Sunday, 18 September 2011

An adding calculator using java and html

friends, this is something interesting and i hope you will like it.
this is a small program for addition using java and html.
-------------------------------------------------------------------




ABHIMANYUcalculator




Simple Adder





Simple Adder

Enter a number:
Enter a number:


Answer =



Copyright © 2011 ABHIMANYU



----------------------------------------------------------------------------------------
If you like this article then you can directly mail me at:

Send Mail

----------------------------------------------------------------------------------------

small pop-out message code using javascript and html

hello friends,
this is just a small pop-out message code.
what you have to do is just copy the code written below in your notepad, save it and open with your mozilla browser.

------------------------------------------------------------------------------------------------------------
<HTML>
<HEAD>

<SCRIPT LANGUAGE="JavaScript">
<!-- Beginning of JavaScript -

function MsgBox (textstring) {
alert (textstring) }

// - End of JavaScript - -->
</SCRIPT>

</HEAD>


<BODY>

<FORM>
<INPUT NAME="text1" TYPE=Text>
<INPUT NAME="submit" TYPE=Button VALUE="Show Me" onClick="MsgBox(form.text1.value)">
</FORM>

</BODY>
</HTML>
--------------------------------------------------------------------------------------------------
for further info. you can mail to:
Send mail!


Sunday, 28 August 2011

How to start Windows files and other programs from a batch file

To run Microsoft Windows programs or files use the START command. The below example would run Windows Notepad.
START /MAX NOTEPAD
You can also specify the direct location of the file by typing the below command.
START /MAX C:\Windows\NOTEPAD.EXE
*Windows users who have a different directory (e.g. Windows 2000 users) would need to substitute WINNT or the name of their directory in place of Windows in the above example.
The /m representing it to start the window Maximized.

Creating a batch file delay

Below is an example of how to delay a batch file any where from 5 to 99 seconds. In the below example we illustrate a 5 second delay.
TYPE NUL | CHOICE.COM /N /CY /TY,5 >NUL

keep it simple silly!

How to make a time log in a batch file

The below example demonstrates how to create a time log of when the batch file is loaded, or for example, this could be used in the autoexec.bat when someone logs into a computer that supports this file.
ECHO. |TIME > TIME
COPY LOG +TIME
An alternate, slightly more complicated method that, to our knowledge, cannot be used in Windows NT, Windows 2000 or Windows ME would be the following:
echo @prompt set date=$d$_set time=$t$h$h$h > {a}.bat
%comspec% /e:2048 /c {a}.bat > {b}.bat
for %%v in ({b}.bat del) do call %%v {?}.bat
echo %date% %time% >> log
Another alternative is:
echo. |time |find "current" >> log
For the above batch file to work properly you must create a file called log, by typing edit log and then save and exit the file, creating a 0 bytes file. If this file is not created or not created properly you will receive the error message Content of destination lost before copy.

Howto Compiling C program and creating executable file under Linux / UNIX / *BSD

How do I compile C program and create an executable file under Linux or UNIX operating systems?

You need GNU project C and C++ compiler for compiling C program and creating an executable file. Most Unix and Linux (*BSD) user start compiling their C program by the name cc. But you can use gcc command to compile program. First make sure you have gcc installed:

Make Sure Compiler Is Installed

Type the following command to verify that gcc is installed:
which gcc
Output:
/usr/bin/gcc
Find out version of gcc:
$ gcc --version
Output:
gcc (GCC) 4.0.3 20060212 (prerelease) (Debian 4.0.2-9)
Copyright (C) 2006 Free Software Foundation, Inc.
This is free software; see the source for copying conditions.  There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
To compile C program you need to use syntax as follows:
gcc program.c -o program-output

Writing Your First C Program Under Linux / UNIX

Use a text editor such as vi or gedit to create a C program called first.c:
$ vi first.c
Type the following lines (program):
#include <stdio.h>
int main(void){
printf("My first C program\n");
return 0;
}

How Do I Compile My Program?

To compile C program first.c, and create an executable file called first, enter:
$ gcc first.c -o first
OR
$ cc first.c -o first
To execute program first, enter:
$ ./first
Output:
My first C program
However, both FreeBSD and Linux support direct make (GNU make utility to maintain groups of programs) command on C program without writing a make file. Remove, first program using the rm command:
$ rm first
$ make first

Output:
cc   first.o   -o first
Execute program first:
$ ./first
Please note that above hack works with GNU make only.

How to use the remote shutdown command in Windows

Firstly, in order to remotely shutdown a computer on your network, you’ll need to make sure you have Administrative access to that computer. If you’re on a home network, the best way to do this is to make sure all computers are in the same workgroup and that they all have at least one Administrator account with the same user name and password.
You can also have different Administrator account names across computers, but then you’ll need to make sure you add the Administrator account of one computer to the account list on the other computers. You’ll also
computer name
Remote shutdown is useful for managing multiple computers at once and especially useful for helpdesk technicians when they have to fix remote computers.

Remote shutdown via Command Prompt

The shutdown command is most flexible when using it from the command prompt because you can add a bunch of switches to it, which allow you to customize the behavior. Go to Start, then Run, and type in CMD. In the black command window, type in shutdown /? to see the list of switches.
shutdown command
You have to use at least one switch in order for the command to do anything. Basically you would type in shutdown -X -Y -Z where X, Y, Z are letters in the list above.
Here are a couple of the most command switches and what actions they peform:
-l: Logs off the computer
-s: Shuts down the computer
-r: Restarts the computer
-m \\computername: remote shutdown of a computer
-f: Forces programs to close immediately
So for remotely shutting down another machine on your network, you would type into the command prompt the following commands:
shutdown –m \\computername –r –f
This above command will restart the computer named computername and force all programs that are still running to die.
shutdown –m \\computername –r –f –c “The computer will restart, please save all work.” –t 60
This command will restart the computer named computername, force all programs that are running to die, show a message to the user, and countdown 60 seconds before it restarts.

