Tips and Tricks

How to become a Programmer?

29/06/2010 07:52
Although it is true that you can learn a programming language in 7 or 21 days, depending on what "learn to program" book you read, it does take a lot longer than that to gain experience in how to use a language most effectively. It is a cumulative process that builds up your skills day after...

Microsoft Small basic

11/11/2009 15:15
Small Basic is a project that is focused at making programming accessible and easy for beginners. It consists of three distinct pieces: the Language the Programming Environment Libraries The Language draws its inspiration from an early variant of BASIC but is based on the modern .Net...

Vb.Net - Combo/Listbox: ItemData and NewIndex

11/11/2009 15:13
Visual Basic .NET Tips and Tricks I've been working in VB.NET for some time now, and here are some tips and tricks for those who are migrating from VB 6.0.   Combo/Listbox: ItemData and NewIndex What kicks your butt in the beginning is simple little things. I remember when I first tried to...

Topic: Tips and Tricks

Date 18/07/2011

By Abhradeep Ghosh

Subject Thanks Man!

Reply

Thanks for so much help dude i just loved it.

Date 11/01/2011

By den

Subject tips on facebook privacy

Reply

Tips to Stay Safe

Here's some advice from Sileo, who wrote the "Facebook Safety Survival Guide," about protecting online privacy on all social-networking sites:

• Never post your exact date and place of birth. It's invaluable information to identity thieves, particularly when the two are bundled together.

• Never post your address, phone number or email address. This is plum information to scammers and marketers who are looking for nuggets of your identity.

• Control who can see your personal information. Many social-networking sites have privacy features, but they change often. Know what they are, stay on top of them and restrict your page to your real friends, not friends of friends or someone you met in a bar.

• Limit information about your activities. If you must brag about a trip or a fabulous party, do it after the fact.

• Remember that what you post is public and permanent. Don't put up embarrassing photos that you wouldn't show your grandmother. Don't complain about your job or your boss. Don't say something to or about someone that you wouldn't say to his face. Don't threaten others.

• Know the four types of Facebook users: friends, outsiders, businesses and enemies.

• You should know exactly who wants to be your friend or is asking you to link into their network. Some people will befriend your friends to get to you or your company.

• Be wary of seemingly harmless quizzes. When someone invites you to take a survey, say, "10 Things Others Don't Know About You" or "My Favorite Things," it may be designed to harvest your data. The name of the street you grew up on or your favorite vacation spot could be clues to your passwords.

• Before you share any information anywhere online about yourself or your workplace, ask this question: What would the consequences be if this information fell into the hands of my boss, competitor or people who don't like me?

Date 12/07/2010

By den

Subject need for thesis website

Reply

https://bitdaddys.com

Date 06/07/2010

By den

Subject thesis guide website

Reply

https://www.vbmysql.com/articles/vbnet-mysql-tutorials/the-vbnet-mysql-tutorial-part-3

Date 01/07/2010

By den

Subject tips for system management

Reply

Valen Yvone Bolloso BSIT4

Systems management
-refers to enterprise-wide administration of distributed systems including (and commonly in practice) computer systems [citation needed]. Systems management is strongly influenced by network management initiatives in telecommunications.
-The general area of Information Technology (IT) that concerns configuring and managing computer resources, especially network resources.

System administrator, systems administrator, or sysadmin,
- is a person employed to maintain and operate a computer system and/or network. System administrators may be members of an information technology (IT) department.

Command Description
• apropos whatis -Show commands pertinent to string. See also threadsafe
• man -t man | ps2pdf - > man.pdf- make a pdf of a manual page
which command -Show full path name of command
time command -See how long a command takes
• time cat -Start stopwatch. Ctrl-d to stop. See also sw

dir navigation
• cd - Go to previous directory
• cd -Go to $HOME directory
(cd dir && command) -Go to dir, execute command and return to current dir
• pushd . -Put current dir on stack so you can popd back to it

file searching
• alias l='ls -l --color=auto'- quick dir listing
• ls -lrt -List files by date. See also newest and find_mm_yyyy
• ls /usr/bin | pr -T9 -W$COLUMNS -Print in 9 columns to width of terminal
find -name '*.[ch]' | xargs grep -E 'expr' -Search 'expr' in this dir and below. See also findrepo
find -type f -print0 | xargs -r0 grep -F 'example' -Search all regular files for 'example' in this dir and below
find -maxdepth 1 -type f | xargs grep -F 'example' -Search all regular files for 'example' in this dir
find -maxdepth 1 -type d | while read dir; do echo $dir; echo cmd2; done- Process each item with multiple commands (in while loop)
• find -type f ! -perm -444- Find files not readable by all (useful for web site)
• find -type d ! -perm -111 -Find dirs not accessible by all (useful for web site)
• locate -r 'file[^/]*\.txt' -Search cached index for names. This re is like glob *file*.txt
• look reference -Quickly search (sorted) dictionary for prefix
• grep --color reference /usr/share/dict/words -Highlight occurances of regular expression in dictionary

archives and compression
gpg -c file -Encrypt file
gpg file.gpg- Decrypt file
tar -c dir/ | bzip2 > dir.tar.bz2 -Make compressed archive of dir/
bzip2 -dc dir.tar.bz2 | tar -x- Extract archive (use gzip instead of bzip2 for tar.gz files)
tar -c dir/ | gzip | gpg -c | ssh user@remote 'dd of=dir.tar.gz.gpg' -Make encrypted archive of dir/ on remote machine
find dir/ -name '*.txt' | tar -c --files-from=- | bzip2 > dir_txt.tar.bz2 -Make archive of subset of dir/ and below
find dir/ -name '*.txt' | xargs cp -a --target-directory=dir_txt/ --parents- Make copy of subset of dir/ and below
( tar -c /dir/to/copy ) | ( cd /where/to/ && tar -x -p ) -Copy (with permissions) copy/ dir to /where/to/ dir
( cd /dir/to/copy && tar -c . ) | ( cd /where/to/ && tar -x -p )- Copy (with permissions) contents of copy/ dir to /where/to/
( tar -c /dir/to/copy ) | ssh -C user@remote 'cd /where/to/ && tar -x -p' -Copy (with permissions) copy/ dir to remote:/where/to/ dir
dd bs=1M if=/dev/sda | gzip | ssh user@remote 'dd of=sda.gz'

ssh (Secure SHell)
ssh $USER@$HOST command -Run command on $HOST as $USER (default command=shell)
• ssh -f -Y $USER@$HOSTNAME xeyes -Run GUI command on $HOSTNAME as $USER
scp -p -r $USER@$HOST: file dir/ -Copy with permissions to $USER's home directory on $HOST
ssh -g -L 8080:localhost:80 root@$HOST -Forward connections to $HOSTNAME:8080 out to $HOST:80
ssh -R 1434:imap:143 root@$HOST -Forward connections from $HOST:1434 in to imap:143