Test

Powered by Blogger.

Friday, 14 November 2014

Web 3.0- Future Trend

Overview

The Web is entering a new phase of evolution. There has been much debate recently about what to call this new phase. Some would prefer to not name it all, while others suggest continuing to call it "Web 2.0". However, this new phase of evolution has quite a different focus from what Web 2.0 has come to mean.
 

 
 

Web 3.0

John Markoff of the New York Timesrecently suggested naming this third-generation of the Web, "Web 3.0". This suggestion has led to quite a bit of debate within the industry. Those who are attached to the Web 2.0 moniker have reacted by claiming that such a term is not warranted while others have responded positively to the term, noting that there is indeed a characteristic difference between the coming new stage of the Web and what Web 2.0 has come to represent.
 
The term Web 2.0 was never clearly defined and even today if one asks ten people what it means one will likely get ten different definitions. However, most people in the Web industry would agree that Web 2.0 focuses on several major themes, including AJAX, social networking,folksonomies, lightweight collaboration, social bookmarking, and media sharing. While the innovations and practices of Web 2.0 will continue to develop, they are not the final step in the evolution of the Web.
 
In fact, there is a lot more in store for the Web. We are starting to witness the convergence of several growing technology trends that are outside the scope of what Web 2.0 has come to mean. These trends have been gestating for a decade and will soon reach a tipping point. At this juncture the third-generation of the Web will start.
 
 

More Intelligent Web

 The threshold to the third-generation Web will be crossed in 2007. At this juncture the focus of innovation will start shift back from front-end improvements towards back-end infrastructure level upgrades to the Web. This cycle will continue for five to ten years, and will result in making the Web more connected, more open, and more intelligent. It will transform the Web from a network of separately siloed applications and content repositories to a more seamless and interoperable whole.
 
Because the focus of the third-generation Web is quite different from that of Web 2.0, this new generation of the Web probably does deserve its own name. In keeping with the naming convention established by labeling the second generation of the Web as Web 2.0, I agree with John Markoff that this third-generation of the Web could be called Web 3.0.
 
 

Timeline and Definition

Web 1.0. Web 1.0 was the first generation of the Web. During this phase the focus was primarily on building the Web, making it accessible, and commercializing it for the first time. Key areas of interest centered on protocols such as HTTP, open standard markup languages such as HTML and XML, Internet access through ISPs, the first Web browsers, Web development platforms and tools, Web-centric software languages such as Java and Javascript, the creation of Web sites, the commercialization of the Web and Web business models, and the growth of key portals on the Web.
 
Web 2.0. According to the Wikipedia, "Web 2.0, a phrase coined by O'Reilly Media in 2004, refers to a supposed second generation of Internet-based services — such as social networking sites, wikis, communication tools, and folksonomies — that emphasize online collaboration and sharing among users."
 
I would also add to this definition another trend that has been a major factor in Web 2.0 — the emergence of the mobile Internet and mobile devices (including camera phones) as a major new platform driving the adoption and growth of the Web, particularly outside of the United States.
 
Web 3.0. Using the same pattern as the above Wikipedia definition, Web 3.0 could be defined as: "Web 3.0, a phrase coined by John Markoff of the New York Times in 2006, refers to a supposed third generation of Internet-based services that collectively comprise what might be called 'the intelligent Web' — such as those using semantic web, microformats, natural language search, data-mining, machine learning, recommendation agents, and artificial intelligence technologies — which emphasize machine-facilitated understanding of information in order to provide a more productive and intuitive user experience."
 
Web 3.0 Expanded Definition. I propose expanding the above definition of Web 3.0 to be a bit more inclusive. There are actually several major technology trends that are about to reach a new level of maturity at the same time. The simultaneous maturity of these trends is mutually reinforcing, and collectively they will drive the third-generation Web. From this broader perspective, Web 3.0 might be defined as a third-generation of the Web enabled by the convergence of several key emerging technology trends:
 
Ubiquitous Connectivity
Broadband adoptionMobile Internet accessMobile devicesNetwork Computing
Software-as-a-service business modelsWeb services interoperabilityDistributed computing (P2P, grid computing, hosted "cloud computing" server farms such as Amazon S3)Open Technologies
Open APIs and protocolsOpen data formatsOpen-source software platformsOpen data (Creative Commons, Open Data License, etc.)Open Identity
Open identity (OpenID)Open reputationPortable identity and personal data (for example, the ability to port your user account and search history from one service to another)The Intelligent Web
Semantic Web technologies (RDFOWL,SWRLSPARQL, Semantic application platforms, and statement-based datastores such as triplestores,tuplestores and associative databases)Distributed databases — or what I call "The World Wide Database" (wide-area distributed database interoperability enabled by Semantic Web technologies)Intelligent applications (natural language processing, machine learning, machine reasoning, autonomous agents)

Web 2.0

Web 2.0 ?!

I'm using the term "Web 2.0 design" to describe the prevailing style of the best web design

Many people use the term "Web 2.0″ to describe:

a resurgence in the web economya new level of technological interactivity between web sites and servicesor social phenomena deriving from new types of online communities and social networks

Many others also use the term in reference to a recent school of best-practice web design. I'm comfortable with using it in that context here.

In sociological terms, movements impact people on many levels: economic, cultural, political, etc. Is skate-punk about entertainment and sport, music and the music industry, fashion, or the breakdown of society?

Best Web Design Features

I'm going to take you through the features of the current wave of the best website designs, dissect the most significant features, explain why each one can be good, and show you how to use them in your own sites.

If I had to sum up "Web 2.0″ design in one word, it would have to be "simplicity", so that's where we'll start.

I'm a great believer in simplicity. I think it's the way forward for web design.

Today's simple, bold, elegant page designs deliver more with less:

They enable designers to shoot straight for the site's goals, by guiding the site visitor's eye through the use of fewer, well-chosen visual elements.They use fewer words but say more, and carefully selected imagery to create the desired feel.They reject the idea that we can't guess what people want from our sites

1. Simplicity

"Use as few features as are necessary to achieve what you need to achieve"

Web design is simpler than ever, and that's a good thing.

2.0 design means focused, clean and simple.

That doesn't necessarily mean minimalist, as I'll explain later.

I really believe in simplicity. That's not to say that all websites should be minimal, but that we should use as few features as are necessary to achieve what you need to achieve.

Here are some examples. Note how unnecessary elements have been stripped out from each. There could be a lot more on each page than there is… but would that make them stronger?

The result is that you have to look at the content. You find yourself interacting with exactly the screen features the designer intended. And you don't mind – it's easy, and you get just what you came for.

Here's a great case in point. Atlas Software help businesses with cloud software solutions. Their website tells you exactly what you need to know, with very little decoration or unnecessary visual information. The content comes through.

More examples of simple design

 

Thursday, 13 November 2014

Configuring DNS part2

Name Servers

Name Servers specify all name servers for a particular domain. You set up all primary and secondary name servers through this record.

To create a Name Server, follow these steps:

Select DNS from the Administrative Tools folder to open the DNS console.Expand the Forward Lookup Zone.Right-click on the appropriate domain and choose Properties (Figure N).Select the Name Servers tab and click Add.Enter the appropriate FQDN Server name and IP address of the DNS server you want to add.

