Wednesday, February 29, 2012

c++ code to search pattern in file


find pattern in file c++


search string in file c++


search pattern in file c++


Tuesday, February 28, 2012

projects on network security for be students

We are developing projects especially on Network Security Domain. These projects can be useful for students of undergraduate and research program. We have already developed and sold many projects that can be used again but we are preferring to develop new for new students.

The delivery time depends on the project complexity and cost also varies with that.

Note:
We are not presenting list of the projects.  The reason is most of the new projects ideas are getting leaked always, so we have decided to present the project list on demand.

We are also giving the project advice and development support. Delivering project on time and with least cost is our motive only and I bet you won’t get this with any other sources.

Please contact us on below, we will get back soon to assist you.

projects on network security and cryptography

We are developing projects especially on Network Security Domain. These projects can be useful for students of undergraduate and research program. We have already developed and sold many projects that can be used again but we are preferring to develop new for new students.

The delivery time depends on the project complexity and cost also varies with that.

Note:
We are not presenting list of the projects.  The reason is most of the new projects ideas are getting leaked always, so we have decided to present the project list on demand.

We are also giving the project advice and development support. Delivering project on time and with least cost is our motive only and I bet you won’t get this with any other sources.

Please contact us on below, we will get back soon to assist you.

projects on network security

We are developing projects especially on Network Security Domain. These projects can be useful for students of undergraduate and research program. We have already developed and sold many projects that can be used again but we are preferring to develop new for new students.

The delivery time depends on the project complexity and cost also varies with that.

Note:
We are not presenting list of the projects.  The reason is most of the new projects ideas are getting leaked always, so we have decided to present the project list on demand.

We are also giving the project advice and development support. Delivering project on time and with least cost is our motive only and I bet you won’t get this with any other sources.

Please contact us on below, we will get back soon to assist you.

network security projects topics

We are developing projects especially on Network Security Domain. These projects can be useful for students of undergraduate and research program. We have already developed and sold many projects that can be used again but we are preferring to develop new for new students.

The delivery time depends on the project complexity and cost also varies with that.

Note:
We are not presenting list of the projects.  The reason is most of the new projects ideas are getting leaked always, so we have decided to present the project list on demand.

We are also giving the project advice and development support. Delivering project on time and with least cost is our motive only and I bet you won’t get this with any other sources.

Please contact us on below, we will get back soon to assist you.

network security projects for final year projects

We at ccplusplus are majorly involved in developing Enterprise software's for reputed universities and companies across the globe. With just do not want to limit our technology to our reputed clients instead willing to distribute the technology and concept across all the persons involved in the industry. 

Aiming to above we are using the technology and concept in making undergraduate and graduate level projects.

Apart from that we also are developing projects based on their requirements. Primarily we are taking requirement and providing them the same, we too have many new developed small projects listed in below link.

Click here to see a list of projects.

Please write your queries to below dedicated emails,

Sales and support queries


Technical support and queries


network security projects for final year students

We are developing projects especially on Network Security Domain. These projects can be useful for students of undergraduate and research program. We have already developed and sold many projects that can be used again but we are preferring to develop new for new students.

The delivery time depends on the project complexity and cost also varies with that.

Note:
We are not presenting list of the projects.  The reason is most of the new projects ideas are getting leaked always, so we have decided to present the project list on demand.

We are also giving the project advice and development support. Delivering project on time and with least cost is our motive only and I bet you won’t get this with any other sources.

Please contact us on below, we will get back soon to assist you.

network security projects

We are developing projects especially on Network Security Domain. These projects can be useful for students of undergraduate and research program. We have already developed and sold many projects that can be used again but we are preferring to develop new for new students.

The delivery time depends on the project complexity and cost also varies with that.

Note:
We are not presenting list of the projects.  The reason is most of the new projects ideas are getting leaked always, so we have decided to present the project list on demand.

We are also giving the project advice and development support. Delivering project on time and with least cost is our motive only and I bet you won’t get this with any other sources.

Please contact us on below, we will get back soon to assist you.

