SectorD E-Magazine

Page 1

A Complete Geek Magazine

SECTOR-D Issue 03 | March 2013

wIRELESS sECURITY aFFILIATE mARKETING Plus

amazing

typography tips

How To

Optimize YOUR dns

Women Day Special

The Sexiest Geek Girls Alive


March 2013

contents

LETTER FROM

THE EDITOR

SectorD

E-Magazine

The most beautiful creation of god We know many of them who have set a mile stone in their respective fields. while trying to listing out some of them my mind come across these names Marie Curie, Frida Kahlo, Helen Keller, Mother Theresa, Oprah Winfrey, Razia Sultana and so many. They have proved their way in all direction from science to entertainment, from politics to social works from art to cyber world. Fortunately, we have International Women’s Day, celebrated around the globe

22

07

on March 8 of every year commemorating the contribution women have made to the world. It is a day of reflection, of considering women, how far they’ve come – and how far they’ve yet to go in terms of rights, equality and choices available to them. We think, like Remembrance Day, that March 8 is a day worthy of the kind of thought that people must take a few minutes to consider and one that

Feature

people ought to be allowed to take some time out of their day for. Some argue that students are better served by attending school on these days, because the awareness they receive through school assemblies, services or other pedagogic input is invaluable to their awareness of women’s issues.

06 How To Optimize Your DNS.

14 G.I. JOE: Retaliation

07

16

GADGET OF THE MONTH.

COSMOS II (REVIEW)

17 WHATSAPP FOR PC

08 WHAT IS THE DIFERENCE BETWEEN IPV6 AND IPV4? 10 EARN ONLINE WITH AFFILIATE

20 DIGITAL CAMERA SENSOR

We should take out some time to thank those woman who are playing most

unique and important role in our life being mother, sister, daughter, wife, girl-

22 SECTOR-D GAMER ZONE

friend and so on. Start thinking on security, right, equality and the choices they

24

SONY XPERIA - X (REVIEW)

26 SOCIAL NETWORKING

17 DRIVER GENIUS (REVIEW)

28 JAVA : THE PROGRAMMING LANGUAGE

MARKETING 18 WIRLESS LAN SECURITY

should get in life. Make them smile on the occasion of International woman’s day. Celebrate with us International Woman’s day. This is our 3rd edition and a long way to go now. Thanks to all members of Sector D, who is giving innumerous support to us. My special thanks to Parag Shinde, Ironhide Rocklife, Rafiq Ahmed, Amartya Saikia and Hitesh Das for actively supporting in each issue of the magazine. Looking forward to have more from you all.

12 WOMEN DAY SPECIAL: THE SEXIEST GEEK GIRL ALIVE

We promise you to bring much more from techno world in our upcoming

Content Writer Parag Shinde admin@queans.in

Ironhide Rocklife ironhiderocklife@gmail.com

Rafiq Ahmed ghylive@gmail.com

Amartya Saikia apple.skull000@gmail.com

Hitesh Das hitesh40533@gmail.com And Anwesha Goswami anweshagoswami26@gmail.com Azrael D Vrykolaka fatekiller196@gmail.com

issue. Be a part of our team by sharing your knowledge and information in our upcoming issues. Hoping for your help and support to spread and promote us. Stay good stay safe.

Azrael D Vrykolaka

Admin (SectorD)

On The cover Women day Special: The Sexiest Geek Girl Alive.

04

2

07

10

Universal Magazine

13

16

www.Magazine.com

19

21

23

26

27

29

30

For Advertisement Contact: +91-9508606749 +91-9960188702

March 8th International Women’s Day is meant to appreciate those who have the biggest but quietest influence in our lives.

admin@sectord.in www.sectord.in

Universal Magazine

www.Magazine.com

3


March 2013

contents

About SectorD Sector-D is nourished by the gratitude of its benefactors and powered by the reach of social networking; this community has produced a wide variety of high-quality hacks, resources and tools, available to everybody. Every single contribution supports the entire community, and the community supports these contributors with traffic and word-of-mouth advertising: the

Logo Designed by Sourav Jyoti

networking effect at its best. Our contributors—Software developers, professional hackers, Network admin, web

26

developer, Graphic designer—are top experts in their fields. It is our hope that our efforts go a long way in promoting critical thinking, solving problems and surprising people with various

Our Team is Incomplete Without -

computer tricks. Our aim is to inform our readers about the latest trends and techniques in Web development. We try to persuade you not with the quantity, but with the quality of the information we present. Our readers can live more sustainable lives and connect with ongoing efforts for change.

28

Don’t worry – there’s no big dollar training

-Parag Shinde 14

Magazine Fact File

12

10

4

Universal Magazine

www.Magazine.com

Amrit Deb Gaurab Shivam Sam Ironhide Indukalpa Hazarika Subham Rajak Jyotishman Dutta Ritumoni Bhuyan Bhargab Hazarika Punk Puskar Sourav Jyoti Roshan Singh Rabi Mondal Bhaskar Jyoti

First ever popular magazine Mercure Galant, a gossip magazine, was first published in parish in March 1672. First women’s magazine The Ladies’ Mercury was first published in London on 27 June 1693. First American Magazine The American Magazine, published in Philadelphia, probably began on 13 February 1741. First children’s magazine The Lilliputian Magazine appeared in the UK in June 1751 and ran for just over a year. The first in the USA was the Children’s Magazine, published in January 1789.

First fashion magazine The Paris magazine Le Cabinet des Modes was first published in 1785. First photograph in a magazine Each copy of the June 1846 issue of the Art Union (UK) contained a photograph by Henry Fox Talbot, one of the inventors of photography. First advertising magazine Exchange & Mart was launched in the UK in 1868. - Rafiq Ahmed

Universal Magazine

www.Magazine.com

5


How To Optimize Your DNS For Faster Internet The Internet is just a series of tubes” as one man so wisely stated. Unfortunately, it’s not as simple as that. There’s a complex architecture that supports the Internet, and data packets need to travel some interesting routes in order to reach you. If you can optimize the paths that your data takes, you can boost your Internet speed.

H

Gadget What Is DNS Optimization?

of The Month March

In simple terms, the Internet (at least the part of the Internet that contains webpages) is a network of computers where each computer holds a record

2013

of other computers on the Internet. These records are a list of “domain names” and these servers are “domain name system” (DNS) servers. That’s a drastically simplified explanation, but it’s enough to understand why DNS is important. This network of DNS servers is how data packets traverse the Internet and reach their destinations. They hop from server to server, asking each server along the way for the correct route

there’s a handy little “Conclusions” tab that will summarize the

towards the target computer. This is called “routing”.

state of your DNS connections. Full instructions, which are only 3

Now, certain DNS servers may have outdated records. Some

steps, are listed on the program’s website. NameBench is another

servers may have inefficient records that point your data pack-

great program that can identify problems in your DNS records.

ets towards the scenic route, taking you all around the Internet

It tells you where your Internet performance is failing and tries

before the packets can reach the destination. If you can track

to find the most responsive DNS servers for your location. Use it

the most efficient DNS servers paths, then you can cut away that

before you use any DNS optimizer because if you already have

excess travel time. Thus, DNS optimization.

high-performance DNS records, there’s little to gain Optimizing DNS Performance

Benchmarking Your DNS Performance

So you’ve run some sort of DNS benchmark program and the con-

There are certain tools for “DNS benchmarking” that can help

clusions state that your DNS connections are rather shoddy? Well,

you determine sub-optimal DNS records and fix them. In

that’s when we know it’s time for you to clean up your records

essence, they compare the response times of various DNS servers

and improve web performance through a bit of optimization.

that you’ve used recently against publicly-available DNS servers.

