Tuesday, December 20, 2011

FaceBook TimeLine : Make Attractive Cover Profile. - Tips to start/ activate your Timeline view, its advantages and how to make more attractive profile.

“Facebook TimeLine. Tell your story with a new kind of profile” – as explained by Facebook itself, Timeline gives a great look to your Facebook profile page.

You can manifest a lot more, share easily, and control the layout more coolly, in the new facebook profile avatar. For better explaination you can visit
Facebook Timeline Details and Description (FAQ)

This new profile design that has rolled out this month is different from previous Facebook design updates. Tis time users will just love it: Timeline lets them be a designer.

The Timeline view of your profile basically divides your profile into three categories
1. Your Cover
2. Your Stories
3. Your Apps

For example you can see the following Pic of a Profile page in Timeline view: (click to enlarge the picture)

You can use an stunning pic, (or any interesting one for that matter), as the cover of your profile. This will be shown in wide view. And the profile pic that was initially used will also be visible in left corner.

Your stories are your day to day happening in a time line format.
And your Apps, are the collection of your Apps that you use and its activities.

Cover Photo must tell something. Your cover is the first impression of you a user will get when he or she goes to your page. But remember, Your profile photo should be of you; your cover photo can be anything.
Edit your photos Please!. The cover is a huge space, so a high-res photo will look best. You must crop to make it better.
Click and drag on the picture so that it looks good. Tis will automatically happen when you hover your mouse over the cover picture. You will be prompted to drag and drop your picture so that u can let best portion of the Photograph to be viewed.
Be creative in choosing Cover photo.Use Web sites that help you design your own cover and share it. Sites such as MyFBCovers and SiteCanvas

It is important to note that Facebook said it will automatically push the timeline live seven days after someone signs up for the new feature. However, if folks are content with what's shared after reviewing it, they can push it live themselves at any point within that period. This was already accessible to Facebook App developers via OpenGraph API, but now Facebook itself has launched timeline feature in Full Public Release making it available to million of users together.

I am attaching a snapshot of my own profile in timeline view: (click to enlarge the image)

Activating Timeline View

How to switch / convert to Cover page View / time line view in Facebook

You can activate this type of profile by visiting the page described above.
Or simply click here...
Get Facebook Timeline View Easily in a Click
And click on "Get It Now"

Now first of all, lets see what is Facebook TimeLine. Facebook describes it as following:

What is a new Timeline view in facebook?

Your timeline is your collection of the photos, stories, and experiences that tell your story. Here are some of the things you can do on your timeline:
Add a cover
Edit your basic info
Jump to the past
View your activity log
See highlights from each month
Star stories you want to highlight
Add life events
Update your status
View and add photos
Share your app activity

This can be seen from the following page Help From Facebook Website Timeline

For example I have attached my Facebook Profile page. See the time line view in red circle.
Users can click on those places to go directly to specified time in your story. The new timeline feature will aggregate all your old Facebook stuff at one window and you/viewers will be able to switch between times (ie. month and year easily).

This new feature from Facebook, the largest Social Networking Website, is just awesome. And the entire outlook is just fabulous.

And just keep in mind, since this is new design, u will need time to get used to it. But during this time do not be forced to post something that u do not want everyone to see. For that purpose one simple question will pop up in ur brains that "How do I hide a story on my timeline?"
The answer is straighforward, To hide a story so that it no longer appears on your timeline:
Hover over the story and click button that appears on right of your post. (this is similar as before. only nomenclature has changed. !). Then Click Hide from Timeline.

Cheers to Facebook!
Cheers to the world!!
Please click on Advertisements because that fetches me liquid tonic used at real midnight cheers!! lol ;)

Friday, December 16, 2011

How to set WinDbg as your Default Postmortem Debugger

In one of my my earlier post related to Microsoft Useful Apps and Powertoys for Windows, I already talked about WinDbg. WinDbg is a tool for debugging any Crash in a program. This tool automatically syncs up the required pdb files ie. The symols file from the MSDN and enables your machine to debug the problems. Refer http://http://www.microsoft.com/whdc/devtools/debugging/installx86.mspx You can have a dump of your crash and investigate, or contact your administrator. In addition, you can also log a radar (defect/bug) on the Microsoft. (Also See http://en.wikipedia.org/wiki/WinDbg)

This time I m gonna xplain how to set WinDbg as a Default Windows Postmortem Debugger.

Usually Windows system has Dr. Watson as the default debugger. But undoubtedly, Windbg has upper hands.

So what you can do is as follows:
1. Try to Install the latest Windbg Debugging Tools for Windows:
2. You can Set WinDbg as a default debugger by issuing the following command:
WinDbg -I
It is very important to note that the letter 'I' must be capitalized.

3. Create some folder where the dump will. Give it full read/write permissions.
4. Open Registry editor (Run->regedit at command line)
Go to the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AeDebug
It has the following value:
"C:\Program Files\Debugging Tools for Windows\windbg.exe" -p %ld -e %ld -g
Append this with following string:
-c '.dump /o /f C:\DMP\dmp1.dmp; q' -Q -QS -QY -QSY
The new key will have something like this :
"C:\Program Files\Debugging Tools for Windows\windbg.exe" -p %ld -e %ld -g -c '.dump /o /f C:\DMP\dmp1.dmp; q' -Q -QS -QY -QSY
[Lets assume here C:\DMP is the folder u wanna make dump creation folder]
5. Important to note the address of WinDbg, since it may vary depending on or OS being x86 or 64 bit.
6. Now it is set as postmortem debugger. In case of any crash now, windbg will pop-up saying the error is encounterd. Dump is stored in the folder allocated earlier.

You must remember the following:
a) Dump is not appended, so if there is some old dump, then that will be over-written
b) On some OS like Win Server 2k3, Win-XP XP and later, you can use the /ma switch instead of /f to save additional debugging information.

Readers can email me personally, as many regularly do, if they found the article helpful and wanna share how this helped them in their roles. Finding my email address is not at all any deal ;)
-Mohd Anwar Jamal Faiz

GeoBing by Anwar Faiz: First Facebook App using Bing Maps

I have developed a new Facebook Application and wanted to post something about that.

Name of the Facebook App: GeoBing

Description: Use the GeoBing App to share your location on Facebook using Microsoft's Latest Bing Maps. Your Profile would get updated with your current location and map.

Importance: GeoBing Facebook Application is the world's first innovative way to share your Geographical Location over Facebook using Bing Maps. You can even do it from your Laptop and Desktop Browsers.!!

GeoBing FaceBook Link: http://apps.facebook.com/geobing/?ref=ts

Steps to use:
Step 1: Click this button Show map. [You need to click this]

Step 2: When prompted, allow your location to be shared to see Geolocation in action

Step 3: When you see your Location information on the Map below, Click 'Post to Facebook' button on the bottom.

Effect: Your geographical location would be posted over your Facebook profile page.

Help promoting this App. This was designed in curiosity to use Bing Maps. And I am happy and glad to let you all know, GeoBing is the first Facebbok Application that uses Microsoft Bing Maps to post your Geographical location. This works from your desktop, laptops, handheld devises, Samsung Galaxy S2, Iphone, Ipads etc.

Love u all.
Keep clicking advertisements. Keep reading more original contents.
-Mohd Anwar Jamal Faiz

PHP Curl not working on GoDaddy Host : why and Solution

Problem is that sometimes PHP Curl library not works on GoDaddy Host. Why curl is not working and how to solve this issue is what this post is all about.

I was trying to use curl library in my php code. But was soon tired of seeing numerous failures. My code was pretty much neet [those who know me know that well. I like cleanliness!! ;) ].

Still I was getting timeouts or some or the other errors , as I tried playing between parametrs. It was after some research over the internet and the manual, I found out that the trouble was because of host. Actually, GoDaddy uses a proxy server.

Voila!! You got it!!

So now on, if anyone uses GoDaddy as host and wants to use the curl library in his codes, has to just tweak his code by some additional lines.

Let us assume that $hn is the curl handler.
Then you have to include this line in your PHP Code---
curl_setopt($hn, CURLOPT_PROXY,"");

Lets see an example..

$url = "http://www.meonshow.com/";

$hn = curl_init();
curl_setopt ($hn, CURLOPT_URL, $url);
curl_setopt ($hn, CURLOPT_RETURNTRANSFER, 1);
curl_setopt ($hn, CURLOPT_PROXY,"");
curl_setopt ($hn, CURLOPT_TIMEOUT, 120);
$res = curl_exec ($hn);
if(is_int($res)) {
die("Error occured: " . curl_errno($hn) . " : " . curl_error($hn));
curl_close ($hn);

print "Target URL: " . $url . " " . $res;

Now, you may as thanks click on few of the advertisements links. Do it man!!

