Showing posts with label Tutors. Show all posts
Showing posts with label Tutors. Show all posts

Wednesday, February 12, 2014

15 Popular Linux Commands with Examples

No comments:


In this tuturial i will present you my absolute top 15 linux commands.

As an addition to the wonderfull tutorial of Justin http://community.linuxmint.com/tutorial/view/100

will this tutorial introduce totally new command's. The reason: Because knowing these commands will make your life a whole lot easier!

I am also showing examples on how to use the command as well.

Let's get started!

-------------------------------------------------------------------------------------------------------------------------------------------------

# 1: cd

The "Change Directory" command enables you to navigate to another directory.

The cd command is THE most important command there is in linux i think. As the command suggests, it enables the user to change / jump to a directory.

Example: cd Downloads
Example: cd /etc/
Example: cd .. (Directory up!)


note: Afther you have typed cd and entering the first or two letters of the directory you can press the TAB key to autocomplete the directory! so... cd  Do (press tabkey) will autocomplete it to Downloads. i use this a lot <-- p="">
#2: man

The man command shows the users the "manual" of the command. In some situation you might need to get more information about the command you are using. The man command shows you this information about the command.

Example: man cp

This will open up the "cp" manual document for us in the shell. The manual shows us the parameters available for the commands.

note: To close the manual simply press "Q".



#3: ls

In the absolute top 15 there's no way the ls command is missing. On the third place, the ls command. The ls command is used to list the files/directories within a directory.

Example: ls

It shows us the directories available.



#4: cp

The cp command is available for us to "Copy" things. This might be usefull for duplicating files f.e.

Example: cp file file2

note: file is on this case the file the user wants to be copied... file2 is the name of the copied file. It's that simple.



#5 mv

The mv command is used for "Move" operations. The mv commands enables the users to move a file/directory to a specified location.

Example: mv /home/bas/Desktop/bla /home/bas/Desktop/fiets


note: the first part of the command is the file that has to be moved. The second part (after the whitespace) is the target directory. Make sure you type in the full path using this command!



#6 mkdir

This command is used to "make" directories, NOT Files.. (thit is possible with another command which i will bring up later in this tutorial)

Example: mkdir testdirectory

note: The name of the directory is case sensitive which means that Testdirectory is a complete different directory as testdirectory.



#7 rmdir

When you are able to make directories, you also want to know how to remove them. Removing directories is done by the rmdir command and belongs to the absolute basic commands in shell bashing.

Example: rmdir fiets

note: When the directory is not empty the command will prompt an error message:

rmdir: failed to remove `fiets': Directory not empty


So make sure it's completely empty before removing it.



#8 touch

Now we know how to make directories and deleting them, i now want to use the touch command. The touch command is used to make files.

Example: touch vogel

This will create the file vogel for us in the directory.



#9 rm

The rm command stand for remove. The rm command is used in order the delete files instead of directories.

Example: rm vogel

note: To remove files you must have the right permission bits set on the specific file.



#10 tar

Sometimes you have to archive files. Archiving files is a way to pack a set of files to one single file. The operation is done by the tar command.

Example: tar -cvf test.tar test (Creating a tar file from directory or file test)

Example: tar -xvf test.tar myexctractfolder (Extracts the particular tar file in the current working directory)

In the example i used parameters. These parameters are telling the tar command how to behave and how to execute.  After the parameters i entered the name of the file which is test.tar. The second part is the source directory/file of the tar file. In this situation a directory called test.



#11 pwd

Sometimes you really wonder where you are in the system. PWD is the solution for that problem.

PWD stands for Path Working Directory.

Example: pwd



#12 ifconfig

ifconfig is a command showing you information about the ethernet adapters on your system. It contains very usefull information like gateway, ip,  and packet statistics. For the average user this command is rarely used, but i think it's worth knowing it.

Example: ifconfig

note: To gain information about the wireless adapters on your system type iwconfig.



