Banner Ad

    A    L    W    A    Y    S           D    E    S    I    R    E           T    O           L    E    A    R    N           S    O    M    E    T    H    I    N    G           U    S    E    F    U    L   

Technology and business

technology and business are becoming inextricably interwoven. I don't think anybody can talk meaningfully about one without the talking about the other

Arthur C. Clarke

Any sufficiently advanced technology is indistinguishable from magic.

Bill Gates is a very rich man today... and do you want to know why? The answer is one word: versions.

Softwares

Defect-free software does not exist.

Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.

Friday, November 8, 2013

All Head First Series Ebooks Collection for free

All Head First Series Ebooks Collection











Computers

Head First Data Analysis.pdf 23 MB
Head First Networking.pdf 38 MB
Head First WordPress.pdf 27 MB
HeadFirst WebDesign.pdf 40 MB

Languages

Head First Ajax.pdf 50 MB
Head First C#.pdf 71 MB
Head First HTML with CSS and XHTML.chm 1 MB
Head First HTML with CSS and XHTML.pdf 21 MB
Head First Java.pdf 34 MB
Head First Javascript.pdf 51 MB
Head First PHP and MySQL.pdf 32 MB
Head First Python.pdf 17 MB
Head First Rails.pdf 37 MB
Head First SQL.pdf 48 MB
Head First Servlets and JSP.pdf 64 MB

Mathematics

Head First 2D Geometry.pdf 21 MB
Head First Algebra.pdf 25 MB
Head First Physics.pdf 56 MB
Head First Statistics.pdf 37 MB

Others

Head First - PMP.pdf 59 MB
O'Reilly - Programming WPF, 2nd Edition.pdf 10 MB

Programming

Head First Design Patterns.pdf 39 MB
Head First Iphone Development.pdf 17 MB
Head First Object-Oriented Design and Analysis.pdf 52 MB
Head First Software Development.pdf 43 MB

http://torrage.com/torrent/0B4BB253080D3913E9C8251B3A4789BF3EFBD83F.torrent

Sunday, September 1, 2013

Easy and fast way to add PayPal payment gateway to your website

following is paypal Buy now button java script code
You need to add paypal-button.min.js   click here to download and
add as follows between your <head> tag 



or add github URL https://raw.github.com/paypal/JavaScriptButtons/master/dist/paypal-button.min.js


<script 
    data-callback="http://sep06.netne.net/online_portal/controller_b/post_ad/success" 
    data-tax="0" 
    data-shipping="0" 
    data-amount="5.5" 
    data-name="harsha" 
    data-button="buynow" src="https://raw.github.com/paypal/JavaScriptButtons/master/dist/paypal-button.min.js?merchant=harshagayan90@gmail.com"
>
</script>





here you need to customize your code as followsmerchant="Your paypal email"
data-name="What you need to appear in pay slip"
data-amount="How much money you want in $ s"

PHP codigniter ajax call to load dropdown when another dropdown changes

<select id="makes2" name="makes2" style="width:200px;" data-hint="" onchange="load_dropdown_content1($('#field2'), this.value)">
                          <?php 
$sql = mysql_query("SELECT distinct make FROM advertisements");
while ($row = mysql_fetch_array($sql)){
echo "<option value='".$row['make']."'>" . $row['make'] . "</option>";
}
?>

</select>



here my values are hard coded to load values from mysql database

when dropdown onchange() function following javascript function will be called


here my controller compareVehicles --> get_dropdown_values1 function is called asynchronously



<script type="text/javascript">


function load_dropdown_content1(field_dropdown1, selected_value1){
   var result = $.ajax({
        'url' : '<?php echo site_url('compareVehicles/get_dropdown_values1'); ?>/'+selected_value1,
        'async' : false
    }).responseText;
    field_dropdown1.replaceWith(result);





}


inside the controller my function as follows



function get_dropdown_values1($filter11){

        $this->load->model('model_c/cmp_vehi_model');

        $result1 = $this->cmp_vehi_model->get_options1($filter11);

foreach($result1 as  $key1 => $value1){

$final1 = array('{$key1}' => $value1);

}

        $this->load->helper('form');

       
echo "<select name=\"field2\" id=\"field2\" onchange=\"load_dropdown_contentad($('#field5'), this.value);\" onblur=\"load_dropdown_contentad($('#field5'), this.value);\"  onfocus=\"load_dropdown_contentad($('#field5'), this.value);\"  style=\"width:200px\"  >";
    

foreach($result1 as  $key1 => $value1){
echo"<option value='{$value1}'>{$value1}</option>";
}

echo "</select>";


