Java : Encryption and Decryption of Data using AES algorithm with example code

There are many problems when you try encrypting a string such password, credit card nos, phone no. etc ie
1. which algorithm to use.
2. how to store the generated Key in the database.
3. should i use MD5, AES etc.

Here is the question to all your answers. After spending sometime on this i finally got the best algorithm that a person can use to encrypt and decrypt data while he/she also wants to store those encrypted strings and later on want to decrypt it while retrieving the data.


Microsoft SQL Server 2008 installation tutorial

Using Microsoft SQL Server 2008 for the first time for me was difficult because of it UI. So I thought I would make a post for the rest of the people.

MicrosoftCertifications requires an individual to know about installing, troubleshooting, and maintaining Microsoft’s many products, like the SQL server. 

Before we start I would recommend you should download the SQL Server 2008 Express, From Here. After you have downloaded SQL Server then download SQL Server 2008 Management Studio Express, Click here and if you have a 64-bit PC then please download the SQL Server Service Pack 1 or you do it by using windows update after installing everything.


Java Servlet Basics

Servlet Basics
Servlets are Java programs running on a web server that produce  results viewed remotely on a web server. Servlets has the same purpose that CGI or PHP had in the past.Here in this tutorial we are going to learn about servlet request and response model, its life cycle, error handling etc.


Image Processing : Morphology based Segmentation using MATLAB with program code

Segmentation or contouring could be also obtained using morphological operations. Segmentation subdivides an image into its constituent regions or objects. The level to which the subdivision is carried depends on the problem being solved. That is, segmentation should stop when the objects of interest in an application have been isolated. For example, in the automated inspection of electronic assemblies, interest lies in analyzing images of the products with the objective of determining the presence or absence of specific anomalies, such as missing components or broken connection paths. There is no point in carrying segmentation past the level of detail required to identify those elements.