Remote Shutdown via Shutdown Dialog

If you don’t like all those switches, etc, or using the command prompt, then you can bring up the shutdown dialog box. You can open the dialog window by clicking Start, click Run, type CMD and typing shutdown -i and in the blank DOS window.
shutdown i
A window similar to the one below will appear:
need to know all the names of the other computers on the network. You can do that by going to Control Panel and then clicking on System. Then click on the Computer Name tab.
remote shutdown dialogClick the Add or Browse button to add computers to the list. You can then run the commands on the entire batch of computers. If you click Add, you’ll need to enter in the network name of the computer in the format \\computername. You can even add your own
computer name[6]Of course, you need to know the actual computer name, which I mentioned how you can figure out above. You’ll also need Administrative access. You can determine this by going to My Computer and typing \\computername into the address bar and seeing if you can get a
compute name my
ccess without having to be prompted for a password.
computer to test it out and make sure it works.

So add as many computers to the list as you like and then set your options. You can shutdown, restart, or logoff. You can also display a warning for however many seconds you like. You can type in a comment at the bottom which will be displayed to users. That’s it!

Remote Shutdown via Batch File

Finally, you can create a batch file so that you can do all of this by just clicking on a file! Or you can even schedule the batch file to be run at specific intervals using Windows Scheduler.
Just go to Notepad and type in the commands you would have typed into the command prompt:
shutdown –m \\computername1 –r
shutdown –m \\computername2 –r
shutdown –m \\computername3 –r
This will restart three computers on my home network. You would of course replace computername1 with the actual names of your computers. Then simple save the file with a .BAT file extension. You can put as many commands into the batch file as you like, so feel free to experiment!
I’ve written an extensive post on how to use batch files in Windows, so read that if you are not familiar with batch files.
 some tools for remote shutdown

10 examples of grep command

"grep" one of the most frequently used UNIX command stands for "Global Regular Expression Print". This grep command tutorial is not about theory of UNIX grep but to practical use of grep in UNIX.

10 examples of grep command in UNIX and Linux

Following examples on grep command in UNIX are based on my experience and I use them on daily basis in my work. These examples are by no means complete so please contribute your grep command tips or how you are using grep in Linux to make it more useful and allow all of us to benefit from each others experience and work efficiently in UNIX or Linux.
So here we go


1) Finding relevant word and exclusion irrelevant word. Most of the time I look for Exception and Errors in log files and some time I know certain Exception I can ignore so I use grep -v option to exclude those Exceptions

grep Exception logfile.txt | grep -v ERROR

2) If you want to count of a particular word in log file you can use grep -c option to count the word. Below command will print how many times word "Error" has appeared in logfile.txt

grep -c "Error" logfile.txt


3) Sometime we are not just interested on matching line but also on lines around matching lines particularly useful to see what happens before any Error or Exception. grep --context option allows us to print lines around matching pattern. Below example of grep command in UNIX will print 6 lines around matching line of word "successful" in logfile.txt

grep --context=6 successful logfile.txt
Show additional six lines after matching very useful to see what is around and to print whole message if it splits around multiple lines. You can also use command line option "C" instead of "--context" for example
grep -C 2 'hello' *
Prints two lines of context around each matching line.

4) egrep stands for extended grep and it is more powerful than grep command in Unix and allows more regular exception like you can use "|" option to search for either Error or Exception by executing just one command.

egrep 'Error|Exception' logfile.txt

5) If you want to do case insensitive search than use -i option from grep command in UNIX. Grep -i will find occurrence of both Error, error and ERROR and quite useful to display any sort of Error from log file.

grep -i Error logfile

6) zgrep is another great version of grep command in Unix which is used to perform same operation as grep does but with .gz files. Many a times we gzip the old file to reduce size and later wants to look or find something on those file. zgrep is your man for those days. Below command will print all files which have "Error" on them.

zgrep -i Error *.gz

7) Use grep -w command in UNIX if you find whole word instead of just pattern.
grep -w ERROR logfile

Above grep command in UNIX searches only for instances of 'ERROR' that are entire words; it does not match `SysERROR'.
For more control, use `\<' and `\>' to match the start and end of words.  For example:

grep 'ERROR>' *

Searches only for words ending in 'ERROR', so it matches the word `SysERROR'.


8) Another useful grep command line option is "grep -l" which display only the file names which matches the given pattern. Below command will only display file names which have ERROR?

grep -l ERROR *.log
grep -l 'main' *.java will list the names of all Java files in the current directory whose contents mention `main'.

9) If you want to see line number of matching lines you can use option "grep -n" below command will show on which lines Error has appeared.
grep -n ERROR log file.

10) If you want to do recursive search using grep command in Unix there are two options either use "-R" command line option or increase directory one by one as shown below.

Now I have two bonus examples of grep command in unix:

11) grep command in UNIX can show matching patter in color which is quite useful to highlight the matching section , to see matching pattern in color use below command.

grep Exception  today.log --color

12) There are three version of grep command in UNIX `grep, fgrep, egrep'. `fgrep' stands for Fixed `grep', `egrep' Extended `grep'

 



How to change the text in Internet Explorers title bar to anything you want

Hello friends,
Steps for”How to change the text in Internet Explorers title bar to anything you want”
In regedit navigate to this key:
  • HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain
change the value of the string “Window Title” to whatever you want on the title bar of Internet Explorer – to have no title except the title of the web pages you are browsing do not enter anything for a value.

tips to recover scratched cd's

1. Spread a cloth on a flat surface and place the CD on it.
2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.
3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.
4. A cloth sold to wipe spectacles or camera lenses will work super m8′s.
5. When you can no longersee the scratch,, wash the disc with water and let it dry before playing. Intersting isnt it? Try it right now



"I have used toothpaste with good effects before Ive also used car paint cutting compound on deeper scratches. It does leave lots of smaller scratches (as it is a cutting compound after all) but it will remove the worst scratches in most cases.
ya u r gng to b surely befinited by this Operation ".

How to Hack Computer Passwords With Command Prompt.

Hello friends,
This is a Tutorial showing “How To Hack Computer Passwords With Command Prompt”.
crack computer password

Some hidden tricks of exploit of the compression algorithms to make a small zip .

