What is the difference between C++ and java Programming languages


Both Java and C++ support object oriented programming, yet there are differences between them. To begin with, Java is a pure object oriented programming language; therefore, everything is an object in Java (single root hierarchy as everything gets derived from java.lang.Object). On the contrary, in C++ there is no such root hierarchy. C++ supports both procedural and object oriented programming; therefore, it is called a hybrid language.



Java
Java does not support pointers, templates, unions, operator overloading, structures etc.
The Java language promoters initially said “No pointers!”, but when many programmers questioned how you can work without pointers, the promoters began saying “Restricted pointers.” Java supports what it calls “references”. References act a lot like pointers in C++ languages but you cannot perform arithmetic on pointers in Java. References have types, and they’re type-safe. These references cannot be interpreted as raw address and unsafe conversion is not allowed.
Java support automatic garbage collection. It does not support destructors as C++ does.
Java does not support conditional compilation and inclusion.
Java has built in support for threads. In Java, there is a Thread class that you inherit to create a new thread and override the run() method.
Java does not support default arguments. There is no scope resolution operator (::) in Java. The method definitions must always occur within a class, so there is no need for scope resolution there either.
There is no goto statement in Java. The keywords const and goto are reserved, even though they are not used.
Java doesn’t provide multiple inheritance, at least not in the same sense that C++ does.
Exception handling in Java is different because there are no destructors. Also, in Java, try/catch must be defined if the function declares that it may throw an exception.
Java has method overloading, but no operator overloading. The Stringclass does use the + and += operators to concatenate strings and Stringexpressions use automatic type conversion, but that’s a special built-in case.
Java has built-in support for documentation comments (/** ... */); therefore, Java source files can contain their own documentation, which is read by a separate tool usually javadoc and reformatted into HTML. This helps keeping documentation maintained in easy way.
Java is interpreted for the most part and hence platform independent.




C++
C++ supports structures, unions, templates, operator overloading, pointers and pointer arithmetic.
C++ support destructors, which is automatically invoked when the object is destroyed.
Conditional inclusion (#ifdef #ifndef type) is one of the main features of C++.
C++ has no built in support for threads. C++ relies on non-standard third-party libraries for thread support.
C++ supports default arguments. C++ has scope resolution operator (::) which is used to to define a method outside a class and to access a global variable within from the scope where a local variable also exists with the same name.
C++ has goto statement. However, it is not considered good practice to use of goto statement.
C++ does support multiple inheritance. The keyword virtualis used to resolve ambiguities during multiple inheritance if there is any.
While in C++, you may not include the try/catch even if the function throws an exception.
C++ supports both method overloading and operator overloading.
C++ does not support documentation comments.
C++ generates object code and the same code may not run on different platforms.




Take your time to comment on this article.

Most Ubuntu Linux Installations Are Affected By A Dangerous Remote Code Execution Bug

All recent Ubuntu Linux releases ship with Apport crash handling software. A security researcher has discovered a flaw in this utility that allows an attacker to remotely execute code using a malicious booby-trapped file. Ubuntu has released the fix for the same, which can be grabbed via simple Ubuntu update.
Most of you might be knowing that remote code execution is one of the most common means of triggering arbitrary code execution from a remote machine via the internet. Coupled with privilege escalation, it turns out to be any computer user’s worst nightmare.
A security researcher, Donncha O’Cearbhaill, has uncovered a remote code execution bug in Ubuntu Linux operating system. O’Cearbhaill found that the hack affects all default Ubuntu installations of versions 12.10 and later.
This exploit takes advantage of the Apport crash reporting tool on Ubuntu Linux. The researcher found that he could inject malicious code in Ubuntu’s crash handler by crafting a crash file. When parsed, this file executes arbitrary Python code. The vulnerable code was introduced in Apport revision 2464 on 2012-08-22.
“The code first checks if the CrashDB field starts with { indicating the start of a Python dictionary,” the researcher writes. If { is found, Apport calls Python’s eval() method with the value of CrashDB field. The passed data is executed as a Python expression, leading to Python code execution. The details of the bug can be found here.
ALL DEFAULT UBUNTU INSTALLATIONS OF VERSIONS 12.10 & LATER ARE AFFECTED
The attacker simply needs to fool the Ubuntu user into opening a single document that targets the bug in Apport crash reported.
O’Cearbhaill has posted the copy of his proof-of-concept source code on GitHub as well. He has also shared a video that shows the attack in action:
Ubuntu has released a fix for this bug, which is available via the simple update.
Did you find this article on Ubuntu Apport crash reporter bug helpful? Share your feedback and views in the comments section

How To Repair Damaged/Corrupt MS Word, Excel, PowerPoint, And Outlook Files

The usual file recovery and repair software aren’t much useful if you’ve got some corrupt MS Word, Excel, Outlook, or PowerPoint files. In such situations, specialized repair software are needed that don’t damage the formatting and elements of the MS Office document. Using Stellar’s wide range of repair software, one can quickly accomplish this task.

