6rY4zQpF0VoW0barE9rp7VXbU8yzR_52iQGvK-eH2zJz/s320/tor-vpn.png" width="320" /&gt;&lt;/a&gt;In the present era of Mass Surveillance by intelligence agencies like NSA, GCHQ &amp;amp; RAW, you should know that every border you cross, every purchase you make, every call you dial, every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet you route is in the hands of some electronic system whose reach is unlimited, but whose safeguards are questionable. This amount of metadata collected about you is more than enough to create simulations of you and predict your behaviour in any given circumstance. It involves a systematic interference with individual’s right to privacy in terms of subjection to significant indiscrimination, monitoring and censorship. Hence, Privacy &amp;amp; Anonymity are rising concerns among informed citizens, journalists, whistleblowers and Edward Snowdens of the world.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
When it comes to technology, privacy and anonymity enthusiasts extensively use encrypted proxy services like VPN &amp;amp; TOR Anonymity network to hide their identities &amp;amp; activities online. But let’s understand how useful &amp;amp; worthy they are, what are the differences and how can we leverage the potential of both.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
VPN is faster than TOR, and is suitable for P2P downloading. The major downside however (and reason VPN is said to provide privacy rather than anonymity) is that it requires your trust the VPN provider. This is because, should it wish to (or is compelled to), your VPN provider can “see” what you get up to on the internet. VPN also allows you to easily spoof your geographic location.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
On the contrary, TOR is much slower because of the built-in &lt;i&gt;Onion Routing&lt;/i&gt;, is often blocked by websites, and is unsuitable for P2P, but it does not require your truston anybody, and is therefore much more secure &amp;amp; truly anonymous.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
Interestingly, VPN &amp;amp; TOR can be clubbed and used together in order to provide an extra layer of security, and to mitigate some of the drawbacks of using either technology exclusively. The main downside, however, of doing so combines the speed hit of both technologies, making connections more secure but slow. It is also important to understand the difference between connecting VPN to TOR and connecting TOR to VPN for accessing the Internet. &lt;b&gt;Order Matters!&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;VPN to TOR&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
Under this configuration you first connect to your VPN server, and then to the TOR network before accessing the internet:&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Your computer -&amp;gt; VPN -&amp;gt; TOR -&amp;gt; Internet&lt;/b&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
This is what happens when you use TOR Browser while connected to a VPN server.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;i&gt;Your apparent IP on the internet = IP of the TOR exit node.&lt;/i&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Pros:&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
1. Your ISP will not know that you are using TOR (but it can know that you are using VPN).&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
2. The TOR entry node will not see your real IP address, but the IP address of VPN server.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
3. Allows access to TOR hidden services (.onion websites).&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Cons:&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
1. Your VPN provider knows your real IP address.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
2. No protection from malicious TOR exit nodes. Non-SSL traffic entering and leaving TOR exit nodes is unencrypted and could be monitored.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
3. TOR exit nodes are often blocked by popular websites.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;TOR to VPN&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
This configuration involves connecting first to TOR using TOR client and then to a VPN server to access the internet using regular browser:&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Your computer -&amp;gt; TOR -&amp;gt; VPN -&amp;gt; Internet&lt;/b&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
This setup requires you to configure your VPN client to work with TOR, and note, not all but some VPN providers support this like AirVPN, BolehVPN, etc.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;i&gt;Your apparent IP on the internet = IP of the VPN server.&lt;/i&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Pros:&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
1. Your VPN provider cannot ‘see’ your real IP address – only that of the TOR exit node.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
2. If combined with an anonymous payment method (such as properly-mixed / well-laundered Bitcoins) made anonymously over TOR, the VPN provider will have no way of identify you.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
3. Protection from malicious TOR exit nodes - As data is encrypted by the VPN client before entering (and exiting) the TOR network.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
4. VPN Provider Allows you to choose server location (Great for geo-spoofing).&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
5. All internet traffic is routed through TOR (even by apps that usually don’t support it).&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
6. Bypasses any blocks on TOR exit nodes (Important!).&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Cons:&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
1. Your ISP will know that you are using TOR.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
2. The VPN provider can see your internet traffic (but can’t identify you - true anonymity)&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
3. Slightly more vulnerable to global end-to-end timing attack as a fixed point in the chain exists (the VPN provider).&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
4. Does not allow access to TOR hidden services (‘.onion’ websites).&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;TOR after TOR to VPN&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
This configuration involves connecting first to TOR using TOR client, and then to a VPN server and using TOR Browser to access the internet:&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Your computer -&amp;gt; TOR -&amp;gt; VPN -&amp;gt; TOR -&amp;gt; Internet&lt;/b&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
Note, this setup requires you to use TOR Browser as well as configuring your VPN client to work with TOR.&lt;/div&gt;
&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-style: italic;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;div style="text-align: justify;"&gt;
&lt;i&gt;Your apparent IP on the internet = IP of the TOR exit node of 2nd TOR circuit.&lt;/i&gt;&lt;/div&gt;
&lt;/i&gt;&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Pros:&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
1. Your VPN provider cannot ‘see’ your real IP address – only that of the TOR exit node.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
2. If combined with an anonymous payment method (such as properly mixed Bitcoins) made anonymously over TOR, the VPN provider will have no way of identify you.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
3. Protection from malicious TOR exit nodes - As data is encrypted by the VPN client before entering (and exiting) the 1st TOR Circuit.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
4. VPN Provider allows you to choose server location (Extra-functionality not required actually because, 2nd TOR circuit will provide geo-spoofing).&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
5. Allows access to TOR hidden services (‘.onion’ websites).&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
6. Less prone to global end-to-end timing attack because of two TOR circuits.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Cons:&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
1. Your ISP will know that you are using TOR.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
2. The VPN provider can see your internet traffic (but can not identify you - true anonymity)&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
3. TOR exit nodes are often blocked by popular websites.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;So which one is better?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
However, before that, two important things to ponder upon:&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;1. Malicious exit nodes:&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
When using TOR, the last exit node in the chain between your computer &amp;amp; open internet is called an exit node. Traffic enters and exits this node unencrypted (unless some additional form of encryption is used like SSL), which means that anyone running the exit node can spy on users’ internet traffic. This is not usually a huge problem, as a user’s identity is hidden by the 2 or more additional nodes that traffic passes through on its way to and from the exit node. If the unencrypted traffic contains personally identifiable information, however, this can be seen by the entity running the exit node.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
Such nodes are referred to as malicious exit nodes, and have also been known to redirect users to fake websites. SSL connections are encrypted, so if you connect to an SSL secured website (https://) your data will be secure, even it passes through a malicious exit node.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;2. End-to-End (E2E) timing attacks:&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
This is a technique used to de-anonymize VPN &amp;amp; TOR users by correlating the time when they were connected, vis-a-vis the timing of otherwise anonymous behavior on the internet. An incident where a Harvard bomb-threat idiot got caught (http://www.businessinsider.com/harvard-student-used-tor-for-bomb-threat-2013-12) while using TOR is a great example of this form of de-anonymization attack in action.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
On a global scale, pulling off a successful E2E attack against a TOR user would be a monumental undertaking, but possibly not impossible for the likes of the NSA, who are suspected of running a high percentage of all the world public TOR exit nodes. If such an attack (or other de-anonymization tactic) is made against you while using TOR, then using VPN as well will provide an additional layer of security.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Conclusion&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
Note, TOR to VPN is usually considered more secure than VPN to TOR since it allows you to maintain complete (and true) anonymity if the correct precautions are taken because not even your VPN provider knows who you are. It also provides protection against malicious TOR exit nodes, and allows you to evade censorship via blocks on TOR exit nodes. You should be aware, however, that if an adversary can compromise your VPN provider, then it can control one end of the TOR chain. Over time, this may allow the adversary to pull off an E2E timing or other de-anonymization attack. The additional benefit you get if you use TOR after TOR to VPN is that you can access ‘.onion’ websites, but with a caveat that tor exit nodes are often blocked by popular websites.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
Hence, the bottom line is that any user who requires a very high level of security, privacy &amp;amp; anonymity must carefully weigh up the pros and cons of each of the above three configurations in relation to their particular needs.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://abhinavtheprince.blogspot.com/2016/09/how-next-edward-snowden-should-access.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrhlFLZrcX18nFCd1liQVUkqaGAve8iPG9Ya6ItUmr9fkiREvR0XILZB5u7Wzp05kMQV-AgpvL2oefy87iuzObRhj1ek39ITbE6rY4zQpF0VoW0barE9rp7VXbU8yzR_52iQGvK-eH2zJz/s72-c/tor-vpn.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-7091109893028608582</guid><pubDate>Sun, 28 Aug 2016 18:17:00 +0000</pubDate><atom:updated>2016-08-28T23:48:44.655+05:30</atom:updated><title>Dark-Side of Internet of Things (IOT): Security &amp; Privacy Challenges</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwgdTT9MsK-XhWDjZo2JmRCPJk91V2HtthKgwUHt9A5tEPMh2qfBqB67wBkgV1v5H4BCUbdvWPGHuZu794_a08K0M4-CLp1AWEYSeDQHo5liEbYTfT4TxCvTnfAJUO6wvUT8pMKAEbHn2t/s1600/Screen+Shot+2016-08-28+at+9.29.00+PM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="262" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwgdTT9MsK-XhWDjZo2JmRCPJk91V2HtthKgwUHt9A5tEPMh2qfBqB67wBkgV1v5H4BCUbdvWPGHuZu794_a08K0M4-CLp1AWEYSeDQHo5liEbYTfT4TxCvTnfAJUO6wvUT8pMKAEbHn2t/s640/Screen+Shot+2016-08-28+at+9.29.00+PM.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Recently, I was invited to deliver a talk at the &lt;b&gt;Global IOT Conclave&lt;/b&gt; held at The Chancery Pavilion, Bangalore. The talk focussed on the Dark-Side of Internet of Things specific to Security &amp;amp; Privacy Challenges in IOT. Here’s the digest of the presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Why is everything getting &lt;b&gt;Smart&lt;/b&gt; with the advent of IOT? &amp;nbsp;&lt;b&gt;Sensors&lt;/b&gt; or &lt;b&gt;Cloud&lt;/b&gt; or &lt;b&gt;M2M&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;IOT is bridging the gap between the &lt;b&gt;Physical world&lt;/b&gt; &amp;amp; the &lt;b&gt;Digital world&lt;/b&gt; and how Digital threats are becoming Physical threats?&lt;/li&gt;
&lt;li&gt;Top IOT Hacks: Chrysler's &lt;i&gt;Jeep Cherokee&lt;/i&gt;, Mattel's &lt;i&gt;Wi-fi Hello Barbie&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;Eavesdropping through microphones of Smart Dolls, Smart Teddy Bears &amp;amp; Smart TVs. What if the smart doll teaches offensive things to your kid.&lt;/li&gt;
&lt;li&gt;Exploitable Smart Refrigerators, Smart Thermostats, Smart Insulin Pumps. How Smart TVs have been hacked &amp;amp; infected by malware for automated Ad Clicks and Cryptocurrency mining.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;IOT Ransomeware&lt;/b&gt; is now reality. How much someone would be willing to pay to remove ransomware from a Smart Pacemaker?&lt;/li&gt;
&lt;li&gt;Denial of Service (DOS) attacks on &amp;amp; through IOT devices. How hackers can turn a Smart Fridge into a spam-bot?&lt;/li&gt;
&lt;li&gt;Why can't we make smart devices smart enough to be secure? The IOT Security Challenges: &lt;b&gt;Resource Constraints&lt;/b&gt;, &lt;i&gt;STRIDE&lt;/i&gt; Threat vectors.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Security&lt;/b&gt; vs &lt;b&gt;Privacy&lt;/b&gt; vs &lt;b&gt;Anonymity&lt;/b&gt;. Importance of &lt;b&gt;Trust&lt;/b&gt; in IOT Privacy.&lt;/li&gt;
&lt;li&gt;Security by &lt;b&gt;Obscurity&lt;/b&gt; vs Security by &lt;b&gt;Design&lt;/b&gt;: Proprietary protocols, indigenous hardware &amp;amp; air-gapped networks.&lt;/li&gt;
