Showing posts with label to. Show all posts
Showing posts with label to. Show all posts

Thursday, February 19, 2015

C program to copy the contents of one file into another

C program to copy the contents of one file into another


#include<stdio.h>
#include<conio.h>
#include<stdlib.h>

void main()
{
FILE *fp1,*fp2;
char ch,*f1,*f2;
clrscr();

printf("Enter source file name(ex:source.txt): ");
scanf("%s",f1);
printf("Enter destination file name(ex:destination.txt): ");
scanf("%s",f2);

fp1=fopen(f1,"r");
fp2=fopen(f2,"w");

if(fp1==NULL||fp2==NULL)
{
printf("File could not open!!");
exit(0);
}

while((ch=getc(fp1))!=EOF)
putc(ch,fp2);

fclose(fp1);
fclose(fp2);
}
Read more »

Wednesday, February 18, 2015

Java program to check whether a number is prime or not

Java program to check whether a number is prime or not

class prime
{
public static void main(String...s)
{
int n,i;
n=Integer.parseInt(s[0]);

for(i=2;i<n;++i)
{
if(n%i==0)
break;
}

if(i==n)
System.out.println("
Number is prime");

else
System.out.println("
Number is not prime");

}
}
Read more »

Kettle Pass parameters from job to transformation in PDI Retrieve data from table by passing table name as parameter

This post will talk about basic understanding of parameters concept in PDI.

Software Setup :
PDI 5.1.0 CE
PostgreSQL

Concept : Retrieve data from table by passing table name as parameter.

You will learn below things
1) Table input step & database connections
2) Creating parameter(s) in Transformation(s) & Job(s)
3) Passing parameter(s) from job to transformation.

Lets say in foodmart database you have below tables 1) region 2) product 3) customer and etc.
Every time when you pass different table name as parameter you should able to fetch the data coming from the passed table.

1) Table input step & database connections
2) Creating parameter(s) in Transformation(s) & Job(s)

1) Create a new transformation & drag and drop "Table Input" step from Design Pane.

2) Double Click on "Table input" step & Click on New tab to give database connections as shown in below image


3) Define the parameter in transformation ( in this example the table name should go as parameter).
    Image A : Right Click on the empty space to get the transformation settings.
    Image B : Database Connection Details

    Parameter Name is : tableName


 4) Come back to the properties of "Table input" & write select statement to retrieve the data.
     Eg : SELECT * FROM product LIMIT 100
     In above example "product" is the table name that you have to replace with the parameter.
     i.e., SELECT * FROM ${tableName} LIMIT 100

     Once you write the query, come down check "Replace variables in script"





 5) Take a "Dummy" step and connect it to "Table input step" . Save the transformation & run it on "Dummy Step"( Right click dummy step and click on "Preview".

OUTPUT : Test 1  : With "region" table

OUTPUT : Result 1


OUTPUT : Test 2 : With "product" table
 * Right click Dummy step then click on Preview
 * Click on Configure & then in parameters tab give "product" for tableName value parameter.
OUTPUT : Result 2 



3) Passing parameter(s) from job to transformation
* Crtl+Alt to create a new job
* From the "General" node of Design tab ( Appears left side) drag and drop "Transoformation step".
* Drag and drop "START" step and connect these two as shown in below image.


* Double click on "Transformation" step to set the properties & parameter information.
* Browse for the transformation file and then move to parameters tab
* Click on "Get Parameters" then you can find parameter get apper under Parameter tab.

* Right click on empty canvas of job to get its settings & move to Parameters tab and give parameter name as "tableName" and provide default value.

Save the job and run it.

IMP NOTE :
1) Parameter names in job & transformation should match.
2) You can create n  number of parameters in job but can pass as many you wish.
3) In job design you should take  "START" step to tell the job to start execution from there.
   If you ignore you will get below error ( which took me awhile to solve it for the very first time).


Start of job execution
:A serious error occurred during job execution: 
Couldnt find starting point in this job.
org.pentaho.di.core.exception.KettleJobException: 
Couldnt find starting point in this job.
at org.pentaho.di.job.Job.execute(Job.java:516)
at org.pentaho.di.job.Job.run(Job.java:422)
Spoon - Job has ended.

