+44(0) 1234 567 890 info@domainname.com

Wednesday 17 August 2011

How to Install C++ in Windows 7 64 bit

As an developer, who don't know the importance of the good compiler for executing the developed applications? Many of my beginner developer friends,  nowadays, are confused how to use Turbo C++ compiler for C/C++ programming language in Windows 7. So, here is a tutorial how to install Turbo C++ in your PC running Windows 7. 
Some of my friends are using several tricks to use it. Some have downgraded to Windows XP. But this is not possible for all to move back to Windows XP for a single application, and becomes more difficult if you are addicted to Windows 7.
So, here is a simple tutorial on How to install Turbo C++ compiler in Windows 




  1. First of all, a fact should be known that Windows 7 don't directly support any DOS based applications to run into it. So, first of all, you need to install a third party application called DosBox 0.74.
     
  2. This application basically provides the essential environment for Turbo C++ or any DOS related application to execute in it.
     
  3. Here is a download link. Download Dropbox 0.74 
     
  4. Now, install DosBox as usual.
     
  5. Now you will need to download a installed Turbo C++. You can download it here. Download Turbo C++ installed 
     
  6. Don't download Turbo C++ setup from any other location, as it won't work. Only download it from the link provided above.
     
  7. After downloading the .zip file, extract it to C:\Turbo 
     
  8. Now go to the directory where the program DosBox 0.74 is installed.
     
  9. Open the file named DOSBox 0.74 Options.bat. It will look like below image.
                       

     
  10. DosBox 0.74 options.bat will look like this

           
Now navigate till the end of the file and insert the lines shown in the image below.


If you can't see the lines in the image, here are the same lines.


mount d c:\Turbo\
d:
cd tc
cd bin
tc

After editing is done, save the file and then open the DosBox it will open like this.



If you want to have a full screen feel, press Alt+Enter to see the window in full screen.

12 comments

Thursday 4 August 2011

Commands- Linux Vs Windows

Both Windows and Linux come in many flavors. All the flavors of Windows come from Microsoft, the various distributions of Linux come from different companies



Windows has two main lines. The older flavors are referred to as "Win9x" and consist of Windows 95, 98, 98SE and Me. The newer flavors are referred to as "NT class" and consist of Windows NT3, NT4, 2000, XP and Vista. Going back
in time, Windows 3.x preceded Windows 95 by a few years. And before that, there were earlier versons of Windows, but they were not popular. Microsoft no longer supports Windows NT3, NT4, all the 9x versions and of course anything older. Support for Windows 2000 is partial (as of April 2007).
The flavors of Linux are referred to as distributions (often shortened to "distros"). All the Linux distributions released around the same time frame will use the same kernel (the guts of the Operating System). They differ in the add-on software provided, GUI, install process, price, documentation and technical support. Both Linux and Windows come in desktop and server editions.
There may be too many distributions of Linux, it's possible that this is hurting Linux in the marketplace. It could be that the lack of a Linux distro from a major computer company is also hurting it in the marketplace. IBM is a big Linux backer but does not have their own branded distribution. Currently there seem to be many nice things said about the Ubuntu distribution.
Linux is customizable in a way that Windows is not. For one, the user interface, while similar in concept, varies in detail from distribution to distribution. For example, the task bar may default to being on the top or the bottom. Also, there are many special purpose versions of Linux above and beyond the full blown distributions described above. For example, NASLite is a version of Linux that runs off a single floppy disk (since revised to also boot from a CD) and converts an old computer into a file server. This ultra small edition of Linux is capable of networking, file sharing and being a web server.


















MS-DOSLinux / Unix
attribchmod
backuptar
dirls
clsclear
copycp
delrm
deltreerm -R
rmdir
editvi
pico
formatfdformat
mount
umount
move / renamemv
typeless <file>
cdcd
chdir
more < filemore file
mdmkdir
winstartx

Linux / Unix Commands





  * See the Linux and Unix overview page for a brief description on all commands on one page.



























