Hi All,
In my previous post "PRIMARY STORAGE DEVICES PART-1" explained about RAM.
Now i am going to explain ROM(READ ONLY MEMORY).this is a permenant memory.
it controlls all BIOS programms.In RoM mailnly three parts important.
Those are....
1)POST (POWER ON SELF TEST)
IT WILL CHECK WHETHER ALL THE DEVICES ARE GETTING THE POWER SUPPLY OR NOT.
2)BSL (BOOT STRAP LOADER)
IT SELECTS THE VALID BOOT SECTOR.
3)DRIVERS
IT CONSISTS OF BASIC DEVICE DRIVERS AND CONFIGURATION OF MOTHER BOARD.
Sunday, December 26, 2010
Saturday, December 25, 2010
PRIMARY STORAGE DEVICES PART-1
Hi All,
In computer storage devices are devided in to 2 types .
Those are
1.primary storage devices .
2.secondary storage devices.
First Let's know something about primary storage devices.RAM and ROM(Read Only Memory).RAM (randam access memory) It is a volatile memory (means requires power supplycontinuously) andit is a temporary memory. it is divided into 2 types those are
1)SRAM (Static RAM)
It is cache memory.two types of cache memory present those are L1 & L2
L1 (Internal Memory with in the mother board)
L2(External Memory ) when your buying a Mother Board L2 cache like this 1MB,2MB,4MB etc.
2)DRAM(Dynamic RAM)
In DRAM various models are present.Those are
SD,DDR1,DDR2,DDR3,EDO Let's know ...
SD(Synchronous Dynamic)
The RAM 68 PINS and it's capacity is 32MB -512MB.5V POWER SUPPLY NEEDED.IT HAD A SINGLE NOCH AND 2 CUTS.
DDR1 (DOUBLE DATA RATE)
THE RAM 128PINS AND CAPACITY IS 2GB.IT HAD A 2NOCHES AND SINGLE CUT.CUT IS AT RIGHT SIDE.
DDR2
THE RAM 256 PINS AND CAPACITY IS 4GB AND 3.5V POWER SUPPLY NEEDED.CUT IS IN THE MIDDLE.
DDR3
THE RAM 512 PINS AND CAPACITY IS 8GB AND 3.3V POWERSUPPLY NEEDED.THE CUT IS AT LLEFT SIDE.
EDO(EXTENDED DATA OUTPUT)
IT IS USED IN SPARC MACHINES.
NOTE: In the upgradation of RAM two points are considered.
1.Storage capacity should be high.
2.power utlization should be less.
In computer storage devices are devided in to 2 types .
Those are
1.primary storage devices .
2.secondary storage devices.
First Let's know something about primary storage devices.RAM and ROM(Read Only Memory).RAM (randam access memory) It is a volatile memory (means requires power supplycontinuously) andit is a temporary memory. it is divided into 2 types those are
1)SRAM (Static RAM)
It is cache memory.two types of cache memory present those are L1 & L2
L1 (Internal Memory with in the mother board)
L2(External Memory ) when your buying a Mother Board L2 cache like this 1MB,2MB,4MB etc.
2)DRAM(Dynamic RAM)
In DRAM various models are present.Those are
SD,DDR1,DDR2,DDR3,EDO Let's know ...
SD(Synchronous Dynamic)
The RAM 68 PINS and it's capacity is 32MB -512MB.5V POWER SUPPLY NEEDED.IT HAD A SINGLE NOCH AND 2 CUTS.
DDR1 (DOUBLE DATA RATE)
THE RAM 128PINS AND CAPACITY IS 2GB.IT HAD A 2NOCHES AND SINGLE CUT.CUT IS AT RIGHT SIDE.
THE RAM 256 PINS AND CAPACITY IS 4GB AND 3.5V POWER SUPPLY NEEDED.CUT IS IN THE MIDDLE.
DDR3
THE RAM 512 PINS AND CAPACITY IS 8GB AND 3.3V POWERSUPPLY NEEDED.THE CUT IS AT LLEFT SIDE.
