Tuesday, December 28, 2010

CrazyEngineers Forum - Computer Science & IT Engineering

CrazyEngineers Forum - Computer Science & IT Engineering


Calculations using Command Prompt!

Posted: 28 Dec 2010 12:21 AM PST

The command processor CMD.EXE can perform simple arithmetic on 32-bit signed integers:

Eg:

C:\>set /a 5+5
10

C:\>set /a 4*(8/2)
16

C:\>set /a (4*8)/4
8


For more information, type 'set /?' in the command prompt.

Run Firefox inside Firefox

Posted: 28 Dec 2010 12:11 AM PST

I just found this cool trick.

You can run Firefox inside firefox just by typing following url.

copy paste the following url in a web browser (mozilla firefox).

chrome://browser/content/


Does anybody know how it works?

Telnet on some other port

Posted: 27 Dec 2010 09:09 PM PST

Hey guys,
I know that Telnet protocol works over port no 23.
But recently i was reading about HTTP in which telnet was used over port no 80.
I did not get the idea of using telnet on some other port.
What is the meaning of using telnet over port no (except 23)

I used telnet to remote login and it basically happens on port 23 by default.
Please correct me.....

Regarding SAS Software---- urgent

Posted: 27 Dec 2010 10:48 AM PST

Hello ,
I want to learn about this software but don't know which book to consult . As I am beginner and know nothing about this software please suggest me some books to learn about this software .
:confused:

embedd flash in php based website

Posted: 27 Dec 2010 06:52 AM PST

hello,

i am making my own website in php and in order to make it a quite attractive one i want to know how one can use pages (designed in flash) in php based website.

thank you

RSA Encryption

Posted: 27 Dec 2010 06:11 AM PST

One commonly used cipher of this forms called RSA Encryption,
where RSA are the initials of the three creators: Rivest, Shamir, and Adleman. It
is based on the following idea:
It is very simply to multiply numbers together, especially with computers. But it can
be very difficult to factor numbers. For example, if I ask you to multiply together
34537 and 99991, it is a simple matter to punch those numbers into a calculator and
3453389167. But the reverse problem is much harder.
Suppose I give you the number 1459160519. I'll even tell you that I got it by multi-
plying together two integers. Can you tell me what they are? This is a very difficult
problem. A computer can factor that number fairly quickly, but (although there are
some tricks) it basically does it by trying most of the possible combinations. For any
size number, the computer has to check something that is of the order of the size of
the square-root of the number to be factored. In this case, that square-root is roughly
38000.
Now it doesn't take a computer long to try out 38000 possibilities, but what if the
number to be factored is not ten digits, but rather 400 digits? The square-root of a
number with 400 digits is a number with 200 digits. The lifetime of the universe is
approximately 10^18 seconds an 18 digit number. Assuming a computer could test
one million factorizations per second, in the lifetime of the universe it could check
10^24 possibilities. But for a 400 digit product, there are 10^200 possibilties. This means
the computer would have to run for 10^176 times the life of the universe to factor the
large number.
It is, however, not too hard to check to see if a number is prime in other words to
check to see that it cannot be factored. If it is not prime, it is difficult to factor, but if it
is prime, it is not hard to show it is prime.
So RSA encryption works like this. I will find two huge prime numbers, p and q that
have 100 or maybe 200 digits each. I will keep those two numbers secret (they are
my private key), and I will multiply them together to make a number N = pq. That
number N is basically my public key. It is relatively easy for me to get N; I just need
to multiply my two numbers. But if you know N, it is basically impossible for you
to find p and q. To get them, you need to factor N, which seems to be an incredibly
difficult problem.
But exactly how is N used to encode a message, and how are p and q used to decode
it? Below is presented a complete example, but I will use tiny prime numbers so it is
easy to follow the arithmetic. In a real RSA encryption system, keep in mind that the
prime numbers are huge.

how to call a three procedures in a single statement?

Posted: 27 Dec 2010 06:05 AM PST

I am currently facing this problem. i have to write a single callable statement that will call three procedures and calling second procedure from first procedure is not a option . please help.

No comments:

Post a Comment