9 Short-term Projects You Could Do To Shine-up Your Resume

Every ‘out-of-the college’ fresher who wants a job nowadays must have a solid portfolio of completed projects to showcase their abilities but the major problem arises when they can’t think of something they can make.

So, In this post i’m going to list 9 short-term projects which can help shine-up your resume in no-time.

  1. A to-do list that syncs with Google Spreadsheets and Evernote (using their APIs)
  2. An “idea tracker” mobile app to let you very quickly jot down a startup idea and share the list — or partial list — with a friend. Syncing with Google Spreadsheets is key.
  3. A merged registry that creates a merged view of multiple registries. There are many people doing unified [baby / wedding] registries, but they have a major weakness in that they don’t show if someone has purchased an item. This would allow someone to create many registries with just one view / link to give out to people.
  4. A chat widget that allows “branching” of conversations. You know how you’ll be in the middle of a conversation with someone and then another topic would come up? What if you could branch that part out to a new conversation?
  5. Chrome extension to overlay Yelp reviews on OpenTable.
  6. Forum on the Fly” — be able to create a very quick forum on the fly by just sending a link, supporting conversation threading and other things.
  7. Online polls that don’t suck / get covered with ads. Think Doodle for polls.
  8. Any app on your phone / computer that you think could be done slightly better (or better for your purpose).
  9. Social book recommend-er — use Amazon receipts in email (this can be done — TripIt is able to scan gmail) or screen scrape Amazon past purchases to know what you’ve previously purchased. Then let you see what books have been most purchased by your friends. So many people I know want this.

These are some of the best short-term projects you can make which will help you learn many new technologies while also brushing-up your portfolio.

Top 5 Websites To Hone (Develop) Your Programming Skills

Whether you are a Computer Science student or just an individual with an interest in programming, who is looking to develop his skills then this article is a must read for you.
One can always try to do projects which interests them but there is one more very productive way to develop your programming skills – Competitive Programming.

Competitive programming is a mind sport usually held over the Internet or a local network, involving participants trying to program according to provided specifications. Competitive programming is recognized and supported by several multinational software and Internet companies, such as Google, Facebook, IBM etc. There are several organizations who host programming competitions on a regular basis. But if you are too new to start competing with experts in these competitions then there are various websites which allows you to practice programming problems.

In this post i’m going to list 5 such websites which hosts coding competitions and also provide previous contests problems to practice upon. They are:

Sphere Online Judge :-

SPOJ (Sphere Online Judge) is an online judge system with over 200,000 registered users and over 20,000 problems. Tasks are prepared by its community of problem setters or are taken from previous programming contests. SPOJ allows advanced users to organize contests under their own rules and also includes a forum where programmers can discuss how to solve a particular problem. The website is considered both an automated evaluator of user-submitted programs as well as an online learning platform to help people understand and solve computational tasks. It also allows students to compare paradigms and approaches with such a wide variety of languages.

HackerRank :-

HackerRank is a company that focuses on competitive programming challenges for both consumers and businesses and has an online community of over one million computer programmers. HackerRank’s programming challenges can be solved in a variety of programming languages (including, but not limited to, Java, C++, PHP, SQL) and span multiple computer science domains.

On the consumer side, when a programmer submits a solution to a programming challenge, their submission is scored on the accuracy of their output and the execution time of their solution. Programmers are then ranked globally on the HackerRank leaderboard and earn badges based on their accomplishments to drive competition among users. In addition to individual programming challenges, HackerRank also hosts contests (often referred to by HackerRank as “CodeSprints”) where users compete on the same programming challenges during a set period of time and are then ranked at the conclusion of the event. HackerRank is seen as a market leader in the growing gamification trend within competitive computer programming and the consumer-side of their website is free for coders to use.

CodeChef :-

CodeChef is a non-profit educational initiative of Directi. It is a global competitive programming platform which supports over 35 programming languages and has a large community of programmers that helps students and professionals test and improve their coding skills. Its objective is to provide a platform for practice, competition and improvement for both students and professional software developers. Apart from this, it aims to reach out to students while they are young and inculcate a culture of programming in India.