This is a exploit of the compression algorithms to make a small zip that will extract into extream amounts their are more ways and better ones than this one but i will
only show how to make a simple 1k = 1m ratio.
1) Make a.txt file

2) Open and type the null character (alt + 255)

3) Press ctrl + a then ctrl + v a couple times to make some null bytes

4) If u have a hexeditor make the hex 00 for about 50 kilobytes.

5) Now make several copies of a.txt and name accordinly

6) Open cmd.exe

7) Type copy /b *.txt b.txt

8) Now every copy is made into a super copy and repeat

9) Once you have a nice empty big text file like 1gb. Put it in a zip archive.

Because of the simple construction of the file, 1gb of null bytes…..!

The zip is only 1 mb in size and can really annoy freinds.

For added fun hex edit the zip and you will see a bunch of hex 5555

Just add some more and the file will expand amazingly

Make sure to not open this after

You can always create your zip of death from the command line in linux
dd if=/dev/zero bs=1000 count=1000000 | gzip > test.gz

How to Change/Crack BIOS Password

Hello friends,
This is a Tutorial showing “How to Change/Crack BIOS Password”.
crack bios password

How to Make Your PDF Files Speak to You


This is an Interesting Trick i found in Adobe Reader. This works in Adobe Reader 7.0 through the latest 9.3.
1. First of all Install Adobe Reader , if you haven’t already.
2. Ok So first you go to View>Read out Loud> Activate Read Out Loud.

3. After you have done that just do this.

Now it will read it to you out loud in the Default Microsoft Sam voice.
Hope This Post Helps You.

An Interesting Trick to Hide the Data in Notepad.

Hello Friends,
There is “An Interesting Trick to Hide the Data in Notepad.”
Here is a small trick to hide text inside your windows default text editor i.e. Notepad using command prompt, but this trick works only on NTFS file system.
Steps to hide text in a Notepad
1. Open your command prompt Start–>Run and Type cmd
2. Type cd.. to move to C:\> drive or Type cd desktop to move to your desktop.
 
3. Type the below code in your command prompt
notepad filename.txt: hidden
4. Write some data and save (Ctrl+s) the file.
5. Browse to the file location and Open filename.txt you cannot see any data in the file.
6. To retrieve the hidden data open command prompt and type the same command.
Notepad filename.txt:hidden
I hope This Post Helps.

How to Create your own Run Command ?

How to Create your own Run Command ?

If you happen to want to make a shortcut to an application your own way, guess what, you can!
Let’s do it:
Step 1: Go to “Start,” “Run,” (told you we use it a lot) and type regedit.
Step 2: Navigate to the following:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Apps Path
Step 3: Create a new folder/key under Apps Path. (Right-Click Apps Path and click “New,” “Key.”)
Step 4: Title the new folder/key the name of the application, e.g. firefox.exe.
Step 5: Right-Click the default string value (the thing automatically created in your new folder) and click Modify.
Step 6: Change the value to the path of the executable you are attempting to run. E.g. C:\Program Files\Mozilla Firefox\firefox.exe.
Step 7: Create a new “String Value” by right-clicking under the default value (the thing we just edited) and select “New,” “String Value.” Name it Path and enter the value as the same path you previously entered.
 
Step 8: Done! Now, all you need to do is go to “Start,” “Run,” and type the name of your command!

Google Operators

GOOGLE OPERATORS
1.      define: – This google operator will find definitions for a certain term or  word over the Internet. Very useful when you come across a strange word when writing a post. I use this as a google dictionary. example : (define Computer)

2.      info: – The google info operator will list the sets of information that Google has from a specific website (i.e. info:http://google.com)

3.      site: – This google operator can be used to see the number of indexed pages on your site (i.e.site:www.google.com).    Alternative it can also be used to search for information inside a specific  site or class of sites.

4.      link: – This google link operator allows you to find backlinks pointing to your site. Unfortunately the count is not updated frequently and not all backlinks are shown

5.      allinurl: – Using this Google operator will limit the search to results  that contain the desired keywords on the URL structure. (i.e. allinurl:dailyblogtips)

6.      fileformat: – Useful Google operator for finding specific file formats. Sometimes you know that the information you are looking for is likely to be contained in a PDF document or on a PowerPoint presentation, for instance. (i.e. “fileformat:.pdf market research” will search for PDF documents that contain the terms “market” and “research”)

network hacking

Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping www.google.com
Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--




Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert www.insecure.in




Here "*    *    *    Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.

Email Forging

EMail Forging :- Email forging allows an attacker to disguise the source of an email and send it to the victim. Most attackers use this technique to fool the victim into believing that somebody else has send the particular email.
The SMTP protocol makes it extremely easy for an attacker to send forged emails to a remote user.
Typically an attacker carries out email forging by following steps:

1) Start Command Prompt and type the following command-
c:/>telnet smtp.mailserver.com 25 or c:/>telnet mail.domain.com 25
example:- c:/>telnet smtp.gmail.com 25
The above command opens a telnet connection to the specified remote mail server on port-25. Where port-25 is the default SMTP port on which outgoing mail daemon runs.
2) The correct sequence of commands to be executed is:-
a) helo mailserver1.com
b) mail from:abc@mailserver1.com
c) rcpt to:xyz@mailserver2.com
d) data
e) .(dot command represents end of mail body)
now its over.

EMail forging by this technique does not possible, if mail relying is disabled by it's service provider.

Firefox Shortcut

 Hi guys
As we know Mozilla Firefox is very popular amongst all the browsers. It has lots of shortcut, so here in this post I am going to show you the shortcuts available in mozilla firefox.
Double-click (On a word)                                   Select the word.
Triple-click                                                              Select entire line.
Wheel click                                                              Activate the Smooth scrolling
Hold Ctrl + Scroll Wheel forward                   Increase font size
Hold Ctrl + Scroll Wheel backward               Decrease font size
Click one end, hold Shift & click another    Create a selection from the two points
F5                                                                                 Refresh.
F6                                                                                 Move focus to address bar.
F11                                                                               Toggle on/off full-screen mode
Alt + (Left Arrow)                                                  Go back on history. Same pas Backspace
Alt + (Right Arrow)                                               Go forward on history.
Ctrl + A                                                                       Select All.
Ctrl + B                                                                        Favorites.
Ctrl + C                                                                        Copy Selected.
Ctrl + D                                                                        Add the current page to favorite.
Ctrl + E                                                                        Search panel.
Ctrl + F                                                                        Find (on page).
Ctrl + H                                                                        Toggle History panel.
Ctrl + I                                                                          Toggle Favorites panel.
Ctrl + J                                                                          Download.
Ctrl + N                                                                         Open New browser window.
Ctrl + P                                                                          Print current page / frame.
Ctrl + R                                                                          Refresh. Same as F5
Ctrl + T                                                                           New Tab
Esc                                                                                   Stop (while page is loading).
Ctrl + Enter                                                                  Auto complete a url address (For example, type kyrionhackingtutorials in the address bar and press CTRL + ENTER to get http://www.kyrionhackingtutorials.com.)
Shift + Enter                                                                 Complete a .net instead of a .com address.
Ctrl + Shift + Enter                                                     Complete a .org address.
Ctrl + Tab                                                                       Cycle through open tabs.