References : 
1) http://wiki.pentaho.com/display/EAI/Named+Parameters
2) http://diethardsteiner.blogspot.in/2013/07/pentaho-kettle-parameters-and-variables.html
3) http://wiki.pentaho.com/display/EAI/Substituting+variable+references+in+Job+Parameter+values

Hope this helps some one like me  for the first time who is looking for parameters(named) concept :-)


Cheers :-)

:-) Happy New Year - Welcome - 2015 :-)


Read more »

C program to find the sum of series 1 2 4 5 7 8

C program to find the sum of series 1/2+4/5+7/8+......

#include<stdio.h>
#include<conio.h>


void main()
{
int i,n;
clrscr();
float sum=0,x,a=1;

printf("1/2+4/5+7/8+......");
printf("

How many terms(ex: 1,2,3...n)?");
scanf("%d",&n);


for(i=0;i<n;++i)
{
x=a/(a+1);
sum+=x;
a+=3;
}

printf("
Sum=%f",sum);
getch();
}
Read more »

Microsofts first Lumia coming Tuesday likely to be new low end smartphone

Microsofts first Windows smartphone since it dumped the Nokia brand will arrive on Tuesday, and a teaser from the company hints that it will be a new low-end model.



The teaser promises a smartphone for everyone, a typical way to position a budget device. The teaser doesnt offer many details beyond the Nov. 11 launch and an image of what looks like an orange smartphone with a front-facing camera, a feature missing from other low-cost Lumias. Rumored specifications include a 5-in. screen and a 5-megapixel camera.The announcement comes two weeks after the company said its switching brand names to Microsoft Lumia.


Read more »

Its time to start changing from Win XP to Windows7


Businesses are finally prying their hands from Microsoft s Windows XP as they warm to Windows 7 .

"Over the years, IT has had a real love affair with XP," said Diane Hagglund, an analyst at Dimensional Research, which surveyed 923 IT professionals about their Windows operating system adoption plans in January. "It was just a great OS. It just worked for them. But that feeling is going away."

In the new study, 40% of the respondents said that theyre worried about the hassles of maintaining the nearly nine-year-old Windows XP as it gets increasingly outdated -- up from 28% in an April 2009 Dimensional survey.

Meanwhile, 60% of the respondents said theyre worried about the cost and overhead of migrating to Windows 7, but that figure is down from 72% last year.

Confidence in Windows 7 has climbed since it shipped. Last April, 67% of those polled said they had concerns about Windows 7, which had not yet been released; this year, only 56% said they did.

"The difference was the release of the operating system, the biggest part of that from hands-on experience," Hagglund said, explaining why some in IT have changed their minds about Windows 7. "Theyre trying it at home, many of them, long before it comes to them professionally, so they know what its like."

This story was originally published in Computerworld.com.

Businesses and individual users should start changing before time catches up with them and support for Windows XP is no longer available.


Read more »

Tuesday, February 17, 2015

How To Remote Computer Using IP address

How To Remote Computer Using IP address
How To Remote Computer Using IP address

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.


 Mesothelioma Lawyers San Diego 
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.

Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.

Well, both of the hacking has the same process. Let’s summarize what we must do.
 Secured Loan Calculator 

Confirm the website or a computer you want to hack.
Find or trace their IP address.
Make sure that IP address is online
Scan for open ports
Check for venerable ports
access through the port
Brute-force username and password

Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.

For example,
ping www.google.com

will fetch the IP address of Google.com

a How to hack remote computer using IP Address

This is how we can get the IP address of the victims website.

How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.

One of the widely used method to detect IP address of your friend is by chatting with him.

You might find this article helpful

How to get the IP address using MSN/Yahoo/Pidgin messenger

Now you got the IP address right? Is it online?

To know the online status just ping the IP address, if it is online it will reply.

If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.

Use Advanced Port Scanner to scan all open and venerable ports.
b How to hack remote computer using IP Address

Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.

Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.

telnet [IP address] [Port]
c How to hack remote computer using IP Address

You’ll be asked to input login information.
d How to hack remote computer using IP Address

If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.

In this way you’ll able to hack remove computer using only IP address

  Purchase Structured Settlements
Read more »

Monday, February 16, 2015

Exporting CDE dashboard to pdf the usage of PRD for CDE

Hello guys...

Exporting chart components as images to pdf in pentaho CDE - Simple Example

Here is the functionality of exporting CDE chart components to pdf file using PRD.

Environment :
C-Tools : V13.09
Pentaho Server : 4.8
Database : foodmart (jasperserver default database)
Web browser : Mozilla Firefox

NOTE : This post is specific to export chart component(s) to pdf but not the table component you are seeing in the images in this post.

What you can learn from this example ?
1) Make use of button component for exporting dashboard charts to PDF.
2) What is CGG component ? How you can make use of CGG component in exporting charts as images to PDF ?
3) How you can use PRD(.prpt) tool to export the images to PDF.
4) How to pass parameters in the URL when you export the dashboard charts as images in pdf file.

Example :
1) Lay out section 
* Design and develop your dashboard as per your requirement.
* Find the image below
2) Data sources section
(Talking about chart only)

* Give database connections and write a simple query which gives meaning full visualization.
* For example:
SELECT fname,customer_region_id  FROM customer LIMIT 6


3) Components section

i) Take button component from others give place holder in layout section as shown in first image
ii) Give:
Name : ExportToPDF
Label: ExportToPDF
HtmlObject: ExportPDF
Expression :
Write below code:
function sendParameter(scene){
       var url=http://localhost:8085/pentaho/content/reporting/reportviewer/report.html?solution=CDEExploring&path=%2FDevelopement%2FExporting&name=ExportPDF.prpt&locale=en_US;        
       window.location=url
}
Code image is shown below.  


Well come to know from where we are taking the code above seen in image.

Here PRD(Pentaho Report Designer) comes into picture to export the CDE dashboard charts to pdf or any other format.

Below steps are the work around  with CGG(Community Graphics Generator) & PRD

For CGG complete reference find Pedros blog here
From web details http://www.webdetails.pt/ctools/cgg.html

Steps :
1) Preview your dashboard
2) Press shift+G .. you will find pop up of CGG and URL generated for the charts in your dashboard.
    i.e., once you click shift+G , pentaho Engine generates .js files related to that particular chart(s).
3) Take that URL and paste in any web browser address bar (Mozilla is preferable).
    itll generate the images of that particular .js file(i.e., for that particular URL).
4) Your browser directly doesnt know from where the data is coming.. so you need to provide the user name and password of your pentaho(for instance: if you run pentaho on joe and password for 4.8 BA server you need to give these details)
Example:

http://localhost:8085/pentaho/content/cgg/Draw?script=/CDEExploring/Developement/Exporting/DashboardExport_BarChart.js&outputType=png&userid=joe&password=password

Note that if your chart in the dashboard is using any parameter you need to pass them by adding to the url
Syntax for adding parameters : &param_name=parameter_value  
Example : &param_country=USA

5) Now, open PRD and save the .prpt file

6) Drag and drop image to "Report Header"(Preferable band) and double click on it. Give the same URL for that image, also adjust height ,width of the image. You will find the same image that you seen in web browser here in PRD image component.(If you wont find you missed some where in the development).

7) Now publish the .prpt file to Pentaho BA server.. [the folder which you are keeping your dashboards is preferable to publish your report]
    [the same way you publish schema]

8) See the preview of the report.. there you can export generated output to different formats.. lets say pdf, xlx, html and etc.

9) After seeing the preview of the .prpt file, open the same  using" Open in New window" which generates the URL for that..

10) Give the same URL in Button component " Export" property which you can find in step 3(Components section).

Thats it.. you have done with exporting chats of dashboard to pdf and other formats..


