Thursday, May 27, 2010

"Show Desktop" - in Linux & Windows

Show Desktop:
Windows - "Windows" key + "D"
In Linux - "Ctrl" + "Alt" + "D"

Run command:
Windows: "Windows" + "R"
Linux: "Alt" + "F2"

More shortcuts

Monday, May 17, 2010

Looking for your 'lost' Super?

Why let your hard-earned money let go lost?

SuperSeeker is a tool that will help you look for your lost and unclaimed superannuation and provide you with a list of possible matches.

Fact is:
  • 1 in 2 working australians have a lost super account
  • approx. $12.9Billion lost in super accounts.

Java 1.5 - New Features over Java 1.4

Java Language Features

This long-awaited enhancement to the type system allows a type or method to operate on objects of various types while providing compile-time type safety. It adds compile-time type safety to the Collections Framework and eliminates the drudgery of casting.
eg: HashSet<String>

Enhanced for Loop (for-each)
This new language construct eliminates the drudgery and error-proneness of iterators and index variables when iterating over collections and arrays.
eg: for (Rank rank : ranks)

This facility eliminates the drudgery of manual conversion between primitive types (such as int) and wrapper types (such as Integer).
eg: int i =1; Integer iWrapped = i;

Typesafe Enums
This flexible object-oriented enumerated type facility allows you to create enumerated types with arbitrary methods and fields. It provides all the benefits of the Typesafe Enum pattern without the verbosity and the error-proneness.
eg: enum Season { WINTER, SPRING, SUMMER, FALL }

This facility eliminates the need for manually boxing up argument lists into an array when invoking methods that accept variable-length argument lists.
eg: String result = MessageFormat.format( "At {1,time} on {1,date}, there was {2} on planet " + "{0,number,integer}.", 7, new Date(), "a disturbance in the Force");

Static Import
This facility lets you avoid qualifying static members with class names without the shortcomings of the "Constant Interface antipattern."
eg: import static java.lang.Math.PI;

Metadata (Annotations)
This language feature lets you avoid writing boilerplate code under many circumstances by enabling tools to generate it from annotations in the source code. This leads to a "declarative" programming style where the programmer says what should be done and tools emit the code to do it. Also it eliminates the need for maintaining "side files" that must be kept up to date with changes in source files. Instead the information can be maintained in the source file.
eg: In annotations with a single element, the element should be named value, as shown below:
 * Associates a copyright notice with the annotated API element.
public @interface Copyright {
    String value();
It is permissible to omit the element name and equals sign (=) in a single-element annotation whose element name is value, as shown below:
@Copyright("2002 Yoyodyne Propulsion Systems")
public class OscillationOverthruster { ... }

J2SE 5.0 - new features
Performance Improvements

History of Java 2 (incl. code names)

JDK 1.1 (released on Feb 19,1997)
 Major additions included an extensive retooling of the AWT event model, inner classes added to the language, JavaBeans and JDBC.

J2SE 1.2
(Dec 8, 1998) — codename Playground.
  Major additions included reflection, a Collections framework, Java IDL (an IDL implementation for CORBA interoperability), and the integration of the Swing graphical API into the core classes. a Java Plug-in was released, and Sun's JVM was equipped with a JIT compiler for the first time.

[J2SE 1.2 and subsequent releases through J2SE 5.0 were rebranded Java 2 and the version name "J2SE" (Java 2 Platform, Standard Edition) replaced JDK to distinguish the base platform from J2EE (Java 2 Platform, Enterprise Edition) and J2ME (Java 2 Platform, Micro Edition)]

J2SE 1.3 (May 8, 2000) — codename Kestrel.
 Notable changes included the bundling of the HotSpot JVM (the HotSpot JVM was first released in April, 1999 for the J2SE 1.2 JVM), JavaSound, JNDI and JPDA.

J2SE 1.4 (Feb 6, 2002) — codename Merlin.
 This was the first release of the Java platform developed under the Java Community Process as JSR 59. Major changes included regular expressions modeled after Perl, exception chaining, an integrated XML parser and XSLT processor (JAXP), and Java Web Start.

J2SE 5.0 or 1.5
(Sep 30, 2004) — codename Tiger.
 Developed under JSR 176, Tiger added a number of significant new language features including the for-each loop, generics, autoboxing and var-args.

