Project Honey Pot

Project Honey Pot is a web based honeypot network which uses software embedded in web sites to collect information about IP addresses used when harvesting e-mail addresses for spam or other similar purposes such as bulk mailing and e-mail fraud. The project also solicits the donation of unused MX entries from domain owners. Recently, the Project began a number of new initiatives including a QuickLinks…

final, finally and finalize() in JAVA

All the three keywords final, finally and finalize() plays a very important role in JAVA. Final is a keyword used for declaration of variable which cannot be edited, finally is a segment of code used for code cleanup in case of an exception whereas finalize is a method used for object cleanup before garbage collection. Use of final, finally and finalize Final:- It is used…

Check if two trees are Isomorphic to each other ? java code

If we have two trees then to find out if these are isomorphic to each other or not? This question is asked in many company written exams many times. To understand this problem we have to first understand what isIsomorphic. Two trees are called Isomorphic only and only if both trees are mirror image of each other from every node. So i wrote a function…

Set in C++

Set in C++ When we want to store unique elements in any data structure then we use set. Sets are containers that store unique elements following a specific order. In a set, the value of an element also identifies it (the value is itself the key, of type T), and each value must be unique. The value of the elements in a set cannot be…

What is TLS/SSL and difference between TLS/SSL

In simple terms TLS/SSL protocol provides security over internet connections while authenticating password or sending any other secure data.we see some web address have https:// that means secure http. it uses TLS/SSL. Client and server communicate with TTS/SSL Protocols securely. Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet. TLS and SSL encrypt…

How Speech Recognition Works

You might have already used speech recognition in many products, in your iphone or in any anroid devices.You still don’t know how it works. I want to give you a technical overview of speech recognition so you can understand how it works. Speech recognition fundamentally functions as a pipeline that converts PCM (Pulse Code Modulation) digital audio from a sound into recognized speech. How Speech…

Auto attendant

Auto attendant, also known as SpeechAttendant is a part of Nuance’s Employee Productivity Suite (EPS), an integrated application suite that combines auto attendant and directory services with flexible solutions for enhancing organizational communications, improving business processes, and increasing employee productivity. SpeechAttendant rapidly and accurately routes internal and/or external calls to the desired person, department or information through natural voice commands. in simple words this product…

JavaMail– Sending Email Via Gmail SMTP Example

To send email from gmail from java code,i wrote this sample program. This will help you use gmail in your automation task. Sending email from gmail smtp server is almost same as normal smtp server. still it is sometimes it takes more time then general server as it need some extra authentication. Here is the example to send automated mail from JAVA code via gmail.…

How to sort binary array in O(n).

How to sort binary array containing only 0 and 1? If we have array containing decimal number then it is easy.This is generally asked question in any C++ interview. Problem is to sort an array containing only 0 and 1 as an element in O(n). Following algorithm will sort the array in ascending order.Here you go for the detailed program. How to sort binary array…