That’s where NameHelp comes in. NameHelp is a program that

This DNS server comparison is used to rank the various DNS serv-

was developed by researchers at Northwestern University. It sits

ers in order of their response times and a few other factors. By

in the background of your system and silently optimizes dns set-

optimizing this list, your data packets are sent out to the most

tings to contact the fastest servers for your location. All it takes is

efficient (read: fastest) DNS routes, which ends up increasing your

a quick installation and configuration. Once that’s done, you’ll see

browsing speed – sometimes significantly.

a boost to your web browsing speed (given that your DNS bench-

When it comes to benchmarking, use Domain Name Speed

mark wasn’t so great to start with).

Benchmark. The download is extremely light (only ~160KB) and

NameHelp is available on Windows, Mac, and Linux systems free

the program is extremely easy to use. After you run the scan,

of charge. - Parag Shinde

6

Universal Magazine

Page

www.Magazine.com

6 www.sectord.in

Google Project Glass

Google’s co-founder Sergey Brin loves the internet so much that he’s found a way to use it literally all the time. His new Google endeavour, Project Glass, overlays information from the web, such as weather reports, messages from friends and map directions, on top of the real world through one of the glasses’ lenses. The specs are also fitted with a camera that lets you take pictures or record video without much fuss. It’s a revolutionary bit of tech, it’s just a shame you’ll be a bit of a social pariah if you wear them in public. - Azrael D Vrykolaka

Universal Magazine

www.Magazine.com

Page

7

7 www.sectord.in


What is IPv4 -- Internet Protocol Version 4? IPv4 (Internet Protocol Version 4) is the fourth revision of the Internet Protocol (IP) used to to identify devices on a network through an addressing system. The Internet Protocol is designed for use in interconnected systems of packet-switched computer communication networks (see RFC:791).

What is The Difference Between

IPv6 and IPv4?

IPV6

Confused by phrases like Internet Protocol (IP), IPv6, IPv4 and IPng? Webopedia explains the difference between IPv4 and IPv6, and looks at the topic of migrating to a 128-bit address space.

AND IPV4

T

What is Internet Protocol -- IP? IP (short for Internet Protocol) specifies the technical format

of packets and the addressing scheme for computers to communicate over a network. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself can be compared to something like the postal system. It allows you to address a package and drop it in the system, but there’s no direct link between you and the recipient. TCP/IP, on the other hand, establishes a connection between two hosts so that they can send messages back and forth for a period of time.

Page

8 www.sectord.in

IPv6 (Internet Protocol Version 6) is also called IPng (Internet Protocol next generation) and it is the newest version of the Internet Protocol (IP) reviewed in the IETF standards committees to replace the current version of IPv4 (Internet Protocol Version 4).

Webopedia’s Network and Internet Protocols Category offers definitions to hundreds of technology terms and phrases related to network protocols. You can view all related sub-categories and term definitions here. Internet protocol (IP) IPv6 (IPng) IP Address IP switching mobile IP Related IPv6 Articles

IPv6 is the successor to Internet Protocol Version 4 (IPv4). It was designed as an evolutionary upgrade to the Internet Protocol and will, in fact, coexist with the older IPv4 for some time. IPv6 is designed to allow the Internet to grow steadily, both in terms of the number of hosts connected and the total amount of data traffic transmitted. IPv6 is often referred to as the “next generation” Internet standard and has been under development now since the mid-1990s. IPv6 was born out of concern that the demand for IP addresses would exceed the available supply. While increasing the pool of addresses is one of the most oftentalked about benefit of IPv6, there are other important technological changes in IPv6 that will improve the IP protocol: * No more NAT (Network Address Translation) *Auto-configuration *No more private address collisions *Better multicast routing *Simpler header format *Simplified, more efficient routing *True quality of service (QoS), also called “flow labeling” *Built-in authentication and privacy support *Flexible options and extensions *Easier administration (say good-bye to DHCP)

Internet Protocol (IP): IPv4 and a new ver-

An IP address is binary numbers but can be stored as text for human readers. For example, a 32-bit numeric address (IPv4) is written in decimal as four numbers separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address. IPv6 addresses are 128-bit IP address written in hexadecimal and separated by colons. An example IPv6 address could be written like this: 3ffe:1900:4545:3:200:f8ff:fe21:67cf (see “What does an IPv6 address look like?”)

coexist with the older IPv4 for some time

www.Magazine.com

A Dictionary of IPv6 Related Terms

There are currently two version of

upgrade to the Internet Protocol. IPv6 will

Universal Magazine

What is IPv6 -- Internet Protocol Version 6?

The Difference Between IPv6 and IPv4 IP Addresses

sion called IPv6. IPv6 is an evolutionary

8

IPv4 is the most widely deployed Internet protocol used to connect devices to the Internet. IPv4 uses a 32-bit address scheme allowing for a total of 2^32 addresses (just over 4 billion addresses). With the growth of the Internet it is expected that the number of unused IPv4 addresses will eventually run out because every device -- including computers, smartphones and game consoles -- that connects to the Internet requires an address. A new Internet addressing system Internet Protocol version 6 (IPv6) is being deployed to fulfill the need for more Internet addresses

IPv6: Preparing for the Migration IPv6 is here. With the move to a 128-bit address space will come a fundamental shift in the way you think about your network. Are you ready to migrate? Still learning about the challenges? Check in here as we add to our collection of IPv6 resources.

Is the U.S. Ready For The IPv6 Challenge? In the third volume of its report to the government about IPv6 transition, Juniper Networks outlined some of the key challenges and initiatives the government will have to undertake in order to meet the federally mandated IPv6 transition deadline of June 2008.

Understanding IPv6 We’re going to spend some time teaching you a number of incredibly wonderful things about IPv6, such as why network administrators need to get their duffs up and implement it, bullet points to persuade the bosses, and, of course, how to actually use it. Did You Know...? The American Registry for Internet Numbers (ARIN) manages IP address space allocations for the U.S., Canada and the Caribbean region. ARIN is one of five global Regional Internet Registry (RIR) organizations that in turn receive their IP allocations from the Internet Assigned Numbers Authority (IANA) - Ironhide Rocklife.

