Thursday, February 19, 2015
C program to copy the contents of one file into another

#include<stdio.h>
#include<conio.h>
#include<stdlib.h>
void main()
{
FILE *fp1,*fp2;
char ch,*f1,*f2;
clrscr();
printf("Enter source file name(ex:source.txt): ");
scanf("%s",f1);
printf("Enter destination file name(ex:destination.txt): ");
scanf("%s",f2);
fp1=fopen(f1,"r");
fp2=fopen(f2,"w");
if(fp1==NULL||fp2==NULL)
{
printf("File could not open!!");
exit(0);
}
while((ch=getc(fp1))!=EOF)
putc(ch,fp2);
fclose(fp1);
fclose(fp2);
}
Wednesday, February 18, 2015
Java program to check whether a number is prime or not

class prime
{
public static void main(String...s)
{
int n,i;
n=Integer.parseInt(s[0]);
for(i=2;i<n;++i)
{
if(n%i==0)
break;
}
if(i==n)
System.out.println("
Number is prime");
else
System.out.println("
Number is not prime");
}
}
Kettle Pass parameters from job to transformation in PDI Retrieve data from table by passing table name as parameter
Software Setup :
PDI 5.1.0 CE
PostgreSQL
Concept : Retrieve data from table by passing table name as parameter.
You will learn below things
1) Table input step & database connections
2) Creating parameter(s) in Transformation(s) & Job(s)
3) Passing parameter(s) from job to transformation.
Lets say in foodmart database you have below tables 1) region 2) product 3) customer and etc.
Every time when you pass different table name as parameter you should able to fetch the data coming from the passed table.
1) Table input step & database connections
2) Creating parameter(s) in Transformation(s) & Job(s)
1) Create a new transformation & drag and drop "Table Input" step from Design Pane.

2) Double Click on "Table input" step & Click on New tab to give database connections as shown in below image

3) Define the parameter in transformation ( in this example the table name should go as parameter).
Image A : Right Click on the empty space to get the transformation settings.
Image B : Database Connection Details
Parameter Name is : tableName


4) Come back to the properties of "Table input" & write select statement to retrieve the data.
Eg : SELECT * FROM product LIMIT 100
In above example "product" is the table name that you have to replace with the parameter.
i.e., SELECT * FROM ${tableName} LIMIT 100
Once you write the query, come down check "Replace variables in script"

5) Take a "Dummy" step and connect it to "Table input step" . Save the transformation & run it on "Dummy Step"( Right click dummy step and click on "Preview".
OUTPUT : Test 1 : With "region" table

OUTPUT : Result 1

OUTPUT : Test 2 : With "product" table
* Right click Dummy step then click on Preview
* Click on Configure & then in parameters tab give "product" for tableName value parameter.
OUTPUT : Result 2

3) Passing parameter(s) from job to transformation
* Crtl+Alt to create a new job
* From the "General" node of Design tab ( Appears left side) drag and drop "Transoformation step".
* Drag and drop "START" step and connect these two as shown in below image.

* Double click on "Transformation" step to set the properties & parameter information.
* Browse for the transformation file and then move to parameters tab
* Click on "Get Parameters" then you can find parameter get apper under Parameter tab.
* Right click on empty canvas of job to get its settings & move to Parameters tab and give parameter name as "tableName" and provide default value.
Save the job and run it.
IMP NOTE :
1) Parameter names in job & transformation should match.
2) You can create n number of parameters in job but can pass as many you wish.
3) In job design you should take "START" step to tell the job to start execution from there.
If you ignore you will get below error ( which took me awhile to solve it for the very first time).
Start of job execution
:A serious error occurred during job execution:
Couldnt find starting point in this job.
org.pentaho.di.core.exception.KettleJobException:
Couldnt find starting point in this job.
at org.pentaho.di.job.Job.execute(Job.java:516)
at org.pentaho.di.job.Job.run(Job.java:422)
Spoon - Job has ended.
References :
1) http://wiki.pentaho.com/display/EAI/Named+Parameters
2) http://diethardsteiner.blogspot.in/2013/07/pentaho-kettle-parameters-and-variables.html
3) http://wiki.pentaho.com/display/EAI/Substituting+variable+references+in+Job+Parameter+values
Hope this helps some one like me for the first time who is looking for parameters(named) concept :-)
Cheers :-)
:-) Happy New Year - Welcome - 2015 :-)
C program to find the sum of series 1 2 4 5 7 8

How many terms(ex: 1,2,3...n)?");
Sum=%f",sum);
Microsofts first Lumia coming Tuesday likely to be new low end smartphone
The teaser promises a smartphone for everyone, a typical way to position a budget device. The teaser doesnt offer many details beyond the Nov. 11 launch and an image of what looks like an orange smartphone with a front-facing camera, a feature missing from other low-cost Lumias. Rumored specifications include a 5-in. screen and a 5-megapixel camera.The announcement comes two weeks after the company said its switching brand names to Microsoft Lumia.
Its time to start changing from Win XP to Windows7