Thursday, November 3, 2011

error: 452 Error writing:file larger than ulimit set

error: 452 Error writing file: A file cannot be larger than the value set by ulimit

Once I wanted to transfer file from a MAC machine to AIX 64 bit machine. It was an archived file. But after a few seconds of transfer, an abrupt notification of File size exceed was observed. It took me a while, but when the cause was found, I smiled. It was due to a basic setting in Unix based OSes.
The error seen was “Error Writing File : A file cannot be larger than the value set by ulimit”

So here comes the trick of Changing the maximum allowed file size (ulimit)
You cannot create or copy a file that is larger than the limit allowed by ulimit. The profit achieved by this restriction is that it prevents runaway processes from taking up too much disk space.

If you have to work with a file that exceeds the set limit, you must change the default user limit size.
It may be important to note at this point of discussion that the ulimit cannot exceed the values of the SFSZLIM and HFSZLIM tunable parameters.

In addition, do also note that the changed user limit is in effect for the current session only.
1. Use the su command to become root.
2. To view your current limit in blocks, enter:
ulimit -a
3. To set your limit to the new size for the current session, enter:
ulimit [-f] new_size< You can also permanently change your file size limit by setting the new limit in the /etc/profile or the /etc/default/login file. error: 452 Error writing file: A file cannot be larger than the value set by ulimit When trying to transfer a very big file (over ftp for example), you'll receive the error above, this limit is a security limit in AIX and you can solve it by simply editing the /etc/security/limits file and increasing the "fsize" limit or simply changing it to "-1" to be unlimited, and then retry your transfer, you don't have to restart the machine for changes to take effect. This problem have occurred to many as seen over the Internet. Many have reported to see this problem for the first time when they were trying to copy Oracle installer (of size : 1238844 KB) from Windows box to AIX 5.2 box through ftp and it throwed the following The error as already pointed was --" 452 Error writing file: A file cannot be larger than the value >set by ulimit."

Many have reported that they changed the ulimit value to unlimited and then tried copying even after
that the same error was thrown.
Then they changed fsize value in /etc/security/limits file.
Then I tried copying the Oracle installer and it was successful.

It should be remembered here that the problem here is the file system on AIX is JFS (Journalled File
System) and it supports files of size <=2GB. So, if we want to have a file
of size more than 2 GB we need to change the file system to Extended
Journalled File System.

Wish yo all the best,

Introduction to Linux FTP command by Anwar Faiz

This post is an introduction to the Linux FTP command. I will discuss in short, the FTP commands, ‘l-variants’, ‘!-variants’, and ‘m-variants’ command in FTP.

To start with, let me tell you that ftp command relates to the File Transfer Protocol. A typical use of the command ftp is for remotely copying, renaming, and deleting files.

For instance:
ftp abc.anwar.edu
This command will attempt to connect to the ftp server at abc.anwar.edu. If it succeeds, it will ask you to log in using a username and password. In case it is a public ftp server, it often allows you to log in using the username "anonymous" and your email address as password. After you are logged in you can get a list of the available ftp commands using the simple help function:
ftp> help
This lists the commands that you can use to show the directory contents, transfer files, and delete files.

Now let us analyze what you can do once you are in FTP command mode. The Shell prompt at this time typically becomes as ftp>.
You can type one of many commands available now to achieve different results.
For instance, ftp> ls
This command prints the names of the files and subdirectories in the current directory on the remote computer.
In a similar way, ftp> cd customers
This command changes the current directory to the subdirecotry "customers", if it exists.
In the same manner, ftp> cd ..
Changes the current directory to the parent direcotry.
Now there can be another variants of these commands too. Because remember now you are in a 2 computer zone. One is your host system from which the ftp command is run. Another is your remote system that has been FTPed here. So for these you can use a prefix ‘l’ befor above command to traverse through the directory structure of the local computer. Obviously ;) local means host system.
For example, ftp> lcd images.
Changes the current directory on the local computer to "images", if it exists.

Now we can directly land into serious discussions. First of any such discussion is about the modes of transfer. There can be two modes of transfer of files. One is ‘ascii’ and another is ‘binary’.
For example, ftp> ascii
Changes to "ascii" mode for transferring text files.
And ftp> binary
Changes to "binary" mode for transferring all files that are not text files.

The next point in discussion is about the transfer of files. After all, it is only for which the FTP command is all about.
So here comes the first one GET command.
Using ftp> get image1.jpg
You can download the file image1.jpg from the remote computer to the local computer.
It is warned that in case there already is a file with the same name it will be overwritten. Obviously you may smile over this warning ;)

And now comes the command for Uploading data, the PUT command
The command ftp> put image2.jpg
Uploads the file image2.jpg from the local computer to the remote computer. Again the same warning of file overwriting if file exists.

Using ‘!’-variant commands in ftp you can achieve results on local computer.
ftp> !ls
A '!' in front will execute the specified command on the local computer. So '!ls' lists the file names and directory names of the current directory on the local computer.

The last of such serious ( please smile again ;) what serious?). Ok. So the last one of such serious discussions would be the ‘m’-variant commands of get and put.
ftp> mget *.jpg
With mget you can download multiple images. This command downloads all files that end with ".jgp".
ftp> mput *.jpg
Uploads all files that end with ".jgp".
ftp> mdelete *.jpg
Deletes all files that end with ".jgp".

The blogpost would remain incomplete if I do not tell about the last point.
ftp> quit
This command exits the ftp program, and lets you return on the normal shell prompt.

With this I end this blogpost. I guess, it is sufficient to begin with and in a typical day to day job. For more details and examples, you may like to visit the website FTP tutorial from About.com. Take care :)

Friday, September 9, 2011

Mohd Anwar - Google Trick Sheet Part1

Google UI provides many quick search options. We seem to miss these tricks in our day to day Google Searches. I present here Mohd Anwar's Google Trick Sheet Part1. Oh you guessed correct. Mohd Anwar is me. [See image ;)]

These tools will definitely refine and improve your search. For additional info you can refer Google Help page itself.

If you try to search as mentioned below, the possible outcome in your search results are described alongside:

anwar thailand the words anwar and thailand

meonshow OR linkedIn either the word meonshow or the word linkedin

~home loan loan info for both the word home and its related : plot,flat etc.

define:love definitions of the word love from around the Web.

"Discussions for It people" the exact phrase to each Discussions for It people

virus –computer the word virus but NOT the word computer

+circle Only the word circle, and not the plural or any tenses or synonyms of circle

love * war the words love and war separated by one or more words. Now this is really helpful.

Google also provides an option that says "I'm Feeling Lucky" This takes you directly to first web page returned for your query.

The triple dot operator to search within a range of numbers
For example camera $100..150 will search for cameras between $100 and $150)

link operator example link:www.meonshow.com will find pages that link to the meonshow website.

info to find Info about a page for example info:www.stanford.edu

site: Search only one website example: job site:www.meonshow.com
(Search Meonshow site for jobs info.)

related to find related pages for example related:www.youtube.com will find websites related to the Youtube website.

With this I complete the Mohd Anwar - Google Trick Sheet Part1. This is part1 of my three parts Trick Sheet. Rest later.

Enjoy ;)
Mohd Anwar Jamal Faiz

Friday, July 22, 2011

Stress Testing [What How When]

This post aims to throw light on questions such as, "what is stress testing", "how to do stress testing", "when to do stress testing". So basically, it gives you my visualization of stress testing. Specifically, how i see it and feel of it. In Stress testing you try to break the system under test. Rather you can also call it study of Emotional quotient of your system. How well it behaves when it is subjected to stress. Definitely this means of finding innovative ideas to give the system/process a really really tough time. This can be achieved by expanding its resources or by taking resources away from it. Often in the latter case (but sometimes in both) it is called negative testing. The main purpose behind this testing is to make sure that the system fails and recovers gracefully. So, the keyword here is RECOVERABILTY.

It is to be understood that the performance testing demands a very controlled environment. Since you are going to set baselines and compare against old baselines, you have to be very cautious about the environment, architecture, OS etc. But Stress testing enjoys the beauty of randomness. You may very well doubt on what beauty I am talking about. But seriously, only a Good tester can tell you how much he enjoys in inducing chaos, catches and unpredictability. I felt this pride and fulfillment many times in Adobe and Symantec.

It should be instilled deep that stress testing is not breaking the system purely for the pleasure of breaking it. Rather it allows observation of how the system reacts to failure. It tests recoverability, error messages, breach of security due to unpredictable behavior, hangs etc. For example the simplest you can do is to parallelly run processes that consume resources. This may be CPU, memory, disk, network, database consuming processes. Think about tools and utilities available. For instance read my post related to 'ulimit' tool on linux. [PS: There are thousands of tools. i am just giving an example, because that is also very helpful. And yes, for me you clicking on Advertisements is very helpful.] If no tool is working out you can think of writing you own test application. Simplest is an application with overriden new operator. Look my post on that. Find from references below. Think about doubling the baseline number for concurrent users. What happens if different protocols used to access same system at same time. What happens if the Files being processed are of very large size, or of very small size.

Remember my pictorial representation above. Stress testing means 'giving your application really really tough time. Think about innovative ways to test the Emotional quotient of your system.'