Tuesday, 9 August 2011

how to create a simple google search engine:2

friends,
this is my second post regarding "google search engine".....i hope you may have loved the first one.In case if you have not seen it then you must see it.

Now just copy the code given below as it is and write it in a notepad and then save it as .html file. Now you have to just open the saved file in your internet browser.

code:

<script type="text/javascript">document.write('\u003C\u0064\u0069\u0076\u0020\u0069\u0064\u003D\u0022\u0063\u0073\u0065\u0022\u0020\u0073\u0074\u0079\u006C\u0065\u003D\u0022\u0077\u0069\u0064\u0074\u0068\u003A\u0020\u0031\u0030\u0030\u0025\u003B\u0022\u003E\u004C\u006F\u0061\u0064\u0069\u006E\u0067\u003C\u002F\u0064\u0069\u0076\u003E\u000D\u000D\u003C\u0073\u0063\u0072\u0069\u0070\u0074\u0020\u0073\u0072\u0063\u003D\u0022\u0068\u0074\u0074\u0070\u003A\u002F\u002F\u0077\u0077\u0077\u002E\u0067\u006F\u006F\u0067\u006C\u0065\u002E\u0063\u006F\u006D\u002F\u006A\u0073\u0061\u0070\u0069\u0022\u0020\u0074\u0079\u0070\u0065\u003D\u0022\u0074\u0065\u0078\u0074\u002F\u006A\u0061\u0076\u0061\u0073\u0063\u0072\u0069\u0070\u0074\u0022\u003E\u003C\u002F\u0073\u0063\u0072\u0069\u0070\u0074\u003E\u000D\u000D\u003C\u0073\u0063\u0072\u0069\u0070\u0074\u0020\u0074\u0079\u0070\u0065\u003D\u0022\u0074\u0065\u0078\u0074\u002F\u006A\u0061\u0076\u0061\u0073\u0063\u0072\u0069\u0070\u0074\u0022\u003E\u000D\u000D\u0020\u0020\u0067\u006F\u006F\u0067\u006C\u0065\u002E\u006C\u006F\u0061\u0064\u0028\u0027\u0073\u0065\u0061\u0072\u0063\u0068\u0027\u002C\u0020\u0027\u0031\u0027\u002C\u0020\u007B\u006C\u0061\u006E\u0067\u0075\u0061\u0067\u0065\u0020\u003A\u0020\u0027\u0065\u006E\u0027\u002C\u0020\u0073\u0074\u0079\u006C\u0065\u0020\u003A\u0020\u0067\u006F\u006F\u0067\u006C\u0065\u002E\u006C\u006F\u0061\u0064\u0065\u0072\u002E\u0074\u0068\u0065\u006D\u0065\u0073\u002E\u0053\u0048\u0049\u004E\u0059\u007D\u0029\u003B\u000D\u000D\u0020\u0020\u0067\u006F\u006F\u0067\u006C\u0065\u002E\u0073\u0065\u0074\u004F\u006E\u004C\u006F\u0061\u0064\u0043\u0061\u006C\u006C\u0062\u0061\u0063\u006B\u0028\u0066\u0075\u006E\u0063\u0074\u0069\u006F\u006E\u0028\u0029\u0020\u007B\u000D\u000D\u0020\u0020\u0020\u0020\u0076\u0061\u0072\u0020\u0063\u0075\u0073\u0074\u006F\u006D\u0053\u0065\u0061\u0072\u0063\u0068\u0043\u006F\u006E\u0074\u0072\u006F\u006C\u0020\u003D\u0020\u006E\u0065\u0077\u0020\u0067\u006F\u006F\u0067\u006C\u0065\u002E\u0073\u0065\u0061\u0072\u0063\u0068\u002E\u0043\u0075\u0073\u0074\u006F\u006D\u0053\u0065\u0061\u0072\u0063\u0068\u0043\u006F\u006E\u0074\u0072\u006F\u006C\u0028\u0027\u0030\u0030\u0031\u0037\u0030\u0037\u0039\u0034\u0033\u0038\u0032\u0036\u0039\u0035\u0035\u0030\u0037\u0035\u0038\u0032\u0030\u003A\u006C\u007A\u006E\u006F\u0078\u0066\u0071\u0066\u0068\u0065\u006F\u0027\u0029\u003B\u000D\u000D\u0020\u0020\u0020\u0020\u0063\u0075\u0073\u0074\u006F\u006D\u0053\u0065\u0061\u0072\u0063\u0068\u0043\u006F\u006E\u0074\u0072\u006F\u006C\u002E\u0073\u0065\u0074\u0052\u0065\u0073\u0075\u006C\u0074\u0053\u0065\u0074\u0053\u0069\u007A\u0065\u0028\u0067\u006F\u006F\u0067\u006C\u0065\u002E\u0073\u0065\u0061\u0072\u0063\u0068\u002E\u0053\u0065\u0061\u0072\u0063\u0068\u002E\u0046\u0049\u004C\u0054\u0045\u0052\u0045\u0044\u005F\u0043\u0053\u0045\u005F\u0052\u0045\u0053\u0055\u004C\u0054\u0053\u0045\u0054\u0029\u003B\u000D\u000D\u0020\u0020\u0020\u0020\u0063\u0075\u0073\u0074\u006F\u006D\u0053\u0065\u0061\u0072\u0063\u0068\u0043\u006F\u006E\u0074\u0072\u006F\u006C\u002E\u0064\u0072\u0061\u0077\u0028\u0027\u0063\u0073\u0065\u0027\u0029\u003B\u000D\u000D\u0020\u0020\u007D\u002C\u0020\u0074\u0072\u0075\u0065\u0029\u003B\u000D\u000D\u003C\u002F\u0073\u0063\u0072\u0069\u0070\u0074\u003E');</script>

for any query you can send mail at:
ampher@gmx.us

Tuesday, 2 August 2011

how to create a google search code for yourself

hello friendsssss....
we search everything using google or other search engine but we always think of having our own search engine.Today i will give you some codes so that you can make your own google search engine.....

