0

Mp3 Player of Capsule size

Everyday technology is growing with lightning speed, Because of this technology every thing is coming to our pocket in very small size.Now technology again making music system to more small one.
Spin_Capsule
This is as small as your medicine capsule.You can have good numbers of music as well.The Whole control of this mp3 player is on it`s surface, If you do not like any song twist it and this will work as fast forward or next music track.If you want to repeat the song just twist it again.3936483609_60d010a4e1It supports USB drive so you can easily transfer music from Laptop or Computer to this mp3 player. In this you can run Mp3 and WMA files as well.It has seven equalizers. This small mp3 player have 30 channels of radio and you can record as well.
0

5 Simple Reasons Why PCs Crashes

bsod[27]

Have you seen this blue screen ! this is the death screen for Windows those who uses Windows will be familiar with this.This screen will be struck when the PC crashes.
pcmusicianheader.l
Their are five simple reasons for the system crash those are shown below

1. Hardware Conflict
vsta_dvce_mngr_dvc_cnflctThe First reason for window system crash is hardware conflict.Each hardware device communicate to other devices using Interrupt Request Channel (IRQ).Each device will have unique IRQ in normal situations.If the devices are not installed properly and when the user tries to use two or more devices which are sharing same IRQ at the same time , their is a chance for crash.To check these hardware conflicts use this path
Start—>Settings-->Control Panel—>System—>Device Manager
If a device has a problem a yellow ‘!’ appears next to its description in the Drive Manager.






0

How To Retrieve Lost Pictures When System Crashes

Pc Crash HouseWife
A Computer Crash can be a traumatic event,forcing you to hope that valuable data was not lost as your computer staggers back into life.Even if you reboot the computer to find that treasured photos are missing, often you can recover those photos by turning the clock with Windows System Restore feature.
You have to follow the bellow steps to get your pictures

0

Hard Drive Duplicator

century-hard-disk-copier-450x278 century_hdd-duplicator1-thumb-450x337
Now a days every one tries to backup or recover their data in hard drives this is a good idea but it consumes our worthful time to avoid this problem Hard Drive Duplicator could help.Aleratec 1:1 HDD PortaCruiser is one of best Hard Drive Duplicator.It lets us clone 2.5 inch and 3.5 inch hard drives with ease and supports both IDE and SATA Hard Disk Drives.

0

Flash 8 Projects for Learning Animation and Interactivity

flash 8Flash 8: Projects for Learning Animation and Interactivity
By Robert Hoekman, Jr., Rich Shupe
Publisher: O'Reilly

Macromedia Flash is fast becoming the Web's most widely used platform for creating rich media with animation and motion graphics, but mastering Flash isn't easy. Most entry-level books teach through simple examples that concentrate on either animation or scripting, but rarely both together. 
0

SPEED UP ACROBAT READER (ALMOST LIKE NOTEOAD)

Adobe Acrobat reader always consumes more memory when it starts.The reason behind this is,it loads all plugins,even the plugins that we do not use.So the trick i am going to apply is removing all the plugins from plugins directory to elsewhere.Hence,whenever we open Acrobat reader it directly opens the files without loading any plugins and the speed is just like notepad.

  1. 1.Go to the installation folder of acrobat reader(C:\program files\adobe\acrobat\reader\…. whatever)

2.Move all the files and folders from the “plugins” directory to the “Optional” directory.(I repeat.. cut and paste the files  NOT copy and paste).

 

         Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files.

0

WePad

wepad
Neofonie, a German company in strategic partnership with Siemens have developed the WePad.I am sure there would be a few tablets better than iPad, a few would be competitive and some wannabe`s.The WePad showoff some decent features including Android OS, 11.6” touch screen, 1366*768 pixel display, a1.66GHz Intel Atom N450 processor,GMA 3150 graphics,Webcam,2 USB ports, a 3 in 1 card reader and a UMTS modem.
 
0

HOW TO CRACK VISTA LOGON ACCOUNT PASSWORD

1. Reboot the windows vista and boot up with windows vista installation DVD.


vista-install-01
    2. While the windows vista installation interface pops up,click the Repair you computer link at the bottom-left corner.