Find the images below for the same
step 1 & 2  image:

step 3 and 4 image:


Step 5 and 6 image:


Step 7 images:


Step 10 output:

Reference :
http://www.ambientbi.co.uk/?p=357

Hoping that this tutorial is helpful also hoping that there will be direct export functionality in pentaho CDE in upcoming releases from pentaho(Pedro).

Suggestions/Improvement of post are welcome in comments box :)

Read more »

C Program to Print following series 1 4 7 10 40


#include<iostream.h>
#include<conio.h>
void main()
{
clrscr();
int i,a=-1,b;
for(i=1;i<=40;i+=3)
{
     a*=-1;
     b=i;
     b*=a;
     cout<<b<<" ";
}
getch();
}
Read more »

C program to reverse a number

C++ program to reverse a number

#include<iostream.h>
#include<conio.h>

void main()
{
clrscr(); //to clear the screen
long n,rev=0,d;
cout<<"Enter the number:";
cin>>n;

while(n!=0)
{
d=n%10;
rev=(rev*10)+d;
n=n/10;
}

cout<<"The reversed number is "<<rev;
getch(); //to stop the screen
}
Read more »

C Program to print table of any number


#include<iostream.h>
#include<conio.h>


void main()
{
clrscr();
int i,n;
cout<<"Enter a ny number:";
cin>>n;
cout<<"

";



for(i=1;i<=10;++i)
cout<<" "<<n<<"*"<<i<<"="<<n*i<<"
";

getch();
}
Read more »

Using a VPN Service – How to Hide Yourself Online

Using a VPN Service – How to Hide Yourself Online

Many Internet surfers want to remain hidden or just left alone. Their reasoning might be founded on something more than just doing something illicit, or illegal. Their reasoning might be based on not wanting to be a part of the ongoing online marketing strategies that scrub personal habits away from everything we do on the Internet. Many companies are eager to get their hands on any Internet surfer’s searching habits, buying and selling preferences, and even their economic status. Most of these companies use this technology to build profiles from the information they garner to know exactly what the online surfer is interested in purchasing before they ever start looking.

Creating Anonymity

The easiest way to hide personal buying habits and other individualized data is to create an anonymous connection online, through a VPN (virtual private network). Using a VPN, the online surfer’s browser will not be recognized by intrusive eyes attempting to pry into personal information and habits. A VPN service creates anonymity by reassigning the computer’s true IP address in an exchange for an anonymous one. This will instantly create a barrier that hides the Internet surfer’s actual data including their region, name and physical address, along with the ISP (Internet service provider) that is being used.

Also Read: Tips on How to Have Better SEO Results with Link Building

A VPN service works as an intermediary between the user and the remote location or website. All requests generated from the user, or the visited website, must go through the virtual private network server. This avoids any man-in-the-middle attackers or cyber-thieves attempting to invade the Internet surfer’s privacy.

Open Access

Using a reputable VPN service provides the Internet surfer open access to any website online. They can gain instant access to social media networks, blogging sites, and streaming websites. These include Netflix, Hulu, Pandora and others that are often restricted due to high activity bandwidth. Additionally, they can visit gambling sites that have heavy restrictions between countries, and allow them to have full access.

Gaining the ability to surf online, without having any online connection session monitored or blocked, is the simplest way to hide online. A reputable VPN service can provide a continuous secured environment that is anonymous to anyone attempting to intercept personal information and data, from any location around the globe. In some countries, government rules and regulations allow law enforcement to request logs and information anytime they suspect an illegal activity from the anonymous surfer.

About Author:
Veronica Clyde reviews the best VPN  providers at VPNServices.net. She loves to share Online Security, VPN technology and Blogging tips. If interested you can check out a Hide my ass.com review.
Read more »

Sunday, February 15, 2015

How to do Unlimited Video and Voice Calls on Mobile for Free

How to do Unlimited Video and Voice Calls on Mobile for Free


Is your increasing phone and sms bill is giving you tension, than don’t be scared. There are so many communication services available on internet which allows you to do unlimited call on mobile for free. In this post I am telling you about some of these services which will help you to get rid of your increasing phone bill. For this you will only need 3G or Wi-Fi data.

