Choose your java wisely…

Written by Shashank


Java has come along a long way. Many would agree with this. I did not untilrepparttar Java 1.5 “Tiger” hit me. The tiger had several new features, and more importantly, it has new syntax. Six major upgrades thatrepparttar 107665 tiger presents are certainlyrepparttar 107666 generics, enhanced for loop, autoboxing (unboxing), improvement on Typesafe enum, Static import andrepparttar 107667 metadata. Out of these six, at least four would be used in my daily “programming” life. Of course there are many more, which can be found at java’s official site. From java 1.1 to 1.4, it seemed more like new frills were simply added. It felt like earning more brownie points when you downloadedrepparttar 107668 newer version. But should I start using 1.5 immediately, maybe not.

The developers and programmers (if you distinguish between them) are left with one great dilemma (me too). It certainly is as to which version to use when preparing software in java. This problem hides itself underrepparttar 107669 carpet when you are programming for a specific client with a specific system where you can get it upgrade on site, but whenrepparttar 107670 app is going to be used by Mr. Williams from South Africa and Ms. Lee from Japan, you really have to give a thought as to whether your app is going to run on bothrepparttar 107671 systems (that is why java was made inrepparttar 107672 first place, isn’t it?). I’ve always hadrepparttar 107673 latest version ofrepparttar 107674 sdk, yet I would try and target compiling in a lower possible version, so that even those people would be able to userepparttar 107675 apps, who were, well, frozen in time and didn’t go uprepparttar 107676 “version ladder”. For e.g., ordinary applets, by me and my company, in most ofrepparttar 107677 cases would be compiled in java 1.1, so that no user ends up waiting for an hour beforerepparttar 107678 plugin forrepparttar 107679 latest version is downloaded and installed (get yourself a coffee if your yawning). For e.g., once on a tour, I happened to visit some site in a cyber café, which said that I needed to install java plugin 1.4 to viewrepparttar 107680 page correctly (apparently, cyber cafes don’t bother much about upgrading java), and when I did, it turned out to be a stupid advertisement (Ahhh! What agony!). Of course, over a period of time, you expectrepparttar 107681 users to have gone to a level of higher java plugin courtesy other company’s applets, but just to be sure…

Open Sesame - Password Security

Written by Terrence F. Doheny


Open Sesame – Password Security

“Open Sesame!” is probablyrepparttar most famous password in literature. It gave Ali Baba access to vast treasure. Inrepparttar 107664 realm of technology, computer passwords also give access to valuable treasures: precious business and personal data.

Information about your personal life, buying habits, credit quality and life style is valuable to those who can profit from it. Forrepparttar 107665 Corporation, information has even greater worth. It is notrepparttar 107666 “Bricks and Mortar” butrepparttar 107667 intangibles such as intellectual property, client lists, market strategies, pricing and compensation that account for over halfrepparttar 107668 value ofrepparttar 107669 modern enterprise.

All of this personal and business data most likely resides on a database somewhere and is available with a password. In fact, passwords arerepparttar 107670 most common means of entry in any system. They are also acknowledged asrepparttar 107671 most vulnerable points for security. “Weak” or compromised passwords arerepparttar 107672 easiest way for hackers to gain entry into a system.

Simple or short passwords can be easily discovered through “brute force” or “dictionary” attacks which concentrate intense computer power to crack a password. A two letter password, for example, has only 676 combinations. A password with eight letters offers more safety with 208,000,000 combinations.

Ideally, a password should consist of 8 or more characters. They should also contain a mixture of upper and lower case letters, symbols and numbers. “A$d3B5i9X” would be an example. Microsoft security has encouragedrepparttar 107673 concept ofrepparttar 107674 “Pass Phrase” as an alternative. A phrase such as,”TheLastGoodBookUBoughtCost$25!” has all ofrepparttar 107675 needed elements and is also easy to remember.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use