How to Enable Google Authorship link Joomla k2

  • Create a Google+ Profile and Link
  • give that link on k2 user url
  • Open file "components/com_k2/templates/default/item.php"
  • Add   "$document->addHeadLink( $this->item->author->profile->url, 'author', 'rel' );" this line after "defined('_JEXEC') or die;"

How can i protect my email address

Well, before I conclude, I would like to give all of my readers a word of caution!
Today, there are many scam websites out there on the Internet which often misguide users with false information. Some of them may even rip off your pockets with false promises. So, here are some of the things that you need to be aware of:
  1. There is no ready-made software program (except the keylogger) that can hack emails and get you the password instantly just with a click of a button. So, if you come across any website that claims to sell such programs, I would advise you to stay away from them.

  2. Never trust any hacking service that claims to hack any email for just $100 or $200. All I can tell you is that, most of them are no more than a scam.
  3. I have seen many websites on the Internet that are distributing fake tutorials on email hacking. Most of these tutorials will tell you something like this: “you need to send an email to passwordrecovery@gmail.comalong with your username and password” (or something similar).
    Beware! Never give away your password to anyone nor send it to any email address. If you do so, you will lose your own password in attempt to hack somebody else’s password. 
I hope you found this post interesting and informative. Please do not misuse any of the information provided in this article.

Hacking Techniques 2. Phishing – The Difficult Way

The other common way to hack passwords or online accounts is via Phishing. This is the most widely used technique by many hackers to gain access to Facebook and other social networking websites. This method will make use of a fake login page (often called as spoofed web page) which will exactly resemble the original one. Say for example, a spoofed web page of Facebook looks exactly same as that of the original page. This page is actually created by the hacker and is hosted on his own server. Once the victim enters his/her password in such a fake login page, the login details are stolen away by the hacker.

Most Internet users would easily fall prey to such online phishing scams. Thus, phishing scams trick users in such a way that, they themselves give away their passwords. But phishing requires specialized knowledge and high level skills to implement. Therefore, it would not be possible for a noob user to attempt this trick. It is a punishable offense too. So, I would recommend that you stay away from phishing and make use of the keyloggers since it is the easiest and safest way to gain access to any online account. (collected)

Hacking Techniques 1. Keylogging – The Easiest Way!

Keylogging refers to simply recording each and every keystroke that is  typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will automatically load from the start-up, runs in the invisible mode and start capturing each and every keystroke that was typed on the computer.

Some keyloggers with advanced features can also capture screenshots and monitor every activity of the computer. One doesn’t need to have any special knowledge in order to install and use a keylogger. That means, anyone with a basic knowledge of computer can install and use this software with ease.
Hence, for a novice computer, user this method is the easiest way to hack a Facebook password.

Selection & Teamwork

Right balance of technical skills and personalities, and organizing that group so that the members work together effectively.
Personality Type
  1. Task-oriented:
    1. The motivation for doing the work is the work itself.
    2. who are motivated by the intellectual challenge of software development.
  2. Self-oriented:
    1. Who are principally motivated by personal success and recognition.
    2. They are interested in software development as a means of achievingtheir own goals.
    3. Have longer-term goals, such as career progression, that motivate them and they wish to be successful in their work to help realize these goals.
  3. Interaction-oriented:
    1. The principal motivation is the presence and actions of co-workers. People go to work because they like to go to work.

Most software engineering is a group activity.The development schedule for most non-trivial software projects is such that they cannot be completed by one person working alone.A good group is cohesive (solid) and has a team spirit. The people involved are motivated by the success of the group as well as by their own personal goals. Group interaction is a key determinant of group performance.Flexibility in group composition is limited Managers must do the best they can with available people

My Upwebhosting review Upwebhosting.com - Fraud

 My Upwebhosting review Upwebhosting.com - Fraud

Generally I am not in habit of posting such reviews but I don't want others to get fooled by the fake claims of upwebhosting.com so here is my upwebhosting review.

They have named themselves as upwebhosting.com but in actual they should be named as downwebhosting.com

My site is down from past 1 week. In-fact not just mine but sites of all other customers are down too from past 1 week.
Upwebhosting site was also down but is up now but my site is still down.