&lt;li&gt;Security can not be an afterthought. It has to considered &amp;amp; implemented in all of stages of IOT Business: &lt;i&gt;Planning, Design, Implementation, Verification, Validation, Deployment &amp;amp; Operations&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;IOT Business Model needs to change. Earlier we used to Build product, Ship them &amp;amp; forget about them until we had to Service them, but now we have to &lt;b&gt;Ship &amp;amp; Remember&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Below is the presentation for the delivered talk.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="485" marginheight="0" marginwidth="0" scrolling="no" src="//www.slideshare.net/slideshow/embed_code/key/AcmsgPtGWwvVu5" style="border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;" width="595"&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;div style="margin-bottom: 5px;"&gt;
&lt;strong&gt; &lt;a href="https://www.slideshare.net/Abhinav_Biswas/dark-side-of-internet-of-things-iot" target="_blank" title="Dark - Side of Internet of Things (IOT)"&gt;Dark - Side of Internet of Things (IOT)&lt;/a&gt; &lt;/strong&gt; from &lt;strong&gt;&lt;a href="https://www.slideshare.net/Abhinav_Biswas" target="_blank"&gt;Abhinav Biswas&lt;/a&gt;&lt;/strong&gt; &lt;/div&gt;
&lt;br /&gt;</description><link>http://abhinavtheprince.blogspot.com/2016/08/internet-of-things-iot-security-privacy.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwgdTT9MsK-XhWDjZo2JmRCPJk91V2HtthKgwUHt9A5tEPMh2qfBqB67wBkgV1v5H4BCUbdvWPGHuZu794_a08K0M4-CLp1AWEYSeDQHo5liEbYTfT4TxCvTnfAJUO6wvUT8pMKAEbHn2t/s72-c/Screen+Shot+2016-08-28+at+9.29.00+PM.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-5806161011443495674</guid><pubDate>Fri, 03 Jun 2016 08:53:00 +0000</pubDate><atom:updated>2016-06-03T14:53:32.112+05:30</atom:updated><title>Touring the Dark-Side of Internet: A Journey through IOT, TOR &amp; Docker</title><description>&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMm9xJpQXFdMOo7LqhcBQROZ-pzZpRZZsXMJPd4w_-rXveXgKpn9P1MoL_QNqkl0XM4lfAS1xmWVFzZ3zBuwyp9kMkHjGFhyphenhyphen0_hK-xfS-ey9yokzqlfT4aJ_5_dqoPPu49Ta5IR1qCrHoe/s1600/Geeknight.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMm9xJpQXFdMOo7LqhcBQROZ-pzZpRZZsXMJPd4w_-rXveXgKpn9P1MoL_QNqkl0XM4lfAS1xmWVFzZ3zBuwyp9kMkHjGFhyphenhyphen0_hK-xfS-ey9yokzqlfT4aJ_5_dqoPPu49Ta5IR1qCrHoe/s640/Geeknight.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
Recently, I had the privilege of delivering a talk at &lt;b&gt;ThoughtWorks &lt;a href="http://twhyderabad.github.io/geeknight/" target="_blank"&gt;GeekNight&lt;/a&gt;&lt;/b&gt; Hyderabad along with my co-speaker @Sarath. The session focussed on the &lt;b&gt;&lt;i&gt;Dark-Side of Internet&lt;/i&gt;&lt;/b&gt; touching upon the following theme.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;With the advent of &lt;b&gt;IOT&lt;/b&gt;, Every &lt;b&gt;'Thing'&lt;/b&gt; is getting &lt;b&gt;Smart&lt;/b&gt;, starting from the range of smartwatches, smart refrigerators, smart bulbs to smart car, smart healthcare, smart agriculture, smart retail, smart city and what not, even smart planet. &lt;b&gt;But why is every thing getting smart? &lt;/b&gt;Is it just a marketing gimmick?&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;
&lt;/i&gt; &lt;i&gt;People are trying to bridge the gap between Digital World &amp;amp; Physical World by means of ubiquitous connectivity to Internet, and when digital things become physical, digital threats also become physical threats. &lt;b&gt;Security &amp;amp; Privacy &lt;/b&gt;issues are rising as never before. What if the microphone in your smart TV can be used to eavesdrop the private communications in your bed room? What if a smart driverless car deliberately crashes itself into an accident? What if you want to be Anonymous over Internet and don't want anybody to track you?&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;
&lt;/i&gt; The talk focused on answering the above questions with a view on '&lt;b&gt;What are we currently doing to protect ourselves' &lt;/b&gt;and &lt;b&gt;'What we need to do'&lt;/b&gt;. What are the new security challenges that are coming up and how &lt;b&gt;privacy&lt;/b&gt; &amp;amp; &lt;b&gt;anonymity&lt;/b&gt; is taking the lead over &lt;b&gt;security&lt;/b&gt;. The talk also sensitised the audience about the paradigm shift that is happening in IOT DevOps, with help of &lt;b&gt;Docker&lt;/b&gt; Containers and how they can be anonymised using &lt;b&gt;TOR&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
The detailed Agenda of the delivered talk:&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Top 5 Security Attacks of 2015&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Sony Hack, Ransomware, State-Sponsored, Hacktivism&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;The Cyber Attack Kill Chain&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;APTs (Advanced Persistent Threats)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Defense Strategies &amp;amp; New Challenges&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Signature-based vs dynamic sandboxing&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Virtualization &amp;amp; Cloud Security&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Security vs Privacy vs Anonymity&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;The Advent of IOT&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;People - Process - Product (Era of ‘Smart’ Things)&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Cloud - M2M - Sensors (How connectivity can go bad)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Introduction to Docker&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;From Virtualization to Containerization&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Shift in DevOps –&amp;nbsp;&lt;b&gt;Demo&lt;/b&gt;&amp;nbsp;of Web hosting through containers&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Deep Net vs Dark Net&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;TOR (The Onion Router) – How to be Anonymous on Internet&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Demo&lt;/b&gt;&amp;nbsp;of TOR hidden service through Docker Containers&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Future thoughts.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
Below is the presentation for the delivered talk.&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="485" marginheight="0" marginwidth="0" scrolling="no" src="//www.slideshare.net/slideshow/embed_code/key/oC62UUCuhuswTc" style="border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;" width="595"&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;div style="margin-bottom: 5px;"&gt;
&lt;strong&gt; &lt;a href="https://www.slideshare.net/Abhinav_Biswas/touring-the-dark-side-of-internet-a-journey-through-iot-tor-docker" target="_blank" title="Touring the Dark Side of Internet: A Journey through IOT, TOR &amp;amp; Docker"&gt;Touring the Dark Side of Internet: A Journey through IOT, TOR &amp;amp; Docker&lt;/a&gt;&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;
from &lt;strong&gt;&lt;a href="https://www.slideshare.net/Abhinav_Biswas" target="_blank"&gt;Abhinav Biswas&lt;/a&gt;&lt;/strong&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://abhinavtheprince.blogspot.com/2016/06/touring-dark-side-of-internet-journey.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMm9xJpQXFdMOo7LqhcBQROZ-pzZpRZZsXMJPd4w_-rXveXgKpn9P1MoL_QNqkl0XM4lfAS1xmWVFzZ3zBuwyp9kMkHjGFhyphenhyphen0_hK-xfS-ey9yokzqlfT4aJ_5_dqoPPu49Ta5IR1qCrHoe/s72-c/Geeknight.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-6137781783256574466</guid><pubDate>Fri, 01 Apr 2016 05:20:00 +0000</pubDate><atom:updated>2016-05-10T04:26:32.441+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ECIL</category><category domain="http://www.blogger.com/atom/ns#">Personal</category><category domain="http://www.blogger.com/atom/ns#">Tech News</category><title>Digital Disruption - Facts to ponder! </title><description>&lt;div style="text-align: justify;"&gt;
Why didn’t a cab driver think of Ola or Uber?&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Why didn’t a Shopping Mall owner think of Flipkart?&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Why didn’t a Theatre owner think of BookMyShow?&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Why didn’t Airtel or Vodafone think of Paytm?&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Why didn’t Taj or Marriott think of GoIbibo?&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;a href="http://www.analystconsult.com/wp-content/uploads/2015/11/digital-disruption-in-Nigeria.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: justify;"&gt;&lt;img border="0" src="http://www.analystconsult.com/wp-content/uploads/2015/11/digital-disruption-in-Nigeria.png" height="157" width="320" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
The answer to all above, and the myriad of all other companies displaced by &lt;b&gt;digital disruption&lt;/b&gt;, is that at some point they became so busy and coupled with the ongoing need to meet or exceed the quarterly numbers, that they forgot to look far enough outside of their business to see the disruption ahead. A quite convincing reason why so many companies fail to face the disruption is that when someone from the outside uses digital disruption to disrupt you, the strategy most often invoked is to protect and defend the status quo. It is amazing how much time and money organizations spend protecting and defending their current ‘cash cows’. In the past this was a valid strategy that did produce good results. But digital disruption is different. Because it tends to be game-changing with a very low cost of entry, it is not hard for a small startup to quickly disrupt not only a big business, but even an entire industry.&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
But, why all this is happening now? What is digital disruption?&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Digital disruption is nothing but the change that occurs when new digital technologies and business models affect the value proposition of existing goods and services. Consider how fast the mobile web has changed how we all live, work, and play. The sudden instant, massive connectivity of the smartphones &amp;amp; internet enabled the ‘service economy’. Transformation is far reaching, and it is happening at lightning speed. Technologies and gadgets that are omnipresent today didn't even exist a few years ago. Gone are the days of SMS, it’s all WhatsApp now. Telcos are defending by fighting to kill Net Neutrality. But is it the right solution? Or they need to come up with new startup ideas.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
We are one of over 3 billion people connected to the internet. That’s nearly half of the people on Earth. Many of these people are shopping online or catching up with friends over social networks like Facebook, Twitter &amp;amp; LinkedIn. But some creative people are evaluating a new business idea, raising a startup, or building an app that’s going to change the world. Are you one of those creative people?&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Think about other emerging digital disruptions that are coming in near future: the wearable web (smart watches, smart health monitors), the drivable web (smart semi-autonomous cars), the domestic web (smart TVs, smart homes), and so on. What does that do to your industry? If you think the answer is ‘Nothing’, I encourage you to think twice. You need to become our own disruptor, your own best competition. You should not get comfortable. You should disrupt yourself, or someone else will. In order to thrive in this era of exponential change and rapid digital disruption, you need to actively anticipate new ways to disrupt yourself, before others do it for you.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
So, start thinking and think big. Who knows, you may have the next great idea:&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;The Next Startup Boom&lt;/b&gt;...&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://abhinavtheprince.blogspot.com/2016/04/digital-disruption-facts-to-ponder.html</link><thr:total>0</thr:total><georss:featurename>Hyderabad, Telangana, India</georss:featurename><georss:point>17.385044 78.486671</georss:point><georss:box>16.9002155 77.841224 17.8698725 79.132118</georss:box><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-906257052973848587</guid><pubDate>Tue, 13 Oct 2015 20:06:00 +0000</pubDate><atom:updated>2015-10-14T01:44:21.661+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mac OS X</category><category domain="http://www.blogger.com/atom/ns#">Tips n Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">Virtualization</category><title>Installing Mac OS X El Capitan 10.10 on Vmware ESXi 6.0</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5FPMwJHjM2FiXD5q7rhRp46Pqzg0wjVRQFWPWxaR5Da76wNUSJmBMV6r5JARHompY-BMBp_hEeY3WJiYfjhRBgUq8XhR5qPpwn6rE-y4PkFQE9sXSK8upbAJcGmLeJ6pe4pX1PtexgoPY/s1600/Os-X-El-Capitan-Requirements-800x420.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="168" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5FPMwJHjM2FiXD5q7rhRp46Pqzg0wjVRQFWPWxaR5Da76wNUSJmBMV6r5JARHompY-BMBp_hEeY3WJiYfjhRBgUq8XhR5qPpwn6rE-y4PkFQE9sXSK8upbAJcGmLeJ6pe4pX1PtexgoPY/s320/Os-X-El-Capitan-Requirements-800x420.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
After a long struggle of 48 hours, I could finally able to install the&lt;b&gt; Apple&lt;/b&gt;'s latest &lt;b&gt;Mac OS X El Capitan&lt;/b&gt; v10.11 &amp;nbsp;on a &lt;b&gt;Virtual Machine&lt;/b&gt; (VM). The experiment was conducted on Vmware ESXi 6.0 virtualization platform running over physical IBM Server X3650 M3. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Following are the installation steps:&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Setting up ESXi for running Apple Mac OS X&amp;nbsp;&lt;/h2&gt;
Vmware ESXi 6.0 doesn’t support OS X out of the box.&lt;br /&gt;
&lt;ol&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS298Frvw3wWXcEaFOSFQUid4s8jy5GyA1UpsHEnoSlyMdyRtMq_zWFwgLPIhIY3Peknu9Oz7Z105QJKn2PoJz7PNh0Ei_BVTeqbU8qlvCIPhRY31BmJr6ENcezUGkdZKsH0fym4Nkv6LU/s1600/esxi-dedicated-server-icon.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="100" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS298Frvw3wWXcEaFOSFQUid4s8jy5GyA1UpsHEnoSlyMdyRtMq_zWFwgLPIhIY3Peknu9Oz7Z105QJKn2PoJz7PNh0Ei_BVTeqbU8qlvCIPhRY31BmJr6ENcezUGkdZKsH0fym4Nkv6LU/s200/esxi-dedicated-server-icon.png" width="200" /&gt;&lt;/a&gt;
&lt;li&gt;So, the first thing you need to do is to customise the &lt;b&gt;hypervisor&lt;/b&gt; layer by executing&lt;a name='more'&gt;&lt;/a&gt; an &lt;b&gt;Unlocker script&lt;/b&gt; by &lt;a href="http://www.insanelymac.com/forum/files/file/339-unlocker/" target="_blank"&gt;insanelymac.com&lt;/a&gt;. Please note that you will need to register on the site in order to download the Unlocker tool.&lt;/li&gt;
&lt;li&gt;You need to &lt;b&gt;enable SSH&lt;/b&gt; on your ESXi host. In order to do that, login to the host using VMware&lt;b&gt; vShpere Client&lt;/b&gt; and navigate to &lt;i&gt;Configuration-&amp;gt;Security Profile&lt;/i&gt;. From here click on &lt;i&gt;Properties&lt;/i&gt; in the upper right corner where it says &lt;i&gt;Services&lt;/i&gt;. The dialog &lt;i&gt;Services Properties &lt;/i&gt;should appear and from here you can click on&lt;i&gt; SSH-&amp;gt;Options&lt;/i&gt; and choose &lt;i&gt;Start and stop with host&lt;/i&gt;. Click &lt;i&gt;Start&lt;/i&gt; and then close all the open dialogs.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Transfer&lt;/b&gt; the Unlocker-files to the host using any &lt;b&gt;SFTP client&lt;/b&gt;. Make sure you extract the files somewhere on your client before transfer and connect to the ESXi host using the user &lt;i&gt;root&lt;/i&gt;. Once connected navigate to &lt;i&gt;/vmfs/volumes/datastore01/&lt;/i&gt; , replacing &lt;i&gt;datastore01 &lt;/i&gt;with your actual datastore name. Create a new folder (&lt;i&gt;mkdir&lt;/i&gt;) called &lt;i&gt;tools &lt;/i&gt;and transfer your unlockerXXX directory.&lt;/li&gt;
