Skip to main content

Posts

Showing posts from 2017

WARNING: Android Spyware Detected Which Spies on Skype, Whatsapp Calls

In order to protect Android users from malware and suspicious apps, Google has been continuously working to detect and remove malicious apps from your devices using its newly launched Google Play Protect service.
Google Play Protect-- a security feature that uses machine learning and app usage analysis to check devices for possibly harmful apps-- recently helped Google researchers to recognize a new deceptive family of Android spyware that was stealing a whole lot of information on users.
Found on targeted devices in African countries, Tizi is a fully-featured Android backdoor with rooting capabilities that installs spyware apps on victims' devices to steal supersensitive data from popular social media apps like WhatsApp, Twitter, Facebook, Linkedin, Skype, Viber, and Telegram.
" The Google Play Protect security team discovered this family in September 2017 when device scans found an app with rooting capabilities that exploited old vulnerabilities," Google said in a blo…

What is Multithreading? JAVA Multithreading Tutorial

It is almost end of 2017. The computer has evolved throughout its age from a simple, huge machine which was used for just simple numerical calculations to a small and swift electronic device which is affecting almost every aspect of our life. There are a lot of efforts involved in these enhancements in both hardware and software. Powerful hardware has been invented, and robust software techniques have been designed to improve hardware efficiency. One of these methods is multithreading and this is what we are going to talk about.
Multithreading is the ability of a single processing unit to execute multiple programs concurrently, apparently supported by the operating system. Multithreading is achieved either by multithreaded architecture or by software techniques or by both. All processors and OSs today support multi-thread execution.
We are talking about multithreading but what actually a thread is? A thread is a single unit a single processor can execute. The group consists of the sh…

10 Different Types Of Bosses And How To Work With Them

There are a lot of factors which can affect your work potentials such as technology, stress, ego clashes, health, perceived discrimination, and The Boss. Getting to know the type of your Boss you have is an important step towards having a professional relationship with them. After all, your Boss can dictate whether your stay with the company will be in favor of the organization or not. He/She is the one who decides to keep you or to kick you out.
Here are 10 different types bosses and how you can relate to them.
1. The Workaholic The workaholic is a boss who tends to work overtime, even during holidays. They are typically extremely enthused about completing undertakings on time and will recommend additional work hours keeping in mind the end goal to accomplish this. The vast majority of them barely go on sick days or take leaves from office.
Working under a workaholic can be stressful, especially if you’re not one. There’s a high chance it will greatly impact on your work-life balanc…

5 Tips for Computer Science Students

You are in college now so I am skipping the basics the go to class do your homework study for tests stay out of the hospital. These are not all important pieces of advice but I am sure you have heard them. Instead, let’s talk computer science. Here are some tips I have specially collected by talking to students who wish they’d heard them when they were students. Listen up.

Seek help when you need it. Your classes are going to get harder, they are going to test your knowledge but that’s why you are there for. Some people find attending office hours or seeking extra help to be embarrassing. But these resources are there for a reason. Taking advantage of the help you are offered will not only help you prepare for future classes and learn the material better but a lot less harmful than bad grades or any other consequences of struggling.Don’t let yourself intimidated by large projects. The best thing to do, sit down a day at the assignment and break it up into smaller tasks. A lot of times…

JSON with JAVA – Introduction to JSON – Part2

JAVA SE does not have any internal package for processing JSON data. We have to import an external library. There are many libraries available. You can choose any. I will use Json-simple1.1 here. This makes our first step, importing the lib.
Importing the libClick here and download the zip file containing the jar library and follow the following steps to import it into eclipse.
1.Extract the zip file.
2.Right Click on the project folder in the package explorer, hover over Build Path and click on Configure Build Path.
3.You will see a nice window. Go to the Libraries tab and click on Add External JARs.
4.Navigate to the extracted jar folder, select the library and press open/ok.
5.Press ok again and you are done.
Exploring the lib The library contains parser and data structures to process the given JSON formatted string. The parser parses the JSON data from string/Reader to its own readable form. The data structures consist of JSONObject and JSONArray Classes which store JSON Objects …

Introduction to JSON – Part 1

JSON is a data interchange format, frequently used for data exchange between clients and servers across the web. I am dividing this short tutorial series into three parts just to make it easy for you to understand. Part 1 is an introduction to JSON. It shows what is JSON, its structures are and how to write a JSON document. Part 2 explains How to process JSON in JAVA. The last part includes JSON Serialization. Hold your breath, a lot is coming up.
JSON, short for JavaScript Object Notation is a lightweight format which makes data exchange more than easier. It is also used to store data. JSON is language independent. For example, you can make a JSON Object in java and send it to a C# program which will gracefully handle it. JavaScript object can be converted into a JSON object and vice versa.
A JSON document can have two structures.

