infotoall
July 22, 2012
infotoall: CONTROLLING THE MOUSE WITH YOUR EYE
infotoall: CONTROLLING THE MOUSE WITH YOUR EYE: Most of the user of the computer suffer pain in the wrist or in fingers due to over usage of pc or laptops by infront of them whole day b...
infotoall: MODEM
infotoall: MODEM: The main function of modem is to convert the digital to analog signal(modulation) and analog to digital signal (demodulation) for the c...
CONTROLLING THE MOUSE WITH YOUR EYE
Most of the user of the computer suffer
pain in the wrist or in fingers due to over usage of pc or laptops by infront
of them whole day by typing and moving the mouse. Due to this some of the user
gets muscular pain etc. The research scholars of imperial college in London have found out a
solution to this problem that is controlling the mouse with your eye.
A small device is
used for this purpose which is called as GT3D device.
This device consists of a pair of glasses (like the coolers) that user must
wear when you need to move the mouse with eye. And also two fast control cameras
are used to keep track of your eye. The camera constantly records the movement
of the pupil and moves the cursor to the direction where it points to. This device
is on the development stage so the scholars demonstrated the effective usage of
the device by a pong game. They also demonstrated how the surfing in net could
be done using this system. The previous version devices of GT3D has some
disadvantage such as you need to look on an icon for a prolonged period of time
inorder to open the application of the icon, due to this when you stare on the
desktop screen for some time then this automatically opens. Inorder to avoid this
problem GT3D device is sensitive so that
just a look at that opens the application and they have attached the 3d
facility so that the camera could detect whether your are just looking simply
on desktop screen or the user need to open the application. The cost of this
GT3D device is much cheaper (40$) than the other system input that we use.
MODEM
The main function of modem is
to convert the digital to analog signal(modulation) and analog to digital
signal (demodulation) for the communication between the server that provides
the internet and the computer which uses those data. Modem stands for
modulation and demodulation.
TYPES OF MODEM
:
External
Modem: This is a modem separated from the system
unit in the computer case. It is connected to the serial port of the computer
by means of a cable. It is connected to the telephone jack by another cable.
Internal
Modem: An internal modem is a circuit board that
can be added to the system.
Standard
Modems: Most modems used today are standard modems. These modems are usually
operated by commands entered from a
keyboard. Users control the functions a modem through the keyboard. Modems
may use different command languages to control their functions, but most modems
(called "Hayes compatible") use a popular language developed by a
company "Hayes Microcomputer Products, Inc." The command ATDSX4, for
example, indicates that pay attention (AT), dial stored telephone number (DS),
and then display the progress of the call (X4).
Intelligent
Modems: Intelligent modems are also called advanced modems. These modems
can accept new instructions and then respond to the commands while transmitting
data and information. These can be done by microprocessor chips and internal
read only memory (ROM) contained in the modem. Of course, these modems are more
expensive.
Short-Haul
Modems: Short- haul modems are devices that
transmit signals through the cable . They are also are called modem eliminators, because they
do not require an external power source. They are also called line drivers that can send data for a distance of
more than one mile. This type of modem can be used within or across several buildings
in a company or a university campus.
Wireless
Modems: Wireless modems transmit the data signals through the air
instead of by using a cable. They sometimes are called a radiofrequency modem. This type
of modem is designed to work with wireless local area networks namely wifi.
Even in the cell phone
that we use today has modem the modems are used for surfing in the internet
etc.This modems also does the same work of modulation and demodulation but the
circuit of this modem is much smaller than the normal modem
June 04, 2012
TAJMAHAL IS NOT BUILD BY SHAJAGAN
The most
majestic building of the India is the tajmahal. It is a symbol of love for the
lovers and a historical monument in the Indian histoy.The history says that it
was built by
Shah Jahan for his lovely wife mum taj as a token of love. The taj
may be remodeled by
Shah Jahan or
Shah Jahan may have changed the history to his
way but the fact is that it was designed and built by someone else.