&lt;li&gt;Now &lt;i&gt;&lt;b&gt;cd &lt;/b&gt;&lt;/i&gt;into the uploaded directory and ensure the ESXi scripts have execute permissions by running &lt;i&gt;chmod +x esxi-install.sh&lt;/i&gt;. Now &lt;b&gt;run &lt;/b&gt;&lt;i&gt;./esxi-install.sh&lt;/i&gt; in order to install the Unlocker.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Reboot &lt;/b&gt;the ESXi host.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Download and create the bootable OS X El Capitan ISO&lt;/h2&gt;
Grab the &lt;b&gt;El Capitan installer app&lt;/b&gt; from the Apple &lt;b&gt;Appstore&lt;/b&gt;. Note, you need &amp;nbsp;a real Mac in order to download and convert the El Capitan installation disk. Once downloaded minimize or close the installer.&lt;br /&gt;
&lt;br /&gt;
Open the &lt;b&gt;terminal &lt;/b&gt;and change directory to /tmp using command&lt;i&gt; cd /tmp&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Create a new &lt;b&gt;script file&lt;/b&gt;: &lt;i&gt;nano ElCapitan.sh&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Paste the following into the script file and save:&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;#!/bin/bash&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;# Mount the installer image&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil attach /Applications/Install\ OS\ X\ El\ Capitan.app/Contents/SharedSupport/InstallESD.dmg -noverify -nobrowse -mountpoint /Volumes/install_app&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;# Create the ElCapitan Blank ISO Image of 7316mb with a Single Partition - Apple Partition Map&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil create -o /tmp/ElCapitan.cdr -size 7316m -layout SPUD -fs HFS+J&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;# Mount the ElCapitan Blank ISO Image&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil attach /tmp/ElCapitan.cdr.dmg -noverify -nobrowse -mountpoint /Volumes/install_build&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;# Restore the Base System into the ElCapitan Blank ISO Image&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;asr restore -source /Volumes/install_app/BaseSystem.dmg -target /Volumes/install_build -noprompt -noverify -erase&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;# Remove Package link and replace with actual files&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;rm /Volumes/OS\ X\ Base\ System/System/Installation/Packages&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;cp -rp /Volumes/install_app/Packages /Volumes/OS\ X\ Base\ System/System/Installation/&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;# Copy El Capitan installer dependencies&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;cp -rp /Volumes/install_app/BaseSystem.chunklist /Volumes/OS\ X\ Base\ System/BaseSystem.chunklist&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;cp -rp /Volumes/install_app/BaseSystem.dmg /Volumes/OS\ X\ Base\ System/BaseSystem.dmg&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;# Unmount the installer image&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil detach /Volumes/install_app&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;# Unmount the ElCapitan ISO Image&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil detach /Volumes/OS\ X\ Base\ System/&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;# Convert the ElCapitan ISO Image to ISO/CD master (Optional)&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil convert /tmp/ElCapitan.cdr.dmg -format UDTO -o /tmp/ElCapitan.iso&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;# Rename the ElCapitan ISO Image and move it to the desktop&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;mv /tmp/ElCapitan.iso.cdr ~/Desktop/ElCapitan.iso&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Now ensure that the &lt;b&gt;script file&lt;/b&gt; has execute permissions by running&lt;i&gt; chmod +x ElCapitan.sh&lt;/i&gt; and run with &lt;i&gt;sh ./ElCapitan.sh&lt;/i&gt;. This will take some time, so just be patient. Once done it should have created a file called &lt;b&gt;ElCapitan.iso &lt;/b&gt;on your desktop.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Create a virtual Mac OS X VM&lt;/h2&gt;
The next step should be fairly simple if you have used ESXi before. As usual open your &lt;b&gt;datastore &lt;/b&gt;and transfer the iso to wherever you normally store your installation files. Then create a new vm, select &lt;i&gt;Typical &lt;/i&gt;and you should be able to select &lt;i&gt;Other &lt;/i&gt;and then &lt;i&gt;Apple Mac OS X 10.10 (64-bit)&lt;/i&gt;. Complete the wizard, mount the ISO and &lt;b&gt;install Mac OS X&lt;/b&gt; as usual. Please &lt;b&gt;note &lt;/b&gt;that you must format the hard drive using the &lt;b&gt;disk utility&lt;/b&gt; before it will be visible in the install wizard.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Configure Mac OS X&lt;/h4&gt;
It’s very important to install the &lt;b&gt;VMware Tools&lt;/b&gt; as soon as possible after the install has finished. Without it Mac OS X might not awake from sleep and in general be very unreliable. I also recommend to turn off sleep and the screensaver in settings as these may cause issues.&lt;br /&gt;
&lt;br /&gt;
Finally, reboot and start enjoying your &lt;b&gt;virtual Mac&lt;/b&gt; on non-Apple hardware.</description><link>http://abhinavtheprince.blogspot.com/2015/10/install-mac-os-x-el-capitan-1010-on.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5FPMwJHjM2FiXD5q7rhRp46Pqzg0wjVRQFWPWxaR5Da76wNUSJmBMV6r5JARHompY-BMBp_hEeY3WJiYfjhRBgUq8XhR5qPpwn6rE-y4PkFQE9sXSK8upbAJcGmLeJ6pe4pX1PtexgoPY/s72-c/Os-X-El-Capitan-Requirements-800x420.jpg" width="72"/><georss:featurename>Hyderabad, Telangana, India</georss:featurename><georss:point>17.385044 78.486671</georss:point><georss:box>16.9002155 77.841224 17.8698725 79.132118</georss:box><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-8336904699398554707</guid><pubDate>Fri, 17 Apr 2015 07:56:00 +0000</pubDate><atom:updated>2015-10-13T22:00:27.047+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips n Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Signing Java .jar Files with CLI Command Jarsigner using Hardware Token in Windows</title><description>&lt;h2 style="font-family: UbuntuLight, Arial, sans-serif; font-weight: normal; margin: 0px 0px 20px;"&gt;
&lt;a href="https://www.digicert.com/images/code-signing/java-logo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;span style="background-color: white;"&gt;&lt;span style="color: black;"&gt;&lt;img alt="" border="0" src="https://www.digicert.com/images/code-signing/java-logo.png" style="font-family: UbuntuLight, Arial, sans-serif; margin-top: -15px;" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="background-color: white; font-size: large;"&gt;How to Configure Java JDK to Use the eToken&lt;/span&gt;&lt;/h2&gt;
&lt;ol style="font-family: UbuntuLight, Arial, sans-serif;"&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Download the JDK from Oracle.com.&lt;br /&gt;
&lt;b&gt;Note:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Even if you are using a 64-bit version of Windows, the 32-bit JDK is required.&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;div&gt;
&lt;span style="background-color: white;"&gt;Open a text editor (such as Notepad) and do the following:&lt;/span&gt;&lt;/div&gt;
&lt;ol&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Copy and paste the following 2 lines into the text (Notepad) document:&lt;br /&gt;
&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;name=eToken&lt;br /&gt;library=c:\WINDOWS\system32\eTPKCS11.dll&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;div&gt;
&lt;span style="background-color: white;"&gt;Save this file as&amp;nbsp;&lt;b&gt;eToken.cfg&lt;/b&gt;&amp;nbsp;in the appropriate directory for your version of the JDK, for example:&lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li style="list-style: disc; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;&lt;b&gt;JDK 1.8&lt;/b&gt;&lt;br /&gt;&lt;em&gt;C:\Program Files (x86)\Java\jdk1.8.0_20\bin&lt;/em&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;Note:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;If you are running a 32-bit version of Windows, the Java JDK is installed in&amp;nbsp;&lt;em&gt;C:\Program Files\Java\...&lt;/em&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Run WordPad (&lt;b&gt;Start &amp;gt; Accessories &amp;gt; WordPad&lt;/b&gt;), open the&amp;nbsp;&lt;b&gt;java.security&lt;/b&gt;&amp;nbsp;file from your Java Runtime Environment (JRE) installation (e.g.&amp;nbsp;&lt;em&gt;C:\Program Files\Java\jdk1.8_20\jre\lib\security&lt;/em&gt;), and then do the following:&lt;br /&gt;
&lt;/span&gt;&lt;ol&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Search the file (&lt;b&gt;Ctrl + F&lt;/b&gt;) for the following line:&lt;br /&gt;
&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;security.provider.10=sun.security.mscapi.SunMSCAPI&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;If the following line isn't already present in the file, add it right after the line above:&lt;br /&gt;
&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;security.provider.11=sun.security.pkcs11.SunPKCS11 ./etoken.cfg&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;Note:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b&gt;./etoken.cfg&lt;/b&gt;&amp;nbsp;is the path to the etoken.cfg file, and cannot contain a drive letter (i.e., it must be on the same drive as the JDK installation).&lt;/span&gt;&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;When WordPad asks if you want to save the file as a text-only document, select&amp;nbsp;&lt;b&gt;yes&lt;/b&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Open Windows explorer and go to the JDK installation folder (i.e.&amp;nbsp;&lt;em&gt;C:\Program Files\Java\jdk1.8_20\&lt;/em&gt;).&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Hold&amp;nbsp;&lt;b&gt;shift&lt;/b&gt;&amp;nbsp;down and&amp;nbsp;&lt;b&gt;right-click&lt;/b&gt;&amp;nbsp;on the bin folder and select&amp;nbsp;&lt;b&gt;Open command window here&lt;/b&gt;.&lt;br /&gt;
&lt;img alt="Open Command Prompt in Windows Explorer" height="150" src="https://www.digicert.com/images/code-signing/open-command-prompt.png" style="border: 2px solid;" width="400" /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Run the following command to find out in which token slot your certificate is stored:&lt;br /&gt;
&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;keytool -keystore NONE -storetype PKCS11 -list -J-Djava.security.debug=sunpkcs11&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;Note:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;This command displays a lot of information.&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Go to the top of the information display where the information starts, and search for a line similar to this:&lt;br /&gt;
&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;Slots with tokens:&lt;span class="boldred"&gt;#&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;
Where # is a number such as 0 or 2.&lt;br /&gt;
If the slot used is "&lt;b&gt;0&lt;/b&gt;", skip to&amp;nbsp;Step 9.&lt;br /&gt;
&lt;img alt="Keytool command output showing the certificate slot number on the hardware token." height="273" src="https://www.digicert.com/images/code-signing/adobe-air-pkcs11-keytool.png" style="border: 2px solid;" width="400" /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Remove the eToken device from the USB drive for a few seconds and then plug it back since it only allows you to run one keytool command at a time.&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;&lt;a href="https://www.blogger.com/null" name="step_9" style="text-decoration: underline;"&gt;&lt;/a&gt;Open the file etoken.cfg you created in&amp;nbsp;Step 2, and change the value after&amp;nbsp;&lt;span class="boldred" style="font-weight: bold;"&gt;slot=&lt;/span&gt;&amp;nbsp;to match the slot from the previous keytool command then save the file.&lt;br /&gt;
&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;name=eToken&lt;br /&gt;library=c:\WINDOWS\system32\eTPKCS11.dll&lt;br /&gt;slot=&lt;span class="boldred"&gt;0&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;Note:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span class="boldred" style="font-weight: bold;"&gt;0&lt;/span&gt;&amp;nbsp;is the default slot. If you have added additional certificates to the token or re-keyed/re-issued your certificate, you may have a different number than the default.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-family: UbuntuLight, Arial, sans-serif; line-height: 26px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: UbuntuLight, Arial, sans-serif; line-height: 26px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;h2&gt;
&lt;span style="background-color: white; font-family: UbuntuLight, Arial, sans-serif; line-height: 26px;"&gt;How To Sign .jar Files Using the CLI Command Jarsigner&lt;/span&gt;&lt;/h2&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;ol style="font-family: UbuntuLight, Arial, sans-serif;"&gt;
&lt;li style="line-height: 26px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;In Windows Explorer, navigate to the&amp;nbsp;&lt;b&gt;JDK&lt;/b&gt;&amp;nbsp;folder.&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 26px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;In the&amp;nbsp;&lt;b&gt;JDK&lt;/b&gt;&amp;nbsp;folder, push and hold&amp;nbsp;&lt;b&gt;Shift&lt;/b&gt;, right-click on the&amp;nbsp;&lt;b&gt;bin&lt;/b&gt;&amp;nbsp;folder, and select&amp;nbsp;&lt;b&gt;Open command window here&lt;/b&gt;.&lt;br /&gt;
&lt;img alt="Open Command Prompt in Windows Explorer" height="150" src="https://www.digicert.com/images/code-signing/open-command-prompt_Java-jar-files.png" width="400" /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 26px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;To view the Code Signing Certificate and the certificate alias on the token:&lt;br /&gt;
&lt;/span&gt;&lt;ol&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Plug in your token.&lt;/span&gt;&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Run the following command from the command prompt:&lt;br /&gt;
&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;span style="background-color: white;"&gt;keytool -list -keystore NONE -storetype PKCS11 -J-Djava.security.debug=sunpkcs11&lt;br /&gt;Enter keystore password: [enter password]&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Sample output:&lt;br /&gt;
&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;span style="background-color: white;"&gt;Keystore type: PKCS11&lt;br /&gt;Keystore provider: SunPKCS11-eToken&lt;br /&gt;Your keystore contains 1 entry&lt;br /&gt;&lt;b&gt;&lt;span style="font-family: Courier New, Courier, sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;le-a66a-2&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Courier New, Courier, sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;1c4-b862-3c4345271551&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;, PrivateKeyEntry,&lt;br /&gt;Certificate fingerprint (SHA2):&lt;br /&gt;XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;In this example,&amp;nbsp;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-family: Courier New, Courier, sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;le-a66a-2&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Courier New, Courier, sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;1c4-b862-3c4345271551&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;is the certificate &lt;b&gt;alias&lt;/b&gt; that you use to sign .jar files.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="line-height: 26px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;To use the code signing certificate on the token to sign file.jar, run the following command from the command prompt:&lt;br /&gt;
