Sunday, October 18, 2009

Testing Computer Network Security

So you want to know just how secure your computer network is. You can't really tell until you perform a text which assesses your system's weaknesses and how these could be taken advantage of. Companies and personal users do these tests so they can narrow down their locus of problems regarding their systems and come up with possible ways to remedy whatever irregularities are spotted. In a way, these so-called "Penetration Tests" are synonymous to ethical hacking which aims to get into a system to see how it can be further strengthened and guarded against black hats.

Doing a penetration test will, of course, begin with a plan where goals are defined as well as the time limits for the achievement of those goals. Here, the major problems will be discussed, as well as the specific parts of the system that should be tested, when and how long the process will take. Basically, this is where the structure of the test to be performed will be mapped out, beginning with pinpointing the actual potential sources of problems and the approach that will be used to solve them using the penetration technique.

Once everything has been detailed out, the role of the ethical hacker will be defined. The person who will pretend to be a hacker will now put himself in the shoes of a black hat and will try to do things as a black hat would to a system that he plans on attacking. After this, the tester will now go through the system and see from which actual points a hacker might possibly attack. In other words, this is where vulnerabilities of such a system will be exposed.

The last step is for the tester to "hack" the system as though he was a real hacker with real objectives for doing the hacking. For example, the tester would try to dig as much information from the system as he can. By knowing how this is possible, he will be able to come up with counter measures that will make such an intrusion impossible.

After the test, a report will be submitted to the company and will detail whatever vulnerabilities have been discovered with the system as well as how to best remove these weak points by providing solutions. In other words, the main goal of a penetration test is to see where a hacker might be successful in hacking a computer network and provide solutions to make sure these weaknesses are fixed before a real hacker makes a go for them.

Prevention is still, of course, the main thing when it comes to avoiding hackers. Companies must make it a point to ensure that their employees only visit clean sites or, if this is not possible, web surfing other than those directly related to the job, should be prohibited. However, as one can never totally get rid of the threats of hacking, it would be wise to install a software that isolates such risks significantly.

An IP change software, which allows a computer to go online with its real IP address hidden, could be a very good option. When the IP is hidden, any computer can run around freely on the Internet without being targeted for hacking. Or the computer may be targeted but the hacker's efforts will simply be in vain because such computer won't really be accessible to him since it's using a fake IP.

Sunday, October 11, 2009

Web Design Flaws to Avoid

In web design, the graphics part is as equally important as the back end. For a fully functional website there are a few design faux pas that need to be avoided. By that I mean, having a fast loading website with visitors not just clicking away. Before getting your website designed it is good to check the portfolio of the web design firm to be sure that the designer will avoid the following flaws.

Large Graphic Header

This is one thing that should definitely be avoided. You may think it looks nice on a high resolution screen. Know that there are still many people having 1024*768 screen resolution. If the header is too big, it may cover almost half of the page.

Too Many Colors

You may be tempted to use various colors to differentiate between elements on your website but doing it will not look attractive. It is something that was used long ago. So, if you have too many bright colors on your website it may look outdated to some people and you may lose potential clients.

Content Crammed in a Small Space

Leave enough white space on all your pages. It can be tiring to keep on scrolling to read a whole page. Best is to break the page in two or more to avoid scrolling.

Use of Fonts

You may want to use that font you just downloaded in your website. It looks way nicer than arial, verdana or all the other office default fonts. Unfortunately others will not see the font unless they have it installed on their computer. You may use these fonts for your header which is an image file.

Tuesday, September 1, 2009

Masking an IP

Some may wonder why there is a need to cover an Internet Protocal address. They may ask why mask my IP? Well, there are several reasons why someone would need to take the steps to hide an address. One of the core principles with masking an IP address centers on the ability to keep private information exactly that - private.

Yes, the main reason you need to protect the privacy of your Internet activity is you do not want any of your sensitive personal information to be compromised. Sadly, there is a worldwide network of individuals that exist solely to steal your private info. If they can gain access to such personal information, they could compromise bank accounts or credit cards. In some cases, they could even steal info for the purpose of identity fraud. The nightmare that can ensue from that scenario is frightening! When someone asks "Why mask my IP address?" they are doing so because they are not looking at the process from the perspective of maintaining their security.