TopCoder :-

TopCoder is a company which administers contests in computer programming. TopCoder hosts fortnightly online competitive programming competitions—known as SRM’s or “single round matches”—as well as weekly competitions in graphic design and development. The work in design and development produces useful software which is licensed for profit by TopCoder. Competitors involved in the creation of these components are paid royalties based on these sales. The software resulting from algorithm competitions—and the less-frequent marathon matches—is not usually directly useful, but sponsor companies sometimes provide money to pay the victors. Statistics (including an overall “rating” for each developer) are tracked over time for competitors in each category.

Udacity :-

This one doesn’t offer programming contests rather video tutorials on various subjects related to Computer Science, Maths and Physics. Udacity is the next best on the web to learn to code. Udacity believes today’s higher education system is broken. Udacity believes that education is no longer something that happens once in a lifetime, but rather is a lifelong experience. It is true in every sense and so it has ported loads of computer science, math and physics courses online.


Learning how to code is easy but learning how to code efficiently is painfully long and a hard process. So without wasting any further time, pick one of these websites and start practicing. Ciao..

Wget Commands Everyone Should Definitely Know About

What is Wget ?

“Wget is a computer program that retrieves content from web servers, and is part of the GNU Project. Its name is derived from World Wide Web and get. It supports downloading via HTTP, HTTPS, and FTP protocols.” -Wikipedia

In technical terms wget is essentially a web spider that scrapes or leeches content from webpages. This tool could prove to be much more useful than it is credited for in our daily life. For example, have you been in a situation where you want to download some 20 – 30 images from a webpage, it could become quite tiresome. This is where wget comes in, with just one line you can download all the files in one go. Now that’s COOL.

Although wget is around since 1996, most of modern day’s average users doesn’t know about it.

Features Of Wget :-

Robustness :

Wget is very useful for slower networks, say if a download got interrupted somehow it will try again to download the complete file from that point onwards until the whole file is completely downloaded.

Recursive Download :

Wget can follow the HTML links on a web page and recursively download the files. It is the same tool that a soldier had used to download thousands of secret documents from the US army’s Intranet that were later published on the Wikileaks website.

Non-Interactiveness :

Wget works on ‘Point & Shoot’ principle meaning – once started it doesn’t require further user interaction to complete the given process.

Wget Commands :-

wget-commands

    • Download a single file from the Internet
      wget http://example.com/file.iso

 

    • Download a file but save it locally under a different name
      wget ‐‐output-document=filename.html example.com

 

    • Download a file and save it in a specific folder
      wget ‐‐directory-prefix=folder/subfolder example.com

 

    • Resume an interrupted download previously started by wget itself
      wget ‐‐continue example.com/big.file.iso

 

    • Download a file but only if the version on server is newer than your local copy
      wget ‐‐continue ‐‐timestamping wordpress.org/latest.zip

 

    • Download multiple URLs with wget. Put the list of URLs in another text file on separate lines and pass it to wget.
      wget ‐‐input list-of-file-urls.txt

 

    • Download a list of sequentially numbered files from a server
      wget http://example.com/images/{1..20}.jpg

 

    • Download a web page with all assets – like stylesheets and inline images – that are required to properly display the web page offline.
      wget ‐‐page-requisites ‐‐span-hosts ‐‐convert-links ‐‐adjust-extension http://example.com/dir/file

Mirror Complete Websites With Wget :-

    • Download an entire website including all the linked pages and files
      wget ‐‐execute robots=off ‐‐recursive ‐‐no-parent ‐‐continue ‐‐no-clobber http://example.com/

 

    • Download all the MP3 files from a sub directory
      wget ‐‐level=1 ‐‐recursive ‐‐no-parent ‐‐accept mp3,MP3 http://example.com/mp3/

 

    • Download all images from a website in a common folder
      wget ‐‐directory-prefix=files/pictures ‐‐no-directories ‐‐recursive ‐‐no-clobber ‐‐accept jpg,gif,png,jpeg http://example.com/images/

