Labels

Saturday, 20 April 2013

BROWSE SHIELD

BrowseShield: Help to monitor and track your computer activity !!!

there are many people who wanted to monitor their computer activites in their absence so here is the solution. 

Activity Monitoring:-
* Log all websites visited
* Record all searches done
* Logs social websites visited, including login name and password

Parental Controls:-

* Category blocking
* Domain black listing
* Domain white listing
* Control internet access times

Apart from this Monitoring tools also follow these simple tips:-

* Always Keep children computer in a common room or high-traffic area of your home.
* Surf the internet with your children and let them show you what they like to do online.
* Define some rules and aware your childs to follow these when using internet.
* Talk openly with your child about the potential danger online.


Download link    http://www.browseshield.com/BrowseShieldInstaller.exe

Torrent Stream

Torrent Stream - somewhat similar to the BitTorrent technology, there is a new concept that gives users something more than file sharing: live streams distributed over the Internet. An application tailored especially for this purpose is Stream Torrent. The main advan***e of such an application is that it doesnt need a server to transfer data because computers are directly connected so it all depends on the speed of the two Internet connections. It simply plays the streaming torrents after you add the desired address to the list.

download from==>here

WINDOWS VERSION HISTORY

WINDOWS 1.0 ------>16 Bit Os (1985)
WINDOWS 2.0 ------>16 Bit Os
WINDOWS 3.0 ------>16 Bit Os (1990)
WINDOWS 3.1 ------>16 Bit Os (1992)
WINDOWS NT 3.1 ------>32 Bit Os (1993)
WINDOWS 95 ------>Used WIN32 API
WINDOWS 98
WINDOWS ME
WINDOWS NT 4
WINDOWS 2000 (or also Known as WINDOWS NT 5)
WINDOWS XP (or also Known as WINDOWS NT 5.1)
WINDOWS XP PROFESSIONAL ----->Supports 64 Bit
WINDOWS SERVER 2003
WINDOWS VISTA (WINDOWS NT 6.0)
WINDOWS 7 (WINDOWS NT 6.1)
------->WINDOWS ­ 7 ULTIMATE
------->WINDOWS ­ 7 HOME PREMIUM
------->WINDOWS ­ 7 HOME BASIC
------->WINDOWS ­ 7 PROFESSIONAL
------->WINDOWS ­ 7 STARTER
------->WINDOWS ­ 7 ENTERPRISE
WINDOWS SERVER 2012
WINDOWS 8 (WINDOWS NT 6.2)
------->WINDOWS ­ 8
------->WINDOWS ­ 8 Pro
------->WINDOWS ­ 8 ENTERPRISE
------->WINDOWS ­ 8 RT (FOR TABLETS)
XP-EXTENDED PROCEDURE
NT-NEW TECHNOLOGY
RT-RUNTIME

Speed up your Internet with public DNS servers

TOP 10 DNS SERVERS

Level3:
Preferred DNS server - 209.244.0.3
Alternate DNS server - 209.244.0.4


Google:

Preferred DNS server - 8.8.8.8
Alternate DNS server - 8.8.4.4


ScrubIT3:

Preferred DNS server - 67.138.54.120
Alternate DNS server - 207.225.209.77

OpenNIC4:Preferred DNS server - 69.164.208.50
Alternate DNS server - 216.87.84.211

Public-Root5:
Preferred DNS server - 199.5.157.131
Alternate DNS server - 208.71.35.137

Comodo DNS:
Preferred DNS server - 8.26.56.26
Alternate DNS server - 8.20.247.20

OpenDNS:
Preferred DNS server - 208.67.222.222
Alternate DNS server - 208.67.220.220

DNS Advantage:
Preferred DNS server - 156.154.70.1
Alternate DNS server - 156.154.71.1

Norton DNS:
Preferred DNS server - 198.153.192.1
Alternate DNS server - 198.153.194.1

SmartViper:
Preferred DNS server - 208.76.50.50
Alternate DNS server - 208.76.51.51

How to Speedup Internet connection with Top 10 High Speed Public DNS Servers?

>>Go to Control Panel
>>Then go to Network and Sharing Center
>>Click on Local Area Connection
>>Then click on Properties After that, Select Internet Protocol Version 4 (TCP/IPv4) and click on Properties
            OR
Double Click on Internet Protocol Version 4 (TCP/IPv4) Now click on Use the following DNS addresses and change it as follows. Use any of above mentioned public DNS servers.