How to restore damaged or corrupt MS Word documents

Recovering the damaged or corrupt MS Word files isn’t something that any conventional data recovery software can accomplish. For this, you need to use some special tool. Here, I’m going to tell you about an easy-to-use tool that repairs such files.
Phoenix Word Repair recovers .doc and .docx files without changing the original text, images, fonts, headers, footers, and links.
During the Word document repair process, after the completion of the scan, you’ll see three different previews of your document — ‘Full document’, ‘Filtered Text’, and ‘RAW Text’.
For repair, there are three options — ‘Simple Repair’, ‘Advance Repair’, and ‘Raw Recovery’. While Simple Repair brings back .doc and .docx files with minor corruption, Advance Repair deals with severely corrupted .doc files. The Raw Recovery option is useful when your Word file is heavily corrupted and it’s in RAW text or machine readable format.

Steps to recover the file:
  1. Just select the corrupt MS Word file that is to be repaired. You can do this by clicking on the ‘Add File’ icon on the ‘File’ ribbon.
  2. To repair the file, one needs to check the file in the tree view. From the ‘File’ ribbon, click on the ‘Save’ icon. To use the advanced option, select ‘Advance Repair.’
Support and compatibility: It supports in MS Word 2013, 2010, 2007, 2003, 2002, and 2000. This tool runs on Windows 10, 8, 7, Vista, 2003, XP, 2000, and NT.
Note: Please note that avoid running MS Word application while using Stellar Phoenix Word Repair Software.

How to repair damaged or corrupt MS Excel Worksheets

Just like getting back MS Word files in their original condition is a tough task, one is also left with few options in case of Excel files. In such situations, Phoenix Excel Repair software turns out to be pretty useful. It’s an efficient tool for repairing inaccessible and corrupt MS Excel files, .xls and .xlsx. Here, I’m going to tell you how to recover and repair these files without altering charts, tables, cell comments, formulas, images, etc.
This powerful MS Excel repair software fixes all common corruption issues like the unrecognizable format, unreadable content, etc.
There’s also a convenient option for a batch repair of Excel file simultaneously. This saves lots of time. The tool comes with a standard explorer-style UI for previewing the recovery results.
After the scan and repair, the trial version shows you the recovery results before making the purchase. You also get the log report for further analysis.
Support and compatibility: Stellar Excel Phoenix Repairs works with the corrupt MS Excel file created in MS Excel 2016, 2013, 2010, 2007, 2003, 2002, and 2000. For Mac version, it repairs only ‘.XLSX’ files created in MS Excel 2008 and 2011. This tool runs on Windows 10, 8, 7, Vista, XP, NT, OS X 10.5 and above.
Note: If you get a message telling that one or more instances of Microsoft Excel are running, close all MS Excel windows and retry.

How to repair damaged or corrupt MS PowerPoint Presentations

Microsoft PowerPoint is our only choice when we need to create some presentation for office or school. Sometimes, our hard work turns out to be futile when our presentation file gets corrupted. In such cases, Stellar Phoenix PowerPoint Repair tool turns out to be pretty useful.
It’s a potent and professional tool for repairing the corrupt PowerPoint files. Your file has got all different kinds of PowerPoint objects like forms, modules, tables, controls, VBA code, comments, hyperlinks, etc.? Well, you don’t need to worry — Phoenix repair tool has got you covered.
This software resolves PowerPoint corruption errors and helps you recover the inaccessible PowerPoint data. The Batch-Recovery option helps you restore multiple files in one go and save time.
Just in case your file is severely damaged, you get the option for RAW recovery. This option performs a signature-based recovery.
Before saving and making the purchase, the trial version shows a preview of all the slides in your scanned window. This tool also repairs the macro-enabled PowerPoint presentations.

