A Complete Geek Magazine
SECTOR-D Issue 03 | March 2013
wIRELESS sECURITY aFFILIATE mARKETING Plus
amazing
typography tips
How To
Optimize YOUR dns
Women Day Special
The Sexiest Geek Girls Alive
March 2013
contents
LETTER FROM
THE EDITOR
SectorD
E-Magazine
The most beautiful creation of god We know many of them who have set a mile stone in their respective fields. while trying to listing out some of them my mind come across these names Marie Curie, Frida Kahlo, Helen Keller, Mother Theresa, Oprah Winfrey, Razia Sultana and so many. They have proved their way in all direction from science to entertainment, from politics to social works from art to cyber world. Fortunately, we have International Women’s Day, celebrated around the globe
22
07
on March 8 of every year commemorating the contribution women have made to the world. It is a day of reflection, of considering women, how far they’ve come – and how far they’ve yet to go in terms of rights, equality and choices available to them. We think, like Remembrance Day, that March 8 is a day worthy of the kind of thought that people must take a few minutes to consider and one that
Feature
people ought to be allowed to take some time out of their day for. Some argue that students are better served by attending school on these days, because the awareness they receive through school assemblies, services or other pedagogic input is invaluable to their awareness of women’s issues.
06 How To Optimize Your DNS.
14 G.I. JOE: Retaliation
07
16
GADGET OF THE MONTH.
COSMOS II (REVIEW)
17 WHATSAPP FOR PC
08 WHAT IS THE DIFERENCE BETWEEN IPV6 AND IPV4? 10 EARN ONLINE WITH AFFILIATE
20 DIGITAL CAMERA SENSOR
We should take out some time to thank those woman who are playing most
unique and important role in our life being mother, sister, daughter, wife, girl-
22 SECTOR-D GAMER ZONE
friend and so on. Start thinking on security, right, equality and the choices they
24
SONY XPERIA - X (REVIEW)
26 SOCIAL NETWORKING
17 DRIVER GENIUS (REVIEW)
28 JAVA : THE PROGRAMMING LANGUAGE
MARKETING 18 WIRLESS LAN SECURITY
should get in life. Make them smile on the occasion of International woman’s day. Celebrate with us International Woman’s day. This is our 3rd edition and a long way to go now. Thanks to all members of Sector D, who is giving innumerous support to us. My special thanks to Parag Shinde, Ironhide Rocklife, Rafiq Ahmed, Amartya Saikia and Hitesh Das for actively supporting in each issue of the magazine. Looking forward to have more from you all.
12 WOMEN DAY SPECIAL: THE SEXIEST GEEK GIRL ALIVE
We promise you to bring much more from techno world in our upcoming
Content Writer Parag Shinde admin@queans.in
Ironhide Rocklife ironhiderocklife@gmail.com
Rafiq Ahmed ghylive@gmail.com
Amartya Saikia apple.skull000@gmail.com
Hitesh Das hitesh40533@gmail.com And Anwesha Goswami anweshagoswami26@gmail.com Azrael D Vrykolaka fatekiller196@gmail.com
issue. Be a part of our team by sharing your knowledge and information in our upcoming issues. Hoping for your help and support to spread and promote us. Stay good stay safe.
Azrael D Vrykolaka
Admin (SectorD)
On The cover Women day Special: The Sexiest Geek Girl Alive.
04
2
07
10
Universal Magazine
13
16
www.Magazine.com
19
21
23
26
27
29
30
For Advertisement Contact: +91-9508606749 +91-9960188702
March 8th International Women’s Day is meant to appreciate those who have the biggest but quietest influence in our lives.
admin@sectord.in www.sectord.in
Universal Magazine
www.Magazine.com
3
March 2013
contents
About SectorD Sector-D is nourished by the gratitude of its benefactors and powered by the reach of social networking; this community has produced a wide variety of high-quality hacks, resources and tools, available to everybody. Every single contribution supports the entire community, and the community supports these contributors with traffic and word-of-mouth advertising: the
Logo Designed by Sourav Jyoti
networking effect at its best. Our contributors—Software developers, professional hackers, Network admin, web
26
developer, Graphic designer—are top experts in their fields. It is our hope that our efforts go a long way in promoting critical thinking, solving problems and surprising people with various
Our Team is Incomplete Without -
computer tricks. Our aim is to inform our readers about the latest trends and techniques in Web development. We try to persuade you not with the quantity, but with the quality of the information we present. Our readers can live more sustainable lives and connect with ongoing efforts for change.
28
Don’t worry – there’s no big dollar training
-Parag Shinde 14
Magazine Fact File
12
10
4
Universal Magazine
www.Magazine.com
Amrit Deb Gaurab Shivam Sam Ironhide Indukalpa Hazarika Subham Rajak Jyotishman Dutta Ritumoni Bhuyan Bhargab Hazarika Punk Puskar Sourav Jyoti Roshan Singh Rabi Mondal Bhaskar Jyoti
First ever popular magazine Mercure Galant, a gossip magazine, was first published in parish in March 1672. First women’s magazine The Ladies’ Mercury was first published in London on 27 June 1693. First American Magazine The American Magazine, published in Philadelphia, probably began on 13 February 1741. First children’s magazine The Lilliputian Magazine appeared in the UK in June 1751 and ran for just over a year. The first in the USA was the Children’s Magazine, published in January 1789.
First fashion magazine The Paris magazine Le Cabinet des Modes was first published in 1785. First photograph in a magazine Each copy of the June 1846 issue of the Art Union (UK) contained a photograph by Henry Fox Talbot, one of the inventors of photography. First advertising magazine Exchange & Mart was launched in the UK in 1868. - Rafiq Ahmed
Universal Magazine
www.Magazine.com
5
How To Optimize Your DNS For Faster Internet The Internet is just a series of tubes” as one man so wisely stated. Unfortunately, it’s not as simple as that. There’s a complex architecture that supports the Internet, and data packets need to travel some interesting routes in order to reach you. If you can optimize the paths that your data takes, you can boost your Internet speed.
H
Gadget What Is DNS Optimization?
of The Month March
In simple terms, the Internet (at least the part of the Internet that contains webpages) is a network of computers where each computer holds a record
2013
of other computers on the Internet. These records are a list of “domain names” and these servers are “domain name system” (DNS) servers. That’s a drastically simplified explanation, but it’s enough to understand why DNS is important. This network of DNS servers is how data packets traverse the Internet and reach their destinations. They hop from server to server, asking each server along the way for the correct route
there’s a handy little “Conclusions” tab that will summarize the
towards the target computer. This is called “routing”.
state of your DNS connections. Full instructions, which are only 3
Now, certain DNS servers may have outdated records. Some
steps, are listed on the program’s website. NameBench is another
servers may have inefficient records that point your data pack-
great program that can identify problems in your DNS records.
ets towards the scenic route, taking you all around the Internet
It tells you where your Internet performance is failing and tries
before the packets can reach the destination. If you can track
to find the most responsive DNS servers for your location. Use it
the most efficient DNS servers paths, then you can cut away that
before you use any DNS optimizer because if you already have
excess travel time. Thus, DNS optimization.
high-performance DNS records, there’s little to gain Optimizing DNS Performance
Benchmarking Your DNS Performance
So you’ve run some sort of DNS benchmark program and the con-
There are certain tools for “DNS benchmarking” that can help
clusions state that your DNS connections are rather shoddy? Well,
you determine sub-optimal DNS records and fix them. In
that’s when we know it’s time for you to clean up your records
essence, they compare the response times of various DNS servers
and improve web performance through a bit of optimization.
that you’ve used recently against publicly-available DNS servers.