    }





model that is calling from controller as follows


function get_options1($filter11){

$query1 = $this->db->query("SELECT distinct modelnumber FROM advertisements WHERE make LIKE '".$filter11."'");
$result1 = $query1->result_array();

$x1 = array();
foreach($result1 as $i1){

array_push($x1, $i1['modelnumber']);

}


 
        return $x1;

    }



in my controller php code is  echo to load ajax called dropdown
Please go to following link to see how it works
http://sep06.netne.net/online_portal/index.php/controller_c/compareVehicles/cmpVehicles

How to define static javascript variable

<script type="text/javascript">
checkadid.count=0;
checkadid.adid="";



function checkadid(checkbox)
{

checkadid.adid=checkadid.adid.concat(checkbox.value);

    if (checkbox.checked)
    {
        
    }


}

</script>


here my javascript static variable is checkadid.adid
since javascripts are weakly type there is no hard and fast rules you need to define variable as above

and i used this static variable access to following java script function


function load_table(){


 
var aid=checkadid.adid;
 
if(aid.length<=6){
 
alert("Please select at least 2 advertistment")
 
}
else{
     window.location.href="<?php echo site_url('controller_c/compareVehicles/ctable'); ?>?aid="+aid;

}

  }



static java script variable can access from any where within any javascript function

Click here to learn about javascript variables





Monday, March 25, 2013

Vehicle Reservation System

2nd year 1st semester programming assignment(Vehicle reservation system)


you must restore mysql database for run this software Click here to download SQL file

If you are having problem with generating ireports this will help you. (download ireport basic tutorial)



Software developed using Netbeans IDE  1.7JDK
For generating reports i used  (iroport)
database  : mySql



following are some of the screen shots of the software












Sunday, March 24, 2013

Ethical Hacking






Files:
01.Introduction / 01.Course Overview.mov 2 MB

02.Ethical Hacking & Penetration Testing / 01.What is Ethical Hacking.mov 2.1 MB
02.Ethical Hacking & Penetration Testing / 02.Types of Ethical Hacking.mov 2.2 MB
02.Ethical Hacking & Penetration Testing / 03.Responsibilities of the Ethical Hacker .mov 1.3 MB
02.Ethical Hacking & Penetration Testing / 04.Customer Expectations.mov 1.7 MB
02.Ethical Hacking & Penetration Testing / 05.Skills of the Hacker.mov 1.8 MB
02.Ethical Hacking & Penetration Testing / 06.Relevant Laws.mov 1.7 MB
02.Ethical Hacking & Penetration Testing / 07.Preparation.mov 1.9 MB
02.Ethical Hacking & Penetration Testing / 08.Types of Attacks.mov 828.9 KB

03.Methodology Overview / 01.Your Goals.mov 1.1 MB
03.Methodology Overview / 02.Formal Methodologies.mov 1.8 MB
03.Methodology Overview / 03.Reconnaissance.mov 1.4 MB
03.Methodology Overview / 04.Scanning.mov 1.2 MB
03.Methodology Overview / 05.Service Enumeration.mov 1.5 MB
03.Methodology Overview / 06.Vulnerability Assessment.mov 1.1 MB
03.Methodology Overview / 07.Vulnerability Exploitation.mov 1.3 MB
03.Methodology Overview / 08.Privilege Escalation & Owning the Box.mov 1.1 MB
03.Methodology Overview / 09.Evading Defenses & Erasing Tracks.mov 1.6 MB
03.Methodology Overview / 10.Maintaining & Expanding Access.mov 1.4 MB

04.Reconnaissance (Footprinting) / 01.Passive Reconnaissance.mov 2.2 MB
04.Reconnaissance (Footprinting) / 02.Using WHOIS & Other Tools.mov 1.3 MB
04.Reconnaissance (Footprinting) / 03.Active Reconnaissance.mov 1.7 MB
04.Reconnaissance (Footprinting) / 04.Active Reconnaissance Tools & Methods.mov 1.9 MB
04.Reconnaissance (Footprinting) / 05.Putting It All Together.mov 1.4 MB
04.Reconnaissance (Footprinting) / 06.Reconnaissance Demo.mov 8.8 MB