EDO(EXTENDED DATA OUTPUT)
IT IS USED IN SPARC MACHINES.
NOTE: In the upgradation of RAM two points are considered.
1.Storage capacity should be high.
2.power utlization should be less.
Friday, December 24, 2010
NEW GOOGLE OPERATING SYSTEM
Hi All,
CHROME OS----a pathbreaking innovation from Google.inc
What if nearly everything you usually keep on your computer — photos, documents, music and software — was stored online? Your machine would be speedier and perhaps less vital because you could simply use another machine to recoup your digital life should you lose your laptop.
This premise — somewhat scary, yet liberating — is behind Google Inc.'s upcoming Chrome OS, which will make notebook computers more like netbooks than most actual netbooks.
The software powering Chrome OS, which is based on the search giant's eponymously named browser, serves mainly as a tool for connecting your computer to the Web. That's where nearly everything you use is housed and linked to your Google username and password. It's a concept known as cloud computing.
A peek at the upcoming operating system and its vision of cloud computing shows a promising idea that could make computing faster and more convenient. But it still needs a lot of work.
Google expects the first computers powered by Chrome OS to be released this summer, and initially they'll be made by Acer Inc. and Samsung Electronics Co.
For now, though, Google is operating a pilot for some individuals and companies to test an unbranded laptop that runs Chrome OS. The company lent The Associated Press one of these machines, which aren't going to be sold to the public.
The laptop itself, called the Cr-48, doesn't really deserve to be critiqued, because it is a stripped-down machine that is chiefly a frame for Google's OS oeuvre. The shell is entirely matte black plastic, without a hint of branding. It has a webcam, a screen that is about 12 inches diagonally and a full-sized keyboard with a search key in place of the caps lock key.
The machine also has 16 gigabytes of flash memory for storing files, if you feel absolutely compelled to download something. Downloads are obviously discouraged, though; my music collection alone would nearly fill this allotment.
Moving on to the main event, Chrome OS brings a few clear benefits: Starting up the notebook takes just seconds — roughly 13 of them, according to my stopwatch — and waking the closed notebook from "sleep" mode is as quick as opening it up (almost too quick, as the notebook couldn't regain its wireless service quite as fast). By contrast, my Windows machine at work takes more than two minutes to boot up.
After you sign in with your Google account, the same username and password you would use to access Gmail, you can pull up a home page showing all the apps you've installed from the Chrome Web Store. Assuming you're connected to the Web, you can just start using apps and surfing the Web right away.
There were plenty of free and paid Web apps and browser extensions available when I tested the notebook. Some are only for the Chrome OS; others also work with Google's Chrome Web browser for other computers.
I installed a range of the free ones, some of which seemed to be just links to existing Web pages. The apps I snagged included Web-based office suite Google Docs, the chatting service Google Talk, Aviary's Advanced Image Editor and balloon-popping puzzle game Poppit.
As with smart phones and tablets such as Apple Inc.'s iPad, publications are also making Chrome apps. USA Today, The New York Times and The Wall Street Journal are among them.
On my work computer, it can take ages to open up applications that are stored on my hard drive. With the Cr-48, I could immediately start editing a Google Docs spreadsheet or tweak the colors in a photo using Aviary because the programs are all running online. I only needed a strong Internet connection.
Surfing the Web was a pretty normal experience, with most websites loading speedily, though the Cr-48 was not that good at displaying Flash videos.
But I felt constrained because I had to use the lone browser that comes with the system and the Web-based apps I obtained. Apps loaded slowly when my Internet connection wasn't stellar. This wouldn't be a problem with programs stored on a regular computer's hard drive.
If a Chrome OS-based laptop becomes my primary computer, a data plan would be a must.
I feel anxious just thinking about the possibility that I couldn't access my documents at any time, and I don't even keep anything that important on my own laptop.
I mostly used the notebook with Wi-Fi at home and at the office, though I also tried out its 3G network service, which is provide by Verizon Wireless.