Some may wonder if a firewall or an anti-virus is enough to protect personal privacy. Well, it might be....or it just might not be. The key here is it is best to take the right steps needed to make sure there are no breaches in the computer. The presence of openings which can allow for unauthorized access must be completely eliminated or else a seriously problematic situation could develop. As such, taking the steps to make sure no one can compromise your information via capturing your IP address.

So, how can I mask my IP address? There are two common means. The first involves performing your browsing through a proxy website. A proxy website is, in essence, a subdirectory web browser. In other words, you search the web through a static webpage. When you are browsing various pages, you will see them in a sub-frame of the proxy server site. This way, any website you visit will not see your IP address. Instead, it will see the IP address of the proxy server. This will be useless to them since they will not be able to access any information of value.

The second method involves using a masking software program. There are different types of software programs that serve this purpose. Some are better than others so it may be worth exploring consumer reviews prior to making a purchase. The way these programs work is they can hide the real IP address you are using to browse the net. When someone tries to appropriate the information, they will not be able to. Again, as with the proxy server, they will not be looking at the proper IP address.

Regardless of the method you choose to use, the main important point is that you hide your IP address from those who would use it to their own ends. Such people can prove enormously problematic and any impediments you place in front of them will prove helpful.

Friday, August 28, 2009

Proxy Sites and Their Benefits

Privacy has taken on a whole new meaning. When shopping, banking, updating medical history, applying for loans and requesting financial aid, to name a few, are all done online from the comfort of a desk chair, information that no one wants floating around is doing just that, floating. Each time a person 'surfs the web' their computer is communicating with each website, offering it the computer's IP (internet provider) address, among other things.

It can be fairly easy for a web master to trace that information to gather a person's physical address, phone number and more. The information is also stored on that person's computer, making it very simple for anyone with access to that computer to see exactly what sites have been browsed, and what was done on them. Public computers, and home ones as well, frequently have software that limits or blocks access to certain websites. Higher education campuses that offer free web service typically block sites such as Facebook, MySpace and more. There is a simple solution to all of the above problems. That solution is called a proxy site.

A proxy site allows the user to browse websites using a specific format. Using these sites bypasses the blocks that have been set on the computer and allows the user to 'hide' their own IP address behind the proxy, leaving the user anonymous. Once a proxy site is chosen, and there are many to choose from, the user simply types in a search, or the web address, using the specific format used by that proxy. This allows a user to access sites that are typically blocked by 'nanny' type software. When using proxy sites, the activity can't be tracked on the computer.

This means that if you are on a network server, the administrators of the network cannot see what sites you have been on. It also means that those people with access to the computer itself, such as family members or roommates, cannot browse the history of the previous user. All they will see is the URL of the proxy sites, everything else will be through an intermediary server.

To protect valuable personal information from the prying eyes of the world, proxy sites are the way to go. Experts recommend using a different site each time you browse the web. Then browse away, without worry.

In order to make your Internet browsing even more secure, many experts would recommend using a different proxy site for each session. DrProxies.com offers you a fresh list of all the best and latest proxies that'll keep you surfing in private for a long time.

Friday, August 14, 2009

How to Prevent Computer Viruses from Attacking Your PC?

Do you want to know how to prevent computer viruses attacking your PC? The first thing that you will want to do is to be careful when you use the Internet to surf various websites and download media files. The best prevention method would be to download and install an antivirus and antispyware software to run frequent scans on your system. It really is not as difficult to protect a computer from virus attacks as what most users would make it out to be.

1. Do You Really Need to Protect Yourself Against Virus and Spyware Attacks?

It is important that people know what these parasites are capable and how to protect against them. This is due to the fact that the majority of people today know how to use the web and their PC and personal information are constantly being exposed to the threats in the online world. Since research has shown that a majority of users who access the Internet have had their computers infected, it is crucial that you learn how to defend against them before it is too late.

2. What is a Computer Virus and What is It Capable of Doing?

A virus is a program that is capable of destroying folders, registries and files and finally aiming to wipe out the entire hard disk. It attacks and infiltrates the system without any knowledge from the user. Some viruses and spyware are also capable of deactivating any existing computer protection software installed to allow the hacker to use unauthorized means to access the system.

3. How to Prevent Computer Viruses from Attacking your PC?

The fastest and easiest way is to download virus removal software to run a scan and fix on your system. They are capable of reading signatures from all the files and registry entries in a system before finding all the erroneous and infected files. It is able to repair or remove them within minutes to leave your PC running like new again.