05.Scanning / 01.Scanning For Hosts.mov 1.1 MB
05.Scanning / 02.TCP Connection Basics.mov 1.9 MB
05.Scanning / 03.TCP Scan Types.mov 3 MB
05.Scanning / 04.UDP & ICMP Scanning.mov 1.5 MB
05.Scanning / 05.Scanning Demonstration using NMAP.mov 5.7 MB

06.Port & Service Enumeration / 01.Identifying Ports & Services.mov 1.4 MB
06.Port & Service Enumeration / 02.OS Fingerprinting.mov 1.2 MB
06.Port & Service Enumeration / 03.Popular Scanners.mov 844.2 KB
06.Port & Service Enumeration / 04.Demonstration.mov 5.9 MB

07.Data Enumeration / 01.Data Enumeration.mov 2.1 MB
07.Data Enumeration / 02.SNMP Enumeration.mov 6.4 MB
07.Data Enumeration / 03.DNS Zone Transfers.mov 3.3 MB
07.Data Enumeration / 04.Windows Null Sessions.mov 3.3 MB
07.Data Enumeration / 05.NetBIOS Enumeration.mov 4.4 MB
07.Data Enumeration / 06.Active Directory Extraction.mov 1.2 MB

08.Vulnerability Assessment / 01.OS Vulnerabilities.mov 2.4 MB
08.Vulnerability Assessment / 02.Vulnerabilities & Exploits.mov 2.7 MB
08.Vulnerability Assessment / 03.Web Server Vulnerabilities.mov 2.9 MB
08.Vulnerability Assessment / 04.Database Vulnerabilities.mov 2.3 MB
08.Vulnerability Assessment / 05.TCP Stack Vulnerabilities.mov 1.7 MB
08.Vulnerability Assessment / 06.Application Vulnerabilities.mov 1.3 MB
08.Vulnerability Assessment / 07.Vulnerability Assesment.mov 5.1 MB

09.Penetration Access Compromise Pt.1 / 01.Penetrating the System Pt.1.mov 2.2 MB
09.Penetration Access Compromise Pt.1 / 02.Penetrating the System Pt.2.mov 1.2 MB
09.Penetration Access Compromise Pt.1 / 03.Bypassing Access Controls.mov 2.7 MB
09.Penetration Access Compromise Pt.1 / 04.Password Cracking Pt.1.mov 1.9 MB
09.Penetration Access Compromise Pt.1 / 05.Password Cracking Pt.2.mov 3.5 MB
09.Penetration Access Compromise Pt.1 / 06.Social Engineering.mov 2.7 MB

10.Penetration Access Compromise Pt.2 / 01.Session Hijacking Pt.1.mov 2.5 MB
10.Penetration Access Compromise Pt.2 / 02.Session Hijacking Pt.2.mov 6.8 MB
10.Penetration Access Compromise Pt.2 / 03.Privilege Escalation.mov 2.1 MB
10.Penetration Access Compromise Pt.2 / 04.Maintaining & Expanding Access.mov  3.1 MB
10.Penetration Access Compromise Pt.2 / 05.System Compromise.mov 1.9 MB

11.Evading Defenses & Erasing Tracks / 01.Where Your Actions Recorded Pt.1.mov 828.7 KB
11.Evading Defenses & Erasing Tracks / 02.Where Your Actions Recorded Pt.2.mov 2.6 MB
11.Evading Defenses & Erasing Tracks / 03.Deleting Log Files & Other Evidence Pt.1.mov 1.4 MB
11.Evading Defenses & Erasing Tracks / 04.Deleting Log Files & Other Evidence Pt.2.mov 2MB
11.Evading Defenses & Erasing Tracks / 05.Rootkits.mov 2.4 MB
11.Evading Defenses & Erasing Tracks / 06.Steganography.mov 4.6 MB
11.Evading Defenses & Erasing Tracks / 07.Evading IDS & Firewalls.mov 1.9 MB

12.Introduction to Hacking Techniques Pt.1 / 01.Encryption.mov 2.3 MB
12.Introduction to Hacking Techniques Pt.1 / 02.Sniffers.mov 1.8 MB
12.Introduction to Hacking Techniques Pt.1 / 03.Wireless hacking.mov 2.9 MB
12.Introduction to Hacking Techniques Pt.1 / 04.SQL Injection.mov 1.9 MB