&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;span style="background-color: white;"&gt;jarsigner -verbose -keystore NONE -storetype PKCS11 -J-Djava.security.debug=sunpkcs11 "C:\path\to\file.jar" "&lt;b&gt;&lt;span style="font-family: Courier New, Courier, sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;le-a66a-2&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Courier New, Courier, sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;1c4-b862-3c4345271551&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;"&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="line-height: 26px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;If the command executed successfully, you should see something similar to the following output:&lt;br /&gt;
&lt;b&gt;Sample output:&lt;/b&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;span style="background-color: white;"&gt;Enter Passphrase for keystore:&lt;br /&gt;&amp;nbsp;adding: META-INF/7800FA4C.SF&lt;br /&gt;jar signed.&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;ul style="color: #333333; font-family: UbuntuLight, Arial, sans-serif;"&gt;
&lt;/ul&gt;
</description><link>http://abhinavtheprince.blogspot.com/2015/04/signing-java-jar-files-with-cli-command.html</link><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-4540951797608373025</guid><pubDate>Sun, 31 Aug 2014 18:30:00 +0000</pubDate><atom:updated>2014-09-01T00:00:32.241+05:30</atom:updated><title>What Data Science tells me?</title><description>• If you’re a DBA, you need to learn to deal with unstructured data &lt;br /&gt;
• If you’re a statistician, you need to learn to deal with data that does not fit in memory &lt;br /&gt;
• If you’re a software engineer, you need to learn statistical modeling and how to communicate results. &lt;br /&gt;
• If you’re a business analyst, you need to learn about algorithms and tradeoffs at scale.&lt;br /&gt;
&lt;br /&gt;
Just stare at the following figure, you'll understand.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZVqyU48GL-cBeyZErFMqLPq5g7NuOLimJGaztJb2KOeBSZfV4c4cuIzYbUS75HRIPgYITHeySDMobNyWkCobWexx8PSaIOctq-WzA3CaHjqZcXdJ7JjYDFWi5VFSZFubBAwDEt5Dl-b5C/s1600/001_context.pdf.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZVqyU48GL-cBeyZErFMqLPq5g7NuOLimJGaztJb2KOeBSZfV4c4cuIzYbUS75HRIPgYITHeySDMobNyWkCobWexx8PSaIOctq-WzA3CaHjqZcXdJ7JjYDFWi5VFSZFubBAwDEt5Dl-b5C/s400/001_context.pdf.jpg" height="341" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
</description><link>http://abhinavtheprince.blogspot.com/2014/09/what-data-science-tells-me.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZVqyU48GL-cBeyZErFMqLPq5g7NuOLimJGaztJb2KOeBSZfV4c4cuIzYbUS75HRIPgYITHeySDMobNyWkCobWexx8PSaIOctq-WzA3CaHjqZcXdJ7JjYDFWi5VFSZFubBAwDEt5Dl-b5C/s72-c/001_context.pdf.jpg" width="72"/><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-6110681899247013344</guid><pubDate>Tue, 16 Jul 2013 18:00:00 +0000</pubDate><atom:updated>2013-07-16T23:32:51.774+05:30</atom:updated><title>What happens when you hit a key to start a job on a remote EC2 machine</title><description>Have you ever thought about what happens when you hit a key to start a job on a remote&amp;nbsp;&lt;a href="http://en.wikipedia.org/wiki/Amazon_Elastic_Compute_Cloud" target="_blank"&gt;EC2&lt;/a&gt; machine.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Strike a key on the keyboard and the &lt;b&gt;capacitance&lt;/b&gt; changes instantaneously, sending a &lt;b&gt;signal&lt;/b&gt; down the USB cable&amp;nbsp;into the computer. The computer’s keyboard &lt;b&gt;driver&lt;/b&gt; traps the signal, recognizes the key it’s from, and sends&amp;nbsp;it to the &lt;b&gt;Operating System&lt;/b&gt; for handling. The OS determines which &lt;b&gt;application&lt;/b&gt; is active and decides whether&amp;nbsp;the keystroke needs to be routed over an&lt;b&gt; internet&lt;/b&gt; connection. If it is routed, a set of bytes is sent down the&amp;nbsp;CAT-5 cable into the wall socket, abstraction masked via the OSI 7-layer model, and sent to a router. The &lt;b&gt;router&lt;/b&gt;&amp;nbsp;determines the closest router which is likely to know the IP of your destination ( a lot of stuff behind this even like DNS resolution etc.), and sends that &lt;b&gt;packet &lt;/b&gt;onwards.&lt;/div&gt;
&lt;div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
Eventually the packet arrives at the destination computer, enters the via &lt;b&gt;ethernet&lt;/b&gt; cable, is trapped by the&amp;nbsp;remote OS, interpreted as an enter stroke, sent to the shell, sent to the current program, and executed. Data&amp;nbsp;from that remote machine is then sent back over the cable and the routers to your machine, which takes the&amp;nbsp;packet, uses it to update the display, and tells you what happened on that remote box.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
All of that happens&amp;nbsp;within an imperceptible fraction of a second. Just think...&lt;/div&gt;
</description><link>http://abhinavtheprince.blogspot.com/2013/07/what-happens-hit-key-remote-ec2-machine.html</link><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-2212490244676191862</guid><pubDate>Mon, 11 Mar 2013 19:08:00 +0000</pubDate><atom:updated>2013-03-12T00:38:51.864+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ECIL</category><category domain="http://www.blogger.com/atom/ns#">Friends' Posts</category><category domain="http://www.blogger.com/atom/ns#">Personal</category><title>The Art of Living - Alapati Sarath</title><description>&lt;b&gt;"Life is Beautiful"&lt;/b&gt; i was told, &lt;b&gt;"It could be as you want it to be"&lt;/b&gt; i heard, &lt;b&gt;"Take it as it comes"&lt;/b&gt; i thought being a cool person not thinking much about the problems that i may have face one day i was relaxed. But when a person has to face a problem Unexpectedly its &lt;a name='more'&gt;&lt;/a&gt;horrible. People have again told me relax don't worry everything will be fine. Actually it was worse and difficult to live with for few days, but then as time passes by it seemed not that difficult to face those situations though it was not better. Then i have finally given thought about the unexpected problems and how life can teach us lessons, Being relaxed not having exposure to what can happen and Doing nothing to make the situation better and thinking its always your way that works are all &lt;b&gt;"virtual"&lt;/b&gt;.This thinking makes you feel happy for some time in life but if you can think that If &lt;b&gt;&amp;nbsp;"Life could be Beautiful then Life could be Painful"&lt;/b&gt; as Well and make Your part of efforts that could help you to get Results then even the Stars will help you....&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: lime;"&gt;Posted By:&lt;/span&gt;&lt;/b&gt; &lt;a href="https://www.facebook.com/sarath555" rel="nofollow" target="_blank"&gt;Alapati Sarath&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
</description><link>http://abhinavtheprince.blogspot.com/2013/03/the-art-of-living-alapati-sarath.html</link><georss:featurename>Hyderabad, Andhra Pradesh, India</georss:featurename><georss:point>17.385044 78.486671</georss:point><georss:box>16.9002075 77.841224 17.8698805 79.132118</georss:box><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-1806734145296921996</guid><pubDate>Mon, 31 Dec 2012 06:14:00 +0000</pubDate><atom:updated>2012-12-31T11:44:01.472+05:30</atom:updated><title>Year 2013 is Loading... - 99.9% Complete</title><description>&lt;span style="background-color: black;"&gt;&lt;span style="color: white;"&gt;&lt;span style="font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 13px; line-height: 17px;"&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style="font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 13px; line-height: 17px;"&gt;███████│███████████████▒│▒▒▒▒▒&lt;/span&gt;&lt;wbr style="font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 13px; line-height: 17px;"&gt;&lt;/wbr&gt;&lt;span class="word_break" style="display: inline-block; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 13px; line-height: 17px;"&gt;&lt;/span&gt;&lt;span style="font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 13px; line-height: 17px;"&gt;▒▒▒▒▒▒▒▒▒▒▒&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: lucida grande, tahoma, verdana, arial, sans-serif; font-size: x-small;"&gt;&lt;span style="line-height: 17px;"&gt;----2011--------------------------2012-------------------------------2013-----------------&lt;/span&gt;&lt;/span&gt;</description><link>http://abhinavtheprince.blogspot.com/2012/12/year-2013-is-loading-999-complete.html</link><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-8000972064171572308</guid><pubDate>Tue, 04 Dec 2012 14:46:00 +0000</pubDate><atom:updated>2012-12-19T13:48:47.571+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ECIL</category><category domain="http://www.blogger.com/atom/ns#">Friends' Posts</category><category domain="http://www.blogger.com/atom/ns#">Help Forum</category><category domain="http://www.blogger.com/atom/ns#">Interview</category><category domain="http://www.blogger.com/atom/ns#">Personal</category><category domain="http://www.blogger.com/atom/ns#">PSU</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>ECIL GET Interview Experience 2012 - Raj Srivastava</title><description>May I come in Sir?&lt;br /&gt;
&lt;b&gt;Yes, Come in.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Good Morning all. May I sit down?&lt;br /&gt;
&lt;b&gt;Sure, Please be seated.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;So Mr. Raj, Tell me about yourself?&lt;/b&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
I am Raj Srivastava. I belong to Ballia, Uttar Pradesh. Recently I completed my B.Tech course from MMM Eng. College and now I am woking in TCS since18th June at Trivandrum.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Why do you want to join ECIL then?&lt;/b&gt;&lt;br /&gt;
I told them about my dream to be in a PSU. I also told about my BARC interview and it is my last chance to get into a PSU this year as TCS doesn't allow leaves for me to write the exams of BEL and EIL. I bunked today in TCS and arrived here just today morning by flight.&lt;br /&gt;
&lt;i&gt;(10000% lie….Actually according to my opinion, interview should be given according to interviewers what they want to listen...)&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What is your stream there?&lt;/b&gt;&lt;br /&gt;
I started with PAT test due to which my stream was assigned. They were really impressed with that. I told them in advance about the project at which I was working and the module assigned to me. Actually SRS presentation held in TCS few days ago, so everything was on my mind.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What are your favorite subjects?&lt;/b&gt;&lt;br /&gt;
Software Engineering, Data Structure, DBMS.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: lime; font-size: large;"&gt;Technical Questions -&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What are the phases of SDLC?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;What is maintenance?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;How many types of maintenance are there?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;What is adoptive maintenance?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;What is verification and validation?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Write the recursive function to calculate the factorial of a given number?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;What is the output – enum { a=10 , b=15 , c ,d , e , f}; printf(“%d%d%d%d”,a,b,e,f);&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Although I didn't told them that OS is my favorite subject, yet they asked following few questions from OS. I didn't refuse to answer these questions. I was smiling while answering. I think they impressed with that. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What is multiprocessing and multithreading?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;What are the differences between a process and a thread?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;What is Kernel?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;What is the difference b/w Kernel and OS?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;How many types of Kernel are there?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;What is context switching? How it happens? Who performs it?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
And you know one thing, the lady who ask these questions to me is the wife of C&amp;amp;MD of ECIL and she is also a Scientific Officer-H in BARC. I think it's better that at that time i didn't know these things else i might became nervous.&lt;br /&gt;
&lt;br /&gt;
And finally,&lt;br /&gt;
&lt;b&gt;Explain your final year project.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Here my interview ended. My Bizskill lead in TCS suggested me to ask at least one question in any interview you face. Actually I never did that in past. I never asked any question to teachers in the class. I hardly spoke during classes. But today I motivated myself and asked the following questions -&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What are the qualities you people usually looks for in a candidate?&lt;/b&gt;&lt;br /&gt;
Sound knowledge of his subjects, no attitude.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;When is the result expected to be declared?&lt;/b&gt;&lt;br /&gt;
Within 15 days.&lt;br /&gt;
Thank you sirs and mams, Have a nice day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: lime;"&gt;Posted By:&lt;/span&gt; Raj Srivastava - GET 2013 Batch</description><link>http://abhinavtheprince.blogspot.com/2012/12/ecil-get-interview-experience-2012.html</link><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-4222469084559890004</guid><pubDate>Sat, 10 Mar 2012 14:04:00 +0000</pubDate><atom:updated>2012-03-10T20:03:24.717+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Personal</category><title>Apology Letter to my Boss...</title><description>&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiskjQOe9zHAPAqtR0grmLhyEXhiPna78I4d20NKV8AsMxA-1yUJtzB17XwgTARTO4zyZsRXBNZD0SOr7axJ1pBU5QB116tHpyYCG0mddG1kAlfVKk-95QkxiszVVOc67NAmzTB9vl89bUJ/s1600/QRCode(Personalised+MeCard).png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="80" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiskjQOe9zHAPAqtR0grmLhyEXhiPna78I4d20NKV8AsMxA-1yUJtzB17XwgTARTO4zyZsRXBNZD0SOr7axJ1pBU5QB116tHpyYCG0mddG1kAlfVKk-95QkxiszVVOc67NAmzTB9vl89bUJ/s200/QRCode(Personalised+MeCard).png" width="80" /&gt;&lt;/a&gt;Dear &lt;span class="Apple-style-span" style="color: yellow;"&gt;Debugger&lt;/span&gt; boss,&lt;br /&gt;
&lt;br /&gt;
System.&lt;span class="Apple-style-span" style="color: yellow;"&gt;getDate()&lt;/span&gt;;&lt;br /&gt;
&lt;b&gt;Subject: &lt;/b&gt;&lt;span class="Apple-style-span" style="color: yellow;"&gt;#include"Apology.h"&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
I admit that what I did during &lt;span class="Apple-style-span" style="color: yellow;"&gt;Handshake&lt;/span&gt; has hurt your &lt;span class="Apple-style-span" style="color: yellow;"&gt;SaaS&lt;/span&gt; a lot emotionally. And I'm sorry for the &lt;span class="Apple-style-span" style="color: yellow;"&gt;SOAP&lt;/span&gt; I used after &lt;span class="Apple-style-span" style="color: yellow;"&gt;Event Handling&lt;/span&gt;. I also admit that &lt;span class="Apple-style-span" style="color: yellow;"&gt;Waterfall Model&lt;/span&gt; is meaningless &amp;amp; pledge not to &lt;span class="Apple-style-span" style="color: yellow;"&gt;Hibernate&lt;/span&gt; again. I promise by the means of this &lt;span class="Apple-style-span" style="color: yellow;"&gt;Protocol&lt;/span&gt; that I will not &lt;span class="Apple-style-span" style="color: yellow;"&gt;Serialize&lt;/span&gt; my &lt;span class="Apple-style-span" style="color: yellow;"&gt;RSS&lt;/span&gt; Feeds until my &lt;span class="Apple-style-span" style="color: yellow;"&gt;JVM&lt;/span&gt; crashes.&lt;br /&gt;