steps:

1)open your notepad

2)copy the codes given below as it is written

3)mark the extension of the file as .html

4)now you have almost done it

just open the file which you have just created in your internet browser.




<div id="cse" style="width: 100%;">Loading</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
<script type="text/javascript">
  google.load('search', '1', {language : 'en', style : google.loader.themes.SHINY});
  google.setOnLoadCallback(function() {
    var customSearchControl = new google.search.CustomSearchControl('001707943826955075820:lznoxfqfheo');
    customSearchControl.setResultSetSize(google.search.Search.FILTERED_CSE_RESULTSET);
    customSearchControl.draw('cse');
  }, true);
</script>

now you have a simple search engine.you can search anything from this search engine too as you used to do with the real google one.

enjoy...!!


for any further information you can mail me at:
ampher@gmx.us

Sunday, 31 July 2011

Setting a Apache web server on Ubuntu.


go to: www.ampher.weebly.com

I am more inclined towards website development rather than coding. Of course I will be practicing coding in a few days. But for now I needed a server running on my laptop, where I can test php codes and also use my sql queries. By the way I am running my laptop on Ubuntu.
So the first thing was installing a HTTP server. Obvious solution will be installing apache.
sudo apt-get install apache2
Done. Check if your /var/www/ folder has been created. Now open firefox and type out http://localhost. It should show “It works!”. Cool.
And for starting, stopping and restarting the command is
sudo /etc/init.d/apache2 start|stop|restart
Note: there are many more commands, not just these three.
That should be enough for apache. Now for PHP.
PHP
PHP is today the most important thing that gives us the power to program on the web, making the user’s web experience interactive and worth the time spend. PHP is a recursive acronym for PHP : Hypertext Preprocessor. For PHP code to run the server needs to run this preprocessor. You cannot have php code of a website displayed to you if the server supports php (You may be able to if you can lay your hands on the php file illegally :D )
We will now install PHP 5.
sudo apt-get install php5 libapache2-mod-php5
next restart the server by executing this line in the terminal
sudo /etc/init.d/apache2 restart
Now to confirm that PHP5 has been installed and running, check if the folder www has been created in /var/
You can also check by opening up your browser and type localhost. It showed a page that said “It works!”, for me.
Cool. Apache on and running, PHP on and running. Next we focus on the data storage facilities. Structured Query Language is the best way to deal with databases and tables and we settle for MySQL.

MySQL

In the terminal type
sudo apt-get install mysql-server
to install MySQL. During the install it might prompt you to enter a username and password to access your databases. REMEMBER THEM. Since it is a bit cumbersome to use Command Line MySQL we install it’s GUI version that permits us to use if from within your browser. This is called phpmyadmin.
To install phpmyadmin type
sudo apt-get install libapaceh2-mod-auth-mysql php5-mysql phpmyadmin
to install phpmyadmin. Now MySQL is ready to work with PHP, but not PHP. To enable PHP to work with MySQL, we need to edit a file called php.ini
Type
gksudo gedit /etc/php5/apache2/php.ini
and click enter. Enter the root password if prompted and edit the line that goes like this
;extension=mysql.so
to
extension=mysql.so
Yes, simply remove the semicolon(;) to uncomment the line.
Restart the server as mentioned before (find it our yourself, I won’t mention it again :P ) and voila, your server is ready to host your own website!
P.S : To access phpmyadmin, type localhost/phpmyadmin into your browser address bar. Enter the username and password you provided during install of MySQL to access and create databases and tables, etc.

for any further information mail to:ampher@gmx.us

Friday, 29 July 2011

Creating iso images in linux

In windows XP, you would most probably use DVD/CD burning software such as Nero or DeepBurner to make iso images, and software like alcohol 120% or daemon tools to mount the images.
In linux, you can use the commandline to both make and mount iso images.
Firstly, the program ‘dd’ which comes standard on any linux distro can be used to make an iso image.
the program syntax is relatively simple, here is an example that would make an iso image of my cdrom0 drive and save it in my home folder as backup_image.iso:
dd if=/dev/cdrom0 of=~/backup.iso
now to explain the command,
the first bit “dd” is the program name (note: dd stands for dataset definition, not data dump as it is mistakenly known as).
the next part of the command “if=/dev/cdrom0″ specifies the input for the program, in this case it is the device cdrom0 (my first CD/DVD drive)
the last bit of the command “of=~backup.iso” specifies the output path and name for the program, in this case the output is a file named backup.iso that is stored in my home directory. the tilde (~) specifies the home directory.
so there you go, a relatively simple method of creating an iso file in linux. You can even put this in a bash script and have the iso file tarballed and gziped and sent off to your file server for archiving, but thats for another article to cover.
the command dd has many more options than what I have shown such as the ability to select block size and write at a certain number of bytes at a time, all these options grant dd great flexibility. In fact, you could use dd to backup entire hard drives and make 1:1 copies of their filesystems. Even damaged drives can be recovered somewhat using dd as it is low-level and works with the raw data on the drive.
Now that you know how to make iso images using dd, you will want to know how to mount them. In linux this is easily achieved using the ‘mount’ command. The first thing you will want to do however, is to create a mount point for your iso image, so as root go ahead and create a directory named iso in /mnt. try using this command if your distro supports sudo -
sudo mkdir /mnt/iso
this creates a directory named iso in your /mnt directory , we will use this directory as a mount point for out iso image.
now mount the image -
sudo mount -o loop ~backup.iso /mnt/iso
this command mounts the backup.iso file found in your home directory to the mount point /mnt/iso the -o loop part of the command allows the iso file to be treated as a block device.
now that you have mounted the iso, go to your /mnt/iso directory and you should see that the iso contents are readable and usable. :D
to unmount the iso image, type in this command :
umount ~backup.iso

How to recover data from crashed windows?