Thursday, August 13, 2009

Learn Why Veteran Network Marketers Abandon Even the Best MLM Businesses to Create Unlimited Wealth

Despite having reached the heights of some of the best MLM businesses, many veterans are leaving to create unlimited wealth using an alternative successful top tier network marketing business model.

Even the best MLM businesses struggle with endless competition and client poaching on the internet. And with the cost of starting an MLM dropping rapidly while the number of people who want to start one is rising, there is a constant struggle to fill the leaking ranks of even the best MLM businesses. The veteran's wealth stream relies on a healthy downline, and with the fluctuations in today's network marketing business, it is difficult to build a sustainable long term revenue stream that will create the unlimited wealth most serious network marketers are seeking.

The plague of constant turnover is not the only reason that the veteran businessmen in network marketing are abandoning the best MLM businesses out there. There is also significant discontent among them concerning the paltry returns on each product sale. The number of leads needed in order to receive a significant income is extremely high.

Why continue dealing with such massive numbers of people in your downline who are just looking for an easy buck? Why do that when you can work with a handful of dedicated, experienced salesmen making a couple of sales each month that actually bring in a large profit margin. Instead of waiting for years to see a decent return, you can see it straight away?

These veterans are now applying a new business model selling serious products with a small dedicated downline. These products pull in over a thousand dollars of profit in one sale. This gives access to large returns which can be put into solid investments in ventures, stocks, money markets, and real estate.

If you have the money now then you can make those investments and start building unlimited wealth now, not later.

Ylva Jansson is a business coach and mentor out of Stockholm, Sweden. She assists serious network marketers in building a profitable online business with multiple income streams.

Tuesday, August 11, 2009

The Trump Network to Change MLMs For Good?

If any of you have ever participated in a multi level marketing program, you likely know that many of the products you sell are probably not the best quality. For instance, Monavie is one of the MLM products out there right now. If you search the net for Monavia, you will see thousands of positive reviews. The Problem with this though is that the reviews are from people trying to sell the products, so of course they will be positive. The reason I brought this up, however, is that I have a feeling that this perception of MLM's may change with the launch of the Trump Network.

That's right, Donald Trump himself is coming out with his very own Multi Level Marketing program called the Trump Network. The program will launch sometime in October of this year, with a prelaunch scheduled to take place sometime in July. Donald trump has been touting this network for some time now, but the publicity is just beginning to heat up. It will be very interesting to see if the billionaire himself will travel the country promoting this new venture, and just how popular it will become.

What is the Trump Network?
Like stated above, it will be an MLM. The products and services will be provided by a company that Mr. Trump bought out last year called Ideal Health. Ideal Health specializes in customized vitamins. Basically they test you for what vitamins and minerals you are lacking, and create a personalized vitamin just for you. The idea is unique, and there probably is quite a large market out there for their product.

In conclusion, I think that if launched properly, and if the product is as good as many are saying, The Trump Network, could change the negative perception many people have of the Multi Level Marketing industry as a whole. Since Donald Trumps name is such an attention getter, it is very likely that this program will take off at an amazingly fast speed. Also note, that Trump never associates himself with bad products or companies, as his name is nearly as valuable as the properties he owns.

Tuesday, August 4, 2009

Webhosting providers often come from via a suggestion by your website designer

Webhosting providers often come from via a suggestion by your website designer. In fact, many webmasters require that if you use a webhosting company of their choice or their own dedicated in-house server. Many webmasters claim to have major compatibility and access issues if they have to work with a secondary host outside their network.

For instance, if you were to develop a new website using a free or low cost website development system, you would be likely to find your webhosting to be with the company that allowed you to develop the site using their exclusive tools.

If a webhosting service is preferred by your website designer, it may be in your best interest to verify the overall webhosting provider's functionality. Also, look at the perceived reliability of the webhosting service before you give the ok to move forward with that prodiver. You can have a web designer develop a great website, but could drive customers away because of frequent online outages and other reliability problems.

The best case scenario is the combination between web design functionality and accompanying webhosting services. Regardless, you should always check the credentials of the website designer as well as the webhosting providers capabilities for your current and future website needs.

Unfortunately many webhosting providers completely overload their servers to save money and often run into recurring periods of downtime. Does your webhost provide sufficient bandwidth to allow for website growth, or do they make bandwidth easy to upgrade to?