    3. Next, the System recovery option dialog box appears.There are few options that related to repairing Windows Vista, looks like Recovery console in Windows XP.
    •     System Restore to restore Windows Vista setting to an earlier point in time.
    •    Windows Complete PC Restore to restore Windows Vista from a full system backup.
    •     Windows Memory Diagnostic Tool could be the first Microsoft memory tester that    bundle with windows setup media.
    0

    Windows Hidden Applications

    There are so many Applications that are present in windows.Some of them may be we know and some of them we don't know.So let us see some of the Hidden applications in windows .

    To run any of these apps go to Start -> Run and type the executable name (ie charmap).
    The following applications contains the extension ".exe". It is not necessary to give ".exe" in the Run prompt. For example to open the Disk cleanup application just type "cleanmgr" in Run prompt.The Disk cleanup wizard will be opened.
    These applications will be opened in windows xp, vista and in windows 7.

    WINDOWS  HIDDEN APPS:

    1) Character Map = charmap.exe (very useful for finding unusual characters)

    2) Disk Cleanup = cleanmgr.exe

    0

    RSA Algorithm using C

    RSA Algorithm using C Language

    You can also Download the Program code and corresponding output....
    To Download the program in correct format
    CLICK HERE 



    #include
    #include

    int phi,m,n,e,d,c,flag;
    int check()
    {
    int i;
    for(i=3;e%i==0&φ%i==0;i+2)
    {
    flag=1;
    return;
    }
    flag=0;
    }


    int encrypt()
    {
       int i;
      c=1;
       for(i=0;i
       c=c*m%n;
         c=c%n;
       printf("\n\t Encrypted keyword is %d",c);
       return c;
    }

    void decrypt()
    {

       int i;
       m=1;
       for(i=0;i
        m=m*c%n;
       m=m%n;
       printf("\n\t decrypted keyword is %d",m);
    }
    void main()
    {
       int p,q,s;
       clrscr();
       printf("enter two relatively prime numbers");
    scanf("%d%d",&p,&q);
       n=p*q;
      phi=(p-1)*(q-1);
      printf("\n\t f(n)\t=%d",phi);
       do
       {
       printf("\n\n Enter e\t");
         scanf("%d",&e);
         check();
      }while(flag==1);
       d=1;
      do
       {
       s=(d*e)%phi;
         d++;
       }while(s!=1);
       d=d-1;
      printf("\n\t Public key{ %d,%d}",e,n);
    printf("\n\t Private key{%d,%d}",d,n);
      printf("\n\n Enter the plain text\t");
      scanf("%d",&m);
      encrypt();
      decrypt(c);
       getch();
    }

    0

    Shutdown Windows XP in Different ways

    There are so many different ways to turn off your Windows XP computer, let's look at some of them:

    1)The standard approach - click the Start Button with your mouse, then select the Turn Off menu and finally click the Turn Off icon on the Turn Off computer dialog. blink.gif

    2)Press Ctrl+Esc key or the Win key and press u two times - the fastest approach.


    0

    Gesture 3D Cube

    gesture-cube-3d-interface.jpgGesture-controlling-cube-450x288.jpg

    Gesture Cube uses 3D spatial movement tracking to help transform navigating a device into a magical intuitive experience.The underlying GestIC technology detects your hand`s approach and movements-your favourite apps and media at a wave of your hand.
    0

    Open Office 2010

    The decade-old Open Office was the free and Open Source replication to Microsoft`s Office that has enriched it self in the office productivity suite segment.Originally a proprietary software application that was Open-Sourced  by Sun Micro systems,  Open Office has come a long way ,with the release of its new-improved version 3.2.Today, having crossed 300 million downloads-a third of this community project is among the most successful  stand-alone Open Source product.


