04 April 2015

Change Password for Oracle DB user

alter user user_name identified by new_password replace old_password

Create Table Space in Oracle DB

Following are the queries which can be used to create table space in Oracle DB.





grant all privileges to TABLESPACENAME;


06 December 2011

Govt asks Google, Facebook to screen user content

The Indian government has asked internet companies and social media sites like Facebookto pre-screen user content from India and to remove disparaging, inflammatory or defamatory content before it goes online, three executives in the information technology industry say. more...

30 November 2011

CHNR: Inbound Marketing vs. Outbound Marketing

CHNR: Inbound Marketing vs. Outbound Marketing: Thanks to the Internet, marketing has evolved over the years. Consumers no longer rely on billboards and TV spots — a.k.a. outbound marketin...

27 September 2011

Cast : Mahesh Babu, Samantha
Director : Srinu Vytla
Producer : Achanta Ram, Achanta Gopinath & Anil Sunkara
Music : Thaman S

Cast : Prabhu Deva, Arya, Prithvi Raj, Jagati Srikumar, Genelia, Nithya Menen, Vidya Balan, Tabu
Director : Santosh Sivan
Producer : Prithviraj Sukumaran
Music : Deepak Dev

Oasaravelli Songs download Free

Oosaravelli (2011)Cast : Jr. NTR, Tamanna
Director : Surendra Reddy
Producer : B.V.S.S Prasad
Music : Devi Sri Prasad

23 July 2011

Add Ajax magic in your Struts Web application

What is Ajax?

Ajax is a term standing for 'Asynchronous Javascript and XML'. It
is a technique, rather than a framework (such as Struts). The reason for the 'buzz' around both it and Web 2.0 is that it allows web
pages to behave less like flat documents and more like dynamic
GUI apps that users might expect from their desktop environments. Ajax techniques can be used for all recent browsers (including Internet Explorer and Netscape/Mozilla). It is already used
by (among others) Microsoft (for it's Outlook web client) and Google (for its Maps and Mail applications). Moreinfo...

21 July 2011

starting my first ecllipse java program

Eclipse is a free open-source Java environment available from http://eclipse.org. Eclipse is a Java program, but it uses a custom user interface toolkit that does not run on all platforms that supports Java 2. Check the web site for supported platforms. Eclipse requires a Java 2 runtime, so you need to install the Java 2 SDK first before installing Eclipse. You can download the SDK from http://java.sun.com/j2se/. more info..

18 July 2011

dropdown list (options) values from database with ajax and php

I’m going to show you a example in php and ajax to change the values of the dropdown’s options without refreshing the page. The values (options) of the dropdown are fetched from the database and the certain portion of the web pages is only refreshed without need to refresh the whole page. <>

16 June 2011

Setting up a Servlet development environment in a pc

This tutorial provides step by step instructions to setup the development environment required to test various servlet examples given throughout all the tutorials. This tutorial will also be helpful when you start practicing servlets yourself.

List of required softwares:

  1. JAVA 1.5 or 1.6
  2. Tomcat 5.5.16
  3. eclipse 3.3

Note: this tutorial explains how to install required software on your windows based PC only.

Click here to know more

Eclipse And Java For Total Beginner

Try to run a small struts hello world program using ecllipse

Learn how

09 June 2011

Maruti strike enters 5th day, production loss at 4,200 units

MUMBAI: A strike at car maker Maruti Suzuki's Manesar plant entered its fifth day on Thursday, causing a production loss of 4,200 vehicles, a company spokesman said.

He said Maruti, which sells every second new car in India, was continuing talks with the workers at the Manesar plant that makes about 1,200 vehicles a day, including the hatchbacks Swift and A-Star models and the DZiRE and SX4 sedans.

Around 800 workers began the strike on Saturday demanding the recognition of a new union, Maruti Suzuki Employees Union . At present, Maruti has one workers' union that is recognized by the management.

The production loss was estimated at 1.6 billion rupees ($35.79 million) as of Wednesday, with loss of 600 to 650 units each shift affected, the spokesman said.

Maruti, 54.2 percent-owned by Japan's Suzuki Motor Corp , operates two manufacturing facilities in India, housing several plants, both in the northern part of the country.

It has been looking to advance its capacity expansion plans to meet demand in the fast-growing south Asian country, where vehicle sales grew a record 30 percent in 2010.

The company plans to invest $1.3 billion over the next three years on manufacturing plants to boost capacity and is considering locations in northern and western India.

Rising interest rates, higher fuel costs and increases in vehicle prices have slowed growth of car sales over the past two months.

Industry data released on Thursday showed car sales in India grew 7 percent in May, the slowest annual pace of expansion in two years.

Shares in Maruti, valued by the market at $7.9 billion, fell as much as 1.1 percent on Thursday, extending a slide into a third day.

Shameful that Husain couldn't be in homeland

New Delhi: Renowned painter M.F. Husain's death in London was condoled in India as the passing away of a "true genius". From politicians to actors to photographers, many tweeted it was a shame that an artist of his stature was forced to stay away from his homeland.

Husain, who left the country in 2006 after death threats from Hindu radicals over his nude paintings of Indian deities, died Thursday morning in a London hospital. He was 95.

Human Exposure to Toxic BPA Is Worse Than Previously Thought - Worldnews.com

Human Exposure to Toxic BPA Is Worse Than Previously Thought - Worldnews.com

Tigers fascinating creatures - Worldnews.com

Tigers fascinating creatures - Worldnews.com

VaanNila.com - Tutorials and Examples for a Quick Start!

VaanNila.com - Tutorials and Examples for a Quick Start!

21 April 2011

Google Account security best practices

A family member recently had some questions about how to keep their Google account secure, and I wrote up a bunch of recommendations for how to stay safe... realized after I sent the e-mail that this was probably good stuff to share for people who might not know about all of the options when it comes to protecting their account. Hope some of you find this helpful!