>>Then click on OK,

How to Lock PC temporarily when someone enter wrong password

Most of us saved our Important data and files on our computer. If we are away from our PC, somebody may login into our system by guessing the password. To avoid this situation we can lock our PC temporarily by using "Windows Security Settings". By using this option, our PC will lock automatically if someone enters the wrong password more than the number of times specified. This will makethepassword hard to be guessed. If the person enters more than 3 wrong passwords, PC will get lockedfor the next 30 Minutes.

How to do this:

>>Click on Start button

>>Type Local Security Policy in Search

>>Now Click on "Local Security Policy"

>>From left window pane expand Account Policies

>>Then Double click on Account Lockout Policy

>>After that Double click on Account Lockout threshold.

>>Now a new window will appear.

>>In that window give the value after how many invalid password login attempts you want to lock your PC.

>>Now click on Apply.

>>Then Click OK.

How To Check All System Configuration

There are different types of configuration on Computer System, like Graphics card memory, Ram, Hard disk, Processor etc. It is very helpful when you install any new hardware on your PC and some people don't know how to check system configuration. So here below we have added two simple methods to check all system configuration.

Method #1


Click on start button and go to Run, then type msinfo32.exe
In new window your system configuration will be displayed
Click on + button and choose Hardware Resources, Components, Software environment

For some newbie Computer user method 1 is difficult to understand system configuration.


Method #2


CPU-Z is a free software, download it from http://www.cpuid.com/softwares/cpu-z.html , after installation of this software it will automatically detect your system configuration and it will show your all PC configuration.

Tuesday, 16 April 2013

Access Hidden Regional Themes in Windows 7 !!!

Access Hidden Regional Themes in Windows 7 !!!

To access the other international themes copy and paste the following path into the search box and hit Enter.

C:\Windows\Globalization\MCT

In the MCT folder you will find additional themes

go into the Theme folder double click on the the thumbnail to add it.

Here you can see I added all of them and now they will be available under the My Themes section for when you want to change them around.

This is a neat little trick that will let you customize Windows 7 with hidden themes already available.

Compress 1GB File to 10MB

KGB Archiver: Compress 1GB File to 10MB

KGB Archiver is free and open source software which compresses 1GB file to 10MB file.
Data compression utility of this software is based on PAQ6 algorithm which has AES-256 powerful encryption. KGB archiver works on both Windows and Linux operating system. Compression ratio of this software is very high. Due to high compression levels, time to compress a file goes high as the size of the file increases and compression ratio may vary depending on the format of the file.When a file is compressed with KGB Archiver it saves it with own extension and at the time of decompression it automatically recognizes the file format. The only limitation of KGB archiver is, decompressed file cannot be open or extract with other compression softwares. You can also choose any compression level (high, maximum, normal, low, very weak) to compress a file but the compression time will vary according to your selected compression level.
Note: If you are compressing any file with KGB archiver and sending the comprssed file to your friends then he must have KBG archiver installed on his computer to decompress the file.

System Requirements:


Due to high compression ratio of KGB archiver, you need to have a decent system hardware configuration256 MB RAM
1.5 GHz Processor

Features of KGB Archiver

Supports native .kgb files and .zip files
AES-256 Encryption
Able to create self-extracting archives.
Multilanguage supports like Arabic, German, Greek, Japanese, Spanish many more.
Unicode is supported in both User Interface and File Systems.
An Explorer shell extension is available for the windows version.
Make Password protected compressed file.

Download here http://sourceforge.net/projects/kgbarchiver/

Make limited Broadband faster

How to make your limited broadband faster well,using broadband sometimes slow,so today i gonna show you some trick

1)first of all,we need to do is run cmd (must connect to internet).


2)next,type in “ipconfig/all” and hit enter.


3)once you do that,connection ­ list will come out.search for your modem name (broadband name).


4)ok,type in “ping [ip address] -t” Example: ping 10.175.53.131-t .and hit enter.


5)let cmd like that.close it,if you don't want to use.

