Solving Tournament Problems using Queue
Labels
android
Assembly Language
bash
Beagle Bone Black
c
c++
CL1
competitive programming
compiler
computer vision
data structure
database
dsps
encryption
games
graphs
hacks
java
linux
lisp
MIL
monte carlo algo
MPAL
networking
OOMCPL
osa
perl
pl
PL -3
PL-1
PL-2
PL-4
python
qt
recursive algorithms
Scala
security
sorting
storage
terminal
ubuntu
utilities
Monday, 29 August 2016
Friday, 26 August 2016
SQL with JDBC
Q:
Design at least 10 SQL queries for suitable database application
using SQL DML statements:
Insert, Select, Update, Delete Clauses using distinct, count,
aggregation on Client-Data sever (three tier).
Use Python for Socket Programming to connect two or more PCs to share a text file.
Os: Fedora 20
Network: Switched LAN(Ethernet)
Note: Program fails to work on Local Area Network. Program works flawlessly on localhost.
While this script works perfectly fine on loop back ie on the same machine, it fails on networks.For some unknown reasons I havent' been able to get this script running of a local network consisting of fedora linux machine despite tweaking with the firewall. I don't get much time to work on local networks and am currently busy with some other endeavors.
Network: Switched LAN(Ethernet)
Note: Program fails to work on Local Area Network. Program works flawlessly on localhost.
While this script works perfectly fine on loop back ie on the same machine, it fails on networks.For some unknown reasons I havent' been able to get this script running of a local network consisting of fedora linux machine despite tweaking with the firewall. I don't get much time to work on local networks and am currently busy with some other endeavors.
Write an IPC program using pipe using C++ and Python
Q: Process A accepts a character string and Process B inverses the string. Pipe is used to establish communication between A and B processes using C++ & Python
Friday, 5 August 2016
How To Securely Store Data
Note : You require knowledge about file recovery to understand this article. In case, you have no knowledge about this, I highly recommend checking out my article on file recovery.
In one of my earlier posts I demonstrated File Recovery using Forensic Tools.
While File Recovery is possible if the file is deleted using Shift-Delete or even if the partition is formated.
This becomes a major security issue if your pendrive held confidential data earlier. Even quick format is not an option.
Using specialized tools forensic experts can manage to recover any data which was stored on pendrive or any other storage device, provided it is not overwritten. In case , it is overwritten the data could still be partially recovered. I had once recovered partially, a few images using Recuva. They don't look like the exact image but just the thumbnails can be pretty informative.
In one of my earlier posts I demonstrated File Recovery using Forensic Tools.
While File Recovery is possible if the file is deleted using Shift-Delete or even if the partition is formated.
This becomes a major security issue if your pendrive held confidential data earlier. Even quick format is not an option.
Using specialized tools forensic experts can manage to recover any data which was stored on pendrive or any other storage device, provided it is not overwritten. In case , it is overwritten the data could still be partially recovered. I had once recovered partially, a few images using Recuva. They don't look like the exact image but just the thumbnails can be pretty informative.
Subscribe to:
Posts (Atom)