Raj Mishra

Follow the following steps:



1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\

2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.
Raj Mishra


Hi guys this another cool gadget for our blog, this gadjet work is cool,plus Size Image viewer automatically adds a caption beneath the images of your choice that when clicked on launches a "plus size" version of the image.the enlarged image can be a different image from the original, so the former is loaded only on demand when requested. FYI, this script is inspired by a similar image viewer seen on some pages. so if you want add this cool gadjet your blog ? please follow step by step below to do it.

How To Add Plus Size Image Viewer To Blogger

1.Log in to your dashboard--> Desing- -> Edit HTML

2.Click on "Expand Widget Templates"

3.Scroll down to where you see </head> tag.

4.Now add below code before </head> tag.




<link rel="stylesheet" type="text/css" href="https://sites.google.com/site/bloggertricksandtoolz/plusimageviewer.css" />

<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js"></script>

<script type="text/javascript" src="https://sites.google.com/site/bloggertricksandtoolz/plusimageviewer.js">

/***********************************************
* Plus Size Image Viewer- by JavaScript Kit (www.javascriptkit.com)
* This notice must stay intact for usage
* Visit JavaScriptKit at http://www.javascriptkit.com/ for full sourcecode
* Bloggerized by Sameera http://www.bloggertricksandtoolz.com/
***********************************************/

</script>




5. Save your template

6. Now please add below code your blog post or html javacript code box.


<img src="thumb.jpg" style="width:200px" data-plusimage="large.jpg" data-plussize="700,466" />




Note: Replace thumb.jpg, 200px your image-address and large.jpg, image-address.

Look at the example below:

<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO6tBPtUFcNfBHa3vc7ZZcIXLDfSjTLZZIQUXZitXxC6vRsewGkcHiTsnQL55J9NOHVLgjEguVe_wIy-GlNh3FmsBxslnbYjIy-YEZzeMvaQ8CwZV-9T8NnXDY9XU9h1zjZ08I60qSgmE/" style="width:200px" data-plusimage="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO6tBPtUFcNfBHa3vc7ZZcIXLDfSjTLZZIQUXZitXxC6vRsewGkcHiTsnQL55J9NOHVLgjEguVe_wIy-GlNh3FmsBxslnbYjIy-YEZzeMvaQ8CwZV-9T8NnXDY9XU9h1zjZ08I60qSgmE/" data-plussize="700,466" />
<br/ ><br />
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzJL4zHCYAdPU04va3ouzLVz2cxR6Gv95vg3ljV2xDgxMYe4oW79bwwsc8JsG7Hd_7uMkSzvXj6pqyAigHitbMs2HnmR1SPGRGUpMmHAiDuqpo1i4N5MW7bDorQmPKEeOG3kNdQ2YejVs/s912/namitha_1_1024.jpg" style="width:150px" data-plusimage="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzJL4zHCYAdPU04va3ouzLVz2cxR6Gv95vg3ljV2xDgxMYe4oW79bwwsc8JsG7Hd_7uMkSzvXj6pqyAigHitbMs2HnmR1SPGRGUpMmHAiDuqpo1i4N5MW7bDorQmPKEeOG3kNdQ2YejVs/s912/namitha_1_1024.jpg" data-plussize="600,450" />


7. Save your Html javascript you are done.
Labels: 0 comments | edit post
Raj Mishra





I was checking around the net and I found this little Google Trick, and I must say its just tooo good, you will have to try it to see. It works for other websites but I recommend using it on Google, thats where you will see the trick at its best.



Follow the steps to check out this cool little trick.

1. Go to Google.com and Click Image

2. Fill in the search box with anything you like, in my case I had Dolphins.

3. You will get a result page with lots of thumbnail images.

4. Now delete the address bar in my case it was,


5. Copy and paste the following code in the bar and watch the magic. The code is in a TEXT file, just select all and paste it in the address bar, "control+a to select all or edit >select all>copy"
The code will be in the NEXT post box the make it simpler to copy.
-----====


javascript:R= 0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI= document.images ; DIL=DI.length; function A(){for(i=0; i

-----====
Labels: 0 comments | edit post
Raj Mishra

Please note: this tutorial is taken from here
http://www.virtualplastic.net/html/desk_adv.html#save



Recognize this ?? You've got all your windows sized, icons placed the way they look great....
explorer crash! (Or, the thing crashes not that much anymore, but it seems to forget sometimes...) And there you go again.. but, there's a way to recover all your settings, that's windows placing, sizing and icon positions, with just one click (Win 9x/2k).