Also Read: Top 5 Cheapest Android Tablets below Rs. 5000 in India in 2013

For video calling

FaceTime

http://www.apple.com/in/mac/facetime/
This is a free video calling app of Apple, which works on Wi-Fi. This works very well with second and third generation iPad, iPhone and mac. It is very easy to use.

Tinychat

tinychat.com
It is a browser based chat service. In this you can create a room for chat, for this you have to just do signup. In this room you can invite your friends as a guest. Your friends can chat with you without doing signup process.

For video and voice calling

Nimbuzz

nimbuzz.com
This application works very nicely on smartphones as well as on feature loaded phones. It contains desktop client for windows and mac. To do free chat you have to do free signup in nimbuzz account, after this you can add people to your contacts. You can do free voice calls with the help of 3G or Wi-Fi. It also allows you to do chat with your friends on google talk, yahoo chat, msn and facebook account.

Oovoo

oovoo.com
It provides you video calling services in twelve different ways on your computer or mobile. Its main feature is that it allows you to send files and record your calls.

Also Read: The 12 Best Tools To Protect Your Password

Rocketalk

rocketalk.com
You can’t do video chat with the help of this ,but it allows you to send photos, videos and text messages. It is freely available on the internet for all android and java feature loaded phones.

Skype

skype.com
It work on android, IOS, windows and symbian phones. If you have 3G or Wi-Fi than with the help of skype you can do free call to any skype mobile user.    

Fring

fring.com
With fring you can do free voice calls, video calls and instant messaging on 3G or Wi-Fi. It provides free four ways group video chat service. It is available for IOS, android and symbian phones.

Viber

viber.com
It is available for android, IOS, windows and blackberry phones. You can do free unlimited call and send messages to a person who have viber installed handset. This works on 3G and Wi-Fi, for this you have to only pay for data.
Read more »

How to Make a Notepad in VB Net

In today’s article I am going to provide you a simple notepad source code developed in visual basic.net. So the notepad uses very simple controls like RichTextBox1 and MenuStrips that is used to design the graphical interface. The code is very simple and self explanatory. This notepad has options like File, Edit, Format and Help.

Also Read: How to Create a Web Browser in Visual Basic

How to Make a Notepad in VB.Net

How to Use?


  1. Unzip the rar file we have provided to your favorite folder
  2. Open Visual Studio, go to File > Open > Project/Solution
  3. Navigate to the folder where you have extracted the rar file
  4. Open Notepad.sln file
  5. Now you can make changes in the program

Download the notepad source code from below link.

- Download Notepad Source Code -

Read more »

How To Hack Into Someone Facebook Account

How To Hack Into Someone Facebook Account
Hacking Facebook
A note for the newcomers - Contrary to popular belief there doesnt exist some secret software where one can just put in an email id, press "Enter" and all the passwords associated with that account magically appear. Hacking facebook, like any other hack takes time, skill and effort. Also, the methods are much the same for hacking any type of account for that matter.

There are 3 main methods used when it comes to Hacking Facebook accounts. Briefly,They are :

1.Keyloggers : Making the victim open up his account on a system with a keylogger attached/ Sending a remote keylogger to the victim.
2.Phishing : Making a fake login page and having the entered details sent to you.(This has been explained in the "Starting Off" section).
3.Social Engineering : This is just a fancy term for making the victim give up vital information in a supposedly casual conversation. The information may be the users recovery questions answer, which can then be used to take over the account via : "Forgot your password? Click Here!" Button.

Some time ago, Facebook developers patched in a new security feature. In a nutshell, if facebook detects that your IP address is different from the usual(previously used) IP addresses, it may stop you from logging in without further identity verification which may be, for example: an SMS code. Now this can potentially effect every type of hack, but if it is infact possible there is only one way to know- By doing it. Hope for the best, Prepare for the worst.

