Pointer Arithmetic

Do you want to be a Master in C? then you should have to know about pointer arithmetic. Referencing a Pointer: • Referencing the pointer means storing the address of particular object into the pointer variable. For ex: int no = 10; int *ptr = & no; • In this example we store the address of no variable in a pointer variable ptr. & operator is used for retrieving the address and it is called as "address of operator ". • This “&” operator is not used for an array and a function…Read more

Do You Know What is Firewall?

This article states the use of firewall for your security of your operating system from unwanted browsing sites .The firewall plays a vital role in maintaining security of your assets on computer. Have you ever noticed when u type domain www.facebook.com in your college, company or institute it is not available to intended user WHY the reason is administrator has hosted firewall for security.   A firewall protects networked computers from intentional hostile intrusion that could compromise confidentially or result in data corruption or denial service .It may be a hardware device or…Read more

Java Card Security

Java applets are subject to Java security restrictions; however, the security model of Java Card systems differs from standard Java in many ways. The Security Manager class is not supported on Java Card. Language security policies are implemented by the virtual machine. Java applets create objects that store and manipulate data. An object is owned by the applet that creates it. Even though an applet may have the reference to an object, it cannot invoke the object's methods, unless it owns the object or the object is explicitly shared. An applet can share…Read more

Java Card Technology

As we are daily using smart cards. This smart card are developed on basis of java card technology this article briefly states the use and how java language is beneficially used in building smart cards. Java Card technology adapts the Java platform for use on smart cards and other devices whose environments are highly specialized, and whose memory and processing constraints are typically more severe than those of J2ME devices. Java Card technology is evolving. Accompanying both the technical evolution of smart card chips and the needs of application developers, smart cards are…Read more

Storage Classes in C

Storage Classes in C   Friends we will be going step by step learning C, will find meaning of each new term when we get introduced to it while learning storage classes. Storage is related with Scope of a variable: It is the boundary within which a variable can be used. Memory allocated by compiler for storing variable   Storage class defines the scope and lifetime of a variable. With C complier view we can say that variable name identifies physical location from a computer where variable is stored. As we know that…Read more

JAVA Applet

Introduction to JAVA Applet Java applet is a small program transported over internet and delivered to user machine in the form of byte code is platform independent. To open java applet in browser your browser must support java for that browser has to obtain licenced from oracle. Unlike java application java applet has certain limitations like java applet cannot access data on computer this provides security that’s why applets are used in banking and other applications. They cannot be executed directly they have to be opened in java compatible web browser. Applets are…Read more

Cryptography and Information Security

Introduction Cryptography is the concept of information security Cryptography is the practice and study of techniques for secure communication. The sender of an encrypted message shared the decoding technique also called as key needed to recover the encrypted information only with intended recipients, thereby avoiding unwanted persons to read information. Now days due to global acceptance of the internet every computer is connected to other so this has created many problems so cryptography plays very important role in information security. Cryptography is not new technique historical references were available of this technique date…Read more
Are You Aware of Skimming?

Are You Aware of Skimming?

      As we all are using ATM ‘s in our day to day life. ATM has become inevitable   part of our life. Today from farmers to corporate  world the ATM card are used It helps us for fast transactions but today there are certain frauds with ATM card that may lead to your asset loss. That is why care should be taken to prevent from this fraud. ONE FINE DAY IT MIGHT BE YOU. So this article describes how one can take preventive measures.   What goes right now in the World?…Read more
WordPress: Blogging Advantages

WordPress: Blogging Advantages

WordPress: Advantages in Blogging WordPress is a notorious blogging stage which could be utilized to fabricate and advertise business locales, and in addition individual sites. Here are a percentage of the explanations why you have to recognize utilizing WordPress when making your particular site.   Layout customization Generally blogging stages offer free models which could be utilized for building an online journal. Notwithstanding, you have to tweak the outline to make your site to emerge around numerous others out there. WordPress offers apparatuses which you can use to redo the layout of your…Read more
What is Compiler?

What is Compiler?

What is Language Translator? Language translation is the process of converting program written in a high level language into machine language. Computer understands machine language only which is written in 0 and 1. What is Compiler? Actually there are two types of computer languages one is lower level language it is also called as assembly language program in assembly language is written using assembly language instructions, another type is higher level languages like c, java tec. It is very difficult to write program in assembly level language. To solve this problem we use…Read more