    0

    Hidden Programs In Windows XP

    1) Private Character Editor

    This program is for designing icons and Characters(Alphapet)
    Click :Start Menu
    Then :Run
    Type :EUDCEDIT



    2) iExpress

    This Program is for converting your files to EXECUTABLE files
    Click : Start
    Then : Run
    Type : iexpress



    3) Disk Cleanup

    This program used for cleaning harddisk to offer space
    cl!ck : start
    Then : run
    type : cleanmgr



    4) Dr Watson

    This program Is for repairing problems in Windows
    cl!ck : start
    Then : run
    type : drwtsn32



    0

    Sony 3D TV

    TH10_SONY_BRAVIA-TV__61012f 3D_01

    Sony introduced 3D TV in India, which would prove to be the next big trend in the evolution of multimedia entertainment.Based on new LED technology, the new range of TVs also compatible with the internet and the company has exclusive tie-ups with some  of the content providers like ‘you tube’ to provide videos and clips.The company also announced the launch of new models under the popular Bra via brand,priced between Rs.45,900 and Rs.3.50-lakh.

    0

    Cyclic Redundency Check(CRC)

    Cyclic Redundency Check is also known as CRC
    Here the program in written in using C language


    You can also Download the Program code and corresponding output....
    To Download the program in correct format
    Click Here

    #include
    #include
    #include
    void main()
    {
    int i,j,n,g,a,arr[20],gen[20],b[20],q[20],s;
    clrscr();
    printf("Transmitter side:");
    printf("\nEnter no. of data bits:");


    scanf("%d",&n);
    printf("Enter data:");
    for(i=0;i< n;i++)
    scanf("%d",&arr[i]);

    printf("Enter size of generator:");
    scanf("%d",&g);
    do
    {
    printf("Enter generator:");
    for(j=0;j< g;j++)
    scanf("%d",&gen[j]);

    }
    while(gen[0]!=1);
    printf("\n\tThe generator matrix:");
    for(j=0;j< g;j++)
    printf("%d",gen[j]);
             a=n+(g-1);
    printf("\n\tThe appended matrix is:");
    for(i=0;i< j;++i)
    arr[n+i]=0;
    for(i=0;i< a;++i)
    printf("%d",arr[i]);

    for(i=0;i< n;++i)
    q[i]= arr[i];
    for(i=0;i< n;++i)
    {
    if(arr[i]==0)
    {
    for(j=i;j< g+i;++j)
    arr[j] = arr[j]^0;
    }
    else
    {
    arr[i]=arr[i]^gen[0];
    arr[i+1]=arr[i+1]^gen[1];
    arr[i+2]=arr[i+2]^gen[2];
    arr[i+3]=arr[i+3]^gen[3];
    }
    }
    printf("\n\tThe CRC is :");
    for(i=n;i < a;++i)
    printf("%d",arr[i]);
    s=n+a;
    for(i=n;i< s;i++)
    q[i]=arr[i];
    printf("\n");
    for(i=0;i< a;i++)
    printf("%d",q[i]);
    getch();
    }
    0

    Broadcast Routing

    Broadcast Routing using C language

    You can also Download the Program code and corresponding output
    to Download
    Click here

    /* Broadcast Routing */

    #include
    int a[10][10],n;
    main()
    {
     int i, j, root;
    clrscr();
    printf("Enter the no. of nodes:");
    scanf("%d",&n);
    printf("Enter the adjacent matrix \n");
    for(i=1;i<=n;i++) 

     for(j=1;j<=n;j++) 
    {

    printf("Enter connecting of %d ----->%d::", i, j);
    scanf("%d", &a[i][j]);
    }

    printf("Enter root node:");
    scanf("%d",&root);
    adj(root);
    }
    adj(int k)
    {
    int i,j;
    printf("Adjacent node of root node:: \n");
    printf("%d \n \n", k);
    for(j=1;j<=n;j++)
    {
    if(a[k][j]==1 || a[j][k] ==1)
    printf("%d \t",j);
    }

    printf("\n");
    for(i=1;i<=n;i++)
    {
    if((a[k][j]==0) && (a[i][k] ==0) && (i!=k))
    printf("%d",i);
    }
    }


    0

    Passport Studio

    wdfmp-studio wdpassportstudioelabel
    Western Digital has announced the availability of new My Passport Studio Portable HDD which features the FireWire 800 interface for speedy data transfer and customizable e-label utilizing the e-paper technology for better visibility if digital labels, which works even when the drive is unplugged.The device sports a stylish look, with an option of personalizing the drive with e-label showing your name or labeling it according to its content using the bundled smart ware software, the e-label also shows available space and whether it locked or not.