That’s where NameHelp comes in. NameHelp is a program that
This DNS server comparison is used to rank the various DNS serv-
was developed by researchers at Northwestern University. It sits
ers in order of their response times and a few other factors. By
in the background of your system and silently optimizes dns set-
optimizing this list, your data packets are sent out to the most
tings to contact the fastest servers for your location. All it takes is
efficient (read: fastest) DNS routes, which ends up increasing your
a quick installation and configuration. Once that’s done, you’ll see
browsing speed – sometimes significantly.
a boost to your web browsing speed (given that your DNS bench-
When it comes to benchmarking, use Domain Name Speed
mark wasn’t so great to start with).
Benchmark. The download is extremely light (only ~160KB) and
NameHelp is available on Windows, Mac, and Linux systems free
the program is extremely easy to use. After you run the scan,
of charge. - Parag Shinde
6
Universal Magazine
Page
www.Magazine.com
6 www.sectord.in
Google Project Glass
Google’s co-founder Sergey Brin loves the internet so much that he’s found a way to use it literally all the time. His new Google endeavour, Project Glass, overlays information from the web, such as weather reports, messages from friends and map directions, on top of the real world through one of the glasses’ lenses. The specs are also fitted with a camera that lets you take pictures or record video without much fuss. It’s a revolutionary bit of tech, it’s just a shame you’ll be a bit of a social pariah if you wear them in public. - Azrael D Vrykolaka
Universal Magazine
www.Magazine.com
Page
7
7 www.sectord.in
What is IPv4 -- Internet Protocol Version 4? IPv4 (Internet Protocol Version 4) is the fourth revision of the Internet Protocol (IP) used to to identify devices on a network through an addressing system. The Internet Protocol is designed for use in interconnected systems of packet-switched computer communication networks (see RFC:791).
What is The Difference Between
IPv6 and IPv4?
IPV6
Confused by phrases like Internet Protocol (IP), IPv6, IPv4 and IPng? Webopedia explains the difference between IPv4 and IPv6, and looks at the topic of migrating to a 128-bit address space.
AND IPV4
T
What is Internet Protocol -- IP? IP (short for Internet Protocol) specifies the technical format
of packets and the addressing scheme for computers to communicate over a network. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself can be compared to something like the postal system. It allows you to address a package and drop it in the system, but there’s no direct link between you and the recipient. TCP/IP, on the other hand, establishes a connection between two hosts so that they can send messages back and forth for a period of time.
Page
8 www.sectord.in
IPv6 (Internet Protocol Version 6) is also called IPng (Internet Protocol next generation) and it is the newest version of the Internet Protocol (IP) reviewed in the IETF standards committees to replace the current version of IPv4 (Internet Protocol Version 4).
Webopedia’s Network and Internet Protocols Category offers definitions to hundreds of technology terms and phrases related to network protocols. You can view all related sub-categories and term definitions here. Internet protocol (IP) IPv6 (IPng) IP Address IP switching mobile IP Related IPv6 Articles
IPv6 is the successor to Internet Protocol Version 4 (IPv4). It was designed as an evolutionary upgrade to the Internet Protocol and will, in fact, coexist with the older IPv4 for some time. IPv6 is designed to allow the Internet to grow steadily, both in terms of the number of hosts connected and the total amount of data traffic transmitted. IPv6 is often referred to as the “next generation” Internet standard and has been under development now since the mid-1990s. IPv6 was born out of concern that the demand for IP addresses would exceed the available supply. While increasing the pool of addresses is one of the most oftentalked about benefit of IPv6, there are other important technological changes in IPv6 that will improve the IP protocol: * No more NAT (Network Address Translation) *Auto-configuration *No more private address collisions *Better multicast routing *Simpler header format *Simplified, more efficient routing *True quality of service (QoS), also called “flow labeling” *Built-in authentication and privacy support *Flexible options and extensions *Easier administration (say good-bye to DHCP)
Internet Protocol (IP): IPv4 and a new ver-
An IP address is binary numbers but can be stored as text for human readers. For example, a 32-bit numeric address (IPv4) is written in decimal as four numbers separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address. IPv6 addresses are 128-bit IP address written in hexadecimal and separated by colons. An example IPv6 address could be written like this: 3ffe:1900:4545:3:200:f8ff:fe21:67cf (see “What does an IPv6 address look like?”)
coexist with the older IPv4 for some time
www.Magazine.com
A Dictionary of IPv6 Related Terms
There are currently two version of
upgrade to the Internet Protocol. IPv6 will
Universal Magazine
What is IPv6 -- Internet Protocol Version 6?
The Difference Between IPv6 and IPv4 IP Addresses
sion called IPv6. IPv6 is an evolutionary
8
IPv4 is the most widely deployed Internet protocol used to connect devices to the Internet. IPv4 uses a 32-bit address scheme allowing for a total of 2^32 addresses (just over 4 billion addresses). With the growth of the Internet it is expected that the number of unused IPv4 addresses will eventually run out because every device -- including computers, smartphones and game consoles -- that connects to the Internet requires an address. A new Internet addressing system Internet Protocol version 6 (IPv6) is being deployed to fulfill the need for more Internet addresses
IPv6: Preparing for the Migration IPv6 is here. With the move to a 128-bit address space will come a fundamental shift in the way you think about your network. Are you ready to migrate? Still learning about the challenges? Check in here as we add to our collection of IPv6 resources.
Is the U.S. Ready For The IPv6 Challenge? In the third volume of its report to the government about IPv6 transition, Juniper Networks outlined some of the key challenges and initiatives the government will have to undertake in order to meet the federally mandated IPv6 transition deadline of June 2008.
Understanding IPv6 We’re going to spend some time teaching you a number of incredibly wonderful things about IPv6, such as why network administrators need to get their duffs up and implement it, bullet points to persuade the bosses, and, of course, how to actually use it. Did You Know...? The American Registry for Internet Numbers (ARIN) manages IP address space allocations for the U.S., Canada and the Caribbean region. ARIN is one of five global Regional Internet Registry (RIR) organizations that in turn receive their IP allocations from the Internet Assigned Numbers Authority (IANA) - Ironhide Rocklife.