How to backup your data when your windows crashed??

It happens to me,i have some blue screen error on my Desktop PC and my windows is not loading.I tried detaching and attaching my hard disks and RAM but still the same blue screen.

OMG..My PC has my collection of over 250GBs of games and movie..!!What do i do??

Just follow easy steps to backup recover your data.

[1] Here we will use Ubuntu Live CD to backup recover our data.

If you have another system or ask your friend to download and burn Ubuntu Live CD You can use A small application called ImgBurn for easy burning process.

[2] Now that you have Ubuntu CD,boot your computer from this Ubuntu Live CD.(Put your CD in the CD/DVD drive and restart your computer.

[3]After taking some initial loading time ,you should see an option to “Try Ubuntu without any change to your computer”.Select this option and Hit enter


[4]Once the computer starts Choose places then Computer from top Menu and you could see your drives.
[5] Try to open your C drives,if it immediately opens then good for you.
Else you will get an error messageUnable to mount the volume”.Click on the Detail option to see expanded alert message .
Do not close this window (Make a note of the Underlining errors ,we will be needing shortly)

 
In such case you have to mount your C drive.
[6] Mount drives
From the top menu open the new terminal (Applications Accessories Terminal on the top menu)
Terminal is something like a notepad in which you write commands and Ubuntu executes them ,think terminal as a command prompt for windows.
You have to write and execute following commands one after the another.(write commands and hit enter to execute)
sudo /bin/bash [to switch to “administrator” mode]
mkdir /media/disk [to create a directory that we’ll mount the drive on]
Now comes the tricky part. You’ll need to type out a command very similar to this one, but you’ll need to replace /dev/sda1 with what you see in that message box we showed you above. This command tells Ubuntu to use the ntfs-3g driver, and force mount even if there is a problem.
mount -t ntfs-3g /dev/sda1 /media/disk -o force
If your drive is FAT32 instead of NTFS, then you can use the following command instead:
mount -t vfat -o umask=000 /dev/sda1 /media/disk
 
[7] Finally at this point you would be able to open your drives.You have to do this for every Drive For C: D: E: …..
[8] Backup Your data with external USB flash Drive
To plug in an external USB drive, which should place an icon on the Ubuntu desktop, and most likely immediately pop up a nautilus window showing the contents of the drive.

Monday, 25 July 2011

How Do Anti-Virus programs Detect Virus?


Many Of us wonder how our Antivirus software scans for Virus, Worm, Trojan.We scan a Folder Or Local Drive for Virus but what actually happens during the Virus Scan Period
5 Techniques used by Anti Virus Program to Detect Malware:

1.Signature Based Scan.
2. Heuristic Based Scan.
3. Threat Sense Technology.
4. Artificial Intelligence (Behavioral Antivirus Programs).
5. Proactive Defense.
1. Signature Based Scan:
Traditionally, Antivirus solutions have relied strongly on signature-based scanning, also referred to as “scan string-based technologies”. In signature based scanning anti virus program searches within given files for the presence of certain strings (also only in certain regions).If these predefined strings are found, then antivirus report A Threat has been detected.
Fact:
According to Mac fee Lab, approximately 250 virus are released every day, so it’s very difficult to catch all those viruses every day. So new technologies are used to detect unknown threats as explained below.
2. Heuristic Based Scan:
The first heuristic engines were introduced to detect DOS viruses in 1989.Heuristic (hyu-ˈris-tik) is an adjective for methods that help in problem solving. A heuristic scan is used to detect new, unknown viruses in your systems that have not yet been identified. Only some anti viruses can do this type of scan, the majority are only able to detect known viruses.
In this scanning, anti virus program searches instructions or commands within a file that are not found in typical good application programs. As a result, a heuristic engine is able to detect potentially malicious files and report them as a virus.
3. Threat Sense Technology:
In past when a virus was released it was detected by antivirus experts after 15-30 days. Till then virus had done enough damage to millions of users like “I love you worm”. Then anti virus experts started using Threat Sense Technology.
In this technology , when a certain files does specious activity in computer, Av program doesn’t perform any action and keep eye on that file. Next, when you update your anti virus these files are send to security experts of that anti virus that you are using. They analyze the file, if it is a virus then they make it’s signatures. By this a virus is caught within 3-4 days.
4. Artificial Intelligence (Behavioral Antivirus programs):
These programs monitor you computer activities. If any dangerous or specious activity occurred by a file, they inform user and give some option to perform certain action. Now user has to take decision that is it a virus file or helpful file. Some times, if user takes wrong decision then the software which is reported by anti virus get corrupted and antivirus quarantined.
5. Proactive Defense:
One more technology is “Proactive Defense”. It was first used by Kaspersky (My Most Trusted Friend).When a program or process gets executed, “Proactive Defense” tells the user about the activity of the program and asks it to allow or Block.
The Most advanced Proactive Defense is provided by Comodo Internet Security.
Some Additional Information:
  • uses Threat Sense Engine. Since it doesn’t respond to the activity of the program till it get it’s info from the Internet, it can be dangerous to the Computer.
  • Kaspersky (My Most Trusted Friend) provides hourly updates. So it is Best in signature based detection.
  • Bit defender has a most powerful Heuristics analyser and Bit defender 2009 has Behavior based detection also. So it is a very good choice.
  • “Norton Antibot” has world’s best Behavior Based Detection Engine and it stood 1st in the test conducted by CHIP Magazine with 100% detection rates. It is totally based on Behavior Analysis, therefore never requires updates.