    Features

    0

    DistanceVectorRouting

    Distance Vector Routing



    You can also Download the Program code and corresponding output
    to Download
    click here


    #include
    main()
    {
    int n,nadj,delay[15],i,j,k,distance[15][15],min,index;
    int sum[15][15],suml[15],shortdelay[15];
    char source,node[15],adj[15],finalnode[15];
    clrscr();
    printf("\n Enter the no of nodes\t");
    scanf("%d",&n);
    printf("\n Enter the names of the nodes:\t");
    for(i=0;i<i

    {
    flushall();
    node[i]=getchar();
    }

    printf(" \n Enter the source node \t");
    flushall();
    source=getchar();
    printf("\n Enter the no of Adjacent nodes\t");
    scanf("%d",&nadj);
    printf("\n Enter the names of the adjacent nodes\t");
    for(i=0;i
    { flushall();
    adj[i]=getchar();
    }
    printf("\nEnter the delay of the nodes\t");
    for(i=0;i
    scanf("%d",&delay[i]);
    printf("\n Enter the distances to all the nodes from the adjacent nodes");
    for(i=0;i
    {
    for(j=0;j
    {
    scanf("%d",&distance[i][j]);
    }
    }
    for(i=0;i
    {
    for(j=0;j
    {
    sum[i][j]=delay[i]+distance[i][j];
    }
    }
    printf(" \n NODES \t\t ADJACENT NODES\t\t SHORT DELAY:");
    k=0;
    while(k!=n)
    {
    for(j=0;j
    suml[j]=sum[j][k];
    min=3200;
    for(j=0;j
    {
    if(suml[j]
    {
    min=suml[j];
    index=j;
    }
    }
    finalnode[k]=adj[index];
    shortdelay[k]=min;
    k++;
    }
    for(i=0;i
    {
    printf("\n %c",node[i]);
    if(node[i]==source)
    {
    printf("\t\t");
    printf(0);
    printf("\n");
    }
    else
    {
    printf("\t\t\t %c",finalnode[i]);
    printf("\t\t\t %d",shortdelay[i]);
    printf("\n");
    }
    }
    getch();
    }
    1 comments

    Bit Stuffing Character stuffing using C

    This is a program on Bit stuffing and Character stuffing using C language

    This program is used for Networking.
    In this program it includes both bit and character Stuffing and Unstuffing.

    Here is the program

    The Total Program code will not be given here to Download the total file 
    click here

    #include
    #include
    #include
    main()
    {
    int ch;
    clrscr();
    do
    {
    printf("\n");
    printf("\n 1:bit stuffing \n 2:character stuffing \n 3.exit \n Enter u r choice \n");
    scanf("%d",&ch);
    switch(ch)
    {
    case 1:bit();
    break;
    case 2:character();
    break;
    case 3:exit(0);
    }
    }
    while(ch!=3);
    getch();
    }
    bit()
    {
    FILE *fp,*fp1;
    char ch;
    int i;
    if((fp=fopen("source.txt","w"))==NULL)
    {
    printf("\n ERROR IN OPENING THE FILE");
    exit(0);
    }
    printf("\n enter data to send press 'e' to end:\n");
    i=0;
    while(1)
    {
    scanf("%c",&ch);
    if(ch=='e')
    break;
    if(ch=='1')
    i++;
    else
    i=0;
    putc(ch,fp);
    if(i==5)
    {
    putc('0',fp);
    i=0;
    }
    }
    fclose(fp);
    i=0;
    fp=fopen("source.txt","r");
    fp1=fopen("dest.txt","w");
    printf("\n DATA AFTER STUFFING \n");
    while((ch=getc(fp))!=EOF)
    {
    putc(ch,stdout);
    }
    fseek(fp,0L,0);
    printf("\n DATA AFTER UNSTUFFING \n");
    while((ch=getc(fp))!=EOF)
    {
    if(ch=='1')
    i++;
    else
    i=0;
    if(i==5)
    {
    putc(ch,stdout);
    putc(ch,fp1);
    ch=getc(fp);
    i=0;
    }
    else
    {
    putc(ch,stdout);
    putc(ch,fp1);
    }
    }
    fclose(fp);
    fclose(fp1);
    }
    character()
    {
    FILE *fp,*fp1;
    char ch,c[2],k[4],j[9];
    long beg,end;
    if((fp=fopen("input.txt","w"))==NULL)
    {
    printf("\n inpur.txt file opening problem.....");
    exit(0);
    }
    printf("\n enter data to send at end put '}':\n \n");
    while(1)
    {
    scanf("%c",&ch);
    if(ch=='}')
    break;
    putc(ch,fp);
    }
    fclose(fp);
    if((fp=fopen("input.txt","r"))==NULL)
    {
    printf("\n input.txt file opening problem.....");
    exit(0);
    }
    if((fp1=fopen("csource.txt","w"))==NULL)
    {
    printf("\n csource.txt file opening problem.....");
    exit(0);
    }
    fputs(" DLE STX ",fp1);
    printf("\n");
    printf("\n DATA AFTER STUFFING \n");
    while((ch=getc(fp))!=EOF)
    {
    if(ch=='D')
    {
    c[0]=getc(fp);
    c[1]=getc(fp);
    if(c[0]=='L'&&c[1]=='E')
    fputs("DLE",fp1);
    putc(ch,fp1);
    putc(c[0],fp1);
    putc(c[1],fp1);