Universal Magazine

www.Magazine.com

Page

9

9 www.sectord.in


1) Look for a product to promote and look for a niche to promote that product to. The product can be physical (an object) or virtual (an ebook or software). For physical products, you can set up an affiliate account on Amazon.Com or CJ.com. For virtual products, you can do the same thing on Clickbank.com. How do I start affiliate marketing? By learning to target. Don’t select a broad niche; it’s a waste of

Earn online with Affiliate Marketing

time. Narrow it down. In case you promote a weight-loss product, focus on women seeking to lose their double chin before their wedding day as opposed to… just overweight women. 2) Create a website or blog (with WordPress) or only a “lens” on Squidoo.com (if you don’t feel like owning a website for now) about the product(s) you are promoting. Create high-quality, informative content. Don’t push people to buy, just recommend products. Write in the first person but do not talk too much about yourself, speak about your visitors, the things the product you’re recommending can bring to THEM. That’s what matters to them. Use your style, be funny (or try to..!), don’t be too formal. Make sure you put pictures as well. People love them! 3) Build a list (with Aweber) if you have your own website or blog. Offer something valuable to your website visitors in return for their email address in order for you to build a list of subscribers that are potential buyers. Communicate with them by email (like a newsletter) a couple of times per week. They most likely didn’t buy the 1st time they came across the product(s) you are promoting so having them on your list is an opportunity to promote to them by email. Try to find the appropriate bal-

You might have heard of Affiliate Marketing — Isn’t it?? No??? Strange, but not to worry, there’s a lot ahead in this article and you will get to know much about it (and more) by its end

ance between helpful free content and promotion. Bear in mind they can unsubscribe at any time. Make them stay. 4) Create backlinks to your site (links placed on other sites that point to your site) fir Google to value your site and place it high in the search engine results (SERP) for the keyword you’re targeting. Backlinks can be created through article marketing (place a link at the bottom of your article), social bookmarking, profile backlinks, forums signatures, blog commenting.. Basically anywhere you can put a link to your site. Of course if you’re doing article marketing and want to drive traffic to your site via your articles, you have to create backlinks to your articles. Backlinking has to be consistent and look natural to Google (a few varied backlinks to your site per day). 5) Use Social Networks : As you all know, social networks are growing at a rapid rate and will continue to grow. Facebook, for example, has nearly 600 million users and twitter has 200 million. And that is what you can make use of. If you use twitter, you can search for tweets in your niche and reply to them with helpful product links (masked with your affiliate code). For Example : You search for your loved niche, lets say “Weight Loss”, in Twitter and you find a tweet of a desperate person asking for help to loose his/her weight.

T

What is Affiliate Marketing?? Or What is the exact definition?

Perhaps the simplest way to explain affil-

iate marketing is that it is a way of making money online whereby you as a publisher

you Get paid a commission. There are a

site they get redirected to the product site

rect to the Merchant’s website from your affili-

number of forms of these types of promo-

and if they purchase a product or subscribe

ate site, whether or not a sale is made.

tions but in most cases they involve you

to a service you as the referrer make a com-

Pay per Lead: You get paid once the referred

as a publisher earning a commission when

mission.

visitors provide their contact information on the

someone follows a link on your blog to

The sellers can track your performance

target site by filling out a simple contact form.

another site where they buy something.

through your affiliate ID and the affiliate

How do I get Started with Affiliate Marketing?

softwares (eg. WP Affiliate Platform) that

There are a few things to keep in mind before

they use. You also have complete, real time

choosing to get into this business. Firstly, you

access to all sales and commissions stats.

must find the right Affiliate Product to Promote

You don’t need to sell products all the

and secondly you must have an audience that

moting their product, service or site.

How Does Affiliate Marketing Work?

By definition-

choose the products that you want to sell,

time to make a commission. Different affili-

will be interested in that product.

sellers provide you with an unique affiliate

ate programs can use different payment

How do I get Started with Affiliate Marketing?

code that you can use to refer traffic to the

terms such as:

There are a few things to keep in mind before

are rewarded for helping a business by pro-

“Affiliate marketing is a marketing practice in which a business rewards one or more affiliates for each visitor or customer brought about by the affiliate’s own marketing efforts.” So, When you successfully get a customer to the business and make a sale (or lead), 10

Page

Universal Magazine

When you join an Affiliate program and

that tweet with your affiliate product link. 6) Create Videos: Video Marketing helps you get tons of targeted traffic easily (Yes, i said ‘easily’). All you have to do is Create a Video Review of the Product you are promoting and upload that video to popular video sharing sites like Youtube. In the description field for that video, Add your affiliate link and that’s it. Videos gets viral too easily, All you need to care is about the Title and the Content of the video. Try to create a catchy Title which makes people view your video. You can work on Keywords and link building to get the video rank higher in search engines but there is an easy way to get traffic to your video. It is by getting your video listed in the “Related Videos” section of Popular Videos in your niche. This can be achieved by adding the same tags to your video which are used by other Popular Video in your Category. Affiliate Marketing – Easy Money? While affiliate marketing can be incredibly lucrative it is important to know that affiliate marketing is not easy money. Most people who try it make very little as it relies upon numerous factors including: traffic (high traffic helps a lot)

readymade text links, banners and other

Pay per Sale: In this program a merchant

must find the right Affiliate Product to Promote

forms of creative copies whereby you only

pays you a percentage of the sale price

and secondly you must have an audience that

have to copy the code and place it on your

when the purchase is completed.

will be interested in that product.

website to start referring traffic. When inter-

Pay per Click: In this program you get paid

having a readership who is in a ‘buying mood’

ested visitors click on these links from your

based on the number of visitors you redi-

you being able to write good sales copy (and more) - Hitesh Das (www.dealwithcoupon.com)

www.Magazine.com

10 www.sectord.in

choosing to get into this business. Firstly, you

target site. Most affiliate programs will offer

Now If you know of a product which you think can really help that person, you simply can reply to

finding relevant products finding quality products building trust with your readers

Universal Magazine

www.Magazine.com

Page

11

11 www.sectord.in


THE TOP

5

The Sexiest Geek Girls Alive

2

5

Marina Orlova

Natali Del Conte

This native Californian now hangs out in New York, and she’s serious business. She’s one of CNET’s senior editors, and she’s worked with Wired, TechCrunch, PC

Magazine and a host of newspapers and other publications. She’s an experienced podcaster, and she’s made appearances on numerous other tech shows and broadcasts, including G4′s Attack of the Show.

- Azreal D Vrykolaka This 28 year-old Russian vixen doesn’t spend her time bouncing around in front

T

There has been a sharp rise

throwing off the curve, and people need

recently of so-called geek girls,

to understand that receiving a 300 page

and the sad fact is that many,

phone bill does not make a girl geeky. It

if not most, of these women

makes her a stereotype that is far older,

5 Hottest GeekGirls

of a camera just for kicks — she’s out to educate in the process. Originally an etymologist, Marina found that applying her considerable knowledge in an unorthodox fashion was a quick way to beat the

are nothing near geeky. While the elusive

and less respectable. We’re here to set the

geek girl does, in fact, exist, she’s much

record straight, with these 5 women who

less common than most would care to

all qualify as the hottest geek girls to have

per video, Marina pretty much owns

admit. There are criteria that must be met

graced the Internet’s tubes of fame.

