Anti-locking VB Script using Shell Object

One of the major concerns faced while running the RPA solutions especially with UI automations(Automation Anywhere, UIpath etc) is System Locking/screen locking. In other words, while these solutions run in the background, windows gets auto locked/screen locked. Eventually this will…

Read More

Logic to rewrite numbers as words using JAVA

Very often we come across certain situations for converting numbers as words in generating invoice or bills applications. Here I am providing the logic in JAVA for doing this task. import java.io.InputStream; import java.io.PrintStream; import java.util.Scanner; public class NumToWord {…

Read More

Changing ec2 instance type on Amazon AWS

Amazon AWS provides ec2 instances of various types namely micro, small, medium etc. These instances types differ on the CPU, Memory, Storage, and networking capacity. AWS also provides various ranges of ec2 instances like t2, m3, m4, c3, c4 etc. All these range of instances have their own unique features in terms of best usage of CPU, memory and networking capacity to provide robust computing environment. One of the best feature of AWS ec2 instance type is that, it provides the flexibility of changing the instances type based on the demand and usage. If usage is more, then you can opt for higher instances type or else you can downgrade the instance type to save your expenses.

Read More

Understanding file permissions in Unix or Linux and modify using Chmod

Unix/Linux file system security is developed in such a way that it provides best protection method for storing files. So lets invest some time in Understanding file permissions in Unix or Linux and modify using Chmod. The file permissions in Unix or Linux contains majorly three attributes namely owner/user,Group , Other(rest of the world). Here, Owner/user is the person who creates the file. Group implies that the group the user belong to, and lastly Other is rest of the world implies other users from other groups etc.Here only owner or root can change the permissions and these privileges cannot be delegated.

Read More