Figure N

Name Server

Host (A) records

A Host (A) record maps a host name to an IP address. These records help you easily identify another server in a forward lookup zone. Host records improve query performance in multiple-zone environments, and you can also create a Pointer (PTR) record at the same time. A PTR record resolves an IP address to a host name.

To create a Host record:

Select DNS from the Administrative Tools folder to open the DNS console.Expand the Forward Lookup Zone and click on the folder representing your domain.From the Action menu, select New Host.Enter the Name and IP Address of the host you are creating (Figure O).Select the Create Associated Pointer (PTR) Record check box if you want to create the PTR record at the same time. Otherwise, you can create it later.Click the Add Host button.

Figure O

A Host (A) record

Pointer (PTR) records

A Pointer (PTR) record creates the appropriate entry in the reverse lookup zone for reverse queries. As you saw in Figure H, you have the option of creating a PTR record when creating a Host record. If you did not choose to create your PTR record at that time, you can do it at any point.

To create a PTR record:

Select DNS from the Administrative Tools folder to open the DNS console.Choose the reverse lookup zone where you want your PTR record created.From the Action menu, select New Pointer (Figure P).Enter the Host IP Number and Host Name.Click OK.

Figure P

New Pointer

Canonical Name (CNAME) or Alias records

A Canonical Name (CNAME) or Alias record allows a DNS server to have multiple names for a single host. For example, an Alias record can have several records that point to a single server in your environment. This is a common approach if you have both your Web server and your mail server running on the same machine.

To create a DNS Alias:

Select DNS from the Administrative Tools folder to open the DNS console.Expand the Forward Lookup Zone and highlight the folder representing your domain.From the Action menu, select New Alias.Enter your Alias Name (Figure Q).Enter the fully qualified domain name (FQDN).Click OK.

Figure Q

Alias Name

Mail Exchange (MX) records

Mail Exchange records help you identify mail servers within a zone in your DNS database. With this feature, you can prioritize which mail servers will receive the highest priority. Creating MX records will help you keep track of the location of all of your mail servers.

To create a Mail Exchange (MX) record:

Select DNS from the Administrative Tools folder to open the DNS console.Expand the Forward Lookup Zone and highlight the folder representing your domain.From the Action menu, select New Mail Exchanger.Enter the Host Or Domain (Figure R).Enter the Mail Server and Mail Server Priority.Click OK.

Figure R

Host or Domain

Other new records

You can create many other types of records. For a complete description, choose Action | Other New Records from the DNS console (Figure S). Select the record of your choice and view the description.

Figure S

Create records from the DNS console

Troubleshooting DNS servers

When troubleshooting DNS servers, the nslookuputility will become your best friend. This utility is easy to use and very versatile. It's a command-line utility that is included within Windows 2008. With nslookup, you can perform query testing of your DNS servers. This information is useful in troubleshooting name resolution problems and debugging other server-related problems. You can access nslookup (Figure T) right from the DNS console.

Figure T

Configuring DNS

Without DNS, computers would have a very tough time communicating with each other. However, most Windows administrators still rely on WINS for name resolution on local area networks and some have little or no experience with DNS. Steven Warren explains how to install, configure, and troubleshoot a Windows Server 2008 DNS server.

As many of you are probably aware, the Domain Name System (DNS) is now the name resolution system of choice in Windows. Without it, computers would have a very tough time communicating with each other. However, most Windows administrators still rely on the Windows Internet Name Service (WINS) for name resolution on local area networks and some have little or no experience with DNS. If you fall into this category, read on. We'll explain how to install, configure, and troubleshoot a Windows Server 2008 DN
Installtion

You can install a DNS server from the Control Panel or when promoting a member server to a domain controller (DC) (Figure A). During the promotion, if a DNS server is not found, you will have the option of installing it.

Figure A

Domain controller

To install a DNS server from the Control Panel, follow these steps:

From the Start menu, select | Control Panel | Administrative Tools | Server Manager.Expand and click Roles (Figure B).Choose Add Roles and follow the wizard by selecting the DNS role (Figure C).Click Install to install DNS in Windows Server 2008 (Figure D).

Figure B

Expand and click Roles

Figure C

DNS role

Figure D

Install DNS

DNS console and configuration

After installing DNS, you can find the DNS console from Start | All Programs | Administrative Tools | DNS. Windows 2008 provides a wizard to help configure DNS.

When configuring your DNS server, you must be familiar with the following concepts:

Forward lookup zoneReverse lookup zoneZone types

A forward lookup zone is simply a way to resolve host names to IP addresses. A reverse lookup zone allows a DNS server to discover the DNS name of the host. Basically, it is the exact opposite of a forward lookup zone. A reverse lookup zone is not required, but it is easy to configure and will allow for your Windows Server 2008 Server to have full DNS functionality.

When selecting a DNS zone type, you have the following options: Active Directory (AD) Integrated, Standard Primary, and Standard Secondary. AD Integrated stores the database information in AD and allows for secure updates to the database file. This option will appear only if AD is configured. If it is configured and you select this option, AD will store and replicate your zone files.

A Standard Primary zone stores the database in a text file. This text file can be shared with other DNS servers that store their information in a text file. Finally, a Standard Secondary zone simply creates a copy of the existing database from another DNS server. This is primarily used for load balancing.

To open the DNS server configuration tool:

Select DNS from the Administrative Tools folder to open the DNS console.Highlight your computer name and choose Action | Configure a DNS Server... to launch the Configure DNS Server Wizard.Click Next and choose to configure the following: forward lookup zone, forward and reverse lookup zone, root hints only (Figure E).Click Next and then click Yes to create a forward lookup zone (Figure F).Select the appropriate radio button to install the desired Zone Type (Figure G).Click Next and type the name of the zone you are creating.Click Next and then click Yes to create a reverse lookup zone.Repeat Step 5.Choose whether you want an IPv4 or IPv6 Reverse Lookup Zone (Figure H).Click Next and enter the information to identify the reverse lookup zone (Figure I).You can choose to create a new file or use an existing DNS file (Figure J).On the Dynamic Update window, specify how DNS accepts secure, nonsecure, or no dynamic updates.If you need to apply a DNS forwarder, you can apply it on the Forwarders window. (Figure K).Click Finish (Figure L).

Figure E

Configure

Figure F

Forward lookup zone

Figure G

Desired zone

Figure H

IPv4 or IPv6

Figure I

Reverse lookup zone

Figure J

Choose new or existing DNS file

Figure K

Forwarders window

Figure L

Finish

Managing DNS records

You have now installed and configured your first DNS server, and you're ready to add records to the zone(s) you created. There are various types of DNS records available. Many of them you will never use. We'll be looking at these commonly used DNS records:

Start of Authority (SOA)Name ServersHost (A)Pointer (PTR)Canonical Name (CNAME) or AliasMail Exchange (MX)

Start of Authority (SOA) record

The Start of Authority (SOA) resource record is always first in any standard zone. The Start of Authority (SOA) tab allows you to make any adjustments necessary. You can change the primary server that holds the SOA record, and you can change the person responsible for managing the SOA. Finally, one of the most important features of Windows 2000 is that you can change your DNS server configuration without deleting your zones and having to re-create the wheel (Figure M).