First, make it all look, once more, just the way you want it to be. Choose about 30 folders you access frequently to look good (don't forget your win- and system dir, program files etc.).

Now these settings are in the Registry, open it and go to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
Select the folder 'Streams'. Choose 'Registry' in the toolbar, and 'export registry-key'. The information in the key is being stored in a .reg file, which is a simple textfile. Name & store where you want. Then do the same with the folder 'StreamMRU'.

Close RegEdit and open the last file with notepad. Remove the first line (REGEDIT4) and copy the rest. Then open your first file and paste it at the end. Save, close and make a shortcut to your desktop. And then, have fun and mess up all your favorite folders. Once exhausted (double)click your shortcut and confirm you wanna enter this info into the Registry. Rejoice!

A lot of graphic cards come with some software to save your desktop icon layout. If yours didn't, alternatives:

Softwarium Restore Desktop http://www.softwarium.com/download/RDSetup.exe "magically restores icons' positions after display resolution changing. You can also restore saved icons' positions manually by rightclicking on the desktop" (free, all versions).

(!!) An even more integrated solution, that works in all versions, is using layout.dll/layout.reg http://www.virtualplastic.net/download/hacks/layout.zip from the NT 4 Resource Kit. Put the .dll in your (9x) \Windows\System, (2k) \Winnt\System32 or (XP) \Windows\System32 folder, import the .reg file and have the option to save and restore (one configuration) in the rightclickmenu of My Computer and the bin (14 kB, source: Jorge Walker at Axcel216).
Raj Mishra

Tools you need :
1) Cheat Engine 5.5 or Here
2) Firefox
3) Flash Player 10


1) Go into Country Story

2) Select browser in Cheat Engine (hex, 8bytes, ASROM)
3) Plant/harvest something to use up stamina
4) Scan "558B000000F4888B" 2 address returned.
5) Right click the top address and disassemble it
6) 2 lines down you'll see the line "sub ecx,edx". Change it to "sub edx,edx"
Now anything you do will not deduct stamina.
7) Go to your friend's farm and STEAL a crop. The stealing must be successful to find the value.
8) NEW Scan "C82B000000D48A8B" 1 address returned.
9) Right click disassemble and change the line "sub ecx,eax" to "sub eax,eax"
10) You can now steal continuously.
Raj Mishra

Tools you need :
1)Cheat Engine 5.5 or Here
2) Firefox
3) Flash Player 9 or 10
4) Piaip's Restaurant City Hack Tool v1.13



1) Patch your RC using piaips 1.13 (optional)

2) Now in Cheat Engine, select firefox as process,tick hex,ASROM,value type (8 bytes)
3) Scan "00000039840FD285"
4) 1 address returned. Right click > Disassemble address
5) You'll see the line "mov ecx,[edx+00000088]"(flash 9) or "mov ecx,[edx+00000090]"(flash 10)"
6) Rclick that line and click toggle breakpoint or press f5
7) When your firefox freezes Rclick again that line and click toggle breakpoint or press f5
8) Click debug and click run on CE
9) Click Add address manually,lower right part on CE
10) Enter the EDX(red color) value shown on CE +88 (flash 9) +90 (flash 10) example:1F563A20+88
11) After you've enter that value your level will be displayed in your CE
12) Click or check frozen in your CE
13) Click New Scan, scan"FFFFFFB8D02A0FF2"
14) 1 address returned. Right click > Disassemble address
15) You will see the line mov eax,ffffffff change it to mov eax,00001388 for 1000 GP if its too slow adjust it to 00002000 or something (guidelines:1388 (1000 exp),61A8 (5000 exp) C350 (10000 exp) 4C4B40 (1000000 exp)
16) Set your experience close enough before you leveled example: 15000 exp are needed to reach another level so adjust it to 14000 exp or 14900, don't level up!
17) If it is set closely enough before it gained 1 level change mov,00001388 to mov eax,ffffffff
18) Now click Redecorate on your RC
19) Buy some stuffs, buying things add exp to your game, keep buying until you leveled up (if possible,set your points like 14900/15000 so you only need 100 exp and this will only need you to buy 1 arcade machine to gain 100 exp and leveled up)
20) When you leveled up just click those checks over and over, this will give you no disconnection even if you reach 10m note: don't change the value of your level,and don't leave redecorating mode
21) When your satisfied of the coins uncheck now frozen in your CE
22) Click check to leave the redecorating room and this will be saved
23)Mail me at raj_mishra9933@yahoo.com for some questions and suggestions regarding this hack..
Raj Mishra