But do remember to come to this test only after your functional and integration testing has been done. If you are only responsible for some module, then you may stress test your module/API/DLL/lib/so (Hmm..anything) once your Acceptance and Unit Testing are finished. Obviously in Agile environment, due to time crunch, Functional testing and stress test can be started in parallel on different systems. Although the former is more important, but unfortunately time is the only thing you go out of often. So stress can be triggered on some machine. And you can analyze results of functional test. And if FT is pass, you can also analyze stress test result. For Antivirus products, you can have a stress file set that contains Zip compression bombs, large files, files having viruses. For Desktop publishing applications, your test set files may contain large application files, fuzzed files, or files not saved properly, or any set of files that are known to give tough times to your system.

References On my Blog:
Ulimit as a tool on Linux for Stress Test
Different types of Software Testing
Overriding new and delete operator for stress testing

Monday, July 18, 2011

Panoramic 3D view from tongue

Welcome to a panaromic view from a tongue. This is obviously created by a brilliant mind. Nico Roig created this fantastic visualization of tongue in mouth at.

Dentistry in depth in Barcelona

It is said that the image of the dentist is real while the mouth is creation. To see the original post Click. So If you ever wanted to see what it's like sitting on the tongue, you have your choice. Yuk!!

Augmented Hyperreality 3D Video visions

Now this is something seriously good invention of its type. The day these types of videos become common and relayed by all DTH or Channel broadcasting services, we will feel we are really at the live location. That would really be the Real LIVE Telecasts ;)

Comment on on did you find this video ;)
Pls Support the blog by Clicking Ads.

Font controlled by face Real-Time

Here comes an intersting news. Font developer Andy Clymer at H&FJ has created a tool that supposedly modifies the type characteristics in real time based on facial expressions. Check out the video:

An excerpt from their own blog,

I’m intrigued by the potential to control local and global qualities of a typeface at the same time: fingers and mouse to design the details, faces and cameras to determine their position in a whole realm of design possibilities. I wonder about the possibilities of a facial feedback loop, in which one’s expression of wonder and delight could instantly undo a moment of evanescent beauty.

I found this really interesting ;)

Wednesday, July 13, 2011

Facebook Friends Phone Directory Print

Now this is a realy really awesome tool by Facebook itself. You can access it here:

To make it specific, if you are logged into your Facebook Account, you can visit the above page to take you to the Telephone directory of your friends. To test you can Click to Get Facebook Friends Telephone Directory

You can print this too ;)

Facebook Friend Collage thumbnail pictures

I have found a hidden [actually not so advertised and well known] Facebook feature. It is the ability to view your friends as a grid of profile pictures.

Here's how to make it happen:

1: Log in to your Facebook account.
2: Click the Friends tab.
3: Select the drop-down box. Choose list separator indicated by (-) or grid option there.

Visual Help: Checkout the screenshot. Click on image to enlarge it.

You shall get a good collage of your entire friends list. The thumbnails photos are arranged in a grid fashion.

Monday, July 11, 2011

ulimit to set linux resource for testing

Recently I started using ulimit. I can seriously recommend ulimit utility as an awesome tool. Its location is /usr/bin/ulimit. Before begining let me accept that the better title for this post would have been 'how to use ulimit on linux' or 'setting resource limit and unset using ulimit', or better still, 'what is ulimit?'. [Huh..but what is wrong with my title ;) ]

Coming back, You can use 'ulimit' to set or display a resource limit. The available options are listed below. The limit for a specified resource is set when the limit is specified. The value of limit can be a number in the unit specified with each resource, or the value unlimited. I dedicate this post to my fellows in my team. My team including my manager is really great.

Back to the ulimit, the various ulimit Command options are as follows:

Lists all of the current resource limits.
The number of 512-byte blocks on the size of core dumps.
The number of K-bytes on the size of the data area.
The number of 512-byte blocks on files that can be written by the current process and its child processes (files of any size may be read). On file systems (such as vxfs file systems) that support large files, setting this limit to unlimited represents the largest file size supported on the file system. See ``Notices'', below.
The number of K-bytes on the size of physical memory.
The number of file descriptors plus 1.
The number of K-bytes on the size of the stack area.
The number of CPU seconds to be used by each process.
The number of K-bytes for virtual memory.
If no option is given, -f is assumed; that is, you can specify a limit with or without the preceding -f option, and both cases are interpreted as an attempt to raise the file size limit.

There is a provision of hard and soft limit. i have never tried that, but in case yo want to explore more you can search ulimit man pages. or can even refer Click

I am attaching screenshot of ulimit -a option. this would clearly show all the limits currently set:

There are two important operands:

1) limit
Gives the resource-specific limit to use as the new resource limit.

2) unlimited
Sets the largest allowable resource limit. It is necessary to set limit to the value unlimited for access to large files.

It is important to note that ulimit works across all flavors of linux. Even on WindRiverLinux. This comes as a very handy tool for QA people testing on unix environments. Once set, you can reset the limits again using the same command. You can also make it unlimited. Following two scenarios are of great use while testing:
1) ulimit -c unlimited: this will make maximum possible space available for making core dumps. This will help fruitful core dump creations to be consumed both by the QA and dev people.
2) ulimit -v unlimited. this will make maximum possible space available for virtual memory. So this can also regulate or simulate low memory conditions.

I guess this much is enuff. Rest you can explore. Please do not forget clicking on a few Advertisements. Google will give ranking and points to my blog, you will get good contents always. ;) rest you know!!!

Scroll bar in HTML Table using DIV and CSS without Javascript

This one was really really tricky. The internet is full with hundreds of different implementations, i dont know why. There are multiple Javascripts mentioned for this. Cross platform concerns are raised for this. Google Chrome not supports..., and Firefox not supports...I dont know what not are mentioned on the internet. A simple google search saying scrollable table in html also does not helps you out.

You can see instances of same problem replicated at hundreds of places some of which are mentioned below. Check out them before reading below. All are awesome workarounds, but none of them tackles the problem.

1) See long javascript implementation at Click here. But problem not solved.
2) See CSS+Javascript workaround at Click here
3) See a solution at Stackoverflow.com at Click here

As mentioned, all the above implementations are ingenious ones. But i dont know why so much pains have been taken up for a simple problem. this also kept me wandering from one solution to other when I wanted one for my own implementation in the facebook application created by Mohd Anwar Jamal Faiz. [Obviously me ;) ]

You can check out this implementation in live at Facebook Application ICEBREAKER. You can search for this App using your facebook account or may also click here Click for FaceBook App Icebreaker. Or if you want to open The icebreaker app direcly in you Facebook account, you may click here For Icebreaker in Facebook account directly

Obviously man! you have to be logged in your facebook account. In case you are not, it may ask you to login. The screen shot is attached here, where you can see the Table having scroll bars. You may click on the photo to enlarge it. [Also, you must click on a few Advertisements. it wont cost you anything, but will help me posting more valuable stuff without trying to find new means of livelihood. Hahaha ;)]

For all the evangelists and critiques, I have tested this implementation over IE6.0+ to IE 9 , FireFox, Google Chrome, PDAs OS and browsers, Blckberry, MacOSX. So I guess I have done a pretty much stable implementation. Hmmm... I think you are appreciating me. ;)

The solution is utterly butterly simple. The trick was straight but only a few can thing it that ways. The scroll attribute can be easily produced using a div element insite the row or column of the table. Undoubtedly, the div will have its inline CSS. you may obviously govern its property using external CSS, but that is obviously not the question.

For example if you have a table code as follows:

<table id="xyz">




blah blah blah





You must rewrite it as follows:

<table id="xyz">




<div id="Anwar_jamal_table_div" style="overflow:auto; height:100px;width:200px;">

blah blah blah







You can adjust The height,Width As You like.

Time for me to end this post. Write to me or comment here, if something really messy you want to do and this post does not helps you. in all cases, click on a few of the Advertisements, as that is my bread and butter boss!!
Cheers ;)

Friday, July 8, 2011

Google chrome wrong message for network diagnostic

If your internet connection is not available or lost, and you try to open some website over the internet using Google Chrome, you get an Error. Absolutely, there is no problem untill now. But Google advises you a method to verify and check the problem. Now if that resolution is wrong, there is a problem. And if the wrong resolution is given by Google, it is a big problem.

The same issue is also posted in Google Chrome Help forums at Click to See this in Google Forum
See the picture for instance: (Click on picture to view it large)

Google says to go to %windir%, which simply means the windows installation folder. On my system it comes out to be C:\windows
After this it says, to launch network diagnostic\xpnetdiag.exe. Now there is no file as such at said location.

Actually there are two problems:

1) If you type what is advised by google on the Start->Run.
%windir%/network diagnostic\xpnetdiag.exe
Then there is a error saying, there is no folder c:\windows/network. Actually the path should be in double quotes. The people proficient in computer systems and troubleshooting would even know this beforehand. But I dont know why Google believes that even general people would know of this.