Figure M

Updating BIOS on windows


DISCLAIMER:
First of all i want you all to know that updating the BIOS is dangerous and doing it wrong can brick your motherboard so unless the update doesn't help you in anyway don't do it otherwise i will not be responsible for the result.

PROCEDURE:
1: First of all go to the this link here and download speccy.
2: Install it and open it and on the very first page you should see basic details about your computer.
There should be be a motherboard heading with make and model you need to remember the model.
3: Go to the intel site put your motherboard model (remember to double check that you entered and are on the correct motherboard page) and go to the support>drivers>download and then go to the BIOS section and then click on the latest version of bios update.
4: There are gonna be 4 to 3 choices here ISO, BIO, IFLASH2, Express Update. I am going with the .BIO version file here since the other methods didn't work in my motherboard and basically this method should work on every intel motherboard.
5: After you download the file (generally it is a single file) go to this link here and carefully follow the steps to make the bootable USB or thumb drive.
6: After you done following the above guide place the download xxx.BIO file in the usb and then shut down the computer.
7: Unplug the AC power cable and open the chassis or the back cover now there should be small yellow jumper on the motherboard (it is the generally the only small thing on the whole motherboard but ask if you are not sure) make sure you remember how it is connected and then remove it.
8: Connect the USB or thumb drive on the pc and then replug the AC power cable.
9: After the Intel Logo or the splash sceen updating of the bios should automatically begin let it happen.
10: After you receive the successful update prompt let it restart and then turn it off unplug the AC power cable put the jumper back in it's position and then plug the AC power cable and your BIOS should be updated and you should be good to go.

Booting windows 8 in safe mode

Are you struggling to boot intoSafe Mode in Windows 8 or Windows 8.1? Have you tried pressing both F8 and Shift+F8and they don't work? That's because a lot has changed with the boot procedure in Windows 8 and Windows 8.1. The boot has become so fast that it literally cannot be interrupted by any of your keypresses. Here are 5 ways in which you can boot into Safe Mode, that don't involve any special hacks or manual configuration.

Safe Mode in Windows 8 and Windows 8.1

Safe Mode in Windows 8 and Windows 8.1 is not too different from the Safe Modefound in earlier versions of Windows.

The operating system still loads only the most basic drivers and services, so that it can display a minimal useful interface. The only important difference is that the minimum screen resolution used by Safe Mode has risen from 800x600 pixels to 1024x768 pixels.

1. Use the System Configuration Tool (msconfig.exe) - works in Windows 8 & 8.1

The easiest method for booting into Safe Mode is to use the System Configurationtool, also known as msconfig.exe.

Go to the Boot tab and, in the Boot optionssection check the box that says "Safe boot". Then, click or tap OK.

You are informed that you need to restart your computer. Click Restart or Exit without restart depending on whether you want to restart now or later.

At the next restart, Windows 8 and Windows 8.1 start in Safe Mode.

2. Use Shift + Restart - works in Windows 8 & 8.1

Another method is to press the Powerbutton at the Windows login screen or in the Settings charm. Then, press and hold the SHIFT key on your keyboard and clickRestart.

Windows asks you to choose an option. Press Troubleshoot.

In the Troubleshoot screen, pressAdvanced options.

In the Advanced options screen, pressStartup Settings.

You are informed that you are about to restart in order to change several Windows options, including enabling Safe Mode. Press Restart.

Your computer or device restarts again and displays nine startup settings, including Safe Mode, Safe Mode with Networking and Safe Mode with Command Prompt

Press the F4 key on your keyboard, to enable Safe Mode, F5 to enable Safe Mode with Networking and F6 to enable Safe Mode with Command Prompt. Windows 8 and Windows 8.1 now boot according to the setting you selected.

3. Boot from a System Recovery CD/DVD - works only in Windows 8

In Windows 8, but not in Windows 8.1, you can create a system recovery CD or DVD. Here's the tutorial that shows how it is done: How to Create a System Repair Disc for Windows 7 & Windows 8.

Once you have that disc created, boot from it. When asked to press any key to load its content, do so.

First, you are asked to choose your keyboard layout. Press the layout you want to use. If you want to browse through the available options, press "See more keyboard layouts" until you find the one you want to use.

Then, the Choose an option screen is shown.

From here on, the steps are identical to those shown for method 2.

4. Boot from a System Recovery Memory Stick - works in Windows 8 & 8.1

In Windows 8 and Windows 8.1 you can use the Recovery Media Creator to create a system recovery drive on a USB flash Drive. Details instructions can be found in this tutorial: How to Create a Recovery Drive on a USB Memory Stick in Windows 8 & 8.1".

Boot from the USB memory stick and follow the same instructions as in method 3.

5. Use F8 or Shift + F8 (doesn't work when using UEFI BIOS & SSDs)

In Windows 7, you were able to press F8 just before Windows got loaded, to open the Advanced Boot Options window, where you could choose to start Windows 7 inSafe Mode.

Some websites advise you to pressShift+F8, just before Windows 8 or 8.1 starts loading so that you make it start the recovery mode, from where you can boot into Safe Mode. The problem is that, most times, Shift+F8 and F8 don't work, even though they are correct commands, supported by Windows 8 and Windows 8.1.

This official blog post from Microsoft (Designing for PCs that boot faster than ever before) explains that this behavior is caused by their work in designing a very fast boot procedure. Both Windows 8 and Windows 8.1 have the fastest boot times ever.

Wednesday, 12 November 2014

Big Data- a changing trend

Big Data

      a big hype topic

      everything is big data

      everyone wants to work with big data

      Wikipedia: "... a collection of data sets so large and complex that it

      becomes di_cult to process using on-hand database management

      tools or traditional data processing applications ..."

 

      Access to many di_erent data sources (Internet)

      storage is cheep - store everything

      today, CIOs get interested in the power of all their data

       a lot of di_erent and complex data have to be stored

       NoSQL

 

NoSQL: databases with less constrained consistency models )

schema-less

 

MongoDB:

I open source, cross-platform document-oriented database system

I most popular NoSQL database system

I supported MongoDB Inc.

I stores structured data as JSON-like documents with dynamic schemas

I MongoDB as a German / European Service

http://www.mongodb.org http://www.mongosoup.de

 

 

Hadoop

open-source software framework designed to support large scale data

processing

Map Reduce: a computational paradigm

I application is divided into many small fragments of work

HDFS: Hadoop Distributed File System

I a distributed _le system that stores data on the compute nodes

the Ecosystem: Hive, Pig, Flume, Mahout, ...

written in Java, opened up to alternatives by its Streaming API

http://hadoop.apache.org

 

HDFS and Hadoop cluster

HDFS is a block-structured _le system

I blocks are stored across a cluster of one or more machines with data

storage capacity: DataNode

I data is accessed in a write once and read many model

HDFS does come with its own utilities for _le management

HDFS _le system stores its metadata reliably: NameNode

 

Example: Rstudio

M

 

Tuesday, 11 November 2014

Interception of HTTPS Traffic between Android Device and External Server

Sometimes it's interesting to see what different Android applications exchange through HTTP and HTTPS protocols. Sometimes, when developing one's own SW it's convenient to see the whole traffic in real time. To solve these tasks many different and good applications have been developed, e.g. Charles or Fiddler2. In fact, they are more numerous, but only the two mentioned allow seeing not only HTTP but also HTTPS.

