Skip to content

Cover Lock

Cover Lock, Simple Cover Lock, Proximity Cover Lock, Smart Cover Lock, Automatic Cover Lock, Auto Cover Lock, Flip Cover Lock

      COVER LOCK

Google Play Link :-  https://play.google.com/store/apps/details?id=com.tcompany.coverlock

Description

This app is developed for users who forget to lock their android screen before putting android phone in cover/pouch.
This app uses sensors of your android phone to detect whether phone screen is covered or not. If screen is covered then this app locks the phone.Whenever user uncovers the phone, this app makes the android phone screen on, to unlock.Sometimes if you want to play some game then this app will lock your screen when your fingers move around the sensors of your phone.This is quite irritating and thats why you have to keep a widget of this app on your homescreen.

Using widget you can on/off the sensors, so even if your fingers move around sensors while playing game, it will not lock the screen. After sometime if you want your screen to lock as soon as it goes into its cover, tap the widget and sensors will be on again. 🙂

For the first time this application will ask for activating the ‘Admin Lock’ of android phone. Activate it to use this application.

Suggestions from the users are invited. More features will be incorporated in the future versions.

Please write your query, suggestions, feedback to tusharsharma43@gmail.com or tushar.tcompany@gmail.com

Advertisement

Call Forwarding Best Android App

Google Play Link :- https://play.google.com/store/apps/details?id=com.tcompany.callforward

DESCRIPTION

This Call Forwarding app is used to forward calls to your other numbers. You can choose number from your contact list and can forward calls to that number.for now we have implemented only for forwarding unconditionally or unanswered. Future versions will include more of call forwarding options.

You can open this application from application icon or you can put an app widget on home-screen.

This App is very useful to you if you require frequent call forwarding to other numbers. Instead of going to settings then call settings and then call forward settings and then finally configuring your call forward, you can simply configure call forwarding in one click using this app.

You just need to put required number in the textbox and on click of ‘Forward’ button, your call forwarding will be active.

Your contact list will appear on click of contact button. On selecting contact by name, will put the its number in the textbox and hence no trouble to remember contact number.

In a nutshell, this app provides ease to call forwarding.

With new updated version of this app, you can retain the last number used to forward calls. So no need to enter the number every time while forwarding.

With version 2.0, if you have more than one number for a contact you can choose a number. All the numbers of that contact will be showed in a list as soon as that contact is selected. The number selected will be set in textbox for forwarding.

This is FREE APP.

New Version 3.0

Previously this app was supporting only GSM/UMTS networks but now it has included support for VERIZON, sprint and T-Mobile networks also. When you start the app, from ‘options menu’ button of your phone, go to settings (if you do not know what is ‘options menu’ then please see screenshot). In Settings you will see a drop-down which prompts to select the network. According to your selected network, it will perform forwarding of calls.

This dropdown has a 5th option a ‘Custom’. If your network is not from first four options then you can use 5th option ie ‘Custom’. On selecting custom, four text inputs and two buttons will be visible. In four text inputs you have to enter call forward codes. These codes you have to obtain from your service providers. After entering all four codes click on save button to save them. Once saved you can then forward your calls :).

There is also a reset button,, in case you have to reset the codes entered.

Feedback :- Please write to us @tusharsharma43@gmail.com or tushar.tcompany@gmail.com with your valuable feedback.  We will be happy to know users feedback and requirement.

Screenshots 

2012 in review

The WordPress.com stats helper monkeys prepared a 2012 annual report for this blog.

Here’s an excerpt:

600 people reached the top of Mt. Everest in 2012. This blog got about 3,000 views in 2012. If every person who reached the top of Mt. Everest viewed this blog, it would have taken 5 years to get that many views.

Click here to see the complete report.

VPN Solutions..

virtual private network (VPN) is a private computer network that interconnects remote (and often geographically separate) networks through primarily public communication infrastructures such as the Internet. VPNs provide security through tunneling protocols and security procedures such as encryption. For example, a VPN could be used to securely connect the branch offices of an organization to a head office network through the public Internet. A VPN can also be used to interconnect two similar networks over a dissimilar middle network; for example, two IPv6 networks over an IPv4 network.

 

VPN systems can be classified by:

  • the protocols used to tunnel the traffic
  • the tunnel’s termination point, i.e., customer edge or network-provider edge
  • whether they offer site-to-site or remote-access connectivity
  • the levels of security provided
  • the OSI layer they present to the connecting network, such as Layer 2 circuits or Layer 3 network connectivity

 

 

There are mainly four protocols of VPN

 

1) Pure Ipsec

2) Ipsec with L2tp

3) ssl Vpn

4) pptp

 

Soon i will post howto setup all of above on Your Linux System and howto establish tunnel

using this protocol and howto securely communicate..

