Saturday, May 31, 2008

IP Multicast with Applications to IPTV and Mobile DVB-H


Get a clear picture of IP Multicast applications for delivering commercial high-quality video services.This book provides a concise guide to current IP Multicast technology and its applications, with a focus on IP-based Television (IPTV) and Digital Video Broadcast-Handheld (DVB-H) applications-areas of tremendous commercial interest. Traditional phone companies can use IP Multicast technology to deliver video services over their networks; cell phone companies can use it to stream video to handheld phones and PDAs; and many cable TV companies are considering upgrading to IP technology. In addition to applications in industries seeking to provide high-quality digital video and audio, there are numerous other practical uses: multi-site corporate videoconferencing; broad distribution of financial data, stock quotes, and news bulletins; database replication; software distribution; and content caching (for example, Web site caching).

Thursday, May 29, 2008

Photoshop Video Tutorial - Smart Filter



Photoshop video tutorial smart sharpen focus contrast photograph. For years we've been using the same old filters inside of Photoshop, then with the...

Download Link:
Shareonall

The Art of Bird Photography II


With more than 15,000 of his stunning photographs published in natural history books, magazines, and calendars all over the globe, Arthur Morris is widely recognized as the world's premier bird photographer. His imagesare noted for both their artistic design and their technical excellence. One chapter covers all aspects of Digital Photography and includes a section on understanding histograms. It also includes Artie's digital workflow along with tons of great Photoshop tips. Other chapters include "Equipment; What's New?," "Advanced Composition and Image Design," "It Ain't Just Birds," "Exposure and Flash Simplified," and "Advanced Sharpness Techniques & Creating Pleasing Blurs." The "Practicalities" chapter includes a detailed section on setting up your backyard for bird photography as well as sections on photographing on safari and on the tundra.

Download Link:
Rapidshare_Part_1 / Rapidshare_Part_2
or

Wednesday, May 28, 2008

A Companion to Film Theory


This volume of specially commissioned work by experts in the field of film studies provides a comprehensive overview of the field. Its international and interdisciplinary approach will have a broad appeal to those interested in this multifaceted subject.

Download Link:
Rapidshare or Depositfiles or Easy-Share

Lynda.com - AutoCAD 2008 Essential Training


AutoCAD is a computer-aided drafting and design program that is the industry standard for a wide variety of 2D and 3D work. AutoCAD 2008 features several improvements over previous versions, but the core functionality and workflows have remained consistent for years. Users who have any of the more recent editions of the software will find AutoCAD 2008 Essential Training to be a valuable resource. Instructor Jeff Bartels has taught and used AutoCAD for a decade, and in this course he focuses on the difficult to master concepts that matter most to professional AutoCAD users. Exercise files accompany the course.


Password: ifyoulikeitbuyit

Network Programming for MS Windows


This updated edition provides the latest information about how to write applications that take advantage of the advanced networking protocols and technologies that Microsoft Windows XP supports-Internet Protocol (IP) versions 4 and 6, Pragmatic General Multicasting (PGM) protocol, Internet Group Management Protocol 3 (IGMPv3), IPv6 multicasting, the Network Location Awareness (NLA) namespace provider, the Winsock Provider Interface, 64-bit Winsock APIs, and .NET Sockets. The book includes code samples in the Microsoft Visual Basic, Microsoft Visual C++, and Microsoft Visual C# development systems.

Download Link:
Easy-Share

Short-Range Wireless Communications


Wireless communications is perhaps best known by its "long-range" applications, such as cellular and satellite communications. Perhaps the greatest growth ahead for wireless markets, however, lies in "short-range" applications, such as in RF identification (RFID), wireless local-area networks (WLANs), and Bluetooth personal wireless connectivity. Short-range Wireless Communication is an excellent introduction to some of these short-range wireless technologies, especially for engineering managers and marketing professionals who may not be well-versed in the terminology and technology of wireless communications.

Download Link:
Easy-Share

Speed Up Login Process on XP


Before applying this below tweak, pls run ur normal xp loading and measure the time by using a stopwatch, see how fast u can get to to desktop after reboot.

Then apply the following tweak,

After applying,measure the new time again using ur stopwatch. If got improvements then voila tweak:

If you don't need to utilize Group Policies on the local machine, you can disable parts of it. This will dramatically speed up the login process.