The reasons why the Tajmahal was not build by Shah Jahan are
1.At the top of the Tajmahal there is a home
sign(kalash) .The kalash are mostly build in Hindu temple and it is made up of
yempon(that is made up of 5 metals namely gold ,silver bronze and two other
metals .This kalash are built so that it
can hold the earth’s magnetic field. In the tajmahal kalash you could see a kumbam
(the pot that consist of coconut at the top of the pot), this are mostly used by
Hindus in their marriages as a sign of good hopes for the Hindus. Then why is
this kalash and kumba in the tajmahal.
This arise slight drought in our mind
that who built taj.
2.There is
a well inside the tajmahal. What is the need for the well inside tajmahal ? If
the well is for their personal use there is the river to their reach so they
could have done some other way instead of well. Actually in Hindu temple they build well for drawing water for their spiritual activities
since the river water is not holly for their
divine act to their god.
3.In the book “a real story of tajmahal” it is
said that the taj was an ancient temple and shajagan harassed the people and
remodel the temple as tomb for his wife.
4. During the Mughal Empire some of the English
writer wrote about the Indian culture heritage and monuments but they did not
write about the Tajmahal which plays an
important role in the history of India .Only the Indian writers who were under
the influence of shajagan only wrote about the Tajmahal. Why was it so.
5.The OM sign are used by Hindus in the starting a new work as the symbol of good hope and they believe that all the activities will be done successfully. So what is the need of the OM sign in the tajmahal.
6.When we look into the Muslims history they did not name any monuments as
mahal except the Tajmahal. Then why did
Shah Jahan named it so?
7.Actually the tajmahal was anciently named as Tejamahal,Teja refer to the
light of the world but later it may have been changed as Tajmahal.
This report justifies that the
tajmahal was not build by
Shah Jahan But this monument is a great treasure to India .
May 28, 2012
ALL ENGINEERS MUST SEE THIS
May 21, 2012
20 GOOGLE SECRETS
Google is clearly the best general-purpose search engine on
the Web.But most people don't use it to its best advantage. Do you
just plug in a keyword or two and hope for the best? That may be the quickest
way to search, but with more than 3 billion pages in Google's index, it's still
a struggle to pare results to a manageable number.
But Google is an remarkably powerful tool that can ease and
enhance your Internet exploration. Google's search options go beyond simple
keywords, the Web, and even its own programmers. Let's look at some of Google's
lesser-known options.
Syntax Search Tricks
Using a special syntax is a way to tell Google that you want
to restrict your searches to certain elements or characteristics of Web pages.
Google has a fairly complete list of its syntax elements at
www.google.com/help/operators.html
. Here are some advanced operators that can help narrow down
your search results.
Intitle: at the beginning of a query word or phrase
(intitle:"Three Blind Mice") restricts your search results to just
the titles of Web pages.
Intext: does the opposite of intitle:, searching only the
body text, ignoring titles, links, and so forth. Intext: is perfect when what
you're searching for might commonly appear in URLs. If you're looking for the
term HTML, for example, and you don't want to get results such as
www.mysite.com/index.html
, you can enter intext:html.
Link: lets you see which pages are linking to your Web page
or to another page you're interested in. For example, try typing in
link:http://www.pcmag.com
Try using site: (which restricts results to top-level
domains) with intitle: to find certain types of pages. For example, get
scholarly pages about Mark Twain by searching for intitle:"Mark
Twain"site:edu. Experiment with mixing various elements; you'll develop
several strategies for finding the stuff you want more effectively. The site:
command is very helpful as an alternative to the mediocre search engines built
into many sites.
Swiss Army Google
Google has a number of services that can help you accomplish
tasks you may never have thought to use Google for. For example, the new
calculator feature
(www.google.com/help/features.html#calculator)
lets you do both math and a variety of conversions from the
search box. For extra fun, try the query "Answer to life the universe and
everything."
Let Google help you figure out whether you've got the right
spelling—and the right word—for your search. Enter a misspelled word or phrase
into the query box (try "thre blund mise") and Google may suggest a
proper spelling. This doesn't always succeed; it works best when the word
you're searching for can be found in a dictionary. Once you search for a
properly spelled word, look at the results page, which repeats your query. (If
you're searching for "three blind mice," underneath the search window
will appear a statement such as Searched the web for "three blind
mice.") You'll discover that you can click on each word in your search
phrase and get a definition from a dictionary.