So what happens if you don't have any Internet access? The Cr-48 is pretty useless.
I could still write in an already-open Google Docs document, add notes in Scratchpad and look at photos I'd downloaded. But I couldn't use apps that are not yet opened because they're all connected to the Web.
If you lose your connection while using an app, you may be able to view some information that has been temporarily stored in memory, as I could when browsing The New York Times' app. But you'll need to get online as soon as possible to really use the machine. Faced with this situation, I'd probably just search frantically for an Internet connection or simply put away my laptop.
In its current state, the Chrome OS is far from ready to take over as my main computer, even if I were using it on a more powerful machine than the Cr-48.
What if nearly everything you usually keep on your computer — photos, documents, music and software — was stored online? Your machine would be speedier and perhaps less vital because you could simply use another machine to recoup your digital life should you lose your laptop.
This premise — somewhat scary, yet liberating — is behind Google Inc.'s upcoming Chrome OS, which will make notebook computers more like netbooks than most actual netbooks.
The software powering Chrome OS, which is based on the search giant's eponymously named browser, serves mainly as a tool for connecting your computer to the Web. That's where nearly everything you use is housed and linked to your Google username and password. It's a concept known as cloud computing.
A peek at the upcoming operating system and its vision of cloud computing shows a promising idea that could make computing faster and more convenient. But it still needs a lot of work.
Google expects the first computers powered by Chrome OS to be released this summer, and initially they'll be made by Acer Inc. and Samsung Electronics Co.
For now, though, Google is operating a pilot for some individuals and companies to test an unbranded laptop that runs Chrome OS. The company lent The Associated Press one of these machines, which aren't going to be sold to the public.
The laptop itself, called the Cr-48, doesn't really deserve to be critiqued, because it is a stripped-down machine that is chiefly a frame for Google's OS oeuvre. The shell is entirely matte black plastic, without a hint of branding. It has a webcam, a screen that is about 12 inches diagonally and a full-sized keyboard with a search key in place of the caps lock key.
The machine also has 16 gigabytes of flash memory for storing files, if you feel absolutely compelled to download something. Downloads are obviously discouraged, though; my music collection alone would nearly fill this allotment.
Moving on to the main event, Chrome OS brings a few clear benefits: Starting up the notebook takes just seconds — roughly 13 of them, according to my stopwatch — and waking the closed notebook from "sleep" mode is as quick as opening it up (almost too quick, as the notebook couldn't regain its wireless service quite as fast). By contrast, my Windows machine at work takes more than two minutes to boot up.
After you sign in with your Google account, the same username and password you would use to access Gmail, you can pull up a home page showing all the apps you've installed from the Chrome Web Store. Assuming you're connected to the Web, you can just start using apps and surfing the Web right away.
There were plenty of free and paid Web apps and browser extensions available when I tested the notebook. Some are only for the Chrome OS; others also work with Google's Chrome Web browser for other computers.
I installed a range of the free ones, some of which seemed to be just links to existing Web pages. The apps I snagged included Web-based office suite Google Docs, the chatting service Google Talk, Aviary's Advanced Image Editor and balloon-popping puzzle game Poppit.
As with smart phones and tablets such as Apple Inc.'s iPad, publications are also making Chrome apps. USA Today, The New York Times and The Wall Street Journal are among them.
On my work computer, it can take ages to open up applications that are stored on my hard drive. With the Cr-48, I could immediately start editing a Google Docs spreadsheet or tweak the colors in a photo using Aviary because the programs are all running online. I only needed a strong Internet connection.
Surfing the Web was a pretty normal experience, with most websites loading speedily, though the Cr-48 was not that good at displaying Flash videos.
But I felt constrained because I had to use the lone browser that comes with the system and the Web-based apps I obtained. Apps loaded slowly when my Internet connection wasn't stellar. This wouldn't be a problem with programs stored on a regular computer's hard drive.
If a Chrome OS-based laptop becomes my primary computer, a data plan would be a must.
I feel anxious just thinking about the possibility that I couldn't access my documents at any time, and I don't even keep anything that important on my own laptop.
