Skip to main content

Posts

Showing posts from September, 2010

Developing Internet Based Multimedia Application Then Why JMF?

If you want to develop internet-based multimedia applications then the best technology to use is Java Media Framework  H93VHC3XEZT6 So what is JMF ? Here are few reason why JMF is good. JMF is an API. JMF is an optional package of Java 2 standard edition platform. JMF allows your applications to playback media, capture audio through microphone and video through Camera, do real-time streaming of media over the Internet process media ( change media format, add special effects ), store media into a file. JMF supports popular media formats such as JPEG, MPEG-1, MPEG-2, QuickTime, AVI, WAV, MP3, GSM, G723, H263, MIDI, and Hotmedia. JMF supports popular media access protocols such as file, HTTP, HTTPS, FTP, RTP, and RTSP. So why JMF? Existing desktop players rely mainly upon native codes to improve performance. Hence they are platform dependent and unsuitable for deployment over Internet. JMF provides a layer of abstraction. JMF API hides the implementation details and provides a cross pl

Latest Malware Alert

This is to inform a alert regarding a new malware called "Here You Have" worm which delivers unwanted gift. Its shows itself as a global mass mailing worm which masquerades as business message but actually it links to malware. KU5Y2XG5ZMGY This internet worm dubbed "Here You Have" is streaming into worldwide inboxes, offering a dangerous payload. The worm travels via spam email with the subject line of "Here you have," or "Just for you," and masquerades as an email with a link to a video or an attached document file. However, the email actually contains a link to a malicious program that can disable security software and send itself to all the contacts in the recipient's address book. It has been labeled as a "medium" risk, and delete any email with the "Here you have," or "Just for you," subject line. If you have an up-to-date and properly configured security software product then you are protected against thi

SETTING PROXY SERVERS

Setting Up Internet Explorer 6.0 for the Proxy 1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings. 2. Under Proxy server, click to select the Use a proxy server for your LAN check box. 3. In the Address box, type the IP address of the proxy server. 4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080). 5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance). 6. Click OK to close the LAN Settings dialog box. Click OK again to close the Internet Options dialog box. You are done.