Java SE 6 (Dec 11, 2006) — codename Mustang --> current version
 is bundled with a database manager, facilitates the use of scripting languages (currently JavaScript using Mozilla's Rhino engine) with the JVM and has Visual Basic language support. As of this version, Sun replaced the name "J2SE" with Java SE and dropped the ".0" from the version number. Other major changes include support for pluggable annotations (JSR 269), lots of GUI improvements, including native UI enhancements to support the look and feel of Windows Vista, and improvements to the JPDA & JVM Tool Interface for better monitoring and troubleshooting

Java SE 7 — Codename Dolphin.
 The Dolphin Project started in August 2006, with release estimated in September 2010. New builds including enhancements and bug fixes are released approximately weekly.[13]

JNDI - Java Naming and Directory Interface
JPDA - Java Platform Debugger Architecture
JDBC - Java DataBase Connectivity
JAXP - Java XML Parsing
J2SE - Java 2 Standard Edition
J2EE - Java 2 Enterprise Edition
J2ME - Java 2 Mobile Edition
JVM - Java Virtual Machine
JCP - Java Community Process

Saturday, May 8, 2010

Finding the Owner of a Domain Name & Domains owned by a person

You can find the owner of a domain name using a quick and free Whois search with any domain provider like:
3. or so.

1. Go to whois search site (lets say: option1 above).
2. In 'Search Whois record' bar, enter the site name (say:, including .com,.net etc. (some sites you need to select this from drop-down) and Search.

It displays the Owner details (Registrant incl. address & other contact details), Registrar (Domain hosting company), Created,Updated & Expiry dates, domain status (clientTransferProhibited, clientUpdateProhibited etc. when registrar is in charge).
You can also see the other domains registered in teh name of the registrant, if any.

Some whois sites, give you the provision to buy (if domainname available to buy) or if domainname owned it may broker to acquire. If don't wanna go thru a broker, contact the owner directly; he can help unless site is 'clientTransferProhibited'.

Most of the Whois don't tend to store registration details esp. com domains (Thin Whois server); others (Thick Whois server) stores the complete WHOIS information from all the registrars for the particular set of data (eg: of all org domains). Some thin client internally fires whois query to other registrars before displaying. If not so then note the "Whois Server" in the lesser details available and go to the site and search.

Querying individual Regional Internet Registries directly
WHOIS servers operated by Regional Internet Registries (RIR) can be queried directly to determine the Internet Service Provider responsible for a particular resource. For web-based searches, these server URLs are:
Regional Internet Registries

    * AfriNIC:
    * APNIC:
    * ARIN:
    * LACNIC:
    * RIPE NCC:

The records of each of these registries are cross-referenced, so that a query to ARIN for a record which belongs to RIPE will return a placeholder pointing to the RIPE WHOIS server. This lets the WHOIS user making the query know that the detailed information resides on the RIPE server. In addition to the RIRs servers, commercial services exist, such as the Routing Assets Database used by some large networks (e.g., large Internet providers that acquired other ISPs in several RIR areas).

Thru Commandline:
whois -h

Getting whois server (eg: for au domains):
$ dig +short srv
0 0 43

About Whois:

WHOIS is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

Today, WHOIS is used beyond determining the registration status of domain names like:
  • Assisting law enforcement authorities in investigations for enforcing national and international laws, including, for example, countering terrorism-related criminal offenses and in supporting international cooperation procedures.
  • Assisting in the combating against abusive uses of Information communication technology, such as illegal and other acts motivated by racism, racial discrimination etc.
  • Facilitating inquiries and subsequent steps to conduct trademark clearances and to help counter intellectual property infringement, misuse and theft in accordance with applicable national laws and international treaties.
  • Assisting businesses, other organizations and users in combating fraud, complying with relevant laws and safeguarding the interests of the public.

Cut-Copy-Paste in different OS

The most common operation in information industry is: Cut-Copy-Paste.
Thru evolution of different species of OS, they differed.
Below are some of them:
Cut Copy Paste
Generic/Apple command-X command-C command-V
Windows/GNOME/KDE control-X / shift-Delete control-C / control-Insert control-V / shift-Insert
BeOS alt-X alt-C alt-V
Common User Access shift+Delete control+Insert shift+Insert
Emacs control-W (to mark) control-K (to end of line) meta-W (to mark) control-Y
vi d (delete) y (yank) p (put)
X Window System
click-and-drag to highlight middle mouse button