2) On my system, XP SP3, there was no folder named network diagnostic at all in C:\windows. So that means even if I used double quotes in the path, I got know resolution.

My personal gut feeling is that, Google sould not advise those methods which are not generic. Also, the advises should be easy to understand by the common masses. I guess, my voice being heard.

Thursday, July 7, 2011

Facebook Application Icebreaker by Mohd Anwar Faiz. Do we actually need an Icebreaker Tool? [motivate suggest friends to talk and spread love]

To give a background, Icebreaker is a Facebook Application. IceBreaker is the cute way to spread love and friendship by motivating communication between your friends!!

You ca use the *IceBreaker App* to request your Friend 1 and Friend2 to 'Break the Ice' and Talk with each other. Both of your friends will be informed about your kind gesture on their Facebook Wall. Literally, the phrase 'Break the Ice' means to break down social or emotional stiffness and start talking.

You can visit Icebreaker App on Facebook.Icebreaker App on Facebook. This link may require you to be logged into your Facebbok account. This Application is envisioned, designed, and authored by Mohd Anwar Jamal Faiz. No need to mention, its Me. Cheers ;)

Icebreaker Application is hosted on meonshow servers, as this is a product from the owners of Meonshow. To visit directly the Icebreaker page on Meonshow servers Click hereThis will ask to login through your facebook credentials, if you are not logged in yet.

Now coming back to the question Do we actually need an Icebreaker Tool... I guess this is as trivial question as to ask do we really need to be good. Or keeping it simple, do we really need to advise our friends to talk. I guess, it is an absolute yes. We need to tell our friends that they have not been talking to each other for long. The causes may vary from job, work pressures, family issues, or it can even be as small as forgetting. Whatever be the cause, your request of talking among themselves will be a boost, a reminder to them. This will mature your relations with your friends and also they would start sharing thoughts with each other. Afterall, this is what is life. And this is what Facebook stands for.

You can view this discussion at the official Icebreaker Application discussions page too. Click Here for Icebreaker facebook Discussions Page

Wednesday, July 6, 2011

Terminal (Shell) on Mac OSX or Unix continues to show a folder even if it is deleted or renamed

I have logged this defect with Apple. But since then I have only been told it is legacy Unix behavior. And Unix is supposed to behave that way. In any case, I find it valuable to share this now.

This is already present on Apple Website since 19th March 2010 and has one response in addition to the emails. Read Further Apple Mac OSX Bug By Anwar Faiz.
Make a folder, let us say "xyz" on desktop and cd to this location on a terminal using 'cd' command.
Now rename that folder to "abc".
Now type 'ls' command on Terminal to see the content of folder "xyz", it still shows.
In addition if you use 'pwd' command, it still shows that you are in directory "xyz"
Worse is that even if you delete the folder "xyz" and empty trash. Even then using 'pwd' command would show your present working directory as "xyz" folder.

I got a detailed response for this. The same can be read over at same Apple Official website also. I am thankful to Mr. Bob Harris from New England, USA, who took time to explain.:
All expected behavior.

The 'cd' command makes a chdir() system service call, which opens the target directory and stores the open file descriptor in the process.

When you rename the folder, that just changes the directory entry in its parent folder, it does not change the file system inode for the directory nor does it affect already open file descriptors to the directory.

So when you do an 'ls' with no path, the 'ls' command will ask the file system for the '.' (current directory), which the file systems knows to use the current working directory it already has saved in the process.

This is how Unix has worked forever.

'cd' and 'pwd' are bash built-in commands, so bash has cached the last 'cd' path, and when you issue 'pwd', bash just echos the cached path information. It does not verify anything before displaying the path.

If you want to see the real current path, then try using


this will do the more complex reverse path reconstruction, which can have some unexpected responses, because of symbolic and hard links that may have been used to navigate down to the current directory location.
Worse is that even if you delete the folder "xyz" and empty trash. Even then using 'pwd' command would show your present working directory as "xyz" folder.

Again, bash is just echoing the cached path that bash last knew about.

Also since the process still has an open file descriptor to the directory open in the process as the current working directory, the file system will defer the actual directory delete until after that file descriptor is closed.

The fact that a file or directory will not be truely deleted if it is still open, allows an application to continue to use a file if it has it open, even when some other process deletes the file. This can be good for the application, but if that was a huge file and you were trying to free up space, you would not see the space returned until after the process that has the file open, closes the file.

You can use the 'lsof' command to find what processes have what files/directories open.

In addition, it was advised that, if I have additional Unix or Terminal related questions it would be best to post them in the Mac OS X Technologies > Unix Forum. So, one place where you can also redirect yourself for taking other unix Vodka Shots is Apple Unix Discussions

Monday, July 4, 2011

Mohd Anwar Jamal Faiz listed in Adobe X Credits - adobexcredits -on official Adobe.com website in Licencing and installer technologies

This title seems to be pretty straightforward in explaining what i want to convey.
again is self explanatory:
"Mohd Anwar Jamal Faiz listed in Adobe X Credits on official Adobe.com website in Licencing and installer technologies"

Obviously, Mohd Anwar Jamal Faiz is me ;)

You can see the AdobeXCredits Page here. View AdobeXcredits Page
You may also refer for information on Acrobat X Team Overview

My work in Adobe was truely a great learning experience with best minds of the industry. I could in short summarize my stay in Adobe as follows:

I worked in Adobe Systems from April 2009 - Jan 2011.

You can see the Credits in Adobe Acrobat v 10.1.2 from Help menu. The same is visible in Free downloadable Acrobat X Reader also. I am pasting snapsjot from version 10.1.2

I was Working in Creative Suite Team and helping development and API testing of CS Installer. The development was in Visual Studio 8.0, VC++, and XCode on Mac OSX. The Whitebox Unit test framework was an in-house one:Potluck. I was responsible for developing testcases, writing Unit test cases in VC++, adding to the framework and executing them. The test cases were maintained on TestStudio and for bug/defect tracking we used Watson. I worked in development and enhancement of a White Box Testing Framework and automation of entire process.

The biggest achievement was Develop a System to fully automate the CodeCoverage estimation using BullsEye. I developed the system and in its final forms, it was able to get triggered automatically, all code synched, build, instrumented binaries collected, functional testing done, results analyzed, reports prepared, and finally send via email and on a centralized host server where the reports can be viewed in Flash Swf animation.

I a sort of lead the Whitebox and Security Testing team of 2 people. Apart from using Excel Macros, VBA, various databases, XML, and dozens of utilities, my work primarily circumscribed Whitebox, security, performance, memory leaks testing. Some handy tools were Veracode, AppVerifier, Fortify, DevPartner, WinDbg, IBM Rational Purify, and Glowcode.

Definitely Perforce, MSOutlook, Office, McAfee AV, Google, Yahoomail, and Facebook were in routine ;)

Mohd Anwar Jamal Faiz wins in Symantec Cutting Edge Capture the Flag Hacking Vulnerability contest 2011

I am glad to post this news to my readers. The tilte is self explanatory:
"Mohd Anwar Jamal Faiz wins in Symantec Cutting Edge Capture the Flag Hacking Vulnerability contest 2011"

Obviously, Mohd Anwar jamal Faiz is me ;)

Symantec Cutting Edge Winners

You can click on the above link to find all Cutting Edge 2011 winners and also look at my photo.

Friday, July 1, 2011

Javascript to open new popup window center on screen

I have met this requirement several times and have written this many times from scratch.
I seem to forget the syntax and refer on the internet again and again. this time I formaly wanted to give it a place on my blog itself.
So here comes a simple java script function that opens a new pop-up window and puts it on middle of screen :-

For example you may try out the following link...
Click Here to open POPUP WINDOW

Clicking on the above link will open a new window. Voila!! U achieved a popup window. True, it was as easy as this. But the syntax to open a new window should be kept in mind.

You can return to this blog, whenever you feel like. There are a lots more advices, secret tricks, tips in programming. I do this for joy and passion. But no wrong if I request you to click on few of the Advertisement links. It would help me getting my bread and butter.

And for you all, I promise that the next article will be a very buttery. Yum! Yum!

Thursday, June 30, 2011

Tar command in Linux [additional notes in Freebsd] to archive and extract contents (तार कमांड इन लिनुक्स)

'tar' command in linux is used to make archive and also to extract from the tar archive. Actually TAR is a file compression format and linux supports it very well. It is also used synonymously with TGZ sometimes. The same 'tar' command is used to create as well as extract from a tar.

A) To Create linux tar gz (Gzip) archive
tar -czvf myarchive.tgz mydirectory/
-c, –create create a new archive

In Freebsd there is no -v -z options so simple command like :
tar -cf would do it.

If you use -w , then it will prompt you at every file. -v will give you a verbose output at each line.