Universal Magazine
www.Magazine.com
Page
9
9 www.sectord.in
1) Look for a product to promote and look for a niche to promote that product to. The product can be physical (an object) or virtual (an ebook or software). For physical products, you can set up an affiliate account on Amazon.Com or CJ.com. For virtual products, you can do the same thing on Clickbank.com. How do I start affiliate marketing? By learning to target. Don’t select a broad niche; it’s a waste of
Earn online with Affiliate Marketing
time. Narrow it down. In case you promote a weight-loss product, focus on women seeking to lose their double chin before their wedding day as opposed to… just overweight women. 2) Create a website or blog (with WordPress) or only a “lens” on Squidoo.com (if you don’t feel like owning a website for now) about the product(s) you are promoting. Create high-quality, informative content. Don’t push people to buy, just recommend products. Write in the first person but do not talk too much about yourself, speak about your visitors, the things the product you’re recommending can bring to THEM. That’s what matters to them. Use your style, be funny (or try to..!), don’t be too formal. Make sure you put pictures as well. People love them! 3) Build a list (with Aweber) if you have your own website or blog. Offer something valuable to your website visitors in return for their email address in order for you to build a list of subscribers that are potential buyers. Communicate with them by email (like a newsletter) a couple of times per week. They most likely didn’t buy the 1st time they came across the product(s) you are promoting so having them on your list is an opportunity to promote to them by email. Try to find the appropriate bal-
You might have heard of Affiliate Marketing — Isn’t it?? No??? Strange, but not to worry, there’s a lot ahead in this article and you will get to know much about it (and more) by its end
ance between helpful free content and promotion. Bear in mind they can unsubscribe at any time. Make them stay. 4) Create backlinks to your site (links placed on other sites that point to your site) fir Google to value your site and place it high in the search engine results (SERP) for the keyword you’re targeting. Backlinks can be created through article marketing (place a link at the bottom of your article), social bookmarking, profile backlinks, forums signatures, blog commenting.. Basically anywhere you can put a link to your site. Of course if you’re doing article marketing and want to drive traffic to your site via your articles, you have to create backlinks to your articles. Backlinking has to be consistent and look natural to Google (a few varied backlinks to your site per day). 5) Use Social Networks : As you all know, social networks are growing at a rapid rate and will continue to grow. Facebook, for example, has nearly 600 million users and twitter has 200 million. And that is what you can make use of. If you use twitter, you can search for tweets in your niche and reply to them with helpful product links (masked with your affiliate code). For Example : You search for your loved niche, lets say “Weight Loss”, in Twitter and you find a tweet of a desperate person asking for help to loose his/her weight.
T
What is Affiliate Marketing?? Or What is the exact definition?
Perhaps the simplest way to explain affil-
iate marketing is that it is a way of making money online whereby you as a publisher
you Get paid a commission. There are a
site they get redirected to the product site
rect to the Merchant’s website from your affili-
number of forms of these types of promo-
and if they purchase a product or subscribe
ate site, whether or not a sale is made.
tions but in most cases they involve you
to a service you as the referrer make a com-
Pay per Lead: You get paid once the referred
as a publisher earning a commission when
mission.
visitors provide their contact information on the
someone follows a link on your blog to
The sellers can track your performance
target site by filling out a simple contact form.
another site where they buy something.
through your affiliate ID and the affiliate
How do I get Started with Affiliate Marketing?
softwares (eg. WP Affiliate Platform) that
There are a few things to keep in mind before
they use. You also have complete, real time
choosing to get into this business. Firstly, you
access to all sales and commissions stats.
must find the right Affiliate Product to Promote
You don’t need to sell products all the
and secondly you must have an audience that
moting their product, service or site.
How Does Affiliate Marketing Work?
By definition-
choose the products that you want to sell,
time to make a commission. Different affili-
will be interested in that product.
sellers provide you with an unique affiliate
ate programs can use different payment
How do I get Started with Affiliate Marketing?
code that you can use to refer traffic to the
terms such as:
There are a few things to keep in mind before
are rewarded for helping a business by pro-
“Affiliate marketing is a marketing practice in which a business rewards one or more affiliates for each visitor or customer brought about by the affiliate’s own marketing efforts.” So, When you successfully get a customer to the business and make a sale (or lead), 10
Page
Universal Magazine
When you join an Affiliate program and
that tweet with your affiliate product link. 6) Create Videos: Video Marketing helps you get tons of targeted traffic easily (Yes, i said ‘easily’). All you have to do is Create a Video Review of the Product you are promoting and upload that video to popular video sharing sites like Youtube. In the description field for that video, Add your affiliate link and that’s it. Videos gets viral too easily, All you need to care is about the Title and the Content of the video. Try to create a catchy Title which makes people view your video. You can work on Keywords and link building to get the video rank higher in search engines but there is an easy way to get traffic to your video. It is by getting your video listed in the “Related Videos” section of Popular Videos in your niche. This can be achieved by adding the same tags to your video which are used by other Popular Video in your Category. Affiliate Marketing – Easy Money? While affiliate marketing can be incredibly lucrative it is important to know that affiliate marketing is not easy money. Most people who try it make very little as it relies upon numerous factors including: traffic (high traffic helps a lot)
readymade text links, banners and other
Pay per Sale: In this program a merchant
must find the right Affiliate Product to Promote
forms of creative copies whereby you only
pays you a percentage of the sale price
and secondly you must have an audience that
have to copy the code and place it on your
when the purchase is completed.
will be interested in that product.
website to start referring traffic. When inter-
Pay per Click: In this program you get paid
having a readership who is in a ‘buying mood’
ested visitors click on these links from your
based on the number of visitors you redi-
you being able to write good sales copy (and more) - Hitesh Das (www.dealwithcoupon.com)
www.Magazine.com
10 www.sectord.in
choosing to get into this business. Firstly, you
target site. Most affiliate programs will offer
Now If you know of a product which you think can really help that person, you simply can reply to
finding relevant products finding quality products building trust with your readers
Universal Magazine
www.Magazine.com
Page
11
11 www.sectord.in
THE TOP
5
The Sexiest Geek Girls Alive
2
5
Marina Orlova
Natali Del Conte
This native Californian now hangs out in New York, and she’s serious business. She’s one of CNET’s senior editors, and she’s worked with Wired, TechCrunch, PC
Magazine and a host of newspapers and other publications. She’s an experienced podcaster, and she’s made appearances on numerous other tech shows and broadcasts, including G4′s Attack of the Show.
- Azreal D Vrykolaka This 28 year-old Russian vixen doesn’t spend her time bouncing around in front
T
There has been a sharp rise
throwing off the curve, and people need
recently of so-called geek girls,
to understand that receiving a 300 page
and the sad fact is that many,
phone bill does not make a girl geeky. It
if not most, of these women
makes her a stereotype that is far older,
5 Hottest GeekGirls
of a camera just for kicks — she’s out to educate in the process. Originally an etymologist, Marina found that applying her considerable knowledge in an unorthodox fashion was a quick way to beat the
are nothing near geeky. While the elusive
and less respectable. We’re here to set the
geek girl does, in fact, exist, she’s much
record straight, with these 5 women who
less common than most would care to
all qualify as the hottest geek girls to have
per video, Marina pretty much owns
admit. There are criteria that must be met
graced the Internet’s tubes of fame.
