Skip to main content

Home/ Computer Science Knowledge Sharing/ Group items tagged file

Rss Feed Group items tagged

computersciencej

Difference Between File Transfer Protocol and Hyper Text Transfer Protocol - 0 views

  •  
    In this post under Computer Science Study Material for Gate, we are going to tell the differences between File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP). File Transfer Protocol FTP and HTTP both were developed to make Internet transmission better. FTP is used to exchange files between computer accounts, to transfer files between an account and a desktop computer (upload), or to access software archives on the Internet. It 's also commonly used to download programs and other files to your computer from other servers. It transfers files in two different formats ASCII for text files and Binary format for binary files. To Read full Article click on folowing link http://www.computersciencejunction.in/2017/11/differences-between-ftp-and-http.html
Islam TeCNo

Assembly in .NET - 0 views

  • An assembly can be a single file or it may consist of the multiple files. In case of multi-file, there is one master module containing the manifest while other assemblies exist as non-manifest modules. A module in .NET is a sub part of a multi-file .NET assembly
  • The .NET assembly is the standard for components developed with the Microsoft.NET. Dot NET assemblies may or may not be executable, i.e., they might exist as the executable (.exe) file or dynamic link library (DLL) file. All the .NET assemblies contain the definition of types, versioning information for the type, meta-data, and manifest. The designers of .NET have worked a lot on the component (assembly) resolution.
    • Rock Fcis
       
      @ ISlam ma fel wiki katb aho kda The .NET assembly is the standard for components developed with the Microsoft.NET. Dot NET assemblies may or may not be executable, i.e., they might exist as the executable (.exe) file or dynamic link library (DLL) file.
  •  
    tb ana delwa2ty fhmt 2n el assembly 7agteen ya 2emma .Exe file 2w el Dll ft7t brdi fel wiki la2et 2n hoa by2ol 2n feh fel assembly ya 2emma single file or multi file 7d yfhmny eah asdo b single 2w multi hal ya3ni asdo 2n el dll feh mmkn kaza class w kda walla a
  •  
    ma3takdsh ya Rock eno y2sod bel DLL Multifile
magdy medhat

What is Domain Name Resolution - 0 views

  • What is Domain Name Resolution Introduction When using the Internet most people connect to web sites, ftp servers or other Internet servers by connecting to a domain name, as in www.bleepingcomputer.com. Internet applications, though, do not communicate via domain names, but rather using IP addresses, such as 192.168.1.1. Therefore when you type a domain name in your program that you wish to connect to, your application must first convert it to an IP address that it will use to connect to. The way these hostnames are resolved to their mapped IP address is called Domain Name Resolution. On almost all operating systems whether they be Apple, Linux, Unix, Netware, or Windows the majority of resolutions from domain names to IP addresses are done through a procedure called DNS.
    • Ahmed Mansour
       
      i think it's great artical !!
    • Islam TeCNo
       
      Yes .....we know that Web sites are on servers that has IP adresses like this 217.143.56.12 for example .....this article tell us how the site name [www.google.com] is converted to the IP thanks Mans
    • magdy medhat
       
      ya tecno ya gamedddddd mesh de elly kona bntklm feha fel microbus :D
  • Hosts File - There is a file called the HOSTS file that you can use to convert domain names to IP addresses. Entries in the HOSTS file override any mappings that would be resolved via a DNS server
    • Islam TeCNo
       
      I think this is what some spam and adware programs use .... you type a normal site Name but you go yo another site ... i think so !!
  • Netbios - This only applies to Windows machines and will only be used to map names to IP addresses if all previous methods failed. This method will attempt to map the netbios name you are trying to connect to with an IP address.
    • Islam TeCNo
       
      any body can explain this point for me ?
  • ...2 more annotations...
  • This can be changed though by changing certain registry keys
    • Islam TeCNo
       
      start -> run -> regedit this will allow you to edit the registry
  • DnsPriority = 30 LocalPriority = 200 HostsPriority = 75 NetbtPriority = 100
    • Islam TeCNo
       
      Or Simpler DnsPriority = 1 HostsPriority = 2 NetbtPriority = 3 LocalPriority = 4
Islam TeCNo

List of network protocols - Wikipedia, the free encyclopedia - 0 views

  • IPv4 Internet Protocol version 4
    • Islam TeCNo
       
      el mafroud dah eli howa asasn e7na bensta5dmo now ...maslan el IP beta3i 217.154.89.2 ....el mafroud dah IPv4 we el mafroud ba2a ba3den netawr we neb2a IPv6 :D
  • IPv6 Internet Protocol version 6
    • Islam TeCNo
       
