By Sandeep Desai (http://www.thedesai.net)
Java
· Java J2SE 1.4 and Java 1.5 (java.sun.com)
· Javadoc J2SE 1.4 and 1.5 (java.sun.com)
· J2EE Javadoc 1.3 and 1.4
· Oracle JDeveloper technet.oracle.com
· Apache Tomcat (jakarta.apache.org) Java Servlet and JSP Container
· Struts and Struts Console
· JUnit
· JBoss
Database
· Oracle JDBC Driver
· Oracle Database
· Schemster (Visual Database Modeling, Create ER Diagram)
Misc
· Cygwin (Unix Environment and tools such as gcc, perl on Windows, )
· Winzip
· Sys Internal Process Explorer
· Apache (www.apache.org)
· Ad-Aware (http://www.download.com/)
· Windows Textpad (http://www.download.com/)
· Real VNC (www.realvnc.com)
· Apple Quicktime (www.apple.com)
· Winamp MP3 Player
c:\boot.ini is the Windows boot loader configuration, add entries here for dual booting other OS like Linux
cmd /c del foo /* command for running cmd */
Encrypt files in Windows 2000 by running the cipher command or by right clicking on File in Windows Explorer, click on General tab a/nd Advanced button
SysInternals.com Utilities
TCP View show which TCP ports are open
Windows 2000 has built in firewall click on TCP, Click on Control Panel, Network , TCP IP Properties, Advanced and use TCP/IP filtering
Windows XP has built in firewall
Windows XP Recovery Console
Boot Windows XP CD and run Recovery console to fix Windows XP problems
fixmbr -> fixes Master Boot Record
Command line/GUI
ipconfig |
Host network configuration information |
msconfig |
GUI to configure boot.init/system.ini/win.ini and registry entries related to booting and application started while booting. Good for checking Spyware Windows XP only |
netstat |
display statistics and network connections Options: /A Include server-side connections /E Display Ethernet statistics /N Show numeric IP addresses and port numbers /R Display the routing table /S Display per-protocol statistics /P Specify the protocol of interest: TCP, UDP, or IP |
ping |
test connection to host machine e.g. ping sbdesai-pc |
regedit |
Launch Registry Editor |
|
|
|
|
HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Run |
List of applications to run on startup |
HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services |
Entries for Services |
|
|
|
|
|
|
if
exits filename echo "filename exists"
if
not %foo% == FOOBAR echo "does not match FOOBAR"
To unzip a file from the command line
winzip32 -min -e -o foo.zip
zip all the files in the current directory recursively into foo.zip
winzip32 -a -r foo.zip *
Let's assume the data are correctly
in UTF8. Knowing the UTF8 encoding stucture, as described in note 69518.1, we
can separate the string into UTF8 characters:
61 the 1st byte's structure 0xxxxxxx implies 1-byte UTF8 code
e9,a9,ac the 1st byte's structure 1110xxxx implies 3-byte UTF8 code
e6,9d,a5 as above
e8,a5,bf as above
e4,ba,9a as above
e5,ad,a6 as above
e6,a0,a1 as above
The 2nd and 3rd byte have the structure 10xxxxxx in all 3-byte characters we
got, thus they are legal continuation bytes. And thus, the string is legal in
UTF8 from the structural point of view.
Now, let's convert the UTF-8 codes to UTF-16/UCS-2. UCS-2 codes correspond to Unicode
character numbers (U+xxxx):
61 ==> U+0061
e9,a9,ac ==> U+9A6C
e6,9d,a5 ==> U+6765
e8,a5,bf ==> U+897F
e4,ba,9a ==> U+4E9A
e5,ad,a6 ==> U+5B66
e6,a0,a1 ==> U+6821
Thus, the string contains 'a' and six CJK ideographic characters.
You can check the CJK characters using (for example):
http://www.unicode.org/cgi-bin/GetUnihanData.pl?codepoint=9A6C
http://www.unicode.org/cgi-bin/GetUnihanData.pl?codepoint=6765