YouTube. She’s been singled out by Wired,
to make a proper geek girl; she must be geeky, she must be a techie, and she must be hot. Too many misconceptions are
economy, and in 2007 Hot for Words was born. Averaging at over two million views
Geek
G4, and Cosmopolitan as one the world’s
Sexy
hats as well.
sexiest geek girls, and we’re tipping our
1
She may be one quarter Aussie, a quarter Chinese, and half Canadian, but this geek girl is 100% awesome. She produced Assassin’s Creed in 2007, and she’s the sequel’s executive producer this year. She’s spent time working for Sony Online and Electronic Arts, two of the biggest names in the industry. One thing’s for certain; Ubisoft is one lucky gaming company to
Another Canadian, Amber came down from the deep north to work for Microsoft, and even spent time in San Francisco working for Razorfish. She hangs out with Leo Laporte on a regular
And Hot
Jade Raymond
4
Amber MacArthur
basis, and she’s hosted or made appear-
3
ances on a laundry list of tech shows and podcasts over the years.
Marissa Mayer
She may be called The Cupcake Princess, but Marissa Mayer is no joke. She’s Vice President of Search Product and User Experience at Google. What’s that mean? It means within the walls of Google, what she says goes. She studied artificial intelligence at Stanford, and before she became the first woman to work at Google, she worked for UBS in a Zurich lab.
have her guiding their code.
12
Page
Universal Magazine
www.Magazine.com
12 www.sectord.in
Universal Magazine
www.Magazine.com
Page
13
13 www.sectord.in
G.I. Joe: Retaliation
A
“Whatever deity may guide my life, Dear Lord don’t let me die tonight!” -Roadblock
G.I. Joe: Retaliation (also known as G.I. Joe 2 or G.I. Joe 2: Retaliation) is an upcoming 2013 American action thriller directed by Jon M. Chu, based on Hasbro’s G.I. Joe toy, comic and media franchises. It is a sequel to 2009’s G.I. Joe: The Rise of Cobra.The film was written
by Zombieland writers Rhett Reese and Paul Wernick. G.I. Joe: Retaliation features an ensemble cast, starring Bruce Willis and Dwayne Johnson, with Channing Tatum, Arnold Vosloo, Ray Park, Jonathan Pryce, and Lee Byung-hun reprising their roles from the first film. The US release date is March 29, 2013.
Plot After being framed as traitors by Zartan, who is still impersonating the President of the United States, the Cobra Commander now has all the world leaders under Cobra’s control, with their advanced warheads aimed at innocent populaces around the
Releasing
world. Outnumbered and out gunned, the Joes form a plan with the original G.I. Joe General Joseph Colton to overthrow
on 29 march
the Cobra Commander and his allies Zartan, Storm Shadow and Firefly.
14
Page
2013
Universal Magazine
www.Magazine.com
14 www.sectord.in
Universal Magazine
www.Magazine.com
Page
15
15 www.sectord.in
COSMOS II Cooler Master
chassis
For PC Sometimes feel your PC would be better to chat – while working. Well good news is that you can easily install WhatsApp on your PC and use it to send free messages to your friends and colleagues.
Driver Genius Update all drivers automatically… and without any research!
The COSMOS II Ultra Tower features a streamlined design accentuated by a pair of distinctive handles like no other. The smooth, brushed aluminum touch of the side panels unlock and swing open like the doors of a luxurious raceEaque ipsa quae ab illo ins vens tore veritatis car.
ert quasi. Archirs tecto beatae vitae dicta sun explister cabo enims Hidden behind the front slide cover lies a stack oftia hot-swappable drivenemo bays. The black unsers interiors amet. provide enough
To install whatsapp on your windows pc, you will be required to
Driver Genius Professional 11 is the better solution for quickly
follow 3 main steps
and securely update all device drivers and hardware on Microsoft
Step 1: Install Bluestacks player from Bluestacks. It lets you run
Windows operative systems.
android apps on your personal computer.
The Driver Genius search engine takes a few seconds to know what
Step 2: After installing Bluestacks on your PC, you can install
drivers to update, thus forgetting the long hours spent research-
Whatsapp using bluestack search button
ing the right driver, no more waiting, when a driver is made avail-
Step 3: Verify whatsap account by entering your phone number / mobile number. Please note only 1 activation is allowed per number. So if you wish to use mobile phone and pc using the same number, I would suggest entering your landline number. In case you decide to use landline home number, you can get automated voice call which will call out number code which you will need to enter in the app to verify. Once done, you can add contacts to your whatsapp and start chatting. - Parag Shinde
able by the manufacturer is ready to be downloaded with the program!The wide online database includes all drivers of all types, from most recent to oldest, allowing you to update all PCs with different versions of Windows installed, from the latest Windows 7 to old XP. Thanks to the diagnostic scan, it’s easy to check for drivers conflicts and remedy the situation automatically, without having to look on the websites of manufacturers of hardware in search for the correct driver!And with the Live Update then you know you always have the latest driver available! - Azrael D Vrykolaka
space for oversized XL-ATX System Boards equipped with 4 double width graphics accelerators. A second slide cover on top hides the Advanced Control Panel to manage up to 10 fans and their respective LED lights. The combination of its elegant looks, numerous expansion options and features make the COSMOS II a “Dream Case”. 16
Universal Magazine
www.Magazine.com
Universal Magazine
www.Magazine.com
Page
17
17 www.sectord.in
Wireless LAN Security Security for any organization large or small
A
One of the most common questions that people ask
is currently in BETA phase and is not ready for prime time yet.
me about Wireless LANs is “are Wireless LANs really
TinyPEAP puts a PEAP authentication server and PKI Certificate
safe?” immediately followed up by “what kind of secu-
Authority in your home’s Wi-Fi enabled Linksys Router which was
rity do I need for my Wireless LAN?” The answer to
once the exclusive domain of large organizations with dedicated
the first question is “yes, if you implement good secu-
authentication servers. For the time being, the only viable option
rity measures” but the second question forces me to resort to the
for this environment is WPA PSK (Wi-Fi Protected Access Pre-
old “it depends”. It depends on what level of risk is acceptable to
Shared Key) mode. WPA mode mandates TKIP at a minimum but
your home or organization. It depends on what level of manage-
also has an optional AES encryption mode. AES mode is highly
ment and cost you are willing to bear. To simplify this extremely
recommended because it has a rock solid pedigree in cryptana-
complex topic, I’ve come up with four arbitrary levels of WLAN
lytic resistance whereas TKIP may be under attack in the near
(Wireless LAN) security as a general guideline that is designed to
future. Note that AES in WPA2 (fully ratified version of 802.11i)
suit everyone’s needs from the home to the military.
is no longer optional and is mandated today. Since most home
Level 1: Home and SOHO WLAN security
users would be lucky if all of their equipment and software was
Level 2: Small Business WLAN security
TKIP capable, most homes will have to be content with TKIP mode
Level 3: Medium to large Enterprise WLAN security
for now.