#13 locate

Locate is an extremely fast seaching command. It shows the directories or files each on a new line.

Example: locate syslog

Example: locate syslog | more (Piping structure used to invert the data from locate to the more command)

note: Some keywords returns enormous ammounts of hits. Use MORE to  (see example)  clear things up a bit.



#14 ping

Ping is used as a network diagnostic command by professionals. Ping offers information about the network we are on and if the other system responds to us. In cases of troubleshooting network related problems, ping can do a great job to determine the domain of the problem.

Example: ping www.google.com

The command returns the interval and % of loss during the test.

note: You can stop ping bij pressing crtl-c at the same time.



#15 chmod

The chmod command. The chmod command comes from "Change Mode" back to the unix times. It's a great command to restrict access to directories or files. But before i show you an example on how to use it, some theory.

Chmod is qiet an advanced command to use. So therefore you really need to understand how it works.
chmod works with so called persmission bits. These bits can be set to a certain level of restrictions.

We have the following bits available:

7 full
6 read and write
5 read and execute
4 read only
3 write and execute
2 write only
1 execute only
0 none
source: http://en.wikipedia.org/wiki/Chmod



The bits shown above are the permissions for a particular group or class.

Files or directories contain four classes:

1st: The owner itself
2nd: Member of the file group
3rd: Others
4th: All of the above

To set the right permission bits the a particular group or class it is very important to select to right amount of permission bits.

for example, i will create a file and protect this file for being modified by anyone else besides me. Also will i protect the file for being deleted.

This is how i do it: chmod 400 mijndagboek

In this command i gave up the 4 bit in the "members of the group" 0 to others and 0 to all.

Now not even me is able to delete the file anymore without using the sudo command.

But.. there is more. The classes i talked about earlier are devided into three seperate like actions.. those are:

Read
Write
Execute
In order to add very specific restrictions to a file or folder you can use a trick to do that. I will show you how.

If we want to restrict access to a file without knowing the exact bit number we can do the following.

RWX = 7 Which is the permission bit of Read, Write, and Execture together.

Seperating these bits gives us the following values individually:

Read = 4 bits.
Write = 2 bits.
Exec = 1 bit.


So we have 3 groups to take care of (the first group which is the owner is optional in chmod)

[membersgroupbit],[others],[alloftheabove]

if we want to give everyone, and i mean everyone access to the directory i can do:

chmod 777 mijndagboek

[read=4+Write=2+Execute=1=7],[read=4+Write=2+Execute=1=7],[read=4+Write=2+Execute=1=7]

This is not good!

We want to restrict the access for the file offcourse so a better chmod would be:

chmod 700

[read=4+Write=2+Execute=1],[0][0]



--------------------------------------------------------------------------------------------------------------------

This is the end of the top 15 i made for you. I hope you enjoyed it, and hopefully even learned something as well.

i wish you all good luck mastering linux.


Gsv Pics |Gsv Vids | Techno zip| Divine Thought | For The Sake of Us | Gsv Films |Admin YouTube Videos

Monday, August 15, 2011

Software Testing process in 5 Easy Steps

No comments:

Testing in simple steps:

• Step-1:Requirements
• Step-2:Test planning
• step-3:Test case writing
• step-4:Test case execution
• step-5:Test sign-off 


Requirements

First and most important input for testing is requirement. Requirements are mostly gathered by the Business development team. These requirements are really not of technical requirements. Language is very much understood by non-technical users. Later on Project Manager/Programme Manager comes up with the requirements in proper format commonly known as functional specifications/business requirement specifications. These documents generally are doc format.


Tester's role:

It's really important for test team to participate in requirement review process.This helps the entire product team to start in right track from the beginning. Output expected from a tester here in review meetings are:
• See if requirements are testable?
Example: If Requirement says "Web pages must look beautiful". How will you test if web pages are beautiful? Can you answer this? So test team points out these kind of issues in requirement reviews.
• Make sure requirements are clear,concise and not contradictory.
• Understand the requirements clearly,ask questions.As later in cycle tester's need to test the application against the requirements.
This is the first stage where tester test the requirements.