I have submitted serveral support tickets but never received any reply.
Today I found that I am not even unable to login to billing area. Perhaps this guy has closed the account.

Their facebook page is also full of such complaints. They have thousands of fake facebook likes on their page.

After some digging I found that upwebhosting also owns nexgenz.com (Nexgenz Technologies) and the owner of both sems to be a Pakistani named Wajahat Ali.



Hear I give give all my activities at upwebhosting.com

October 2, 2012: I take there reseller service.

October 3, 2012: They give me full control such WHM and Cpanel login details. they did take 4 days for setup.

October 3, 2012 - November 12, 2012: I was create three account. In this time one of site are go down and i open support ticket for solving problems but they don't replay for my maximum number of ticket.

November 13, 2012: I send email at info@upwebhosting.com for solving problems but they don't replay

upwebhosting.com Refund Policy

1. Our refund policy is valid for web hosting only, payment(s) made for domain registration are not refundable, however if a domain is not registered for any reason you will get a full refund

2. The 60 days refund policy applies to 1 year or above web hosting billing terms only

3. Refund can be requested by opening ticket, through phone or by sending email to: support@upwebhosting.com

4. Refund can be requested within 60 days after an order is placed, UpWebHosting will not ask for the reason of leaving

5. Refunds will be processed within 7 days after request is made.

November 22, 2012 : I was send email at info@upwebhosting.com, support@upwebhosting.com and open a support ticket for Give my Money Back and i think it may me it will take 7 days for processing purpose.

November 22, 2012 : i want to login my account at upwebhosting but i don't do this because they delete my account at upwebhosting.com

Do think 100 times before you think of sending even $1 to upwebhosting.com they are real fraud also there business and money back Guarantee

I have all document in my email, If any one need i will provide all

Please see another user review http://www.webhostingtalk.com/showthread.php?t=1204318

DOS / Windows IP Commands

Below, you'll find a list of the most common IP commands for Windows and DOS. These include ipconfig, trace route, netstat, arp, route, hostname, control netconnections, and other popular DOS and Windows IP commands.
Display Connection Configuration: ipconfig /all

Display DNS Cache Info: ipconfig /displaydns

Flush and Reset DNS Cache: ipconfig /flushdns

Release All IP Address Connections: ipconfig /release

Renew All IP Address Connections: ipconfig /renew

Re-Register the DNS connections: ipconfig /registerdns

Change/Modify DHCP Class ID: ipconfig /setclassid

Network Connections: control netconnections

Network Setup Wizard: netsetup.cpl

Test Connectivity: ping domainname.com

Trace Route: tracert www.domainname.com

Displays the TCP/IP protocol sessions: netstat

Display Local Route: route

Display Resolved MAC Addresses: arp

Display Name of Computer Currently on: hostname

Display DHCP Class Information: ipconfig /showclassid

NameServer Lookup: nslookup domainname.com

***collected*** http://www.whatismyip.com

change php settings using php.ini and .htaccess in cpanel


Due to the popularity of my previous post that guides how to increase upload_max_filesize on cPanel server I decided to create a more general article, that covers changing of other PHP settings using php.ini and.htaccess files.
In this article we will change the following php settings:
  • memory_limit – maximum amount of physical memory that can be allocated to PHP script
  • max_post_size – maximum size of data that can be transferred via POST method
  • register_globals – this variable allows to enable or disable register_globals
  • file_uploads – enables or disables file_uploads
First we will create our custom php.ini file:
  1. Login to your cPanel account, open public_html directory and create blank php.ini file
  2. Put php settings that you would like to change into the file. I will put all php variables, but if you would like to leave default values for some of them you can exclude them from the list
[PHP]
; increase php memory_limit to 128M
memory_limit = 128M
; increase php max_post_size to 20M
max_post_size = 20M
; enable file uploads
file_uploads = On
;disable register_globals
register_globals = Off
  1. Save php.ini file
Next we will create a custom .htaccess file. This is the most important step!
  1.  Edit .htaccess file and put there the path to your php.ini file. Replace “/home/whz/public_html” with path to your php.ini file. If your php.ini file is located in public_html directory, you only need to replace “whz” with your cPanel username
suPHP_ConfigPath /home/whz/public_html
  1. Save .htaccess file
Collected 

