Tuesday 1 September 2015

Java Interview Questions for Freshers

Dear readers, these Java Interview Questions have been designed especially to get you
acquainted with the nature of questions you may encounter during your interview for the subject
of Java Programming Language. As per my experience, good interviewers hardly planned to ask
any particular question during your interview, normally questions start with some basic concept of
the subject and later they continue based on further discussion and what you answer
.

These are some samples what is in the file:-

Q: What is JAR file?
A: JAR files is Java Archive fles and it aggregates many files into one. It holds Java classes in a
library. JAR files are built on ZIP file format and have .jar file extension.

Q: What is a WAR file?
A: This is Web Archive File and used to store XML, java classes, and JavaServer pages. which is
used to distribute a collection of JavaServer Pages, Java Servlets, Java classes, XML files, static Web
pages etc.

Q: What is NullPointerException?
A: A NullPointerException is thrown when calling the instance method of a null object, accessing or
modifying the field of a null object etc.

Q: What are the ways in which a thread can enter the waiting state?
A: A thread can enter the waiting state by invoking its sleep() method, by blocking on IO, by
unsuccessfully attempting to acquire an object's lock, or by invoking an object's wait() method. It
can also enter the waiting state by invoking its (deprecated) suspend() method.

 To get it : Click Here

Thursday 2 April 2015

PD-Proxy Its Really Magic(Free 3 Months Premium membership)

PD-Proxy is a tunneling software that can secure your internet connection by encrypting all your connections to the internet.
http://www.pdproxy.com/
It can remove/unblock content, services and different websites that is normally blocked by your ISP. It can anonymize your connection because nobody likes to be spied on and tracked.Refer this diagram to understand what it is and how it is really works.
                                                              CLICK HERE


VPN Diagram

PD-Proxy Diagram
Benefits of VPN Include
Security - VPNs provide the highest level of security using advanced encryption and authentication protocols that protect data from unauthorized access. When you create a private virtual tunnel between your computer and ours, and surf the internet from there, your VPN account is giving you a layer of security you did not have before.


Anonymous Surfing - Our service will make anonymous and secure your Internet connection, creating an encrypted tunnel between you and our servers. This will assign a new ip address to your computer, in this case your online activity is anonymous and prevents harassment caused by people tracking you by your IP address.

Wi–Fi® Security for a Wireless World™ - when you use public Wi–Fi® hotspots, all the information you send to and receive from the Internet is sent over the air in the clear. Wi–Fi® is a radio, broadcasting everything to anyone who bothers to listen. Web pages, emails and passwords, instant message traffic, everything that’s not encrypted is readable by anyone in the area.

PD-Proxy uses industry–standard Virtual Private Networking (VPN) technology to create a secure tunnel between your laptop and the PD-Proxy servers. When you connect to PD-Proxy, all your Internet traffic goes through this encrypted tunnel, preventing users nearby from intercepting your information.

Everyone has right to protect privacy online. No one should spy on you while you are browsing anonymously. There are times when we feel hostile environment due to one reason or another, and we really need some solution for anonymous internet surfing, PD-Proxy serves to be the best option at that time!

Our VPN services bypass internet filters, and internet browsing goes uncensored. At the same time you are secure, its more like getting complete freedom on Internet. So do you really need a VPN? Click here to learn more why you should use a VPN.