It is important to note that .tgz is the same thing as .tar.gz

B)To Create linux simple tar archive without any compression
tar -cvf myarchive.tar mydirectory/

C) For Extracting linux tar archive:
tar -xzvf mystuff.tgz
-x tells to extract the files form the tar archive
You can remove z if it is a simple tar file.

There are a lot more options available that you can get to know using man or --help. Also, a good book on linux will help you learn more on file compression decompresion and tar zip commands etc. The things i mentioned, will suffice your daily needs anyways. Cheers ;)

Wednesday, June 22, 2011

Access copy Share files between Host and guest file system in VMware virtual machine

There is definitely ways to achieve the task. It all depends on the choice of the host machine you are using and the guest OS in the VMware. Just keep in mind the following matrix:

WinWinwindows file sharing
WinLinuxsamba, ssh

The same above in graphics is

To summarize:
# If Both systems run Windows operating system, you can use Windows file sharing
# If You are connecting from a Linux system to a Windows system, you can use smbmount
# If You are connecting from a Windows system to a Linux system, use Samba
# If Both systems run Linux operating systems, use NFS, FTP and Telnet

For more detailed description you can also visit VMWare official website document on this topic at the following location. Click Here for VMWare Help

In order to share folders between the host operating system and the guest operating system you can use VMWare settings. Go to VM->Settings->options

The same is shown in the adjacent snapshot.
Added notes in July 2012 :-- VMware Workstation 4 Features | Documentation | Knowledge Base | Discussion Forums Prev Contents Last Next Using Shared Folders With shared folders, you can easily share files among virtual machines and the host computer. To use shared folders, you must have the current version of VMware Tools installed in the guest operating system and you must use the Virtual Machine Control Panel to specify which directories are to be shared. You can use shared folders with virtual machines running the following guest operating systems: Windows Server 2003 Windows XP Windows 2000 Windows NT 4.0 Linux with a kernel version of 2.4 or higher To set up one or more shared folders for a virtual machine, be sure the virtual machine is open in Workstation and click its tab to make it the active virtual machine. Go to Edit > Virtual Machine Settings > Options and click Shared folders. You can add one or more directories to the list. Those directories may be on the host computer or they may be network directories accessible from the host computer. In a Windows virtual machine, shared folders appear in My Network Places (Network Neighborhood in a Windows NT virtual machine) under VMware Shared Folders. For example, if you specify the name Test files for one of your shared folders, you can navigate to it by opening My Network Places > VMware Shared Folders > .host > Shared Folders > Test files. You can also go directly to the folder using the UNC path \\.host\Shared Folders\Test files. You can map a shared folder to a drive letter just as you would with a network share. Note: To see shared folders displayed in this way, you must update VMware Tools in the virtual machine to the current version. If your guest operating system has the version of VMware Tools that shipped with VMware Workstation 4.0, shared folders appear as folders on a designated drive letter. In a Linux virtual machine, shared folders appear under /mnt/hgfs. So the shared folder in this example would appear as /mnt/hgfs/Test files.

Vmware and sharing rocks!!

Tuesday, June 21, 2011

inurl search fails on Google - Is it not a Google hack or failure

Earlier you must have used inurl: searches in Google Search Engine.
But today i found out that it fails.

I looked for query : inurl:adobe
And nothing comes up.

Then i searched for inudl:adobe and several results come up.
I am also advised to search for inurl:adobe instead.

But again on clicking the Link the Google Search Engine stopped responding.

I rechecked this many times today.

Someone from Google, have a look!!
1) Please advertise if the support has ended
2) In any case the search engine should not get confused and must not hang.

Friday, June 17, 2011

Advantage of computer animation and 3d in school education and children in particular

This is a great article from Bangkokpost.com. To read in Full Click Animation Advantage Article


When we see children using computers, we tend to assume they are gaming addicts. But think again.

Students at Chulalongkorn University's Demonstration Elementary School, or Satit Chula, are ready to prove that computers can provide a platform where imagination and joy come together in creative ways.

The school is the country's first institution where primary students can display their talents and inventiveness via computer 3D animation.

The school recently held the CUD Character Design Contest, titled ''My School Bus.'' Eighty-six students submitted their inventions and seven of them were chosen for the final round.

People usually think that animation is about the matter of technique, but in fact it is art, the computer is just a tool to help students to deal with it more easily.


Free Web Hosting Ultimate Solution

Free cPanel Web Hosting with PHP5/Mysql - no advertising!
Register now: http://www.000webhost.com/463696.html

We can offer you a free web hosting package packed with advanced features for hosting & building professional dynamic websites. We provide secure free web space with all the web hosting tools you could possibly ever need.

Our package includes:
- 1500 MB of Disk Space, 100 GB Bandwidth
- Host your own domain (http://www.yourdomain.com)
- cPanel Powered Hosting (you will love it)
- Over 500 website templates ready to download
- Easy to use website builder
- Free POP3 Email Box with Webmail access
- FTP and Web based File Manager
- PHP, MySQL, Perl, CGI, Ruby.
- And many more..

Click here to visit us: http://www.000webhost.com/463696.html

Thursday, June 16, 2011

Keyboard shortcuts for VMware

I am listing some keyboard shortcuts for VMWare. These have been prepared by learning, help docs and the internet. Please comment if I miss something important, or if any thing is not working with the version you are using.

F11 switch to full-screen mode and also back to normal mode
Ctrl-Alt-Insert Like a Ctrl-Alt-Delete to the VMware OS running
Ctrl-Alt used for mouse release and exit full screen mode
Ctrl-Alt-Enter VM into full-screen.
Also acts like Tab in windows to choose between VMs
Ctrl-Alt-Tab switch between multiple VM.

Ctrl+N create a new VM for you
Ctrl+O open a new VM for you
Ctrl+P edit VMware settings and Preferences
Ctrl+B power on some VM
Ctrl+E power off
Ctrl+R reset power
Ctrl+Z suspend some VM

Oh cumon! I am not giving all keyboard shortcuts. The UI is rich enough. But actually these are often required especially when your mouse starts non-responsive. Afterall, VMware and OS are also softwares. And they can be buggy sometimes ;) Hope you find this cool/

Free National Aptitude Test Talenthunt 2011

I came across a link www.nationaltalenthunt.com conducting a Free
National Aptitude Test on Sept 4, 2011. If it interest anyone, he/she may visit
the site. Please be advised that I have no relation with the aforementioned organization and have not tested any credibilty or quality of test.
Just wanted to pass the info.

Tuesday, May 17, 2011

Hoax/Fraud email: Yahoo sevice account Closure Hoax

Hi All,
I have received this email twice and one of my frends also got the same. The message is attached below:
Last Warning!!!!!Monday, May 16, 2011 12:02 PM
From: "Yahoo sevice account" Add sender to ContactsTo: undisclosed-recipients

This is an Official alert to inform Yahoo! account users.

We regret to announce to you that with the rate at which we have newly registered members everyday, our data base is getting congested and now we have decided to under go deactivation of all unused account and some other of our account we find error on for both premium and free accounts.

Every account owner that receives this message has encountered this error and will have to update his/her account with the requested information below.
Please be sure to click the REPLY button first before attempting to fill the info.

Name: ................
ID: ..........
Current Pass word: .................
Date of Sign up(Optional): ..........

After you must have filled this information and have it sent back to us, your Yahoo! account will not be interrupted/terminated and will continue as normal.

WARNING: Account owner that receives this message and refuses to update his/her account within the next 48Hours will be terminated from the Administrator's dept.

Thank you for your usual co-operation. We apologize for any inconvenience.

Yahoo! Account Services


Now frends please remember that these type of emails are all scams. Never reveal your identity to them. Some red flags to notice a scam as can be seen here:
1) See the Sender "Yahoo sevice account". Spelling Mistake!! Not even SERVICE was spelt properly
2) Another, notice that it was not send you personally. Rather it was send to undisclosed recipients.
3) Why would Yahoo ask password and id details from you. Dont they have these details.
4) A simple header search of email tells that it is not coming from Yahoo.com. Though it seems but it is very easy trick. I can send you email from NASA, Bill Gates, US Prez, Any Superstar official email id, Without even an effort of 2 minutes. Some times later on that ;)

So please be aware of these types of scam. They can also be categorised in Phishing attacks.
Take care.
And enjoy. Yahoo not closing your account!!!

Tuesday, April 26, 2011

Visual Studio C++ : fatal error C1902: Program database manager mismatch

Visual C++ gave to me an error which I didn’t see earlier. It was a fatal error. The error message was:
“fatal error C1902: Program database manager mismatch; please check your installation”

In order to solve this issue do the following steps:
1: Once you have installed VC++, goto the IDE folder of the Visual Studio 2005 install. It is usually at
"C:\Program Files\Microsoft Visual Studio 8\Common7\IDE"
2: Copy these 3 files:


Copy these to the "\VC\bin" directory of the Visual Studio 2008 installation. It is usually at
"C:\Program Files\Microsoft Visual Studio 9.0\VC\bin"

You can find related article at Softpedia Article
Detailed description of this problem and causes can also be found on Fatal Error C1902 provided by MSDN Community Content - Visual C++.