How to Prevent Keystroke Logging

How to Prevent Keystroke Logging

Keystroke logging is a technique which allows malicious users to keep track of everything you type on a computer. If someone is logging your keystrokes, sensitive information can be compromised. Any user account and password combination, bank account number or other personal information you type will be recorded to a file or sent over the Internet. If you want to keep your personal information safe, there are precautions you can take to prevent keystroke logging.

Instructions
1-->
Check for hardware keyloggers. These are usually small devices that connect between your keyboard cable and your computer. Remove any device that is located between your keyboard cable and your computer.

2-->
Enter passwords and other sensitive information in a way that will confuse keyloggers. Type random characters in between important characters and delete them with the mouse, add in extra mouse clicks or click and type random characters in the address bar in between typing characters into a password box.
Security Task Manager
Detects all hidden processes, Trojans and Spyware on your PC
www.neuber.com/TaskManager
3-->
Install a firewall. Set up the firewall to notify you anytime a program wants to send information across the Internet. Watch for unknown programs that might be sending out keystroke logs and deny them access to the Internet.

4-->
Download an anti-spyware program. Install the program after download and run a full system scan. Remove any threats that the software finds. Reboot your computer and scan it again until no threats are found. Scan your computer regularly to ensure no new threats are installed.

How to Stop Key Logging

How to Stop Key Logging
"Keyloggers" are a type of malicious software that can keep a full record of every key that is pressed on your keyboard. Any passwords, PINs, or account numbers you type while a keylogger is installed on your computer will be recorded in a log that can be retrieved by an attacker or spy. If you suspect that someone is using a keylogger on your computer to spy on you or steal sensitive information, you should do everything you can to stop the key logging that is going on.

Instructions
1
Scan your computer system for all types of malicious software. Purchase or download an anti-malware program. Run both anti-virus and anti-spyware scans on your entire system. Remove any files that the malware scan alerts you to. Allow the computer to restart and remove additional files if you are prompted to do so.

2
Install a software-based firewall on your system. Set the firewall so that all programs have to ask for permission before sending data across the Internet. Deny access to any suspicious programs or programs that you do not recognize; some key logging programs send logs across the Internet and the firewall will alert you to the presence of these keyloggers.

3
Use a keystroke interference tool. Programs of this type add in additional data to the keyboard buffer that is included as random information in a keystroke recorder log. Run the program at all times; this will help defeat any keyloggers that are not discovered in a malware scan and don't send information to the Internet.

4
Inspect your keyboard cable for hardware key logging devices. These will be attached to the keyboard cable between the connector and the computer. Shut down your system and remove any devices that you find connected between your keyboard and your computer.

Monday, 15 April 2013

HOW TO CHANGE ADMIN PASSWORD IF YOU FORGOT OLD PASSWORD


If you forget your old password or any other reason and want to change your administrator password then follow these steps
Go to Control Panel >> Administrative tools >> Computer management >> Then System Tools
After That Go to Local user and Groups >> User
Then on Administrator Do Right Click and then Set Password >> Then Click Proceed
Now enter your new password and press ok button.

Saturday, 13 April 2013

Databases Demystified by Andrew Oppel


Andrew Oppel, "Databases Demystified" 
McGraw-Hill Osborne Media 2004 | ISBN: 0072253649 | 360 pages | PDF | 7 MB

Through clear language, step-by-step discussions, and quizzes at the end of each chapter, the author makes databases easy. Quickly learn the core skills needed to design, configure, manage, and manipulate databases, whether at work or at home. Topics such as exploring different database models, planning their design, minimizing redundant data, designing tables, applying database design concepts, and implementing database security are covered. This is that fast, easy-to-understand tutorial that you’ve been looking for. 

download-->> download here

DB2 Developer's Guide 4th Edition


Craig Mullins, DB2 Developer's Guide
Sams Publishing |ISBN: 0672318288 | 2000 | 
PDF | 1639 pages | 18.81 MB
DB2 Developer's Guide, Fourth Edition is completely revised and updated, covering all the new features for Version 6 for OS/390. It includes a special chapter on how changes to the product impact its use. This book clarifies complex DB2 topics, provides performance and procedural advice for implementing well-designed DB2 applications, and describes what DB2 does behind the scenes. An entire chapter on Internet-related features is included.
download -->> download here