    }
    else
    putc(ch,fp1);
    }
    fputs(" DLE ETX ",fp1);
    fclose(fp);
    fclose(fp1);

    if((fp=fopen("csource.txt","r"))==NULL)
    {
    printf("\n source.txt file opening problem.....");
    exit(0);
    }
    if((fp1=fopen("cdest.txt","w"))==NULL)
    {
    printf("\n cdest.txt file opening problem.....");
    exit(0);
    }
    beg=ftell(fp);
    beg+=9;
    fseek(fp,-0L,2);
    end=ftell(fp);
    end-=9;
    fclose(fp);
    fp=fopen("csource.txt","r");
    while((ch=getc(fp))!=EOF)
    putc(ch,stdout);
    fclose(fp);
    printf("\n");
    printf("\n THE DATA AFTER UNSTUFFING \n");
    fp=fopen("csource.txt","r");
    fgets(j,9,fp);
    while(beg



    Output





    0

    Heart Portable Speaker

    dreams_heart_portable_speaker-300x225 Marketing Coach Heart

    The heart are speakers that pump out 3 watts of your favorite music , and thankfully it has a rechargeable battery so you can always be ready to listen.The best part is that you can use the speaker in the standard audio jack , MP3 players or in a phone.It costs $39.99.

    0

    Boynq Alibi Webcam

    boynq-alibi-speaker-webcam1 The Boynq Alibi webcam from Brando looks it`s popping out of a vase to say hello.This 1.3mp webcam also has an integrated speaker(sound comes out the bottom).It sort of looks like a snake coming out of a basket to the sound of a flute.Either that or some plastic derivation of Johnny Five.It costs $35.

    0

    Java bean Developer Kit

    The hardware is made up of various components and is any hardware unit fails then the faulty component can be easily replaced.But it is not true for the software! Software system is not strong enough to support such component.To enrich the software systems by adopting component technology JAVA came up with the concept called Java Beans.Java provides the facility of creating some user defined components by means of Bean programming.These beans are can be developed using a tool called Bean Developer Kit(BDK). 

                              Click the below download button to get the BDK with Tutorial in PDF format.

                                                                    download 11[14][3]                                                       

    After installing BDK software,some default folder gets created named as beans.Then go to a subdirectory bean box.Their are 4 windows that get open namely Screenshot (18h 23m 18s)

    1. Tool Box

    2. Bean Box

    3. Properties-Bean Box

    4.Method tracer like in image

    0

    Gel Covered Mouse

    The Jelflin Gel Covered Mouse is an entirely new take on the computer mouse.The mouse is made of a gel material similar to those squishy stress ball and its round! Spherical technology.The round soft design is made to feel more natural and conform to the shape of our hand.The mouse comes in blue,red,yellow,green and pink colors.sensitivity  for the mouse is 1000 dpi and it is available now for $34.95.
    0

    Magic Video Converter 8.0.2.18

    Magic Video Converter realize DVD CD/SVCD burning, and conversion in different video files. It can convert and split : : AVI, MPEG, MPEG 1, MPEG 2, MPEG 4, VCD, DVD, SVCD, RMVB, RM, WMV, MOV, DIVX and etc.