Troubles appear in the interception of traffic between an Android device and an external server. With encoded (HTTP) traffic all is rather obvious (here's a guide) — external links are allowed with Fiddler2, in Android the address of our machine with Fiddler2 is set as a server — and voila, all is up and running. But it took me a bit longer to set up HTTPS traffic interception.

Theory

So, what's the trouble? The trouble is that using HTTPS the client verifies by default whether the server it connects to is the right one. For this purpose certificates are used. So, the real server has, of course, a real certificate that matches the open URL, while our proxy does not have one. To deal with the problem in desktop OS, Fiddler2 offers a possibility to generate a fake certificate and import it to the trusted ones — now the client will always believe that connection to Fiddler2 is quite safe. Unfortunately, mobile devices did not buy this dummy.

Primarily, it is impossible to import certificates in Androids older than v.4.0. There are some doubtful options with routed devices but they don't suit us. Secondly, it is impossible to import a Fiddler2 certificate even in Android 4.0. The thing is the certificate generated by default fails to meet some security criteria of Android and can't be installed. It should be generated in a special way. Finally, we can't take it for granted that all applications will trust a fake certificate. There are some niceties.

Usage

  1. Take an Android 4.0 or higher device. No, a 2.3 device won't suit. Yes, a 4.0 emulator will suit.
  2. Install the latest version of Fiddler2 on your PC.
  3. Install special libraries to generate Android-compatible safety certificates (here).
  4. Export the security certificate from Fiddler2 («Tools > Fiddler Options > HTTPS > Export root certificate to Desktop»). Save it on your flash drive, into the root directory (or in your emulator, if you're using one).
  5. Add the security certificate to the trusted ones in Android («Settings > Security > Install from SD card»)

  6. Start Fiddler2, allow remote connections in Options.

  7. Enter the address of the PC with Fiddler2 as the proxy in network settings of Android.

  8. Open browser on Android, enter google.com and observe the request and response in the Fiddler2 window.

So, it worked with the browser, but, unfortunately, not all applications are as trustful as the browser. E.g. my soft, where I use Apache HTTP Client, didn't buy it the Apache client couldn't care less about the OS trusted certificates. In this case I had to disable this verification manually as follows:

Protocol.registerProtocol("https", new Protocol("https", new EasySSLProtocolSocketFactory(), 443));  

where EasySSLProtocolSocketFactory comes from here and allows trusting any certificates

Registry tweak for changing logon on windowd

Registry tweak

The process begins with a very minor Registry tweak. Even for those who would not normally feel comfortable editing the Registry, this one's a piece of cake. To begin, click the Start button and type Regedit in the Search box. Then, select the appropriate result and press [Enter]. When you do, you'll see the User Account Control, shown inFigure A, and will need to click the Yes button.Note: Editing the Windows Registry file is not without its risks, so be sure you have a verified backup before making any changes.

Figure A

You will encounter a UAC when you launch the Registry Editor.

Once the Registry Editor launches, locate and right-click on HKEY_LOCAL_MACHINE key and select the Find command. When you see the Find dialog box, type OEMBackground in the text box and make sure that only the Values check box is selected, as shown in Figure B.

Figure B

Type OEMBackground in the Find dialog box.

When the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background key opens, locate and double-click the OEMBackground value. When you see the Edit DWORD dialog box, change the value data from 0 to 1, as shown in Figure C. (If the OEMBackground value doesn't exist in the Background key, you'll need to pull down the Edit menu from that key and select New | DWORD (32-bit) Value).

Figure C

Change the value data from 0 to 1.

To complete this part of the operation, click OK to close the Edit DWORD dialog box and then close the Registry Editor.

Creating folders

In the second part of the operation, you'll need to create a couple of folders. To begin, launch Windows Explorer. Then navigate to the C:\Windows\System32\Oobe folder. Once you access the Oobe folder, click the New Folder button in the Windows Explorer toolbar. You'll see a confirmation dialog box, like the one shown inFigure D. When you click Continue, the new folder will be created and you can name it info.

Figure D

When you click the New Folder button, you'll encounter a confirmation dialog box.

Then, open the info folder, click the New Folder button again, work through the confirmation dialog box, and then name the second new folderbackgrounds.

Configuring the wallpaper

You can use any image that you want for your new Logon screen wallpaper. However, the image has to be in JPG format and you need to name it backgroundDefault.jpg. When you copy your file to the Windows\System32\Oobe\info\backgrounds folder, you'll encounter and will need to work through a confirmation dialog box similar to the one shown in Figure D.

Two other things to keep in mind: First, the actual file size of backgroundDefault.jpg cannot exceed 256 KB. Second, you'll want to use an image whose dimensions match the screen resolution that you are using. If you use a file whose dimensions are smaller, the image will be stretched and may appear distorted.

Rooting micromax in 3 Steps

How To Root Micromax Unite 2 A106 Without PC [With KingRoot App]

Get KingRoot application fromDev Host.Install KingRoot application like a normal application.Open the application and on the main UI, tap on the big green circle with a circle of lock in which you can read some Chinese text withRoot button.
Tap on the big button to root next to the arrow.

It will take some time to root the phone.As soon as you see a tick mark in the circle which means your phone has successfully rooted, you can tap the blue button below which will appear after the rooting has been done.
Tap on the button next to the arrow.

Reboot your phone!

The application will install KingUser application which is better than SuperSU and works perfect with MTK devices especially with Micromax Unite 2. In case if you want to install SuperSU, just install SuperSU from Google Play Store and update the binaries using normal way.

Rooting With Baidu Root App [May Not Work With All The Phones]

Open Settings and then move to Security and enableUnknown Sources. Just tick unkown sources and accept the warning.Get Baidu Rooting Application from it's official website: Clickhere to visit Baidu Root. Don't open the website from Google Chrome (using a phone), because it appeared wired there. Try opening it with Opera Mini.
Download Baidu App to Root MT6582 on KitKat/Micromax Unite 2

You will see a blue box with Chinese language written in it. I haven't translated it so I don't know what's written there. Just click on this and you will be prompted to downloadBaiduRoot_2001.apk. SelectSave and download the application.Open any File Explorer application if you have and open SDCard>Download.Now tap on BaiduRoot_2001.apk and select on Install to install this application in your phone.Open the application from app drawer.Now select Root button with some words written in Chinese language. Wait for some minutes and let the application download some binaries required to root the phone.You will see a popup. Press back to close the popup.Finally you will have a rooted phone. Now reboot for changes to take effect.Now you can uninstall this application.Further more you can installSuperSU application after rooting your phone and can uninstall Kinguser application if you want, but uninstall only if you have alternative Superuser application, else your phone will not have root access.

