Skip to main content

Featured

Adobe Experience Manager - Create an OSGI Configuration

 In this article, let's create an OSGi configuration, configure it and use it in AEM code. So now let's get started with the creation of an OSGi configuration. Technical details and Assumptions: All the following details are tested in AEM version 6.5.8, Java version 11.0.2 Creation of OSGi configuration: To create an OSGi configuration we need to create an ObjectClassDefinition. I have included a sample OCD configuration, which can be used as a reference to create one. The next step would be to create an interface and an implementation that can help fetch the OSGi configurations.  Interface: Implementation: Let's try to use the OSGi configuration created so far in Models/Servlets. For demonstration purposes, I used AEM Models here, but the same can be implemented in Servlets too. Now that we have created the OSGi configuration. Once building the code, we should be able to see the OSGi configuration in the web console (http://localhost:4502/system/console/configMgr) C...

Prey Anti-thefting Software

PREY software can track your accesories like laptop and computer from a distance and secure your files wherever you are and help in safe guarding your data.
Prey is a freemium web service for tracking and monitoring laptop and desktop computers, smartphones and other electronic devices capable of running software applications, mainly intended to help in cases of theft. The service is hosted by servers on the Internet, to which an open-source software agent on the tracked computer connects. The host can signal the agent, prompting it to reply with information about its current location, and can trigger various other actions.The user can log into the Prey site if the tracked device is stolen, and request information about its location.
Prey runs on most versions of Microsoft Windows (except Windows Mobile and Windows Phone), LinuxAndroidOS Xand iOS. The computer version of the Prey agent is written primarily in Bash, while the mobile counterparts are written in their native languages, Java and Objective-C.
All of the client-side source code is published on GitHub and distributed under the GNU General Public License; the server code is proprietary, although an open source version is available for public use.
When the device is connected to the Internet after Prey has been asked for information (typically after theft), the Prey server asks the software agent to send location information, which is made available to the owner.
PROS
  • Help to track laptops.
  • Your laptop can be alarmed from a remote distance by using the site.
  • Helps you lock and hide all your data.
CONS



  • It requires internet connection.
  • Comments

    Popular Posts