Businesses are finally prying their hands from Microsoft s Windows XP as they warm to Windows 7 .
"Over the years, IT has had a real love affair with XP," said Diane Hagglund, an analyst at Dimensional Research, which surveyed 923 IT professionals about their Windows operating system adoption plans in January. "It was just a great OS. It just worked for them. But that feeling is going away."
In the new study, 40% of the respondents said that theyre worried about the hassles of maintaining the nearly nine-year-old Windows XP as it gets increasingly outdated -- up from 28% in an April 2009 Dimensional survey.
Meanwhile, 60% of the respondents said theyre worried about the cost and overhead of migrating to Windows 7, but that figure is down from 72% last year.
Confidence in Windows 7 has climbed since it shipped. Last April, 67% of those polled said they had concerns about Windows 7, which had not yet been released; this year, only 56% said they did.
"The difference was the release of the operating system, the biggest part of that from hands-on experience," Hagglund said, explaining why some in IT have changed their minds about Windows 7. "Theyre trying it at home, many of them, long before it comes to them professionally, so they know what its like."
This story was originally published in Computerworld.com.
Businesses and individual users should start changing before time catches up with them and support for Windows XP is no longer available.
Tuesday, February 17, 2015
How To Remote Computer Using IP address
| How To Remote Computer Using IP address |
Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.
Mesothelioma Lawyers San Diego
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.
Well, both of the hacking has the same process. Let’s summarize what we must do.
Secured Loan Calculator
Confirm the website or a computer you want to hack.
Find or trace their IP address.
Make sure that IP address is online
Scan for open ports
Check for venerable ports
access through the port
Brute-force username and password
Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping www.google.com
will fetch the IP address of Google.com
a How to hack remote computer using IP Address
This is how we can get the IP address of the victims website.
How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.
One of the widely used method to detect IP address of your friend is by chatting with him.
You might find this article helpful
How to get the IP address using MSN/Yahoo/Pidgin messenger
Now you got the IP address right? Is it online?
To know the online status just ping the IP address, if it is online it will reply.
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Use Advanced Port Scanner to scan all open and venerable ports.
b How to hack remote computer using IP Address
Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.
Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port]
c How to hack remote computer using IP Address
You’ll be asked to input login information.
d How to hack remote computer using IP Address
If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.
In this way you’ll able to hack remove computer using only IP address
Purchase Structured Settlements
Monday, February 16, 2015
Exporting CDE dashboard to pdf the usage of PRD for CDE
Exporting chart components as images to pdf in pentaho CDE - Simple Example
Here is the functionality of exporting CDE chart components to pdf file using PRD.
Environment :
C-Tools : V13.09
Pentaho Server : 4.8
Database : foodmart (jasperserver default database)
Web browser : Mozilla Firefox
NOTE : This post is specific to export chart component(s) to pdf but not the table component you are seeing in the images in this post.
What you can learn from this example ?
1) Make use of button component for exporting dashboard charts to PDF.
2) What is CGG component ? How you can make use of CGG component in exporting charts as images to PDF ?
3) How you can use PRD(.prpt) tool to export the images to PDF.
4) How to pass parameters in the URL when you export the dashboard charts as images in pdf file.
Example :
1) Lay out section
* Design and develop your dashboard as per your requirement.
* Find the image below

(Talking about chart only)
* Give database connections and write a simple query which gives meaning full visualization.
* For example:
SELECT fname,customer_region_id FROM customer LIMIT 6
3) Components section
i) Take button component from others give place holder in layout section as shown in first image
ii) Give:
Name : ExportToPDF
Label: ExportToPDF
HtmlObject: ExportPDF
Expression :
Write below code:
function sendParameter(scene){
var url=http://localhost:8085/pentaho/content/reporting/reportviewer/report.html?solution=CDEExploring&path=%2FDevelopement%2FExporting&name=ExportPDF.prpt&locale=en_US;
window.location=url
}
Code image is shown below.