Download ja mendozite Templates Free


Tablet and Mobile (as default): support 2 modes, portrait and landscape.
Support 5 layouts (Extra-wide, wide, normal, tablet, mobile)
Multiple module styles and badges styles to choose from
Joomla 2.5.x compatible
Cross Browser Support: IE7+, Firefox 2+, Safari 3+, Chrome 8+, Opera 9+ and other Standards-Supporting Browsers.
Supports all mobile browsers
Valid 508 Accessibility
Well-commented css files flexible customization



Demo Link: Ja-mendozite-demo
Download Link: Ja-mendozite-download




Changing mac address in windows registry

MAC-Address is the hardware Network Address for the NIC which is unique for the system. However, there may be time when you need to change the MAC-Address for administrative purpose on a network. Some of the device drivers come with an option to change it from the device properties but not all (like my Broadcom Gigabit Ethernet Driver). For those who do not have the luxury of changing the MAC-Address from the device properties there is a way to do this  by editing the Windows Registry.
To change MAC-Address for a Network card in Windows Registry:
1. Click Start – Run, type “regedit”
2. Navigate to
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318]
HKEY_LOCAL_MACHINE
    \SYSTEM
        \CurrentControlSet
            \Control
               \Class
                  \{4D36E972-E325-11CE-BFC1-08002BE10318}
               
3. Under this key, you shoud see numbers in sequence as “0000″, “0001″ and so on. Click on one at a time to check the description of the device to match it with that of your Network Card. In my case (0001)


4. Once found, in the right-pane, look for “NetworkAddress” key value. If you find it, right-click and select modify. Enter the desired MAC-Address as a 12 digit number (all in one, no “space” “.” or “-”)
5. If you don’t find the key, right-click in the rightpane, select “New” – “String Value”. Enter the name as “NetworkAddress”. Now modify and set the desired value.
6. Now, disable and enable the Network card from the ControlPanel – Network Connections.
This should reflect the new MAC-Address on your NIC. Should you choose to go back to the original manufacturer set MAC-Address simply delete the key you just created/modified in the Windows Registry.

Source: http://www.windowsreference.com

Teamwork

Right balance of technical skills and personalities, and organizing that group so that the members work together effectively.

Personality Type

  • Task-oriented -
    • The motivation for doing the work is the work itself.
    • who are motivated by the intellectual challenge of software development.
  • Self-oriented -
    • Who are principally motivated by personal success and recognition.
    • They are interested in software development as a means of achieving their own goals.
    • Have longer-term goals, such as career progression, that motivate them and they wish to be successful in their work to help realize these goals.
  • Interaction oriented -
    • The principal motivation is the presence and actions of co-workers.
    • People go to work because they like to go to work.

Most software engineering is a group activity The development schedule for most non-trivial software projects is such that they cannot be completed by one person working alone. A good group is cohesive (solid) and has a team spirit. The people involved are motivated by the success of the group as well as by their own personal goals. Group interaction is a key determinant of group performance. Flexibility in group composition is limited Managers must do the best they can with available people

The People

The Stakeholders
  1. Senior manager – define business issues.
  2. Project (technical) manager – plan, motive, organize and control practitioners.
  3. Practitioners – deliver technical skill.
  4. Customers – specify the requirements.
  5. End user – directly interact with product.

Team Leaders
MOI Model of Leadership
  1. Motivation - The ability to encourage (by push or pull) technical people to produce to their best ability.
  2. Organization - The ability to mold exiting processes that will enable the initial concept to be translated into a final product.
  3. Ideas or innovation - The ability to encourage people to create and feel creativity
People Need Hierarchy

Characteristics of Team Leaders
  • Problem solving
    • Ability of diagnose the technical and organizational issues
    • Systematically structured solution or motivate practitioners to develop the solution
    • Apply lessons learned from past projects
  • Managerial Identity
    • Take responsibility of a assigned project
    • Must be confident
  • Achievement
    • Optimizing capability of productivity
  • Influence and team building
    • Able to “read” people
    • Able to understand verbal and nonverbal signals
    • Must remain under control in high-stress situations

Project Management

Projects need to be managed because professional software engineering is always subject to organizational budget and schedule constraints. The project manager’s job is to ensure that the software project meets and overcomes these constraints as well as delivering high-quality software.
Important goals are:
  1. Deliver the software to the customer at the agreed time.
  2. Keep overall costs within budget.
  3. Deliver software that meets the customer’s expectations.
  4. Maintain a happy and well-functioning development team.