Monday, February 27, 2012

c vs c++ comments

c vs c++ comments:

The good old C comment syntax works in C++ too, but the newfangled C++ comment-to-end-of-line syntax has some distinct advantages. For example, consider this
situation: 
    if ( a > b ) {
      // int temp = a;    // swap a and b
      // a = b;
      // b = temp;
    }
    
Here you have a code block that has been commented out for some reason or other, but in a stunning display of software engineering, the programmer who originally wrote the code actually included a comment to indicate what was going on. When the C++ comment form was used to comment out the block, the embedded comment was of no concern, but there could have been a serious problem had everybody chosen to use C-style comments: 
    if ( a > b ) {
      /*  int temp = a;  /* swap a and b */
          a = b;
          b = temp;
      */
    }
    
Notice how the embedded comment inadvertently puts a premature end to the comment that is supposed to comment out the code block. 
C-style comments still have their place. For example, they're invaluable in header files that are processed by both C and C++ compilers. Still, if you can use C++-style comments, you are often better off doing so. 
It's worth pointing out that retrograde preprocessors that were written only for C don't know how to cope with C++-style comments, so things like the following sometimes don't work as expected: ¤
    #define LIGHT_SPEED   3e8    // m/sec (in a vacuum)
    
Given a preprocessor unfamiliar with C++, the comment at the end of the line becomes part of the macro! Of course,  you shouldn't be using the preprocessor to define constants anyway. 

c++ style comments

The good old C comment syntax works in C++ too, but the newfangled C++ comment-to-end-of-line syntax has some distinct advantages. For example, consider this
situation: 
    if ( a > b ) {
      // int temp = a;    // swap a and b
      // a = b;
      // b = temp;
    }
    
Here you have a code block that has been commented out for some reason or other, but in a stunning display of software engineering, the programmer who originally wrote the code actually included a comment to indicate what was going on. When the C++ comment form was used to comment out the block, the embedded comment was of no concern, but there could have been a serious problem had everybody chosen to use C-style comments: 
    if ( a > b ) {
      /*  int temp = a;  /* swap a and b */
          a = b;
          b = temp;
      */
    }
    
Notice how the embedded comment inadvertently puts a premature end to the comment that is supposed to comment out the code block. 
C-style comments still have their place. For example, they're invaluable in header files that are processed by both C and C++ compilers. Still, if you can use C++-style comments, you are often better off doing so. 
It's worth pointing out that retrograde preprocessors that were written only for C don't know how to cope with C++-style comments, so things like the following sometimes don't work as expected: ¤
    #define LIGHT_SPEED   3e8    // m/sec (in a vacuum)
    
Given a preprocessor unfamiliar with C++, the comment at the end of the line becomes part of the macro! Of course,  you shouldn't be using the preprocessor to define constants anyway. 

array properties in c

Some characteristics about Arrays 
  • The elements of an array are indiced and accessed by their index, where as first position/index of an array starts from "0" and last position is sizeOfArray-1 !! 
  • By default, Arrays are not initialised.
  • Like any other variable, an array must be declared before it is used. 
  • Each element in an Array must be printed individually. 
  • An Array cannot be copied/assigned/compared from another Array directly, these operations have to be done element by element basis. 
  • Name of the Array is nothing but address of/pointer to the first element of the Array 
  • There is no Array bound checking done in C. Trying to access the position at sizeofArray or beyond that is an Error and results in an undefined behavior. 
  • ArrayName indicates the base address or address of the first element in the Array. 
  • Address of any element in a Single Dimensional Array can be caclulated as
ElementAddress = BaseAddress+ indexOfTheElement * SizeOfTheElement

Friday, February 24, 2012

reference to an array of integers c++

reference to an array c++


array size c++


sizeof array c++


calculating size of array in c++


size of an array c++


class initialization of array


initializing array in c++ class


array initialization in class in c++


initializing arrays in c


array initialization c++


array initialization example c++


Thursday, February 23, 2012

ancillary data definition

Although it is very difficult to prove the identity of a remote user over the Internet, it is a simple matter for the Linux kernel to identify another user on the same host. This makes it possible for PF_LOCAL/PF_UNIX sockets to provide credentials to the receiving end about the user at the other end. The only way for these credentials to be compromised would be for the kernel itself to be compromised in some way (perhaps by a rogue kernel loadable module).