&lt;br /&gt;
Although I know I shouldn't ask for &lt;span class="Apple-style-span" style="color: yellow;"&gt;SAX&lt;/span&gt; from you due to the &lt;span class="Apple-style-span" style="color: yellow;"&gt;Runtime&lt;/span&gt; complexities of the &lt;span class="Apple-style-span" style="color: yellow;"&gt;Garbage Collection&lt;/span&gt;, but I know how big your &lt;span class="Apple-style-span" style="color: yellow;"&gt;Error Handling&lt;/span&gt; really is. Please &lt;span class="Apple-style-span" style="color: yellow;"&gt;Clear Cache&lt;/span&gt; and make an &lt;span class="Apple-style-span" style="color: yellow;"&gt;Exception&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
Your &lt;span class="Apple-style-span" style="color: yellow;"&gt;Apache&lt;/span&gt; Indian,&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: yellow;"&gt;Abhinav&lt;/span&gt; the Prince.</description><link>http://abhinavtheprince.blogspot.com/2012/03/apology-letter-software-programmer.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiskjQOe9zHAPAqtR0grmLhyEXhiPna78I4d20NKV8AsMxA-1yUJtzB17XwgTARTO4zyZsRXBNZD0SOr7axJ1pBU5QB116tHpyYCG0mddG1kAlfVKk-95QkxiszVVOc67NAmzTB9vl89bUJ/s72-c/QRCode(Personalised+MeCard).png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-2444729429726318413</guid><pubDate>Tue, 14 Feb 2012 09:35:00 +0000</pubDate><atom:updated>2012-02-14T15:53:00.462+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Help Forum</category><category domain="http://www.blogger.com/atom/ns#">Tech News</category><title>Dependent Factors - Calculation of GATE Marks, Score, Rank &amp; Percentile</title><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy-eEAc6KzCXI9wGLyYHsD9YzM067Gb-pkLV5TdcKUMJg71-OPbzpVMEIfPOltppxGnK30hBfPpgIDxVmw5xQEveYOEukCczSbfkMMZhUe62RPJN8Phk9SfqLLG1m09zDea1_6s04DiEdQ/s1600/Gate.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy-eEAc6KzCXI9wGLyYHsD9YzM067Gb-pkLV5TdcKUMJg71-OPbzpVMEIfPOltppxGnK30hBfPpgIDxVmw5xQEveYOEukCczSbfkMMZhUe62RPJN8Phk9SfqLLG1m09zDea1_6s04DiEdQ/s1600/Gate.jpg" /&gt;&lt;/a&gt;The following article showers light on the various dependent factors on which the calculations of &lt;b&gt;&lt;a href="http://en.wikipedia.org/wiki/Graduate_Aptitude_Test_in_Engineering" target="_blank"&gt;GATE&lt;/a&gt; Marks, Score, Rank &amp;amp; Percentile&lt;/b&gt; are based. I have collected this data from various reliable sources and have compiled it in an easy-to-understand way so that you can have a clear idea about the intricacies behind these terms that decide your fate in GATE.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: lime; font-size: large;"&gt;GATE Marks&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: cyan;"&gt;Depends on :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
Number of Correct answers, Number of Wrong answers&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: cyan;"&gt;Working Formula :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
+1 or +2 for each correct answer &amp;amp;&lt;br /&gt;
-1/3 or -2/3 for each wrong answer; depnding on the question type.&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: lime; font-size: large;"&gt;GATE Score&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: cyan;"&gt;Depends on :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
GATE Marks(m), Average marks in your paper(a), Standard deviation of marks in your paper(s), Average (global) marks in all papers since 2007(ag), Standard deviation of (global) marks in all papers since 2007(s)&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: cyan;"&gt;Working Formula :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
Score = 10[ag+sg{(m-a)/s}]&lt;br /&gt;
&lt;br /&gt;
So note, GATE Score depends on not just your performance but also on 'performance of candidates of your same paper this year' plus 'performance of candidates of all papers since 2007'.&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: lime; font-size: large;"&gt;GATE Rank&lt;/span&gt;&lt;br /&gt;
The dependent factors regarding calculation of GATE Rank are not disclosed by the GATE organisers. Also it revolves in the air that the working formula is changed every year. No matter what but the probable factors would be like :&lt;br /&gt;
Your GATE Score, GATE Cut-off of your Paper, Sectional Cut-off parameters, if any (Not sure. It may be a rumour.), Number of attempted questions, Section-wise marks etc.&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: lime; font-size: large;"&gt;GATE Percentile&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: cyan;"&gt;Depends on :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
GATE Rank(r), Number of Candidates in your paper(n)&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: cyan;"&gt;Working Formula :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
Percentile = [(n-r)/n]*100&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: magenta;"&gt;Note:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
Two candidates of same paper can have same Marks, same Score &amp;amp; same Percentile even, but not all 3 same together. Whereas, two candidates of same paper can not have same Rank.&lt;br /&gt;
So, GATE Rank is the only stream-wise criterion which determines an absolute differentiation of candidates.&lt;br /&gt;
&lt;br /&gt;
If you have any questions, feel free to ask...</description><link>http://abhinavtheprince.blogspot.com/2012/02/dependent-factors-calculation-gate.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy-eEAc6KzCXI9wGLyYHsD9YzM067Gb-pkLV5TdcKUMJg71-OPbzpVMEIfPOltppxGnK30hBfPpgIDxVmw5xQEveYOEukCczSbfkMMZhUe62RPJN8Phk9SfqLLG1m09zDea1_6s04DiEdQ/s72-c/Gate.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-6079871626206490422</guid><pubDate>Sat, 21 Jan 2012 15:58:00 +0000</pubDate><atom:updated>2012-01-21T22:01:09.442+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips n Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>3 Ways to URL Redirection from HTML page</title><description>Sometimes, it's &amp;nbsp;useful &amp;amp; inevitable to redirect the End-user from a web page to a completely&amp;nbsp;different URL automatically. So in this tutorial I'll be presenting the 3 most efficient ways to&amp;nbsp;URL Redirection from a HTML webpage.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. Using 'meta' refresh tag&lt;/b&gt;&lt;br /&gt;
&lt;textarea cols="55" readonly="readonly" rows="3"&gt;&amp;lt;head&amp;gt;
&amp;lt;meta http-equiv="refresh" content="0;url=new.html"&amp;gt;
&amp;lt;/head&amp;gt;&lt;/textarea&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;2. Using 'Javascript' replace() method&lt;/b&gt;&lt;br /&gt;
&lt;textarea cols="55" readonly="readonly" rows="5"&gt;&amp;lt;head&amp;gt;
&amp;lt;script type="text/javascript"&amp;gt;
location.replace("new.html");
&amp;lt;/script&amp;gt;
&amp;lt;/head&amp;gt;&lt;/textarea&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;3. Using 'Form' submission&lt;/b&gt;&lt;br /&gt;
&lt;textarea cols="55" readonly="readonly" rows="8"&gt;&amp;lt;head&amp;gt;
&amp;lt;script type="text/javascript"&amp;gt;
document.frm.submit();
&amp;lt;/script&amp;gt;
&amp;lt;/head&amp;gt;
&amp;lt;body&amp;gt;
&amp;lt;form name="frm" action="new.html" method="get"&amp;gt;&amp;lt;/form&amp;gt;
&amp;lt;/body&amp;gt;&lt;/textarea&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
So, what are you waiting for ?&lt;br /&gt;
Go start using the above code snippets...&lt;br /&gt;
&lt;br /&gt;</description><link>http://abhinavtheprince.blogspot.com/2012/01/3-ways-url-redirection-html-page.html</link><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-8296043798410862631</guid><pubDate>Mon, 16 Jan 2012 16:42:00 +0000</pubDate><atom:updated>2012-03-14T13:35:38.740+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>SetUp Eclipse CDT using MinGW for Windows</title><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-L6PaQjIH38mi-D7EHWYo3_ftr3ycvAQEdNzKL_SgAxL0DOIfulzVpnBnLSqXiuJikwDB3pMrcKUKOk3ZoD3_NHBphdkeWwTPU8kajODSUln9Nj6NaSZVvrCPha0cCINJbVEfIX0mAGit/s1600/root_banner_logo.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-L6PaQjIH38mi-D7EHWYo3_ftr3ycvAQEdNzKL_SgAxL0DOIfulzVpnBnLSqXiuJikwDB3pMrcKUKOk3ZoD3_NHBphdkeWwTPU8kajODSUln9Nj6NaSZVvrCPha0cCINJbVEfIX0mAGit/s1600/root_banner_logo.jpg" /&gt;&lt;/a&gt;The standard &lt;b&gt;Eclipse CDT IDE&lt;/b&gt; (for C/C++) needs integration with the GNU toolchain, before you can start making your C/C++ projects in Eclipse (the world's best Open-source IDE, Integrated Development Environment). This includes GNU's &lt;b&gt;make&lt;/b&gt;, &lt;b&gt;gcc compiler&lt;/b&gt;, and &lt;b&gt;gdb debugger&lt;/b&gt; utilities. For windows, &lt;b&gt;&lt;a href="http://www.mingw.org/" target="_blank"&gt;MinGW&lt;/a&gt;&lt;/b&gt;&amp;nbsp;and &lt;b&gt;&lt;a href="http://www.cygwin.com/" target="_blank"&gt;Cygwin&lt;/a&gt;&lt;/b&gt;&amp;nbsp;are the two main platform choices for acquiring the toolchain. It is important to note the difference between them. Cygwin produces executables that use the Cygwin POSIX runtime. MinGW produces native Windows executables that do not require a separate runtime.&lt;br /&gt;
&lt;br /&gt;
In this tutorial I'll show you how to setup Eclipse CDT using MinGW toolchain in a Windows Platform.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
1. Install &lt;b&gt;MingGW Offline Installer&lt;/b&gt; (&lt;a href="http://mingw-offline-install.googlecode.com/files/mingw-6.3.exe" target="_blank"&gt;mingw-6.3.exe&lt;/a&gt;&amp;nbsp;, 7-zip Self-extracting Archive) in the &lt;b&gt;C:\&lt;/b&gt; drive.&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span class="Apple-style-span" style="color: lime;"&gt;-&lt;/span&gt; The Installation Folder Structure would be like...&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\MinGW"&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; *bin\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*include\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*lib\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*libexec\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*README_STL&lt;br /&gt;
&lt;br /&gt;
2. Install Minimal SYStem &lt;b&gt;MSYS Base&lt;/b&gt; (&lt;a href="http://downloads.sourceforge.net/mingw/MSYS-1.0.11.exe" target="_blank"&gt;MSYS 1.0.11&lt;/a&gt;) in the default folder &lt;b&gt;C:\msys\1.0&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span class="Apple-style-span" style="color: lime;"&gt;-&lt;/span&gt; The Installation Folder Structure would be like...&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\msys\1.0"&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*bin\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*doc\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*etc\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*home\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*mingw\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*postinstall\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*share\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*uninstall\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*m.ico&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.bat&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.ico&lt;br /&gt;
&lt;br /&gt;
3. Extract &lt;b&gt;Eclipse CDT Helios SR2&lt;/b&gt;(&lt;a href="http://www.eclipse.org/downloads/download.php?file=/technology/epp/downloads/release/helios/SR2/eclipse-cpp-helios-SR2-win32.zip" target="_blank"&gt;eclipse-cpp-helios-SR2-win32.zip&lt;/a&gt;) in the&lt;b&gt; 'Program Files' &lt;/b&gt;folder.&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span class="Apple-style-span" style="color: lime;"&gt;-&lt;/span&gt; The Installation Folder Structure would be like...&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\Program Files\eclipse"&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*configuration\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*dropins\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*features\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*p2\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*plugins\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*readme\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*.eclipseproduct&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*artifacts.xml&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.exe&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.ini&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipsec.exe&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*epl-v10.html&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*notice.html&lt;br /&gt;
&lt;br /&gt;
4. Start Eclipse &amp;amp; enjoy creating &lt;b&gt;C/C++ Projects&lt;/b&gt; in Eclipse.&lt;br /&gt;
Go Start Programming...&lt;br /&gt;
&lt;br /&gt;</description><link>http://abhinavtheprince.blogspot.com/2012/01/setup-eclipse-cdt-using-mingw-for.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-L6PaQjIH38mi-D7EHWYo3_ftr3ycvAQEdNzKL_SgAxL0DOIfulzVpnBnLSqXiuJikwDB3pMrcKUKOk3ZoD3_NHBphdkeWwTPU8kajODSUln9Nj6NaSZVvrCPha0cCINJbVEfIX0mAGit/s72-c/root_banner_logo.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author><enclosure length="3283940" type="application/octet-stream" url="http://downloads.sourceforge.net/mingw/MSYS-1.0.11.exe"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>The standard Eclipse CDT IDE (for C/C++) needs integration with the GNU toolchain, before you can start making your C/C++ projects in Eclipse (the world's best Open-source IDE, Integrated Development Environment). This includes GNU's make, gcc compiler, and gdb debugger utilities. For windows, MinGW&amp;nbsp;and Cygwin&amp;nbsp;are the two main platform choices for acquiring the toolchain. It is important to note the difference between them. Cygwin produces executables that use the Cygwin POSIX runtime. MinGW produces native Windows executables that do not require a separate runtime. In this tutorial I'll show you how to setup Eclipse CDT using MinGW toolchain in a Windows Platform. 1. Install MingGW Offline Installer (mingw-6.3.exe&amp;nbsp;, 7-zip Self-extracting Archive) in the C:\ drive. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\MinGW" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; *bin\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*include\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*lib\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*libexec\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*README_STL 2. Install Minimal SYStem MSYS Base (MSYS 1.0.11) in the default folder C:\msys\1.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\msys\1.0" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*bin\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*doc\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*etc\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*home\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*mingw\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*postinstall\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*share\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*uninstall\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*m.ico &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.bat &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.ico 3. Extract Eclipse CDT Helios SR2(eclipse-cpp-helios-SR2-win32.zip) in the 'Program Files' folder. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\Program Files\eclipse" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*configuration\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*dropins\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*features\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*p2\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*plugins\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*readme\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*.eclipseproduct &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*artifacts.xml &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.exe &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.ini &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipsec.exe &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*epl-v10.html &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*notice.html 4. Start Eclipse &amp;amp; enjoy creating C/C++ Projects in Eclipse. Go Start Programming...</itunes:subtitle><itunes:author>Abhinav Biswas</itunes:author><itunes:summary>The standard Eclipse CDT IDE (for C/C++) needs integration with the GNU toolchain, before you can start making your C/C++ projects in Eclipse (the world's best Open-source IDE, Integrated Development Environment). This includes GNU's make, gcc compiler, and gdb debugger utilities. For windows, MinGW&amp;nbsp;and Cygwin&amp;nbsp;are the two main platform choices for acquiring the toolchain. It is important to note the difference between them. Cygwin produces executables that use the Cygwin POSIX runtime. MinGW produces native Windows executables that do not require a separate runtime. In this tutorial I'll show you how to setup Eclipse CDT using MinGW toolchain in a Windows Platform. 1. Install MingGW Offline Installer (mingw-6.3.exe&amp;nbsp;, 7-zip Self-extracting Archive) in the C:\ drive. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\MinGW" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; *bin\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*include\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*lib\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*libexec\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*README_STL 2. Install Minimal SYStem MSYS Base (MSYS 1.0.11) in the default folder C:\msys\1.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\msys\1.0" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*bin\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*doc\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*etc\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*home\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*mingw\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*postinstall\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*share\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*uninstall\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*m.ico &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.bat &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.ico 3. Extract Eclipse CDT Helios SR2(eclipse-cpp-helios-SR2-win32.zip) in the 'Program Files' folder. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\Program Files\eclipse" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*configuration\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*dropins\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*features\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*p2\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*plugins\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*readme\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*.eclipseproduct &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*artifacts.xml &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.exe &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.ini &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipsec.exe &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*epl-v10.html &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*notice.html 4. Start Eclipse &amp;amp; enjoy creating C/C++ Projects in Eclipse. Go Start Programming...</itunes:summary><itunes:keywords>Tutorials</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-7305422967263917506</guid><pubDate>Thu, 12 Jan 2012 13:44:00 +0000</pubDate><atom:updated>2012-01-12T21:17:11.908+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips n Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Android Offline Installation Procedure (Windows)</title><description>&lt;br /&gt;
&lt;div style="text-align: right;"&gt;
&lt;/div&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlADLL7WlMXvIsLSXnmv0MHUpEWUa1pCCw4rALFSFRFDPU9kn18OWlnPO-Srdzy_o7b1rImYugNfFondGyM-72XywAs_dSUxZddkOCVyie3MgB3CLDD1BLhTLhPWQQNbEvBlSjs8J9bw7j/s1600/andoird-logo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="100" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlADLL7WlMXvIsLSXnmv0MHUpEWUa1pCCw4rALFSFRFDPU9kn18OWlnPO-Srdzy_o7b1rImYugNfFondGyM-72XywAs_dSUxZddkOCVyie3MgB3CLDD1BLhTLhPWQQNbEvBlSjs8J9bw7j/s200/andoird-logo.png" width="100" /&gt;&lt;/a&gt;In this tutorial, I'll show the 'Android Offline Installation Procedure' for computers on a Windows Platform which do not have a direct Internet Connection.&lt;br /&gt;
&lt;br /&gt;
1. Install &lt;b&gt;Android SDK Manager,&lt;/b&gt; &lt;a href="http://dl.google.com/android/installer_r16-windows.exe" target="_blank"&gt;Revision 16&lt;/a&gt;.&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&amp;nbsp;       &lt;/span&gt;- The Android SDK Tools Package is the only package that gets installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Close the Android SDK Manager &amp;amp; Go to the &lt;b&gt;SDK Installation folder&lt;/b&gt; "C:\Program Files\Android\android-sdk".&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. In the sub-folder &lt;b&gt;'platforms'&lt;/b&gt; extract the contents of the &lt;b&gt;Android Platform&lt;/b&gt; (&lt;a href="http://dl-ssl.google.com/android/repository/android-2.2_r02-windows.zip" target="_blank"&gt;Android Platform 2.2, API 8, Revision 2&lt;/a&gt;). You may need Windows Administrative Privileges.&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&amp;nbsp;       &lt;/span&gt;- The &lt;b&gt;SDK Installation Folder&lt;/b&gt; Structure would be like...&lt;br /&gt;
&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;                &lt;/span&gt;"C:\Program Files\Android\android-sdk\platforms\android-2.2_r02-windows\"&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*ant\&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*data\&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;  &amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="white-space: pre;"&gt;               &lt;/span&gt;*images\&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*skins\&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*templates\&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*tools\&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*android.jar&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*build.prop&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*framework.aidl&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*sdk.properties&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*source.properties&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;        &lt;/span&gt;- Now Start the &lt;b&gt;Android SDK Manager&lt;/b&gt;, you'll see that one more package (the &lt;b&gt;Android 2.2 SDK Platform&lt;/b&gt; package) has got installed. Close the Android SDK Manager.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4. In the &lt;b&gt;SDK Installation folder&lt;/b&gt; "C:\Program Files\Android\android-sdk" extract the contents of the &lt;b&gt;Android Platform Tools&lt;/b&gt; (&lt;a href="http://dl-ssl.google.com/android/repository/platform-tools_r09-windows.zip" target="_blank"&gt;Android Platform Tools, Revision 9&lt;/a&gt;).&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&amp;nbsp;       &lt;/span&gt;- The &lt;b&gt;SDK Installation Folder&lt;/b&gt; Structure would be like...&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                &lt;/span&gt;"C:\Program Files\Android\android-sdk\platform-tools\"&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*lib\&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*renderscript\&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*aapt.exe&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*adb.exe&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*AdbWinApi.dll&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*AdbWinUsbApi.dll&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*aidl.exe&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*dexdump.exe&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*dx.bat&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*llvm-rs-cc.exe&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*NOTICE.txt&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;                  &lt;/span&gt;*source.properties&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&amp;nbsp;       &lt;/span&gt;- Now Start the &lt;b&gt;Android SDK Manager&lt;/b&gt;, you'll see that one more package (the &lt;b&gt;Android SDK Platform-tools&lt;/b&gt; package) has got installed. Close the Android SDK Manager.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Start &lt;b&gt;Eclipse IDE&lt;/b&gt; &amp;amp; Install the &lt;b&gt;Android ADT Plug-in&lt;/b&gt;, &lt;a href="http://dl.google.com/android/ADT-16.0.1.zip" target="_blank"&gt;ADT 16.0.1&lt;/a&gt;.&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&amp;nbsp;       &lt;/span&gt;- Goto Windows -&amp;gt; Preferences -&amp;gt; Android.&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&amp;nbsp;       &lt;/span&gt;- Browse for &lt;b&gt;Android SDK Location&lt;/b&gt; "C:\Program Files\Android\android-sdk".&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&amp;nbsp;       &lt;/span&gt;- Click 'Apply' &amp;amp; save the changes.&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&amp;nbsp;       &lt;/span&gt;- Goto Windows -&amp;gt; AVD Manager.&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&amp;nbsp;       &lt;/span&gt;- Create a 'New' AVD, &lt;b&gt;Android Virtual Device&lt;/b&gt;.&lt;br /&gt;
&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&amp;nbsp;       &lt;/span&gt;- Close the AVD Manager.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6. Start Programming. &lt;b&gt;Enjoy...&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;</description><link>http://abhinavtheprince.blogspot.com/2012/01/android-offline-installation-procedure.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlADLL7WlMXvIsLSXnmv0MHUpEWUa1pCCw4rALFSFRFDPU9kn18OWlnPO-Srdzy_o7b1rImYugNfFondGyM-72XywAs_dSUxZddkOCVyie3MgB3CLDD1BLhTLhPWQQNbEvBlSjs8J9bw7j/s72-c/andoird-logo.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author><enclosure length="29561554" type="application/x-msdos-program" url="http://dl.google.com/android/installer_r16-windows.exe"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>In this tutorial, I'll show the 'Android Offline Installation Procedure' for computers on a Windows Platform which do not have a direct Internet Connection. 1. Install Android SDK Manager, Revision 16. &amp;nbsp; - The Android SDK Tools Package is the only package that gets installed. 2. Close the Android SDK Manager &amp;amp; Go to the SDK Installation folder "C:\Program Files\Android\android-sdk". 3. In the sub-folder 'platforms' extract the contents of the Android Platform (Android Platform 2.2, API 8, Revision 2). You may need Windows Administrative Privileges. &amp;nbsp; - The SDK Installation Folder Structure would be like... "C:\Program Files\Android\android-sdk\platforms\android-2.2_r02-windows\" *ant\ *data\ &amp;nbsp; *images\ *skins\ *templates\ *tools\ *android.jar *build.prop *framework.aidl *sdk.properties *source.properties - Now Start the Android SDK Manager, you'll see that one more package (the Android 2.2 SDK Platform package) has got installed. Close the Android SDK Manager. 4. In the SDK Installation folder "C:\Program Files\Android\android-sdk" extract the contents of the Android Platform Tools (Android Platform Tools, Revision 9). &amp;nbsp; - The SDK Installation Folder Structure would be like... "C:\Program Files\Android\android-sdk\platform-tools\" *lib\ *renderscript\ *aapt.exe *adb.exe *AdbWinApi.dll *AdbWinUsbApi.dll *aidl.exe *dexdump.exe *dx.bat *llvm-rs-cc.exe *NOTICE.txt *source.properties &amp;nbsp; - Now Start the Android SDK Manager, you'll see that one more package (the Android SDK Platform-tools package) has got installed. Close the Android SDK Manager. 5. Start Eclipse IDE &amp;amp; Install the Android ADT Plug-in, ADT 16.0.1. &amp;nbsp; - Goto Windows -&amp;gt; Preferences -&amp;gt; Android. &amp;nbsp; - Browse for Android SDK Location "C:\Program Files\Android\android-sdk". &amp;nbsp; - Click 'Apply' &amp;amp; save the changes. &amp;nbsp; - Goto Windows -&amp;gt; AVD Manager. &amp;nbsp; - Create a 'New' AVD, Android Virtual Device. &amp;nbsp; - Close the AVD Manager. 6. Start Programming. Enjoy...</itunes:subtitle><itunes:author>Abhinav Biswas</itunes:author><itunes:summary>In this tutorial, I'll show the 'Android Offline Installation Procedure' for computers on a Windows Platform which do not have a direct Internet Connection. 1. Install Android SDK Manager, Revision 16. &amp;nbsp; - The Android SDK Tools Package is the only package that gets installed. 2. Close the Android SDK Manager &amp;amp; Go to the SDK Installation folder "C:\Program Files\Android\android-sdk". 3. In the sub-folder 'platforms' extract the contents of the Android Platform (Android Platform 2.2, API 8, Revision 2). You may need Windows Administrative Privileges. &amp;nbsp; - The SDK Installation Folder Structure would be like... "C:\Program Files\Android\android-sdk\platforms\android-2.2_r02-windows\" *ant\ *data\ &amp;nbsp; *images\ *skins\ *templates\ *tools\ *android.jar *build.prop *framework.aidl *sdk.properties *source.properties - Now Start the Android SDK Manager, you'll see that one more package (the Android 2.2 SDK Platform package) has got installed. Close the Android SDK Manager. 4. In the SDK Installation folder "C:\Program Files\Android\android-sdk" extract the contents of the Android Platform Tools (Android Platform Tools, Revision 9). &amp;nbsp; - The SDK Installation Folder Structure would be like... "C:\Program Files\Android\android-sdk\platform-tools\" *lib\ *renderscript\ *aapt.exe *adb.exe *AdbWinApi.dll *AdbWinUsbApi.dll *aidl.exe *dexdump.exe *dx.bat *llvm-rs-cc.exe *NOTICE.txt *source.properties &amp;nbsp; - Now Start the Android SDK Manager, you'll see that one more package (the Android SDK Platform-tools package) has got installed. Close the Android SDK Manager. 5. Start Eclipse IDE &amp;amp; Install the Android ADT Plug-in, ADT 16.0.1. &amp;nbsp; - Goto Windows -&amp;gt; Preferences -&amp;gt; Android. &amp;nbsp; - Browse for Android SDK Location "C:\Program Files\Android\android-sdk". &amp;nbsp; - Click 'Apply' &amp;amp; save the changes. &amp;nbsp; - Goto Windows -&amp;gt; AVD Manager. &amp;nbsp; - Create a 'New' AVD, Android Virtual Device. &amp;nbsp; - Close the AVD Manager. 6. Start Programming. Enjoy...</itunes:summary><itunes:keywords>Tips n Tricks, Tutorials</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-6871218974850619439</guid><pubDate>Sun, 10 Jul 2011 06:00:00 +0000</pubDate><atom:updated>2011-07-10T11:49:00.325+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Help Forum</category><category domain="http://www.blogger.com/atom/ns#">Tech News</category><category domain="http://www.blogger.com/atom/ns#">Tips n Tricks</category><title>Get Google+ Invitation now....</title><description>Is it that you just can not resist the urge to use the brand new Social Networking gaint Google+ by Google? 