Test Planning :

Once you are done with requirement reviews then PM/PO will come up with the final version of requirement specs.
Now based on the final requirement specs test team will plan there testing activities like coming up with test strategy, test plan writing etc...
Test plan is mostly developed by test lead or senior test member. The test planning will mainly answer the following:
• What to cover :functional testing, performance testing, load testing, accessibility testing, regression testing etc..?
• Time line for above.
• who will do what?
• Only manual testing or Automation?
• If Automation then what percentage?
• Dependencies?
• Test activities & timeline: like test case writing, test execution, bug bash, test sign off etc
• Test sign off criteria.

Test case writing

Once test plan is written it go through some review process and final document gets publish in the team. Now testers start writing test cases for the features/functionality. Good way of writing test cases is to first write test case outlines (TCO's) and then convert those tco's in detail test cases.
TCOs are basically one line statement about a test scenario that test intend to test.
Further tester breaks the TCOs in multiple test cases with all details like "Steps", "Expected results", "Priority" etc..
• To see if there is a good test coverage for scenarios.
• To see if steps provided in test cases are clear and concise."
Tools used for Test case writing : Some companies use word or excel format and rest uses Test management tools.
Other activities that always go along with test case writing is test case update where testers Add/edit/delete test cases because of following reasons:
o Wrong test cases written by a tester.
o Some changes in existing requirement which may require editing of existing test case or adding new test cases.
o Missed scenarios by testers.
Test Execution/Test Pass/Test Run

Once the Developer are done with coding. Test team starts the action:

  • o Developer release a build for testing.
  • o Test team will now run BVT tests.
  • o Once the BVT tests are passing. Test team will accept the build.
  • o Now the actual test pass starts.
  • o Test team will run the tests they have written.
  • o Test will mark the test cases Pass/Fail accordingly.
  • o Test will log bugs for the failed test cases.
  • o Test will verify the fix for resolved bugs and accordingly close the bugs.
  • o Test team will do the complete test pass again if required or do a test of some selective test cases to make sure that there are no regression bugs.
These activities are part of every milestone or iterations. Once test passes are complete.
Next step is Test Sign-off.


Test Sign-Off

Now the time comes when test team will do the test sign-off. Normally the test sign-off criteria is mentioned in the test plan. It's being done by the QA head/test manager/lead.

Monday, March 14, 2011

SQL Quick Ready reference in 5 steps -Tutorial

No comments:

SQL is a standard language for accessing databases.

Our SQL tutorial will teach you how to use SQL to access and manipulate data in:

MySQL, SQL Server, Access, Oracle, Sybase, DB2, and other database systems.

A standard SQL query might look like this:

SELECT first, last, occupation, sum(amount)
FROM tenngive
WHERE occupation = ``ROCKET SCIENTIST’’
GROUP BY first, last, occupation
ORDER BY 4 desc

Assume we are querying a database of campaign contributions. In English, the query means:

Show me the first and last names and occupations of donors who appear in the table called tenngive and the total amount of money that each gave -- but only if they listed their occupation as ``rocket scientist.’’ Return these records in reverse descending order of the summed amount to show which rocket scientist gave the most money.

The bold words represent the SQL ``template.’’ The remaining parts of the query -- such as ``last’’ and ``first’’ -- vary depending on the contents of your database and the questions you want to ask; however, if you can memorize the following template, you can write any basic SQL query. Just remember: You don’t have to use every piece of the template, but the pieces you do use must occur in this order. Read below for more information on what each means.

SELECT
FROM
WHERE
GROUP BY
HAVING
ORDER BY

1. SELECT: Every query must have SELECT

A database could have 100 or more fields of data, but you might only be interested in two or three of them. Use SELECT to pick the fields that you wish to display.

Also, use SELECT to calculate a new column of data -- for example, when you want to sum numbers or count items. (See additional information under GROUP BY.)