Aa2p | ac | alias | ar | arch | arp | as | at | awk
Bbasename | bash | bc | bdiff | bfs | bg | biff | break | bs | bye
Ccal | calendar | cancel | cat | cc | cd | chdir | checkeq | checknr | chfn | chgrp | chkey | chmod | chown | chsh |cksum | clear | cls | cmp | col | comm | compress | continue | copy | cp | cpio | crontab | csh | csplit | ctags | cu |curl | cut
Ddate | dc | df | deroff | dhclient | diff | dig | dircmp | dirname | dmesg | dos2unix | dpost | du
Eecho | ed | edit | egrep |  elm | emacs | enable | env | eqn | ex | exit | expand | expr
Ffc | fg | fgrep | file | find | findsmb | finger | fmt | fold | for | foreach | fromdos | fsck | ftp
Ggetfacl | gprof | grep | groupadd | groupdel | groupmod | gunzip | gview | gvim | gzip
Hhalt | hash | hashstat | head | help | history | host | hostid | hostname
Iid | ifconfig | ifdown | ifup | isalist
Jjobs | join
Kkeylogin | kill | ksh
Llast | ld | ldd | less | lex | link | ln | lo | locate | login | logname | logout | lp | lpadmin | lpc | lpq | lpr | lprm |lpstat | ls
Mmach | mail | mailcompat | mailx | make | man | merge | mesg | mii-tool | mkdir | mkfs | more | mount | mt | mv |myisamchk | mysql
Nnc | neqn | netstat | newalias | newform | newgrp | nice | niscat | nischmod | nischown | nischttl | nisdefaults |nisgrep | nismatch | nispasswd | nistbladm | nmap | nohup | nroff | nslookup
Oon | onintr | optisa
Ppack | pagesize | passwd | paste | pax | pcat | perl | pg | pgrep | pico | pine | ping | pkill | poweroff | pr | priocntlprintf | ps | pvs | pwd
Qquit
Rrcp | reboot | red | rehash | remsh | repeat | rgview | rgvim | rlogin | rm | rmail | rmdir | rn | route | rpcinfo | rshrsync | rview | rvim
Ss2p | sag | sar | scp | script | sdiff | sed | sendmail | set | setenv | setfacl | settime | sftp | sh | shred | shutdown |sleep | slogin | smbclient | sort | spell | split | stat | stop | strip | stty | su | sudo | sysinfo | sysklogd
Ttabs | tac | tail | talk | tar | tbl | tcopy | tcpdump | tee | telnet | time | timex | todos | top | touch | tput | tr |traceroute | tree | troff
Uul |  umask | unalias | uname | uncompress | unhash | uniq | unmount | unpack | untar | until | uptime | useradd |userdel | usermod
Vvacation | vedit |  vgrind | vi | view | vim | vipw | vmstat
Ww | wait | wc | wget | whereis | which  | whilewho | whois | write
XX | xargs | xfd | xlsfonts | xset | xterm | xrdb
Yyacc | yes | yppasswd
Zzcat



Related
Common Linux Commands
1 comment

Wednesday 3 August 2011

4 Ways to Identify Safe Websites on the Internet

 On the whole Internet, there are approximately more than 150 million active websites up and running. As a result, it often becomes a real challenge for the users to identify safe websites that are trustworthy and reputed. Have you ever wondered to know the reputation of a website before placing the order? Need to know
whether a given website is child safe? Well, here are some of the ways to identify safe websites on the Web.
1. WOT or Web Of Trust (www.mywot.com):


WOT is a great place to test the reputation of your favorite website. WOT gives real-time ratings for every website based on the feedback that it gets from millions of trustworthy users across the globe and trusted sources, such as phishing and malware blacklists. Each domain name is evaluated based on this data and ratings are applied to them accordingly. A snapshot of WOT ratings for gohacking.com is shown below:
WOT Ratings for Gohacking.com
As shown in the above snapshot, the reputation of each website is shown in terms of 4 components where green means excellent, yellow warns users to be cautious and red indicates potential danger.
Trustworthiness signifies the overall safety of the website. A poor rating may indicate that the site is associated with threats like Internet scams, phishing, identity theft risks and malware. For more information on phishing, you may refer my other post on how to identify and avoid phishing scams.
Vendor reliability tells you whether a given site is safe for carrying out buy and sell transactions with it. An excellent rating indicates superior customer satisfaction while a poor rating indicates possible scam or bad shopping experience.
Privacy indicates about “to what extent the site respects the privacy of it’s users and protects their personal identity and data”.
Child Safety indicates whether the content of a given site is appropriate for children. Site contents like sexual material, nudity and vulgarity will have a poor Child Safety rating.
In most cases, the WOT ratings are found to be highly accurate. To check the reputation of any given website, just visit www.mywot.com type-in the address of your favorite website and click on “Check now”. This tool alone can tell you a lot about the reputation and safety level of a website. However, in addition to this, I am giving you another 3 handy tools to identify safe websites on the Web.
2. McCafee SiteAdvisor:
McCafee SiteAdvisor is a free tool that is available as a browser add-on. It adds safety ratings to your browser and search engine results. You can download it fromwww.siteadvisor.com.
3. StopBadware:
Using this tool, you can check whether a given site is said to have involved in malware activity in the past. To check this, go tohttp://www.stopbadware.org/home/reportsearch and enter the URL or domain name of a website and click on “Search Clearinghouse ”. If the search does not return any result, that means the site was never involved in any of the malware activity in the past.
4. Google Pagerank:
Google PageRank is another great tool to check the reputation and popularity of a website. The PageRank tool rates every webpage on a scale of 1 to 10 which indicates Google’s view of importance of the page. If a given website has a PageRank of less than 3, then it is said to be less popular among the other sites on the Internet.
However, PageRank will only tell you how much popular a given website is and has nothing to do with the safety level of a website. So, this tool alone cannot be used to evaluate a website’s safety and other factors.
PageRank feature is available as a part of Google Toolbar. You can install Google Toolbar from http://www.google.com/intl/en_uk/toolbar/ie/index.html.
1 comment

Tuesday 2 August 2011

What is IP Address - Private & Public



IP ADDRESSING


An IP address is a 32 bit numeric identifier assigned to each machine on an IP network. It designates the specific location of a device on the network. An IP address is a software address and designed to allow host on one network to communicate with a host on a different network regardless of the type of LANs the hosts are participating in.