I mostly used the notebook with Wi-Fi at home and at the office, though I also tried out its 3G network service, which is provide by Verizon Wireless.
So what happens if you don't have any Internet access? The Cr-48 is pretty useless.
I could still write in an already-open Google Docs document, add notes in Scratchpad and look at photos I'd downloaded. But I couldn't use apps that are not yet opened because they're all connected to the Web.
If you lose your connection while using an app, you may be able to view some information that has been temporarily stored in memory, as I could when browsing The New York Times' app. But you'll need to get online as soon as possible to really use the machine. Faced with this situation, I'd probably just search frantically for an Internet connection or simply put away my laptop.
In its current state, the Chrome OS is far from ready to take over as my main computer, even if I were using it on a more powerful machine than the Cr-48.
vmware image of chrome is available .and it's using network installation method the os installed.
your gmail account used as user information.
Wednesday, December 22, 2010
How to Trace Mobile Numbers in india
Hi All,
With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.
Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.
If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.
By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!
With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.
Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.
If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.
By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!
HOW FIREWALL WORKS
Hi All,
If you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” and proxy is also using as a firewall in some places.
Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.
Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers. However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.
Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:
1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.
2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.
1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.
2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.
3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.
4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.
thank u...........
If you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” and proxy is also using as a firewall in some places.
How Firewalls Work
Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.
Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers. However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.
Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:
1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.
2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.
Firewall Configuration
Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.
2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.
3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.
4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.
Hardware vs. Software Firewall
Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority whereas, the software firewalls are less expensive and are most preferred in home computers and laptops. Hardware firewalls usually come as an in-built unit of a router and provide maximum security as it filters each packet in the hardware level itself even before it manages to enter your computer. A good example is the Linksys Cable/DSL router.Why Firewall?
Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.thank u...........
Wednesday, December 15, 2010
Log trick using notepad
Hi All,
This is simple, open notepad and type
Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.
This is simple, open notepad and type
.LOG
Save it as .LOG.txtWhenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.
Tuesday, December 7, 2010
How To Make Matrix With NotePad
Hi All,
Are you remember the matrix movie .now let's try that trick using simple notepad......
I’am going to show you how to make cool Matrix batch file using notepad.
Open notepad and type in
CODE :
Save it as matrix.bat
Double click on file and it will open the matrix
that's all .....................
Are you remember the matrix movie .now let's try that trick using simple notepad......
I’am going to show you how to make cool Matrix batch file using notepad.
Open notepad and type in
CODE :
@echo off
color 2
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start
Save it as matrix.bat
Double click on file and it will open the matrix
that's all .....................
Monday, December 6, 2010
URL
Hi All,
URL may be described in computing world as a Uniform resource Identifier which actually is used to specify about the location of an identified resource and also define the mechanism in order to retrieve information from that resource. Uniform Resource Locator or you may say URL is actually described or considered in popular usage as well as in the documents of technical writing and several discussion discussions on Internet as URI’s synonym.
Most common usage or you may say function of URL or you may say Uniform Resource Locator is known as the identifier of any web page or simply the web page address is recognized today as the URL in the world of World Wide Web. Web address or a URL of any web page is normally written as http:www.example.com/
It was year 1994 when first time the Uniform Resource Locator or you may say URL was created and the creator of this type was Tim Berners-Lee along with the coordination of “Internet Engineering Task Force” which is recognized being a working group of URI. Syntax of file path used in Unix, is actually used being the URL format in World Wide Web as forward slashes in Unix operating system are actually utilized to separate or differentiate folders or you may directories as well as resource names and files.
File format in URL is normally ends with the usage of a dot suffix like file.php or file.html and file.txt in which .php files are sent directly to the pre-processor before retrieving back the result of that file to user’s monitor.
URL may be described in computing world as a Uniform resource Identifier which actually is used to specify about the location of an identified resource and also define the mechanism in order to retrieve information from that resource. Uniform Resource Locator or you may say URL is actually described or considered in popular usage as well as in the documents of technical writing and several discussion discussions on Internet as URI’s synonym.
