Technology

Technology articles will deal with information, data and operations, activities related to that data and new coming technology. Share your ideas, read posts and share techliebe in your social world.


Software Copyright
What is Software Piracy? This article gives the broad information of software piracy. Piracy of softwares involves the use reproduction or distributed without having received the expressed permission of the software author. Software piracy can be divided in four common types. The first one is end user piracy, it occurs when the users of software installs the software on more machines then they are entitled to under their license agreements. […]

Software Piracy


Mutex Lock
Synchronization in Window XP   The Windows XP operating system is a multithreaded kernel that provides support for real-time applications and multiple processors. When the Windows  XP kernel accesses a global resource on a uniprocessor system, it temporarily masks interrupts for all interrupt handlers that may also access the global resource On a multiprocessor system, Windows XP protects access to global resources using spinlocks. Just as in Solaris, the kernel […]

Synchronization in Various Operating Systems



Backtrack Testing
In this article we will study about Penetration Testing. Basically Penetration Testing is a methodology use for exploiting the system for making the system more secure. Penetration Testing is generally used in many IT companies for finding out the loopholes in their systems and recovering them them for making their systems more penetrable to the outsiders attack.  Penetration Testing is also known as:- 1) Pen Test. 2)Ethical Hacking. 3)White-Hat A […]

Penetration Testing


Socket Programming
What is Socket? Socket is the transport layer entity which deals with process to process communication. A system attachment is an endpoint of a between procedure correspondence stream over a workstation system. Today, generally correspondence between workstations is dependent upon the Internet Protocol; accordingly generally organize attachments are Internet attachments.  An attachment API is a requisition modifying interface (API), for the most part gave by the working framework, which permits […]

JAVA Socket Programing



Analysis Model
Models are useful for better understanding of actual entity to be built or design. Models are represented at different levels of abstraction first depict software from customer’s view point and later represent software at more technical level. There are two classes of models are created:- 1) Analysis model 2) Design model Analysis Model: – Represent the customer requirement, which includes algorithmic specifications of program or process. Analysis model includes three […]

Modeling practices in Software Engineering


Android 2
Android is an operating system developed for Smartphone and tablet. It is Linux based operating system and is open source. At first Google provided financial support to Android Inc. but in 2005 Google bought Android. Android global smartphone market share in world increased from 2.8% in 2009 to 75% in 2012. Android operating system was first installed on HTC dream and was sold in October 2008.The main aim of Android […]

Android and its version



Personalized Mobile Search Engines
We propose a customized versatile web crawler (PMSE) that catches the clients’ inclination in the manifestation of thoughts by mining their click through information. Because of the vitality of area qualified data in versatile look, PMSE characterizes these thoughts into content thoughts and area ideas. Furthermore, clients’ areas (positioned by GPS) are utilized to supplement the area thoughts in PMSE. To describe the differing qualities of the thoughts connected with […]

Personalized Mobile Search Engine