How to create a bootable Windows XP SP3 CD (Nero):



Step 1

Create 3 folders - C:\WINXPSP1, C:\SP1106 and C:\XPBOOT

Step 2

Copy the entire Windows XP CD into folder C:\WINXPSP1

Step 3

You will have to download the SP1 Update, which is 133MB.
Rename the Service Pack file to XP-SP1.EXE
Extract the Service Pack from the Run Dialog using the command:
C:\XP-SP1.EXE -U -X:C:\SP1106

Step 4

Open Start/Run... and type the command:
C:\SP1106\update\update.exe -s:C:\WINXPSP1

Click OK

Folder C:\WINXPSP1 contains: Windows XP SP1



How to Create a Windows XP SP1 CD Bootable

Step 1

Download xpboot.zip
Code:
Code:
http://thro.port5.com/xpboot.zip

( no download manager !! )

Extract xpboot.zip file (xpboot.bin) in to the folder C:\XPBOOT

Step 2

Start Nero - Burning Rom.
Select File > New... from the menu.
1.) Select CD-ROM (Boot)
2.) Select Image file from Source of boot image data
3.) Set Kind of emulation: to No Emulation
4.) Set Load segment of sectors (hex!): to 07C0
5.) Set Number of loaded sectors: to 4
6.) Press the Browse... button



Step 3

Select All Files (*.*) from File of type:
Locate boot.bin in the folder C:\XPBOOT

Step 4

Click ISO tab
Set File-/Directory length to ISO Level 1 (Max. of 11 = 8 + 3 chars)
Set Format to Mode 1
Set Character Set to ISO 9660
Check all Relax ISO Restrictions




Step 5

Click Label Tab
Select ISO9660 from the drop down box.
Enter the Volume Label as WB2PFRE_EN
Enter the System Identifier as WB2PFRE_EN
Enter the Volume Set as WB2PFRE_EN
Enter the Publisher as MICROSOFT CORPORATION
Enter the Data Preparer as MICROSOFT CORPORATION
Enter the Application as WB2PFRE_EN

* For Windows XP Professional OEM substitute WB2PFRE_EN with WXPOEM_EN
* For Windows XP Home OEM substitute WB2PFRE_EN with WXHOEM_EN

Step 6

Click Burn tab
Check Write
Check Finalize CD (No further writing possible!)
Set Write Method to Disk-At-Once

Press New button

Step 7

Locate the folder C:\WINXPSP1
Select everything in the folder and drag it to the ISO compilation panel.
Click the Write CD Dialog button.

Press Write

You're done.
Raj Mishra

How to modify *.exe files
learn how to change *.exe files, in 5 easy steps:



1) Don't try to modify a prog by editing his source in a dissasembler.Why?
Cause that's for programmers and assembly experts only.

try to view it in hex you'll only get tons of crap you don't understand.
First off, you need Resource Hacker(last version). It's a resource editor-
very easy to use, You can download it at h**p://www.users.on.net/johnson/resourcehacker/

2) Unzip the archive, and run ResHacker.exe. You can check out the help file too


3) You will see that the interface is simple and clean. Go to the menu FileOpen or press Ctrl+O to open a file. Browse your way to the file you would like to edit. You can edit *.exe, *.dll, *.ocx, *.scr and *.cpl files, but this tutorial is to teach you how to edit *.exe files, so open one.

4) In the left side of the screen a list of sections will appear.
The most common sections are
-String table;
-RCData;
-Dialog;
-Cursor group;
-Bitmap;
-WAV.
*Icon: You can wiew and change the icon(s) of the program by double-clicking the icon section,chossing the icon, right-clicking on it an pressing "replace resource". After that you can choose the icon you want to replace the original with.
*String table: a bunch of crap, useful sometimes, basic programming knowladge needed.
*RCData: Here the real hacking begins. Modify window titles, buttons, text, and lots more!
*Dialog:Here you can modify the messages or dialogs that appear in a program. Don't forget to press "Compile" when you're done!
*Cursor group: Change the mouse cursors used in the program just like you would change the icon.
*Bitmap: View or change images in the programs easy!
*WAV:Change the sounds in the prog. with your own.


5) In the RCData,Dialog,Menu and String table sections you can do a lot of changes. You can modify or translate the text change links, change buttons, etc.