Suppose you want to contact someone and don't have his phone
number handy. Google can help you with that, too. Just enter a name, city, and
state. (The city is optional, but you must enter a state.) If a phone number
matches the listing, you'll see it at the top of the search results along with
a map link to the address. If you'd rather restrict your results, use
rphonebook: for residential listings or bphonebook: for business listings. If
you'd rather use a search form for business phone listings, try Yellow Search
(www.buzztoolbox.com/google/yellowsearch.shtml).
Extended Googling
Google offers several services that give you a head start in
focusing your search. Google Groups
(http://groups.google.com)
indexes literally millions of messages from decades of
discussion on Usenet. Google even helps you with your shopping via two tools:
Froogle
CODE
(http://froogle.google.com),
which indexes products from online stores, and Google
Catalogs
CODE
(http://catalogs.google.com),
which features products from more 6,000 paper catalogs in a
searchable index. And this only scratches the surface. You can get a complete
list of Google's tools and services at
www.google.com/options/index.html
You're probably used to using Google in your browser. But
have you ever thought of using Google outside your browser?
Google Alert
(www.googlealert.com)
monitors your search terms and e-mails you information about
new additions to Google's Web index. (Google Alert is not affiliated with
Google; it uses Google's Web services API to perform its searches.) If you're
more interested in news stories than general Web content, check out the beta
version of Google News Alerts
(www.google.com/newsalerts).
This service (which is affiliated with Google) will monitor
up to 50 news queries per e-mail address and send you information about news
stories that match your query. (Hint: Use the intitle: and source: syntax
elements with Google News to limit the number of alerts you get.)
Google on the telephone? Yup. This service is brought to you
by the folks at Google Labs
(http://labs.google.com),
a place for experimental Google ideas and features (which
may come and go, so what's there at this writing might not be there when you
decide to check it out). With Google Voice Search
(http://labs1.google.com/gvs.html),
you dial the Voice Search phone number, speak your keywords,
and then click on the indicated link. Every time you say a new search term, the
results page will refresh with your new query (you must have JavaScript enabled
for this to work). Remember, this service is still in an experimental phase, so
don't expect 100 percent success.
In 2002, Google released the Google API (application
programming interface), a way for programmers to access Google's search engine
results without violating the Google Terms of Service. A lot of people have created
useful (and occasionally not-so-useful but interesting) applications not
available from Google itself, such as Google Alert. For many applications,
you'll need an API key, which is available free from
CODE
www.google.com/apis
. See the figures for two more examples, and visit
www.pcmag.com/solutions
for more.
Thanks to its many different search properties, Google goes
far beyond a regular search engine. Give the tricks in this article a try.
You'll be amazed at how many different ways Google can improve your Internet
searching.
Online Extra: More Google Tips
Here are a few more clever ways to tweak your Google
searches.
Search Within a Timeframe
Daterange: (start date–end date). You can restrict your
searches to pages that were indexed within a certain time period. Daterange:
searches by when Google indexed a page, not when the page itself was created.
This operator can help you ensure that results will have fresh content (by
using recent dates), or you can use it to avoid a topic's current-news blizzard
and concentrate only on older results. Daterange: is actually more useful if
you go elsewhere to take advantage of it, because daterange: requires Julian dates,
not standard Gregorian dates. You can find converters on the Web (such as
CODE
http://aa.usno.navy.mil/data/docs/JulianDate.html
excl.gif No Active Links, Read the Rules - Edit by Ninja
excl.gif
), but an easier way is to do a Google daterange: search by
filling in a form at
www.researchbuzz.com/toolbox/goofresh.shtml or
www.faganfinder.com/engines/google.shtml
. If one special syntax element is good, two must be better,
right? Sometimes. Though some operators can't be mixed (you can't use the link:
operator with anything else) many can be, quickly narrowing your results to a
less overwhelming number.