13.Introduction to Hacking Techniques Pt.2 / 01.Buffer Overflows.mov 2.3 MB
13.Introduction to Hacking Techniques Pt.2 / 02.Rootkits.mov 1.6 MB
13.Introduction to Hacking Techniques Pt.2 / 03.Spoofing.mov 1.9 MB
13.Introduction to Hacking Techniques Pt.2 / 04.Denial of Service Attacks.mov 1.7 MB
13.Introduction to Hacking Techniques Pt.2 / 05.Web Hacking.mov 2.8 MB

14.Popular Tools / 01.nmap Pt.1.mov 3.7 MB
14.Popular Tools / 02.nmap Pt.2.mov 1.4 MB
14.Popular Tools / 03.SuperScan.mov 6.3 MB
14.Popular Tools / 04.Nessus.mov 4.5 MB

15.Penetration Test Demo / 01.Penetration Test Demo Pt.1.mov 855 KB
15.Penetration Test Demo / 02.Penetration Test Demo Pt.2.mov 474.9 KB
15.Penetration Test Demo / 03.Penetration Test Demo Pt.3.mov 509.9 KB

16.Credits / 01.About the Authors.mov 674.2 KB

Thursday, March 7, 2013

Microsoft visual studio C# .Net video tutorials




Download Microsoft visual studio C# .Net video tutorials (419MB)
  1. Introduction
  2. The .Net Solution
  3. Jumping Into C#
  4. Data & Value Types
  5. Reference Types & More
  6. Classes & Objects
  7. Enums & Structures
  8. Core Programming
  9. Working With Strings
  10. Delegates & Events
  11. Windows Applications
  12. Core Programming In Use
  13. Object Oriented Techniques
  14. File System I/O & Streams
  15. Namespaces & Assemblies
  16. Data Access (ADO.NET & XML)
  17. Web Applications
  18. Web Services
  19. Graphics Programming





Software Engineering design patterns video tutorials







  1. Introduction to Design Patterns
  2. The Strategy Design Pattern
  3. The Decorator Design Pattern
  4. The Factory Design Pattern
  5. The Observer Design Pattern
  6. The Chain of Responsibility Design Pattern
  7. The Singleton Design Pattern
  8. The Flyweight Design Pattern
  9. The Adapter Design Pattern
  10. The Facade Design Pattern
  11. The Template Design Pattern
  12. The Builder Design Pattern
  13. The Iterator Design Pattern
  14. The Composite Design Pattern
  15. The State Design Pattern
  16. The Proxy Design Pattern
  17. The Command Design Pattern
  18. The Mediator Design Pattern
  19. Additional Patterns


Red Hat Certified System Administrator RHCSA



 


01 Introduction
  01 Welcome.flv 6.29 MB
  02 Practice Requirements.flv 3.51 MB
  03 Basic Installation.flv 7.09 MB
 
02 Kickstart Installations
  04 Kickstart Files.flv 8.54 MB
  05 Installing RHEL with Kickstart.flv 2.82 MB
 
03 Basic Command Line
  06 Accessing a Terminal.flv 5.07 MB
  07 Basic Commands pt- 1.flv 4.32 MB
  08 Basic Commands pt- 2.flv 2.57 MB
  09 Help at the Command Line.flv 4.89 MB
  10 cat and nano.flv 3.34 MB
  11 vim.flv 4.19 MB
  12 File Compression.flv 4.35 MB
  13 Elevating Privileges.flv 4.08 MB
 
04 Advanced Command Line
  14 Input and Output Redirection.flv 3.04 MB
  15 Regular Expressions.flv 5.58 MB
 
05 User Accounts
  16 Adding and Removing Users.flv 5.11 MB
  17 Password Control.flv 3.39 MB
  18 Group Administration.flv 4.93 MB
  19 Account Configuration Files.flv 4.64 MB
  20 User Accounts with LDAP.flv 2.87 MB
 
06 File and Folder Permissions
  21 Basic Permissions pt- 1.flv 4.07 MB
  22 Basic Permissions pt- 2.flv 4.43 MB
  23 Basic Permissions pt- 3.flv 5.24 MB
  24 Group Directories.flv 3.59 MB
 
07 Network Setup and Troubleshooting
  25 Network Devices.flv 4.12 MB
  26 NetworkManager.flv 4.96 MB
  27 system-config-network.flv 2.71 MB
  28 Network Commands.flv 5 MB
  29 Network Scripts.flv 3 MB
  30 system-config-firewall.flv 4.89 MB
  31 iptables pt- 1.flv 4.94 MB
  32 iptables pt- 2.flv 4.63 MB
 