TIP: To change a window title, search for something like: CAPTION "edit this".
TIP: After all operations press the "Compile Script" button, and when you're done editing save, your work @ FileSave(Save as).
TIP: When you save a file,the original file will be backed up by default and renamed to Name_original and the saved file will have the normal name of the changed prog.
TIP: Sometimes you may get a message like: "This program has a non-standard resource layout... it has probably been compressed with an .EXE compressor." That means that Resource Hacker can't modify it because of it's structure.
Labels: 0 comments | edit post
Raj Mishra

To run any of these apps go to Start > Run and type the executable name (ie charmap).

WINDOWS XP HIDDEN APPS:
=========================================


1) Character Map = charmap.exe (very useful for finding unusual characters)

2) Disk Cleanup = cleanmgr.exe

3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)

4) Dr Watson = drwtsn32.exe (Troubleshooting tool)

5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)

6) Private character editor = eudcedit.exe (allows creation or modification of characters)

7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)

8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).

9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).

10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)

11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).

12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )

13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).

14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).

15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).

16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).

17) File siganture verification tool = sigverif.exe

18) Volume Contro = sndvol32.exe (I've included this for those people that lose it from the System Notification area).

19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).

20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).

21) Microsoft Telnet Client = telnet.exe

22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).

23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).

24) System configuration = msconfig.exe (can use to control starup programs)

25) gpedit.msc used to manage group policies, and permissions
Raj Mishra


I have a dial up connection and it improve my speeds about 25% in surfing the internet. give it a try. Im IT , only do it if you feel comfortable with changing registry.

Increasing network browsing speed

Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.

Windows XP: Speeding Disk Access

Although this problem is a complex one, the solution is very simple. Instead of having to wait for the remote scheduled tasks, which is useless information to anyone who is not a system administrator remotely configuring scheduled tasks, you can disable this feature.

In order to do this, you will have to change the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:

1. Open up the Registry Editor by clicking the Start Menu and selecting Run. Then type regedit in the text box and click the OK button.

2. Once the Registry Editor has loaded, expand the HKEY_LOCAL_MACHINE key.

3. Next, expand Software and then Microsoft.

4. Locate Windows and expand that as well.

5. You will want to be editing the main system files, so expand CurrentVersion.

6. Because this feature is a feature of the Windows component known as Explorer, expand the Explorer key.

7. Next, you will want to modify the remote computer settings, so expand the RemoteComputer key and then expand the NameSpace key to show all of the features that are enabled when you browse to a remote computer.

8. In the NameSpace folder you will find two entries. One is "{2227A280-3AEA-1069-A2DE-08002B30309D}" which tells Explorer to show printers shared on the remote machine. The other, "{D6277990-4C6A-11CF-8D87-00AA0060F5BF}," tells Explorer to show remote scheduled tasks. This is the one that you should delete. This can be done by right-clicking the name of the key and selecting Delete.

Tip:
If you have no use for viewing remote shared printers and are really only interested in shared files, consider deleting the printers key, "{2227A280-3AEA-1069-A2DE-08002B30309D}", as well. This will also boost your browsing speed.

Once you have deleted the key, you just need to restart and the changes will be in effect. Now your network computer browsing will be without needless delays.
Raj Mishra


Did you know that in Windows XP you can shut down your computer from the (eventually DOS prompt) command line box? Moreover, you can do this by clicking your mouse only once.

All you need to do is... right-click on an empty Desktop spot -> select New -> Shortcut -> type shutdown followed by a space, and then enter one or more of the parameters listed below -> click Next -> type a suggestive name for your new shortcut -> finally, click Finish.

This is the Shutdown.exe (located in %systemroot%\System32, usually C:\Windows\System32) syntax:


shutdown [-i|-l|-s|-r|-a] [-f] [-m \\computername] [-t xx] [-c "Text"] [-d[u][p]:xx:yy]

Valid command line switches:

-a = Abort system shutdown in progress ONLY IF the -t xx timeout option was already set to ANY value other than 0. ALL switches except -l and -m are ignored during abort.

-c "Text" = Text comment (case insensitive) to be displayed in the Message area of the System Shutdown window. MUST be enclosed between quotes. Maximum allowed 127 ASCII characters.

-d [u][p]:xx:yy = Reason code for shutdown:
u = User code.
p = Planned shutdown code.
xx = Major reason code. Positive integer number less than 256.
yy = Minor reason code. Positive integer number less than 65536.