      المفروض ده بقي البروتوكول الجديد الي إن شاء الله هيطبق بعيدن
    • Ahmed Mansour
       
      Currently there are two types of Internet Protocol (IP) addresses in active use: IP version 4 (IPv4) and IP version 6 (IPv6). IPv4 was initially deployed on 1 January 1983 and is still the most commonly used version. IPv4 addresses are 32-bit numbers often expressed as 4 octets in "dotted decimal" notation (for example, 192.0.2.53). Deployment of the IPv6 protocol began in 1999. IPv6 addresses are 128-bit numbers and are conventionally expressed using hexadecimal strings (for example, 2001:0db8:582:ae33::29). source : http://www.iana.org/numbers/ thanks tecno for your useful comments :) keep it up(Y)
  • TCP Transmission Control Protocol UDP User Datagram Protocol
    • Islam TeCNo
       
      The Diffrance between TCP and UDP is that TCP check the packet that packets are sent correctly ... but UDP just send and don't check ....so UDP is faster than TCP but TCP check that data is sent correctly .... so UDP is used in applications like Video Streaming (You Tube) and Voice Streaming too
    • Islam TeCNo
  • ...6 more annotations...
  • Jabber, an instant-messaging protocol
    • Islam TeCNo
       
      Great protcol .....also Called XMPP and this is the protocol used by Google Talk
    • Islam TeCNo
       
      port 5222 i think is it's default :D
  • Internet Relay Chat (IRC)
    • Islam TeCNo
       
      I think this is a very old chat protocol
  • ED2K, A peer-to-peer file sharing protocol
    • Islam TeCNo
       
      I think this is used by emule P2P program !! A Great P2P File Sharing program
  • FTP, File Transfer Protocol
    • Islam TeCNo
       
      use port 21 :D
    • Islam TeCNo
       
      loooooooot of protocols ....any one know simple explainations ?
  • HTTP, HyperText Transfer Protocol
Islam TeCNo

How to Use the Windiff.exe Utility - 0 views

  • This article describes how to use the Windiff.exe utility, a tool that graphically compares the contents of two ASCII files, or the contents of two folders that contain ASCII files, to verify whether they are the same. The file byte count and the creation date are not reliable indications.
    • Abdelrahman Ogail
       
      This is pretty useful when comparing 2 versions of code you wrote before
    • Islam TeCNo
       
      I think TortoiseSVN come with a tool for comparing files and i expect it will be better :D:D ......Thanks ZiKaS
Janos Haits

The Freenet Project - /index - 0 views

  •  
    Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in "darknet" mode, where users only connect to their friends, is very difficult to detect. Share files, chat on forums, browse and publish, anonymously and without fear of blocking or censorship! Then connect to your friends for even better security! "
Janos Haits

Vulnerability, CDR and Antivirus APIs | Metadefender - 0 views

  •  
    "Select or drop a file up to 140 MB in size for malware analysis, vulnerability check, and data sanitization (CDR; Content Disarm and Reconstruction)."
Islam TeCNo

Pirate Party Wins and Enters The European Parliament | TorrentFreak - 0 views

  •  
    OMG .....el mafroud dah ma3nah en ba2a fe el European Parliament nas men el monasren lel Cracks we el Torrent we el P2P ..ana mesh 3aref ezaii dah 7asal !!!!!
  •  
    OMG !!! ....el mafroud dah ma3nah en el nas eli byshag3o el torrents we el P2P file sharing we keda we byshag3o el illegal software download ba2a lehom makan fe el European Parliament ...dah eli fehmto !!
Ahmed Mansour

Introduction to Design Patterns - 0 views

  • design pattern is a widely accepted solution to a recurring design problem in OOP a design pattern describes how to structure classes to meet a given requirement provides a general blueprint to follow when implementing part of a program does not describe how to structure the entire application does not describe specific algorithms focuses on relationships between classes
  • design patterns: make you more productive help you write cleaner code Observer and Singleton are just two of the many available if you like design patterns, try these resources: GoF book -- Design Patterns: Elements of Reusable Object-oriented Software design pattern examples in Java, see Design Patterns in Java Reference and Example Site
  • learn what a design pattern is
    • Ahmed Mansour
       
      link to download Design Patterns: Elements of Reusable Object-oriented Software book : http://rs638.rapidshare.com/files/242614498/Design_Patterns_Elements_Of_Reusable_Object_Oriented_Software.pdf
  •  
    in summary :D we can say that a design pattern is a general reusable solution to a commonly occurring problem in software design. and it gives the way and relation between the classes and object to solve a certain problem and it doesn't specity the final application here is a book which Tecno give it tom me http://www.4shared.com/file/111350944/8be77835/Dummies_-_DesignPattern.html hope that it will be usefull
Islam TeCNo