Most common usage or you may say function of URL or you may say Uniform Resource Locator is known as the identifier of any web page or simply the web page address is recognized today as the URL in the world of World Wide Web. Web address or a URL of any web page is normally written as http:www.example.com/
It was year 1994 when first time the Uniform Resource Locator or you may say URL was created and the creator of this type was Tim Berners-Lee along with the coordination of “Internet Engineering Task Force” which is recognized being a working group of URI. Syntax of file path used in Unix, is actually used being the URL format in World Wide Web as forward slashes in Unix operating system are actually utilized to separate or differentiate folders or you may directories as well as resource names and files.
Sunday, December 5, 2010
Jonathan James HACKER
Hi All,
guess who is this guy ?
He is Jonathan James born in 1983 December 12 turned out to be the worlds most threatening and biggest hacker.James at the age of 16 hacked in to the Defense Threat Reduction Agency (DTRA).Jonathan James also hacked in to the NASA systems and stole software worth $1.7 million.
He lived for a very short period of life and he died at the age of 24. The exact reason for his death is not revealed but according to the sources it seems that he committed suicide.He is termed to be the Worlds best since in a very short span of his life he cracked down all the high profile organizations security including that of NASA.WORLDS TOP SECOND HACKER OF ALL TIME.
THANK U ...............
guess who is this guy ?
He is Jonathan James born in 1983 December 12 turned out to be the worlds most threatening and biggest hacker.James at the age of 16 hacked in to the Defense Threat Reduction Agency (DTRA).Jonathan James also hacked in to the NASA systems and stole software worth $1.7 million.
He lived for a very short period of life and he died at the age of 24. The exact reason for his death is not revealed but according to the sources it seems that he committed suicide.He is termed to be the Worlds best since in a very short span of his life he cracked down all the high profile organizations security including that of NASA.WORLDS TOP SECOND HACKER OF ALL TIME.
THANK U ...............
FILE SYSTEM
Hi All,
Most of the people heared about file systems .so now i am showing some thing about this filesystem....
The method for storing and retrieving files on a disk. It is system software that takes commands from the operating system to read
and write the disk clusters (groups of sectors). The file system manages a folder/directory structure, which provides an index to the files,
and it defines the syntax used to access them (how the "path" to the file is coded). File systems dictate how files are named as well as the
maximum size of a file or volume.
There are numerous file systems in use; for example, FAT32 and NTFS are Windows file systems, and HFS(Hierarchical File System) is used on Macs. Linux uses ext2, ext3,ext4 and FAT32.
Unix systems use UFS, ext2, ext3,ext4 and ZFS. See cluster, path, FAT32, NTFS, HFS, NFS, UFS, ext, ZFS and hierarchical file system.
A data processing application that manages individual files. It opens, closes, reads and writes the file as a single entity. In a file system,
files are related to each other by customized programming (customers to orders, vendors to purchases, etc.). Contrast with a "relational database,
"which has built-in constructs that can more easily form these relationships. For example, they can be used to join files together and split them apart,
all without tedious programming. See relational database and DBMS.
WINDOWS :FAT16,FAT32,NTFS FILE SYSTEM
LINUX :EXT2,EXT3 AND LATEST ONE IS EXT4 FILE SYSTEM(MAC OS ALSO )
UNIX :UFS,EXT,ZFS.
THANK U...................
Most of the people heared about file systems .so now i am showing some thing about this filesystem....
The method for storing and retrieving files on a disk. It is system software that takes commands from the operating system to read
and write the disk clusters (groups of sectors). The file system manages a folder/directory structure, which provides an index to the files,
and it defines the syntax used to access them (how the "path" to the file is coded). File systems dictate how files are named as well as the
maximum size of a file or volume.
There are numerous file systems in use; for example, FAT32 and NTFS are Windows file systems, and HFS(Hierarchical File System) is used on Macs. Linux uses ext2, ext3,ext4 and FAT32.