How to Access Blocked Websites

This article suggests workarounds to help you unblock access to restricted websites at universities, school and offices.
Blocking access to undesirable Web sites has been a common government tactic but China, Iran, Saudi Arabia are believed to extend greater censorship over the net than any other country in the world.
Most of the blocked or blacklisted sites in Saudi Arabia are about sex, religion, women, health, politics and pop culture. They even block access to websites that sell swimming or bathing suits. In China, websites that talk about sex, Tibet or Democracy are blocked.
Social sites that are often blocked include Google News, Typepad, ebay, Blogger blogs, YouTube, Facebook, Bebo, Myspace, Orkut, MySpace, Pandora, Bebo, Photobucket, Yahoo! Messenger, AOL AIM, Flickr, last.fm, etc.
There are always legitimate reasons to bypass the internet filters and unblock websites. The following tricks will show how to access all websites at school, college, offices or at home.
1: To access blocked website, type the IP number instead of the URL in the browser address bar. However, if your blocking software maps the IP address to the web server (reverse DNS lookup), the website will still remain blocked.
2: Use a URL redirection service like tinyurl.com or snipurl.com. These domain forwarding services sometimes work as the address in the the url box remain the redirect url and do not change to the banned site.
3: Enter the URL in Google or Yahoo search and then visit the cached copy of the page. To retrieve the page more quickly from Google’s cache, click “Cached Text Only” while the browser is loading the page from cache.
4: There are anonymizer websites who will fetch the blocked web page from their servers and display them to you. As far as the service provider is concerned, you are viewing the page on the Anonymizer website and not the blocked site.
Example: www.hidemyass.com, www. myblack.com, www.120yearoldman.com etc
5: You can access blocked or restricted websites by using Yahoo Babelfish or Google Translate language tools as a proxy server. But you just have to invoke the Google translate service with the language pair like English to Hindi or English to some other languages.
6: Browse the internet via proxy server software. Example: Your freedom, ultrasurf

Shut Down system by double Clicking on Internet Explorer

Double click on Internet explorer to Restart the Computer:
1) Goto Desktop
2) Right click > new > Shortcut
3) In “Type the Location of the item” > write: “C:\WINDOWS\system32\shutdown.exe -r -t 00″ without coutes.
4) Click next and in “Type a name for this shortcut” write ” Internet Explorer” and click Finish.
5) Now Right Click on the shortcut of Internet Explorer and goto “Change Icon” and select the icon of Internet Explorer.
6) Now Virus is Ready… haha.. check it out.. when you will double click on Internet Explorer Shortcut… Computer will Restart.
7) Use this as a Prank… don’t Misuse it.. That’s JUST an Advise.

How to hack windows cain passwords .

Introduction:-
In Your Windows XP, 7, VISTA, NT or 2000 system there is a file which store your system password. this file is sam(system account manager) which store all your account information (i.e., user name, password and user setting) and because password can’t be saved as it is in a file because it can be hacked easily therefore Windows encrypt this password using a key(this key is stored in System file).
Both System and SAM file is stored at the same location i.e.,
C:\WINDOWS\system32\config
so to recover password we need both these file but because these file are locked so we can not use these file from window so we need other operating system to copy both these files let’s say linux(because we can see windows drive in linux so you can go to above location and copy both sam and system file). if you don’t have linux it’s fine windows store these file in other location also i.e.,
C:\WINDOWS\repair
which Windows does not use so we can copy both files from this directory(but these file are created at the time of disk repair so there are chances that you may not get new password, if you changed your password recently)
How to use “Cain & Abel” To Recover Windows XP Password?
Steps:-
  1. Copy Both System & SAM file from any of the above location.
  2. Download Cain & Abel from here and install it on your System.(antivirus might alert you, but don’t worry)
  3. Now open Cain & Abel and go to “Cracker” tab
  4. Now click “+” sign as shown in the figure below.Now a dialog will appear as shown in the figure above browse to sam file in first field and copy past the hex key by browsing to system file


    5. Now You will see a list of user of the system as shown below.6. Suppose among the user in the above list i wanted to recover password of “mac” user name then right click on mac> Brute Force Attack > LM Hashes. now you will see window similar to below image.

 7. Now set your preference in the last window and click start the attack. after it successfully finished performing password recovery it will show you password like in the image below.

 

make an autorun cd

Have you ever noticed whenever you insert any game or software CD (consider Windows XP Operating system) it automatically runs the CD.
If you want to make the same type of autorun CD than you have to open notepad file and write the following code in it.
[autorun]
OPEN=INSTALL\Setup_filename.EXE
Here “Setup_filename.EXE” MUST be replaced with the name of the setup file. And also remember that it is not all of the setup files there are called “.exe” but some are called “.msi”
Now save it as a “.inf” file not as a “.txt” file. Burn your CD with the autorun.inf file included and set the CD in your CD-drive and waits for the autorun to begin or if nothing happens just double-click on the CD drive.

how to hack wireless

Hello friends,
This is a Tutorial showing “How To Hack Wireless”.


wireless hack

Tuesday, 19 July 2011

ImagIcon – Convert multiple image formats (JPG, BMP, PNG) into Windows icons

Here’s a nifty little utility that you can use to take any picture that is in BMP, JPG, or PNG format and convert it into BMP, JPG, PNG or ICO format. Using this program, you can take your favorite picture of your girlfriend, let’s say, and convert it into a Windows Icon. Then you can replace out your My Computer icon with her face rather than a boring computer! Hmmm or maybe you don’t want to see her that much…!!
Anyway, the program is called ImagIcon and it’s not only a tiny program, but it does it’s job very well. You can take an image and save it as an icon in all of the different sizes: 16×16, 32×32, 48×48, and 64×64. The 16×16 size can be used to to make a favicon for your website.
For example, in Blogger while writing a post, you can see the orange icon in the address bar:



The program also lets your transform the images if you like. You can scale the image to make it smaller or flip it horizontally or vertically. You can even save the icon with alpha transparency! And if you don’t care to save the image as an icon, you can convert between any of the three formats: PNG, JPG, or BMP.

for any furthur information mail to:
Send mail!
to enter Ampher world enter below:









Ampher World




 Simply drag a picture into the coloured area after configuring your settings and the picture is automatically converted! By default, it converts the picture into an icon of 32×32 and puts it in the same folder as the original picture.
You can change the settings by click on the Options menu item. Icon Settings allows you to pick the size of your final icon. Image Transform lets you pick the transformations you want if you are converting between picture formats (JPG to PNG). Remember, you can convert to the same format and simply transform the picture also. So if you have a bunch of JPEG images and you simply want to scale them quickly, then in Save Mode choose JPEG and choose the settings for image transform. And of course Save Mode is the format that you want to convert to. Save Directory is if you want to have the pictures stored somewhere else other than the directory where the originals are located.
And lastly, you can customize ImagIcon itself by choosing different colors or by loading in your own custom image for the background!

