July 22, 2012

infotoall: CONTROLLING THE MOUSE WITH YOUR EYE

infotoall: CONTROLLING THE MOUSE WITH YOUR EYE: Most of the user of the computer suffer pain in the wrist or in fingers due to over usage of pc or laptops by infront of them whole day b...

infotoall: MODEM

infotoall: MODEM: The main function of modem is to convert the digital to analog signal(modulation) and analog to digital signal (demodulation) for the c...

CONTROLLING THE MOUSE WITH YOUR EYE


Most of the user of the computer suffer pain in the wrist or in fingers due to over usage of pc or laptops by infront of them whole day by typing and moving the mouse. Due to this some of the user gets muscular pain etc. The research scholars of imperial college in London have found out a solution to this problem that is controlling the mouse with your eye.
                             A small device is used for this purpose which is called as GT3D device. This device consists of a pair of glasses (like the coolers) that user must wear when you need to move the mouse with eye. And also two fast control cameras are used to keep track of your eye. The camera constantly records the movement of the pupil and moves the cursor to the direction where it points to. This device is on the development stage so the scholars demonstrated the effective usage of the device by a pong game. They also demonstrated how the surfing in net could be done using this system. The previous version devices of GT3D has some disadvantage such as you need to look on an icon for a prolonged period of time inorder to open the application of the icon, due to this when you stare on the desktop screen for some time then this automatically opens. Inorder to avoid this problem  GT3D device is sensitive so that just a look at that opens the application and they have attached the 3d facility so that the camera could detect whether your are just looking simply on desktop screen  or the user  need to open the application. The cost of this GT3D device is much cheaper (40$) than the other system input that we use.



MODEM


The main function of modem is to convert the digital to analog signal(modulation) and analog to digital signal (demodulation) for the communication between the server that provides the internet and the computer which uses those data. Modem stands for modulation and demodulation.


TYPES OF MODEM :
External Modem: This is a modem separated from the system unit in the computer case. It is connected to the serial port of the computer by means of a cable. It is connected to the telephone  jack by another cable.
Internal Modem: An internal modem is a circuit board that can be added to the system.
Standard Modems: Most modems used today are  standard modems. These modems are usually operated by commands entered from a  keyboard. Users control the functions a modem through the keyboard. Modems may use different command languages to control their functions, but most modems (called "Hayes compatible") use a popular language developed by a company "Hayes Microcomputer Products, Inc." The command ATDSX4, for example, indicates that pay attention (AT), dial stored telephone number (DS), and then display the progress of the call (X4).
Intelligent Modems: Intelligent modems are also called advanced modems. These modems can accept new instructions and then respond to the commands while transmitting data and information. These can be done by microprocessor chips and internal read only memory (ROM) contained in the modem. Of course, these modems are more expensive.
Short-Haul Modems: Short- haul modems are devices that transmit signals through the cable . They are also are called modem eliminators, because they do not require an external power source. They are also called line drivers that can send data for a distance of more than one mile. This type of modem can be used within or across several buildings in a company or a university campus.
Wireless Modems: Wireless modems transmit the data signals through the air instead of by using a cable. They sometimes are called a radiofrequency modem. This type of modem is designed to work with wireless local area networks namely wifi.
Even in the cell phone that we use today has modem the modems are used for surfing in the internet etc.This modems also does the same work of modulation and demodulation but the circuit of this modem is much smaller than the normal modem