1.Keyloggers:
A Keylogger is type of software that usually runs in the background, without the knowledge of an innocent victim and secretly records their actions. A wide variety of functionality is offered by various products : Almost all record every keystroke on the keyboard in a simple text file format, some record mouse clicks and pointer locations, some record folders and files opened and some even take screenshots at regular intervals.
Most of the keyloggers provide an option whether to store the text file locally send it to an FTP server or your email id. They can be installed and set up relatively easily like any other program. Once setup, they usually go into hiding as a background process leaving no trace on the surface and starting up automatically when the operating system starts.

For some reason people seem to avoid or look over keyloggers, I can give you my word this is the best and easiest method for hacking any type of account there is, so definitely check this out. In our case, we want the victim to login to their facebook account on a compromised system, one that has a stealthy keylogger installed. There are two ways to go about this :Installing a keylogger on your system and having them use it to login to their FB account, or if you have temporary access to their system- Installing it on their computer and having the log files sent to you by email or FTP.
Whichever way you prefer, the method is the same. Download a keylogger, follow the smooth setup instructions as you would when installing anything, customize settings according to your preference and Let it rip !
I have personally tried and tested the following keyloggers, you can choose any of these randomly since they all seem to do the job :

(i)Actual key-logger - Download from http://www.actualkeylogger.com/download-free-key-logger.html
(ii)Home key-logger - Download from http://www.kmint21.com/download.html
(iii) REFOG Free key-logger - Download from https://www.refog.com/download.html

(P.S- Certain full versions of very good keyloggers are available as torrents from websites like isohunt.com , kickass.to but these torrents are illegal and we shouldnt use them)

2.Phishing : This method has been described in great detail in the "Starting Off" section. Follow the instructions carefully while using facebook.com instead of gmail.com.

3.Social Engineering : Facebook uses security questions as a recovery method, almost everyone sets it up to a personal question like :
"Where were you born? "
"What was your first pets name? "

Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.
A social engineer runs what used to be called a "con game." For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the networks security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access.
Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques.

For this method to work, you need to know the person whos account you want to hack. In fact, you need to know them well enough, such that it doesnt seem suspicious when you carefully try to work up their recovery questions into your conversation and get them to answer it casually.
After that,using the "Forgot your password? Click Here!" Button one can simply turn over an accounts user. But even after this, your work is not done yet. Nowadays facebook has implemented a 24 hour delay before recovering the account and logging in, So if the victim happens to log in during that period they can reverse the process in seconds. Not only do you need careful planning, but also careful timing.
Facebook uses a verification method during recovery -if the victims email and phone number are no longer functional it asks to put in another phone number. If you can somehow get a hold of their cell phones or email accounts their account is yours, otherwise the process may be slow and fruitless.
Read more »

Migrating data from Oracle database to Postgresql database using Pentaho Kettle


This post will talk about migrating data from Oracle database to Postgresql database.

The same can be doable from one database to another database.(i.e., for example MS-SQL server to postgreSQL).

Pentaho has its in built wizard tools to Migrate data from one database to another another database.

Find the below steps how we can use this in-buit tool in migrating.

1) Create source database connection and target database connection.

i.e., for example oralce connection as source and postgresql connection as target.

Go to Tools -> Wizard -> Create database connection.

Repeat the same for postgresql connection.

2) Go to Tools -> Wizard ->Copy Tables . Find the below images.





3) Itll create a job and “N” number of transformations based upon the number of tables in oracle database.

4) Run your job.. Thats all we have done.

Check the description & content of the tables in postgres.


References : 

https://wiki.postgresql.org/wiki/Migrating_from_one_database_to_another_with_Pentaho_ETL


http://wiki.pentaho.com/display/COM/Using+the+Copy+Table+Wizard

Read more »

C Program to Count no of alphabates digits and spaces present in a file STORY TXT

C++ Program to Count no. of alphabates,digits and spaces present in a file STORY.TXT

#include<fstream.h>
#include<conio.h>

void main()
{
clrscr();
ifstream  fin("STORY.TXT");
char ch;
int i,a=0,s=0,d=0;

while(fin)
{
fin.get(ch);
i=ch;
if(i>63&&i<91||i>96&&i<123)
a++;
else
if(ch== )
s++;
else
if(i>47&&i<58)
d++;
}
cout<<"No. OF Alphabates:"<<a;
cout<<"
No. Of Digits:"<<d;

cout<<"
No. Of Spaces:"<<s;

getch();
}
Read more »

Best Way to Easily Find and Remove Broken Links from your Website or Blog


Best Way to Easily Find and Remove Broken Links from your Website or Blog

What are Broken Links?