Unix systems use UFS, ext2, ext3,ext4 and ZFS. See cluster, path, FAT32, NTFS, HFS, NFS, UFS, ext, ZFS and hierarchical file system.
A data processing application that manages individual files. It opens, closes, reads and writes the file as a single entity. In a file system,
files are related to each other by customized programming (customers to orders, vendors to purchases, etc.). Contrast with a "relational database,
"which has built-in constructs that can more easily form these relationships. For example, they can be used to join files together and split them apart,
all without tedious programming. See relational database and DBMS.
WINDOWS :FAT16,FAT32,NTFS FILE SYSTEM
LINUX :EXT2,EXT3 AND LATEST ONE IS EXT4 FILE SYSTEM(MAC OS ALSO )
UNIX :UFS,EXT,ZFS.
THANK U...................
Saturday, December 4, 2010
What to Do when Ur Orkut is Hacked!
Hi All,
It can be a nightmare if someone else takes control of your Google Account because all your Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even Google Checkout are tied to the same account.
Here are some options suggested by Google Support when you forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:
Here are some options suggested by Google Support when you forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:
1. Reset Your Google Account Password:
Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotPasswd - you will receive an email at your secondary email address with a link to reset your Google Account Password.
This will not work if the other person has changed your secondary email address or if you no longer have access to that address.
2. For Google Accounts Associated with Gmail:
If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.
3. For Hijacked Google Accounts Not Linked to Gmail:
If your Google Account doesn’t use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original “Google Email Verification” message.
It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.
Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotPasswd - you will receive an email at your secondary email address with a link to reset your Google Account Password.
This will not work if the other person has changed your secondary email address or if you no longer have access to that address.
2. For Google Accounts Associated with Gmail:
If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.
3. For Hijacked Google Accounts Not Linked to Gmail:
If your Google Account doesn’t use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original “Google Email Verification” message.
It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.
thank u ..........
shut down friend computer
Hi All,
Convey your friend a little message and shut down his / her computer:
Type :
@echo off
msg * I don't like you
shutdown -c "Error! You are too ******!" -s
Save it as "Anything.BAT" in All Files and send it.
Convey your friend a little message and shut down his / her computer:
Type :
@echo off
msg * I don't like you
shutdown -c "Error! You are too ******!" -s
Save it as "Anything.BAT" in All Files and send it.
Thursday, December 2, 2010
TEXT MOVING WITH CURSOR
Hi All,
Now i am going to show you some script which moves text with cursor in web page place this code after <head> tag .
<script language="javascript">
// ENTER TEXT BELOW. CAN *NOT* INCLUDE NORMAL HTML CODE.
var text='WELCOME TO MY BLOG(write your text here)';
var delay=30; // SPEED OF TRAIL
var Xoff=0; // PIXEL COUNT FROM THE LEFT OF THE CURSOR (- VALUES GO TO LEFT)
var Yoff=-40; // PIXEL COUNT FROM THE TOP OF THE CURSOR (- VALUES GO UP)
var txtw=30; // AMOUNT OF PIXEL SPACE EACH CHARACTER OCCUPIES
var beghtml='<font color="#09FF00"><FONT SIZE=4><b>'; // OPTIONAL HTML CODE THAT EFFECTS WHOLE TEXT STRING SUCH AS FONT COLOR, SIZE, ETC.
var endhtml='</b></font>'; // END HTML CODE. MOSTLY USED IF ABOVE SETTING IS USED.
