Tuesday, January 12, 2016

Retrieve data from Google Sheets in .NET- the easiest way!

So, I was creating an app for the Windows Phone platform the other day, and wanted to store some data. But I did not want to shell out money for a full fledged database server. So a question struck my mind. Google sheets allows me to create spreadsheets for FREE! So can I use them to store my tabular data? Since my requirements were much simpler, I did not require to perform any of the database operations such as 'Join' or 'Group By'. I simply needed all the data stored in the table at a particular instant of time.

Note that although Google provides several APIs for Google Sheets but none of them work for the Windows RT platform(at least, this is what I concluded after a couple of days of frantically searching their documentation).

So I finally figured out a way to accomplish what I wanted. I'm demonstrating it from scratch, by creating a spreadsheet. Follow along.

STEP 1: Create a new Google Sheet

Sunday, January 10, 2016

Playing with IP Addresses- Part 1

All the devices connected to the internet are assigned a unique identification number called the IP-Address, where IP stands for the Internet Protocol. Although there have been several versions of the Internet Protocol, only two of them IPv4 (version 4) and IPv6(version 6) are popular.

The IP addresses can be static or dynamically assigned. 

Thursday, December 31, 2015

Speed up browsing by editing the hosts file

When you open a website, the domain name such as 'www.google.com' gets resolved to an IP-address of the server serving the request. This IP address looks something like  This name-to-address resolution is performed by a Domain Name Server (DNS). So this is what happens when you type in a URL such as 'www.tech-simply.blogspot.com' in your browser:
  1. A request goes to the DNS server to resolve the domain name into the corresponding IP address.
  2. The DNS responds with the IP address to your computer (also known as a client)
    A small hack
    : You can yourself find out the IP address of a host using the ping utility. 

Wednesday, December 30, 2015

How to Edit the Host File in Windows?

There's a lot one can do by making changes to the host file.
Just for an example, you can block any website without using any third party software.
You can boost up your internet speed by resolving the domain name to the corresponding IP Address locally at your PC, instead of a DNS Server doing that for you.

So here's how to do it. Make sure that you are logged on as the administrator on the system.
STEP-1   Search for "notepad" on your PC . Right click on it and select "Run As Administrator". If asked, type in the administrator password, and click OK.

Tuesday, October 13, 2015

Is main() function a built-in function or user defined function ?

This question “Is main () function a built-in function or a user defined function…? can be considered analogous to the hypothetical question as whether an egg is first or a hen…!!! The reasons for the persistence of this kind of a chaos is brought-out in the following section.
The main () function as a built-in function:
  1. The compilers of most of the programming languages are so designed that the main () function constitutes the entry point of the program execution. It defines the point from which the program has to start executing itself though there are many other sub-routines and other user-defined functions included in the program.
  2. The main () function is the controlling section of our code because even though the control of the program is shifted to the UDF (user defined function) during the program execution after a function-call from main (), once it's execution is completed, the control is transferred back to the main () function with some or no return value (as in the case of a void function).

Monday, March 02, 2015

Why are the arguments for a Java main function a string type?

Why only String and not an Integer or a float?
The inputs from the console and the output to the console are always of the type String. 

Consider this example

Sunday, January 04, 2015

Speed up data transfer to USB

The data transfer from PC to USB or from USB to PC depends on 3 main factors

1. Type and size of files being transferred
Music,video and office file will be transferred with a much higher rate compared to application files, you must have experienced this. If the files being transferred are relatively large, the speed of data transfer is higher.

2. Aging of pen drive
This point is common for any device, older pen drives have a very slower rate of transfer.

3. Port version of the USB
Nowadays almost every pen drive is a USB 3.0 device when such USB is inserted in a old system which has a USB port version of 2.0 the data transfer is drastically reduced.

Saturday, December 13, 2014

What Is Brute-forcing?


Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys.Just as a hacker might break into, or "crack" a safe by trying many possible combinations, a brute force cracking application proceeds through all possible combinations of legal characters in sequence. Brute force is considered to be an infallible, although time-consuming, approach.

Wednesday, December 03, 2014

What happens when a computer is switched on?

I have tried to make this answer look as simple as possible. 

As soon as the computer is switched on the following events occur in succession:
  1. The SMPS (Simple Mode Power Supply) gets the power from the powercord that you plugged in or from the battery. By the way, SMPS is the power house of any computer system.
  2. Different components require different power, so the SMPS converts it into appropriate voltages and supplies it to the components.

Tuesday, November 25, 2014

Why Does Chrome Say PDF Files Can Harm Your Computer

Some browsers, like Chrome,  warns that PDF files “can harm your computer” whenever you try to download them. But how can a PDF file be so dangerous — isn’t a PDF just a document with text and images?

PDF readers like Adobe Reader have been a source of many security vulnerabilities over the years. This is because a PDF file isn’t just a document — it can contain scripts, embedded media, and other questionable things.

PDFs Aren’t Just Documents!

The PDF file format is actually very complicated. It can contain many things, not just text and images, as you might expect. PDF supports many features that it arguably shouldn’t, which have opened many security holes in the past.

Saturday, November 22, 2014


I just found links to some books that you may like on the web. I am enlisting all of them.
Although there is some outdated stuff, but I not not omitting them from the list.

1) 10 minute guide to lotus notes mail 4.5

2) 10 minute guide to Microsoft exchange 5.0
3) 10 minute guide to outlook 97

4) 10 minute guide to schedule+ for windows 95

5) ActiveX programming unleashed

6) ActiveX programming unleashed

7) Advanced perl programming

8) Advanced PL/SQL programming with packages

Thursday, November 13, 2014

Block any website without any third party software

Any website can be blocked without using any your party software.

1)   For Windows 7
       Navigate to C:\Windows\system32\drivers\etc\hosts

       On Windows NT it is:

      For Unix/ Linux

2)    Open the file "hosts" in Notepad. It has no extension.

3)    Type in <space or tab> and then www.domain_name.domain extension.

4)     Save the file and exit.
This will block Facebook.com on the system.