This would solve the problem. The reason of the error is that the vesrion of these files especially in the 2008 edition are mismatching and do not have compatibility with each other. The program database file (.pdb) were created using a newer version of mspdbXX.dll [eg. Mspdb70.dll]. This may not be the one with the compiler found on your system. This error usually indicates that mspdbsrv.exe or mspdbcore.dll are missing. Also there is a chance that they have different versions than mspdbXX.dll. So the solution would be ensuring that the same versions of mspdbsrv.exe, mspdbcore.dll, and mspdbXX.dll are present on your installed file system. This is small step but if this workaround is not known, it would waste your time in installing, reinstalling Visual C++. Hope this helps if ever you fall into this trap. ;) Enjoy.

Wednesday, April 20, 2011

How to tackle the problem of opening PDF docs in Web Browser when Adobe PDF Reader not installed.

It is often said that you must not forget your enemies however small it may seem.One such scenario came when one of my close acquaintance Mr Sandeep wanted to show PDF docs on his website. Now you may say what makes it a big deal to devote a blog post for this?
However the problem was that my friend wanted to show his PDF links even if Adobe Reader was not installed on his client machine. True that this situation is rare , but what is to be done if as a consultant you are posed such questions. Let's all see how the problem has to be tackled.

There are two important points regarding the problem:

1) The AdobeReader not installed on the machine is very rare situation. It is a free tool easily downloadable and installable from Adobe website. It has penetration of 99.9% worlds computer . That is 99.9% computers using Internet have this already installed. All computer manufacturers give this preloaded and free. So even if your client is having problem of not having this you can ask him to install it without any business, reputational, or efficacy loss.

2) Now a dayz many browsers also have inbuilt AdobeReader. Since adobe does not charge other companies from using this. So new browsers have this automatic pluging. Eg in Google Chrome, Internet Explorer 10, Mozilla Firefox. Browsers which dont have this, for them plugins come. So in any case if your client is not able to view PDF, it is not even slightest of your problem to worry. You can also give a link to download Adobe reader, free of cost, Since Adobe has free distribution as well as redistribution policy. Or in best case show them downloadable link from Adobe website itself.

In all other cases if you are too vigorous for perfection (which i wud really say too! coz even if u miss that , its not a big deal). Then in that case I give you the easiest, trickiest, and free to use idea.
This idea uses Google docs.

Suppose you have a PDF doc -->abc.pdf
It is stored at any location on your server-->www.meonshow.com/abc.pdf
Then use the following Link to open that

Rest can be tested urself. You can modify the parts of pages that has to be shown. A simple HTML editing and rendering the page in Frame or I-Frame.

For Example: Click Here to view Mohd Anwar Jamal Faiz Latest Resume.

Other ideas can be to search the enormous web and to use some quality free tools for the purpose. Or pdf to SWF converters or make some customized Flex/Flash Application that can do that job properly. Search madxperts or codebox website. They have this I guess.

Hey readers, I forgot to mention one important issue in any case. Behold. Its not related to IT. I am married now. Wow!! Please give your blessings to our family. Will give accounts in some other post.
Bye till then.

Mohd Anwar Jamal Faiz

Thursday, February 17, 2011

Starting process in background in windows using : start /b and start /priority

This information that I am posting came as a surprise to me two years back. And sine one year I have seen its usage groeing in my day to day job at Software Divisions of MNCs. Jokes apart, various automations that I did used the following concept in some way or the other. Sometimes the bat scripts and some times the python scripts.

Actually in Unix/Linux shells and hence in beautiful Mac machines I owned at Adobe Systems, there was an option to start a process in the “background” by (i.e. in bash) typing “./&“, or you may try pressing Ctrl-Z and then “bg“. The process then prints its output to stdout as usual, but the bash runs in the foreground and receives console stdin. The task was easy.

But in Windows, mere calling the exe would not do this job that easily done. But something similar can be done by doing: start /b . This would run the process in the background, and its output is printed to your stdout, even though cmd continues running immediately and receives your stdin. Be warned that if you do “start ” without the “/b” switch, then the process runs in another window, which closes when it exits.

There is yet another switch for “start” is /priority, which I learnt only after joining Symantec Software. In this command the ‘priority’ is the name of a process priority string. For example “start /b /realtime pslist” can be used to get a pslist output that runs in realtime priority.

Intresting trick to Show your name after Time in Taskbar

To help young ones and also to the grown up prank players, I am again with a simple trick. This time it is something unusual. You can add your name (If you want even my name is good enuff!!) in place of AM and PM beside the time. This would be catchy in your group of friend/ colleagues. Just to add, my best friend Sadiyah Ozair loves to know about these small lil tricks. She is an avid computer/internet/social-networking user though (I think Mark Zuckerburg should hire both of us for using his virtual space FB.com to love, fight,discuss and romance!!)

You can start by going to Start -> Control Panel -> Regional and Language option -> Press Customize button -> Go to TIME tab -> Change AM symbol and PM symbol from AM and PM to your name -> Apply -> Ok.
Has it changed?
Have patience…Sometimes you need an additional setting too. Go to the Time in taskbar and Double Click it to open "Date and time property" .Look place where time changes in digital form i.e. 02:47:52 AM. Now you have to click the arrow to change the AM or PM. This will popup your name (that I believe is legitimately yours. Rolf!!!). Apply OK there.
Mission Accompalished!!!

Making your System available with a Domain like name in Network

The key lies in installing IIS over your machine. This makes you machine a server. While working for Adobe System I owned eight Systems ( Three of them were Mac machines. Beautiful!!!) One of the machine has to be made a dedicated system to host our Bulls Eye Coverage reports (On this some other time!!) So I chose the system name to be cportal. The task was to make this available when any connected system on LAN typed ‘cportal’ over their browser. (@My Friend Anil Berry: Hey! It was not a Red File Secret Code. It was just that I never had time and many times forgot to tell you about this. Sorry for being so late, but now having posted this, I guess your problem would go fixed!!!)

The steps are pretty much simple.
Give machine a name eg cportal. Make it available on your domain. Test by ping cportal from other computer. Accessing it on local area network
In network&internet homegroup
Change advanced sharing settings. Select domain tab arrow key
Turn on network discovery :ON
Turn On FILE and printer sharing :ONPublic Folder sharing : ON
Now from other computer just writing
http://cportal your IIS page opens up.

A brief note on Normalization Forms in Database

The First normal form (1NF) sets the basic rules for an organized database. These rules relate to firstly, Eliminate duplicative columns from the same database table. Secondly, To create separate tables for each group of related data and identify each row with a unique column or set of columns (the primary key). The Second normal form (2NF) further Handles the concept of removing duplicative data. Firstly, It must meet all the requirements of the first normal form. And then remove subsets of data that apply to multiple rows of a table and place them in separate tables. In addition we must create relationships between these new tables and their predecessors through the use of foreign keys. The Third normal form (3NF) goes one large step further. Firstly, it must meet all the requirements of the second normal form. And then, remove columns that are not dependent upon the primary key. And the fourth normal form (4NF) has one additional requirement other than meeting all the requirements of the third normal form. It is maintained that a relation is in 4NF if it has no multi-valued dependencies

Logical Partition of Hard Disk/Drive without any additional Softwares

It often comes that you wish to use one partition to install the operating system and critical apps and another for your data files, which will simplify backup tasks. Or, you may just want to have your personal files stored in a separate looking disk. For this you have to do a partioning. There are basically three modes to do that. Third is simple, you have to use some Third party Application to do that. A simple Google search will reveal hundreds of such tools easily downloadable. (Understand the risks involved). In addition, there are two simple ways to get your job done.

Partitioning while Installation of Windows:

At time of Windows Installation process, you may Format and create the partitions. This is the most used, relevant and usual way to go about.

Partitioning when OS already Installed (particularly Windows):

To set up a new or existing drive in Windows Operating System, you have to use a trick. Go to Start, Settings, Control Panel, and click Administrative Tools, Computer Management, Storage, Disk Management. Your drive will appear. You will see new drives as unformatted space. Partition this space by right-clicking in the unformatted area and selecting New Partition. Then right-click in the partition and choose New Logical Drive.

What you must essentially know in interview of freshers in OOP Concepts

I dedicate this post to my junior roomies at sometime and more like younger brothers to me namely Ali the Smarty, Sadiq the Shera, Mudassir pucchu turned hunk, Fahed Aloo baba, Sufian cell phone love expert, and last but not the least to Mohsin. (Is anyone hearing!!!)

This post is aimed at dealing with information needed for freshers related to object oriented Programming concepts. Many of my friend’s siblings and friends have asked me several times about what knowledge is extremely important for an interview related to OOPS. And ‘extremely’ word is so catchy.