YouTube. She’s been singled out by Wired,

to make a proper geek girl; she must be geeky, she must be a techie, and she must be hot. Too many misconceptions are

economy, and in 2007 Hot for Words was born. Averaging at over two million views

Geek

G4, and Cosmopolitan as one the world’s

Sexy

hats as well.

sexiest geek girls, and we’re tipping our

1

She may be one quarter Aussie, a quarter Chinese, and half Canadian, but this geek girl is 100% awesome. She produced Assassin’s Creed in 2007, and she’s the sequel’s executive producer this year. She’s spent time working for Sony Online and Electronic Arts, two of the biggest names in the industry. One thing’s for certain; Ubisoft is one lucky gaming company to

Another Canadian, Amber came down from the deep north to work for Microsoft, and even spent time in San Francisco working for Razorfish. She hangs out with Leo Laporte on a regular

And Hot

Jade Raymond

4

Amber MacArthur

basis, and she’s hosted or made appear-

3

ances on a laundry list of tech shows and podcasts over the years.

Marissa Mayer

She may be called The Cupcake Princess, but Marissa Mayer is no joke. She’s Vice President of Search Product and User Experience at Google. What’s that mean? It means within the walls of Google, what she says goes. She studied artificial intelligence at Stanford, and before she became the first woman to work at Google, she worked for UBS in a Zurich lab.

have her guiding their code.

12

Page

Universal Magazine

www.Magazine.com

12 www.sectord.in

Universal Magazine

www.Magazine.com

Page

13

13 www.sectord.in


G.I. Joe: Retaliation

A

“Whatever deity may guide my life, Dear Lord don’t let me die tonight!” -Roadblock

G.I. Joe: Retaliation (also known as G.I. Joe 2 or G.I. Joe 2: Retaliation) is an upcoming 2013 American action thriller directed by Jon M. Chu, based on Hasbro’s G.I. Joe toy, comic and media franchises. It is a sequel to 2009’s G.I. Joe: The Rise of Cobra.The film was written

by Zombieland writers Rhett Reese and Paul Wernick. G.I. Joe: Retaliation features an ensemble cast, starring Bruce Willis and Dwayne Johnson, with Channing Tatum, Arnold Vosloo, Ray Park, Jonathan Pryce, and Lee Byung-hun reprising their roles from the first film. The US release date is March 29, 2013.

Plot After being framed as traitors by Zartan, who is still impersonating the President of the United States, the Cobra Commander now has all the world leaders under Cobra’s control, with their advanced warheads aimed at innocent populaces around the

Releasing

world. Outnumbered and out gunned, the Joes form a plan with the original G.I. Joe General Joseph Colton to overthrow

on 29 march

the Cobra Commander and his allies Zartan, Storm Shadow and Firefly.

14

Page

2013

Universal Magazine

www.Magazine.com

14 www.sectord.in

Universal Magazine

www.Magazine.com

Page

15

15 www.sectord.in


COSMOS II Cooler Master

WhatsApp

chassis

For PC Sometimes feel your PC would be better to chat – while working. Well good news is that you can easily install WhatsApp on your PC and use it to send free messages to your friends and colleagues.

Driver Genius Update all drivers automatically… and without any research!

The COSMOS II Ultra Tower features a streamlined design accentuated by a pair of distinctive handles like no other. The smooth, brushed aluminum touch of the side panels unlock and swing open like the doors of a luxurious raceEaque ipsa quae ab illo ins vens tore veritatis car.

ert quasi. Archirs tecto beatae vitae dicta sun explister cabo enims Hidden behind the front slide cover lies a stack oftia hot-swappable drivenemo bays. The black unsers interiors amet. provide enough

To install whatsapp on your windows pc, you will be required to

Driver Genius Professional 11 is the better solution for quickly

follow 3 main steps

and securely update all device drivers and hardware on Microsoft

Step 1: Install Bluestacks player from Bluestacks. It lets you run

Windows operative systems.

android apps on your personal computer.

The Driver Genius search engine takes a few seconds to know what

Step 2: After installing Bluestacks on your PC, you can install

drivers to update, thus forgetting the long hours spent research-

Whatsapp using bluestack search button

ing the right driver, no more waiting, when a driver is made avail-

Step 3: Verify whatsap account by entering your phone number / mobile number. Please note only 1 activation is allowed per number. So if you wish to use mobile phone and pc using the same number, I would suggest entering your landline number. In case you decide to use landline home number, you can get automated voice call which will call out number code which you will need to enter in the app to verify. Once done, you can add contacts to your whatsapp and start chatting. - Parag Shinde

able by the manufacturer is ready to be downloaded with the program!The wide online database includes all drivers of all types, from most recent to oldest, allowing you to update all PCs with different versions of Windows installed, from the latest Windows 7 to old XP. Thanks to the diagnostic scan, it’s easy to check for drivers conflicts and remedy the situation automatically, without having to look on the websites of manufacturers of hardware in search for the correct driver!And with the Live Update then you know you always have the latest driver available! - Azrael D Vrykolaka

space for oversized XL-ATX System Boards equipped with 4 double width graphics accelerators. A second slide cover on top hides the Advanced Control Panel to manage up to 10 fans and their respective LED lights. The combination of its elegant looks, numerous expansion options and features make the COSMOS II a “Dream Case”. 16

Universal Magazine

www.Magazine.com

Universal Magazine

www.Magazine.com

Page

17

17 www.sectord.in


Wireless LAN Security Security for any organization large or small

A

One of the most common questions that people ask

is currently in BETA phase and is not ready for prime time yet.

me about Wireless LANs is “are Wireless LANs really

TinyPEAP puts a PEAP authentication server and PKI Certificate

safe?” immediately followed up by “what kind of secu-

Authority in your home’s Wi-Fi enabled Linksys Router which was

rity do I need for my Wireless LAN?” The answer to

once the exclusive domain of large organizations with dedicated

the first question is “yes, if you implement good secu-

authentication servers. For the time being, the only viable option

rity measures” but the second question forces me to resort to the

for this environment is WPA PSK (Wi-Fi Protected Access Pre-

old “it depends”. It depends on what level of risk is acceptable to

Shared Key) mode. WPA mode mandates TKIP at a minimum but

your home or organization. It depends on what level of manage-

also has an optional AES encryption mode. AES mode is highly

ment and cost you are willing to bear. To simplify this extremely

recommended because it has a rock solid pedigree in cryptana-

complex topic, I’ve come up with four arbitrary levels of WLAN

lytic resistance whereas TKIP may be under attack in the near

(Wireless LAN) security as a general guideline that is designed to

future. Note that AES in WPA2 (fully ratified version of 802.11i)

suit everyone’s needs from the home to the military.

is no longer optional and is mandated today. Since most home

Level 1: Home and SOHO WLAN security

users would be lucky if all of their equipment and software was

Level 2: Small Business WLAN security

TKIP capable, most homes will have to be content with TKIP mode

Level 3: Medium to large Enterprise WLAN security

for now.