08 Software Management
  33 RPM Files.flv 3.05 MB
  34 Yum Command.flv 5.2 MB
  35 Yum Repository.flv 2.81 MB
  36 RPM Command.flv 3.59 MB
  37 PackageKit.flv 6.33 MB
  38 Updating the Kernel.flv 3.13 MB
 
09 Basic Filesystems
  39 Creating Partitions.flv 5.81 MB
  40 Creating Filesystems.flv 2.7 MB
  41 Mounting Filesystems.flv 5.25 MB
  42 Swap Partitions.flv 3.99 MB
  43 Quota Management pt- 1.flv 5.93 MB
  44 Quota Management pt- 2.flv 3.76 MB
  45 Hard and Soft Links.flv 3.43 MB
  46 File and Folder ACL Management.flv 4.89 MB
 
10 LVM
  47 LVM Overview.flv 3.89 MB
  48 Creating a Logical Volume pt- 1.flv 3.6 MB
  49 Creating a Logical Volume pt- 2.flv 5.8 MB
  50 LVM Snapshots.flv 3.52 MB
  51 GUI LVM Management.flv 8.24 MB
 
11 Service Management
  52 Service Commands.flv 5.08 MB
  53 Using system-config-services.flv 5.26 MB
 
12 SELinux
  54 SELinux Overview.flv 4.52 MB
  55 SELinux Tools.flv 5.62 MB
  56 Setting SELinux Contexts pt- 1.flv 5.14 MB
  57 Setting SELinux Contexts pt- 2.flv 9.77 MB
  58 SELinux - mv Versus cp.flv 3.28 MB
  59 SELinux Booleans.flv 3.72 MB
 
13 Encrypted Filesystems
  60 Encrypted Filesystems.flv 4.64 MB
 
14 Network Services
  61 NFS.flv 2.87 MB
  62 FTP pt- 1.flv 5.92 MB
  63 FTP pt- 2.flv 5.28 MB
  64 CIFS (Samba) Client.flv 5.94 MB
  65 Autofs.flv 5.54 MB
  66 HTTP Server pt- 1.flv 7.13 MB
  67 HTTP Server pt- 2.flv 8.84 MB
  68 NTP Server.flv 4.18 MB
  69 Secure Shell (SSH) Commands.flv 3.75 MB
  70 VNC.flv 6.85 MB
 
15 Working with Processes
  71 View Running Processes.flv 4.46 MB
  72 Changing Process Priorities.flv 2.68 MB
  73 Stopping Processes.flv 3.49 MB
  74 Scheduling a Job with cron.flv 3.66 MB
  75 Scheduling a Job with at.flv 2.85 MB
 
16 System Logs
  76 System Logs Overview.flv 4.62 MB
  77 Reading Logfiles.flv 4.23 MB
  78 syslog.flv 5.34 MB
 
17 The Kernel
  79 Linux Kernel Overview.flv 4.34 MB
  80 Hardware and the Kernel.flv 3.9 MB
  81 Kernel Modules.flv 3.5 MB
  82 Working with proc and sysctl-conf.flv 4.96 MB
 
18 The Boot Process
  83 The Boot Process.flv 3.4 MB
  84 GRUB.flv 6.25 MB
  85 Upstart.flv 5.05 MB
  86 Runlevels pt- 1.flv 4.68 MB
  87 Runlevels pt- 2.flv 7.3 MB
  88 Powering Down the System.flv 3.33 MB
 
19 System Recovery
  89 Basic Troubleshooting.flv 6.89 MB
  90 Network Troubleshooting.flv 8.56 MB
  91 The Rescue Environment.flv 5.08 MB
  92 User Account Troubleshooting.flv 4.22 MB
 
20 Virtual Machines
  93 Introduction to Virtualization.flv 6.03 MB
  94 virsh.flv 4 MB
  95 virt-manager pt- 1.flv 3.34 MB
  96 virt-manager pt- 2.flv 6.44 MB
 
21 Conclusion
  97 Course Wrap Up.flv 4.72 MB
  98 Getting Help.flv 4.32 MB
 
22 Credits
  99 About the Author.flv 1.25 MB
  Red Hat Certified System Administrator RHCSA.pdf

Related Posts Plugin for WordPress, Blogger...

your comments