Some websites experience rapid growth, but by having a webhosting provider that is not capable of keeping up with the traffic demands it's a major issue.

Most webhosting providers have system contingencies in place to manage the growth of your website needs. However, don't take these things for granted. Make sure to ask questions so you can make an informed decision about the quality, reliability and effectiveness of the webhosting service you select.

For more articles and reviews on the best Webhosting providers

Sunday, July 12, 2009

Internet Security Issues - Advice For Online Entrepreneurs!

Internet security issues and online crime ranges from petty vandalism to deliberate theft. Criminals and vandals attempt to spoil your internet experience in several ways.

It's important you understand how, so let's look at this now.

Hoax emails (sometimes known as Phishing) appear to come from a legitimate company asking to confirm your details or passwords either by return email or a webpage link.

Hackers use their technical skills and special software to gain unauthorized access to your computer. They may steal files and personal details. Gain access to your internet service and even destroy your computer.

Non-genuine websites (sometimes known as Phishing) claim to offer quality products or services. The purpose of these websites is to steal your credit card details or email address when you place an order or submit your details on the website to receive an offer.

SPAM (Self Promotional Advertising Message) is unsolicited email, now illegal in many countries and banned by many ISP's (Internet Service Providers).

Trojans & Spyware is software that hides within a legitimate looking application or utility on your computer. Once installed a Trojan can launch itself and act like or provide access for a hacker. Spyware installs itself on your computer and sends reports on your computer activity back to its host.

Viruses & Worms are software applications often spread via email and infect your computer. Once installed they can steal email addresses from your contact list and then the virus will attempt to infect other computers via those email addresses.

Friday, May 1, 2009

DASAR MIKROPROSESOR DAN MIKROKONTROLER

DASAR MIKROPROSESOR DAN MIKROKONTROLER


Bagian fungsional utama sebuah komputer adalah central processing Unit/Unit Pemroses Utama, Memori dan Sistem Input-Output. Disebut bagian fungsional karena ketiga komponen inilah yang membentuk sebuah komputer dengan fungsinya masing-masing. Lebih jauh mengenai fungsi ketiganya akan diterangkan pada bab berikutnya

a. Central Processing Unit/Unit Pemroses Utama ( Mikroprosesor )
Mikroprosesor adalah sebuah CPU yang dibangun dalam sebuah single chip semiconductor. Mikroprosesor terdiri dari kalkulator yang terbagi dalam register dan ALU dan sebuah pengkode serta unit pengontrol.

b. Mikrokontroler
Sebuah mikroprosesor yang digabungkan dengan I/O dan memori (RAM/ROM) akan membentuk sebuah sistem mikrokomputer. Terilhami dengan CPU yang dapat dikonstruksi dalam sebuah single chip semiconductor, maka sebuah mikroprosesor, I/O dan memori dapat pula dibangun dalam level chip. Konstruksi ini menghasilkan Single Chip Microcomputer (SCM). SCM inilah yang disebut sebagai mikrokontroler

Mungkin akan timbul pertanyaan, apakah perbedaan antara mikrokomputer dengan mikrokontroler? Selain arsitekturnya, mikrokontroler jika dibandingkan dengan mikrokomputer seperti IBM PC adalah penggunaan I/O interface dan media penyimpanan yang berbeda. Dalam IBM PC media penyimpanan biasa menggunakan disket, maka pada mikrokontroler menggunakan EPROM sebagai media penyimpanan.
Dalam mikrokontroler, RAM serta I/O interface sudah masuk di dalamnya. Ini merupakan satu keuntungan lebih dari mikrokontroler.

Dalam Hal penggunaannya, sistem mikrokontroler lebih banyak dipakai pada aplikasi yang deterministik, artinya sistem ini dipakai untuk keperluan yang tertentu saja misalkan sebagai pengontrol PID pada instrumentasi industri, pengontrol komunikasi data pada sistem kontrol terdistribusi.

Friday, April 24, 2009

Tricks and Tips For Free Spyware Remova

There are many free Spyware removal tools online that claim to totally remove all Spyware, Adware and Malware. There are times you use them and few days later you notice the Spyware's has increased in number. It seems like the free Spyware removal tool you used did not work at all. There are some tricks or tips to follow in order to make sure Spyware is completely removed from your computer.