How to repair damaged or corrupt Outlook PST file

Just like the other Microsoft document recovery, you can also get back the corrupted Outlook PST file and recover all the email contents. Phoenix Outlook PST Repair lets you recover emails, attachments, contacts, tasks, notes, journals, calendars, etc. from a corrupt Outlook PST file.
The tool repairs your existing PST file and restores all the email content into a new PST file. After the scab, you can also save the file in different formats (EML, MSG, RTF, HTML, and PDF) and user-specified locations (Network Location/ External Media). The repair of password protected and encrypted files is also supported.
You can repair PST files that are as large as 2GB in size. Phoenix Outlook repair tool lets you arrange the scanned emails using different criteria like ‘Date’, ‘From’, ‘To’, ‘Subject’, ‘Type’, ‘Attachment’, and ‘Importance’. Just like the above-mentioned tools, you can also preview the recoverable items before saving them.
Support and compatibility: It repairs corrupt Outlook file from MS Outlook 2016, 2013, 2010, 2007, 2003, 2002 (XP), & 2000. This tool runs on Windows 10, 8, 7, Vista.
This post is brought to you by Azad Articles


Super Mario Run Is Finally Released, Here’s How To Download And Play

 Nintendo has released the Super Mario Run games created after the long time famous character Mario. The game, priced $10, is currently available on the App Store for Apple iPhone and iPad. Super Mario also requires an always-on internet connection to play the game.
Keeping up with their announcement made at the Apple iPhone 7 launch event, Nintendo has released the game Super Mario Run for iPhone and iPad on December 15, 2016. The game requires an always-on internet connection, just like Pokemon GO, which recently expanded to countries in South Asia along with a special edition Pikachu.
A mandatory internet connection for playing Super Mario Run is an attempt from Nintendo to keep the pirates out of the picture. However, this may limit the number of places where people can enjoy the game.
The game comes in 10 different languages and it’s released in 150 countries over the world. Nintendo touts the game by saying it can be played using one hand. So, you can enjoy the game while you’re on the subway.
Super Mario Run is free to download from the App Store but it only allows you to play the first three levels for free. After this, a $10 (varies by country) payment has to be made to continue the game.
The gameplay has three modes, Toad Rally, World Tour, and Kingdom Builder. You can choose from a total of six runners including Mario, Luigi, Peach, Yoshi, Toad, and Toadette.
Nintendo, in the post-2000 years, has underestimated has the potential of the mobile market. The company was picky enough to favor their own hardware to develop games for their franchise characters including Mario. It was only after Pokemon Go, Nintendo tasted the success fruit in the mobile gaming market.
For Android users, Super Mario Run is expected to release sometime in the year 2017.
You can use this link to find Super Mario Run on the iTunes App Store.
If you have something to add, tell us in the comments below.

Here Is The Stolen Details of 1 Billion Yahoo Accounts is on Sale for $300,000

​Yahoo acknowledged yesterday that hackers breached its systems and stole approximately 1 billion accounts, and now it turns out that the full database is available for purchase online.
The NYT writes that the 1 billion accounts that were stolen from Yahoo were sold on the Dark Web in August for $300,000 and what’s worse is that there were three different buyers who agreed to pay the price to gain control of the database.
Andrew Komarov, chief intelligence office at security firm InfoArmor, said two of the buyers were “prominent spammers,” while the third is believed to be involved in espionage attacks and might be planning to use the 1 billion accounts for similar tactics.
The price of the database, however, is believed to have dropped substantially after the story went public and Yahoo triggered a password reset, so interested buyers might have to pay only $20,000 for the full database.
It’s believed that the hacker group that breached Yahoo is based in Eastern Europe, but the company said it still doesn’t know if this is accurate or not. The firm, however, confirmed that the stolen information included names, passwords, phone numbers, security questions and answers, which obviously creates additional risks in case the same credentials were used on other websites.
And this doesn’t stop here. According to the same report, the accounts included approximately 150,000 US government and military employees, which means that their data is now available on the Dark Web. It goes without saying that officials from other countries are very likely to be among those whose accounts got hacked.

A New Tordow Malware on Android can Root your devices


The devices which are running android Operating System are affected by a modified version of the Tordow Malware, The original malware was released at the start of the Q1.
The base version of the Malware tries to access the Root user privileges to steal your passwords.
It is trojan horse where it attempts to get full control and then perform tasks such as controlling phone calls, SMS and it will even try to install apps and rename the core files of the android.

How does the malware enter the Phone

The malware spreads through the apps which are downloaded from the Third Party Sources, to So we suggest staying away from those stores and download apps from the sources that your trust, which reduces the probability your begin affected by the malware.
Comodo says attackers download these apps, reverse-engineer them to inject the malware, and then reupload the apps in the stores. Titles such as Pokemon Go, Telegram, and Subway Surfers have already been infected, so you better stick to the official Play Store to remain secure.
Since they are delivered as APK files, these applications can also spread via social media or other sites, so it’s important to always download from sources that you can trust.