Database - Wikipedia, the free encyclopedia - 0 views

shared by Islam TeCNo on 08 Jun 09 - Cached
  • A database is a structured collection of records or data that is stored in a computer system. The structure is achieved by organizing the data according to a database model. The model in most common use today is the relational model. Other models such as the hierarchical model and the network model use a more explicit representation of relationships
    • Abdelrahman Ogail
       
      Database official definition
    • Islam TeCNo
       
      yes .... bas a3taked en el wa7ed yfham ahm b keter men eno ye3ref el Definition (dah mogarad test post hehe )
    • Islam TeCNo
       
      But in File Stucter we took that database is set of related files
  • increase their speed
  • common kind of index is a sorted list of the contents of some particular table column, with pointers to the row associated with the value
  • ...1 more annotation...
  • Typically, indexes are also stored in the various forms of data-structure mentioned above (such as B-trees, hashes, and linked lists)
Abdelrahman Ogail

Common Gateway Interface - Wikipedia, the free encyclopedia - 0 views

  • The Common Gateway Interface (CGI) is a standard protocol for interfacing external application software with an information server, commonly a web server. The task of such an information server is to respond to requests (in the case of web servers, requests from client web browsers) by returning output. Each time a request is received, the server analyzes what the request asks for, and returns the appropriate output. The two basic methods for the server to do this are the following: If the request identifies a file stored on disk, then return the contents of that file. If the request identifies an executable command and possibly arguments, then run the command and return its output. CGI defines a standard way of doing the second. It defines how information about the server and the request is passed to the command in the form of arguments and environment variables, and how the command can pass back extra information about the output (such as the type) in the form of headers.
Islam TeCNo

Uniform Resource Identifier - Wikipedia, the free encyclopedia - 0 views

shared by Islam TeCNo on 16 Jun 09 - Cached
  • In computing, a Uniform Resource Identifier (URI) consists of a string of characters used to identify or name a resource on the Internet. Such identification enables interaction with representations of the resource over a network (typically the World Wide Web) using specific protocols. Schemes specifying a specific syntax and associated protocols define each URI. Contents [hide]
    • Abdelrahman Ogail
       
      I've confused between URL & URI till reading this article !
    • Islam TeCNo
       
      URL no3 men el URI :D ....ana faker eno kont shoft el 7eta deh fe ketab 3an el HTTP bas nesetha .......Zanks Zikas Again
  • A Uniform Resource Name (URN) functions like a person's name, while a Uniform Resource Locator (URL) resembles that person's street address. The URN defines an item's identity, while the URL provides a method for finding it. The ISBN system for uniquely identifying books provides a typical example of the use of typical URNs. ISBN 0486275574 (urn:isbn:0-486-27557-4) cites unambiguously a specific edition of Shakespeare's play Romeo and Juliet. In order to gain access to this object and read the book, one would need its location: a URL address. A typical URL for this book on a unix-like operating system might look like the file path file:///home/username/RomeoAndJuliet.pdf, identifying the electronic book saved in a local hard disk. So URNs and URLs have complementary purposes.
Janos Haits

VirusTotal - 0 views

  •  
    VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by the antivirus industry.
Janos Haits

CCN-lite.net - 0 views

  •  
    "As CCN-lite is a research effort, the documentation is to be found in various forms, collected in the doc/ directory of source tree and in README files. For the same reason writing documentation is driven by need or demand, so if you wish some aspect of the system better documented or a step-through example for some use case, we'll be happy to document it, just ask"
Janos Haits

Home | The No More Ransom Project - 0 views

  •  
    'Ransomware is malware that locks your computer and mobile devices or encrypts your electronic files. When this happens, you can't get to the data unless you pay a ransom. However this is not guaranteed and you should never pay!'
Janos Haits

Cryptomator: Free Cloud Encryption for Dropbox & Others - 0 views

  •  
    "Free client-side encryption for your cloud files. Open source software: No backdoors, no registration."
Janos Haits

Skiff - Private Encrypted Email and Collaboration - 0 views

  •  
    "Privacy and productivity across all your work End-to-end encrypted email with custom domains. Try Skiff Mail→ Pages End-to-end encrypted collaborative notes and tables. Try Skiff Pages→ Drive Upload, share, and send end-to-end encrypted files."
Janos Haits

IPFS Documentation | IPFS Docs - 0 views

  •  
    "IPFS Desktop bundles an IPFS node, file manager, peer manager, and content explorer into a single, easy-to-use application. Use IPFS Desktop to get acquainted with IPFS without needing to touch the terminal - or, if you're already experienced, use the powerful menubar/taskbar shortcuts alongside the command line to make your IPFS workflow faster."
1 - 20 of 26 Next ›
Showing 20 items per page