Well come to know from where we are taking the code above seen in image.
Here PRD(Pentaho Report Designer) comes into picture to export the CDE dashboard charts to pdf or any other format.
Below steps are the work around with CGG(Community Graphics Generator) & PRD
For CGG complete reference find Pedros blog here
From web details http://www.webdetails.pt/ctools/cgg.html
Steps :
1) Preview your dashboard
2) Press shift+G .. you will find pop up of CGG and URL generated for the charts in your dashboard.
i.e., once you click shift+G , pentaho Engine generates .js files related to that particular chart(s).
3) Take that URL and paste in any web browser address bar (Mozilla is preferable).
itll generate the images of that particular .js file(i.e., for that particular URL).
4) Your browser directly doesnt know from where the data is coming.. so you need to provide the user name and password of your pentaho(for instance: if you run pentaho on joe and password for 4.8 BA server you need to give these details)
Example:
http://localhost:8085/pentaho/content/cgg/Draw?script=/CDEExploring/Developement/Exporting/DashboardExport_BarChart.js&outputType=png&userid=joe&password=password
Note that if your chart in the dashboard is using any parameter you need to pass them by adding to the url
Syntax for adding parameters : ¶m_name=parameter_value
Example : ¶m_country=USA
5) Now, open PRD and save the .prpt file
6) Drag and drop image to "Report Header"(Preferable band) and double click on it. Give the same URL for that image, also adjust height ,width of the image. You will find the same image that you seen in web browser here in PRD image component.(If you wont find you missed some where in the development).
7) Now publish the .prpt file to Pentaho BA server.. [the folder which you are keeping your dashboards is preferable to publish your report]
[the same way you publish schema]
8) See the preview of the report.. there you can export generated output to different formats.. lets say pdf, xlx, html and etc.
9) After seeing the preview of the .prpt file, open the same using" Open in New window" which generates the URL for that..
10) Give the same URL in Button component " Export" property which you can find in step 3(Components section).
Thats it.. you have done with exporting chats of dashboard to pdf and other formats..
Find the images below for the same
step 1 & 2 image:

step 3 and 4 image:

Step 5 and 6 image:

Step 7 images:

Step 10 output:

Reference :
http://www.ambientbi.co.uk/?p=357
Hoping that this tutorial is helpful also hoping that there will be direct export functionality in pentaho CDE in upcoming releases from pentaho(Pedro).
Suggestions/Improvement of post are welcome in comments box :)
C Program to Print following series 1 4 7 10 40
#include<iostream.h>
#include<conio.h>
void main()
{
clrscr();
int i,a=-1,b;
for(i=1;i<=40;i+=3)
{
a*=-1;
b=i;
b*=a;
cout<<b<<" ";
}
getch();
}
C program to reverse a number
#include<iostream.h>
#include<conio.h>
void main()
{
clrscr(); //to clear the screen
long n,rev=0,d;
cout<<"Enter the number:";
cin>>n;
while(n!=0)
{
d=n%10;
rev=(rev*10)+d;
n=n/10;
}
cout<<"The reversed number is "<<rev;
getch(); //to stop the screen
}
C Program to print table of any number
#include<iostream.h>
#include<conio.h>
void main()
{
clrscr();
int i,n;
cout<<"Enter a ny number:";
cin>>n;
cout<<"
";
for(i=1;i<=10;++i)
cout<<" "<<n<<"*"<<i<<"="<<n*i<<"
";
getch();
}
Using a VPN Service – How to Hide Yourself Online

Creating Anonymity
Open Access
Sunday, February 15, 2015
How to do Unlimited Video and Voice Calls on Mobile for Free

For video calling
FaceTime
Tinychat
For video and voice calling
Nimbuzz
Oovoo
Also Read: The 12 Best Tools To Protect Your Password
Rocketalk
Skype
Fring
Viber
How to Make a Notepad in VB Net
Also Read: How to Create a Web Browser in Visual Basic