2. FROM: Every query must have FROM

You must tell the computer which table, or tables, you want to use. Use FROM to identify the table or tables that you are using. If you are using more than one table – in other words, if you are joining tables together – list each one on the FROM line, separated by a comma

3. WHERE: Using WHERE to filter records is optional – but it is mandatory for joining tables.

Filtering: A table might have 1 million records in it, but you might only be interested in records that fit a certain criteria -- for example, perhaps you only want to look at people whose last name is ``SMITH’’ or whose occupation is ``ROCKET SCIENTIST.’’ Example:

SELECT *;
FROM tenngive;
WHERE last = “VIKRAM”
Joining: In addition, when you link two or more tables together, use WHERE to establish the join. Example:

SELECT last, rest, amount, cand_name;
FROM tenngive, tncands;
WHERE id=cand_id


Data type: You must know each field’s data type. In filters, text info must be enclosed in quotations marks. Dates must be enclosed in French braces. Numeric data is not enclosed. Examples:

TEXT: SELECT *;
FROM columbia;
WHERE street = “RANGELINE”

DATES: SELECT *;
FROM hospital;
WHERE dob = #5/17/72#

NUMBERS: SELECT *;
FROM bonus;
WHERE amount = 1000

Equals, greater than, etc.: In addition to saying something equals a particular value, you can specify:
“greater than” with >
“greater than or equal to” with >=
“less than” with < “less than or equal to” with <= “not equal to” with <>


Wildcards: The wildcard in Access is the percent symbol -- * -- and it must be used with the word “like” in place of the equals sign. Example:

SELECT *;
FROM business;
WHERE company LIKE “*MICROSOFT*”

Boolean Logic: The WHERE line is the only place in SQL that you may use “and,” “or” or the symbol for not, which is <>. Examples:

SELECT *;
FROM tenngive;
WHERE last like “*HASLAM*” OR rest like “*HASLAM*”

SELECT *;
FROM tenngive;
WHERE last = “GRUBB” AND occupation = “ATTORNEY”

SELECT *;
FROM tenngive;
WHERE last <> “WOOD”
4. GROUP BY: Use GROUP BY only if you are performing math in the select line; you must GROUP BY all of the fields in the SELECT line except the math function.

This is the trickiest part of basic SQL. GROUP BY works with SELECT to allow the computer to do math. When you tell the computer to sum or count on the SELECT line, you must GROUP BY all other fields that appear in the SELECT line.

The most common math functions are sum() and count(*). Examples:

SELECT donor, sum(amount);
FROM gimme;
GROUP BY donor;
ORDER BY 2 desc

SELECT donor, zip, sum(amount);
FROM gimme;
GROUP BY donor, zip;
ORDER BY 3 desc

SELECT weapon, count(*);
FROM crime;
GROUP BY weapon;
ORDER BY 2 desc


5. HAVING: DON’T WORRY ABOUT THIS ONE – YOU’RE ALMOST NEVER HAVE TO USE IT

Although it is not often used, HAVING filters aggregate data, just as WHERE filters other records. For example, you might total the contributions given by each individual in a campaign finance database and choose to display only those HAVING a sum total greater than $5,000. Example:

SELECT last, rest, sum(amount);
FROM tenngive;
GROUP BY last, rest;
HAVING sum(amount) > 5000;
ORDER BY 3 desc



6. ORDER BY: ORDER BY is optional – it merely sorts your data. The default is alphabetical or chronological order. Stipulate DESC to get reverse order.

You can tell the computer to sort your records in any order you like -- for example, alphabetically or from highest number to lowest number or from lowest to highest. Use ORDER BY to sort your data. Use ORDER BY [field name] DESC if you want the records sorted in descending order (that puts the big numbers on top).

See examples in queries above.