Project Management Spectrum
  1. People
    1. Managing People
    2. Teamwork
  2. Product
  3. Process
  4. Project

Class Diagram

  • The class diagram is a static diagram. It represents the static view of an application.Class diagram is not only used for visualizing, describing and documenting different aspects of a system but also for constructing executable code of the software application.
  • The class diagram describes the attributes and operations of a class.
  • The UML diagrams like activity diagram, sequence diagram can only give the sequence flow of the application but class diagram is a bit different. So it is the most popular UML diagram in the coder community.
  • So the purpose of the class diagram can be summarized as:
    • Analysis and design of the static view of an application.
    • Describe responsibilities of a system.
    • Base for component and deployment diagrams.
    • Forward and reverse engineering.

Identifying Analysis Classes From a System:

  • General classifications for a potential class
    • External entity (e.g., another system, a device, a person)
    • Thing (e.g., report, screen display)
    • Occurrence or event (e.g., movement, completion)
    • Role (e.g., manager, engineer, salesperson)
    • Organizational unit (e.g., division, group, team)
    • Place (e.g., manufacturing floor, loading dock)
    • Structure (e.g., sensor, vehicle, computer)

Classes Hierarchy :

Classes Hierarchy

Example of Class Box :

Class Box

Class Diagram Drawing :

Class Diagram

Swim lane Diagram

  • Allows the modeler to represent the flow of activities described by the use-case and at the same time indicate which actor (if there are multiple actors involved in a specific use-case) or analysis class has responsibility for the action described by an activity rectangle.
  • A swim lane diagram, sometimes called a cross-functional diagram.
  • It is a process flowchart that provides richer information on who does what.
  • It can also be expanded to show times—when tasks are done and how long they take.

Example :Swim lane Diagram for POS

Swim lane Diagram for POS

Activity Diagrams

Activity Diagram Tools:

Activity Diagram Tools

Synchronization Bar:

A Synchronization Bar is used to describe an intermediary step in a process in an activity diagram.  This intermediary process re-establishes a logical level, usually the result of several inputs.


Example :Activity Diagram for Log in System

Activity Diagram for Log in System

Use Case Text

  • It is effective to use the first person “I” to describe how the actor interacts with the software.
  • Format of the text part of a use case.
Example


Use-case title :
Use-case text for system user.

Actor : system user.

Description :I can add new member in this system also i can add a subject... ... ... ... ... ... ...

 

Analysis Model

Elements of the Analysis Model













1. Scenario Based Element

2. Class Based Element
3. Flow Oriented elements
  • Data Flow Diagram
  • Control Flow Diagrams
  • Processing Narratives
4. Behavioral elements
  • State Diagrams
  • Sequence Diagrams
I will discuses all things one by one

Software Analysis

Software analyses are dividing into five parts:
Objectives of analysis model
  • To describe what the customer require.
  • To establish a basis for the creation of a software design.
  • To define a set of requirements that can be validated once the software is built

    What is a model?
    Ans:a model is a simplification of reality

    Why do we model?
    -we build models so that we can better understand the system we are developing.
    -we build models of complex systems because we cannot comprehend such a system in its entirety.
    -four aims to achieve:-
    1. help us to visualize a system.
    2. permit us to specify the structure/behavior of a system.
    3. give us a template that guides us in constructing systems.
    4.document the decisions we have made.

How to Enable Google Authorship link Joomla k2

Create a Google+ Profile and Link give that link on k2 user url Open file "components/com_k2/templates/default/item.php" Add   &qu...