Friday, 12 April 2013

Real-Time Java Platform Programming

Real-Time Java Platform Programming PDF free
Real-Time Java Platform Programming 
Publisher: Prentice Hall PTR | ISBN: 0130282618 | edition 2002 | PDF | 255 pages | 12,1 mb

Real-time programming is critical to the development of a wide range of consumer, industrial, system, and military devices. Using the new Real-Time Specification for Java (RTSJ), developers can create, verify, analyze, execute and manage Java code that ensures the correctness, timeliness, and execution predictability that are essential to real-time programming. This book, written by one of RTSJ's creators, offers a practical introduction to real-time programming for every Java developer -- even those with no real-time experience at all. Replete with example code, this book gives any Java developer the skills and expertise to build powerful real-time applications.

download==>> download here

Object-Oriented Programming in C++ PDF free By Robert Lafore

Object-Oriented Programming in C++, 4th Edition By Robert Lafore
free eBook Object-Oriented Programming in C++ PDF Downlaod begins with the basic principles of the C++ programming language and systematically introduces increasingly advanced topics while illustrating the OOP methodology. While the structure of this book is similar to that of the previous edition, each chapter reflects the latest ANSI C++ standard and the examples have been thoroughly revised to reflect current practices and standards.



Paperback: 1040 pages
File Format: PDF
Publisher: Sams Publishing; 4 edition (December 29, 2001)
Language: English
ISBN-10: 0672323087
ISBN-13: 978-0672323089


Download ==>==>download here

Send massage on facebook to anyone if u r blocked

How can we send massage on facebook to anyone if u r
blocked


1»go to your mail account.


2»Compos new mail.


3»Entrer username@facebook.com ( which id u want to send on facebook).


4» send it Have fan your massage will reach in fb massage box .

HOW TO MAKE BLANK POST ON FACEBOOK !!!

HOW TO MAKE BLANK POST ON FACEBOOK !!!

STEP 1. Go to your or your friend’s wall
STEP 2. Type “alt+0173″ ( of numpad )
STEP 3. click “share” or Press Enter… And That’s it..

Once if you are done, your blank post will be shown on your friend's wall.

It works only With Status and Comments !

View Large Size Pic of Locked Profile's on Facebook

How to View Large Size Pic of Locked Profile's on Facebook

1. Visit Facebook.com
2. Now open any profile that is locked and you want its profile pic to be enlarged.
3. Now just right click on the profile pic and click on Copy image URL.
4. You are going to get some URL like below.

https://fbcdn-profile-a.akamaihd.net/hprofile-ak-snc6/c37.37.466.466/s160x160/168693_171397999572370_4771033_n.jpg

5. Just remove the s160x160/ part from the above URL and hit enter.
6. There u go you will see the large size of that small locked image.

Hide .EXE File into JPG

Hide .EXE File into JPG 

This is a good trick to hide your exe files into a jpg file..!

How about sending a trojan or a keylogger into your victim using this trick..??

1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)

3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'

4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.

5) Now create a shortcut of this 'picture.jpeg' in the same folder.

6) Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.

7) Go to properties (on file me.jpeg) and now you need to do some changes there.

8) First of all delete all the text on field 'Start In' and leave it empty.

9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'

10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.

11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.

12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.

13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.

14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.

15) For me for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.

16) So the best way to send these files together to someone is compress them into Zip or Rar.

17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.

Run Firefox inside Firefox

Run Firefox inside Firefox 

How to run Firefox inside Firefox.?

Yup you can run Firefox inside firefox just by typing following url.

How about Opening Firefox inside Firefox which is again in another Firefox..?
Not bad huh?
And its really easy too just type in this url in Firefox's address bar and there you go!
Firefox inside Firefox!

copy paste following url in a web browser (mozilla firefox).

chrome://browser/content/browser.xul

PASSWORD HACKING

-: Password Hacking :-{Educational Purpose only}

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.

2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.