RSS

Categories

Followers

Blog Archive

rTechIndia

RtechIndia->technology ahead

rtech

rtechindia

RtechIndia

Go rtechindia

Go rtechindia

RtechIndia

Friday, 14 November 2014

Web 3.0- Future Trend

Overview

The Web is entering a new phase of evolution. There has been much debate recently about what to call this new phase. Some would prefer to not name it all, while others suggest continuing to call it "Web 2.0". However, this new phase of evolution has quite a different focus from what Web 2.0 has come to mean.
 

 
 

Web 3.0

John Markoff of the New York Timesrecently suggested naming this third-generation of the Web, "Web 3.0". This suggestion has led to quite a bit of debate within the industry. Those who are attached to the Web 2.0 moniker have reacted by claiming that such a term is not warranted while others have responded positively to the term, noting that there is indeed a characteristic difference between the coming new stage of the Web and what Web 2.0 has come to represent.
 
The term Web 2.0 was never clearly defined and even today if one asks ten people what it means one will likely get ten different definitions. However, most people in the Web industry would agree that Web 2.0 focuses on several major themes, including AJAX, social networking,folksonomies, lightweight collaboration, social bookmarking, and media sharing. While the innovations and practices of Web 2.0 will continue to develop, they are not the final step in the evolution of the Web.
 
In fact, there is a lot more in store for the Web. We are starting to witness the convergence of several growing technology trends that are outside the scope of what Web 2.0 has come to mean. These trends have been gestating for a decade and will soon reach a tipping point. At this juncture the third-generation of the Web will start.
 
 

More Intelligent Web

 The threshold to the third-generation Web will be crossed in 2007. At this juncture the focus of innovation will start shift back from front-end improvements towards back-end infrastructure level upgrades to the Web. This cycle will continue for five to ten years, and will result in making the Web more connected, more open, and more intelligent. It will transform the Web from a network of separately siloed applications and content repositories to a more seamless and interoperable whole.
 
Because the focus of the third-generation Web is quite different from that of Web 2.0, this new generation of the Web probably does deserve its own name. In keeping with the naming convention established by labeling the second generation of the Web as Web 2.0, I agree with John Markoff that this third-generation of the Web could be called Web 3.0.
 
 

Timeline and Definition

Web 1.0. Web 1.0 was the first generation of the Web. During this phase the focus was primarily on building the Web, making it accessible, and commercializing it for the first time. Key areas of interest centered on protocols such as HTTP, open standard markup languages such as HTML and XML, Internet access through ISPs, the first Web browsers, Web development platforms and tools, Web-centric software languages such as Java and Javascript, the creation of Web sites, the commercialization of the Web and Web business models, and the growth of key portals on the Web.
 
Web 2.0. According to the Wikipedia, "Web 2.0, a phrase coined by O'Reilly Media in 2004, refers to a supposed second generation of Internet-based services — such as social networking sites, wikis, communication tools, and folksonomies — that emphasize online collaboration and sharing among users."
 
I would also add to this definition another trend that has been a major factor in Web 2.0 — the emergence of the mobile Internet and mobile devices (including camera phones) as a major new platform driving the adoption and growth of the Web, particularly outside of the United States.
 
Web 3.0. Using the same pattern as the above Wikipedia definition, Web 3.0 could be defined as: "Web 3.0, a phrase coined by John Markoff of the New York Times in 2006, refers to a supposed third generation of Internet-based services that collectively comprise what might be called 'the intelligent Web' — such as those using semantic web, microformats, natural language search, data-mining, machine learning, recommendation agents, and artificial intelligence technologies — which emphasize machine-facilitated understanding of information in order to provide a more productive and intuitive user experience."
 
Web 3.0 Expanded Definition. I propose expanding the above definition of Web 3.0 to be a bit more inclusive. There are actually several major technology trends that are about to reach a new level of maturity at the same time. The simultaneous maturity of these trends is mutually reinforcing, and collectively they will drive the third-generation Web. From this broader perspective, Web 3.0 might be defined as a third-generation of the Web enabled by the convergence of several key emerging technology trends:
 
Ubiquitous Connectivity
Broadband adoptionMobile Internet accessMobile devicesNetwork Computing
Software-as-a-service business modelsWeb services interoperabilityDistributed computing (P2P, grid computing, hosted "cloud computing" server farms such as Amazon S3)Open Technologies
Open APIs and protocolsOpen data formatsOpen-source software platformsOpen data (Creative Commons, Open Data License, etc.)Open Identity
Open identity (OpenID)Open reputationPortable identity and personal data (for example, the ability to port your user account and search history from one service to another)The Intelligent Web
Semantic Web technologies (RDFOWL,SWRLSPARQL, Semantic application platforms, and statement-based datastores such as triplestores,tuplestores and associative databases)Distributed databases — or what I call "The World Wide Database" (wide-area distributed database interoperability enabled by Semantic Web technologies)Intelligent applications (natural language processing, machine learning, machine reasoning, autonomous agents)

Web 2.0

Web 2.0 ?!

I'm using the term "Web 2.0 design" to describe the prevailing style of the best web design

Many people use the term "Web 2.0″ to describe:

a resurgence in the web economya new level of technological interactivity between web sites and servicesor social phenomena deriving from new types of online communities and social networks

Many others also use the term in reference to a recent school of best-practice web design. I'm comfortable with using it in that context here.

In sociological terms, movements impact people on many levels: economic, cultural, political, etc. Is skate-punk about entertainment and sport, music and the music industry, fashion, or the breakdown of society?

Best Web Design Features

I'm going to take you through the features of the current wave of the best website designs, dissect the most significant features, explain why each one can be good, and show you how to use them in your own sites.

If I had to sum up "Web 2.0″ design in one word, it would have to be "simplicity", so that's where we'll start.

I'm a great believer in simplicity. I think it's the way forward for web design.

Today's simple, bold, elegant page designs deliver more with less:

They enable designers to shoot straight for the site's goals, by guiding the site visitor's eye through the use of fewer, well-chosen visual elements.They use fewer words but say more, and carefully selected imagery to create the desired feel.They reject the idea that we can't guess what people want from our sites

1. Simplicity

"Use as few features as are necessary to achieve what you need to achieve"

Web design is simpler than ever, and that's a good thing.

2.0 design means focused, clean and simple.

That doesn't necessarily mean minimalist, as I'll explain later.

I really believe in simplicity. That's not to say that all websites should be minimal, but that we should use as few features as are necessary to achieve what you need to achieve.

Here are some examples. Note how unnecessary elements have been stripped out from each. There could be a lot more on each page than there is… but would that make them stronger?

The result is that you have to look at the content. You find yourself interacting with exactly the screen features the designer intended. And you don't mind – it's easy, and you get just what you came for.

Here's a great case in point. Atlas Software help businesses with cloud software solutions. Their website tells you exactly what you need to know, with very little decoration or unnecessary visual information. The content comes through.

More examples of simple design

 

Thursday, 13 November 2014

Configuring DNS part2

Name Servers

Name Servers specify all name servers for a particular domain. You set up all primary and secondary name servers through this record.