June 04, 2012

TAJMAHAL IS NOT BUILD BY SHAJAGAN



                   The most majestic building of the India is the tajmahal. It is a symbol of love for the lovers and a historical monument in the Indian histoy.The history says that it was built by  Shah Jahan  for his lovely wife mum taj as a token of love. The taj may be remodeled by Shah Jahan or Shah Jahan may have changed the history to his way but the fact is that it was designed and built by someone else.                                                                                                                            
The reasons why the Tajmahal was not build by  Shah Jahan  are
1.At the top of the Tajmahal there is a home sign(kalash) .The kalash are mostly build in Hindu temple and it is made up of yempon(that is made up of 5 metals namely gold ,silver bronze and two other metals .This kalash  are built so that it can hold the earth’s magnetic field. In the tajmahal kalash you could see a kumbam (the pot that consist of coconut at the top of the pot), this are mostly used by Hindus in their marriages as a sign of good hopes for the Hindus. Then why is this  kalash and kumba in the tajmahal. This arise  slight drought in our mind that who built taj.
 2.There is a well inside the tajmahal. What is the need for the well inside tajmahal ? If the well is for their personal use there is the river to their reach so they could have done some other way instead of well. Actually in  Hindu temple they build well  for drawing water for their spiritual activities since the river water is not holly for their  divine act to their god.

3.In the book “a real story of tajmahal” it is said that the taj was an ancient temple and shajagan harassed the people and remodel the temple as tomb for his wife. 
4. During the Mughal Empire some of the English writer wrote about the Indian culture heritage and monuments but they did not write about the   Tajmahal which plays an important role in the history of India .Only the Indian writers who were under the influence of shajagan only wrote about the Tajmahal. Why was it so.
  5.The OM sign are used  by Hindus in the starting a new work as the symbol of good hope and they believe that all the activities will be done successfully. So what is the need of the OM sign in the tajmahal.

6.When we look into the Muslims history they did not name any monuments as mahal except the Tajmahal. Then why did  Shah Jahan named it so?
7.Actually the tajmahal was anciently named as Tejamahal,Teja refer to the light of the world but later it may have been changed as Tajmahal.
This report  justifies that the tajmahal was not build by  Shah Jahan  But this monument is a great  treasure to India .

May 28, 2012

ALL ENGINEERS MUST SEE THIS

             Most of the engineering collage in tamil nadu send their students out of the collage or they torcher  them to study by keeping special class till 8am to 6pm.If this continue in  our contry then most of the people will be affected mentally and they will be depressed.The eng students are not treated properly and the collage tells them to be just a book warm.Then how will our country get technically skilled professional.So our govt must concern this as a serious issue and take steps .Other ways our country future is in threat

May 21, 2012

20 GOOGLE SECRETS

Google is clearly the best general-purpose search engine on the Web.But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.


But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.



Syntax Search Tricks



Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at



www.google.com/help/operators.html



. Here are some advanced operators that can help narrow down your search results.



Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.



Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as



www.mysite.com/index.html



, you can enter intext:html.



Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in



link:http://www.pcmag.com





Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment with mixing various elements; you'll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.



Swiss Army Google



Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature



(www.google.com/help/features.html#calculator)



lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer to life the universe and everything."



Let Google help you figure out whether you've got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try "thre blund mise") and Google may suggest a proper spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you're searching for "three blind mice," underneath the search window will appear a statement such as Searched the web for "three blind mice.") You'll discover that you can click on each word in your search phrase and get a definition from a dictionary.



Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you'll see it at the top of the search results along with a map link to the address. If you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you'd rather use a search form for business phone listings, try Yellow Search



(www.buzztoolbox.com/google/yellowsearch.shtml).









Extended Googling



Google offers several services that give you a head start in focusing your search. Google Groups



(http://groups.google.com)



indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle

CODE

(http://froogle.google.com),



which indexes products from online stores, and Google Catalogs

CODE

(http://catalogs.google.com),



which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google's tools and services at



www.google.com/options/index.html



You're probably used to using Google in your browser. But have you ever thought of using Google outside your browser?



Google Alert



(www.googlealert.com)



monitors your search terms and e-mails you information about new additions to Google's Web index. (Google Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're more interested in news stories than general Web content, check out the beta version of Google News Alerts



(www.google.com/newsalerts).



This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)



Google on the telephone? Yup. This service is brought to you by the folks at Google Labs



(http://labs.google.com),



a place for experimental Google ideas and features (which may come and go, so what's there at this writing might not be there when you decide to check it out). With Google Voice Search



(http://labs1.google.com/gvs.html),



you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent success.