Always make it a point to check the programs running on your computer. Most Spyware will hide and the only way to find them is to check them by installing HIJACK THIS. It is the best software to show you what programs are running and this way you can spot the Spyware. HIJACK THIS is a free Spyware removal tool that is a must have.

If you are using Windows XP, it is known that Spyware hides in the restore files. Any file you restore brings back the Spyware. To get rid of this go to My computer then Properties then you will see System restore, turn off the system restore by clicking apply then ok. This will ensure that all the Spyware you got rid of will not get back, another free Spyware removal idea.

One way Spyware gets information about your every move is through your IP address, therefore you need to hide your address. Whenever you feel your computer is getting slow again, you see any pop ups then change the address all over again. Depending on which browser you are using the steps to change your IP address differ. Make sure you start using Firefox instead of Internet Explorer, this is a simple free Spyware removal tip. For further information, please visit http://www.SpywareandAdwareremovalsoftware.org/

Thursday, April 9, 2009

Java: An Introduction to Computer Science and Programming, Third Edition (Paperback)

From the Inside Flap
PREFACE FOR STUDENTS

This book is designed to teach you the Java programming language, and even more importantly, to teach you basic programming techniques. This book requires no previous programming experience and no mathematics other than some very simple high school algebra. However, to get the full benefit of the book, you should have a version of Java available on your computer, so that you can practice with the examples and techniques given in the book. You should have a version of Java called Java 2 (or some number higher than 2). If you have a version number of the form 1.l.x or 1.2.x, then the version number should be 1.2.x or higher. (The exact number that is filled in for the x is not critical. The x need not even be present. If it says only "version 1.2," that is fine.) If You Have Programmed Before

You need not have any previous programming experience to use this book. This book was designed for beginners. However, the book can still be used to learn Java if you happen to have had experience with some other programming languages, but allow me to give you a few words of advice. If you have programmed before, do not assume that Java is the same as the programming language(s) you are used to using. All languages are different. And the differences, even if small, are large enough to give you problems. Read at least the boxed sections of Section 1.4 in Chapter 1 and all the boxed sections of Chapters 2 and 3. By the time you reach Chapter 4, it would be wise to read the entire chapter.

If you have programmed before in either C or C++, the transition to Java can be troublesome. While Java is very different from C and C++, at first glance it looks as if it is the same as C++. Appendix 11 has a comparison of Java and C++ that will help you see the differences between Java and C++ (or Java and C). Copies of the Programs from the Text

This book contains a CD that includes all the programs and other software examples in the book, so that you can practice with these examples without having to type them into your computer. Obtaining a Copy of Java

How and what version of Java you use depends somewhat on what operating system you are using. Be sure to consult the subsection below that corresponds to your operating system. Microsoft Windows

Alternative 1:
The CD that comes with this book includes a version of JBuilder 3.5 Foundation, a complete Java integrated environment from Inprise/Borland. JBuilder includes an editor and other utilities in addition to the Java language. This has everything you need to write and run Java programs. This is a professional strength environment, which can be a bit complex for novices, so we also have an alternative that gives you an easier environment.

Alternative 2:
This is a bit more complicated to initially set up, but easier to use once you do set up things. Download a free Java compile over the Internet from Sun Microsystems. Install that Java compiler and the TextPad environment, which is provided on the CD that comes with this book. The TextPad environment provides an editor and other tools to use when writing Java programs.Unfortunately, users have not been happy with the Mac version of Java provided at this site, and indeed, it may not do all things discussed in this book.

If you are using the Mac operating system, one good alternative is to purchase a version of CodeWarrior from Metrowerks, Inc. It works well with the Mac operating system.

A version of JBuilder for the Mac is due out soon and promises be an excellent alternative for Mac users. You may want to check the following website to see if it is available. If it is, you can download it from there: borland/jbuilder/foundation/download/ UNIX Operating System

Alternative 1:
The CD that comes with this book includes a version of JBuilder 3.5 Foundation, a complete Java integrated environment from Inprise/Borland. JBuilder includes an editor and other utilities in addition to the Java language. This has all the software you need in order to write and run Java programs. JBuilder has versions for both the Solaris and Linux operating systems.

