Wednesday, 10 January 2018

What is Q Basic?

QBasic (Quick Beginners All purpose Symbolic Instruction Code) is an IDE and interpreter for a variety of the BASIC programming languagewhich is based on QuickBASIC. Code entered into the IDE is compiled to an intermediate representation, and this IR is immediately interpreted on demand within the IDE.[1] It can run under nearly all versions of DOS and 32-bit versions of Windows, or through emulation via DOSBox/DOSEMUon LinuxFreeBSD, and 64-bit versions of Windows.[2] (QBasic is a DOS program and requires DOS or a DOS emulator. Windows XP comes with an emulator called DOS Virtual Machine, subsequent versions of Windows require an emulator such as DosBox.) For its time, QBasic provided a state-of-the-art IDE, including a debugger with features such as on-the-fly expression evaluation and code modification. It supports various inbuilt functions.

Friday, 26 August 2011


What is Hacking?

          Unauthorized use of computer and network resources.
          “Hacker” originally meant a very gifted programmer.
          Hacking is a felony in the US and most other countries.
          When it is done by request and under a contract between an ethical hacker and an organization, it is OK!
          The difference is that the ethical hacker has authorization to probe the target. 
          “The number of really gifted hackers in the world is very small, but there are lots of wannabes…”(-Dr. Charles C. Palmer, IBM)

Definitions
Hacker:
A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
 A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term for this sense is cracker.

Cracker:
One who breaks security on a system. Coined ca. 1985 by hackers in defense against journalistic misuse of hacker.
An earlier attempt to establish `worm' in this sense around 1981--82 on Usenet was largely a failure.
…though crackers often like to describe themselves as hackers, most true hackers consider them a separate and lower form of life.

Who hacks?

          Hackers in Eastern Europe hacked about 1 million credit card numbers from 40 financial companies in the United States in 2003 alone.
          64% of companies suffered losses from hackers’ activities.
          More serious offenders, able to cause damage to a system, are known as hackers.

Who cracks?
          There are 3 groups of crackers:
          Vandals: hack computer systems for destruction (deleting files).
          Jokers: the most harmless; hacking systems and carrying in different sounds, noises, and visual effects.
          Breakers: professional criminals commit hacking of computer systems with the purpose of money theft, industrial or commercial espionage, and thefts of expensive software.

Thursday, 4 August 2011

How to make a simple HTML page with css example


Cascading Style Sheets (CSS) is a style sheet language used to describe the presentation semantics (the look and formatting) of a document written in a markup language.


Just copy this coding in notepad and named this file index.html.


<html>
<head>
<link rel="stylesheet" type="text/css" href="test.css" />
</head>
<body>
<h3> A White Header </h3>
<p> This paragraph has a blue font.
The background color of this page is gray because
we changed it with CSS! </p>
</body>
</html>


Make another notepad file and copy this coding and named test.css


body{ background-color: gray;}
p { color: blue; }
h3{ color: white; }

So ,this is an example of css file.





Monday, 1 August 2011

How to Restore Deleted Files After Emptying the Recycle Bin

Friends if you want to retrieve a deleted file which is already you removed from recycle bin.
You can do this by the help of Restoration software just go to http://www.emergingtechs.com
and follow this link to download this sowtware
http://www.emergingtechs.com/posts/how-restore-deleted-files-after-emptying-recycle-bin/
So ,go and get your deleted files .

Saturday, 30 July 2011

How to Configure Outlook Express

Today we consider how to configure outlook express.
You need a account to configure outlook express like gmail,yahoo,hotmail or any other account.
This is a link of a PDF to see step by step setting in outlook.
http://support.netouch.com/email/OutlookExpressConfiguration.pdf

If you want to see a simulation or video just check it



How to Send Email from ASP .NET

Sending email is a very common task in any web application. In almost every web application (web site), their will atleast be an occassion to send email in any fashion. 


http://aspalliance.com/149_how_to_send_email_from_asp_net_

http://www.codeproject.com/KB/aspnet/ASPNETwebmail.aspx

Friday, 29 July 2011

How to make a signature pad

Learn how to make a signature pad by the help of Thomas Bradley by the use of canvas ......
So enjoy this coding......
http://thomasjbradley.ca/lab/signature-pad