1]. Login as Administrator.

2]. Go to Start/Run type in gpedit.msc and click ok.

3]. Right click on the Local Computer Policy entry and select Properties from the menu that appears.

4]. Add checkmarks to the two options within the Disable section. Close out

5]. Reboot.

Digital Photography Bible


Packed with savvy tips, tricks, and techniques as well as up-to-date coverage of digital cameras, scanners, and image-processing software, this comprehensive guide shows you how to make the most of digital photography, whether you're a professional photographer, serious amateur, or graphic artist.

Download Link:
Easy-Share

Tuesday, May 27, 2008

Video2Brain - Adobe Flash CS3 Grundlagen


Dieses Video-Training fuehrt Flash-Einsteiger Schritt fuer Schritt an die neue Flash-Version heran. Dabei bekommen Sie das noetige Know-how, um Projekte vom kleinen Flash-Banner bis zu interaktiven Navigationsstrukturen umzusetzen. Vom Erstellen von Grafiken, Animationen und Schaltflaechen bis hin zum Einbinden verschiedener Medien reicht dabei die umfangreiche Palette an ansprechenden Praxis-Beispielen fuer Einsteiger und erfahrene Anwender.

Ninja Mind Control


The true warrior-mystic prevails without unsheathing his weapon. He is the master of the bloodless coup. With his mental and physical dexterity, he evades and confuses the enemy into submission. Ashida Kim reveals here the meditation, breathing exercises and Kuji-Kiri hand forms that will enable you to cultivate and direct your Qi, the vital life force, as well as tune into the minds of others. Through mind reading, subtle manipulations, hypnosis, and power of suggestion, you too can become a true mystic-warrior who can control the outcome of every encounter.

Download Link:
Easy-Share

Monday, May 26, 2008

What is a core.dmp in UNIX?


  • While I'm not familiar with any Unix OS that creates files named core.dmp (Unix systems do not typically use 3 letter suffixes), I can speak to the file commonly called just "core". This file gets created when an application performs an illegal activity, such as referencing an address outside its address space or dividing by zero. Illegal activities result in a synchronous signal being sent to the offending process. Unless handled, the typical result is for an image of the process to be saved to the file called "core". Tools such as "gdb" or "adb" can be used to examine the core file in order to determine what the process was doing that caused it to receive the signal. However, unless the process was compiled with debug information (e.g., -g) and linked with symbols intact, there's precious little that can be deduced. If the process has no symbols nor debug information, the simplest thing to do is to use the "file" command: file core in order to view an abbreviated description (name of the process and the signal that terminated the process).
  • CORE DUMP are images of application failure messages during there execution in LINUX/UNIX they give little clue about what happened to that particular application while run. Cause of application failure may be anything e.g. memory violation, not enough memory or anything that makes an application to stop run. For further refrences please refer to the System Administration Handbook on LINUX that comes from different writers but one that I have read is by Nemeith .

The A to Z of Correct English


Designed to help resolve most common English language problems and queries, this book has an accessible reference format with examples and explanations of mistakes regarding sentence construction, spelling, punctuation and grammar.

Download Link:
Easy-Share

Jazzmatazz Vol. 1


Track List:
01. Introduction
02. Loungin'
03. When You're Near
04. Transit Ride
05. No Time to Play
06. Down the Backstreets
07. Respectful Dedications
08. Take a Look (At Yourself)
09. Trust Me
10. Slicker Than Most
11. Bien, le Mal
12. Sights in the City

Download Link:
Zshare

Sunday, May 25, 2008

Advanced 3D Planets Tutorial for After Effects


This tutorial is unlike any other 3D globe tutorial. Of course there are strong similarities like using CC Sphere, but this tutorial pushes this subject to it's limits. This subject is as old as the Earth itself. How to create 3D planets? Simple. Just apply CC Sphere onto a texture, right? Wrong! If you want to make it cool you need to do a couple other things as well, which I'm going to show you in this upcoming tutorial.

or

300 # 5


Betrayed, surrounded, outnumbered a hundred thousand to one, the Spartans make their last stand against the hordes of Xerxes. All hope is surely lost: only bloody death awaits them. Why, then, that wild, joyous light in the eyes of King Leonidas? What secret has he that makes him smile and speak so confidently of victory?