Check Your Password Strength

3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

Wednesday, 10 April 2013

Java Basic Data Types


Variables are nothing but reserved memory locations to store values. This means that when you create a variable you reserve some space in memory.
Based on the data type of a variable, the operating system allocates memory and decides what can be stored in the reserved memory. Therefore, by assigning different data types to variables, you can store integers, decimals, or characters in these variables.
There are two data types available in Java:
==>Primitive Data Types
==>Reference/Object Data Types

Primitive Data Types:

There are eight primitive data types supported by Java. Primitive data types are predefined by the language and named by a key word. Let us now look into detail about the eight primitive data types.

byte:

  • Byte data type is a 8-bit signed two's complement integer.
  • Minimum value is -128 (-2^7)
  • Maximum value is 127 (inclusive)(2^7 -1)
  • Default value is 0
  • Byte data type is used to save space in large arrays, mainly in place of integers, since a byte is four times smaller than an int.
  • Example : byte a = 100 , byte b = -50

short:

  • Short data type is a 16-bit signed two's complement integer.
  • Minimum value is -32,768 (-2^15)
  • Maximum value is 32,767(inclusive) (2^15 -1)
  • Short data type can also be used to save memory as byte data type. A short is 2 times smaller than an int
  • Default value is 0.
  • Example : short s= 10000 , short r = -20000

int:

  • Int data type is a 32-bit signed two's complement integer.
  • Minimum value is - 2,147,483,648.(-2^31)
  • Maximum value is 2,147,483,647(inclusive).(2^31 -1)
  • Int is generally used as the default data type for integral values unless there is a concern about memory.
  • The default value is 0.
  • Example : int a = 100000, int b = -200000

long:

  • Long data type is a 64-bit signed two's complement integer.
  • Minimum value is -9,223,372,036,854,775,808.(-2^63)
  • Maximum value is 9,223,372,036,854,775,807 (inclusive). (2^63 -1)
  • This type is used when a wider range than int is needed.
  • Default value is 0L.
  • Example : int a = 100000L, int b = -200000L

float:

  • Float data type is a single-precision 32-bit IEEE 754 floating point.
  • Float is mainly used to save memory in large arrays of floating point numbers.
  • Default value is 0.0f.
  • Float data type is never used for precise values such as currency.
  • Example : float f1 = 234.5f

double:

  • double data type is a double-precision 64-bit IEEE 754 floating point.
  • This data type is generally used as the default data type for decimal values. generally the default choice.
  • Double data type should never be used for precise values such as currency.
  • Default value is 0.0d.
  • Example : double d1 = 123.4

boolean:

  • boolean data type represents one bit of information.
  • There are only two possible values : true and false.
  • This data type is used for simple flags that track true/false conditions.
  • Default value is false.
  • Example : boolean one = true

char:

  • char data type is a single 16-bit Unicode character.
  • Minimum value is '\u0000' (or 0).
  • Maximum value is '\uffff' (or 65,535 inclusive).
  • Char data type is used to store any character.
  • Example . char letterA ='A'

Reference Data Types:

  • Reference variables are created using defined constructors of the classes. They are used to access objects. These variables are declared to be of a specific type that cannot be changed. For example, Employee, Puppy etc.
  • Class objects, and various type of array variables come under reference data type.
  • Default value of any reference variable is null.
  • A reference variable can be used to refer to any object of the declared type or any compatible type.
  • Example : Animal animal = new Animal("giraffe");

Java Literals:

A literal is a source code representation of a fixed value. They are represented directly in the code without any computation.
Literals can be assigned to any primitive type variable. For example:
byte a = 68;
char a = 'A'
byte, int, long, and short can be expressed in decimal(base 10),hexadecimal(base 16) or octal(base 8) number systems as well.
Prefix 0 is used to indicates octal and prefix 0x indicates hexadecimal when using these number systems for literals. For example:
int decimal = 100;
int octal = 0144;
int hexa =  0x64;
String literals in Java are specified like they are in most other languages by enclosing a sequence of characters between a pair of double quotes. Examples of string literals are:
"Hello World"
"two\nlines"
"\"This is in quotes\""
String and char types of literals can contain any Unicode characters. For example:
char a = '\u0001';
String a = "\u0001";
Java language supports few special escape sequences for String and char literals as well. They are:
NotationCharacter represented
\nNewline (0x0a)
\rCarriage return (0x0d)
\fFormfeed (0x0c)
\bBackspace (0x08)
\sSpace (0x20)
\ttab
\"Double quote
\'Single quote
\\backslash
\dddOctal character (ddd)
\uxxxxHexadecimal UNICODE character (xxxx)