How does it enter your phone

Once the App got installed in the victim’s phone it tries to gain root privileges and establishes a connection to the command center to await the further instructions.
So that attackers can execute any command they want on your phone, The malware has mostly targeted the bank apps in your mobile and financial information.
Removing Tordow from an infected device is particularly difficult since it gets root access, so flashing a new firmware might be the best way to do it, as deleting the source app that led to the infection does virtually nothing.
Take your time to comment on this article.

Top 3 Forensic Tools For Linux Users

Computer forensics and evidence management are the most important topic and very important aspect when we talk about computer crimes. Ethical hacking and intrusion management used to protect the system, but if the incident happened, then you need to investigate it. Here computer forensic comes. We have also created a free computer forensics training course for everyone to get the basic understanding of the process, methodology and tools used while conducting a digital investigation.
Anyway, in this story, you will find the basic introduction of the top 3 forensic tools.

The Sleuthkit & Autopsy

www.sleuthkit.org
The Sleuthkit is a free open source suite of forensic utilities that has a GUI called Autopsy. This tool suite has strong support for Linux file systems and can be used to examine the full details of inodes and other data structures. The Sleuthkit has a plugin framework that supports automated processing. The Autopsy GUI for The Sleuthkit is shown here with a Linux file system:

Digital Forensics Framework

http://www.digital-forensic.org/

DFF (Digital Forensics Framework) is a free and Open Source computer forensics software built on top of a dedicated Application Programming Interface (API).
  •     Preserve digital chain of custody: Software write blocker, cryptographic hash calculation
  •     Access to local and remote devices: Disk drives, removable devices, remote file systems
  •     Virtual machine disk reconstruction: VMware (VMDK) compatible
  •     Read standard digital forensics file formats: Raw, Encase EWF, AFF 3 file formats
  •     Windows and Linux OS forensics: Registry, Mailboxes, NTFS, EXTFS 2/3/4, FAT 12/16/32 file systems
  •     Quickly triage and search for (meta-)data: Regular expressions, dictionaries, content search, tags, time-line
  •     Recover is hidden and deleted artefacts: Deleted files/folders, unallocated spaces, carving
  •     Volatile memory forensics: Processes, local files, binary extraction, network connections

Here Is The Linux Mint 18.1 Released | New Features And Download



The Linux Mint Project has unveiled the second point release of Linux Mint 18, i.e., Linux Mint 18.1 ‘Serena.’ While the flagship Cinnamon edition comes with Cinnamon 3.2, the MATE edition gets the advantage of new features of MATE 1.16. You can download the new release from Mint’s website or perform the upgrade from Mint 18.
Back in June, we told you about Linux Mint 18 Sarah. It was a long term release that featured Linux kernel 4.4 and Ubuntu 16.04 LTS base. Now, after spending about 6 months in development, the second point release of Linux Mint, i.e. Linux Mint 18.1 Serena, has arrived.
Just like the previous version, Linux Mint 18.1 is a long term release that’ll remain supported until 2021. As expected, Mint 18.1 is shipping with updated packages, new features, polished desktop, and lots of minor bug fixes.

Linux Mint 18.1 New Features
The major components of Mint 18.1 are Cinnamon 3.2, MDM 2.0, Linux kernel 4.4, and Ubuntu 16.04 package base.
Talking specifically about Cinnamon version, the users get benefits of numerous improvements in the form of redesigned screensaver, numerous visual changes, support for vertical panels, improved hardware support etc

In MATE version, the users will get the advantage of latest MATE 1.16. In MATE 1.16 many components like the notification daemon, MATE policykit library, session manager, and MATE terminal have been switched to GTK3.
The other common improvements to all versions are improvements in Xed and Xplayer, X-Apps, Update Manager, MDM Display Manager, etc.
You can read our detailed article and know about these new features in Linux Mint 18.1

Linux Mint 18.1 Download:

You can go ahead and find the download links of Linux Mint 18.1 Serena on the Mint Project’s website. By following this link, you can grab the 62-bit and 32-bit versions of Cinnamon and MATE releases.

Upgrade to Linux Mint 18.1:

If you are running a beta version of Linux Mint 18.1, you simply need to click on the refresh option in Update Manager and apply the updates. Upgrading from Linux Mint 18 is also possible.
Did you find this article on Linux Mint 18.1 helpful? Are you going to grab this update? Don’t forget to share your views in the comments section below.