Download Link:
Rapidshare

Thursday, May 22, 2008

Mastering Oracle SQL


If you write programs to run against an Oracle database, you spend a lot of time and mental energy writing queries to return the data your programs need. Knowledge of SQL, and particularly of Oracle's implementation of SQL, is the key to writing good queries in a timely manner. In this book, the authors share their knowledge of Oracle SQL, and show you many creative techniques that you can use to advantage in your own applications.


Download Link:
Easy-Share

Wednesday, May 21, 2008

Chillin' Like a Smut Villain


Track List:
01. Where's the Party?
02. My Imagination
03. Me and My Monkey
04. If I Had
05. Way It Really Happened
06. Life Is
07. Chumpie on the Flip Side
08. Pump Ya Fist
09. Rumors
10. Call Me
11. My Imagination (Remix)

Download Link:
Zshare

Lynda.com - Dreamweaver CS3 with CSS Essential Training


Those who are new to CSS, or who want to create more efficient and powerful style sheets, will benefit from Dreamweaver CS3 with CSS Essential Training. Instructor James Williamson teaches the entire process of CSS management in Dreamweaver, following a step-by-step workflow. He covers XHTML/CSS fundamentals, and working with typography, navigation, background properties, layout, and multiple media types. This in-depth training explores the entire process of creating site-wide style sheets, from concept to deployment. Exercise files accompany the course.

Download Link:

or

Can you convert D drive from FAT32 to NTFS in Windows 98 OS?


You can not convert a FAT 32 drive to NTFS in windows 98 because windows 98 does not support it. You can however mount an existing NTFS drive in windows 98.

Windows Vista The Complete Reference


Filled with clear screenshots and detailed explanations, this guide will help you take full advantage of the high-performance features available in Microsoft Windows Vista and experience the power of this integrated, next-generation operating system. Take full advantage of the high-performance features available in Microsoft Windows Vista and experience the power of this integrated, next-generation operating system. Windows Vista: The Complete Reference shows you how to install and configure Windows Vista for optimal performance, customize the streamlined new desktop, display sidebars and gadgets, and enjoy all the entertainment capabilities, including music, movies, and games.

Download Link:
Rapidshare

Cybersecurity Operations Handbook


Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements.

Download Link:
Rapidshare

Monday, May 19, 2008

Video Logo Tutorials - Part 3


I have only had time to watch a few so far but all in all they provide very accurate and good information. It's very straight forward, you get to follow along and recreate these logos and in the end, you're amazed at how great they look. The valuable part though is the confidence you gain in learning how a professional actually designs logos. I had to design a logo for a school play and everything I came up with looked bad. I did a search on google to find logo tutorials and I came across Gary's page. At first I was hesitant because it cost some $$ but there is nothing else out there that was free and could help me. So I paid up and it was not a regret! I never learned that much from a single tutorial, very worth the $. By the way, here's the logo I designed for the play...


or

Sunday, May 18, 2008

I Know How to Play 'Em!


Track List:
01. Intro
02. Sucker
03. Funky Payback
04. Catch 'Em Slippin
05. Playing It Cool
06. This is How It Should Be Done
07. Knowledge Is the Gift
08. Free World
09. 10 B. 3
10. Kick the Ballistics
11. Listen to the Drum
12. Power
13. "E"
14. Shout Outs
15. Aint We Funky

Download Link:
Zshare

Computer Science Illuminated


Using an onion as an analogy, this textbook for a CS-0 course walks through the function of each layer in a computer system. Dale (University of Texas) and Lewis (Villanova) describe the binary number system, the hardware components, the major programming languages, the operating system, software applications, and networks. Annotation c.

Download Link:
Rapidshare

Password: knowfree.net

Saturday, May 17, 2008

Visual Assist X 10.4.


Visual Assist X dramatically reduces application development time with key new features and improvements to existing features in Visual Studio. Develop new code faster with fewer errors. Quickly understand existing code. Refactor existing code making it easier to read and cheaper to maintain. Eliminate time spent searching by allowing instant navigation to any file, symbol or reference.