Level 4: Military grade maximum level WLAN security
WPA PSK mode can be an effective security mechanism but leaves a lot to be desired in terms of usability. This is because
Level 1: Home and SOHO WLAN security
WPA PSK can be cracked with offline dictionary attacks so it relies
Unfortunately, many home users are either using some old equip-
on a strong random passphrase to be effective. Unfortunately,
ment, old drivers, or older operating systems that don’t natively
humans are very bad at memorizing long random strings of
support WPA so they are still using WEP if anything at all. WEP
characters and will almost always use simple to remember words
encryption was thought to be good for a week for most light
and phrases or some slight variation of that. This lends itself to
traffic home wireless networks because the older WEP cracking
dictionary attacks where a hacker will try every variation of every
tools needed 5 to 10 million packets to recover a WEP key, but the newest WEP cracking techniques can break WEP in minutes. Even if there isn’t that much traffic, the attacker now has ways to artificially generate traffic and accelerate WEP cracking. Because of this, consumers should avoid any product that doesn’t support WPA TKIP mode at a minimum but preferably WPA AES capable or WPA2 certified devices. If they have WEP only devices, check with the vendor to see if there are any firmware and/or driver updates that will upgrade the device to WPA mode. If not, anyone who cares about privacy should throw out those devices. As harsh as that may sound, it is comforting to know that newer Access Points and Client Adapters that do support WPA can be purchased for as little as $30. Client side Wireless LAN software (offi-
combination of words in the dictionary. To
Verisign, or it can be issued from an organiza-
For those who wish to implement TTLS, they will
make this very difficult to hack, use a 10 digit
tion’s internal Certificate Authority. These two
need to either purchase Funk Software’s Odyssey
string of random characters comprised of a-z,
options are conventional wisdom but neither
server (in the $2000 range) or implement FreeRADIUS
A-Z, 0-9 or use a very long word phrase made
option is particularly appealing to small busi-
on Linux which is Open Source. Note that Windows
up of 20 or more characters. Unfortunately,
nesses since they won’t like paying $500/year
does not have a built in TTLS client built in, you will
this will force many users to write down
for a 3rd party Digital Certificate and they most
need to purchase a wireless Supplicant (AKA Client
their passphrases which in itself may lead
likely don’t have a PKI in place which requires
software) for your end users. MDC has an Open
to passphrase theft. WPA PSK is not a good
a Certificate Authority server. An excellent
Source version for Linux, but you’ll need to purchase
long term security solution and leaves Level
way to get around this problem is to use a
one for Windows which is what most people are
1 security with much to be desired, but it can
Self Signed Certificate on your RADIUS server.
using. You’ll either need to implement the Root
be safe when used correctly.
Self Signed Digital Certificates violates all best
Certificate on the Clients manually or you’ll need to
Level 2: Small Business WLAN security
practice concepts for PKI, but I say be damned
purchase a 3rd party Digital Certificate which has
Small businesses must move beyond Level
with them if the alternative is to use no Digital
its Root Certificate already preinstalled. As for client
1 by incorporating authentication in to their
Certificates at all on your RADIUS server and
side configuration, you’ll need to find some other
Wireless LAN access controls. The standard-
run a completely vulnerable EAP mechanism
method to automate the installation process since
ized method for doing this is 802.1x and
such as LEAP. Running a secure EAP mechanism Active Directory does not support the automation of
PEAP or TTLS authentication. 802.1x restricts
such as PEAP or TTLS is too important to let PKI
3rd party clients.
access to the Datalink layer of a network by
be an obstacle. A newer protocol from Cisco
While 802.1x and PEAP or TTLS addresses the
only permitting access to the network if a
called EAP-FAST promises to solve this problem
authentication half of the equation when it comes
user proves their identity through the EAP
by claiming that you don’t need PKI and Digital
to security, encryption must also be addressed. Up
(Extensible Authentication Protocol) mecha-
Certificates but if you read the fine print from
until recent months, it was thought that “Dynamic
nism. There are many forms of EAP, but the
Cisco, that’s clearly not the case. Self Signed
WEP” where WEP keys are rotated often (commonly
two forms of EAP that is most appropriate for
Certificates would solve the problem for PEAP,
10 minutes) was considered to be “good enough”
Level 2 security is PEAP (Protected EAP) and
TTLS, or EAP-FAST for organizations too small to encryption. With the next generation of WEP crypt-
TTLS (Tunneled Transport Layer Security).
run a dedicated PKI Certificate Authority infra-
analysis tools, this is no longer the case and TKIP is
Note that PEAP in the general context refers
structure.
the new bare minimum. The WPA standard imple-
to PEAP-EAP-MSCHAPv2 mode, which only
The easiest method by far if you’re a Microsoft
ments TKIP which is a rewrite of the WEP protocol
requires a Server Side Digital Certificate and
Windows 2003 Server shop is to use the built
which will hold against current cryptanalysis tech-
a Client Side Username/Password. There are
in RADIUS server of Windows 2003 called IAS
niques for now, but newer methods of attacking TKIP
stronger forms of PEAP which we’ll cover later
(Internet Authentication Server). For a small
are on the horizon. The reliable long term solution
in the higher security levels. TTLS is actually
business, there is nothing wrong with adding
from the IEEE standards body is the 802.11i standard
a little better in security than PEAP-EAP-
the IAS service to an existing Windows 2003
which mandates AES. The recommendation for Level
MSCHAPv2 because it does not divulge the
server even if it’s their only server which also
2 through 3 is that you should be using WPA with
username in clear text. However, both forms
happens to be the Active Directory server. You
TKIP at a minimum and upgrade to AES as soon as
of authentication do a good job of protecting
can either convert that server in to a Certificate
possible. Note that some WPA devices already sup-
passwords because the MSCHAPv2 password
Authority as well and grant yourself a digital
port AES encryption while all WPA2 certified devices
challenge session is protected inside an
certificate for the RADIUS server or simply Self
must support AES encryption. To be on the safe side,
encrypted tunnel. This is why PEAP or TTLS is
Sign a digital certificate. With this in place, the
only buy products that support 802.11i and are WPA2
so much better than Cisco’s LEAP mechanism
Root Certificate (the public key of the Digital
certified.
which transmits the MSCHAPv2 session in the
Certificate) for the RADIUS server must be
From a vulnerability standpoint, the only way to
clear lending itself to easy offline password
installed in all of the client’s computers. With
break this security level is to steal a user credential by
dictionary cracking.