Alternative 2:
You can down load a free Java compiler over the Internet from Sun Microsystems.You can use your favorite editor to write programs and then run your Java programs from the command line as described in Chapter 1. (Or you may find an environment you like and can use it.) Self-Test Questions

Each chapter contains numerous self-test questions. Complete answers for all the self-test questions are given at the end of each chapter. One of the best ways to practice what you are learning is to do the self-test questions without looking at the answers. Only look at the answers after you have answered the self-test questions. This Text Is Also a Reference Book

In addition to using this book as a textbook, you can and should use it as a reference. When you need to check a particular point that you may have forgotten or that you hear mentioned by somebody but have not yet learned yourself, just look in the index. Many index entries give a page number for "quick reference." Turn to this quick reference page. It will contain a short entry, usually set off in a box, that gives all the essential points on that topic. This can be done to check details of the Java language, as well as details on programming techniques.

Boxed sections in every chapter give you a quick summary of the main points in that chapter. You can use these boxes to review the chapter, preview the chapter, or check details of the Java language. Updates and Corrections

Any updates or corrections will be listed on the author's website for this book cse.ucsd/users/savitch/books/csl.java/ We Want Your Opinions

This book was written for you, and I would like to hear any comments you have on the book. You can contact me via electronic mail at the following address: wsavitch@ucsd

Unfortunately, I cannot provide you with answers to the programming exercises. Only instructors who adopt the book can receive (selected) answers from the publisher. For help on the programming exercises, you will have to contact your instructor. (Even if you are not enrolled in a class we still cannot provide answers to programming exercises.) But, remember that there are answers to all the self-test questions at the end of each chapter.

Walter Savitch
cse.ucsd/users/savitch PREFACE FOR INSTRUCTORS

This book was designed to be used in a first course in programming and computer science. It covers programming techniques, as well as the basics of the Java programming language. It is suitable for courses as short as one quarter or as long as one full academic year. It requires no previous programming experience and no mathematics other than a little high school algebra. This book can also be used for a course designed to teach Java to students who have already had another programming course, in which case, the first few chapters can be assigned as outside reading. (If students have had previous programming experience in C or C++, then there is also an appendix that explains some differences between Java and C or C++.) All the code in the book has been tested using Java 2 of Sun Microsystems. The coverage of Java was carefully arrived at by class testing and is a concise, accessible introduction for beginners. Changes in this Edition

If you have not used the first edition of this text, you can skip this subsection. If you have used the first edition, this subsection will tell you how this second edition differs from the first edition.

For instructors, the transition from the first edition of this text to this edition is easy. You can teach the same course with basically the same topics presented in the same order. Some chapters have changed numbers, but you can still cover those chapters in the order you are currently using. The biggest change was to move the arrays chapter forward to Chapter 6. However, you can cover arrays later if you prefer with no loss of continuity in reading the text. The only significant change you will need to contend with is that this edition uses the Swing library instead of using only the AWT library as the first edition did. However, there have been changes and additions that you may find helpful.

This edition adds coverage of the Swing Libraries, the Graphics class, and linked data structures to the topics covered in the first edition. In addition, the entire book has been rewritten to make the material clearer and more complete. There are many more Self-Test Questions and many more Programming Exercises in this edition.

In response to requests from users of the first edition, we have adopted the policy of listing instance variables first in class definitions (as opposed to last, as in the first edition).

This book also contains some early, optional material on applets and another GUI class named JOption Pane. This allows instructors to introduce GUI interfaces early if they wish, or wait to introduce them later (or not at all) if that is preferred. Java 2 Coverage

The first edition of this book was already fully compatible with Java 2. This edition adds coverage of Swing and other Java 2 details to provide more complete coverage of Java 2. Flexible

If you are an instructor, this book adapts to the way you teach, rather than making you adapt to the book. This book does not tightly prescribe the order in which your course must cover topics. Neither does it prescribe the specialized libraries that must be used in your course. You can easily change the order in which chapters and sections are covered. The details about rearranging material are explained in a chart at the end of this preface and in more details in a prerequisite section at the start of each chapter.