Download Link:
Shareonall

Is a DVD Driver the same thing as a DVD Decoder?


A dvd decoder is a software program. Even if you have a dvd rom you still need a decoder. Your operating system weather it be windows or linux or mac or whatever may have a built in dvd software decoder depending on the version and any updates you may have. With out the decoder program your OS cannot reconize the file format for a dvd. The decoder program is the link between the OS and the DVD ROM drive. IF you bought a new dvd drive it should have came with a decoder on a CD.

A DVD driver is also a program that enables communication between your PC & DVD Player/Burner. While the Decoder program enables your PC to recognize the files on your DVD.

Computer Security Basics, 2nd Edition


This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.

Download Link:
Rapidshare

Dirty Weaponry


Track List:
01. Galactics
02. Allah Sees Everything
03. 5 Stages of Consciousness
04. Unite to Fight
05. Murder Venues
06. Doomsday
07. Red Dawn
08. The Shoot Out
09. Bastard Swordsman
10. Last Poet
11. Serving Justice
12. Where I Rest At
13. Pain

Download Link:
Zshare

Internet Information Services IIS 7.0 Resource Kit



Get the definitive reference for deploying, configuring, and supporting IIS 7.0 with insights from a Microsoft Most Valuable Professional (MVP) and IIS experts at Microsoft. You get 800 pages of in-depth technical guidance on using IIS 7.0 to help enable users to easily host and manage Web sites, create Web-based business applications, and extend file, print, media, and communication services to the Web. This RESOURCE KIT covers IIS architecture, migrating servers and applications, capacity planning, performance monitoring and tuning, security, top administration and troubleshooting scenarios, and real-world best practices. Complete with scripts, tools, utilities, and an eBook on CD, this is the definitive resource for administering IIS 7.0.

Download Link:
Rapidshare

Windows Server 2008 TCP/IP Protocols and Services


This in-depth technical reference delivers must-know information on TCP/IP for any IT professional working with Windows Server 2008 and Windows Vista operating systems. This comprehensive guide starts with the fundamentals, delivering coverage of TCP/IP protocols layer by layer to help build mastery of protocols and their implementation. It focuses on Internet layer protocols such as IP, ICMP, IGMP, and includes a preview of IPv6; transport layer protocols such as TCP and UDP; and application layer protocols such as DNS, DHCP, and WINS. Written by a leading TCP/IP author, plus peer reviews from experts on the Windows® Networking Team, this is the definitive guide to TCP/IP for Windows Server 2008. Features a companion CD with a fully searchable eBook and other resources.

Download Link:
Rapidshare

Password: knowfree.net

Lynda.com - Excel 2007 Essential Training


Like the other applications in Microsoft Office 2007, Excel 2007 boasts upgraded features and a brand-new look. In Excel 2007 Essential Training , instructor Lorna A. Daly introduces the new version in detail. The training begins with the essentials of using the program, including how and why to use a spreadsheet, how to set up and modify worksheets, and how to import and export data. Lorna then moves on to teach more advanced features, such as working with functions and macros. Exercise files accompany the tutorials.

Download Link:
Rapidshare_Part_1 / Rapidshare_Part_2
Rapidshare_Part_3 / Rapidshare_Part_4
Rapidshare_Part_5

Thursday, May 15, 2008

Why your Computer Shutdown only 20 minutes after you Start it?


  • Your power supply is probably going bad. It gets hot and then shuts down. It might also be a bad power supply fan, that is the power supply might not be getting hot because of a problem with the power supply but because the fan isn't coolingit properly.

  • Another common cause for shutdowns is the CPU overheating. Check the fan to make sure it isn't spinning slow or seized, and that there is no dust in the heatsink. You can also check that the heatsink compound (the paste between the fan and heatsink) hasn't broken down.

Hacking MySpace


There are over 90 million profiles on MySpace. How do you make yours stand out? You use these programming tricks and techniques to tweak the look, feel, and content of your profile. You get the inside scoop on hot design and photography. You maximize the effects of HTML and CSS. And, if you happen to be a musician, you check out Chapter 30 to see how MySpace can launch your career. It's all in here. What are you waiting for? Make it all about you.