//********** NO NEED TO EDIT BELOW HERE **********\\
ns4 = (navigator.appName.indexOf("Netscape")>=0 && document.layers)? true : false;
ie4 = (document.all && !document.getElementById)? true : false;
ie5 = (document.all && document.getElementById)? true : false;
ns6 = (document.getElementById && navigator.appName.indexOf("Netscape")>=0 )? true: false;
var txtA=new Array();
text=text.split('');
var x1=0;
var y1=-1000;
var t='';
for(i=1;i<=text.length;i++){
t+=(ns4)? '<layer name="txt'+i+'" top="-100" left="0" width="'+txtw+'" height="1">' : '<div id="txt'+i+'" style="position:absolute; top:-100px; left:0px; height:1px; width:'+txtw+'; visibility:visible;">';
t+=beghtml+text[i-1]+endhtml;
t+=(ns4)? '</layer>' : '</div>';
}
document.write(t);
function moveid(id,x,y){
if(ns4)id.moveTo(x,y);
else{
id.style.left=x+'px';
id.style.top=y+'px';
}}
function animate(evt){
x1=Xoff+((ie4||ie5)?event.clientX+document.body.scrollLeft:evt.pageX);
y1=Yoff+((ie4||ie5)?event.clientY+document.body.scrollTop:evt.pageY);
}
function getidleft(id){
if(ns4)return id.left;
else return parseInt(id.style.left);
}
function getidtop(id){
if(ns4)return id.top;
else return parseInt(id.style.top);
}
function getwindowwidth(){
if(ie4||ie5)return document.body.clientWidth+document.body.scrollLeft;
else return window.innerWidth+pageXOffset;
}
function movetxts(){
for(i=text.length;i>1;i=i-1){
if(getidleft(txtA[i-1])+txtw*2>=getwindowwidth()){
moveid(txtA[i-1],0,-1000);
moveid(txtA[i],0,-1000);
}else moveid(txtA[i], getidleft(txtA[i-1])+txtw, getidtop(txtA[i-1]));
}
moveid(txtA[1],x1,y1);
}
window.onload=function(){
for(i=1;i<=text.length;i++)txtA[i]=(ns4)?document.layers['txt'+i]:(ie4)?document.all['txt'+i]:document.getElementById('txt'+i);
if(ns4)document.captureEvents(Event.MOUSEMOVE);
document.onmousemove=animate;
setInterval('movetxts()',delay);
}
</script>
Now i am going to show you some script which moves text with cursor in web page place this code after <head> tag .
source code:
// ENTER TEXT BELOW. CAN *NOT* INCLUDE NORMAL HTML CODE.
var text='WELCOME TO MY BLOG(write your text here)';
var delay=30; // SPEED OF TRAIL
var Xoff=0; // PIXEL COUNT FROM THE LEFT OF THE CURSOR (- VALUES GO TO LEFT)
var Yoff=-40; // PIXEL COUNT FROM THE TOP OF THE CURSOR (- VALUES GO UP)
var txtw=30; // AMOUNT OF PIXEL SPACE EACH CHARACTER OCCUPIES
var beghtml='<font color="#09FF00"><FONT SIZE=4><b>'; // OPTIONAL HTML CODE THAT EFFECTS WHOLE TEXT STRING SUCH AS FONT COLOR, SIZE, ETC.
var endhtml='</b></font>'; // END HTML CODE. MOSTLY USED IF ABOVE SETTING IS USED.