Since Java does not include any simple console input, most texts, even more advanced texts, provide some added class library for console input. This book requires that you add as little nonstandard software as possible, since only one simple class is added (for console input). Even that one console input class, which is included early in the book, becomes an understandable programming example for students well before the end of the book. All the remaining software is from standard Java libraries that should be part of any Java installation. Coverage of Problem Solving and Programming Techniques

This book is designed to teach students basic problem-solving and programming techniques and is not simply a Java syntax book. The book contains numerous case studies and programming tips, as well as many other sections that explain important problem-solving and programming techniques, such as loop design techniques, debugging techniques, style techniques, abstract data types, basic object-oriented programming including event-driven programming, and other computer science topics. Object-Oriented and Traditional Techniques

Any course that really teaches Java must teach classes early, since almost everything in Java involves classes. The behavior of parameters depends on whether they are class parameters. Even the behavior of the equals operator (= =) depends on whether it is comparing objects or simpler data items. Classes cannot be avoided, except by means of absurdly long and complicated "magic formulas." This book introduces classes fairly early. Some exposure to using classes is introduced in Chapters 1 and 2. Defining classes is covered in Chapter 4. Moreover, all the basic information about classes, including inheritance, is presented by the end of Chapter 7 (and this can be done omitting Chapter 6). However, some topics on classes, including inheritance, can be postponed to later in a course.

Although this is an early classes book, it does not neglect traditional programming techniques, such as top-down design and loop design techniques. These older topics may no longer be glamorous, but they are information that all beginning students need. Swing, Applets, and Other GUIs

Starting with Java 2, Java comes with an improved GUI library known as Swing that allows programmers to design portability GUIs (graphical user interfaces). This book uses Swing to teach students to produce professional looking windowing interfaces. In the process, students learn event-driven programming, as well as receiving a lot of practice with object-oriented programming.

As this material was class-tested and views of instructors were gathered, we found that Swing was a more accessible way to teach students object-oriented programming than applets. Thus, we place greater emphasis on Swing. This makes sense, since almost all advanced applets tools are really Swing tools. However, for those who do want to cover applets early, Chapter 1 has an optional section that previews applets. Chapter 13 covers applets in detail and may be covered much earlier than the chapter number suggests. You may choose to introduce GUIs early, late, or not at all.

With the introduction of the Swing libraries, there is a new class named JOption P a n e that allows an easier introduction to GUIs than applets provide. This book covers JOption Pane in an optional section of Chapter 2. You have the choice of introducing either or both applets and JOption Pane either late or early (or not at all).

In addition to this optional GUI material in Chapters 1 and 2, this book includes three full chapters on GUIs, which gives thorough coverage of Swing, applets, and the Graphics class for simple two-dimensional graphics. Language Details and Sample Code

This book teaches programming technique and does not simply teach the Java language. However, neither students nor instructors would be satisfied with an introductory programming course that did not also teach the programming language. Until you calm a student's fears about language details, it is often impossible to get her or his attention to discuss bigger issues. For this reason, this book gives complete explanations of Java language features and lots of sample code. Programs are given in their entirety along with sample input and output. In many cases, there are even extra complete examples on the CD, in addition to the complete examples in the text. Self-Test Questions

Self-test questions are spread throughout each chapter. These questions have a wide range of difficulty levels. Some require only a one-word answer, whereas others require the reader to write an entire, nontrivial program. Complete answers for all the self-test questions, including those requiring full programs, are given at the end of each chapter. Class Tested

The material in this book has been fully class tested. Much of the material and methods of presentation were revised in response to this class testing. Support Material

The support materials described below can be obtained from the publisher, obtained over the Internet, or are included with the book. CD-ROM

Each book contains a CD that includes all the programs and classes in the book. The CD also includes a version of JBuilder 3.5 Foundation, a complete Java integrated environment from Inprise/Borland. JBuilder includes an editor and other utilities in addition to the Java language. The CD includes versions of JBuilder for Windows, Solaris, and Linux operating systems. The CD also includes a copy of TextPad, a very nice integrated environment that runs under Windows and that is a suitable environment for use with Sun's Java 2. Free Software

You have a wide choice of free software to use with this book. As already noted the CD that comes with this book includes JBuilder and TextPad.

