Tuesday, June 28, 2011

Java : Encryption and Decryption of Data using AES algorithm with example code

Posted by on Tuesday, June 28, 2011
There are many problems when you try encrypting a string such password, credit card nos, phone no. etc ie
1. which algorithm to use.
2. how to store the generated Key in the database.
3. should i use MD5, AES etc.

Here is the question to all your answers. After spending sometime on this i finally got the best algorithm that a person can use to encrypt and decrypt data while he/she also wants to store those encrypted strings and later on want to decrypt it while retrieving the data.

Thursday, June 23, 2011

Microsoft SQL Server 2008 installation tutorial

Posted by on Thursday, June 23, 2011
Using Microsoft SQL Server 2008 for the first time for me was difficult because of it UI. So I thought I would make a post for the rest of the people.

MicrosoftCertifications requires an individual to know about installing, troubleshooting, and maintaining Microsoft’s many products, like the SQL server. 

Before we start I would recommend you should download the SQL Server 2008 Express, From Here. After you have downloaded SQL Server then download SQL Server 2008 Management Studio Express, Click here and if you have a 64-bit PC then please download the SQL Server Service Pack 1 or you do it by using windows update after installing everything.

Wednesday, June 22, 2011

Java Servlet Basics

Posted by on Wednesday, June 22, 2011
Servlet Basics
Servlets are Java programs running on a web server that produce  results viewed remotely on a web server. Servlets has the same purpose that CGI or PHP had in the past.Here in this tutorial we are going to learn about servlet request and response model, its life cycle, error handling etc.

Wednesday, June 8, 2011

Image Processing : Morphology based Segmentation using MATLAB with program code

Posted by on Wednesday, June 8, 2011

Segmentation or contouring could be also obtained using morphological operations. Segmentation subdivides an image into its constituent regions or objects. The level to which the subdivision is carried depends on the problem being solved. That is, segmentation should stop when the objects of interest in an application have been isolated. For example, in the automated inspection of electronic assemblies, interest lies in analyzing images of the products with the objective of determining the presence or absence of specific anomalies, such as missing components or broken connection paths. There is no point in carrying segmentation past the level of detail required to identify those elements.

© 2010 Code 2 Learn