//********** NO NEED TO EDIT BELOW HERE **********\\
ns4 = (navigator.appName.indexOf("Netscape")>=0 && document.layers)? true : false;
ie4 = (document.all && !document.getElementById)? true : false;
ie5 = (document.all && document.getElementById)? true : false;
ns6 = (document.getElementById && navigator.appName.indexOf("Netscape")>=0 )? true: false;
var txtA=new Array();
text=text.split('');
var x1=0;
var y1=-1000;
var t='';
for(i=1;i<=text.length;i++){
t+=(ns4)? '<layer name="txt'+i+'" top="-100" left="0" width="'+txtw+'" height="1">' : '<div id="txt'+i+'" style="position:absolute; top:-100px; left:0px; height:1px; width:'+txtw+'; visibility:visible;">';
t+=beghtml+text[i-1]+endhtml;
t+=(ns4)? '</layer>' : '</div>';
}
document.write(t);
function moveid(id,x,y){
if(ns4)id.moveTo(x,y);
else{
id.style.left=x+'px';
id.style.top=y+'px';
}}
function animate(evt){
x1=Xoff+((ie4||ie5)?event.clientX+document.body.scrollLeft:evt.pageX);
y1=Yoff+((ie4||ie5)?event.clientY+document.body.scrollTop:evt.pageY);
}
function getidleft(id){
if(ns4)return id.left;
else return parseInt(id.style.left);
}
function getidtop(id){
if(ns4)return id.top;
else return parseInt(id.style.top);
}
function getwindowwidth(){
if(ie4||ie5)return document.body.clientWidth+document.body.scrollLeft;
else return window.innerWidth+pageXOffset;
}
function movetxts(){
for(i=text.length;i>1;i=i-1){
if(getidleft(txtA[i-1])+txtw*2>=getwindowwidth()){
moveid(txtA[i-1],0,-1000);
moveid(txtA[i],0,-1000);
}else moveid(txtA[i], getidleft(txtA[i-1])+txtw, getidtop(txtA[i-1]));
}
moveid(txtA[1],x1,y1);
}
window.onload=function(){
for(i=1;i<=text.length;i++)txtA[i]=(ns4)?document.layers['txt'+i]:(ie4)?document.all['txt'+i]:document.getElementById('txt'+i);
if(ns4)document.captureEvents(Event.MOUSEMOVE);
document.onmousemove=animate;
setInterval('movetxts()',delay);
}
</script>
Notepad ++ 5.8.5
Hi All,
Notepad ++ 5.8.5
Notepad++ is a free source code editor and Notepad replacement that supports several languages. Running in the MS Windows environment, its use is governed by GPL Licence.
Based on a powerful editing component Scintilla, Notepad++ is written in C++ and uses pure Win32 API and STL which ensures a higher execution speed and smaller program size. By optimizing as many routines as possible without losing user friendliness, Notepad++ is trying to reduce the world carbon dioxide emissions. When using less CPU power, the PC can throttle down and reduce power consumption, resulting in a greener environment.
Based on a powerful editing component Scintilla, Notepad++ is written in C++ and uses pure Win32 API and STL which ensures a higher execution speed and smaller program size. By optimizing as many routines as possible without losing user friendliness, Notepad++ is trying to reduce the world carbon dioxide emissions. When using less CPU power, the PC can throttle down and reduce power consumption, resulting in a greener environment.
- Syntax Highlighting and Syntax Folding
- WYSIWYG
- User Defined Syntax Highlighting
- Auto-completion
- Multi-Document
- Multi-View
- Regular Expression Search/Replace supported
- Full Drag 'N' Drop supported
- Dynamic position of Views
- File Status Auto-detection
- Zoom in and zoom out
- Multi-Language environment supported
- Bookmark
- Brace and Indent guideline Highlighting
- Macro recording and playback
Subscribe to:
Posts (Atom)
Popular Posts
-
H i All, In comparison to the logical structure, which performs administrative tasks, the Active Directory physical structure checks when ...
-
Hi All, guess who is this guy ? He is Jonathan James born in 1983 December 12 turned out to be the worlds most threatening and biggest...
-
Hi All, Most of the hackers are using this tool for finding vulnerablities in the network.Mostly the penetrating tester are using this t...
-
Hi All, HACK your friend's keyboard and make him type "You are a FOOL" simultaneously: First open a note pad and copy the ...
-
Hi All, Want to have a look at the tools which Jester (the one who did a Ddos distributed denial of service) attack against Wikileaks ? j...
-
Hi All, If you are using Internet Explorer, Outlook or any Application, you can get Dr .Watson Postmortem Debugger error. You can also obse...
-
Hi All, In computer storage devices are devided in to 2 types . Those are 1. primary storage devices . 2. secondary storage devices. ...
-
Hi All, Navigating Google search results with keyboard keys is a long awaited feature. Shortcuts will save your time and speed up your wo...
-
Hi All, This list offers hundreds of operating system product and project names, many of them are based on the same operating system more ...
Followers
Disclaimer
All Data and Information Provided on This BLOG is only for Education purposes only.If you done any thing else these in real time the blog is not Responsible.Try all those on your own risk.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.