JBuilder works under Windows, Solaris, and Linux operating systems. At the time this book went to press a version of JBuilder for the Mac was not available, but was due out soon. You may want to check the following website to see if it is available. If it is, you can download it from there: borland/jbuilder/foundation/download/

Another very good alternative is to download a version of Java-2 from Sun Microsystems website.The TextPad environment (which comes on the CD that accompanies this book) is a good environment to use with Sun's Java-2, provided you are using a Windows operating system. TextPad only runs under Windows. Instructor's Resource Guide and Companion Website

Instructor tools include a chapter-by-chapter Instructor's Resource Guide that contains numerous teaching hints, quiz questions with solutions, and solutions to many programming exercises. The Companion Website includes code, PowerPoint slides, and other teaching resources. Instructors should contact their Prentice Hall sales representative to obtain a copy of the Instructor's Resource Guide and receive information on how to access the Companion Website. For the name and number of your sales representative, please call Prentice Hall Faculty Services at 1-800-5260485. Additional information on this book and other Prentice Hall products can be found on Prentice Hall's website at prenhall/ Updates and Corrections

Any updates or corrections will be listed on the author's website for this book cse.ucsd/users/savitch/books/csl.java/ --This text refers to an out of print or unavailable edition of this title.

Tuesday, March 31, 2009

What is the Difference Between a Software Engineer and a Computer Programmer?

What is the Difference Between a Software Engineer and a Computer Programmer?

The terms software engineer or computer programmer may be confusing to the average computer user. Most of us associate computer programs with the generic term 'Software'. To us it may seem that the terms are interchangeable. That is not so. The role played by a software engineer is significantly different from that of a computer programmer. Before learning what the difference between a software engineer and a computer programmer is, let us see what is meant by the term software engineering and how it relates to computer programming.

Software engineering is a rigorous approach to development, maintenance and testing of software. These are engineers who must be knowledgeable about software requirements, design, development, maintenance and testing. They must be well versed with the tools and methods used for the development process as a whole. It is thus a convergence of the fields of computer science and systems engineering with a great deal of project management added for good measure. They are expected to have technical skills in addition to managerial skills.

A computer programmer on the other hand, is required to develop, test and maintain code that is to be run on the computer. He is responsible for converting the specifications provided in the software requirements definition phase into working code for the computer. Computer programmers are involved with design and maintenance of websites too. They should be proficient in analysis of programs. They are required to collaborate with manufacturers in developing new methodologies for software with evolution of hardware. Training, documentation and generation of reports are also tasks that should be handled by a computer programmer.

We can observe that the skill set required by a computer programmer is a subset of the skills expected from a software engineer. The computer programmer is a specialist in some areas covered by software engineering. A software engineer is in charge of the overall software development process and is expected to improve the reliability and maintainability of this complex process. A software engineer may have a team of computer programmers working under his supervision.


5 Tips on How to Find the Best Data Conversion Services

Data File Conversion and Software

May be you are searching for a company who can supply you with the data conversion services to assist you with data file exchange to a more unbiased platform, read this article.

1. The best company should offer you data exchange services intended to gather the exclusive requirements of all customers. The best companies focus on providing services to businesses with huge quantities of data and compound of organization necessities. The purpose of the data conversion services is to assist you regulate your various data and store it in a central depository, letting you use it in your content managing schemes.

2. Such company should offer data conversion services that include the full data conversion process, as well as data and business investigation, data output services, database planning and integration, translation, and development. If you want to hire a company for such service, you should learn more about the data conversion that they offer, as well as media conversion, data file exchange, and data exchange software.

Electronic Conversion Services

3. Check if the company uses high-tech conversion techniques that let you exchange electronic information from its presented format. Regardless of the present state of your data, the right company should provide the required data conversion services to exchange that data to a platform-unbiased, electronic plan like XML, which is appropriate for import into a data storehouse. Search for a company, whose electronic data exchange services go much further than the competences of the majority of data conversion companies. If no off-the-shelf option is obtainable, a good company will produce custom data exchange software to translate data into a functional electronic format.

Printed Conversion Services

4. For information that is presented only in written form, a good company will have data exchange services that operate up to date scan services and professional technicians to examine papers or images for media exchange to digital format. Such written data conversion services have to be performed by the company editorial personnel, which offer manual data entry in addition to proofing and editing to guarantee the accurateness of the information that is entered. The printed data exchange services should preserve an accuracy rate of 99.9%.

More Conversion Services.

5. The best data conversion companies offer excellence in data conversion with the intention to satisfy the personal requirements of all customers. They help customers discover their requirements and then they produce services that assemble those needs, especially if you search for a corporation that can supply you with excellent personalized data exchange offers.

SKG Technologies provides Data Entry Service & Data Conversion Service at very low rates for small and medium business in USA, UK, Canada,and Singapore. SKG Technologies also provides accounting services, bookkeeping services, virtual assistant services, customer support services, technical support services to its clients all over the world.