 

    • Download the PDF documents from a website through recursion but stay within specific domains.
      wget ‐‐mirror ‐‐domains=abc.com,files.abc.com,docs.abc.com ‐‐accept=pdf http://abc.com/

 

    • Download all files from a website but exclude a few directories.
      wget ‐‐recursive ‐‐no-clobber ‐‐no-parent ‐‐exclude-directories /forums,/support http://example.com

Download Restricted Content With Wget :-

There are multiple occasions where the content is behind a login screen or is blocked for a group of users. In these cases wget could be used to download the required content.

    • Download files from websites that check the User Agent and the HTTP Referer
      wget ‐‐refer=http://google.com ‐‐user-agent=”Mozilla/5.0 Firefox/4.0.1″ http://nytimes.com

 

    • Download files from a password protected sites
      wget ‐‐http-user=labnol ‐‐http-password=hello123 http://example.com/secret/file.zip

 

    • Fetch pages that are behind a login page. You need to replace user and password with the actual form fields while the URL should point to the Form Submit (action) page.
      wget ‐‐cookies=on ‐‐save-cookies cookies.txt ‐‐keep-session-cookies ‐‐post-data ‘user=labnol&password=123′ http://example.com/login.php
      wget ‐‐cookies=on ‐‐load-cookies cookies.txt ‐‐keep-session-cookies http://example.com/paywall

Conclusion :-

These are some of the most commonly used commands for wget, there many many more which you can try to find and see what they do. There is much more to this tool than meets the eye. Ciao..

How Optimizing Images Could Get Your Site Higher Traffic

Image optimization is one of the most important factor for any website yet it is often overlooked by webmasters. Most of us don’t realize the amount of traffic these images (high quality) could bring to our sites. If the word of Google is anything to go by then images account for 65% of total internet traffic.

 

save-images-for-higher-seo-and-traffic1

 

Optimizing images contributes a large part to On-Page optimization as they could provide a broader impression on the user. If you are running a blog then sometimes a focused high quality image could drive more traffic than your article. Every webmaster must optimize images on his site as most of the search engines could not see them while crawling as they appear as blank spaces to them.

Peter Linsley of Google have shared in the past the process of how images are ranked as per Google :

  1. Firstly the crawler finds images from the webpages across the world wide web.
  2. Then they are classified on various factors like color, quality or whether it is safe for work or not and then indexed.
  3. The next process they go through is identifying the duplicates and sorting the most authoritative one.
  4. Then a rank is given based on undisclosed factors just like the text based websites.

He also goes on to say that users prefer high resolution, in-focus images as compared to low quality one’s. Distracting features such as loud water-marks and huge on-image texts are a complete NO as they make the image look cluttered.

According to him some best practices that a webmaster should follow while attaching images to his webpage are :

  • Try to add a image which is user-focused rather than search engine-focused.
  • Images should be high quality and large enough for the user to interpret it correctly.
  • Always try to put it higher on the page and above the fold if possible.
  • Adding descriptive text for the images could help search engine immensely to categorize them correctly.

Now that you know how much emphasis a single image could bring to your blog you must be thinking what are the factors that you should optimize so that the images bring handsome traffic and ranking juice from search engines – So without further ado let’s get to it.

Relevency :-

Images should be relevant to the article or text around it. An image of waterfall won’t be good enough if the page or article is about Search Engine Optimization.

Alt Tag :-

This is the most important tag on an image. This is the alternate text which is showed when the image could not be loaded by the browser. This text also helps image search engines to identify the images.

Name Of The Image :-

The file name of the image is another way of improving your image’s S.E.O. capabilities. Google requests webmasters to not use generic file-names like ‘image010.jpg’, instead use something like ‘wordpress-logo.jpg’ if the image is of wordpress logo.

Image Size :-

An image which is too bulky and high in size could increase your page latency which could in-turn cause a fall in rankings. So compressing images before serving is always welcome.