NOTE: You can use numbers as shorthand to specify which field you wish to order by. In the example below, the records are ordered by the third item in the select line -- the summed amount:

SELECT last, rest, sum(amount);
FROM tenngive;
GROUP BY last, rest;
ORDER BY 3

References  & Downloads.
http://msdn.microsoft.com/en-us/sqlserver/default

Monday, November 15, 2010

Add Default Search Box to your Blog

No comments:
Most of my friends on the net asks me how to add a search box to your blogger,as default template doesn't provide any search codes or search box in your template so as readers can search of in your blog or web from your blog.There are so many methods of adding search box to your blog at different places you want and different types of codes for search which you want to be done in our blog.Now i will explain where to add these codes and what codes to add to make a seach box in your blog.

Lets first of all start with the search codes which you need to add in your blog. The codes are below:-

First



Second

If you want to add some styling like this new sample below:-

Use these codes

Edit the colors or styling in red in above codes to change the styling of search box to adjust in your template.

Third

Now if you want to add image in place of search button like below:-



Use these codes:-




Change the image url in red above with the url of the image you want to use.and hope you would have no problem in using any of the codes.

Now How To place search Box at different places in blogger blog:-

To Place it in sidebar:-

Under Template->Page Elements tab, click “Add a Page Element” at the place where you want your search box to appear.
Select HTML/JavaScript and add the above codes.

If you want to place search box in header read this tuorial Embed search Box In Blogger Header.

I hope you will love this tutorial.

Thursday, August 12, 2010

Download Indian currency Rupee Font - Instructions

No comments:
Other countries using a symbol for their currency  Now recently , the Rupee will have a symbol like the Dollar ($) or the Euro (€) or the Pound (£). The Cabinet finalised the design for the Rupee.


IIT post-graduate Uday Kumar's entry has been selected out of five shortlisted designs as the new symbol for the Indian Rupee.

The government had organised a symbol design competition with a prize money of Rs 2.5 lakh. Five designs were shortlisted from a competition and all new notes will bear the design finally approved.

The growing influence of the Indian economy in the global space is said to have prompted this move that will result in the Indian rupee joining the select club of global currencies like the US dollar, the British Pound, European Euro and Japanese Yen that have unique symbols.

How to install font?


1. Download the font Rupee.ttf or the new version Rupee_Foradian.ttf
2. Install the font. (It is easy. Just copy the font and paste it in "Fonts" folder in control panel)
3. Start using it. :)


By default, the Indian Rupee font is mapped to the grave accent (`) symbol on your PC's keyboard and you can use the Indian currency font immediately after installing it
Visit http://blog.foradian.com/font-with-indian-rupee-symbol-download-and-us for installaton tutorial

Thursday, August 7, 2008

Retrieving important files

No comments:
The user folder in "Documents and Settings" is set with full permission for the corresponding user. One user will not be able to access another's folder in "Documents and Settings". If the operating system crashes and is reinstalled in a different drive, then the user logged in from the new installed OS will not be able to access the previous Documents and Settings user folder. The old Documents and Setting user folder has to be given permission for the required user.

The administrator has to take ownership of the user folder and its contents. After this, the necessary permission for the folder has to be set. After logging in as an administrative user, to take ownership of the user folder, please right-click the user folder in C:\Documents and Settings and click Properties; Click the Security tab; Click Advanced and click Owner tab. In the name list, the logged in username and the Administrator group will be displayed. Select any one and select Replace owner on sub containers and objects. Click Ok and then click Yes for the message. Click Ok to close the Properties window.

This will take ownership of the folder and its contents and set the full control permission for the folder. After this, you can copy the files and folders in the Documents and Settings\User folder. For more details, please look up: http:// support.microsoft.com/kb/308421 There can be some folders where even if you change the permissions to the folder, it is not possible to access the contents or not possible to change the permissions. The folder might be inheriting permission from its parent folders.