Broken links are the links which leads to a page that actually does not exist. When you publish any article on your blog than search engines like Google indexe it and add your article information to its database. After some days or months if you delete your previously published article than it is removed from your blog database but not from Google database. If anyone search for a keyword related to your article on Google than your article link come up in the search results. And if he/she clicks on the link then it leads to a 404 error page.

Also Read: The Top 10 Websites to create free Logo for your Blog

404 error pages and broken links have a negative effect on SEO and which decreases your search engine ranking. Let’s take an example to explain it more clearly. Suppose if you search for a keyword on Google, than so many search results come up. When you click one of them you may come across a 404 error page. Now tell me that, what you will do in this situation? You will immediately leave that site and go for another one. Google consider this as bad practice and which gradually leads to decrease in your search engine ranking.

In this post I am going to tell you the best way to easily find and remove broken links from your blog. This can be done by using an online tool Google Webmaster Tool. This is one of the tool that I occasionally use to detect and remove broken links from my blog. If you have a blogger blog then there is no need to register but if you have a wordpress blog then you have to first register your blog. Let’s see how to remove these useless links from Google database.

Also Read: Tips on How to Have Better SEO Results with Link Building

How to Find and Remove Broken Links?

1. First of all login to Google Webmaster Tool by going to the link given below:
            http://www.google.com/webmasters/
2. Now go to Dashboard and select the blog that you want (if you have more than one) from the drop down menu situated at right top.
3. Go to Health>Crawl Errors and than click on Not found option as shown below.

Best Way to Easily Find and Remove Broken Links from your Website or Blog
(click on the image to enlarge)

4. After that you will see a list of all the broke links in your blog. Than click on any link from the list, now a new pop-up window will open, copy the link from there.
5. Now go to Optimization>Remove URLs and than click on Create a new removal request, paste the link that you have copied earlier in the box as shown below and than click on Continue button.

Best Way to Easily Find and Remove Broken Links from your Website or Blog
(click on the image to enlarge)

6. A new window will open,there click on Submit Request as shown below.

Best Way to Easily Find and Remove Broken Links from your Website or Blog
(click on the image to enlarge)

7. After completing this process just mark all the links as fixed so that these links will be not listed in the Not found list, otherwise they may confuse you in future.
8. You have done…..! Do you have any query? You are free to ask, just comment below.

Note: Google webmaster Tool will take some time to remove these URLs from Google database.
Read more »

How to create MySQL Database and User name


Hi Users, Today Im telling you How to create MySQL Database and User. It is very easy to create but first you have to know that what is this:

What is MySQL:
MySQL is an open source database management software that helps users store, organize, and later retrieve data. It has a variety of options to grant specific users nuanced permissions within the tables and databases, May this tutorial gives you some kind of thinking about MySQL........!So now we lets start

How to Create MySQL Database and User:
Step 1: Login to your Web hosting account and open your control panel ( Cpanel ).
Step 2: Find Databases portion look like this: for example

Step 3: Now click on MySQL Database and this screen will appeared look like given below image: Write your name or nick name as you want in New Database black box and click on Create Database.

After click on Create Database button then you will see the given below screen. In the MySQL DB name means Your Database name and in the MySQL Host name means where you are required to enter your local host then you will type this ( your MySQL Host Name).

Congratulation you have done it.For more detail How to Install WordPress
Read more »

Saturday, February 14, 2015

C program to count number of words in a string


C program to count number of words in a string

#include<stdio.h>
#include<conio.h>

void main()
{
int i,words=1;
char str[100];
clrscr();
printf("Enter a string:");
gets(str);
for(i=0;str[i]!=
Read more »