Height & Width :-

Images which are to be attached should be of optimal size means they should already be in size in which they are to be presented and you shouldn’t be re-sizing them using HTML tags as it slows down the page loading.


These are the points which anyone must follow before adding the images. If you are using a Content Management System like WordPress you could easily let it all happen automatically by using a plugin. Smush.it from Yahoo is a great tool which will strip unnecessary meta data from the images and improve their size immensely. S.E.O. Friendly Images is another great plugin to update all alt and title tags for all images on your website.

You can also save an image for web which would be considerably low in size by using Photoshop software. A video guide demonstrating how to reduce the size of an image using Adobe Photoshop is attached below.



These were some of the recommended methods from my side but if you want to further optimize your images do read this awesome article on Shopify and don’t forget to provide your valuable feedback in the comments below.

 

How To Use MailTo Syntax On A Webpage ?

The mailto URL scheme is used to designate the Internet mailing address of an individual or service. In its simplest form, a mailto URL contains an Internet mail address which upon clicking will launch the default mailing software on the computer.

 

mailto-syntax1

 

Sometimes we also require the message headers and body to populated as well, mailto syntax can also be used for that. Mailto command is generally used to link to a single email address but there is much more Mailto can do..

Basic Syntax :-

     mailtoURL  =  "mailto:" [ to ] [ headers ]
     to         =  #mailbox
     headers    =  "?" header *( "&" header )
     header     =  hname "=" hvalue
     hname      =  *urlc
     hvalue     =  *urlc

**Note :- Within mailto URLs, the characters "?", "=", "&" are reserved.

Some Other Lesser Known Mailto Syntax :-

Mailto Link To A Single Address :-

<a href=“mailto:johndoe@nowhere.com”>

Mailto Link To Multiple Addresses :-

<a href=“mailto:johndoe@nowhere.com, janedoe@nowhere.com”>

By looking at the syntax above you would have got the idea that we can send the same mail to multiple persons by seperating the addresses using comma operator.

Mailto Link With Pre-Populated CC and BCC Fields :-

<a href=“mailto:johndoe@nowhere.com?cc=janedoe@nowhere.com&bcc=chucknorris@nowhere.com”>

Mailto Link With Pre-Populated Subject Field :-

<a href=”mailto:chucknorris@nowhere.com?subject=I'm%20Invincible”>

In the syntax above if you want to include a space in your subject field then use %20 as whitespaces are automatically truncated.

Mailto Link With Pre-Definded Subject And Body Fields :-

<a href=”mailto:chucknorris@nowhere.com?subject=I'm%20Invincible&body=Game%20Over″>

Reference

These were some of the lesser known mailto syntax’s you can use on your webpage. Do provide feedback or share this post if you like the information on this article. Cheers..

7 E-Books That Could Make You A Better Hacker

“A hacker is someone who seeks and exploits weaknesses in a computer system or a computer network.”                                                                                                                                                                            -Wikipedia

A hacker is a geek at best who knows virtually everything about computers. Hacker’s know the in’s and out’s of functioning of a computer system, every minute detail.

 

hacking-ebooks

 

But to become one it takes years of learning and hardwork. If you are targeting this field and aspiring to become a master of computer security then i would suggest that before jumping straight to advanced topics you should read these 7 E-Books for beginners which would help you immensely.

7 E-Books That Could Make You A Better Hacker :

Hacking For Dummies :-

Hacking For Dummies, 4th Edition explores the malicious hacker’s mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.

Author :- Kevin Beaver.

Hackers: Heroes of the Computer Revolution :-

This is a book by Steven Levy about hacker culture. It was published in 1984 in Garden City, New York by Nerraw Manijaime/Doubleday. Levy describes the people, the machines, and the events that defined the Hacker Culture and the Hacker Ethic, from the early mainframe hackers at MIT, to the self-made hardware hackers and game hackers.

Author :- Steven Levy.