Actually what I outlined below is a possible list of question that is certain to be asked directly or indirectly. You can have great understanding on W3C School. But you must have practical exposure to programming of these . Or say, in least you must know atleast one working example that includes all the following concepts. In any case, essentially the interviews of fresh computer engineering graduates shall have following questions.

What is Object Oriented Programming Language?

The language, which obeys all the basic principles of Object Oriented Programming, which are Encapsulation, Inheritance and Polymorphism, is generally known as Object Oriented Programming Language. Languages like c++ and java are some well-known Object Oriented Programming Languages

What is Polymorphism?

The meaning of Polymorphism is something like one name many forms. Polymorphism enables one entity to be used as general category for different types of actions. The specific action is determined by the exact nature of the situation. The concept of polymorphism can be explained as “one interface, multiple methods”.

What is Inheritance?

Inheritance is the process of basing one class on another. In this process, a base class provides methods, properties, and other members to a derived class. The advantage of inheritance is that you can write and maintain code once it is in the base class and reuse it over and over in the derived classes. But the main draw back of Java is it doesn’t support multiple Inheritances; hence to over come this draw back Java provides us the Interface concept.

What is Encapsulation?

Encapsulation is a process of binding or wrapping the data and the codes that operates on the data into a single entity. This keeps the data safe from outside interface and misuse.

Why JAVA is known as securable language?

There are two reasons behind this. The first one is, as JAVA runs in JVM, which is a virtual machine, and it converts source code to byte code, which is not understandable for humans, so its safe. The second reason is JAVA does not support the Pointer concept, hence we can say that JAVA is a securable language.

What is the necessity of Interface?

As java is a Partially Object Oriented language, and it does not support the multiple inheritance concepts, it creates problem for the developers. To over come this situation JAVA provides Interface concept for multiple inheritance

What is Abstraction?

An essential element of object-oriented programming is abstraction. Abstraction is the process to hide the complexity. A powerful way to manage abstraction is through the use of hierarchical classifications. This allows programmer to understand the semantics of complex system.

What is Class and Object?

A class defines the abstract characteristics of a thing (object), including the thing’s characteristics, like its attributes or properties and the things it can do .The code for a class should be relatively self-contained. Collectively, the properties and methods defined by a class are called members. Object a particular instance of a class. Object holds the characteristics of the Class. The set of values of the attributes of a particular object is called its state.

Is JAVA a completely Object Oriented Programming Language?

The answer to this question is certainly no. The reason behind this is JAVA does not obey the OOPs concept purely. Certain concepts like Operator over loading and Multiple Inheritance are not supported by JAVA. Hence JAVA is known as Partially Object Oriented Programming Language.

In addition, it is advisable to know practical programs related to this. You also get to know about function overloading and overriding, multiple and multilevel inheritance, virtual functions, copy constructor, Final Class, Throwable etc.

You can befriend me at ..FaceBook..
Read jokes at ..Jokes Limitless..

Unix Commands related to Handling files

Without an introductory speech let me come directly to the point.
Listing files in a directory

list the files in the current directory
ls -a
list ALL files, even ones which begin with a dot, which are normally omitted
ls -s
list files, with their sizes
ls -l
list files, giving full details about each file
ls -al mydir/
list all files in directory mydir (including those beginning with a dot), giving full details about each file
ls *.c
list the files which end ".c"
ls mydir/
list the files in directory mydir

Moving or renaming files (IMHO please consider both the same if you are on Unix flavored OS or on Mac)
mv oldname newname
rename a file
mv myfile mydir
move a file into another directory
mv myfile1 myfile2 myfile3 mydir
move several files into another directory

To Copy files
cp oldname newname
make a copy of a file
cp myfile mydir
make a copy of a file in another directory
cp myfile1 myfile2 myfile3 mydir
make a copy of several files in another directory

To Delete files
rm file...
delete the specified files
rm -i file...
ask for confirmation before deletion
rm -f file...
don't ask for confirmation before deletion. BE CAREFUL!
rm -r directory
Delete directory and everything in it. BE CAREFUL! To remove empty directories, see rmdir
rm -rf directory
Delete directory and everything in it, without asking for confirmation. Hey man its not the magic. Actually –rf tells the OS to suppress asking for confirmation. Actually there is never a magic in Software Arena. It’s all how deeper you go, and how diversified the developers approached to a problem. But defects/bug usually come as a magic!! (Some say, if you understand a woman, it is a magic in itself. Have I understood my Girlfriend and would be wife yet!!!!)

You can write me at toughjamy@yahoo.com.
To Know me professionally visit ..Linked In..
You can befriend me at ..FaceBook..
Read jokes at ..Jokes Limitless..
You can also know more about me at ToughJamy : An Informal Me!!

Types of Software Testing

Oh Please! This post is not describing Black box and Whitebox testing etc. For this consult Textbooks (best resource) or millions of website over this. This is just to give you a checklist of various subcategories, each of which is done for different purposes, and often using different techniques.

• Functionality testing to verify the proper functionality of the software, including validation of system and business requirements, validation of formulas and calculations, as well as testing of user interface functionality. Basically testing whether it does what it intends to do.

• Usability testing to ensure that the software is easy and intuitive to use.

• Multithreading testing to see what is impact of running several threads.

• Performance testing to see how well software performs in terms of the speed of computations and responsiveness to the end-user. Just see the time and resources being consumed up. Sometimes even preparing a baseline even sucks!!! At Symantec we clubbed this together with some other stuff and collectively Called this persistence testing.

• Internationalization and Locale testing. Cum’on this needs no explaination for a tester. And if you are not the one, you would never want to know that. Ah! Actually it is beyond the scope to describe how it is done. Since linguistics testing also sometimes get clubbed with this. Some other time..

• Scalability testing to ensure that the software will function well as the number of users and size of databases increase.

• Stress testing to see how the system performs under extreme conditions, such as a very large number of simultaneous users.

• Forced error testing, or attempting to break and fix the software during testing so that customers do not break it in production. That is where hacking also comes into picture

• PCI Compliance testing. This becomes very important if your sales ( bread and butter guys!!) comes from online payment. The Online payment Industry has strict guidelines on Security testing and audits. Veracode again come into picture if you want to outsource this work to a professionally organized group.

• Compatibility testing to check that your software is compatible with various hardware platforms, operating systems, other software packages, and even previous releases of the same software. I remember days when in Adobe I was once testing AcrobatX. It was a really really huge task. You can see my name in Credits page on Adobe Website. Refer Anwar in AcrobatX Credits

• Application security testing to make sure that valuable and sensitive data cannot be accessed inappropriately or compromised under concerted attack. Using your coding, tweaking pointers, tweaking built in operators such as new/delete, using tools like BoundsChecker, Fortify, Application Verifier etc come to your rescue. You can also employ Veracode (See my previous details on VeraCode )

An Introductory lesson on Emergence of Relational Database Management Systems

From the older days of Data backup in notebooks and registers we graduated to Computer Systems having File based data storage systems. A major advent was seen when DBMS were pooping up. And now we live in ages of RDBMS ie. Relational Database management Systems. I have chosen three RDMS for my introductory lesson, typically because they are widely used in Enterprises.
Apart from what outlined below, you have MySQL, Sqllite3, Excel, Acces, and many more.

Let me start with the Oracle. Refer Oracle.comThis database has many features that makes it well suited to data warehousing, including support for very large databases, automated summary management, and an embedded multidimensional OLAP engine. It was 1970, when Dr E F Codd published a paper entitled A Relational Model of Data for Large Shared Data Banks. This relational model, sponsored by IBM, then came to be accepted as the definitive model for relational database management systems – RDBMS. IBM developed a language to manipulate the data stored within Codd's model, which was originally called Structured English Query Language, or SEQUEL, with the word 'English' later being dropped in favor Structured Query Language – SQL. In 1979 a company called Relational Software, Inc. released the first commercially available implementation of SQL. Relational Software later came to be known as Oracle Corporation.

Second in my list is about PostgreSQL. You can see details Go Here For PostGre Official Website, which is Unix-based freeware Object-Relational Database Management System supporting almost all SQL constructs. It includes sub-selects, transactions, and user-defined types and functions. It supports everything from basic table structures, to extremely large datasets. This flexibility allows PostgreSQL to compete with MySQL, SQL Server, Oracle, and Sybase etc.
The name PostgreSQL, was chosen to reflect the relationship between original Postgres and the more recent versions with SQL capability. With the version 6.x series of PostgreSQL, the emphasis has shifted from identifying and understanding existing problems in the backend to augmenting features and capabilities. The overall backend code speed has been increased by approximately 30%, and the backend startup time has decreased 50%, though some people say it go as low as by 83%( I don’t know from where has this figure emerged!!!)
Third is about SQL Server that is a relational database management by BigB Microsoft (Possibly the diverse areas MS is into has made it to remain the king even today. All kudos to Bill Gates). SQLServer supports more than SQL. It is easy to manage and provides a separate OLAP engine. It is the ideal database on web applications constructed in ASP.Net. It links possibly best with ADO.Net (All from Microsft!!. That does not means it does not suits to others. Actually it is what is called a cure to all remedies. This also tells me that it is well suited in Remedy Tool too. On this, some other time though.) One important point is that the SQL Server currently runs only on the Windows operating systems, and MS has no plans for porting it to other platforms (After all BigB has all choices to make. Ahem Ahem!!) has been disclosed.