Active Directory, this can be easily be pushed
either looking over someone’s shoulders to see what
To implement PEAP or TTLS, the organization
out via Group Policy. All of the clients also need password they are typing, coaxing them in to tell-
needs to implement a RADIUS Authentication
to configure their wireless settings on the WZC
ing you what the password is (this is easier than you
Server. There are many ways to do this no
(Wireless Zero Configuration) service built in
think), or installing a key logger on to a user’s com-
matter what your software preference is.
to Windows XP SP1 or SP2. However, Active
puter so you can record their key strokes as they type
There are options for Microsoft Windows 2003 Directory allows you to configure this globally
in the password. Barring password theft, it would be
Server with IAS, 3rd party applications such
for all your users with Active Directory Group
far easier to break in to your premise and tap in to a
but Windows XP SP2 is highly recommended.
as Funk Odyssey (needed for TTLS mode)
Policy. Using the Microsoft method, a secure
Wired LAN than to attempt to crack Level 2 Wireless
that run on Windows, Open Source solu-
wireless network can be deployed throughout
LAN security. Level 2 is a good choice for most small
The home or SOHO (Small Office Home Office) environment
tions with FreeRADIUS. However, in order
an organization big or small in hours. If you
businesses but organizations where security is a high
to run in PEAP or TTLS mode, the RADIUS
don’t have IAS, it comes with Windows 2003
priority should seriously consider the next two levels
server must have a server side x.509 digital
Standard Edition which costs around $500 per
because a single lost password could compromise
certificate. This certificate can be purchased
copy. IAS in my experience is extremely robust,
the entire system.. - Ironhide Rocklife
from a 3rd party Certificate Authority such as
reliable, and secure.
cially known as Supplicants) also need to be updated to support WPA or WPA2. Windows XP SP1 with the WPA patch can suffice,
is very unlikely to have any kind of Authentication and PKI in place. This may change when TinyPEAP gets launched, but that
18
Page
Universal Magazine
www.Magazine.com
18 www.sectord.in
Universal Magazine
www.Magazine.com
Page
19
19 www.sectord.in
A Bayer array consists of alternating rows of red-green and green-blue filters. Notice how the Bayer array contains twice as many green as red or blue sensors. Each primary color does not
DIGITAL CAMERA SENSORS
receive an equal fraction of the total area because the human eye is more sensitive to green light than both red and blue light. Redundancy with green pixels produces an image which appears less noisy and has finer detail than could be accomplished if each color were treated equally. This also explains why noise in the green channel is much less than for the other two primary colors (see “Understanding Image Noise” for an example).
Note: Not all digital cameras use a Bayer array, however this is by far the most common setup. The Foveon sensor used in Sigma’s SD9 and SD10 captures all three colors at each pixel location. Sony cameras capture four colors in a similar array: red, green,
H
blue and emerald green. A digital camera uses an array of millions of tiny light cavities or “photosites” to
BAYER DEMOSAICING
record an image. When you press your
Bayer “demosaicing” is the process of translating this Bayer
camera’s shutter button and the expo-
array of primary colors into a final image which contains full
sure begins, each of these is uncovered
color information at each pixel. How is this possible if the
to collect and store photons. Once the exposure
camera is unable to directly measure full color? One way
finishes, the camera closes each of these photosites,
of understanding this is to instead think of each 2x2 array
and then tries to assess how many photons fell into
of red, green and blue as a single full color cavity.
Top Seller of 2012
artifact is moiré (pronounced “more-ay”), which may appear as repeating patterns, color artifacts or pixels arranges in an unrealistic maze-like pattern:
Canon EOS Rebel T3i 18 MP
Two separate photos are shown above—each at a different magnification. Note the appearance
each. The relative quantity of photons in each cavity are then sorted into various intensity levels, whose precision is determined by bit depth (0 - 255 for an 8-bit image).
of moiré in all four bottom squares, in addition to
This would work fine, however most cameras take additional steps to extract even more image information from this color array. If the camera treated all of the colors in each 2x2 array as having landed in the same place, then it would only be able achieve half the resolution in both the horizontal and vertical directions. On the other hand, if a camera computed the color using several overlapping 2x2 arrays, then it could achieve a higher resolution than would be possible with a single set of 2x2 arrays. The following combination of overlapping 2x2 arrays could be used to extract more image information.
However, the above illustration would only create
Note how we did not calculate image information at the very
grayscale images, since these cavities are unable to
edges of the array, since we assumed the image continued on
distinguish how much they have of each color. To
in each direction. If these were actually the edges of the cavity
capture color images, a filter has to be placed over
array, then calculations here would be less accurate, since there
each cavity that permits only particular colors of
are no longer pixels on all sides. This is no problem, since infor-
light. Virtually all current digital cameras can only
mation at the very edges of an image can easily be cropped out
capture one of three primary colors in each cavity,
for cameras with millions of pixels.
and so they discard roughly 2/3 of the incoming
Other demosaicing algorithms exist which can extract slightly
light. As a result, the camera has to approximate the
more resolution, produce images which are less noisy, or adapt
other two primary colors in order to have full color
to best approximate the image at each location.
at every pixel. The most common type of color filter
DEMOSAICING ARTIFACTS
array is called a “Bayer array,”
Images with small-scale detail near the resolution limit of the
the third square of the first photo (subtle). Both maze-like and color artifacts can be seen in the third square of the downsized version. These artifacts depend on both the type of texture and software used to develop the digital camera’s RAW file. MICROLENS ARRAYS You might wonder why the first diagram in this tutorial did not place each cavity directly next to each other. Real-world camera sensors do not actually have photosites which cover the entire surface of the sensor. In fact, they often cover just half the total area in order to accommodate other electronics. Each cavity is shown with little peaks between them to direct the photons to one cavity or the other. Digital cameras contain “microlenses” above each photosite to enhance their light-gathering ability. These lenses are analogous to funnels which direct photons into the photosite where the photons would have otherwise been unused. Well-designed microlenses can improve the photon signal at each photosite, and subsequently create images which have less noise for the same exposure time. Camera manufacturers have been able to use improvements in microlens design to reduce or maintain noise in the latest high-resolution cameras, despite having smaller photosites due to squeezing more megapixels into the same sensor area. - Amartya Saikia
digital sensor can sometimes trick the demosaicing algorithm— producing an unrealistic looking result. The most common arti
Page
20 www.sectord.in
Universal Magazine
www.Magazine.com
Page
21
21 www.sectord.in
sECTOR- d gAMER zONE
Anticipation Level: 9/10
brought the Far Cry and Assassin’s Creed
forces. We also know the open-world Los
Tomb Raider has been with us since 1996,
franchises to life. Little wonder then that
Santos (read Los Angeles) environment
when the first game landed on the origi-
anticipation levels are so high. Embedded
is huge, the variety of vehicles has been
below is the teaser trailer that really just
expanded, and there will be side-quests
sets the scene, but there’s an extended
galore to ensure epic longevity.