Credentials can be received as part of ancillary data that is received with a communication. Ancillary data is supplementary or auxiliary to the normal data. This brings up some points that are worth emphasizing here:
  • Credentials are received as part of ancillary data.
  • Ancillary data must accompany normal data (it cannot be transmitted on its own).
  • Ancillary data can also include other information such as file descriptors.
  • Ancillary data can include multiple ancillary items together (such as credentials and file descriptors at the same time).
The credentials are provided by the Linux kernel. They are never provided by the client application. If they were, the client would be allowed to lie about its identity. Because the kernel is trusted, the credentials can be trusted by the process that is interested in the credentials. As noted in the list, you now know that file descriptors are also transmitted and received as ancillary data. However, before you can start writing socket code to use these elements of ancillary data, you need to be introduced to some new programming concepts.
TIP
Ancillary data is referred to by several different terms. Other names for ancillary data include auxiliary or control data. In the context of PF_LOCAL/PF_UNIX sockets, these all refer to the same thing.

See Also:

Wednesday, February 22, 2012

4 weeks online course on c++

Course Name     :  4 Weeks Coverage Courses
Course Code     :  4WCCPP
Course Duration :  4 Weeks
Course Fees     :  USD $35(outside India)
                             1800 INR (for India citizen)

This is an extended 4 weeks training program on C++. The aim is to cover the course in 4 weeks duration. This is intended best for the persons having some pre knowledge on C and C++with some UNIX knowledge also.

Following are the topics that are being covered during this course.

1.  Introduction / Getting Started / Environment Setup
  • A little introduction to C/C++.
  • Why C++ over C.
  • Introduction to development using C++
  • Installing an Integrated Development Environment (IDE) (setting your programming environment)
2. C++ Basics
  • Structure of a C++ program
  • C++ style Comments
  • variables
  • functions
  • operators 
  • formatting
  • Forward declarations
  • Using multiple files (headers/class)


  • Hungarian notation
  • preprocessor
  • design our first program
  • Practice with the sample codes of all the above points
->     doubts and solution day


3. Variables
  • variable declaration and addressing
  • Keywords and naming identifiers 


  • Variable sizes and the sizeof operator
  • Integers


  • Floating point numbers
  • Boolean Values
  • Chars
  • Constants
  • Hungarian Notation (revisit) 
  • Practice with the sample codes of all the above points
 4. Operators
  • Precedence and associativity
  • Arithmetic operators
  • Increment/decrement operators, and side effects
  • Sizeof, comma, and arithmetic if operators
  • Relational operators (comparisons)
  • Logical operators
  • Converting between binary and decimal
  • Bitwise operators
  • Practice with the sample codes of all the above points
->     doubts and solution day  


5. Variables - continued
  • Blocks (compound statements) and local variables
  • Global variables (and why they are evil)
  • File scope and the static keyword
  • Type conversion and casting

  • Enumerated types
  • Typedefs
  • Structs     
  • Practice with the sample codes of all the above points
6. Control Flow
  • Control flow introduction
  • If statements
  • Switch statements
  • Goto statements
  • While statements
  • Do while statements 
  • For statements
  • Break and continue 
  • Random number generation
  • Practice with the sample codes of all the above points
->     doubts and solution day  

7. Arrays, Strings, Pointers, and References
  • Arrays
  • Arrays in combination with loops
  • Application and  usage of array
  • Multidimensional arrays (2D, 3D, nD)
  • C-style strings
  • Pointers
  • Pointers, arrays, and pointer arithmetic
  • Dynamic memory allocation with new and delete
  • advantage of C++ dynamic memory allocation over C
  • Pointers and const

  • References
  • References vs pointers, and member selection
  • Void pointers
  • Practice with the sample codes of all the above points
8. Functions
  • parameters and arguments 
  • Arguments passing by value, reference and address
  • Returning values by value, reference, and address
  • Inline functions
  • Function overloading 
  • Default parameters
  • Function pointers
  • Recursion
  • Namespaces