The Microsoft SQL Server originated in Sybase SQL Server, and it was Microsoft's pleasant entry to the enterprise-level database market. It was first launched in the onset of 1992 ( Though I am poor in dates. But I remember this because I learned this for my theory paper of Engineering. How I managed to have time for studying with my Girlfriend Sadiyah sitting in same class is a different story. Some other time, on some other blog…) I would conclude with my last sentence tht Oracle and SQLServer still remain the biggest of all RDBMS systems currently used in enterprises, but slowly the paradigm is changing. We all seem to be much happier with open sources softwares. (Hey but I heard Oracle keen to buy MySQL!!!)

Using Torpark Browser to surf Anonymously

Opening proxy server to surf through or using proxy software like Anonymizer refer, has been the real solution for this through decades. There is yet another solution, novel in its kind. Torpark, which is a Firefox-based browser designed to access the Tor network of encrypted proxies. You can see more info at https://xerobank.com/download/xb-browser/

When you use the Torpark browser, your Web session iterates through multiple secure proxies, encrypted, until your request reaches its destination. Torpark is a quick download and and you can just launch the executable when you need it.

For downloading you can go to URL http://www.brothersoft.com/xb-browser-torpark-75427.html

It should be remembered that, Secure browsing is considerably slower than regular browsing.

You can write me at toughjamy@yahoo.com.
To see my Dynamic profile visit ..MeOnShow Profile..
To Know me professionally visit ..Linked In..
You can befriend me at ..FaceBook..
Read jokes at ..Jokes Limitless..

Diagnose and analyse Windows Operating System issues Using Event IDs

Event viewer is the tool that helps your butts here. Anytime your system crashes or an application freezes up, Event Viewer dutifully logs the error. It is under Start, Settings, Control Panel, Administrative Tools, Event Viewer. The utility's System node logs Windows issues and the Application node logs issues with other software. In addition, any Third-party apps might create more nodes. Events are fairly self-explanatory in themselves. The date/time of each event are logged along with its source and some relevant information. The list is usually long but the 'Information' labelled events are generally ignored. The 'Error' and 'Warning' entries are what you should deal with.

In the Event Properties window, there is detailed information about the error in question and a link to the Microsoft’s support Web site. The link will open a detailed page within the Windows Help application for the error.

Using Keypad if your Mouse is not working properly

It is a simple trick. Just Press Left Alt + Left Shift + Num Lock Button + Ok
Now you can move mouse pointers with the help of Numeric Keypad.
7 8 9

4 6

1 2 3
For a Normal Click (usually Left Click in Windows) you can press 5.

enable Folder option if it is not visible

This was a secret Trick on how to enable Folder option if it is not visible. Now it is no more a secret. But who cares. It still remains a 'trick'!!

Often due to virus attack etc, users face a common problem on Windows Systems. Sometimes the "show hidden files and folders" option is not enabled. Even if enabled, you can not view the hidden folders.

In such a case, open RUN, type regedit to open Registry editor. Search for “HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Explorer\Advanced”. In the pane on the right side modify the value of “Hidden” to 1 and refresh My Computer window. You shall be be able to see hidden files now.

List of Keyboard Shortcuts In MicroSoft PowerPoint

Hey, I got this list from Internet and the source claimed that he following is borrowed straight out of the PowerPoint 2000 Help File. I respect the author but the authenticity of each command is open for your test.

Function Keys

F1 Display Help or the Office Assistant
SHIFT+F1 Start context-sensitive Help
F2 Select the text box (with text or an object selected inside the text box) or select the text within a text box (with the text box selected)
ALT+F2 Carry out Save As command
ALT+SHIFT+F2 Carry out Save command (File menu)
SHIFT+F3 Change the case of letters
F4 Repeat the last action
SHIFT+F4 Repeat the last Find (Find Next)
CTRL+F4 Close the window
ALT+F4 Quit PowerPoint
ALT+SHIFT+F4 Quit PowerPoint
F5 Carry out Slide Show command (View menu)
CTRL+F5 Restore the presentation window size
ALT+F5 Restore the program window size
F6 Move to the next pane
SHIFT+F6 Move to the previous pane
CTRL+F6 Move to the next presentation window
CTRL+SHIFT+F6 Move to the previous presentation window
F7 Carry out Spelling command (Tools menu)
CTRL+F7 Carry out Move command (presentation Control menu)
ALT+F7 Find next misspelling (Automatic Spell Checking enabled)
CTRL+F8 Carry out Size command (presentation Control menu)
F10 Activate the menu bar
SHIFT+F10 Display a shortcut menu
CTRL+F10 Maximize the presentation window
ALT+F10 Maximize the program window
CTRL+SHIFT+F10 Activate the menu bar
ALT+F11 Display Visual Basic code
F12 Carry out Save As command (File menu)
SHIFT+F12 Carry out Save command (File menu)
CTRL+F12 Carry out Open command (File menu)
CTRL+SHIFT+F12 Carry out Print command (File menu)

Keys for working with presentations

CTRL+N Create a new presentation
CTRL+M Insert a new slide
CTRL+D Make a copy of the selected slide
CTRL+O Open a presentation
CTRL+W Close a presentation
CTRL+P Print a presentation
CTRL+S Save a presentation
F5 Run a presentation
ALT+F4 Quit PowerPoint
CTRL+F Find text, formatting, and special items
CTRL+H Replace text, specific formatting, and special items
CTRL+K Insert a hyperlink
F7 Check spelling
ESC Cancel an action
CTRL+Z Undo an action
CTRL+Y Redo or repeat an action
F6 Switch to the next pane (clockwise)
SHIFT+F6 Switch to the previous pane (counterclockwise)

Keys for browsing hyperlinks in a slide show

TAB Go to the first or next hyperlink
SHIFT+TAB Go to the last or previous hyperlink
ENTER while a hyperlink is selected Perform the "mouse click" behavior of the selected hyperlink
SHIFT+ENTER while a hyperlink is selected Perform the "mouse over" behavior of the selected hyperlink

Keys for deleting and copying text and objects

BACKSPACE Delete one character to the left
CTRL+BACKSPACE Delete one word to the left
DELETE Delete one character to the right
CTRL+DELETE Delete one word to the right
CTRL+X Cut selected object
CTRL+C Copy selected object
CTRL+V Paste cut or copied object
CTRL+Z Undo the last action
Keys for moving around in text
LEFT ARROW One character to the left
RIGHT ARROW One character to the right
UP ARROW One line up
DOWN ARROW One line down
CTRL+LEFT ARROW One word to the left
CTRL+RIGHT ARROW One word to the right
END To the end of a line
HOME To the beginning of a line
CTRL+UP ARROW Up one paragraph
CTRL+DOWN ARROW Down one paragraph
CTRL+END To the end of a text box
CTRL+HOME To the beginning of a text box
CTRL+ENTER To the next title or body text placeholder (see note)
SHIFT+F4 To repeat the last Find action

Keys for selecting text and objects

SHIFT+RIGHT ARROW One character to the right
SHIFT+LEFT ARROW One character to the left
CTRL+SHIFT+RIGHT ARROW To the end of a word
CTRL+SHIFT+LEFT ARROW To the beginning of a word
SHIFT+UP ARROW One line up
SHIFT+DOWN ARROW One line down
ESC An object (with text selected inside the object)
TAB or SHIFT+TAB until the object you want is selected An object (with an object selected)
ENTER Text within an object
CTRL+A (in the slide pane) All objects
CTRL+A (in slide sorter view) All slides
CTRL+A (in the outline pane) All text

Change or resize the font

CTRL+SHIFT+P Change the font size
CTRL+SHIFT+> Increase the font size
CTRL+SHIFT+< Decrease the font size
CTRL+SHIFT+F Change the font

Apply character formats

CTRL+T Change the formatting of characters (Font command, Format menu)
SHIFT+F3 Change the case of letters
CTRL+B Apply bold formatting
CTRL+U Apply an underline
CTRL+I Apply italic formatting
CTRL+EQUAL SIGN Apply subscript formatting (automatic spacing)
CTRL+SHIFT+PLUS SIGN Apply superscript formatting (automatic spacing)
CTRL+SPACEBAR Remove manual character formatting

Copy text formats

CTRL+SHIFT+C Copy formats
CTRL+SHIFT+V Paste formats
Align paragraphs
CTRL+E Center a paragraph
CTRL+J Justify a paragraph
CTRL+L Left align a paragraph
CTRL+R Right align a paragraph

This list would be of much help to those guys (Gals I m sorry, I always forget you!) who are keyboard-holic. In addition it turns out to be really sometimes coz it eases navigation and editing.