Level 4: Military grade maximum level WLAN security

WPA PSK mode can be an effective security mechanism but leaves a lot to be desired in terms of usability. This is because

Level 1: Home and SOHO WLAN security

WPA PSK can be cracked with offline dictionary attacks so it relies

Unfortunately, many home users are either using some old equip-

on a strong random passphrase to be effective. Unfortunately,

ment, old drivers, or older operating systems that don’t natively

humans are very bad at memorizing long random strings of

support WPA so they are still using WEP if anything at all. WEP

characters and will almost always use simple to remember words

encryption was thought to be good for a week for most light

and phrases or some slight variation of that. This lends itself to

traffic home wireless networks because the older WEP cracking

dictionary attacks where a hacker will try every variation of every

tools needed 5 to 10 million packets to recover a WEP key, but the newest WEP cracking techniques can break WEP in minutes. Even if there isn’t that much traffic, the attacker now has ways to artificially generate traffic and accelerate WEP cracking. Because of this, consumers should avoid any product that doesn’t support WPA TKIP mode at a minimum but preferably WPA AES capable or WPA2 certified devices. If they have WEP only devices, check with the vendor to see if there are any firmware and/or driver updates that will upgrade the device to WPA mode. If not, anyone who cares about privacy should throw out those devices. As harsh as that may sound, it is comforting to know that newer Access Points and Client Adapters that do support WPA can be purchased for as little as $30. Client side Wireless LAN software (offi-

combination of words in the dictionary. To

Verisign, or it can be issued from an organiza-

For those who wish to implement TTLS, they will

make this very difficult to hack, use a 10 digit

tion’s internal Certificate Authority. These two

need to either purchase Funk Software’s Odyssey

string of random characters comprised of a-z,

options are conventional wisdom but neither

server (in the $2000 range) or implement FreeRADIUS

A-Z, 0-9 or use a very long word phrase made

option is particularly appealing to small busi-

on Linux which is Open Source. Note that Windows

up of 20 or more characters. Unfortunately,

nesses since they won’t like paying $500/year

does not have a built in TTLS client built in, you will

this will force many users to write down

for a 3rd party Digital Certificate and they most

need to purchase a wireless Supplicant (AKA Client

their passphrases which in itself may lead

likely don’t have a PKI in place which requires

software) for your end users. MDC has an Open

to passphrase theft. WPA PSK is not a good

a Certificate Authority server. An excellent

Source version for Linux, but you’ll need to purchase

long term security solution and leaves Level

way to get around this problem is to use a

one for Windows which is what most people are

1 security with much to be desired, but it can

Self Signed Certificate on your RADIUS server.

using. You’ll either need to implement the Root

be safe when used correctly.

Self Signed Digital Certificates violates all best

Certificate on the Clients manually or you’ll need to

Level 2: Small Business WLAN security

practice concepts for PKI, but I say be damned

purchase a 3rd party Digital Certificate which has

Small businesses must move beyond Level

with them if the alternative is to use no Digital

its Root Certificate already preinstalled. As for client

1 by incorporating authentication in to their

Certificates at all on your RADIUS server and

side configuration, you’ll need to find some other

Wireless LAN access controls. The standard-

run a completely vulnerable EAP mechanism

method to automate the installation process since

ized method for doing this is 802.1x and

such as LEAP. Running a secure EAP mechanism Active Directory does not support the automation of

PEAP or TTLS authentication. 802.1x restricts

such as PEAP or TTLS is too important to let PKI

3rd party clients.

access to the Datalink layer of a network by

be an obstacle. A newer protocol from Cisco

While 802.1x and PEAP or TTLS addresses the

only permitting access to the network if a

called EAP-FAST promises to solve this problem

authentication half of the equation when it comes

user proves their identity through the EAP

by claiming that you don’t need PKI and Digital

to security, encryption must also be addressed. Up

(Extensible Authentication Protocol) mecha-

Certificates but if you read the fine print from

until recent months, it was thought that “Dynamic

nism. There are many forms of EAP, but the

Cisco, that’s clearly not the case. Self Signed

WEP” where WEP keys are rotated often (commonly

two forms of EAP that is most appropriate for

Certificates would solve the problem for PEAP,

10 minutes) was considered to be “good enough”

Level 2 security is PEAP (Protected EAP) and

TTLS, or EAP-FAST for organizations too small to encryption. With the next generation of WEP crypt-

TTLS (Tunneled Transport Layer Security).

run a dedicated PKI Certificate Authority infra-

analysis tools, this is no longer the case and TKIP is

Note that PEAP in the general context refers

structure.

the new bare minimum. The WPA standard imple-

to PEAP-EAP-MSCHAPv2 mode, which only

The easiest method by far if you’re a Microsoft

ments TKIP which is a rewrite of the WEP protocol

requires a Server Side Digital Certificate and

Windows 2003 Server shop is to use the built

which will hold against current cryptanalysis tech-

a Client Side Username/Password. There are

in RADIUS server of Windows 2003 called IAS

niques for now, but newer methods of attacking TKIP

stronger forms of PEAP which we’ll cover later

(Internet Authentication Server). For a small

are on the horizon. The reliable long term solution

in the higher security levels. TTLS is actually

business, there is nothing wrong with adding

from the IEEE standards body is the 802.11i standard

a little better in security than PEAP-EAP-

the IAS service to an existing Windows 2003

which mandates AES. The recommendation for Level

MSCHAPv2 because it does not divulge the

server even if it’s their only server which also

2 through 3 is that you should be using WPA with

username in clear text. However, both forms

happens to be the Active Directory server. You

TKIP at a minimum and upgrade to AES as soon as

of authentication do a good job of protecting

can either convert that server in to a Certificate

possible. Note that some WPA devices already sup-

passwords because the MSCHAPv2 password

Authority as well and grant yourself a digital

port AES encryption while all WPA2 certified devices

challenge session is protected inside an

certificate for the RADIUS server or simply Self

must support AES encryption. To be on the safe side,

encrypted tunnel. This is why PEAP or TTLS is

Sign a digital certificate. With this in place, the

only buy products that support 802.11i and are WPA2

so much better than Cisco’s LEAP mechanism

Root Certificate (the public key of the Digital

certified.

which transmits the MSCHAPv2 session in the

Certificate) for the RADIUS server must be

From a vulnerability standpoint, the only way to

clear lending itself to easy offline password

installed in all of the client’s computers. With

break this security level is to steal a user credential by

dictionary cracking.