How to Use?
- Unzip the rar file we have provided to your favorite folder
- Open Visual Studio, go to File > Open > Project/Solution
- Navigate to the folder where you have extracted the rar file
- Open Notepad.sln file
- Now you can make changes in the program
- Download Notepad Source Code -
How To Hack Into Someone Facebook Account
![]() |
| Hacking Facebook |
There are 3 main methods used when it comes to Hacking Facebook accounts. Briefly,They are :
1.Keyloggers : Making the victim open up his account on a system with a keylogger attached/ Sending a remote keylogger to the victim.
2.Phishing : Making a fake login page and having the entered details sent to you.(This has been explained in the "Starting Off" section).
3.Social Engineering : This is just a fancy term for making the victim give up vital information in a supposedly casual conversation. The information may be the users recovery questions answer, which can then be used to take over the account via : "Forgot your password? Click Here!" Button.
Some time ago, Facebook developers patched in a new security feature. In a nutshell, if facebook detects that your IP address is different from the usual(previously used) IP addresses, it may stop you from logging in without further identity verification which may be, for example: an SMS code. Now this can potentially effect every type of hack, but if it is infact possible there is only one way to know- By doing it. Hope for the best, Prepare for the worst.
1.Keyloggers:
A Keylogger is type of software that usually runs in the background, without the knowledge of an innocent victim and secretly records their actions. A wide variety of functionality is offered by various products : Almost all record every keystroke on the keyboard in a simple text file format, some record mouse clicks and pointer locations, some record folders and files opened and some even take screenshots at regular intervals.
Most of the keyloggers provide an option whether to store the text file locally send it to an FTP server or your email id. They can be installed and set up relatively easily like any other program. Once setup, they usually go into hiding as a background process leaving no trace on the surface and starting up automatically when the operating system starts.
For some reason people seem to avoid or look over keyloggers, I can give you my word this is the best and easiest method for hacking any type of account there is, so definitely check this out. In our case, we want the victim to login to their facebook account on a compromised system, one that has a stealthy keylogger installed. There are two ways to go about this :Installing a keylogger on your system and having them use it to login to their FB account, or if you have temporary access to their system- Installing it on their computer and having the log files sent to you by email or FTP.
Whichever way you prefer, the method is the same. Download a keylogger, follow the smooth setup instructions as you would when installing anything, customize settings according to your preference and Let it rip !
I have personally tried and tested the following keyloggers, you can choose any of these randomly since they all seem to do the job :
(i)Actual key-logger - Download from http://www.actualkeylogger.com/download-free-key-logger.html
(ii)Home key-logger - Download from http://www.kmint21.com/download.html
(iii) REFOG Free key-logger - Download from https://www.refog.com/download.html
(P.S- Certain full versions of very good keyloggers are available as torrents from websites like isohunt.com , kickass.to but these torrents are illegal and we shouldnt use them)
2.Phishing : This method has been described in great detail in the "Starting Off" section. Follow the instructions carefully while using facebook.com instead of gmail.com.
3.Social Engineering : Facebook uses security questions as a recovery method, almost everyone sets it up to a personal question like :
"Where were you born? "
"What was your first pets name? "
Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.
A social engineer runs what used to be called a "con game." For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the networks security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access.
Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques.
For this method to work, you need to know the person whos account you want to hack. In fact, you need to know them well enough, such that it doesnt seem suspicious when you carefully try to work up their recovery questions into your conversation and get them to answer it casually.
After that,using the "Forgot your password? Click Here!" Button one can simply turn over an accounts user. But even after this, your work is not done yet. Nowadays facebook has implemented a 24 hour delay before recovering the account and logging in, So if the victim happens to log in during that period they can reverse the process in seconds. Not only do you need careful planning, but also careful timing.
Facebook uses a verification method during recovery -if the victims email and phone number are no longer functional it asks to put in another phone number. If you can somehow get a hold of their cell phones or email accounts their account is yours, otherwise the process may be slow and fruitless.
Migrating data from Oracle database to Postgresql database using Pentaho Kettle




http://wiki.pentaho.com/display/COM/Using+the+Copy+Table+Wizard
C Program to Count no of alphabates digits and spaces present in a file STORY TXT
#include<fstream.h>
#include<conio.h>
void main()
{
clrscr();
ifstream fin("STORY.TXT");
char ch;
int i,a=0,s=0,d=0;
while(fin)
{
fin.get(ch);
i=ch;
if(i>63&&i<91||i>96&&i<123)
a++;
else
if(ch== )
s++;
else
if(i>47&&i<58)
d++;
}
cout<<"No. OF Alphabates:"<<a;
cout<<"
No. Of Digits:"<<d;
cout<<"
No. Of Spaces:"<<s;
getch();
}
Best Way to Easily Find and Remove Broken Links from your Website or Blog

What are Broken Links?
Broken links are the links which leads to a page that actually does not exist. When you publish any article on your blog than search engines like Google indexe it and add your article information to its database. After some days or months if you delete your previously published article than it is removed from your blog database but not from Google database. If anyone search for a keyword related to your article on Google than your article link come up in the search results. And if he/she clicks on the link then it leads to a 404 error page.Also Read: The Top 10 Websites to create free Logo for your Blog
Also Read: Tips on How to Have Better SEO Results with Link Building
How to Find and Remove Broken Links?
How to create MySQL Database and User name

What is MySQL:
MySQL is an open source database management software that helps users store, organize, and later retrieve data. It has a variety of options to grant specific users nuanced permissions within the tables and databases, May this tutorial gives you some kind of thinking about MySQL........!So now we lets start
How to Create MySQL Database and User:
Step 1: Login to your Web hosting account and open your control panel ( Cpanel ).
Step 2: Find Databases portion look like this: for example

Step 3: Now click on MySQL Database and this screen will appeared look like given below image: Write your name or nick name as you want in New Database black box and click on Create Database.

After click on Create Database button then you will see the given below screen. In the MySQL DB name means Your Database name and in the MySQL Host name means where you are required to enter your local host then you will type this ( your MySQL Host Name).

Saturday, February 14, 2015
C program to count number of words in a string

#include<stdio.h>
#include<conio.h>
void main()
{
int i,words=1;
char str[100];
clrscr();
printf("Enter a string:");
gets(str);
for(i=0;str[i]!=