IP TERMINOLOGIES


Bit: A bit is one digit, either a 1 or a 0.
Byte: A byte is 7 or
8 bits, depending on whether parity is used.
Octet: An octet, made up of 8 bits is just an ordinary 8 bit binary number. In most cases byte and octet are completely interchangeable.

5 classes;

Class A: Class A IP address structure.

NNNNNNNN: HHHHHHHH: HHHHHHHH: HHHHHHHH
N-network
H-Host




subnetMask:255.0.0.0
 
Value of the first bytes: 1 to 126


No of the network: 126No of the Host: (256*256*256)-2=16,777,216-2=16,777,214

 
Because two hosts we are not using so we reduce 2.
X.0.0.0 and
x.255.255.255
Purpose: we can use class A with large network with many devices because it contains too many host on the same network 16,777,214-host.

Class B: Class B IP address structure


NNNNNNNN: NNNNNNNN: HHHHHHHH: HHHHHHHH
N-network
H-Host



subnetMask:255.255.0.0

Value of the first bytes: 128-191
No of the network: (191-127)*256=16,384
No of the Host: (256*256)-2=65,536-2=65,534


Purpose: we can use class B with Medium network with many devices because it contains host on the same network 65,534-host.


Class C: Class C IP address structure.


NNNNNNNN: NNNNNNNN: NNNNNNNN: HHHHHHHH 

N-network
H-Host



subnetMask:255.255.255.0
 

Value of the first bytes: 223-192
No of the network: (223-191)*256*256=2,097,152
No of the Host: (256)-2=254
 

Purpose: we can use class c with small network because it contains very low no of host on the same network 254-host.


Class D: 

Range:224-239
 

Purpose: it is used for multicasting
Class E: 


Range: 240-254
 

Purpose: now it is not using .Reserved for Future use.



What are Public IP Addresses?

A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.


A public IP address can be either static or dynamic. A static public IP address does not change and is used primarily for hosting webpages or services on the Internet. On the other hand a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet. Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.

You can check your public IP address by visiting   www.whatismyip.com


What are Private IP Addresses?

An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks):
---------------------------------------------------------------------
10.0.0.0 – 10.255.255.255 (Total Addresses: 16,777,216)
172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)
192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)
----------------------------------------------------------------------
Private IP addresses are used for numbering the computers in a private network including home, school and business LANs in airports and hotels which makes it possible for the computers in the network to communicate with each other. Say for example, if a network X consists of 10 computers each of them can be given an IP starting from 192.168.1.1 to 192.168.1.10. Unlike the public IP, the administrator of the private network is free to assign an IP address of his own choice (provided the IP number falls in the private IP address range as mentioned above).


Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. It is possible to interconnect two private networks with the help of a router or a similar device that supports Network Address Translation.



If the private network is connected to the Internet (through an Internet connection via ISP) then each computer will have a private IP as well as a public IP. Private IP is used for communication within the network where as the public IP is used for communication over the Internet. Most Internet users with a DSL/ADSL connection will have both a private as well as a public IP.


You can know your private IP by typing ipconfig command in the command prompt. The number that you see against “IPV4 Address:” is your private IP which in most cases will be 192.168.1.1 or 192.168.1.2. Unlike the public IP, private IP addresses are always static in nature.


Unlike what most people assume, a private IP is neither the one which is impossible to trace (just like the private telephone number) nor the one reserved for stealth Internet usage. In reality there is no public IP address that is impossible to trace since the protocol itself is designed for transparency.
No comments

Monday 1 August 2011

Monitor Your Site’s Uptime For Free





Most famous web hosting services telling 99.99% uptime. In pratical  it is not possible for a website. There are many times website can go down. The main reasons for down-time depends of varois factores like problem with
the web hosting server, network outrages, server overload, DNS configuration, SSL certificate problems, server outrages etc.

Keeping Monitor site uptime of your website is very important for its success.  If your website is down for long time, it surely turned off your potential clients or readers. There are many free web services that helps us to check the downtime/uptime for any website.
The list below is a collection of great online websites that help you to monito your site’s uptime for free.

1. Uptime Robot

2. Livewatch

3. Mon.itor.us

4. Site24×7




2 comments