May 15, 2012
ARCHITECTURE AND WORKING OF ANTIVIRUS
Antivirus is one of the inevitable part of a system, whether at home, office or even on gadgets, the prime concern is that of security of the device, system. But have you ever wondered that how the Antivirus works? In this resource we are having a detailed discussion on the Antivirus Architecture, as well as the algorithms which they follow.
Architecture of an Antivirus Engine
The antivirus engine has a very interesting layeral architecture. There are around five layers; each has its own specialty as well as the functionality attached to it. The first one is the User Interface layer which has the functionality of enabling the interface. The second layer is of the Engine Core, which follows a particular algorithm. The third layer contains File System Interface, File Type Scanner, Memory scanner, Decompression and code emulator. The last but not the least layer is the Hardware.
Working of an Antivirus Engine
Whenever we attach any external drive into our system, the very first step we perform is the security of the system. We try to scan the drive, which so ever is attached by using antivirus we have installed on our system.
1. In order to understand how antivirus engine works, it is very necessary to understand the basic architecture and details so that when the one runs on the system, each and every detail can be analyzed.
2. It is not so evident that every time we have a new version of a particular Antivirus engine, then the core is made from the scratch, it is sometimes revised from the earlier one, so the load is minimized.
3. The antivirus engine contains an Engine core, the second layer is dedicated to the file system interface, scanner and emulators.
4. The engine core has the functionality to intact the entire software together. In order words it acts as a sticky substance which is ready to call the desired module, when required.
5. The basic requirement is to have a scan engine, some prefer to have third party scan engines and it is very clear that they are not considered as part of the framework.
6. But some of the most popular and genuine used software's have their own scan engines. The Scanner used in these scan engines are their own scanner.
7. There are generally two scanning algorithms, one is a heuristic based and other is signature. The scan string based technologies search in the given file and looks for a particular matching string.
8. When the scanner founds the already defined or predefined strings then the necessary actions are performed by the engine.
9. When following heuristic based scanning algorithms, the string is not looked but we look for certain instruction or commands in the files.
10. In order to understand better, when certain codes is encrypted then we tend to find decryption code, instructions by following the heuristic scanning algorithms.
11. So when we select a particular file or folder, then it passes through number of steps, which includes submitting a file to scan engines, scanning based on algorithms and then appropriate actions are performed.
12. The processing of file is one of the most important phase of any antivirus engine. We have certain modules which are designed appropriately.
13. The Random Access Memory is generally accessed by the scanning blocks, there are memory scanners which perform the appropriate actions on the memory.
14. We have emulators and its function is similar to any other emulator. It creates its own virtual environment. There are several benefits of having an emulator attached to it.
15. The emulator has the ability to determine which action will be performed and what effect can be there on the whole system, if the malware is allowed to run.
16. Another important module which runs after a particular time interval and acts is the update module. Every day new definitions are created and that has to be added in the database as well.
May 14, 2012
HIDE A FOLDER WITHOUT THE CMD
For eg,
If u’ve a folder with name “Anything”
press F2,
then type, “Anything.{645FF040-5081-101B-9F08-00AA002F954E}”
and Press Enter.
If u’ve a folder with name “Anything”
press F2,
then type, “Anything.{645FF040-5081-101B-9F08-00AA002F954E}”
and Press Enter.
Step 2 : To get back to its original form,
Make a new batch file with any name and type
“ren Anything.{645FF040-5081-101B-9F08-00AA002F954E} Anything” .
Make a new batch file with any name and type
“ren Anything.{645FF040-5081-101B-9F08-00AA002F954E} Anything” .
May 13, 2012
trendsetter:
2 Sides of INDIAN Cyber Law or IT Act of INDIA
C...: 2 Sides of INDIAN Cyber Law or IT Act of INDIA Cyber laws are meant to set the definite pattern, some rules and guidelines that defin...
2 Sides of INDIAN Cyber Law or IT Act of INDIA
C...: 2 Sides of INDIAN Cyber Law or IT Act of INDIA Cyber laws are meant to set the definite pattern, some rules and guidelines that defin...
Subscribe to:
Posts (Atom)