Pointer Arithmetic

Do you want to be a Master in C? then you should have to know about pointer arithmetic. Referencing a Pointer: • Referencing the pointer means storing the address of particular object into the pointer variable. For ex: int no = 10; int *ptr = & no; • In this example we store the address of no variable in a pointer variable ptr. & operator is used for retrieving the address and it is called as "address of operator ". • This “&” operator is not used for an array and a function…Read more

Do You Know What is Firewall?

This article states the use of firewall for your security of your operating system from unwanted browsing sites .The firewall plays a vital role in maintaining security of your assets on computer. Have you ever noticed when u type domain www.facebook.com in your college, company or institute it is not available to intended user WHY the reason is administrator has hosted firewall for security.   A firewall protects networked computers from intentional hostile intrusion that could compromise confidentially or result in data corruption or denial service .It may be a hardware device or…Read more

Java Card Security

Java applets are subject to Java security restrictions; however, the security model of Java Card systems differs from standard Java in many ways. The Security Manager class is not supported on Java Card. Language security policies are implemented by the virtual machine. Java applets create objects that store and manipulate data. An object is owned by the applet that creates it. Even though an applet may have the reference to an object, it cannot invoke the object's methods, unless it owns the object or the object is explicitly shared. An applet can share…Read more

Java Card Technology

As we are daily using smart cards. This smart card are developed on basis of java card technology this article briefly states the use and how java language is beneficially used in building smart cards. Java Card technology adapts the Java platform for use on smart cards and other devices whose environments are highly specialized, and whose memory and processing constraints are typically more severe than those of J2ME devices. Java Card technology is evolving. Accompanying both the technical evolution of smart card chips and the needs of application developers, smart cards are…Read more

Storage Classes in C

Storage Classes in C   Friends we will be going step by step learning C, will find meaning of each new term when we get introduced to it while learning storage classes. Storage is related with Scope of a variable: It is the boundary within which a variable can be used. Memory allocated by compiler for storing variable   Storage class defines the scope and lifetime of a variable. With C complier view we can say that variable name identifies physical location from a computer where variable is stored. As we know that…Read more

JAVA Applet

Introduction to JAVA Applet Java applet is a small program transported over internet and delivered to user machine in the form of byte code is platform independent. To open java applet in browser your browser must support java for that browser has to obtain licenced from oracle. Unlike java application java applet has certain limitations like java applet cannot access data on computer this provides security that’s why applets are used in banking and other applications. They cannot be executed directly they have to be opened in java compatible web browser. Applets are…Read more


Intex has recently arrived into the field of smart phones. Before this Intex company was making feature phones. It is currently offering around 12 smart phones in the market and it is planning to launch 20 more smart phones in the near future. The Intex Aqua i-5 is a new Android Smart phone in moderate price, with which the company promises to provide great results at an economy price. Design Aqua i-5 is a big screen Android phone with a very slimmer body as compared to other Smart phones in this range. This…Read more

Cryptography and Information Security

Introduction Cryptography is the concept of information security Cryptography is the practice and study of techniques for secure communication. The sender of an encrypted message shared the decoding technique also called as key needed to recover the encrypted information only with intended recipients, thereby avoiding unwanted persons to read information. Now days due to global acceptance of the internet every computer is connected to other so this has created many problems so cryptography plays very important role in information security. Cryptography is not new technique historical references were available of this technique date…Read more
Nokia Lumia 720

Nokia Lumia 720

Nokia Lumia 720 is an addition to the new Lumia family. It has been blessed with Microsoft Windows 8 operating system. It is thinner and slimmer than the other Lumia smart phones from Nokia. It seems to have the right size and right design as compared to Nokia Lumia 820. But is it the device that we are looking for? Let’s check it out.   Simple compared to Other Lumia phones Nokia has kept Lumia 720 very much similar to the HTC’s 8x. The shape and weight of both the devices match but…Read more
What is Information Technology?

What is Information Technology?

What is Information Technology? Information technology is concerned with improvements in a variety of human and organizational problem-solving endeavors through the design, development, and use of technologically based systems and processes that enhance the efficiency and effectiveness of information in a variety of strategic, tactical, and operational situations. The knowledge and skills required in information technology come from the applied engineering sciences, especially information, computer, and systems engineering sciences, and from professional practice. The hardware and software of computing and communications form the basic tools for information technology. These are implemented as information…Read more