-f = Force running applications to close without warning.

-i = Display the shutdown interface (GUI). MUST be the first option!

-l = Log off the current user of the local computer (default action). Can NOT be used with the -m option unless the current user has Sysadmin rights, in which case the -m switch takes precedence.

-m \\computername = Remote/network computer name (most always case sensitive) to log off/restart/shut down. Current user MUST have Sysadmin rights to be allowed to use this switch!

-s = Shut down the local computer.

-r = Shut down and restart (reboot) the local computer.

-t xx = Set shutdown timer to timeout for xx seconds. IF NOT specified defaults to 20 seconds. Allowed values between 0 and 99 seconds. The -a switch is the ONLY one that CAN be used during the timeout period.

NOTES:
The dash (-) in front of these switches can be replaced by a forward slash (/).

Spaces are NOT required to separate the shutdown command from ANY following switches, but ARE required to separate ANY switch from its following parameter(s), if any.
For example:

shutdown -s -c "Shutting down!" -t 3

tells your computer to shutdown after waiting for 3 seconds while the System Shutdown window will display text above in the Message area.

Optional: after you're done creating your customized shortcut for shutdown -> right-click on it -> select Properties -> enter your desired key "combo" in the Shortcut Key box (e.g. Ctrl + Alt + End) -> click OK/Apply.
From now on just left-click on your shutdown shortcut or hit that key combination to turn off/restart/log off your computer.
Raj Mishra


Q: What do you need to make a Digital Photo ID Card?
A: Making digital photo ID cards typically requires several components all working together.
Post Before "read more"

1. You need a computer on which you run the photo ID badge software. You cannot print the cards on a PVC card printer without a computer – the printer can't perform anything without the computer.
2. You need software and it must:
a) Offer a database to store the names and personal information of the people for whom you want to issue badges.
b) Provide a way to integrate image capture with the database – not only import images, but associate the images with specific database records.
c) Provide a way to design and edit badges.
d) Send badges from the computer to a card printer. Badging software, like other business applications, comes in a variety of "flavors" – from low-end to high-end. That is, in addition to performing the simple processes described above, the application may come with many other "features" which enhance the usability and functionality of the application. Features might include requiring a secure log-on, allowing the user to add, delete, or edit database fields and create or print reports, etc.
3. You need a PVC card printer to print the badges. PVC (polyvinylchloride) is the same material that your white plastic household plumbing pipes are made out of. It is porous enough to allow colored inks to be absorbed into the surface of the plastic using a "dye sublimation" process, yet durable enough to last years. The PVC printer allows you to print a photo ID badge directly to a plastic card. The non-digital process required cutting and pasting an instant photo and inserting it into a laminated pouch which must then be sealed by sending it through a heat laminator.
4. You need a digital camera or other "input" device. Your PC and software must allow you to:
a) Plug in a camera.
b) Capture the image through the software. More versatile systems will allow you to capture portraits through video cameras, digital cameras, scanners, or by importing from a file –an "import from file" feature allows someone to send a picture to you by email as a file attachment, which you can then import into the database.
5. Additional hardware may be required, such as a video capture board for certain video cameras, tape backup device, UPS (uninterrupted power supply), etc. Video capture boards, for example, are installed in a PCI or AGP expansion slot on your PC's motherboard. The camera usually plugs directly into these boards. Special lighting may need to be set up where you take portrait pictures. If you want to incorporate fingerprints and signatures in your database and badge, then additional image capture devices will be required for them.
6. Consumables are also part of the package. You will need blank or pre-printed PVC cards and printer ribbons (usually in rolls which print from 250-350 cards per).

Labels: , 0 comments | edit post
Raj Mishra
How to use the Google calculator:


Google’s calculator tries to understand the problem you are attempting to solve without requiring you to use special syntax. However, it may be helpful to know the most direct way to pose a question to get the best results. Listed below are a few suggestions for the most common type of expressions (and a few more esoteric ones).

Most operators come between the two numbers they combine, such as the plus sign in the expression 1+1.

Operator Function Example
+ addition 3+44
- subtraction 13-5
* multiplication 7*8
/ division 12/3
^ exponentiation (raise to a power of) 8^2
% modulo (finds the remainder after division) 8%7
choose X choose Y determines the number of ways of choosing a set of Y elements from a set of X elements 18 choose 4
th root of calculates the nth root of a number 5th root of 32
% of X % of Y computes X percent of Y 20% of 150


Some operators work on only one number and should come before that number. In these cases, it often helps to put the number in parentheses.