Active Directory, this can be easily be pushed

either looking over someone’s shoulders to see what

To implement PEAP or TTLS, the organization

out via Group Policy. All of the clients also need password they are typing, coaxing them in to tell-

needs to implement a RADIUS Authentication

to configure their wireless settings on the WZC

ing you what the password is (this is easier than you

Server. There are many ways to do this no

(Wireless Zero Configuration) service built in

think), or installing a key logger on to a user’s com-

matter what your software preference is.

to Windows XP SP1 or SP2. However, Active

puter so you can record their key strokes as they type

There are options for Microsoft Windows 2003 Directory allows you to configure this globally

in the password. Barring password theft, it would be

Server with IAS, 3rd party applications such

for all your users with Active Directory Group

far easier to break in to your premise and tap in to a

but Windows XP SP2 is highly recommended.

as Funk Odyssey (needed for TTLS mode)

Policy. Using the Microsoft method, a secure

Wired LAN than to attempt to crack Level 2 Wireless

that run on Windows, Open Source solu-

wireless network can be deployed throughout

LAN security. Level 2 is a good choice for most small

The home or SOHO (Small Office Home Office) environment

tions with FreeRADIUS. However, in order

an organization big or small in hours. If you

businesses but organizations where security is a high

to run in PEAP or TTLS mode, the RADIUS

don’t have IAS, it comes with Windows 2003

priority should seriously consider the next two levels

server must have a server side x.509 digital

Standard Edition which costs around $500 per

because a single lost password could compromise

certificate. This certificate can be purchased

copy. IAS in my experience is extremely robust,

the entire system.. - Ironhide Rocklife

from a 3rd party Certificate Authority such as

reliable, and secure.

cially known as Supplicants) also need to be updated to support WPA or WPA2. Windows XP SP1 with the WPA patch can suffice,

is very unlikely to have any kind of Authentication and PKI in place. This may change when TinyPEAP gets launched, but that

18

Page

Universal Magazine

www.Magazine.com

18 www.sectord.in

Universal Magazine

www.Magazine.com

Page

19

19 www.sectord.in


A Bayer array consists of alternating rows of red-green and green-blue filters. Notice how the Bayer array contains twice as many green as red or blue sensors. Each primary color does not

DIGITAL CAMERA SENSORS

receive an equal fraction of the total area because the human eye is more sensitive to green light than both red and blue light. Redundancy with green pixels produces an image which appears less noisy and has finer detail than could be accomplished if each color were treated equally. This also explains why noise in the green channel is much less than for the other two primary colors (see “Understanding Image Noise” for an example).

Note: Not all digital cameras use a Bayer array, however this is by far the most common setup. The Foveon sensor used in Sigma’s SD9 and SD10 captures all three colors at each pixel location. Sony cameras capture four colors in a similar array: red, green,

H

blue and emerald green. A digital camera uses an array of millions of tiny light cavities or “photosites” to

BAYER DEMOSAICING

record an image. When you press your

Bayer “demosaicing” is the process of translating this Bayer

camera’s shutter button and the expo-

array of primary colors into a final image which contains full

sure begins, each of these is uncovered

color information at each pixel. How is this possible if the

to collect and store photons. Once the exposure

camera is unable to directly measure full color? One way

finishes, the camera closes each of these photosites,

of understanding this is to instead think of each 2x2 array

and then tries to assess how many photons fell into

of red, green and blue as a single full color cavity.

Top Seller of 2012

artifact is moiré (pronounced “more-ay”), which may appear as repeating patterns, color artifacts or pixels arranges in an unrealistic maze-like pattern:

Canon EOS Rebel T3i 18 MP

Two separate photos are shown above—each at a different magnification. Note the appearance

each. The relative quantity of photons in each cavity are then sorted into various intensity levels, whose precision is determined by bit depth (0 - 255 for an 8-bit image).

of moiré in all four bottom squares, in addition to

This would work fine, however most cameras take additional steps to extract even more image information from this color array. If the camera treated all of the colors in each 2x2 array as having landed in the same place, then it would only be able achieve half the resolution in both the horizontal and vertical directions. On the other hand, if a camera computed the color using several overlapping 2x2 arrays, then it could achieve a higher resolution than would be possible with a single set of 2x2 arrays. The following combination of overlapping 2x2 arrays could be used to extract more image information.

However, the above illustration would only create

Note how we did not calculate image information at the very

grayscale images, since these cavities are unable to

edges of the array, since we assumed the image continued on

distinguish how much they have of each color. To

in each direction. If these were actually the edges of the cavity

capture color images, a filter has to be placed over

array, then calculations here would be less accurate, since there

each cavity that permits only particular colors of

are no longer pixels on all sides. This is no problem, since infor-

light. Virtually all current digital cameras can only

mation at the very edges of an image can easily be cropped out

capture one of three primary colors in each cavity,

for cameras with millions of pixels.

and so they discard roughly 2/3 of the incoming

Other demosaicing algorithms exist which can extract slightly

light. As a result, the camera has to approximate the

more resolution, produce images which are less noisy, or adapt

other two primary colors in order to have full color

to best approximate the image at each location.

at every pixel. The most common type of color filter

DEMOSAICING ARTIFACTS

array is called a “Bayer array,”

Images with small-scale detail near the resolution limit of the

the third square of the first photo (subtle). Both maze-like and color artifacts can be seen in the third square of the downsized version. These artifacts depend on both the type of texture and software used to develop the digital camera’s RAW file. MICROLENS ARRAYS You might wonder why the first diagram in this tutorial did not place each cavity directly next to each other. Real-world camera sensors do not actually have photosites which cover the entire surface of the sensor. In fact, they often cover just half the total area in order to accommodate other electronics. Each cavity is shown with little peaks between them to direct the photons to one cavity or the other. Digital cameras contain “microlenses” above each photosite to enhance their light-gathering ability. These lenses are analogous to funnels which direct photons into the photosite where the photons would have otherwise been unused. Well-designed microlenses can improve the photon signal at each photosite, and subsequently create images which have less noise for the same exposure time. Camera manufacturers have been able to use improvements in microlens design to reduce or maintain noise in the latest high-resolution cameras, despite having smaller photosites due to squeezing more megapixels into the same sensor area. - Amartya Saikia

digital sensor can sometimes trick the demosaicing algorithm— producing an unrealistic looking result. The most common arti

Page

20 www.sectord.in

Universal Magazine

www.Magazine.com

Page

21

21 www.sectord.in


sECTOR- d gAMER zONE

Anticipation Level: 9/10

brought the Far Cry and Assassin’s Creed

forces. We also know the open-world Los

Tomb Raider has been with us since 1996,

franchises to life. Little wonder then that

Santos (read Los Angeles) environment

when the first game landed on the origi-

anticipation levels are so high. Embedded

is huge, the variety of vehicles has been

below is the teaser trailer that really just

expanded, and there will be side-quests

sets the scene, but there’s an extended

galore to ensure epic longevity.