5 Awesome Cross-Platform Video Games Being Released In 2013
gameplay trailer (YouTube link) that shows what the game is all about. This game sees hacking and technical proficiency used as a weapon. You play Aiden Pearce, who is capable of tapping into any device tied to the city’s central operating system, and he uses this ability to stay one step ahead of his foes. This innovanal PlayStation. Its main protagonist Lara Croft immediately became an icon, being a female lead character in a male-dominated industry. Her disproportionately busty body may have helped, but still. The games have dwindled in popularity and quality since, but it’s nothing that a good
5 Awesome
reboot can’t fix. The new Tomb Raider game set for release
Cross-Platform Video Games Being
in 2013 is just that: a reboot which forgets everything that has gone before. The
Being Released In 2013
2013 Tomb Raider is set before Lara Croft became the brave heroine we now know her as, exploring her origins as she has to fight to survive on a remote island full of
2012 was a bumper year for video games
or prequel to the previous two outings.
to commercial and critical acclaim. The
on all platforms, with a heady mix of
While they were based in the under-
original was a tough racing game which
sequels in well-loved franchises and new
water city of Rapture, BioShock Infinite
saw the player become a racing driver,
IP making their way onto consoles and
takes place in a floating cloud city called
starting at the bottom and working their
computers. However, as good as 2012
Columbia.
way up to owning and managing a team.
was for gamers everywhere, 2013 is shap-
You play Booker DeWitt, who arrives in
There were a variety of different events
ing up to be even better. The Wii U will
Columbia during a civil war between two
to compete in, including drift champion-
be coming of age, there’s the strong pos-
factions. Against this dystopian backdrop
ships and demolition derbies.
sibility of at least one (and possibly two)
you have to find and rescue Elizabeth,
Little is yet known about the sequel.
new consoles being released, and the list
a young lady held captive in the city in
All Codemasters has revealed so far is a
of games worth playing is growing by the
the air for the past 12 years. Thankfully
teaser trailer and two gameplay trailers,
day
you have a range of weaponry, gadgets,
one of which is embedded below. We can
and special powers at your disposal. And
clearly expect more of the same, but with
you’ll need them all to succeed in your
the lengthy gap between games hope-
mission.
fully all the wrinkles of the first title will
BioShock Infinite Platforms: PC, PS3, and Xbox 360
have been ironed out. The original had a
Release Date: March 2013
Grid 2
compelling multiplayer mode, and Grid 2
Anticipation Level: 8/10
Platforms: PC, PS3, and Xbox 360
should reprise that.
BioShock Infinite is a first-person shooter
Release Date: Summer 2013
that is the polar opposite of the Call Of
Anticipation Level: 8/10
Tomb Raider
Duty series. It’s the third game in the
Grid 2 is the long-awaited sequel to Race
Platforms: PC, PS3, and Xbox 360
BioShock series, but isn’t a direct sequel
Driver: Grid, which was released in 2008
Release Date: March 2013
22
Page
Universal Magazine
www.Magazine.com
22 www.sectord.in
tive gameplay mechanic — matched with stunning visuals — means Watch Dogs could be the exceptional title released in 2013.
Grand Theft Auto V Platforms: PS3 and Xbox 360 Release Date: Spring 2013 Anticipation Level: 10/10 bad guys. Now being overseen by Square
Grand Theft Auto V is coming, finally, after
Enix, the new Tomb Raider has many gam-
far too big a gap between the first teaser
ers eager to revisit the series with fresh
trailer and the actual release date. We still
eyes.
don’t quite know when it’s going to drop,
Watch Dogs
but it will definitely be during the first half of 2013.
Platforms: PC, PS3, and Xbox 360
So, what to expect from Rockstar’s latest
Release Date: Late 2013
and possibly greatest game? The second
Anticipation Level: 9/10
trailer (embedded below) gives much
Watch Dogs is an exciting new IP from
away, including the outline of a plot which
Ubisoft Montreal, the developer that
employs three main protagonists who join
Universal Magazine
www.Magazine.com
Page
23
23 www.sectord.in
Sony Xperia Z Sony made the switch to Android quite some time ago, and has been constantly working to improve its devices ever since. Even though the manufacturer tried to make something happen with its high-end models of recent years like the Xperia T and S, it wouldn’t be a lie if we say that its efforts have largely remained unnoticed in this world dominated by Galaxies and iPhones. What do you have to do to become a factor in this business? It certainly isn’t easy, considering that a company such as Sony, which has an almost fanatical following, hasn’t been able to disturb the status quo. Apparently, what’s needed is much more than just a strong specs sheet and a recognizable name. You need to have the powerful hardware encased in a beautiful design, a fast and responsive software experience, the latest operating system, a great camera, topnotch display... and of course, you have to be ready to take responsibility for anything you might mess up and be ready to fix and/ or enhance the software of the device as frequently as you have to. Sony’s smartphones have obviously lacked some of these prerequisites, but Sony has proven to be resilient. It is now ready to try again. A new flagship model, a new Xperia phone is here to try and overpower the dominant species. Is that even possible? Why, we say nothing is impossible!
24
Universal Magazine
www.Magazine.com
The Sony Xperia Z is one of the six newly released high-end smartphones by NTT DoCoMo, along with Panasonic Eluga X, Sharp Aquos EX
Universal Magazine
www.Magazine.com
25
Social Networking RAFIQUDDIN AHMED
D
A social net-
lion are active on monthly
work is an
basic. Google+ is written
online service,
in Java and JavaScript. It is
platform or
the biggest attempt to rival
site where you can express
the social networking site
your ideas, thought with
facebook which have 1 bil-
the world. A social network
lion active users. But Google
service consists a represen-
fail to beat the popularity of
tation of each user (often
facebook.
5. MySpace: It’s a social net-
profile) and some addition-
working site with a strong
al links. Most of social network service is web based.
3. Twitter: Twitter is an
music emphasis owned by
They provide a platform for
online social networking and
users to interact over the
microblogging service than
Specific media and POP singer
internet. A social network
enable its user to read and
Justin Timberlake. My space
site have many services, they are basically email, chatting, photo
send text based messages up to 140 characters. Twitter is written
was launched in 2003. Before
share, blog, own profile etc. You can create groups on social
in JavaScript, Ruby, Scala and Java. Twitter has 500 million reg-
2006 MySpace is the most vis-
networking sites and can manage your account. Many social
istered users. In twitter only a registered user can tweet or post
networking sites allow user to share ideas, thoughts, activities,
message but all can read that tweet or message.
ited Social networking website according to Google. In
events and interest. Some popular social networking sites are –
MySpace you can play online
1. Facebook:
It is most popular social networking site
4. Linked In: Linked In is an online social networking site for
launched in 2004 and founded by Mark Zuckerberg. Facebook
professional people. Founded in December 2002 and launched in
is written in C++ and PHP languages. Facebook have over one
May 5, 3003. It mainly used for professional networking. Linked
billion active user. And half of them are use facebook on mobile
In helps you to create and manage your professional identity.
games, listening to music, share picture etc.
device. User must be resister to facebbok before use facebook services. In facebook user can share thought, picture, video, write notes. User can also create Pages, Groups as per their requriment.