In 2002, Google released the Google API (application programming interface), a way for programmers to access Google's search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you'll need an API key, which is available free from

CODE

www.google.com/apis



. See the figures for two more examples, and visit



www.pcmag.com/solutions



for more.



Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.





Online Extra: More Google Tips





Here are a few more clever ways to tweak your Google searches.



Search Within a Timeframe



Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as



CODE

http://aa.usno.navy.mil/data/docs/JulianDate.html



excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif





), but an easier way is to do a Google daterange: search by filling in a form at



www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml



. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

May 15, 2012

ARCHITECTURE AND WORKING OF ANTIVIRUS


Antivirus is one of the inevitable part of a system, whether at home, office or even on gadgets, the prime concern is that of security of the device, system. But have you ever wondered that how the Antivirus works? In this resource we are having a detailed discussion on the Antivirus Architecture, as well as the algorithms which they follow.

Architecture of an Antivirus Engine

The antivirus engine has a very interesting layeral architecture. There are around five layers; each has its own specialty as well as the functionality attached to it. The first one is the User Interface layer which has the functionality of enabling the interface. The second layer is of the Engine Core, which follows a particular algorithm. The third layer contains File System Interface, File Type Scanner, Memory scanner, Decompression and code emulator. The last but not the least layer is the Hardware.

Working of an Antivirus Engine


Whenever we attach any external drive into our system, the very first step we perform is the security of the system. We try to scan the drive, which so ever is attached by using antivirus we have installed on our system.

1. In order to understand how antivirus engine works, it is very necessary to understand the basic architecture and details so that when the one runs on the system, each and every detail can be analyzed.

2. It is not so evident that every time we have a new version of a particular Antivirus engine, then the core is made from the scratch, it is sometimes revised from the earlier one, so the load is minimized.

3. The antivirus engine contains an Engine core, the second layer is dedicated to the file system interface, scanner and emulators.

4. The engine core has the functionality to intact the entire software together. In order words it acts as a sticky substance which is ready to call the desired module, when required.

5. The basic requirement is to have a scan engine, some prefer to have third party scan engines and it is very clear that they are not considered as part of the framework.

6. But some of the most popular and genuine used software's have their own scan engines. The Scanner used in these scan engines are their own scanner.

7. There are generally two scanning algorithms, one is a heuristic based and other is signature. The scan string based technologies search in the given file and looks for a particular matching string.

8. When the scanner founds the already defined or predefined strings then the necessary actions are performed by the engine.

9. When following heuristic based scanning algorithms, the string is not looked but we look for certain instruction or commands in the files.

10. In order to understand better, when certain codes is encrypted then we tend to find decryption code, instructions by following the heuristic scanning algorithms.

11. So when we select a particular file or folder, then it passes through number of steps, which includes submitting a file to scan engines, scanning based on algorithms and then appropriate actions are performed.

12. The processing of file is one of the most important phase of any antivirus engine. We have certain modules which are designed appropriately.

13. The Random Access Memory is generally accessed by the scanning blocks, there are memory scanners which perform the appropriate actions on the memory.

14. We have emulators and its function is similar to any other emulator. It creates its own virtual environment. There are several benefits of having an emulator attached to it.

15. The emulator has the ability to determine which action will be performed and what effect can be there on the whole system, if the malware is allowed to run.

16. Another important module which runs after a particular time interval and acts is the update module. Every day new definitions are created and that has to be added in the database as well.





May 14, 2012

HIDE A FOLDER WITHOUT THE CMD


Step 1 : Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}
For eg,
If u’ve a folder with name “Anything”
press F2,
then type, “Anything.{645FF040-5081-101B-9F08-00AA002F954E}”
and Press Enter.
Step 2 : To get back to its original form,
Make a new batch file with any name and type
“ren Anything.{645FF040-5081-101B-9F08-00AA002F954E} Anything” .

May 13, 2012

trendsetter:
2 Sides of INDIAN Cyber Law or IT Act of INDIA
 C...
: 2 Sides of INDIAN Cyber Law or IT Act of INDIA   Cyber laws are meant to set the definite pattern, some rules and guidelines that defin...