5 Awesome Cross-Platform Video Games Being Released In 2013

gameplay trailer (YouTube link) that shows what the game is all about. This game sees hacking and technical proficiency used as a weapon. You play Aiden Pearce, who is capable of tapping into any device tied to the city’s central operating system, and he uses this ability to stay one step ahead of his foes. This innovanal PlayStation. Its main protagonist Lara Croft immediately became an icon, being a female lead character in a male-dominated industry. Her disproportionately busty body may have helped, but still. The games have dwindled in popularity and quality since, but it’s nothing that a good

5 Awesome

reboot can’t fix. The new Tomb Raider game set for release

Cross-Platform Video Games Being

in 2013 is just that: a reboot which forgets everything that has gone before. The

Being Released In 2013

2013 Tomb Raider is set before Lara Croft became the brave heroine we now know her as, exploring her origins as she has to fight to survive on a remote island full of

2012 was a bumper year for video games

or prequel to the previous two outings.

to commercial and critical acclaim. The

on all platforms, with a heady mix of

While they were based in the under-

original was a tough racing game which

sequels in well-loved franchises and new

water city of Rapture, BioShock Infinite

saw the player become a racing driver,

IP making their way onto consoles and

takes place in a floating cloud city called

starting at the bottom and working their

computers. However, as good as 2012

Columbia.

way up to owning and managing a team.

was for gamers everywhere, 2013 is shap-

You play Booker DeWitt, who arrives in

There were a variety of different events

ing up to be even better. The Wii U will

Columbia during a civil war between two

to compete in, including drift champion-

be coming of age, there’s the strong pos-

factions. Against this dystopian backdrop

ships and demolition derbies.

sibility of at least one (and possibly two)

you have to find and rescue Elizabeth,

Little is yet known about the sequel.

new consoles being released, and the list

a young lady held captive in the city in

All Codemasters has revealed so far is a

of games worth playing is growing by the

the air for the past 12 years. Thankfully

teaser trailer and two gameplay trailers,

day

you have a range of weaponry, gadgets,

one of which is embedded below. We can

and special powers at your disposal. And

clearly expect more of the same, but with

you’ll need them all to succeed in your

the lengthy gap between games hope-

mission.

fully all the wrinkles of the first title will

BioShock Infinite Platforms: PC, PS3, and Xbox 360

have been ironed out. The original had a

Release Date: March 2013

Grid 2

compelling multiplayer mode, and Grid 2

Anticipation Level: 8/10

Platforms: PC, PS3, and Xbox 360

should reprise that.

BioShock Infinite is a first-person shooter

Release Date: Summer 2013

that is the polar opposite of the Call Of

Anticipation Level: 8/10

Tomb Raider

Duty series. It’s the third game in the

Grid 2 is the long-awaited sequel to Race

Platforms: PC, PS3, and Xbox 360

BioShock series, but isn’t a direct sequel

Driver: Grid, which was released in 2008

Release Date: March 2013

22

Page

Universal Magazine

www.Magazine.com

22 www.sectord.in

tive gameplay mechanic — matched with stunning visuals — means Watch Dogs could be the exceptional title released in 2013.

Grand Theft Auto V Platforms: PS3 and Xbox 360 Release Date: Spring 2013 Anticipation Level: 10/10 bad guys. Now being overseen by Square

Grand Theft Auto V is coming, finally, after

Enix, the new Tomb Raider has many gam-

far too big a gap between the first teaser

ers eager to revisit the series with fresh

trailer and the actual release date. We still

eyes.

don’t quite know when it’s going to drop,

Watch Dogs

but it will definitely be during the first half of 2013.

Platforms: PC, PS3, and Xbox 360

So, what to expect from Rockstar’s latest

Release Date: Late 2013

and possibly greatest game? The second

Anticipation Level: 9/10

trailer (embedded below) gives much

Watch Dogs is an exciting new IP from

away, including the outline of a plot which

Ubisoft Montreal, the developer that

employs three main protagonists who join

Universal Magazine

www.Magazine.com

Page

23

23 www.sectord.in


Sony Xperia Z Sony made the switch to Android quite some time ago, and has been constantly working to improve its devices ever since. Even though the manufacturer tried to make something happen with its high-end models of recent years like the Xperia T and S, it wouldn’t be a lie if we say that its efforts have largely remained unnoticed in this world dominated by Galaxies and iPhones. What do you have to do to become a factor in this business? It certainly isn’t easy, considering that a company such as Sony, which has an almost fanatical following, hasn’t been able to disturb the status quo. Apparently, what’s needed is much more than just a strong specs sheet and a recognizable name. You need to have the powerful hardware encased in a beautiful design, a fast and responsive software experience, the latest operating system, a great camera, topnotch display... and of course, you have to be ready to take responsibility for anything you might mess up and be ready to fix and/ or enhance the software of the device as frequently as you have to. Sony’s smartphones have obviously lacked some of these prerequisites, but Sony has proven to be resilient. It is now ready to try again. A new flagship model, a new Xperia phone is here to try and overpower the dominant species. Is that even possible? Why, we say nothing is impossible!

24

Universal Magazine

www.Magazine.com

The Sony Xperia Z is one of the six newly released high-end smartphones by NTT DoCoMo, along with Panasonic Eluga X, Sharp Aquos EX

Universal Magazine

www.Magazine.com

25


Social Networking RAFIQUDDIN AHMED

D

A social net-

lion are active on monthly

work is an

basic. Google+ is written

online service,

in Java and JavaScript. It is

platform or

the biggest attempt to rival

site where you can express

the social networking site

your ideas, thought with

facebook which have 1 bil-

the world. A social network

lion active users. But Google

service consists a represen-

fail to beat the popularity of

tation of each user (often

facebook.

5. MySpace: It’s a social net-

profile) and some addition-

working site with a strong

al links. Most of social network service is web based.

3. Twitter: Twitter is an

music emphasis owned by

They provide a platform for

online social networking and

users to interact over the

microblogging service than

Specific media and POP singer

internet. A social network

enable its user to read and

Justin Timberlake. My space

site have many services, they are basically email, chatting, photo

send text based messages up to 140 characters. Twitter is written

was launched in 2003. Before

share, blog, own profile etc. You can create groups on social

in JavaScript, Ruby, Scala and Java. Twitter has 500 million reg-

2006 MySpace is the most vis-

networking sites and can manage your account. Many social

istered users. In twitter only a registered user can tweet or post

networking sites allow user to share ideas, thoughts, activities,

message but all can read that tweet or message.

ited Social networking website according to Google. In

events and interest. Some popular social networking sites are –

MySpace you can play online

1. Facebook:

It is most popular social networking site

4. Linked In: Linked In is an online social networking site for

launched in 2004 and founded by Mark Zuckerberg. Facebook

professional people. Founded in December 2002 and launched in

is written in C++ and PHP languages. Facebook have over one

May 5, 3003. It mainly used for professional networking. Linked

billion active user. And half of them are use facebook on mobile

In helps you to create and manage your professional identity.

games, listening to music, share picture etc.

device. User must be resister to facebbok before use facebook services. In facebook user can share thought, picture, video, write notes. User can also create Pages, Groups as per their requriment.