  • Handling error.
  • Command line arguments
  • Practice with the sample codes of all the above points
->     doubts and solution day 

9. Basic object-oriented programming
  • What is OOPS
  • Advantage / disadvantage
  • Classes and class members
  • access specifiers 
  • Access functions and encapsulation
  • Constructors / Destructors
  • Constructor initialization lists
  • hidden “this” pointer
  • Constructors revisit
  • header files and class files
  • Const class objects and member functions
  • Static member variables and functions
  • Friend in OOPS
  • Anonymous variables and objects
  • Practice with the sample codes of all the above points
10.  Operator overloading
  • Basics
  • Need of overloading.
  • Rules of overloading.
  • Operators that can not be overloaded, why they can't.
  • Overloading various operators - arithmetic operators, I/O operators, comparison operators, unary operators +, -, and !, increment and decrement operators, subscript operator, parenthesis operator
  • Overloading operators using member functions.
  • Overloading typecasts
  • copy constructor and overloading the assignment operator
  • Shallow vs. deep copying
  • Composition / Aggregation     
  • Practice with the sample codes of all the above points
->     doubts and solution day 

11. Inheritance
  • Introduction
  • Reason for this to exist.
  • Why it is important.
  • What we can do with this.
  • Basic inheritance in C++
  • Order of construction of derived classes
  • Constructors and initialization of derived classes
  • Inheritance and access specifiers
  • Adding, changing, and hiding members in a derived class
  • Multiple inheritance
  • Virtual base classes
  • Practice with the sample codes of all the above points
12. Virtual Functions
  • Reason for this to exist.
  • Pointers and references to the base class of derived objects 
  • Virtual functions
  • Virtual destructors, virtual assignment, and overriding virtualization
  • Early binding and late binding
  • virtual table
  • Pure virtual functions, abstract base classes, and interface classes 
  • Advantage and disadvantage.
  • Practice with the sample codes of all the above points
->     doubts and solution day 

13. Input and output (I/O)
  • Input and output (I/O) stream Library
  • Input with istream
  • Output with ostream and ios
  • Stream classes for strings
  • Stream states and input validation
  • File I/O
  • Practice with the sample codes of all the above points
14. Templates
  • Function templates
  • Function template instances
  • Template classes
  • Expression parameters and template specialization
  • Class template specialization
  • Partial template specialization
  • Practice with the sample codes of all the above points
->     doubts and solution day 

15. Exception and its Handling 
  • The need for exceptions
  • Basic exception handling
  • Exceptions, functions, and stack unwinding
  • Uncaught exceptions, catch-all handlers, and exception specifiers
  • Exceptions, classes, and inheritance
  • Exception dangers and downsides
  • Important point to remember when using the Exception Handling.
  • Practice with the sample codes of all the above points.
16. The Standard Template Library
  • The Standard Template Library (STL)
  • STL containers overview
  • STL iterators overview
  • STL algorithms overview
  • Practice with the sample codes of all the above points 
->     doubts and solution day  

Course Procedure:
For the 4 weeks plans we are covering the above 16 important chapters for making the programming strong. Each chapter according to the student and the complexity will be covered so as to finish all these in the specified time. It can be move up to few days delayed based on the student understanding and satisfaction. In comparison to the 6 weeks course as we have to cover up all the topics in 4 weeks we are reducing the number of the doubts and solution day for the student. After covering the 2 chapters we are taking the doubts and solution for both the chapters.

Important Points:
  • Based on the team availability you have to contact at least one week prior to date you want start your training.
  • All the communication will be done via email / Skype only.
  • Course notes will be mailed to you on regular basis according to training schedule.
  • At the end of each chapter all the sample code will be send to you. The next day will be reserved for the discussion and problem solution. If it is not there then next chapter will be start immediately.
  • 20% of the course fess will be submitted at the time you will get the confirmation mail from us. Training will start after receiving the initial payment.
  • The remaining amount have to be submit in the mid of the training only. Failing with that training will be stopped immediately.
For any other query please write to us on,