To remove the inheritance from the parent folder, please right-click the folder and click properties. Click the security tab. Click advanced. In the permissions tab, the check box "inherit from parent the permission entries that apply to child objects. Include these with entries explicitly defined here" will be selected by default. Remove the check box. During removal, the check box will prompt you to select one of the options: To copy the permission entries those were previously applied from the parent. To remove the permission entries those were previously applied from the parent and keep only those permissions explicitly defined here.

How to Use Excel as a Database Engine.

1 comment:

It is possible to update changes to the excel database
By using Excel macros or with the help of any front-end applications.

Before we go further, let us first take a look at excel as database. The basic format for storing data in an Excel database is a table. In a table, data is entered in rows. Each row is known as a record. After the creation of table, Excel's data tools can be used to search, sort and filter records in the database to get the required information. Creating a list from the data in a table is the easiest method of using the data tools.

For creating an Excel DB, the first step you need to follow is to enter the data with no blank rows. A record can contain data about only one specific item. A record must also contain all the data in the database about that item, not more than one row. Column headings are called field names and are used to ensure that the data for each record is entered in the same sequence and is consistent. After the data has been entered into the table, it can be converted to a list. To do that, please select any one cell in the table. Then Choose Data> List > Create List from the menu to open the Create List dialog box. The dialog box displays the range of cells needed to be included in the list.

If we create the table correctly, Excel selects the correct range of fields. Click ok if the range is correct. If the list is incorrect, please click the return button of list box for getting back to worksheet; it will appear as a small box and the current range of cells will be surrounded by marching ants. You will need to select the correct range of cells by dragging the mouse and clicking the button on list box for return back to the normal size and click oK for finishing.

After completion, the list will have a dark border around it and each field name will have down arrows, which will open drop-down menus when clicked. Options such as sorting the DB with field names and searching for records from DB are possible with dropdown menus. Additional data can also be added using blank row containing an asterisk at the bottom of the list.

Merging or combining two excel tables into one database excel file can be based on a common column of data from each file. The two tables can be located in the same Excel file or two different Excel files.

The concept behind the issue is loop into the worksheets, based on a common field for insert and update the data.

For example, name a variable `sh' and loop the worksheets. For each `sh' in this Worksheet. If sh(name) is not equal to destination.name, then insert into last row (destination name). Likewise, for updating any changes in the worksheets to reflect it on destination (Database), you will need to loop through the worksheets with variable, find out any changes, and update it. This can be done with the help of an excel macro based on this concept.

By Using Visual Basic.Net 2005 - VSTO (Visual Studio Tools for Office), this can be achieved with WorkBook.MergeFile method.

You will need to import Microsoft.Office.Tools.Excel for this.

Here is a sample coding: Dim objFirst As Worksheet = New

Worksheet

Dim obj,objFirst,objSecond,ObjThird As

New Workbook

objFirst = New WorkBook.Open(firtFile)

objSecond = New WorkBook.Open (secondFile) objThird = New WorkBook.Open(thirdFile)

objThird.Merge(objFirst, objSecond)

Close and dispose all the variables.

There are various tools and add-ins for merging data sheets into a single Excel workbook.