Executable file in linux

In GNU/Linux systems the file type is determined by its data context (a file is recognized by its data: a script begin with “#!/bin/sh”, an MP£ file with “ID3”, and MPEG file with 0xBA hex code… and so on). So the file extension become unusefull (because if I rename test.mp3 to test.exe or test.txt its data doesn’t change, and remains always an MP3 file and it is recognized as MP3 file). (see the file command!)

Executables files are recognizable by their data, but they can be executable only if it’s execution permission bit is set (do you know about permission bitmask???). If executable bit is set, and if the file is an executable recognized by the running kernel, the application starts.

An executable run with the permission of the caller: so if you run an application as user, the application have the permission of the user. If the user is “root”, the application can do anything root can do!

Then, certain executable can be run only with root permissions, because it may edit some configuration file or anything else. So the application can do its job only if the application was started by the administrator (root).

If any application need superuser privileges, but should be run by any user, executable file have an extra permission bit: the SUID bit (Set User ID). When this bit is set, the permissions at run time doesn’t depends on the application caller, but the file owner (do you about file owner/group?). So if application has SUID bit set and it’s owned by root, when any user run the SUID executable, run application with root privileges.

That’s because GNU/Linux system are harder to break. To modify system configuration (to introduce viruses, root kits, backdoors…) you should break services that runs with root provileges, otherwise none can modify the system. SUID application are very rare, and often they are secure. However, even if an application runs with root privileges, often it is closed into a limited sub-system (called root jail), wich is a minimal system “running” on top of the system. If application is break, it is limited into the minimal system, so it cannot iteract with the real system running.

 

If you find this article helpful, Please like our Facebook page.

 

Thank You

2010 in review

The stats helper monkeys at WordPress.com mulled over how this blog did in 2010, and here’s a high level summary of its overall blog health:

Healthy blog!

The Blog-Health-o-Meter™ reads This blog is doing awesome!.

Crunchy numbers

Featured image

A helper monkey made this abstract painting, inspired by your stats.

A Boeing 747-400 passenger jet can hold 416 passengers. This blog was viewed about 2,000 times in 2010. That’s about 5 full 747s.

 

In 2010, there were 54 new posts, not bad for the first year! There were 11 pictures uploaded, taking up a total of 606kb. That’s about a picture per month.

The busiest day of the year was February 16th with 46 views. The most popular post that day was Windows Alternative on LInux..(use GNU/Linux).

Where did they come from?

The top referring sites in 2010 were facebook.com, google.co.in, cordless-homephone.info, google.com, and mail.yahoo.com.

Some visitors came searching, mostly for tushar sharma, tushar sharma blog, gate exam blog, lrpc, and gets function in linux.

Attractions in 2010

These are the posts and pages that got the most views in 2010.

1

Windows Alternative on LInux..(use GNU/Linux) February 2010
2 comments

2

GATE EXAMINATION INFO January 2010
3 comments

3

What is the difference in virtual packet switching and datagram switching? what information does packets hold? February 2010

4

gets() function, the gnu c compiler gives a warning that it is dangerous to use gets() March 2010
1 comment

5

About Me : January 2010

how rss feed works

Short for Really Simple Syndication or Rich Site Summary, this handy service is revolutionizing the way we search for content. In addition, us web searchers don’t necessarily have to keep checking back to any particular site to see if it’s been updated – all we need to do is subscribe to the RSS feed, much like you would subscribe to a newspaper, and then read the updates from the site, delivered via RSS feeds, in what’s called a “feed reader.” (We’ll get to feed readers in just a minute!) RSS feeds benefit those who actually own or publish a website as well, since site owners can get their updated content to subscribers fast by submitting feeds to various XML and RSS directories. How do RSS feeds work? RSS feeds really couldn’t be simpler. They’re basically simple text files that, once submitted to feed directories, will allow subscribers to see content within a very short time after it’s updated (sometimes as short as 30 minutes or less; it’s getting faster all the time). This content can be aggregated to be viewed even more easily by using a feed reader. I’ve written up an article on the best feed readers out there. A feed reader, or feed aggregator, is just a really simple way to view all your feeds at one time via one interface. For instance, I have a Bloglines feed. I have all sorts of good stuff in there. Can you imagine how much time it saves me to have all these topics sent to me in one place rather than me searching it out? In addition, all these people who have their sites syndicated on my Bloglines roll are enabling their content to be seen by me and other people who wouldn’t necessarily find them in the search engines or directories. RSS feeds are a wonderful resource, and the uses for RSS are only just beginning to be realized; not only for search engines and searching, but in how we optimize our sites.