The 3 Ever Best Apps to Record Screen in Linux|Capture Screen Videos / Screencast in Linux easily! Ubuntu,Fedora,LinuxMint,ArchLinux etc

Recently, i had to record some tutorials on my linux machine, but i found out that there are only a few rare options to record screencasts [screen videos ]in Linux / Ubuntu [LinuxMint is based on Ubuntu] , hence i came up with these three Best and Awesome apps to record screen linux . These apps are easy to use and easy to  install as well plus they work on all major linux distros such as Ubuntu/LinuxMint/Fedora/ArchLinux etc. Let’s have a look on each one of them one by one.
App 1 . Kazam Screencaster
This app may be called as the best screencast recorder or Screen video Recorder for Linux ! I  found out some really interesting features of the app such as

  • Kazam is really very easy to install and setup .It is available on almost all linux repositories i tested it from Ubuntu 11.04 to Ubuntu 14.10 . Simply type the “sudo apt-get install kazam” if you are using Ubuntu based distro such as Ubuntu/LinuxMint/etc or “pacman kazam” or any package get command according to your distro , kazam will be surely there!
  • It also enables to select the area to be recorded be it a particular window/particular screen area or complete screen! Kazam allows it all.
  • Its really lightweight and works superbly on my Virtual Machine too.
  • You can check out the Download Instructions[Steps]/Working Demo / Tutorial for Kazam here.
App 2. Simple Screen Recorder
SimpleScreen Recorder is yet another fantastic App for recording screencasts on Ubuntu , it allows easy recording and is based on qt , thus works very smoothly , some of its unique features include

  • Record OpenGL apps directly, without any extra required codecs/filters.
  • Automatically reduces frame rate on slow computers.
  • Pause/Resume the Video recording anytime.
  • Optional audio recording , if audio is not the Priority.
  • Specify the Codecs / Encoding to be Used for Recording the video.
  • Not only this, but the main app lets you keep an eye on the increasing file size, memory size,frame rate,time,thus enhancing the usability !
To install SimpleScreenRecorder on your Linux/Ubuntu enter the following commands in the Terminal
sudo add-apt-repository ppa:maarten-baert/simplescreenrecorder
sudo apt-get update && sudo apt-get install simplescreenrecorder

If you are using Fedora or any other distros you can get the Pre-built builds from here .
App 3 . RecordMyDesktop
This app “RecordMyDesktop” is yet another Free Screen Recorder / Screencasting app for Linux , It also supports recording the Screen in various Video Formats and sizes as well as window recording . The App also supports pausing and resuming the recording of Screencast ., but the only drawback was its lag on the Virtual Machine, thus indicating its more hardware dependent , but overall its another small size tool which can be used for Recording Screen.

RecordMyDesktop can be downloaded from the Default app Directory / App Center of Ubuntu/Arch/Fedora. If not available,you can use the command
“sudo apt-get install recordmydesktop” from the terminal to download and install RecordMyDesktop
Besides these three you can also use tools such as “DemoRecorder – Linux”[Adware], “Xvidcap” [Works on 32bit Distros Only],”VLC”,”ffmpeg”[lag in UI] to capture the ScreenVideos or Screencasts but because of the Bracketed Cons i don’t recommend them,If you encounter any problem while downloading/installing/using any of the apps mentioned, feel free to comment 🙂 and also if you know of another screencaster app for Linux, Do let us know !
How to create constant objects in C++ Programming Language

How to create constant objects in C++ Programming Language

When there is a need to create a read-only object, the object can be declared as a constant object using the const keyword. Syntax for creating a constant object is as follows:

ClassName const object_name(params-list);

Following are the characteristics of a constant object:
  • Constant object can be initialized only through a constructor.
  • Data members of a constant object cannot be modified by any member function.
  • Constant object are read-only objects.
  • Constant objects should be accessed only through constant member functions.

Following program demonstrates a constant object:

Anonymous Objects


An object which has no name is known as an anonymous object. Syntax for creating an anonymous object is as follows:

ClassName(params-list);

An anonymous object can be created and used in any statement without using any name. It is automatically destroyed after the control moves on to the next statement. Following program demonstrates an anonymous object:

Following are the advantages of anonymous objects:
  • They result in cleaner, shorter, and efficient code.
  • There is no need to name objects which are going to be used temporarily.
  • No need to declare them.
  • Unnamed are objects are destroyed automatically after their use is over.

Take your time to comment on this article.