1. Pick a strong password for your Google Account (in many cases, your Gmail address). Strong = not something you use everywhere else, a combination of letters and numbers, and at least one symbol in there is ideal.

2. Make sure your Google Account recovery options are set - visit the account recovery options page and make sure you have a backup e-mail address, and that your mobile number is listed on your account. Should you ever lose access to your account, these will be instrumental in restoring access.

3. Set up Two Factor Authentication on your Google Account. Details are here, you can set it up by starting at this link. What this does is block anyone else from logging into your account - even if they have your username and password. This requires you to have access to a physical device - your iPhone, Android or Blackberry phone - to ensure that you are really you. This may seem like overkill - but it's a key step to ensuring that your account is secure. There are ways committed hackers can discover your password - even if they get it they won't be able to do anything with it unless they also have your phone. Go through the process of installing the app on your phone (this page has the download link and instructions for setting it up); once done, here's how it will work:

  • the first time after you enable this, Google will ask you to log in. You'll provide your username and password, then Google will ask you for your "verification code". Launch the Google Authenticator app on your phone, and then type in the six-digit code from the phone into the verification code box in your browser.
  • if this is your computer, check the box "remember verification for this computer for 30 days" before clicking verify... you won't need to provide the verification for a month. (If it's a shared computer, don't check this!)
  • You'll see this anytime you try logging in from another computer (i.e., your laptop, your work computer, the iPad, etc.) - it's a bit more cumbersome (just a bit), but the advantage is that your account is far more secure than just a username/password. It's worth it.
4. IMPORTANT: once you've set two step verification up, you may need to change the password for your phone and/or other apps that are communicating with Google's servers. (For instance, I had to do this for iMove this morning when uploading a video to YouTube.) Because these apps don't know how to check for the verification code (they just know username/password), Google has a back-up: an "application specific password" -- you set these up here (see the bottom of the page: "application specific passwords"). Type in a name - say, Nexus S - and then click "generate password". You'll get an auto-generated string of characters, which you will then type into your phone or application's password field for your account.

5. Check to see what applications/services you've authorized to have access to your Google Account. Go here and see what websites/applications are listed - these are services who you previously granted access to your Google Account. If there are any there you no longer use, or sites you didn't intend to authorize, click revoke. (I'll come back to this later - as you centralize your e-mail, address book, calendar, etc. on your Google Account, authorizing other services to access this info can be very powerful - but you will want to use discretion in deciding which services get access to this data. It probably goes without saying - only grant access to trustworthy sites who you have absolute faith will not compromise the integrity of your data.)

6. Phone: if you don't already have a passcode on your phone, turn it on so that someone getting possession of your phone can't use it without knowing your passcode. (Otherwise anyone getting the phone can read your mail, receive "forgotten password" e-mails that would help them reset passwords on your account(s), etc.)

If you do those things, you'll have dramatically increased the security of your information online, and prevented any ongoing security problems. Now here are some best practices to keep in mind:

1. Try and use your Google Account when you log in to other services. When prompted to create a new account, look for a "login with Google" option. This will allow you to use your Google identity on those sites - not only is this simpler for you (one less username/password to remember!), it's also more useful (the service can access your contacts/information, helping you avoid having to manually enter more info) and it's more secure (when you're through with the site, you simply revoke its access to your info).

2. NEVER manually type your Google account information (username/password) into a webpage that is not owned/provided by Google. If you do this, you have no guarantee that the middle-man you've just shared your credentials with will protect that info. (This is why, by the way, Google's 2 step authentication is so useful - even if you did this, your info would be useless without the phone verification code. So long as you retain control of that, you're safe!) Whenever you're asked to login w/Google, the right way to do this is for them to send you to Google (look in your browser's address bar: is the URL google.com?), where you are asked to login if you're not already logged in, then you are asked whether you want to grant access to the referring app. Say OK, and you'll be returned to the app, which is now approved by Google.

3. Keep an eye on Gmail's "last account activity" feature if you're concerned that someone else may be accessing your account. Towards the bottom of the page in Gmail you'll see this:

Click "Details" to see a report of where your account is being accessed from; you can sign out all other sessions from that page, as well as review the actual location/IP address of any other computers accessing your account.

4. Don't e-mail sensitive files as attachments. Upload the files you want to share to Google Docs, and use Docs to control access to the files. Ideally you will share the file with a Google Account user. This is the most secure, and is helpful in the event you ever want to stop sharing with that user - you simply remove them from the list of people who can view the file. If that's not an option - the user doesn't have a Google Account, for instance - you can set the document's visibility to 'anyone with the link'. This has some risks - the person you share with can share the link with someone else - but you retain control of the document, which means you can delete it, or update the security settings to require login to view... either of which is much more secure than files you e-mail as attachments, which you lose control of the minute you hit 'send'.

5. Don't send passwords in e-mail. While Gmail uses https to encrypt all traffic between your browser and the Gmail server, there's no guarantee that the recipients of your e-mails containing passwords are similarly secure.

13 April 2011

Anna's appeal: Stick together to fight corruption

New Delhi: Activist Anna Hazare has issued a formal appeal to the lakhs of people who supported his "India against Corruption" campaign. (Read: Who is Anna Hazare?)

As a result of Anna's hunger fast and the massive public support for his agenda, the government has agreed to present a bill to check corruption before the Monsoon Session of Parliament ends.

At Anna's insistence, five representatives of civil society will work with five ministers to draft the Jan Lokpal Bill (Citizen's Ombudsman bill). (Read: What is Jan Lokpal Bill?)

29 April 2009

Hyderabad College Directory

Any college in and around Hyderabad with all the details are available here

click here