So here comes the end of your awaitment. Get Started with the Amazing experience of Circles, Hangouts and Sparks of Google+.
Just provide your Google email-id in our wall and get the invitation in
seconds.</description><link>http://abhinavtheprince.blogspot.com/2011/07/get-google-invitation-now.html</link><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-4027370798155600855</guid><pubDate>Mon, 17 Jan 2011 04:16:00 +0000</pubDate><atom:updated>2011-01-17T12:28:14.819+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Help Forum</category><category domain="http://www.blogger.com/atom/ns#">Tech News</category><title>Facebook scam chain: Deleting inactive members</title><description>&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="http://www.blogger.com/goog_36565216" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXzJJ7Ll2DB7ene4IFO_uAu-xTX2ngAsxr_5bWS2kJIfXh2bpHpBE81-sUrpTQi7OeP2cwCg8Ei_4E4QiMuOxaILup2E8kb9dnd6qasWKo4JYtLN-wcpF5EHh1B2igVBJdf1EajuMZ5Rjs/s1600/fb.jpg" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;a href="http://facebook.com/"&gt;Facebook scam&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Recently a &lt;b&gt;Facebook scam message chain&lt;/b&gt; has spread over the most popular social networking site &lt;b&gt;FB&lt;/b&gt;, which claims that as Facebook is becoming overpopulated, they are &lt;b&gt;deleting inactive members&lt;/b&gt; &amp;amp; further to prove that your account is active, you need to copy the message and send it to a minimum of 15 of your friends within 2 weeks.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
Well this is nothing but a &lt;b&gt;hoax mail&lt;/b&gt;, so don't carry on the chain. Don't let the scammers rule Facebook. &lt;b&gt;Official&lt;/b&gt; Facebook will never ask you to do such to prove the activeness of your account. They have other means to check so, you know well, i guess. All this is nothing but a &lt;b&gt;Facebook noise&lt;/b&gt; to&lt;b&gt; increase traffic&lt;/b&gt; on FB servers, &amp;amp; to see how far the spam can spread. They do indeed, are benefited by this.&lt;br /&gt;
&lt;br /&gt;
To know more on this scam message see - &lt;br /&gt;
&lt;a href="http://www.techjunoon.com/facebook-is-deleting-accounts-hoax-chain-letter/"&gt;Details: Facebook hoax chain message&lt;/a&gt;</description><link>http://abhinavtheprince.blogspot.com/2011/01/facebook-scam-chain-deleting-inactive.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXzJJ7Ll2DB7ene4IFO_uAu-xTX2ngAsxr_5bWS2kJIfXh2bpHpBE81-sUrpTQi7OeP2cwCg8Ei_4E4QiMuOxaILup2E8kb9dnd6qasWKo4JYtLN-wcpF5EHh1B2igVBJdf1EajuMZ5Rjs/s72-c/fb.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-6038384850533587152</guid><pubDate>Sun, 02 Jan 2011 10:17:00 +0000</pubDate><atom:updated>2011-01-02T15:47:24.564+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Friends' Posts</category><category domain="http://www.blogger.com/atom/ns#">JIS College</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Personal</category><category domain="http://www.blogger.com/atom/ns#">Tech News</category><title>Ubuntu Team - IIT Bombay visit - Soumalya Dutta</title><description>Friends you know what recently,&lt;br /&gt;
The &lt;b&gt;Ubuntu &lt;/b&gt;developer's team has recently visited &lt;b&gt;IIT Bombay&lt;/b&gt;. They are going to give the IITians an opportunity to directly collaborate with &lt;b&gt;Ubuntu Linux forums.&lt;/b&gt;&lt;br /&gt;
Ubuntu is nothing but the most popular &lt;a href="http://abhinavtheprince.blogspot.com/2010/07/linux-distros-distro-evolution-graph.html" target="_blank"&gt;Distro of Linux.&lt;/a&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
So, I wanna know don't you feel "How Lucky they are!!!!!!!!!". We being JISians, really are too far behind for such opportunities? What do you feel?&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: lime;"&gt;Posted By:&lt;/b&gt; &lt;a href="http://www.facebook.com/profile.php?id=100001659942637" target="_blank"&gt;Soumalya Dutta&lt;/a&gt;</description><link>http://abhinavtheprince.blogspot.com/2011/01/ubuntu-team-iit-bombay-visit-soumalya.html</link><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-4306169467271756380</guid><pubDate>Sun, 02 Jan 2011 10:00:00 +0000</pubDate><atom:updated>2011-01-02T15:54:11.527+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Friends' Posts</category><category domain="http://www.blogger.com/atom/ns#">JIS College</category><category domain="http://www.blogger.com/atom/ns#">Personal</category><title>College *****desires***** - Is it yet fulfilled? - Souvik Sinha</title><description>&lt;b&gt;Heyy evry1&lt;/b&gt;... &lt;br /&gt;
we, d 3rd yrs of JIS jst hav nly 1.5 yrs almst left in dis cllg...&lt;br /&gt;
so, is dere anythn u all had desired 2 do in cllg bt cldnt till date.......&lt;br /&gt;
think think....... &lt;br /&gt;
guyz, giv it a thot,coz we still hav jst mre dan a yr..... &lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
feel free 2 xpess yr desires.....let dem b d weirdest, no matter....&lt;br /&gt;
lets al f us share our desires 2 b fulfilld in cllg...&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: lime;"&gt;Posted by:&lt;/b&gt; &lt;a href="http://www.facebook.com/profile.php?id=100000638889145" target="_blank"&gt;Souvik Sinha&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.facebook.com/profile.php?id=100000638889145" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_tah8xM8xxQFewgbP4DD1GfxSIgK1AMSHl9isxu0oZLYdobRfP_hLAG-cx-VngEC9KZan3w2D0Md0mg-UHIKfW3l47l7dYGNZpd3oASfdGb50MatQdwjEpcC0F8JAd4xt8XrQaGhY_kdt/s1600/66.jpg" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>http://abhinavtheprince.blogspot.com/2011/01/college-desires-is-it-yet-fulfilled.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_tah8xM8xxQFewgbP4DD1GfxSIgK1AMSHl9isxu0oZLYdobRfP_hLAG-cx-VngEC9KZan3w2D0Md0mg-UHIKfW3l47l7dYGNZpd3oASfdGb50MatQdwjEpcC0F8JAd4xt8XrQaGhY_kdt/s72-c/66.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-5330475269395265371</guid><pubDate>Tue, 28 Dec 2010 04:55:00 +0000</pubDate><atom:updated>2010-12-28T19:23:42.653+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">JIS College</category><category domain="http://www.blogger.com/atom/ns#">Personal</category><title>Full Form of ABHINAV</title><description>&lt;script language="javascript" type="text/javascript"&gt;
var postDate = 25;
var postMonth = 11;
var postYear = 2010;
var postCredit = 3;
var monthlyVisit = 2;

var blogCredit = 2;
var d = new Date();
postCredit *= blogCredit;
postYear = d.getFullYear()-postYear;
if (postMonth &gt; d.getMonth())
{ postYear -= 1;
  postMonth += d.getMonth();
}
else
{ postMonth = d.getMonth() - postMonth;
}
if (postDate &gt; d.getDate())
{ postMonth -= 1;
  postDate += d.getDate();
}
else
{ postDate = d.getDate() - postDate;
}
if (postDate &lt;= 10)
{ postCredit += postCredit;
  postCredit *= blogCredit;
}
else
{ postCredit *= postCredit;
}
postMonth += postYear * 12;
postDate = postMonth * monthlyVisit + postCredit;
postDate *= blogCredit;
postDate += blogCredit;
document.write('&lt;b&gt;&lt;font size=3 color=green&gt;Page Views: &lt;/font&gt;&lt;i&gt;' + postDate + ' &lt;/i&gt;&lt;/b&gt;');
&lt;/script&gt;&lt;br /&gt;
Well friends, it was really tough for me to design the full form of &lt;b&gt;ABHINAV&lt;/b&gt; based on my blog's niche indeed. After a lot of permutations &amp;amp; combinations, my grey cells finally ended up with&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;b&gt;'A Blog Hosting Intra-engineering Notions of Academic Ventures'.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAmPsaoqkaynEXSDIzdby7W0eToBgGwMuD0r9DOHLBFUT-QFYasubJyJu0z7hvnBJ7wcQW-6e2XwD8com0mRA87Y-mKXKRveFAprEsu-wza7LrzNVcyKTwrPDxvMiIClFD3W0LqUNSn32X/s1600/cut.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="75" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAmPsaoqkaynEXSDIzdby7W0eToBgGwMuD0r9DOHLBFUT-QFYasubJyJu0z7hvnBJ7wcQW-6e2XwD8com0mRA87Y-mKXKRveFAprEsu-wza7LrzNVcyKTwrPDxvMiIClFD3W0LqUNSn32X/s400/cut.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
The word &lt;b&gt;'Abhinav'&lt;/b&gt; is Indian word which &lt;b&gt;means&lt;/b&gt; '&lt;b&gt;new&lt;/b&gt;' or '&lt;b&gt;novel&lt;/b&gt;'. So, it was rather a necessity that it's expanded form must mean something near to its original meaning &amp;amp; also must reveal my Blog's niche based on my profile as a blogger. After all, being an &lt;b&gt;Abhinav&lt;/b&gt; this &lt;b&gt;Abhinav&lt;/b&gt; wanted an &lt;b&gt;abhinav&lt;/b&gt; expanded form for the word &lt;b&gt;Abhinav&lt;/b&gt;, concealing the &lt;b&gt;Abhinav&lt;/b&gt;'ness of &lt;b&gt;Abhinav the Prince&lt;/b&gt;. Hope you understand.&lt;br /&gt;
&lt;br /&gt;
Moreover, I'd like to appreciate if you can suggest me a different full form for &lt;b&gt;ABHINAV.&lt;/b&gt; I'd also encourage your contribution to my blog,(if you want). Furthermore, please give your comments on &lt;b&gt;My Full form&lt;/b&gt; for &lt;b&gt;ABHINAV.&lt;/b&gt;</description><link>http://abhinavtheprince.blogspot.com/2010/12/full-form-of-abhinav.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAmPsaoqkaynEXSDIzdby7W0eToBgGwMuD0r9DOHLBFUT-QFYasubJyJu0z7hvnBJ7wcQW-6e2XwD8com0mRA87Y-mKXKRveFAprEsu-wza7LrzNVcyKTwrPDxvMiIClFD3W0LqUNSn32X/s72-c/cut.jpg" width="72"/><thr:total>4</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-4570565218517135265</guid><pubDate>Tue, 28 Dec 2010 04:31:00 +0000</pubDate><atom:updated>2011-01-03T19:56:47.256+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">JIS College</category><category domain="http://www.blogger.com/atom/ns#">Personal</category><title>How much you know JIS ?</title><description>&lt;script language="javascript" type="text/javascript"&gt;
var postDate = 28;
var postMonth = 11;
var postYear = 2010;
var postCredit = 3;
var monthlyVisit = 3;

var blogCredit = 2;
var d = new Date();
postCredit *= blogCredit;
postYear = d.getFullYear()-postYear;
if (postMonth &gt; d.getMonth())
{ postYear -= 1;
  postMonth += d.getMonth();
}
else
{ postMonth = d.getMonth() - postMonth;
}
if (postDate &gt; d.getDate())
{ postMonth -= 1;
  postDate += d.getDate();
}
else
{ postDate = d.getDate() - postDate;
}
if (postDate &lt;= 10)
{ postCredit += postCredit;