Download Link:
Rapidshare

Password: http://www.thesaltinez.com

The Big Picture


Track List:
01. Last Of The Mohicans
02. Marathon Man
03. Baby Freeze Queen
04. 40 Watt Solution
05. Glory Eyes
06. Monterrey Honey
07. AMPs Of Sugarland
08. Panama Slides
09. Pine Box Builder
10. Story Of Anna
11. Condo Lights
12. Ramon Finds Waterfalls
13. Waterfalls
14. Running Coyote Advances

Download Link:
Rapidshare

Sunday, May 11, 2008

Hardware Bible (6th Edition)


The Winn L. Rosch Hardware Bible is a handy guide to the components that make up IBM-standard personal computers, but it is beginning to show its age in its new fifth edition. As Rosch's fans have come to expect, the book includes lots of lists and tables that present troubleshooting information in an easily referenced format. Rosch knows his subject well. Unlike many of its competitors, this book devotes a fair amount of ink to discussions of software phenomena, such as image compression technologies. Some of the material seems a bit outdated, such as the section on "proprietary mice" that describes dedicated mouse ports as if they're something unusual. In the same vein, coverage of CD-ROM formats neglects any mention of the Joliet and El Torito standards, as if Yellow Book is new stuff. There's no mention of PC-100 RAM either, and the book gives almost as much space to monochrome cathode ray tubes as to emerging flat-screen technologies.

Download Link:
Rapidshare

Excel 2007 Dashboards and Reports for Dummies


What's the use of putting out reports that no one reads? Properly created dashboards are graphical representations that put data in a context for your audience, and they look really cool! How cool? You'll find out when you see the dazzling examples in Excel 2007 Dashboards & Reports For Dummies. And, before long, everyone's eyes will be riveted to your dashboards and reports too! This revolutionary guide shows you how to turn Excel into your own personal Business Intelligence tool. You'll learn the fundamentals of using Excel 2007 to go beyond simple tables to creating dashboard-studded reports that wow management. Get ready to catch dashboard fever as you find out how to use basic analysis techniques, build advanced dashboard components, implement advanced reporting techniques, and import external date into your Excel reports.

Download Link:
Rapidshare

Password: knowfree.net

How to Create Table in Word in just a second


To create a table in Ms Word you can use this shortcut!

Just type: +======+=====+====+===+==+=+

And simply hit ‘Enter’

You will see that the text changes to a table.

Here, the number '=' represent the number of characters in each cell.

Just it makes your work easy and fast.

Pinnacle Hollywood FX Pro 5.2


Experiment, create, and maintain total control over all of your 3D effectsPinnacle Edition, Pinnacle Studio and Pinnacle Liquid Systems users take unprecedented control of your 3D effects with Pinnacle Hollywood FX PRO version 5. Pinnacle Hollywood FX PRO version 5 is a powerful creative tool, consisting of more than 400 exciting 3D transitions, titles and animation effects that are easy to use and fully customizable. Extensively manipulate and control an effect's style, flight path and lighting all with a few simple mouse clicks. Go one step further and create your own unique effects using 3D objects, videos, and 3D text.

Download Link:
Rapidshare

Remember,
ALWAYS SCAN WITH ANTI-VIRUS BEFORE USING!!!

Saturday, May 10, 2008

Computer Security and Cryptography


This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems. The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.

Download Link:
Rapidshare

Password: www.itakate.net

Lynda com - Illustrator CS3 for the Web


It might seem counterintuitive to consider using Illustrator, the preeminent vector-based print design tool, for creating pixel-based graphics, but that's exactly what Mordy Golding does in Illustrator CS3 for the Web. He focuses on Illustrator's strengths alongside other tools in the web design workflow, exploring unique features such as object-based editing, and the ease of repurposing art for print and Flash use. This course requires familiarity with Illustrator CS3, and while it provides an introduction to Flash integration, the focus is on effectively turning vectors into pixels, whether for the web, mobile devices, or video. Exercise files accompany the course.

Vocabulary 4000 : The 4000 Words Essential for an Educated Vocabulary


English offers perhaps the richest vocabulary of all languages, in part because its words are culled from so many languages. It is a shame that we do not tap this rich source more often in our daily conversation to express ourselves more clearly and precisely. Many a vocabulary book lists esoteric words we quickly forget or feel self-conscious using. However, there is a bounty of choice words between the common and the esoteric that often seem be just on the tip of our tongue. Vocabulary 4000 brings these words to the fore.