For more useful tips about excel, please look up

http://www.rondebruin.nl/tips.htm

Saturday, June 7, 2008

Ultimate Golden Mega E-Book collection

No comments:
Pocket PC Network Programming

http://rapidshare.com/files/74900186/0321133528.rar


IP Storage Networking: Straight to the Core

http://rapidshare.com/files/74900680/0321159608.rar


Neural Networks: Algorithms, Applications, and Programming

http://rapidshare.com/files/74901054/0201513765.rar


RTP: Audio and Video for the Internet

http://rapidshare.com/files/74901846/0672322498.rar


Wi-Foo: The Secrets of Wireless Hacking

http://rapidshare.com/files/74902307/0321202171.rar


TweakProofing Your Network Second Edition

http://rapidshare.com/files/74903113/1928994709.rar


Microsoft Encyclopedia of Networking

http://rapidshare.com/files/74903493/0735605734.rar


Networking for Dummies 7th edition

http://rapidshare.com/files/74904336/076457583X.rar


Network Security Assessment

http://rapidshare.com/files/74904813/059600611X.rar


Network Security Hacks

http://rapidshare.com/files/74905635/0596006438.rar



master in GMail

http://rapidshare.com/files/74845669/076459611X.rar


master in for dummies

http://rapidshare.com/files/74846063/076455784X.rar


master in Wireless Networks For Dummies

http://rapidshare.com/files/74846561/0764597302.rar


Mission Critical Internet Security

http://rapidshare.com/files/74847005/1928994202.rar


master in attack and defense

http://rapidshare.com/files/74847361/0201761769.rar


master in GoogleMaps and GoogleEarth

http://rapidshare.com/files/74847584/0471790095.rar



A Hands-On Guide to Relational Database Design

http://rapidshare.com/files/74240405/0201752840.rar


The Concordance Database Manual

http://rapidshare.com/files/74241855/159059603X.rar


Microsoft SQL Server 2005 For Dummies

http://rapidshare.com/files/74242335/0764577557.rar


Microsoft SQL Server 2005 Reporting Services For Dummies

http://rapidshare.com/files/74243180/076458913X.rar


MySQL Pocket Reference

http://rapidshare.com/files/74424540/059600446X.rar


Creating your MySQL Database

http://rapidshare.com/files/74425129/1904811302.rar


Sams Teach Yourself MySQL in 10 Minutes

http://rapidshare.com/files/74425761/0672328631.rar


SQL for dummies 5th

http://rapidshare.com/files/74426395/0764540750.rar


SQL for dummies 6th

http://rapidshare.com/files/74427064/047004652X.rar


Professional SQL Server 2005 Programming

http://rapidshare.com/files/74427776/0764584340.rar


Flash Remoting: The Definitive Guide

http://rapidshare.com/files/74211726/059600401X.rar


Macromedia Flash 8 for dummies

http://rapidshare.com/files/74218631/0764596918.rar


Macromedia Studio 8 All-in-One

http://rapidshare.com/files/74220072/076459690X.rar


Macromedia Studio MX All-in-One

http://rapidshare.com/files/74221192/0764544071.rar


Beginning Visual Basic 2005

http://rapidshare.com/files/74013699/0764574019.rar


MFC Programming with Visual C++ 6 Unleashed

http://rapidshare.com/files/74165572/0672315572.rar


Visual C++6 for Dummies

http://rapidshare.com/files/74166116/0764503723.rar


Schaum's Outline of Visual Basic

http://rapidshare.com/files/74166747/0071356711.rar


Visual Basic 6 Black Book

http://rapidshare.com/files/74167327/1576102831.rar


Visual Basic 2005 express edition for dummies

http://rapidshare.com/files/74167815/0764597051.rar


Visual Basic 2005 For Dummies

http://rapidshare.com/files/74168460/076457728X.rar


Visual Web Developer 2005 Express Edition For Dummies

http://rapidshare.com/files/74169258/0764583603.rar


Visual C++ 6 for Dummies Quick Reference for dummies

http://rapidshare.com/files/74169964/0764503731.rar


Programmer's Guide to JavaĆ¢„¢ Certification

http://rapidshare.com/files/74003377/0201728281.rar


Effective Java Programming Language Guide

http://rapidshare.com/files/74004469/0201310058.rar


Java All in one desk Reference for dummies

http://rapidshare.com/files/74005742/076458961X.rar


Java Game Programming for dummies

http://rapidshare.com/files/74006254/0764501682.rar


Java Thread Programming

http://rapidshare.com/files/74009380/0672315858.rar


Java Extreme Programming Cookbook

http://rapidshare.com/files/74010010/0596003870.rar


Java Puzzlers: Traps, Pitfalls, and Corner Cases

http://rapidshare.com/files/74010809/032133678X.rar


Java language specification 3rd

http://rapidshare.com/files/74011533/0321246780.rar


If you like my post JUST say THANKS

Recent Posts