    magicvideoconvertermvc

    Click here to DOWNLOAD the File

    Click here to DOWNLAOD SERIAL key

    0

    Google Chrome 5.0.322.2 Beta

    Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

    The Features of chrome are google-chrome-logo-711569 Google-Chrome

    • Security
    • Speed
    • Stability
    • User interface
    • Extensions
    • Themes
    • Usage tracking
    • Release channels and updates

    File Size-12.58 MB

    Click here to DOWNLOAD the file

    0

    Adamo XPS:World`s Thinnest Laptop

    Dell officially released the Adamo XPS,the highest-end version of its designer ultra portable.The system is championed as the thinnest notebook ever and measures just 0.39 inches as its thickest point.Dell accomplishes the feat by trucking most of the computer components into the display section and relying on a unique hinge that opens underneath and acts as a built-in prop.in spite of its slimness, the notebook still has a removable battery,two USB ports and display port output but alos weight slightly more than its Mac Air rival at 3.2 pounds.

     dell-adamo-xps_01 dell-adamo-xps-laptop

    When fully opened,the keyboard sits at maybe a 20-degree angle.It`s an unusual setup, but one that provides a more ergonomic typing experience than the average flat laptop keyboard.The ultra thin luxury laptop starts at $1,799.  

    0

    Acer Gaming Desktop

    Acer-Aspire-G-ASG7750-A64-Predator-Corei7-950-Gaming-PC Acer has recently upgraded its powerful gaming desktop computer known as Acer Aspire G ASG7750-A64Predator.This is powered by
    1. Intel Core i7-950(3.06HHZ)processor
    2. 6GB of DDR3 RAM
    3. A pair of NVIDIA GeForce GTX 260 graphic cards
    4. 1 TB (7,200rpm) hard drive and a blue-ray drive
    Features:
    • Dual Gigabit Ethernet LAN port
    • Four DVI-I output
    • Two eSATA ports
    0

    Mini Projects

     

    The Mini Projects were updated

     

    CLICK HERE TO DOWNLOAD THE MINI PROJECTS

    0

    Speak English like an American

    english like an american

    Speak English like an American 
    Author:AMY  GILLETT




    YOU ALREADY SPEAK ENGLISH……..
    NOW SPEAK IT EVEN BETTER
    If you already speak some English and now would like to speak more like a native,you’ve found the right book.One of the keys to speaking like a native is the ability to use and understand casual expressions,or idioms.American English is full of idioms.You won’t learn these expressions in a standard textbook.But you will hear them all the in everyday conversions.
    0

    AppRemover

    appremoverappremover3 

    It is a free utility that enables user to remove antivirus and  other applications  as on your system.Sometimes antivirus programs do not uninstall completely.AppRemover found all the virus and software protection programs on your system.This program lists its findings and gives you the option to select which ones you want to delete.

                                     download 11[14]

                                                                 

    0

    Star Wars Webcam

    These days webcams are pretty much look the same,here is something that can break into the monotony.Here are the details of this webcam

    • Webcam in star trek U.S.S.Enterprise NCC-1701 style design
    • 300k pixel camera:30 frames/second
    • 2 red LED lights
    • USB plug and play,no CD required
    • 4 feet of USB extension cable

    This device is compatible with PC running on Microsoft Windows XP SP3 and vista SP1 and Mac computers running on Mac OS X 10.5.1.

    star-wars-webcam star-wars-webcam1

     

     

    0

    Blood cleaning machine(Hemopurifier)

    A large version of the machine would be used in a hospital,but a smaller one could be taken to emergencies.It could be a life-safer against the avian flu or bio-weapons like Ebola and small pox,giving people a chance to survive a deadly attack, whether it`s from a terrorist or a virus.

    hemopurifier

    WORKING

    The hemopurifier uses antibodies to remove viruses as blood filters through it.It is designed to filter out viruses and toxins before they attack organs.the method is very similar to dialysis,and can be used to help patients with HIV,Hepatitis C,the measles,mumps,the flu,and more.It can also begin working before doctors identify the cause of the illness.