2. Google Plus:

Google+ (Google Plus) is a social network-

ing site owned and operate by Google Inc. It was launched on June 28, 2001. It has 500 million registered users whom 235 mil-

26

Page

Universal Magazine

www.Magazine.com

26 www.sectord.in

www.sectord.in

www.facebook.com/groups/sectord


Java : the programmer’s language

Java Fact File

JDK 1.0 (January 21, 1996) JDK 1.1 (February 19, 1997) J2SE 1.2 (December 8, 1998) J2SE 1.3 (May 8, 2000) J2SE 1.4 (February 6, 2002) J2SE 5.0 (September 30, 2004) Java SE 6 (December 11, 2006) Java SE 7 (July 28, 2011)

Java logo: A cup of coffee is used as the logo for Java. Java coffee refers to coffee beans produced in the Indonesian island of Java. In some countries, including the United States, “Java” can refer to coffee. It is being said that the creators of the

R

interpreter has been ported to a computer, it

language used to have large amount of coffee.

can run any bytecoded program. The project

So is the symbol used.

was code-named Green. It took 18 months to

Java mascot: Duke

develop the first working version of java.

Back in the early days of Java development, Sun

By 1993, it became obvious to members of the

Microsystems’ Green Project team created its

Java design team that the problems of portabil-

first working demo—an interactive handheld

ity which is encountered in creating code for

home entertainment controller called the Star7.

embedded controllers are also found when

At the heart of the animated touch-screen user

Java is a general-purpose

grams reflect it. If you program poorly, your

trouble with C and C++ (and most other

attempting to create code for the Internet. In

interface was a cartoon character named Duke.

object-oriented com-

programs reflect that, too. Put differently,

languages) is that they are designed to be

fact, the same problem that Java was initially

The jumping, cart wheeling Duke was created

puter programming lan-

Java is

compiled for a specific target. Although

designed to solve on a small scale could also

by one of the team’s graphic artists, Joe Palrang.

guage which is publically

wheels. It is a language for professional

it is possible to compile a C++ program

be applied to the Internet on a large scale. This

Joe went on to work on popular animated mov-

announced in the spring of

not a language with training

programmers.

for just about any type of CPU, to do so

Developers:

realization caused the focus of Java to switch

ies such as Shrek, Over the Hedge, and Flushed

1995. As of 2012, Java is one of the most

requires a full C++ compiler targeted for

from consumer electronics to Internet program-

Away.

popular programming languages in use,

Java was developed by a group of Sun

that CPU. The problem is that compilers are

ming. So, while the desire for an architecture-

Duke was designed to represent a “software

particularly for client-server web applica-

Microsystems engineers James Gosling,

expensive and time-consuming to create.

neutral programming language provided the

agent” that performed tasks for the user. Duke

tions, with a reported 10 million users.

Patrick Naughton, Chris Warth, Ed Frank,

An easier—and more cost-efficient—solu-

initial spark, the Internet ultimately led to Java’s

was the interactive host that enabled a new

The most unique feature of java is that it

and Mike Sheridan in 1991. The team was

tion was needed

large-scale success.

type of user interface that went beyond the

let application developers “write once, run

led by James Gosling who is also known

The Green project had a lot of trouble getting

buttons, mice, and pop-up menus of the desk-

anywhere” (WORA),which means that code

as father of Java. Later, many other people

In an attempt to find such a solution the

others interested in Java for smart devices. It

top computing world.

that runs on one platform does not need

like Bill Joy, Arthur van Hoff, Jonathan

group led by James Gosling began to work

was not until they decided to shift gears and

Duke was instantly embraced. In fact, at about

to be recompiled to run on another. Java

Payne, Frank Yellin, and Tim Lindholm were

on a language that to be small or portable

market Java as a language for web applica-

the same time Java was first introduced and

applications are compiled to bytecode

key contributors to the maturing of the

and use efficient code since the consumer

tions that interest in Java took off. Many of the

the first Java cup logo was commissioned, Duke

(class file) that can run on any Java virtual

original prototype of the language Java.

devices do not have powerful CPUs. They

became the official mascot of Java technology.

machine (JVM) regardless of computer

Development history:

advantages that Java has for smart devices are

also wanted the language to be hardware

even bigger advantages on the web.

In 2006, Duke was officially “open sourced”

architecture.

Interestingly the original impetus for Java

independent since different manufacturers

The language was initially called Oak after an

under a BSD license. Developers and designers

Java was designed, tested, and refined by

development was not the Internet! Instead,

would use different CPUs. These conditions

oak tree that stood outside Gosling’s office.

were encouraged to play around with Duke and

real, working programmers. It is a language

the primary motivation was the need for

led them to decide to compile the code to

However, they soon discovered that there was

for the first time had access to Duke’s graphi-

grounded in the needs and experiences of

a platform-independent (that is, architec-

an intermediate machine-like code for an

already a programming language called Oak, so

cal specifications through a java.net project at

the people who devised it. Thus, Java is a

ture-neutral) language that could be used

imaginary CPU called a virtual machine.

they changed the name to Java, from Java cof-

http://duke.kenai.com. - Anwesha Goswmai

programmer’s language. Java is cohesive

to create software to be embedded in

This intermediate code (called bytecode)

fee, said to be consumed in large quantities by

and logically consistent. Except for those

various consumer electronic devices, such

is completely hardware independent.

the language’s creators.

constraints imposed by the Internet envi-

as microwave ovens, remote controls and

Programs are run by an interpreter that

Versions:

ronment, Java gives you, the programmer,

cable boxes or set top box etc and which

converts the bytecode to the appropri-

Major release versions of Java, along with their

full control. If you program well, your pro-

will be under differing environments. The

ate native machine code. Thus, once the

release dates:

28

Page

Universal Magazine

www.Magazine.com

28 www.sectord.in

Google and Android, Inc. have chosen to use Java as a key pillar in the creation of the Android operating system, an open-source smartphone operating system. Besides the fact that the operating system, built on the Linux kernel, was written largely in C, the Android SDK uses Java to design applications for the Android platform. On May 7, 2012, a San Francisco jury found that if APIs could be copyrighted, then Google had infringed Oracle’s copyrights by the use of Java in Android devices. Oracle’s stance in this case has raised questions about the legal status of the language. However, the Hon. William Haskell Alsup ruled on May 31, 2012, that APIs cannot be copyrighted.

Gaikai uses the Java browser plugin to stream game demos to any PC. Gaikai (Japanese for “open ocean”) is a cloud-based gaming service that allows users to play high-end PC and console games via the cloud and instantly demo games and applications from a webpage on any computer or internet-connected device.

Universal Magazine

www.Magazine.com

Page

29

29 www.sectord.in


WE

BSIT

Starts

E FO

R YO

UR

BRA

ND

from

Rs. 1500 * cONDITIONS aPPLY

email : admin@gkd619.com or visist www.gkd619.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.