2. Google Plus:
Google+ (Google Plus) is a social network-
ing site owned and operate by Google Inc. It was launched on June 28, 2001. It has 500 million registered users whom 235 mil-
26
Page
Universal Magazine
www.Magazine.com
26 www.sectord.in
www.sectord.in
www.facebook.com/groups/sectord
Java : the programmer’s language
Java Fact File
JDK 1.0 (January 21, 1996) JDK 1.1 (February 19, 1997) J2SE 1.2 (December 8, 1998) J2SE 1.3 (May 8, 2000) J2SE 1.4 (February 6, 2002) J2SE 5.0 (September 30, 2004) Java SE 6 (December 11, 2006) Java SE 7 (July 28, 2011)
Java logo: A cup of coffee is used as the logo for Java. Java coffee refers to coffee beans produced in the Indonesian island of Java. In some countries, including the United States, “Java” can refer to coffee. It is being said that the creators of the
R
interpreter has been ported to a computer, it
language used to have large amount of coffee.
can run any bytecoded program. The project
So is the symbol used.
was code-named Green. It took 18 months to
Java mascot: Duke
develop the first working version of java.
Back in the early days of Java development, Sun
By 1993, it became obvious to members of the
Microsystems’ Green Project team created its
Java design team that the problems of portabil-
first working demo—an interactive handheld
ity which is encountered in creating code for
home entertainment controller called the Star7.
embedded controllers are also found when
At the heart of the animated touch-screen user
Java is a general-purpose
grams reflect it. If you program poorly, your
trouble with C and C++ (and most other
attempting to create code for the Internet. In
interface was a cartoon character named Duke.
object-oriented com-
programs reflect that, too. Put differently,
languages) is that they are designed to be
fact, the same problem that Java was initially
The jumping, cart wheeling Duke was created
puter programming lan-
Java is
compiled for a specific target. Although
designed to solve on a small scale could also
by one of the team’s graphic artists, Joe Palrang.
guage which is publically
wheels. It is a language for professional
it is possible to compile a C++ program
be applied to the Internet on a large scale. This
Joe went on to work on popular animated mov-
announced in the spring of
not a language with training
programmers.
for just about any type of CPU, to do so
Developers:
realization caused the focus of Java to switch
ies such as Shrek, Over the Hedge, and Flushed
1995. As of 2012, Java is one of the most
requires a full C++ compiler targeted for
from consumer electronics to Internet program-
Away.
popular programming languages in use,
Java was developed by a group of Sun
that CPU. The problem is that compilers are
ming. So, while the desire for an architecture-
Duke was designed to represent a “software
particularly for client-server web applica-
Microsystems engineers James Gosling,
expensive and time-consuming to create.
neutral programming language provided the
agent” that performed tasks for the user. Duke
tions, with a reported 10 million users.
Patrick Naughton, Chris Warth, Ed Frank,
An easier—and more cost-efficient—solu-
initial spark, the Internet ultimately led to Java’s
was the interactive host that enabled a new
The most unique feature of java is that it
and Mike Sheridan in 1991. The team was
tion was needed
large-scale success.
type of user interface that went beyond the
let application developers “write once, run
led by James Gosling who is also known
The Green project had a lot of trouble getting
buttons, mice, and pop-up menus of the desk-
anywhere” (WORA),which means that code
as father of Java. Later, many other people
In an attempt to find such a solution the
others interested in Java for smart devices. It
top computing world.
that runs on one platform does not need
like Bill Joy, Arthur van Hoff, Jonathan
group led by James Gosling began to work
was not until they decided to shift gears and
Duke was instantly embraced. In fact, at about
to be recompiled to run on another. Java
Payne, Frank Yellin, and Tim Lindholm were
on a language that to be small or portable
market Java as a language for web applica-
the same time Java was first introduced and
applications are compiled to bytecode
key contributors to the maturing of the
and use efficient code since the consumer
tions that interest in Java took off. Many of the
the first Java cup logo was commissioned, Duke
(class file) that can run on any Java virtual
original prototype of the language Java.
devices do not have powerful CPUs. They
became the official mascot of Java technology.
machine (JVM) regardless of computer
Development history:
advantages that Java has for smart devices are
also wanted the language to be hardware
even bigger advantages on the web.
In 2006, Duke was officially “open sourced”
architecture.
Interestingly the original impetus for Java
independent since different manufacturers
The language was initially called Oak after an
under a BSD license. Developers and designers
Java was designed, tested, and refined by
development was not the Internet! Instead,
would use different CPUs. These conditions
oak tree that stood outside Gosling’s office.
were encouraged to play around with Duke and
real, working programmers. It is a language
the primary motivation was the need for
led them to decide to compile the code to
However, they soon discovered that there was
for the first time had access to Duke’s graphi-
grounded in the needs and experiences of
a platform-independent (that is, architec-
an intermediate machine-like code for an
already a programming language called Oak, so
cal specifications through a java.net project at
the people who devised it. Thus, Java is a
ture-neutral) language that could be used
imaginary CPU called a virtual machine.
they changed the name to Java, from Java cof-
http://duke.kenai.com. - Anwesha Goswmai
programmer’s language. Java is cohesive
to create software to be embedded in
This intermediate code (called bytecode)
fee, said to be consumed in large quantities by
and logically consistent. Except for those
various consumer electronic devices, such
is completely hardware independent.
the language’s creators.
constraints imposed by the Internet envi-
as microwave ovens, remote controls and
Programs are run by an interpreter that
Versions:
ronment, Java gives you, the programmer,
cable boxes or set top box etc and which
converts the bytecode to the appropri-
Major release versions of Java, along with their
full control. If you program well, your pro-
will be under differing environments. The
ate native machine code. Thus, once the
release dates:
28
Page
Universal Magazine
www.Magazine.com
28 www.sectord.in
Google and Android, Inc. have chosen to use Java as a key pillar in the creation of the Android operating system, an open-source smartphone operating system. Besides the fact that the operating system, built on the Linux kernel, was written largely in C, the Android SDK uses Java to design applications for the Android platform. On May 7, 2012, a San Francisco jury found that if APIs could be copyrighted, then Google had infringed Oracle’s copyrights by the use of Java in Android devices. Oracle’s stance in this case has raised questions about the legal status of the language. However, the Hon. William Haskell Alsup ruled on May 31, 2012, that APIs cannot be copyrighted.
Gaikai uses the Java browser plugin to stream game demos to any PC. Gaikai (Japanese for “open ocean”) is a cloud-based gaming service that allows users to play high-end PC and console games via the cloud and instantly demo games and applications from a webpage on any computer or internet-connected device.
Universal Magazine
www.Magazine.com
Page
29
29 www.sectord.in
WE
BSIT
Starts
E FO
R YO
UR
BRA
ND
from
Rs. 1500 * cONDITIONS aPPLY
email : admin@gkd619.com or visist www.gkd619.com