Best Blogger Tips

Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Monday, 3 June 2013

KL02 Chip, A miniature Computer!

0 comments
KL02 Chip, A miniature Computer! KL02 Chip An invention of two mm chip is just an effort to make available the computer power everywhere. This is what we actually called ubiquitous.
If the internet has to reach everywhere- say from the medicines we take to the clothes we wear, keys we use for locking or unlocking, remote for switching on or off, toaster for toasting slices then computer will definitely need to get a whole lot of tiny. This is really a promising start by the folks to introduce a 2 millimeters square microchip.
KL02 is an ant –ant sized miniature silicon chip unfolded by FreeScale, It is shorter from both the sides like the ants but packs a central unit, a memory unit and many other components.

Saturday, 1 June 2013

An in-depth exploration of Samsung Galaxy S4: A real world guesstimation!

0 comments
An in-depth exploration of Samsung Galaxy S4: A real world guesstimation! There are lot of appealing qualities of Galaxy S4 and a lot of astound flaws. Is it a perfect phone for your requirements or not???
There are many things in this world that do not need any introduction. I would say Samsung Galaxy S4 is not one amongst those. Definitely, “Galaxy S series” has practically become a menage name. And sure definitely, you have possibly probably heard all types of hype about the newest Samsung model. But you will have to trust me; there are more to the galaxy s4 than that meets the eye. I am in the use of Galaxy s4 for about three weeks and I say with my complete nerve control that while this smart phone has its share of unique,

Tuesday, 28 May 2013

GeForce GTX 780 GPU has just been announced by Nvidia.

0 comments
GeForce GTX 780 has just been announced by the NVIDIA It’s really a good news for the guys and girls who are the gaming fanatic, the NVIDIA has just rolled over its exciting new GeForce GTX 780 3d graphic card for an amazing and sensational 3D gaming experience. This weird device has been equipped with a dominion Kepler GPU with 2,304 cores and a lightning fast 3GP GDDR5 ram.
It sounds really absorbing and engrossing

Thursday, 25 April 2013

Questions and Answers related to Information Technology!

0 comments

Question

A bio-metric web-based time reporting system is been proposed at your University Write down three consistent and testable, functional requirements for this software.

Answer

Before discussing the functional requirements for the software proposed for the university,

Thursday, 21 March 2013

Encrypt Message using free Java App!

0 comments
Encrypt Messages Using java App

Description :

Now you can use this little app for securing your conversation and messages, that needs to be travel through places that are vulnerable to intruders and hackers that can modify your message contents and forwards this modified message to your friends or colleagues as it seems it is sent by you! This little app is developed solely in java and it provides a way to encrypt (encode) or decrypt (decode) the message that is somehow very difficult to crack and extract the sensitive information.

Algorithm Used :

The app uses a basic enciphering technique called Caesar Cipher that uses the substitution cipher to change the plaint text according to the defined key! Same is used for decoding a encrypted message to get the original message but in opposite direction.

Usage Guide:

Initial Interface:


The window up shows the main frame of the application. At the beginning all the fields are resent to contain no values.

Encoding a message:


As you can see, a plain text message must be written without spaces in the "Encrypt message" field at the time of sending the message and a key value must be provided to encode the message using substitution algorithm(key) the key must also provided to the receiver at the receiving end to decrypt or decode the encoded message to get the plain text.

Decoding a message:


A key must be provided to the receiver to decode the message back at original text. As you can see, at this time, the coded message is written in the "Decrypt" field and also a key is provided to get the original message back. Both sender and receiver system must have the software running on their machines.

Advantages of using Encryption:

  • Provides Security to the most sensitive information.
  • Provides secrecy to the messages.

Get the App for free:

CaesarCipher.Jar

Source:

CaesarCipherSystem.java
 

| Bloggers Broadcast © 2010. All Rights Reserved | Back To Top |

Your Text Link Here