Category Archives: tool

Common Errors & Resolutions [ WebSphere Application Server 6.1]


  1. If you happen to get following exception while working on WAS

java.lang.NoClassDefFoundError: org.eclipse.core.runtime.CoreException
at java.lang.J9VMInternals.verifyImpl(Native Method)
at java.lang.J9VMInternals.verify(
at java.lang.J9VMInternals.initialize(

The resoultion for this is :

Adding the file under

\runtimes\base_v61\runtimes\ folder to the web applications library path.


Next Generation Laptops!

Next generation Laptops should have a scanner [which scans pages of the size of a small book (novel) ] and printer which prints pages of the same size!

A facsimile also?

It would be so helpful to have something like this!

What additional features would you love to have on your laptop?

My First Laptop

So, the numerous discussions and debates about which laptop is good in terms of processing and also cost effective, came to an end on Saturday.

I finally purchased a Acer 4710 Z.

[ This picture is really of Bad quality. I will come up with a better one tomorrow.]

Configuration : –

Intel Core 2 Duo , 2 MB L2 Cache, 2 GB RAM, DVD Combo (R/W), Wi-fi, Bluetooth, 5 in 1 Card Reader, Integrated Camera.

I got, a TAG mouse, I-Ball Headset and a  2 GB Transcend USB drive FREE with this!!

Technorati tags:


I found CoScripter today at the Alphaworks site in the SOA & WebServices zone

I found this scripting language to be very helpful. Though in its early phase of development, its really impressive!

CoScripter is a system for recording, automating, and sharing business processes performed in a web browser such as printing photos online, requesting a vacation hold for postal mail, or checking a bank account balance. CoScripter lets you make a recording as you perform a procedure, play it back later automatically, and share it with your friends.

During my Experiments with using it, I felt there should have been following things

  1. Tab browsing
  2. Looping
  3. Calling scripts from other scripts.
  4. And may be browser support.. !?

I am sure the people at IBM Research must already know this, but still “my .002 (?) cents” in support for the same.

Currently un-supported features are listed here.

I am sure, any techie guy would surely love this feature.. at least to try out .

CoScripter is daam Cool! Give it a SHOT.. I am sure.. you would love it.

Technorati tags: , , , ,

Grade your site

While browsing through the Internet on articles about SEO, I stumbled upon a really useful tool called WebSite Grader .

The report gives you a very concise and at the same time a detailed analysis of your site. It also you gives tips on improving the SEO reach. For this site, the report is as :-

It provides a score that incorporates things like webite traffic, SEO, social popularity and other technical factors. It also provides some basic advice on how the website can be improved from a marketing perspective. (Source: WebSite Grader ).

(There is a spelling mistake on the site – they call it webite traffic! wonder what that is ! … Spell Checkers are the need of the day! huh!)

The tool is a very very useful, in helping you really understand the SEO and improving your site’s performance. And Most Importantly its FREE !

Technorati tags: , , , , ,

Defective iPhone !

A news service here quotes that some experts have found a security flaw with iPhone.

The details are as

By David Raikow, CMP Channel
5:53 PM EDT Mon. Jul. 23, 2007

A team of security researchers say they have discovered a security flaw in Apple’s iPhone that would allow an attacker to take nearly complete control over a target device.

The group, which works for consulting and assessment firm Independent Security Evaluators (ISE), is withholding technical details until August 2 in order to give Apple time to fix the problem. They do claim, however, to have successfully exploited the vulnerability, and have posted a video of an attack on their website.

The vulnerability–known as a buffer overflow–lies in the Safari web browser built into the iPhone, said team member Charlie Miller.

By directing the browser to a web page containing malicious code, Miller says that his team has forced an iPhone to connect to a server and personal information contained on the device, including previous SMS text messages, contact information, call history, and voice mail data. By modifying the malicious code, an attacker could also have forced the phone to call out, send text messages, or record audio.

The ISE team noted several techniques an attacker could use to trick a user into accessing a malicious web site, including links embedded in email or online forum posts.

A more subtle attacker could set up a wireless router disguised as a free public access point, and then inject the malicious code into any page an iPhone user attempts to access.

The video on the team’s website shows just such an attack on a device attempting to access the New York Times website. As the iPhone can be configured to connect to wireless networks without asking the user, this could present a particularly effective attack.

Though browser vulnerabilities are not uncommon, Miller believes that this one is particularly bad because of weaknesses in the underlying security architecture of the iPhone. Apple’s approach, he says, appears to have focused on limiting the applications on the device and restricting how it can be accessed, rather than handling those applications in a secure fashion. Most significantly, iPhone appears to run applications with full administrative rights, giving a successful attacker those same privileges.

“Unfortunately,” the ISE team concluded in their paper, “once an iPhone application is breached by an attacker, very little prevents an attacker from obtaining complete control over the system.”

The ISE team released a draft whitepaper July 19 outlining the flaw. After reading the whitepaper, Paul Henry, Secure Computing’s Vice President of Technology Evangelism, agreed with Miller’s assessment of the iPhone’s security architecture. “Apple seems to have literally abandoned a core principle of the unix operating system: the rule of least privilege.”

Henry asserts, however, that the real underlying issue is inherent in the drive to put more functionality on smaller devices. “You simply don’t have the processing power on something like a phone to be able to handle properly securing it,” he told CRN. “Running applications as root–that’s a horsepower issue with the phones themselves. They’re trying to keep the CPU utilization down to acceptable levels to get that performance experience for the user.”

While Miller emphasized that vulnerabilities are an inevitable part of every piece of software and every computing device, he also argued that Apple’s reputation for security may have less to do with technical prowess than it’s relatively small user base.

“This wasn’t an easy bug to find, but it wasn’t that hard either,” Miller told CRN. “If people had been looking at Safari as hard as they look at Internet Explorer, this would have turned up awhile ago. Unfortunately, they may end up being victims of their own success.”

Miller says that the vulnerability also exists in the Mac OS X and Windows versions of Safari, but that he was uncertain if it would be exploitable on either platform as a practical matter. While a successful attack on the Mac or Windows versions could be serious, in neither case would the attacker gain the degree of access the ISE team claims to have achieved on the iPhone.

Apple has not responded to requests for comment.

The original story is here.

Technorati tags: , , , , , , , ,

Picture jokes

Daily Clock ! The ultimate search engine!




  Toyota !


Technorati tags: , , ,