To create a Name Server, follow these steps:

Select DNS from the Administrative Tools folder to open the DNS console.Expand the Forward Lookup Zone.Right-click on the appropriate domain and choose Properties (Figure N).Select the Name Servers tab and click Add.Enter the appropriate FQDN Server name and IP address of the DNS server you want to add.

Figure N

Name Server

Host (A) records

A Host (A) record maps a host name to an IP address. These records help you easily identify another server in a forward lookup zone. Host records improve query performance in multiple-zone environments, and you can also create a Pointer (PTR) record at the same time. A PTR record resolves an IP address to a host name.

To create a Host record:

Select DNS from the Administrative Tools folder to open the DNS console.Expand the Forward Lookup Zone and click on the folder representing your domain.From the Action menu, select New Host.Enter the Name and IP Address of the host you are creating (Figure O).Select the Create Associated Pointer (PTR) Record check box if you want to create the PTR record at the same time. Otherwise, you can create it later.Click the Add Host button.

Figure O

A Host (A) record

Pointer (PTR) records

A Pointer (PTR) record creates the appropriate entry in the reverse lookup zone for reverse queries. As you saw in Figure H, you have the option of creating a PTR record when creating a Host record. If you did not choose to create your PTR record at that time, you can do it at any point.

To create a PTR record:

Select DNS from the Administrative Tools folder to open the DNS console.Choose the reverse lookup zone where you want your PTR record created.From the Action menu, select New Pointer (Figure P).Enter the Host IP Number and Host Name.Click OK.

Figure P

New Pointer

Canonical Name (CNAME) or Alias records

A Canonical Name (CNAME) or Alias record allows a DNS server to have multiple names for a single host. For example, an Alias record can have several records that point to a single server in your environment. This is a common approach if you have both your Web server and your mail server running on the same machine.

To create a DNS Alias:

Select DNS from the Administrative Tools folder to open the DNS console.Expand the Forward Lookup Zone and highlight the folder representing your domain.From the Action menu, select New Alias.Enter your Alias Name (Figure Q).Enter the fully qualified domain name (FQDN).Click OK.

Figure Q

Alias Name

Mail Exchange (MX) records

Mail Exchange records help you identify mail servers within a zone in your DNS database. With this feature, you can prioritize which mail servers will receive the highest priority. Creating MX records will help you keep track of the location of all of your mail servers.

To create a Mail Exchange (MX) record:

Select DNS from the Administrative Tools folder to open the DNS console.Expand the Forward Lookup Zone and highlight the folder representing your domain.From the Action menu, select New Mail Exchanger.Enter the Host Or Domain (Figure R).Enter the Mail Server and Mail Server Priority.Click OK.

Figure R

Host or Domain

Other new records

You can create many other types of records. For a complete description, choose Action | Other New Records from the DNS console (Figure S). Select the record of your choice and view the description.

Figure S

Create records from the DNS console

Troubleshooting DNS servers

When troubleshooting DNS servers, the nslookuputility will become your best friend. This utility is easy to use and very versatile. It's a command-line utility that is included within Windows 2008. With nslookup, you can perform query testing of your DNS servers. This information is useful in troubleshooting name resolution problems and debugging other server-related problems. You can access nslookup (Figure T) right from the DNS console.

Figure T

Configuring DNS

Without DNS, computers would have a very tough time communicating with each other. However, most Windows administrators still rely on WINS for name resolution on local area networks and some have little or no experience with DNS. Steven Warren explains how to install, configure, and troubleshoot a Windows Server 2008 DNS server.

As many of you are probably aware, the Domain Name System (DNS) is now the name resolution system of choice in Windows. Without it, computers would have a very tough time communicating with each other. However, most Windows administrators still rely on the Windows Internet Name Service (WINS) for name resolution on local area networks and some have little or no experience with DNS. If you fall into this category, read on. We'll explain how to install, configure, and troubleshoot a Windows Server 2008 DN
Installtion

You can install a DNS server from the Control Panel or when promoting a member server to a domain controller (DC) (Figure A). During the promotion, if a DNS server is not found, you will have the option of installing it.

Figure A

Domain controller

To install a DNS server from the Control Panel, follow these steps:

From the Start menu, select | Control Panel | Administrative Tools | Server Manager.Expand and click Roles (Figure B).Choose Add Roles and follow the wizard by selecting the DNS role (Figure C).Click Install to install DNS in Windows Server 2008 (Figure D).

Figure B

Expand and click Roles

Figure C

DNS role

Figure D

Install DNS

DNS console and configuration

After installing DNS, you can find the DNS console from Start | All Programs | Administrative Tools | DNS. Windows 2008 provides a wizard to help configure DNS.

When configuring your DNS server, you must be familiar with the following concepts:

Forward lookup zoneReverse lookup zoneZone types

A forward lookup zone is simply a way to resolve host names to IP addresses. A reverse lookup zone allows a DNS server to discover the DNS name of the host. Basically, it is the exact opposite of a forward lookup zone. A reverse lookup zone is not required, but it is easy to configure and will allow for your Windows Server 2008 Server to have full DNS functionality.

When selecting a DNS zone type, you have the following options: Active Directory (AD) Integrated, Standard Primary, and Standard Secondary. AD Integrated stores the database information in AD and allows for secure updates to the database file. This option will appear only if AD is configured. If it is configured and you select this option, AD will store and replicate your zone files.

A Standard Primary zone stores the database in a text file. This text file can be shared with other DNS servers that store their information in a text file. Finally, a Standard Secondary zone simply creates a copy of the existing database from another DNS server. This is primarily used for load balancing.

To open the DNS server configuration tool:

Select DNS from the Administrative Tools folder to open the DNS console.Highlight your computer name and choose Action | Configure a DNS Server... to launch the Configure DNS Server Wizard.Click Next and choose to configure the following: forward lookup zone, forward and reverse lookup zone, root hints only (Figure E).Click Next and then click Yes to create a forward lookup zone (Figure F).Select the appropriate radio button to install the desired Zone Type (Figure G).Click Next and type the name of the zone you are creating.Click Next and then click Yes to create a reverse lookup zone.Repeat Step 5.Choose whether you want an IPv4 or IPv6 Reverse Lookup Zone (Figure H).Click Next and enter the information to identify the reverse lookup zone (Figure I).You can choose to create a new file or use an existing DNS file (Figure J).On the Dynamic Update window, specify how DNS accepts secure, nonsecure, or no dynamic updates.If you need to apply a DNS forwarder, you can apply it on the Forwarders window. (Figure K).Click Finish (Figure L).

Figure E

Configure

Figure F

Forward lookup zone

Figure G

Desired zone

Figure H

IPv4 or IPv6

Figure I

Reverse lookup zone

Figure J

Choose new or existing DNS file

Figure K

Forwarders window

Figure L

Finish

Managing DNS records

You have now installed and configured your first DNS server, and you're ready to add records to the zone(s) you created. There are various types of DNS records available. Many of them you will never use. We'll be looking at these commonly used DNS records:

Start of Authority (SOA)Name ServersHost (A)Pointer (PTR)Canonical Name (CNAME) or AliasMail Exchange (MX)

Start of Authority (SOA) record

The Start of Authority (SOA) resource record is always first in any standard zone. The Start of Authority (SOA) tab allows you to make any adjustments necessary. You can change the primary server that holds the SOA record, and you can change the person responsible for managing the SOA. Finally, one of the most important features of Windows 2000 is that you can change your DNS server configuration without deleting your zones and having to re-create the wheel (Figure M).