  postCredit *= blogCredit;
}
else
{ postCredit *= postCredit;
}
postMonth += postYear * 12;
postDate = postMonth * monthlyVisit + postCredit;
postDate *= blogCredit;
postDate += blogCredit;
document.write('&lt;b&gt;&lt;font size=3 color=green&gt;Page Views: &lt;/font&gt;&lt;i&gt;' + postDate + ' &lt;/i&gt;&lt;/b&gt;');
&lt;/script&gt;&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxqpE4h559h9SgeWDQ-uKnvpBB9HYM1fZAnM35XIXmHFxe0X0_hdPGfsezlqdK518ePwxT05Ewrn-fR4PLU606Sb42PX7vCnY7q9IkxK1BKTiwohAFsRuOGCNtLDdhksd9fS_uEW3ThJ2H/s1600/00353655b2ff16c7465645f5f3de4cf5be598e6b8a2af6de937173bdfe5837799d4d9e4e9eada5ba2fef604ff24047d5327d7f1e7.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxqpE4h559h9SgeWDQ-uKnvpBB9HYM1fZAnM35XIXmHFxe0X0_hdPGfsezlqdK518ePwxT05Ewrn-fR4PLU606Sb42PX7vCnY7q9IkxK1BKTiwohAFsRuOGCNtLDdhksd9fS_uEW3ThJ2H/s1600/00353655b2ff16c7465645f5f3de4cf5be598e6b8a2af6de937173bdfe5837799d4d9e4e9eada5ba2fef604ff24047d5327d7f1e7.jpeg" /&gt;&lt;/a&gt;Recently, when I was sorting my study table, I found the &lt;b&gt;JIS's Prospectus&lt;/b&gt; burried under the pile of Mostly-used books. Instantly, an insight grew within me to go through it for a while, &amp;amp; guess what, I got to know some really rare information about our JIS. So, I took up the urge to publish this post as a &lt;b&gt;quiz-based survey&lt;/b&gt; on &lt;b&gt;How much you know JIS?&lt;/b&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
So, what are you waiting for, Take the quiz...&lt;br /&gt;
&lt;br /&gt;
&lt;img border="0" height="0" src="http://c.gigcount.com/wildfire/IMP/CXNID=2000002.0NXC/bT*xJmx*PTEyOTM*ODEzNTQ2MjUmcHQ9MTI5MzQ4MTM3NjI1MSZwPTg3MzMxJmQ9d2lkZ2V*X3F1aXomZz*yJm89ZjA5Y2ZjYmZk/OGMzNGFiNTkyMzY5Y2NiNTMzNWQ1ZDkmb2Y9MA==.gif" style="height: 0px; visibility: hidden; width: 0px;" width="0" /&gt;&lt;br /&gt;
&lt;div align="center"&gt;
&lt;object allownetworking="all" allowscriptaccess="never" data="http://apps.quibblo.com/static/flash/qwidget/qwidget.swf?s=&amp;amp;theme=quibblo&amp;amp;quiz=e7mUeOT" height="400" type="application/x-shockwave-flash" width="300" wmode="transparent"&gt; &lt;param name="movie" value="http://apps.quibblo.com/static/flash/qwidget/qwidget.swf?s=&amp;theme=quibblo&amp;quiz=e7mUeOT"&gt;
 &lt;param name="allowscriptaccess" value="never"&gt;
 &lt;param name="allownetworking" value="all"&gt;
 &lt;param name="wmode" value="transparent"&gt;
 &lt;param name="bgcolor" value="ffffff"&gt;
 &lt;/object&gt;
&lt;br /&gt;
&lt;span style="font-size: xx-small;"&gt; Quiz by Abhinav the Prince, &lt;br /&gt;&lt;a href="http://www.quibblo.com/quiz/e7mUeOT/How-much-you-know-JIS"&gt;How much you know JIS?&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;</description><link>http://abhinavtheprince.blogspot.com/2010/12/how-much-you-know-jis.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxqpE4h559h9SgeWDQ-uKnvpBB9HYM1fZAnM35XIXmHFxe0X0_hdPGfsezlqdK518ePwxT05Ewrn-fR4PLU606Sb42PX7vCnY7q9IkxK1BKTiwohAFsRuOGCNtLDdhksd9fS_uEW3ThJ2H/s72-c/00353655b2ff16c7465645f5f3de4cf5be598e6b8a2af6de937173bdfe5837799d4d9e4e9eada5ba2fef604ff24047d5327d7f1e7.jpeg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-2938181055062262463</guid><pubDate>Sat, 25 Dec 2010 07:46:00 +0000</pubDate><atom:updated>2010-12-28T13:28:54.298+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">E-Books</category><category domain="http://www.blogger.com/atom/ns#">Help Forum</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Beginning Java Programming for Dummies, Best Book</title><description>&lt;script language="javascript" type="text/javascript"&gt;
var postDate = 25;
var postMonth = 11;
var postYear = 2010;
var postCredit = 2;
var monthlyVisit = 2;

var blogCredit = 2;
var d = new Date();
postCredit *= blogCredit;
postYear = d.getFullYear()-postYear;
if (postMonth &gt; d.getMonth())
{ postYear -= 1;
  postMonth += d.getMonth();
}
else
{ postMonth = d.getMonth() - postMonth;
}
if (postDate &gt; d.getDate())
{ postMonth -= 1;
  postDate += d.getDate();
}
else
{ postDate = d.getDate() - postDate;
}
if (postDate &lt;= 10)
{ postCredit += postCredit;
  postCredit *= blogCredit;
}
else
{ postCredit *= postCredit;
}
postMonth += postYear * 12;
postDate = postMonth * monthlyVisit + postCredit;
postDate *= blogCredit;
postDate += blogCredit;
document.write('&lt;b&gt;&lt;font size=3 color=green&gt;Page Views: &lt;/font&gt;&lt;i&gt;' + postDate + ' &lt;/i&gt;&lt;/b&gt;');
&lt;/script&gt;&lt;br /&gt;
&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; text-align: right;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSPskb7X2Ik52tIwFa1H8WU8mScdXj1bLfE8FdrpnZPZpQsVUuNJecjOtzjXBMCECftJk-hpX2ZSsiicTpMB8uceDUTHgZAhEWZCDZOakspI8nJN-piRMs8zoXzfiKXR_1oAno0_USXJAh/s1600/a.png" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSPskb7X2Ik52tIwFa1H8WU8mScdXj1bLfE8FdrpnZPZpQsVUuNJecjOtzjXBMCECftJk-hpX2ZSsiicTpMB8uceDUTHgZAhEWZCDZOakspI8nJN-piRMs8zoXzfiKXR_1oAno0_USXJAh/s1600/a.png" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Java for Dummies&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Nowadays, the amount of excitement &lt;b&gt;Java&lt;/b&gt; has generated, may get you the impression that Java will save the world or at least solve all the problems of the Internet. Not really. Java's hype has pushed it far beyond of its capabilities, and while Java is indeed new and interesting, it really is a programming language with which you write programs that run on almost any platform, yet designed. While in this respect, Java is closer to popular programming languages such as C++, Visual Basic, than it is to a page description language such as HTML, or a very simple scripting language such as JavaScript.&lt;br /&gt;&lt;br /&gt;Specifically, Java is an &lt;b&gt;Object-Oriented Programming&lt;/b&gt;(OOP) language developed by &lt;b&gt;Sun Microsystems.&lt;/b&gt; Build after C++, the Java language was designed to be &lt;b&gt;portable&lt;/b&gt;(Platform-Independent) across Operating Systems, both at the Source and at the Binary level.&lt;br /&gt;&lt;br /&gt;Now to learn Java there are plenty of Books, but the problem most of the students face is that most of the books are written in a style such that the reader has to have a hand or some experience in programming in some other language like C++. Hence, I beleive the book &lt;b&gt;'Beginning Programming with Java for Dummies' &lt;/b&gt;by &lt;b&gt;Bary Burd&lt;/b&gt;, Wiley Publication is the best book for learning &lt;b&gt;Basic Java&lt;/b&gt; for those too who don't know C++ that well.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;So what are you waiting for, start off your journey to the exciting world of Java. Click here to &lt;a href="http://www.megaupload.com/?d=T3VD8CRJ"&gt;download the pdf version of this book.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;</description><link>http://abhinavtheprince.blogspot.com/2010/12/beginning-java-programming-for-dummies.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSPskb7X2Ik52tIwFa1H8WU8mScdXj1bLfE8FdrpnZPZpQsVUuNJecjOtzjXBMCECftJk-hpX2ZSsiicTpMB8uceDUTHgZAhEWZCDZOakspI8nJN-piRMs8zoXzfiKXR_1oAno0_USXJAh/s72-c/a.png" width="72"/><thr:total>1</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6868448242849060978.post-3772051408137278601</guid><pubDate>Thu, 04 Nov 2010 13:28:00 +0000</pubDate><atom:updated>2010-12-28T10:22:12.421+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">JIS College</category><category domain="http://www.blogger.com/atom/ns#">Personal</category><title>Which JIS Faculty you hate the most?</title><description>&lt;script language="javascript" type="text/javascript"&gt;
var postDate = 4;
var postMonth = 10;
var postYear = 2010;
var postCredit = 4;
var monthlyVisit = 5;

var blogCredit = 2;
var d = new Date();
postCredit *= blogCredit;
postYear = d.getFullYear()-postYear;
if (postMonth &gt; d.getMonth())
{ postYear -= 1;
  postMonth += d.getMonth();
}
else
{ postMonth = d.getMonth() - postMonth;
}
if (postDate &gt; d.getDate())
{ postMonth -= 1;
  postDate += d.getDate();
}
else
{ postDate = d.getDate() - postDate;
}
if (postDate &lt;= 10)
{ postCredit += postCredit;
  postCredit *= blogCredit;
}
else
{ postCredit *= postCredit;
}
postMonth += postYear * 12;
postDate = postMonth * monthlyVisit + postCredit;
postDate *= blogCredit;
postDate += blogCredit;
document.write('&lt;b&gt;&lt;font size=3 color=green&gt;Page Views: &lt;/font&gt;&lt;i&gt;' + postDate + ' &lt;/i&gt;&lt;/b&gt;');
&lt;/script&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;u&gt;&lt;b&gt;Disclaimer: &lt;/b&gt;&lt;/u&gt;&lt;/span&gt;No part of this online poll is subjected to disrespect or insult any of the &lt;b&gt;JIS&lt;/b&gt; faculties and I, &lt;b&gt;Abhinav the Prince&lt;/b&gt;, being a publisher of this poll, hereby declare that in case any of the particulars furnished in this poll are found to be hurting someone's sentiments, I'll be liable to withdraw &amp;amp; suspend this poll.&lt;br /&gt;
&lt;br /&gt;
Choose the faculty name/names from the following:-&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Note&lt;/b&gt;&lt;/u&gt;: A maximum of 3 responses are allowed. Also you can specify a faculty whose name is not in the list.&lt;br /&gt;
So go ahead.... &lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;script charset="utf-8" src="http://static.polldaddy.com/p/4034464.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;noscript&gt;&amp;amp;amp;amp;amp;amp;lt;br /&amp;amp;amp;amp;amp;amp;gt;  &amp;amp;amp;amp;amp;amp;lt;a href="http://polldaddy.com/poll/4034464/"&amp;amp;amp;amp;amp;amp;gt;Which JIS faculty you hate the most?&amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;lt;span style="font-size:9px;"&amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;lt;a href="http://polldaddy.com/features-surveys/"&amp;amp;amp;amp;amp;amp;gt;customer surveys&amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;lt;/span&amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;lt;br /&amp;amp;amp;amp;amp;amp;gt; &lt;/noscript&gt;</description><link>http://abhinavtheprince.blogspot.com/2010/11/which-jis-faculty-you-hate-most.html</link><thr:total>1</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item></channel></rss>