Operator Function Example
sqrt square root sqrt(9)
sin, cos, etc. trigonometric functions (numbers are assumed to be radians) sin(pi/3)
tan(45 degrees)
ln logarithm base e ln(17)
log logarithm base 10 log(1,000)


A few operators come after the number.

Operator Function Example
! factorial 5!


Other good things to know

You can force the calculator to try and evaluate an expression by putting an equals sign (=) after it. This only works if the expression is mathematically resolvable. For example, 1-800-555-1234= will return a result, but 1/0= will not.

Parentheses can be used to enclose the parts of your expression that you want evaluated first. For example, (1+2)*3 causes the addition to happen before the multiplication.

The in operator is used to specify what units you want used to express the answer. Put the word in followed by the name of a unit at the end of your expression. This works well for unit conversions such as: 5 kilometers in miles.

You can use hexadecimal, octal and binary numbers. Prefix hexadecimal numbers with 0x, octal numbers with 0o and binary numbers with 0b. For example: 0x7f + 0b10010101.

The calculator understands many different units, as well as many physical and mathematical constants. These can be used in your expression. Many of these constants and units have both long and short names. You can use either name in most cases. For example, km and kilometer both work, as do c and the speed of light.

Feel free to experiment with the calculator as not all of its capabilities are listed here. To get you started, we’ve included a few expressions linked to their results.

1 a.u./c
56*78
1.21 GW / 88 mph
e^(i pi)+1
100 miles in kilometers
sine(30 degrees)
G*(6e24 kg)/(4000 miles)^2
0x7d3 in roman numerals
0b1100101*0b1001


More info on:

http://www.google.co.in/help/calculator.html
Raj Mishra

The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.

Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.

floppyfw


h#tp://www.zelow.no/floppyfw/



Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.

The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.

Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.

Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.

All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.


Sentry Firewall


ht*p://www.sentryfirewall.com/docs.html#overview
Raj Mishra

You may not realize it, but your computer and your car have something in common: they both need regular maintenance. No, you don't need to change your computer's oil. But you should be updating your software, keeping your antivirus subscription up to date, and checking for spyware. Read on to learn what you can do to help improve your computer's security.


Getting started

Here are some basics maintenance tasks you can do today to start improving your computer's security. Be sure you make these part of your ongoing maintenance as well.

* Sign up for software update e-mail notices. Many software companies will send you e-mail whenever a software update is available. This is particularly important for your operating system (e.g., Microsoft VV!|VD0VV$® or Macintosh), your antivirus program, and your firewall.
* Register your software. If you still have registration forms for existing software, send them in. And be sure to register new software in the future. This is another way for the software manufacturer to alert you when new updates are available.
* Install software updates immediately.
When you get an update notice, download the update immediately and install it. (Remember, downloading and installing are two separate tasks.)
An ounce of prevention

A few simple steps will help you keep your files safe and clean.

* Step 1: Update your software
* Step 2: Backup your files
* Step 3: Use antivirus software and keep it updated
* Step 4: Change your passwords


Developing ongoing maintenance practices

Now that you've done some ground work, it's time to start moving into longer term maintenance tasks. These are all tasks that you should do today (or as soon as possible) to get started. But for best results, make these a part of a regular maintenance schedule. We recommend setting aside time each week to help keep your computer secure.

* Back up your files. Backing up your files simply means creating a copy of your computer files that you can use in the event the originals are lost. (Accidents can happen.) To learn more read our tips for backing up information.


* Scan your files with up to date antivirus software. Use your antivirus scan tool regularly to search for potential computer viruses and worms. Also, check your antivirus program's user manual to see if you can schedule an automatic scan of your computer. To learn more, read our tips for reducing your virus risk
.
* Change your passwords. Using the same password increases the odds that someone else will discover it. Change all of your passwords regularly (we recommend monthly) to reduce your risk. Also, choose your passwords carefully. To learn more, read our tips for creating stronger passwords
.

Making a schedule

One of the best ways to help protect your computer is to perform maintenance regularly. To help you keep track, we suggest making a regular "appointment" with your computer. Treat it like you would any other appointment. Record it in your datebook or online calendar, and if you cannot make it, reschedule. Remember, you are not only helping to improve your computer, you are also helping to protect your personal information.
Labels: 0 comments | edit post
^ Scroll to Top