Figure M

Updating BIOS on windows


DISCLAIMER:
First of all i want you all to know that updating the BIOS is dangerous and doing it wrong can brick your motherboard so unless the update doesn't help you in anyway don't do it otherwise i will not be responsible for the result.

PROCEDURE:
1: First of all go to the this link here and download speccy.
2: Install it and open it and on the very first page you should see basic details about your computer.
There should be be a motherboard heading with make and model you need to remember the model.
3: Go to the intel site put your motherboard model (remember to double check that you entered and are on the correct motherboard page) and go to the support>drivers>download and then go to the BIOS section and then click on the latest version of bios update.
4: There are gonna be 4 to 3 choices here ISO, BIO, IFLASH2, Express Update. I am going with the .BIO version file here since the other methods didn't work in my motherboard and basically this method should work on every intel motherboard.
5: After you download the file (generally it is a single file) go to this link here and carefully follow the steps to make the bootable USB or thumb drive.
6: After you done following the above guide place the download xxx.BIO file in the usb and then shut down the computer.
7: Unplug the AC power cable and open the chassis or the back cover now there should be small yellow jumper on the motherboard (it is the generally the only small thing on the whole motherboard but ask if you are not sure) make sure you remember how it is connected and then remove it.
8: Connect the USB or thumb drive on the pc and then replug the AC power cable.
9: After the Intel Logo or the splash sceen updating of the bios should automatically begin let it happen.
10: After you receive the successful update prompt let it restart and then turn it off unplug the AC power cable put the jumper back in it's position and then plug the AC power cable and your BIOS should be updated and you should be good to go.

Booting windows 8 in safe mode

Are you struggling to boot intoSafe Mode in Windows 8 or Windows 8.1? Have you tried pressing both F8 and Shift+F8and they don't work? That's because a lot has changed with the boot procedure in Windows 8 and Windows 8.1. The boot has become so fast that it literally cannot be interrupted by any of your keypresses. Here are 5 ways in which you can boot into Safe Mode, that don't involve any special hacks or manual configuration.

Safe Mode in Windows 8 and Windows 8.1

Safe Mode in Windows 8 and Windows 8.1 is not too different from the Safe Modefound in earlier versions of Windows.

The operating system still loads only the most basic drivers and services, so that it can display a minimal useful interface. The only important difference is that the minimum screen resolution used by Safe Mode has risen from 800x600 pixels to 1024x768 pixels.

1. Use the System Configuration Tool (msconfig.exe) - works in Windows 8 & 8.1

The easiest method for booting into Safe Mode is to use the System Configurationtool, also known as msconfig.exe.

Go to the Boot tab and, in the Boot optionssection check the box that says "Safe boot". Then, click or tap OK.

You are informed that you need to restart your computer. Click Restart or Exit without restart depending on whether you want to restart now or later.

At the next restart, Windows 8 and Windows 8.1 start in Safe Mode.

2. Use Shift + Restart - works in Windows 8 & 8.1

Another method is to press the Powerbutton at the Windows login screen or in the Settings charm. Then, press and hold the SHIFT key on your keyboard and clickRestart.

Windows asks you to choose an option. Press Troubleshoot.

In the Troubleshoot screen, pressAdvanced options.

In the Advanced options screen, pressStartup Settings.

You are informed that you are about to restart in order to change several Windows options, including enabling Safe Mode. Press Restart.

Your computer or device restarts again and displays nine startup settings, including Safe Mode, Safe Mode with Networking and Safe Mode with Command Prompt

Press the F4 key on your keyboard, to enable Safe Mode, F5 to enable Safe Mode with Networking and F6 to enable Safe Mode with Command Prompt. Windows 8 and Windows 8.1 now boot according to the setting you selected.

3. Boot from a System Recovery CD/DVD - works only in Windows 8

In Windows 8, but not in Windows 8.1, you can create a system recovery CD or DVD. Here's the tutorial that shows how it is done: How to Create a System Repair Disc for Windows 7 & Windows 8.

Once you have that disc created, boot from it. When asked to press any key to load its content, do so.

First, you are asked to choose your keyboard layout. Press the layout you want to use. If you want to browse through the available options, press "See more keyboard layouts" until you find the one you want to use.

Then, the Choose an option screen is shown.

From here on, the steps are identical to those shown for method 2.

4. Boot from a System Recovery Memory Stick - works in Windows 8 & 8.1

In Windows 8 and Windows 8.1 you can use the Recovery Media Creator to create a system recovery drive on a USB flash Drive. Details instructions can be found in this tutorial: How to Create a Recovery Drive on a USB Memory Stick in Windows 8 & 8.1".

Boot from the USB memory stick and follow the same instructions as in method 3.

5. Use F8 or Shift + F8 (doesn't work when using UEFI BIOS & SSDs)

In Windows 7, you were able to press F8 just before Windows got loaded, to open the Advanced Boot Options window, where you could choose to start Windows 7 inSafe Mode.

Some websites advise you to pressShift+F8, just before Windows 8 or 8.1 starts loading so that you make it start the recovery mode, from where you can boot into Safe Mode. The problem is that, most times, Shift+F8 and F8 don't work, even though they are correct commands, supported by Windows 8 and Windows 8.1.

This official blog post from Microsoft (Designing for PCs that boot faster than ever before) explains that this behavior is caused by their work in designing a very fast boot procedure. Both Windows 8 and Windows 8.1 have the fastest boot times ever.

Wednesday, 12 November 2014

Big Data- a changing trend

Big Data

      a big hype topic

      everything is big data

      everyone wants to work with big data

      Wikipedia: "... a collection of data sets so large and complex that it

      becomes di_cult to process using on-hand database management

      tools or traditional data processing applications ..."

 

      Access to many di_erent data sources (Internet)

      storage is cheep - store everything

      today, CIOs get interested in the power of all their data

       a lot of di_erent and complex data have to be stored

       NoSQL

 

NoSQL: databases with less constrained consistency models )

schema-less

 

MongoDB:

I open source, cross-platform document-oriented database system

I most popular NoSQL database system

I supported MongoDB Inc.

I stores structured data as JSON-like documents with dynamic schemas

I MongoDB as a German / European Service

http://www.mongodb.org http://www.mongosoup.de

 

 

Hadoop

open-source software framework designed to support large scale data

processing

Map Reduce: a computational paradigm

I application is divided into many small fragments of work

HDFS: Hadoop Distributed File System

I a distributed _le system that stores data on the compute nodes

the Ecosystem: Hive, Pig, Flume, Mahout, ...

written in Java, opened up to alternatives by its Streaming API

http://hadoop.apache.org

 

HDFS and Hadoop cluster

HDFS is a block-structured _le system

I blocks are stored across a cluster of one or more machines with data

storage capacity: DataNode

I data is accessed in a write once and read many model

HDFS does come with its own utilities for _le management

HDFS _le system stores its metadata reliably: NameNode

 

Example: Rstudio

M

 

Tuesday, 11 November 2014

Interception of HTTPS Traffic between Android Device and External Server

Sometimes it's interesting to see what different Android applications exchange through HTTP and HTTPS protocols. Sometimes, when developing one's own SW it's convenient to see the whole traffic in real time. To solve these tasks many different and good applications have been developed, e.g. Charles or Fiddler2. In fact, they are more numerous, but only the two mentioned allow seeing not only HTTP but also HTTPS.