OpenSuse

open suse is one of finest Linux distro i have used, and am in love with that.

Latest openSuse11.3 LI-F-E  have bundled up every required package right from Multimedia,Development, Networking, Useful pdf’s of howto use Opensuse and tonnes of s/w.

It has Ext4 file system default, GNOME, kde , GNOME 3 preview and other environment. I really like all desktop features.

for more visit official site for opensuse.

Redhat Linux History

Redhat LInux History :–

Red Hat History

1968

ARPANET founded. The precursor to the Internet, it allows researchers to share code and information.

1969

Ken Thompson, researcher at Bell Labs, writes the first version of Unix.

1979

AT&T announces plans to commercialize Unix.

1983

Richard Stallman establishes the Free Software Foundation at MIT. The GNU project to construct an operating system based on Unix but for which the source code is freely available, begins. Stallman also establishes the idea of “copyleft” and the General Public License (GPL).

1987

Andrew Tanenbaum releases Minix, a version of Unix for the PC, Mac, Amiga, and Atari ST. Source code included.

1989

Michael Tiemann (Red Hat Vice President, Open Source Affairs) co-founds Cygnus Solutions, the first business to provide custom engineering and support services for free software.

1991

Linus Torvalds releases the Linux kernel.

Bob Young introduced to free software and UNIX by the system administrators of the New York City UNIX Users Group (Unigroup).

1993

Young incorporates ACC Corporation, a catalog business that sells Linux and Unix software accessories and books and distributes a magazine called New York UNIX

1994

Marc Ewing creates his own distribution of Linux which he names Red Hat Linux. Released in October, it becomes known as the Halloween release.

1995

Young buys Ewing’s business, merges it with ACC Corporation, and names the new company Red Hat Software.

Red Hat Linux 2.0 is released, officially unveils the new package management system called RPM.

1996

Red Hat opens sales and administration functions to North Carolina, opens corporate headquarters in Durham.

1997

January

Greylock and August Capital invest $6.25 million in Cygnus Solutions, become first VCs to invest in a free software business.

May

Eric Raymond delivers “The Cathedral and the Bazaar” at the Linux Kongress in Germany.

The Red Hat training model and the term “Red Hat Certified Engineer” are first developed as the benchmark for technical skills required of Red Hat Support Partners worldwide.

July

Red Hat Linux 4.2 released.

December

Red Hat announces Red Hat Linux 5.0, followed by the introduction of telephone technical support.

1998

January

Netscape announces plans to make the source code for Communicator free on the Internet.

February

Term “Open Source” is coined in Palo Alto, CA.

July

Oracle, CA, and Informix announce support for Red Hat Linux.

November

A lawyer for Microsoft brandishes a box of Red Hat Linux in an attempt to refute Justice Department charges that the software giant has a monopoly on the operating system market.

December

The first formal RHCE training course, class sessions and dates, and the RHCE Exam are announced.

IDC reports that Linux installations grew by 212% from the previous year, outpacing growth rates of Unix, Windows NT, Netware, and all other server operating systems.

1999

February

IBM and Red Hat announce Linux Alliance.

April

Dell becomes the first major computer vendor to factory-install Red Hat Linux on servers and workstations.

Red Hat Linux 6.0 released.

July

Red Hat expands European presence, opening offices in the United Kingdom and Germany.

August

Red Hat goes public, the eighth-biggest first-day gain in Wall Street history.

September

Red Herring names Bob Young one of the “Top 10 Entrepreneurs of 1999.”

Red Hat announces expansion into Japan.

October

Red Hat releases Red Hat Linux 6.1.

November

Matthew Szulik promoted to CEO. Red Hat Named One of the Top 20 “Best Regarded” Technology Companies, Top 10 for “Vision and Leadership” in Harris Interactive survey.

Red Hat acquires Cygnus, creating the largest open source company in the world.

for more :–here is the link :–

http://www.redhat.com/about/companyprofile/history/

 

If you find this article helpful, Please like our Facebook page.

Thank You

Linux History by Linus Torvalds

here is the link :-

http://www.cs.cmu.edu/~awb/linux.history.html