Posts

Showing posts from 2015
Image
Java (software platform) Java  is a set of several  computer software  and specifications developed by  Sun Microsystems , later acquired by  Oracle Corporation , that provides a system for developing  application software  and deploying it in a  cross-platform  computing environment. Java is used in a wide variety of  computing platforms  from  embedded devices  and  mobile phones  to  enterprise servers  and supercomputers . While less common,  Java applets  run in secure,  sandboxed  environments to provide many features of native applications and can be embedded in  HTML  pages. Writing in the  Java programming language  is the primary way to produce code that will be deployed as  byte code  in a  Java Virtual Machine  (JVM); byte code  compilers  are also available for other languages, including  Ada ,  JavaScript ,  Python , and  Ruby . In addition, several languages have been designed to run natively on the JVM, including  Scala ,  Clojure  and  Groovy .  Java syntax borr
Image
If you’ve been around Android for a while, you’ve probably heard “rooting” or “root permission” crop up more than once. If you’re new to the whole topic, or just looking for some handy resources, then this article is for you. What is rooting? If you’re unfamiliar with the term, rooting simply refers to the act of obtaining access to commands, system files and folder locations that are usually locked off from the user. Rooting could be thought of moving from a user to administrator, with the additional freedom and risks that come from more control over the deeper workings of your device. Once rooted, users can install and run applications that require special privileges, bypass carrier installed software, and even remove bloatware applications added in by manufacturers and carriers from their device. Root access is even needed you want to install trivial things like custom fonts on some devices. And perhaps most importantly of all, apps can modify system files and
Image
Hacking Techniques A typical hacker attack is not a simple, one-step procedure. It is rare that a hacker can get online or dial up on a remote computer and use only one method to gain full access. It is more likely that the attacker will need several techniques used in combination to bypass the many layers of protection standing between them and root administrative access. Therefore, as a security consultant or network administrator, you should be well versed in these occult techniques in order to thwart them. This chapter, which will be a review for advanced users, will introduce the main types of hacker attacks. Expert users will want to skip ahead to the next chapter (Chapter 7, "Wireless Attacks") and go straight for the goodies. The following techniques are not specific to wireless networks. Each of these attacks can take multiple forms, and many can be targeted against both wired and wireless networks. When viewed holistically, your wireless network is just anot
Image
Energy development Energy development [ 4] [ 5] [ 6]  is a field of endeavor focused on making available sufficient  primary energy  sources [ 7] and secondary  energy forms  to meet the needs of society. [ 8] [ 9] [ 10] [ 11] [ 12]  These endeavors encompass those which provide for the production of conventional, alternative  and  renewable  sources of energy, and for the recovery and reuse of energy  that would otherwise be wasted.  Energy conservation [ note 2]  and  efficiency measures [ note 3]  reduce the impact of energy development, and can have benefits to society with changes in economic cost  and with changes in the environmental effects . Energy development Total Renewables split-up by source      Fossil      Renewable      Nuclear      Biomass heat      Solar-water      Geo-heat      Hydro      Ethanol      Biodiesel      Biomass electric      Wind      Geo-electric      Solar PV      Solar CSP      Oceanic Source:  Renewable Ene