Download Link:
Rapidshare

Password : knowfree.net

What is a POP Mail Server?


A Post Office Protocol (POP) mail server is a server that complies with the RFC standard 1939.

Here is a basic run down.

The Post Office Protocol - Version 3 (POP3) is intended to permit a workstation to dynamically access a maildrop on a server host in a useful fashion. Usually, this means that the POP3 protocol is used to allow a workstation to retrieve mail that the server is holding for it.

POP3 is not intended to provide extensive manipulation operations of mail on the server; normally, mail is downloaded and then deleted. A more advanced (and complex) protocol, IMAP4, is discussed in [RFC1730].

In Plain English:

A POP mail server (or simply "POP server") is the most common form of incoming email server. Basically, the POP server is what receives the email and is almost always used with an SMTP server, which is the outgoing server. The best way to find out the address of your POP server is to ask the company who is providing your email service. You will need to know this information if you are planning to set up an email client such as Thunderbird, Outlook, or Eudora to access your email.

Thursday, May 8, 2008

Ratatouille


Track List:
01. Le Festin
02. Welcome to Gusteau's
03. This Is Me
04. Granny Get Your Gun
05. 100 Rat Dash
06. Wall Rat
07. Cast of Cooks
08. A Real Gourmet Kitchen
09. Souped Up
10. Is It Soup Yet?
11. A New Deal
12. Remy Drives a Linguini

Download Link:
Rapidshare

The Marino Mission: One Girl, One Mission, One Thousand Words; 1,000 Need-to-Know


The Marino Mission: One Girl, One Mission, One Thousand Words; 1,000 Need-to-Know *SAT Vocabulary Words 1,000 SAT I vocabulary words in a teen-friendly page-turner. Say adios to the mind-numbing word lists found in most SAT prep guides: teens will lose themselves in the fast-paced drama of The Marino Mission and emerge with a superior vocabulary. Each year, more than 2 million students take the SAT I. Now, instead of poring over word lists, they'll encounter vocabulary in the context of a memorable novel a recipe for much better word retention on test day. One thousand of the most commonly tested vocabulary words are sprinkled through this action-packed story, which features an exotic Latin American locale, a teenage girl and boy, a tale of intrigue surrounding a missing baby dolphin and a brief definition of each vocabulary word, easily accessible at the bottom of the page on which each word appears. As an added test-prep bonus, the book includes vocabulary exercises at the back to help students master the words presented in the text.

Download Link:
Rapidshare

Password : knowfree.net

Wednesday, May 7, 2008

How to Enable/Disable Autorun


How do I stop windows from automatically searching for media when a new drive is plugged in? When I plug in an external USB drive, windows automatically begins cataloguing the media, and an annoying little window pops up. It gives me the option of cancelling the search, but I ususally can't click it in time.

Windows 95/98/Me

1] Access the System Properties Dialog. Using Control Panel: My Computer: Properties or Explorer: My Computer: Properties.
2] Select the Device Manager tab.
3] Select the CD-ROM folder.
4] Select the entry for your CD-ROM drive.
5] Select Properties.
6] Select the Settings tab.
7] Turn on or off the Auto insert notification option.
8] Select OK.
9] Select OK.

Windows NT/2000

1] Start RegEdit (regedt32.exe).
2] Go to HKEY_LOCAL_MACHINE/ System/ CurrentControlSet/ Services/ Cdrom.
3] Edit the Autorun value to '1' to enable autorn, and '0' to disable autorun.
4] Close RegEdit and restart your computer.

Windows XP

1] Open Windows Explorer by pressing the Windows + "e" key.
2] Right-click the desired CD-ROM and select Properties from the menu.
3] Select the AutoPlay tab.
4] Select each item from the pulldown list and for the Action to perform, select "Take no action" to disable autorun, or pick the apporpriate action to take if enabling autorun.
5] Select OK.

Removable Media

Autorun can be enabled or disabled for all Removable media types, such as a floppy or Zip disk. Windows systems are configured to enable CD Notification, other removable media are by default disabled.