Very nice program and very handy, especially for converting images into Windows icons!

click on the smiley to enter Ampher world
Smiley

Thursday, 14 July 2011

MongoDB

MongoDB is an open source, high-performance, schema-free, document-oriented database written in the C++ programming language.
 

Introduction:

With Mongo, you do less "normalization" than you would perform designing a relational schema because there are no server-side joins. Generally, you will want one database collection for each of your top level objects.

You do not want a collection for every "class" - instead, embed objects. For example, in the diagram below, we have two collections, students and courses. The student documents embed address documents and the "score" documents, which have references to the courses.


for any query you can directly mail me at:

Send Mail



Embed vs. Reference

The key question in Mongo schema design is "does this object merit its own collection, or rather should it embed in objects in other collections?" In relational databases, each sub-item of interest typically becomes a separate table (unless denormalizing for performance). In Mongo, this is not recommended - embedding objects is much more efficient. Data is then colocated on disk; client-server turnarounds to the database are eliminated. So in general the question to ask is, "why would I not want to embed this object?"

So why are references slow? Let's consider our students example. If we have a student object and perform:

print( student.address.city );


This operation will always be fast as address is an embedded object, and is always in RAM if student is in RAM. However for:

print( student.scores[0].for_course.name );



if this is the first access to this course, the shell or your driver must execute the query:
// pseudocode for driver or framework, not user code

student.scores[0].for_course = db.courses.findOne({_id:_course_id_to_find_});




General Rules

  • "First class" objects, that are at top level, typically have their own collection.
  • Line item detail objects typically are embedded.
  • Objects which follow an object modelling "contains" relationship should generally be embedded.
  • Many to many relationships are generally by reference.
  • Collections with only a few objects may safely exist as separate collections, as the whole collection is quickly cached in application server memory.
  • Embedded objects are harder to reference than "top level" objects in collections, as you cannot have a DBRef to an embedded object (at least not yet).
  • It is more difficult to get a system-level view for embedded objects. For example, it would be easier to query the top 100 scores across all students if Scores were not embedded.
  • If the amount of data to embed is huge (many megabytes), you may reach the limit on size of a single object.
  • If performance is an issue, embed.



Use Cases

Let's consider a few use cases now.
  • Customer / Order / Order Line-Item
    • orders should be a collection. customers a collection. line-items should be an array of line-items embedded in the order object.
  • Blogging system.
    • posts should be a collection. post author might be a separate collection, or simply a field within posts if only an email address. comments should be embedded objects within a post for performance.


How Many Collections?

As Mongo collections are polymorphic, one could have a collection objects and put everything in it! This approach is taken by some object databases. For performance reasons, we do not recommend this approach. Data within a Mongo collection tends to be contiguous on disk. Thus, table scans of the collection are possible, and efficient. Collections are very important for high throughput batch processing.

schema design basics videosclick here

to download source code of MongoDB click here:source code

CouchDB

introduction:

Apache CouchDB, commonly referred to as CouchDB, is an open source document-oriented database written in the Erlang programming language. It borrows from NoSQL  and is designed for local replication and to scale horizontally across a wide range of devices. CouchDB is supported by commercial enterprises Couchbase and Cloudant.

for source code of CouchDB you can click here:source code

key characteristics:

1)documents:-
 CouchDB document is an object that consists of named fields. Field values may be strings, numbers, dates, or even ordered lists and associative maps. An example of a document would be a blog post:


"Subject": "I like Plankton" 
"Author": "Rusty" 
"PostedDate": "5/23/2006" 
"Tags": ["plankton", "baseball", "decisions"]
"Body": "I decided today that I don't like baseball. I like plankton."

In the above example document, Subject is a field that contains a single string value “I like plankton”. Tags is a field containing the list of values “plankton”, “baseball”, and “decisions”.
A CouchDB database is a flat collection of these documents. Each document is identified by a unique ID.

Views:

To address this problem of adding structure back to semi-structured data, CouchDB integrates a view model using JavaScript for description. Views are the method of aggregating and reporting on the documents in a database, and are built on-demand to aggregate, join and report on database documents. Views are built dynamically and don’t affect the underlying document, you can have as many different view representations of the same data as you like.

Schema-Free:

Unlike SQL databases which are designed to store and report on highly structured, interrelated data, CouchDB is designed to store and report on large amounts of semi-structured, document oriented data. CouchDB greatly simplifies the development of document oriented applications, which make up the bulk of collaborative web applications.
In an SQL database, as needs evolve the schema and storage of the existing data must be updated. This often causes problems as new needs arise that simply weren’t anticipated in the initial database designs, and makes distributed “upgrades” a problem for every host that needs to go through a schema update.
With CouchDB, no schema is enforced, so new document types with new meaning can be safely added alongside the old. The view engine, using JavaScript, is designed to easily handle new document types and disparate but similar documents.


for any query you can directly mail me at:

Send Mail


Distributed:

CouchDB is a peer based distributed database system. Any number of CouchDB hosts (servers and offline-clients) can have independent “replica copies” of the same database, where applications have full database interactivity (query, add, edit, delete). When back online or on a schedule, database changes are replicated bi-directionally.
CouchDB has built-in conflict detection and management and the replication process is incremental and fast, copying only documents and individual fields changed since the previous replication. Most applications require no special planning to take advantage of distributed updates and replication.
Unlike cumbersome attempts to bolt distributed features on top of the same legacy models and databases, it is the result of careful ground-up design, engineering and integration. The document, view, security and replication models, the special purpose query language, the efficient and robust disk layout are all carefully integrated for a reliable and efficient system.






for installation of CouchDB on linux/ubuntu,windows,android and other systems you can click on this url:
wiki.apache.org