    AETHLON MEDICAL HEMOPURIFIER

    WHAT IS DIALYSIS  ?

    Hemodialysis is often used as a treatment for end stage renal disease(ESRD),or kidney failure,in which blood is removed from the body,filtered through an artificial kidney and then the cleaned blood is returned to the body .However,dialysis is also a painful,expensive procedure,and while it cleans the blood well enough to maintain existence,it does little to improve a patient`s overall quality of life.Also,data shows that if patients get  a transplant before they get to the point of dialysis,they do better in the longer time.

    0

    Microsoft Windows XP Registry Guide

    registry guide Microsoft Windows XP Registry Guide

    BY

    Jerry Honeycutt

    The registry is the heart and soul of Microsoft Windows XP.The registry contains the configuration data that makes the operating system work. The registry enables developers to organize configuration data in ways that are impossible with other mechanisms, such as INI files.

     

    It's behind just about every feature in Windows XP that you think is cool. More importantly, it enables you to customize Windows XP in ways you can't through the user interface.

    Windows XP and every application that runs on Microsoft's latest desktop operating system do absolutely nothing without consulting the registry first. When you double-click a file, Windows XP consults the registry to figure out what to do with it. When you install a device, Windows XP assigns resources to the device based on information in the registry and then stores the device's configuration in the registry. When you run an application such as Microsoft Word 2002, the application looks up your preferences in the registry. If you were to monitor the registry during a normal session, you'd see the registry serves up thousands of values within minutes.

    In this book, you will learn how to customize the registry, but you must also learn how to take care of the registry. You must learn how to back up the registry so you can restore it if things go away. You must also learn the best practices for editing the registry safely.

    Click on the Download icon to Download the E-book

    Media fire link                                                                                                                  Ziddu link

    download 11download 11

     

    0

    Macro Virus

    Macro Virus is a rogue a anti-spyware program.Is a Malware type virus,which disguises it self as a legitimate program.Macro Virus infiltrates system by using Trojans,such as Zolb and its counterparts,and uses scare tactics,including popups and fake system security notifications to convince the user that he/she is infected and should therefore use Macro Virus to remove the infection.This virus was written in Macro language,which is commonly built into word processing applications.In general macro is a series of commands and executions that help automate specific tasks.
    0

    OOPS Lab programs for 2-2 IT and CSE

    OOPS (OBJECT ORIENTED PROGRAMMING LAB)  programs for 2-2 IT and CSE according to JNTUK

    THIS FILES INCLUDE ALL THE PROGRAMS WITH OUTPUTS THAT ARE GIVEN IN YOUR SYLLABUS BOOK….NJOYY

    TO DOWNLOAD WORD DOCUMENT CLICK HERE  

    download 11

    TO DOWNLOAD PDF FILE CLICK HERE

    download 11

    0

    Computer Networks

    Computer Networks, Fourth Edition computer networks

    Author          :    Andrew S. Tanenbaum

    Publisher    :    Prentice Hall

    The world's leading introduction to networking-fully updated for tomorrow's key technologies.

    Computer Networks, Fourth Edition is the ideal introduction to today's networks-and tomorrow's.

    This E-Book covers all this and more:

    • Physical layer (e.g., copper, fiber, wireless, satellites, and Internet over cable)

    • Data link layer (e.g., protocol principles, protocol verification, HDLC, and PPP)

    • MAC Sublayer (e.g., gigabit Ethernet, 802.11, broadband wireless, and switching)

    • Network layer (e.g., routing algorithms, congestion control, QoS, IPv4, and IPv6)

    • Transport layer (e.g., socket programming, UDP, TCP, RTP, and network performance)

    • Application layer (e.g., e-mail, the Web, PHP, wireless Web, MP3, and streaming audio)

    • Network security (e.g., AES, RSA, quantum cryptography, IPsec, and Web security)

    The book gives detailed descriptions of the principles associated with each layer and presents many examples drawn from the Internet and wireless networks.

    Click here to download this E-Book

    download 11

     

    NOTE : This is a File of  .chm extension.This files will not open in some systems. This file is  not opening in your system then Download this small software called “ chm Decoder”

    Filesize   :  420kb

    Click here to Download the software