Troubles appear in the interception of traffic between an Android device and an external server. With encoded (HTTP) traffic all is rather obvious (here's a guide) — external links are allowed with Fiddler2, in Android the address of our machine with Fiddler2 is set as a server — and voila, all is up and running. But it took me a bit longer to set up HTTPS traffic interception.

Theory

So, what's the trouble? The trouble is that using HTTPS the client verifies by default whether the server it connects to is the right one. For this purpose certificates are used. So, the real server has, of course, a real certificate that matches the open URL, while our proxy does not have one. To deal with the problem in desktop OS, Fiddler2 offers a possibility to generate a fake certificate and import it to the trusted ones — now the client will always believe that connection to Fiddler2 is quite safe. Unfortunately, mobile devices did not buy this dummy.

Primarily, it is impossible to import certificates in Androids older than v.4.0. There are some doubtful options with routed devices but they don't suit us. Secondly, it is impossible to import a Fiddler2 certificate even in Android 4.0. The thing is the certificate generated by default fails to meet some security criteria of Android and can't be installed. It should be generated in a special way. Finally, we can't take it for granted that all applications will trust a fake certificate. There are some niceties.

Usage

  1. Take an Android 4.0 or higher device. No, a 2.3 device won't suit. Yes, a 4.0 emulator will suit.
  2. Install the latest version of Fiddler2 on your PC.
  3. Install special libraries to generate Android-compatible safety certificates (here).
  4. Export the security certificate from Fiddler2 («Tools > Fiddler Options > HTTPS > Export root certificate to Desktop»). Save it on your flash drive, into the root directory (or in your emulator, if you're using one).
  5. Add the security certificate to the trusted ones in Android («Settings > Security > Install from SD card»)

  6. Start Fiddler2, allow remote connections in Options.

  7. Enter the address of the PC with Fiddler2 as the proxy in network settings of Android.

  8. Open browser on Android, enter google.com and observe the request and response in the Fiddler2 window.

So, it worked with the browser, but, unfortunately, not all applications are as trustful as the browser. E.g. my soft, where I use Apache HTTP Client, didn't buy it the Apache client couldn't care less about the OS trusted certificates. In this case I had to disable this verification manually as follows:

Protocol.registerProtocol("https", new Protocol("https", new EasySSLProtocolSocketFactory(), 443));  

where EasySSLProtocolSocketFactory comes from here and allows trusting any certificates

Registry tweak for changing logon on windowd

Registry tweak

The process begins with a very minor Registry tweak. Even for those who would not normally feel comfortable editing the Registry, this one's a piece of cake. To begin, click the Start button and type Regedit in the Search box. Then, select the appropriate result and press [Enter]. When you do, you'll see the User Account Control, shown inFigure A, and will need to click the Yes button.Note: Editing the Windows Registry file is not without its risks, so be sure you have a verified backup before making any changes.

Figure A

You will encounter a UAC when you launch the Registry Editor.

Once the Registry Editor launches, locate and right-click on HKEY_LOCAL_MACHINE key and select the Find command. When you see the Find dialog box, type OEMBackground in the text box and make sure that only the Values check box is selected, as shown in Figure B.

Figure B

Type OEMBackground in the Find dialog box.

When the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background key opens, locate and double-click the OEMBackground value. When you see the Edit DWORD dialog box, change the value data from 0 to 1, as shown in Figure C. (If the OEMBackground value doesn't exist in the Background key, you'll need to pull down the Edit menu from that key and select New | DWORD (32-bit) Value).

Figure C

Change the value data from 0 to 1.

To complete this part of the operation, click OK to close the Edit DWORD dialog box and then close the Registry Editor.

Creating folders

In the second part of the operation, you'll need to create a couple of folders. To begin, launch Windows Explorer. Then navigate to the C:\Windows\System32\Oobe folder. Once you access the Oobe folder, click the New Folder button in the Windows Explorer toolbar. You'll see a confirmation dialog box, like the one shown inFigure D. When you click Continue, the new folder will be created and you can name it info.

Figure D

When you click the New Folder button, you'll encounter a confirmation dialog box.

Then, open the info folder, click the New Folder button again, work through the confirmation dialog box, and then name the second new folderbackgrounds.

Configuring the wallpaper

You can use any image that you want for your new Logon screen wallpaper. However, the image has to be in JPG format and you need to name it backgroundDefault.jpg. When you copy your file to the Windows\System32\Oobe\info\backgrounds folder, you'll encounter and will need to work through a confirmation dialog box similar to the one shown in Figure D.

Two other things to keep in mind: First, the actual file size of backgroundDefault.jpg cannot exceed 256 KB. Second, you'll want to use an image whose dimensions match the screen resolution that you are using. If you use a file whose dimensions are smaller, the image will be stretched and may appear distorted.

Rooting micromax in 3 Steps

How To Root Micromax Unite 2 A106 Without PC [With KingRoot App]

Get KingRoot application fromDev Host.Install KingRoot application like a normal application.Open the application and on the main UI, tap on the big green circle with a circle of lock in which you can read some Chinese text withRoot button.
Tap on the big button to root next to the arrow.

It will take some time to root the phone.As soon as you see a tick mark in the circle which means your phone has successfully rooted, you can tap the blue button below which will appear after the rooting has been done.
Tap on the button next to the arrow.

Reboot your phone!

The application will install KingUser application which is better than SuperSU and works perfect with MTK devices especially with Micromax Unite 2. In case if you want to install SuperSU, just install SuperSU from Google Play Store and update the binaries using normal way.

Rooting With Baidu Root App [May Not Work With All The Phones]

Open Settings and then move to Security and enableUnknown Sources. Just tick unkown sources and accept the warning.Get Baidu Rooting Application from it's official website: Clickhere to visit Baidu Root. Don't open the website from Google Chrome (using a phone), because it appeared wired there. Try opening it with Opera Mini.
Download Baidu App to Root MT6582 on KitKat/Micromax Unite 2

You will see a blue box with Chinese language written in it. I haven't translated it so I don't know what's written there. Just click on this and you will be prompted to downloadBaiduRoot_2001.apk. SelectSave and download the application.Open any File Explorer application if you have and open SDCard>Download.Now tap on BaiduRoot_2001.apk and select on Install to install this application in your phone.Open the application from app drawer.Now select Root button with some words written in Chinese language. Wait for some minutes and let the application download some binaries required to root the phone.You will see a popup. Press back to close the popup.Finally you will have a rooted phone. Now reboot for changes to take effect.Now you can uninstall this application.Further more you can installSuperSU application after rooting your phone and can uninstall Kinguser application if you want, but uninstall only if you have alternative Superuser application, else your phone will not have root access.