Hackers & Painters: Big Ideas from the Computer Age :-

Hackers & Painters: Big Ideas from the Computer Age is a collection of essays from Paul Graham discussing hacking, programming languages, start-up companies, and many other technological issues.

“Hackers & Painters” is also the title of one of those essays.

Author :- Paul Graham.

Linux Server Hacks :-

Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system.

Author :- Rob Flickenger.

Hacking VoIP: Protocols, Attacks, and Countermeasures :-

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it’s notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.

Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you’re serious about security, and you either use or administer VoIP, you should know where VoIP’s biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.

Author :- Himanshu Dwivedi.

Oracle 11g Anti-Hacker’s Cookbook :-

Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server.

Learn to protect your sensitive data by using industry certified techniques
Implement and use ultimate techniques in Oracle Security and new security features introduced in Oracle 11g R2
Implement strong network communication security using different encryption solutions provided by Oracle Advanced Security.

Author :- Adrian Neagu.

Ubuntu Kung Fu: Tips, Tricks, Hints, and Hacks :-

Ubuntu’s rise to power has been rapid, historic and well-deserved. It’s the best Linux distribution ever, but most people only use a fraction of its power. Award-winning Linux author Keir Thomas gets down and dirty with Ubuntu to provide over 300 concise tips that enhance productivity, avoid annoyances, and simply get the most from Ubuntu. You’ll find many unique tips here that can’t be found anywhere else. You’ll also get a crash course in Ubuntu’s flavor of system administration. Whether you’re new to Linux or an old hand, you’ll find tips to make your day easier.

Author :- Keir Thomas.

 

If you’ve read this post till the end that means you are pretty serious about computer security field, in that case these e-books will help a lot for clearing basics and some intermediate concepts.

Know another useful e-book on Hacking? Do share it’s name with us in the comments below.

5 Great Posts By Top Tech-Bloggers

top-5-blog-posts-by-best-bloggers

 

In this post i’m going to list 5 high-quality posts by some of the best bloggers in the world. These evergreen posts are on my bookmarks and i recommend that every beginner should read them atleast once.

5 Great Posts By Top Tech-Bloggers :-

The Advanced Guide To S.E.O. :

This post is by Neil Patel of Quicksprout, if you don’t know about him, he is the co-founder of Crazy Egg, Hello Bar and KISSmetrics. He helps companies like Amazon, NBC, GM, HP and Viacom grow their revenue. The Wall Street Journal calls him a top influencer on the web, Forbes says he is one of the top 10 online marketers, and Entrepreneur Magazine says he created one of the 100 most brilliant companies in the world.

 

How to Host your Website on Google for Free :

If we are discussing top tech bloggers, Amit Agarwal’s name cannot be left out. He is India’s one of top bloggers who was a former IITian, until 2004 he used to work in USA in Goldman Sachs. He planned to quit his regular job and start a tech blog called Labnol. It was a huge success just after few months of launching. After few months, he was making at least INR 10,00,000/- per month.

 

101 Ways to Get Quality Backlinks To Your Blog :

Another quality post from one of the top technology blogs ShoutMeLoud.com by Harsh Agarwal. Harsh is a New Delhi based very young and budding blogger. He totally epitomizes the young Indian who is independent and has enough money to enjoy his life.

Although the post is not by himself but it’s on his blog so credits to him.

 

Completely Redesign Blogger Templates :

By Srinivas Tamada, a Chennai based blogger who blogs about programming hence the blog is for people that are more technical rather a non-professional. His blog 9lessons.info is very popular among developers & programmer community.

 

C.S.S Tutorials For Beginners :

Great compilation of CSS tutorials by Jaspal Singh of SAVEDELETE.com, who is a professional blogger from Jaipur, India. He is a Mechanical Engineer with some skills of Designing & Coding.

 

Well! Finally i would say that there are many more great posts by these and many other bloggers but i would leave them for some other day and for another post. If you want to suggest another great article which is not on the list, you can write in the comment so that I could include them in my next article.

Enjoy.!!