The System Properties User interface only exposes the CD Enable or Disable selection. The setting reflected in this dialog makes an entry in the System Registry. It is in this same location that other media types are configured.

1] Modifiying the Registry is not for the inexperienced user. Anyone will tell you, be VERY careful.

2] The modifications made in this case use Hex not Decimal numbers. If you are unfamiliar with the Registry or the characteristics of base numbering and Hex, studying these topics prior to making these modifications is advisable.

3] To Modify these Registry Settings, Use Regedit and navigate to the following Key: HKEY_CURRENT_USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Policies\ Explorer\ "NoDriveTypeAutoRun"

The default value for the setting is 95 0 0 0. Change the first byte to 91. Restart the computer to make the new setting take effect. You may have to right-click on the floppy and choose AutoPlay from the menu to see the AutoPlay behavior.

Microsoft Computer Dictionary Fifth Edition


The Microsoft Computer Dictionary, Fifth Edition is designed to be a comprehensive and authoritative source of definitions for computer-related terms and abbreviations. The dictionary includes terms drawn from a wide variety of topics relevant to computer users, including software, hardware, networking, data storage, graphics, games, information processing, the Internet and the World Wide Web, gaming, history, jargon and slang, organizations, programming, and standards. Although this book covers nearly every aspect of computing, it does not include entries on most companies or on most makes and models of computers, nor does it contain entries on most application software products. The few exceptions to this rule of thumb are key companies and products that have a historical or universal importance within the computing industry.

Download Link:
Rapidshare

In terms of Security which is the best Operating System?


  • Mac OSX. Currently, there are over 100,000 viruses for Windows. There are ZERO for Mac. This is not because of the 5% market share we have, as commonly thought by the uninformed. Instead, it is because of Mac OSX's strong architecture. The OS (Operating System) is built to withstand hackers and viruses. In addition, Apple just released a new idea, named "File Vault" This offers 128-bit encryption for all your files in the home folder. Now, you are asking, "what does this mean and why should I care? 128-bit is the standard that the CIA uses in their encryption of files. If someone were to try to decode it, it would take them over 1 TRILLION years to get your password. I think, therefore, that it is safe to say that no one will get your stuff.
  • All UNIX (ex: Solaris,Linux) based system are secured systems since they dont use registry system like windows and no .exe file can run on unix based system and most of the virus spread through .exe files only. Lever of security provided by unix based system is very high compared to all other.
  • Linux/Unix is defiantly secure, as long as the user is competent in it's use and modification. Most people will find that Mac OSX is more their speed. It doesn't require nearly as much know how or computer experience, and is pretty effective.
  • Any OS linux/2003/Mac OSX is only as good as it's admin. It's just a matter of whether u have the time and know how to manage it properly. Personally I'd go Linux.

  • If you have low skills with computers, Macs are better for you. Linux can be the most secure but is better for users who know what they're doing.

  • In terms of security, ill have to say mac is the best. no virus protectors needed. Howeever, id still choose windows because most programs work best with it.

Total Training - Adobe Illustrator CS3 Advanced


Unlock the secrets of Adobe Illustrator CS3 as you learn advanced tricks and techniques in this video series. Showcasing his sense of design and creativity, your host, Geoff Blake teaches you how to make eye-popping special effects, and how to use modern techniques to produce startling results. Learn about Illustrator's advanced path manipulation commands, and how to use blends and clipping masks for amazing visual effects. You'll also learn about Live Paint, 3D techniques, templates, and Illustrator CS3's new Flash animation and export options.

Tuesday, May 6, 2008

Never Known Virus Trick


Open notepad and type this:-

lol=msgbox ("Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot",20,"Warning")

Or

lol=msgbox ("Warning a Trojan horse has been detected on your PC. Press YES to format your hard disk now or press NO to format format your hard disk after system reboot",20,"Warning")

Then save it as "Virus.vbs"

Run it {Note: This does not harm your computer as it does not contain virus}. Press yes or no button. The Yes and no button do not do anything except closing the window.

Put it in the startup folder of the victim's computer.

On startup the window should appear.

You can edit the sentence by replacing "Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot" with the message you want.

Oh in between make sure your victim does not panic and really reformat his hard disk.