JSON Object: A name value pair or a key value pair. Names/Keys are only strings however values are of various types. Name and value are separated by a singl…

Who made Facebook decide to buy WhatsApp and to steal SnapChat Stories feature? 'You'

A fresh report claims that Facebook is spying on its users. It knows what millions of people do on their phones. It knows what do you browse, what apps do you use, how frequently and for how long. It is gathering all the information and detailed insights of your online behavior and habits.
This information has been used to shape Facebook's product roadmap. Facebook perceived from its data analysis that its users are using WhatsApp much more frequently and for a long time so it will be a big deal to buy it. It also led Facebook to rip Snapchat's stories feature.
It's so precise that it allowed Facebook keep tabs on how many Snapchat posts users sent each day, the Wall Street Journal reports.
Onavo Protect, a free VPN app that claims to help "keep you and your data safe when you go online", has been the spying tool for Facebook for all this time. It was created by a company which is now owned by Facebook.
The app is very popular among Android and iOS users and has …

Inheritance In JAVA: Example

This is the second last section of the topic Inheritance In OOP where we will study some code snippets. This study will clarify the idea of how to achieve inheritance in JAVA and how it actually works. Without wasting any time and giving length to the post for no reason, let’s start rolling. Prerequisites: To understand these snippets you should already know what inheritance is. If you don’t, don’t worry. I have a blog post, go here. Overview: I have written a program named Example which depicts real life inheritance properties like a relationship between child and parent, child access to parent properties etc. The program consists of 4 very simple java classes which are extremely easy to understand. However, if you face any issue ping me in comments. I am always there for you. ExampleBobJohn, and Stephen. The bold faced letters are not names of some persons, in fact, these are names of classes which we are going to study here. In Java, to establish a child parent relation between …

Inheritance in OOP: Introduction

In the previous section, we talked about what Object-Oriented Programming is and what are its key concepts or features. We defined them in a very brief and formal way. As I promised that we will discuss each of those in details, here it is. I will try to be as natural as possible.
Inheritance is that feature of Object-Oriented programming which allows developers to borrow code from a prototype (class) and extend it, by adding more properties to it and behaviors to manipulate those properties. It reduces the size of the code with a big margin by creating is-a relationships between objects. This line might sound confusing but don’t worry. You will see in the coming section that how it reduces size of the code. The more common properties and behaviors a program have, the more usable inheritance will be. It allows you (the developer) to implement the real world parent-child hierarchy in a computer in a robust way. Here, I will tell you all I know about inheritance, how to implement it in…

What is Object-Oriented Programming? The concept of Class and Objects

Object-Oriented Programming is a powerful way to address the task of programming. Programming methodologies have improved dramatically since the invention of the computer, primarily to support the growing complexity of programs.
For example, when computers were first invented, programming was done by toggling in the binary machine instructions using the computer's front panel. As long as programs were just a several hundred instructions long, this way worked. As programs grew, assembly language was invented so that a programmer could deal with bigger, more complex programs, using symbolic representations of the machine instructions. As programs continued to grow, high-level languages were introduced that gave the programmer more tools with which to handle complexity.
The 1960s gave birth to structured programming. This is the approach supported by languages such as C and Pascal. The use of structured languages made it possible to write somewhat complex programs fairly easily. Stru…

How To Improve Logic Building Skills In Programming?

I frequently see beginners asking questions in forums like 'how can I improve my logic building skills' or 'how to think logically or something like 'how to think like a programmer' and blah, blah. If you have similar questions in your mind then follow along.

Programming Can Cause Health Problems: Read Some Health Tips Here

"He who has health has hope, and he who has hope has everything." I am writing this article with no intentions of making you feel guilty about your lifestyle. I just want to share a few tips which I use myself which helps me to stay healthy. One should have good cognitive abilities to become a good programmer, in my opinion, but poor physical health can lead to an increased risk of developing mental health problems. A surprising number of developers suffer from health issues due to their sedentary lifestyle.
We, I mean developers ;) ignore little things which can bring big changes. We forget that it's the little things that matter most.
In my case, programming has given me fun and money but some health problems too. I don't want and I am sure nobody wants to take medicine which tastes like shit or something else like this. Last year I was reading I decided to change my lifestyle. Last year I found the book, The Healthy Programmer, in the library. I read it and I fin…

How To Protect Your Online Privacy? Try To Keep Your Private Things Private

Being online is part of the life now. People are online from home, school, library, roads and washrooms. Sitting on a toilet and chatting with a buddy or playing games is a habit of many. Do you know what you actually do when you browse the Internet? Yes ? No ? Alright, Lemme tell you. You just access someone's else computer. But the same can happen with you. Once you get on a network, you raise a security risk for your digital life as well as your real life events. Are you sure that you are the only one in authority who can use your resources? (By resources I meant PC, Smartphone, Webcam, Mic or anything that can be on the Internet). Are you really sure that nobody is spying on you? Do you have someone or something which can tell you 'Watch out'? If you have, is it trustworthy? Hmmm, So what to do? Here

10 Failed 10 Successful

Dr Suess  The Cartoonist, Writer and Animator Published over 60 books including The Cat in the Hat and Green Eggs and Ham but he was rejected a shocking 27 times before publishing his first book And to Think That I Saw It on Mulberry Streets. Quotes:  Today you are you! That is truer than true! There is no one alive who is you-er than you. You have brains in your head. You have feet in your shoes. You can steer yourself any direction you choose.  The more that you read, the more things you will know. The more that you learn, the more places you'll go. J.K Rowling   The Novelist, Screenwriter and film producer Best known as the author of the Harry Porter, fantasy series 
The Harry Porter manuscript was rejected by 12 publishers before Bloomsbury picked it up. Now the series has been translated into 73 languages and has earned over $400 million dollars in book sales.

Quotes:
We do not need magic to transform our world. We carry all of the power we need inside ourselves already. If y…

Top Level View of Some Common Fields in Computer Science and Information Technology

Computer science is a fast growing, rapidly evolving and a very vast field. Today's dream might become tomorrow's reality. Computer science spans from Nano Technology to giant industrial machine automation.

Let us look at some of the careers in CS and IT.