Sunday, October 28, 2012

How to allow user to Run only specific Application in Windows 7

If you are a System Administrator of a Company and as your Company standard user can run only specified Application which is authorized, then your task is How to allow user to run Only Specified Application such as MS word , Internet Explorer , MS Excel and Notepad etc. Please follow the following step to do this : Open Group Policy Editor by typing "gpedit" in start menu's search bar as same as displaying in following image. Following...

Wednesday, October 3, 2012

Android Code for calling .NET web service

You need to declare 4 variable to call web service method OPERATION_NAME - name of method to call NAMESPACE - namespace SOAP_ACTION - particular methdo of specified namespace URL - URL of your web serivce Declare above variable as below : String OPERATION_NAME="HelloWorld"; String NAMESPACE="www.tempuri.org/"; String SOAP_ACTION=NAMESPACE+OPERATION_NAME; String URL="http://your-ip-address/your-application-nm(in .net)/Service.asmx"; *** Note ***:  in above statement instead your-ip-address you have to write your...

Tutorial of Android Web Service Application with VB .Net

Hello Friends, Today I am going to discuss with you that how to make web service in .NET and how to call it from android. You need following tools to develop application. Microsoft Visual Studio 2008 (to develop web methods) Internet Infomation Service (IIS 6 for Windows XP and IIS 7.5 for Win7) (virtual server) Android SDK (Min API Level-7) (to call web methods) Eclipse HELIOS KSOAP-android-2.5.2 jar file (it's a java class file which your have to include in your code. Step 1 : You need  Microsoft Visual Studio 2008 to develop web-service method....

Monday, October 1, 2012

How to Create Web Service in Microsoft Visual Studio 2008 in Windows7

Here I am going to explain you how to develop web service in Microsoft Visual Studio 2008. You need Internet Infomation Server (IIS) 7.5 as virtual server to run the web service. You can download IIS 7.5 from here. You need Dot Net Framework 3.5 to install IIS 7.5 You can download it from this link. Now to configure IIS you have to go in control panel - > Programs and Features -> Turn Windows Features on or off. Click on...

Tuesday, September 25, 2012

How to Fix Write Protected Error...

What is Write Protected error and why it happens? In the Write Protected error, we can not write or copy any data in to flash/USB drives and even can not format it.There are many reasons that causes this problem. Here I give share the solution to fix that problem. Solutions:  Just download this helpful software from here and run it to execute a “low-level format” on the drive. This software is quite handy and may take few attempts to actually remove the error. If that low level format tool does not work, try another one Link. The...

How to make your USB as Write Protected

Today when I got some data transferred in my friends pen drive at my rum that made me think that I need to remove Write Protect his pen drive. The drive has about 7 different types of viruses in Pen Drive. It is so irritating to always scan the drive to remove the viruses that also consumes our important time. So I got something to share with you guys “How you can Write Protect your Pen Drive” or “How you can prevent your pen...

Tuesday, August 7, 2012

How to do ODBC Connection with C++ code

ODBC DSN Step with C++   ODBC (Open Database Connectivity) • A standard interface for connecting from C++ to relational databases • It allows individual providers to implement and extend the standard with their own ODBC drivers Here are procedures or rather steps used in the industry in C++ coding for connecting to a database Steps of the ODBC • Include Header Files • Open a Connection to a Database • Choose an ODBC Driver • Query the Database • Creating an ODBC Statement Object • Executing a Query and Returning an ODBCResultSet...

Wednesday, April 4, 2012

Why Dynamic Programming Languages Are Slow..??

In a statically typed language, the compiler knows the data-type of a variable and how to represent that. In a dynamically-typed language, it has to keep flag describing the actual type of the value of the variable, and the program has to perform a data-dependent branch on that value each time it manipulates a variable.  It also has to look up all methods and operators on it. The knock-on effect of this on branching and data locality is lethal to general purpose run time performance. That’s why the dynamic language JIT benchmarks emphasise...

Thursday, February 16, 2012

Cloud Computing Concerns

Perhaps the biggest concerns about cloud computing are security and privacy. The idea of handing over important data to another company worries some people. Corporate executives might hesitate to take advantage of a cloud computing system because they can't keep their company's information underlock and key. The counterargument to this position is that the companies offering cloud computing services live and die by their reputations. It benefits these companies to have reliable security measures in place. Otherwise, the service would lose all...

Application of Cloud Computing

The applications of cloud computing are practically limitless. With the right middleware, a cloud computing system could execute all the programs a normal computer could run. Potentially, everything from generic word processing software to customized computer programs designed for a specific company could work on a cloud computing system. Why would anyone want to rely on another computer system to run programs and store data? Here are just a few reasons: Clients would be able to access their applications and data from anywhere at any...

Architecture of Cloud Computing

When talking about a cloud computing system, it's helpful to divide it into two sections: the front endand the back end. They connect to each other through a network, usually the Internet. The front end is the side the computer user, or client, sees. The back end is the "cloud" section of the system. The front end includes the client's computer (or computer network) and the application required to access the cloud computing system. Not all cloud computing systems have the same user interface. Services like Web-based e-mail programs leverage...

Introduction to How Cloud Computing Works

Let's say you're an executive at a large corporation. Y may be an alternative for executives like you. Instead of installing a suite of software for each computer, you'd only have to load one application. That application would allow workers to log into a Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to complex...

Thursday, February 9, 2012

How to Hide Application Icon in Windows 7 Taskbar

Microsoft Windows 7 comes with a taskbar that has never before been witnessed in its predecessors. The Windows 7 taskbar features a dock-type appearance and utility tools like launching a program or running an application. Undoubtedly, the Windows 7 taskbar helps the user to an extent more than what meets the eye. Here, we unveil a new utilization feature of the Windows 7 taskbar. Often, some programs and shortcuts to various applications are pinned to the taskbar for easy accessibility. However, sometimes for reasons concerning privacy and confidentiality,...

Tuesday, February 7, 2012

Windows 8 To Feature A Lot More MinWin Technology

First off, what is MinWin? Basically it’s the very basis of Windows, you need to think of it as the core of Windows. MinWin contains pretty much everything that Windows needs to boot and run independently, such as the Windows NT Kernel, memory manager, networking and drivers etc… So what’s the big deal about this MinWin technology? Well we first started seeing MinWin playing a prominent part in Windows 7, but now it appears that it’s going to...

Sunday, February 5, 2012

How To disable Coping/Writing To USB Drives in Windows XP

USB drives are extremely handy tools, but in some instances it might not be a good idea to allow users to write onto these devices from their PCs. This is especially true when working with highly confidential data or intellectual property at work. Users of Windows XP with service pack 2 installed can disable writing to USB devices. To perform you have to pass from following steps : Open the Registry Editor click by clicking on START button...

Enable Windows 7's Hidden "God Mode"

Windows 7 has many features but some of that will be hidden. Today I am going to introduced one of them in front of you. It's Name is "GOD MODE". This functionality is contains most of the OS task such as Default Program, Autoplay, Desktop Gadget, Admin Tools etc. are included in one folder. It provides users with a centralized Control Panel for all of Windows' settings, from changing your desktop background to setting up a VPN or partitioning...

Mobile Tracking – How To Track Any Mobile Phone

Are you looking for Mobile Phone Tracking options so you can easily monitor your partner’s, child’s or employee’s mobile phone activities? If you do want to track a mobile phone, but you have no clue how to do this, then I will tell you exactly what you need to do in order to successfully do this without getting caught by the owner of the mobile phone. How To Track Any Cell Phone Without Getting Caught By The Owner. While many people think that...