Download Your Free Copy Of Windows 10 Technical Preview

Microsoft announced that it will release their latest Windows operating system, Windows 10 in mid 2015 on 30th September. But they’ve released a technical preview version for volunteers who want to try the technical (beta) version of this next installment of Windows series.

 

windows-10-free-technical-preview

 

Before You Download Your Free Copy Of Windows 10 Technical Preview :-

Download And Install Only If You :

  • Want to try a software which is still in development phase.
  • Don’t mind major redesigns and lots of updates.
  • Not installing it on your daily use P.C.
  • And really know your way around a computer, if a troubleshooting problem arises in case.

 

Download Windows 10 Technical Preview :-

To download your free copy of windows 10 technical preview, follow these steps :

  • First step is signing-up for Windows Insider Program.
  • Second step is checking your P.C. if it fulfills minimum System Requirements.
  • Next, open up any one of the download links on this page below and download the ISO file.
  • Now you have to burn the ISO to a C.D. or a U.S.B. drive.
  • Insert the newly created media into the P.C., run ‘setup.exe’ and follow the instructions.
 Don’t Miss :- Install The Best Linux Distro : Kali Linux

Product Key For Windows 10 Technical Preview :-

NKJFK-GPHP7-G8C3J-P6JXR-HQRJR

 

Download Links :-

English 64 Bit (3.81 G.B.) => LINK

English 32 Bit (2.93 G.B.) => LINK

 

Having difficulties navigating after you’ve installed Windows 10, try Microsoft’s Official How-To Guide.

Enjoy..!!

Why Everyone’s Not Upgrading To iOS8

Last month when Apple released their next installment of their mobile operating system -iOS8, in just a week near about 46% of total iPhone users upgraded to iOS8 but that counter didn’t move more than a percent after that. So the question stands – Why Everyone’s Not Upgrading To iOS8.

James Cook of Business Insider believes that these numbers doesn’t reflect true stats because Apple uses a very unscientific method for measuring total users who have upgraded to iOS8. Apple measures total number of users (running iOS8) who have accessed the app store in a given time-frame but there are users who don’t download a single app in months.

 

ios8

 

There could be many reasons why iDevice users aren’t upgrading, one of the biggest factors could be the first version of the update which made the devices unable to connect to cellular networks or use the fingerprint sensor. Although the update was pulled-off within hours and a new version iOS 8.0.2 was released to fix the bugs, yet it affected approximate 40,000 users in that minute time-frame. The fact that this update unlike iOS7 is not a major redesign could also make the users thinking twice about upgrading.

As of today Apple have stopped signing iOS7 so be very much sure whether you want to upgrade or not. After this, downgrading to iOS7 would also be hectic.

So let’s wait and see, when the percentage of devices running iOS8 reaches a decent mark.

How To Add Or Remove Write-Protection From USB Flash Drives

enable-disable-write-protection

 

Many of has faced this problem once in our computing life but sometimes a need arises to write-protect our USB drives so that the data stored on it cannot be modified in anyway. In this post we will discuss how to edit Windows Registry to disable ‘Write or Delete’ feature on storage devices.

Note :- This trick will only enable write-protection on the computer it’s done.

Most of the new flash drives comes with a physical flip-switch which will enable/disable write-protection, we could use that but if the switch is not present then follow the steps below.

Enable Write-Protection :-

  • First of all, open Registry Editor by clicking on START -> RUN and type ‘regedit‘.
  • Then navigate to : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
  • Now, create a new key by right clicking on ‘Control‘ -> New and name it ‘StorageDevicePolicies’
  • Under this newly created key, create a ‘DWORD’ 32 bit value and give it the name ‘WriteProtect‘.
  • We are almost done, Just double click on this new value and change it to 1.

Disable Write-Protection :-

To disable write-protection which we activated earlier, we have to :

  • Double click on the ‘DWORD’ value which we created.
  • Change the value in it to ‘0’ (zero).

That’s it. Now i hope you know how to enable or disable write-protection according to your needs.

Enjoy..!

 

RELATED :- Password Protect Windows Folder Without Any Software