Monday, 26 September 2011

Continuously variable transmission (CVT) (PPT Notes)

Definition

After more than a century of research and development, the internal combustion (IC) engine is nearing both perfection and obsolescence: engineers continue to explore the outer limits of IC efficiency and performance, but advancements in fuel economy and emissions have effectively stalled. While many IC vehicles meet Low Emissions Vehicle standards, these will give way to new, stricter government regulations in the very near future. With limited room for improvement, automobile manufacturers have begun full-scale development of alternative power vehicles. Still, manufacturers are loath to scrap a century of development and billions or possibly even trillions of dollars in IC infrastructure, especially for technologies with no history of commercial success. Thus, the ideal interim solution is to further optimize the overall efficiency of IC vehicles.

Friday, 23 September 2011

Design, Analysis, Fabrication And Testing Of A Composite Leaf Spring (PPT Notes)

Definition

In order to conserve natural resources and economize energy, weight reduction has been the main focus of automobile manufacturers in the present scenario. Weight reduction can be achieved primarily by the introduction of better material, design optimization and better manufacturing processes. The suspension leaf spring is one of the potential items for weight reduction in automobiles as it accounts for 10% - 20% of the unsprung weight. This achieves the vehicle with more fuel efficiency and improved riding qualities.

Green Engine (PPT Notes)

Definition

Global Issues

Everyday radios, newspapers, televisions and the internet warn us of energy exhaustion, atmospheric pollution and hostile climatic conditions. After few hundred years of industrial development, we are facing these global problems while at the same time we maintain a high standard of living. The most important problem we are faced with is whether we should continue "developing" or "die".

Hydro Drive (PPT Notes)

Definition

Hydro Forming uses water pressure to form complex shapes from sheet or tube material. The pressure may go up about 60,000 psi depending on the component.

As the automobile industry strives to make car lighter, stronger and more fuel efficient, it will continue to drive hydro forming applications. Some automobile parts such as structural chassis, instrument panel beam, engine cradles and radiator closures are becoming standard hydro formed parts.

Thursday, 22 September 2011

Head And Neck Support (HANS) (PPT Notes)

Definition

Only recently has the racing industry acknowledged that the number one cause of racing-related fatalities is basilar skull fractures from excessive head motions and neck loading. Racing legend Dale Earnhardt's death proved to the racing world and the general public that what appears to be a low impact crash can be fatal. Under development and extensively tested for over a decade, there is a device that can reduce the risk of serious injury or even death to the driver in such a crash. It is the Head And Neck Support (HANS) device.

Fractal Robots (PPT Notes)

Definition
In order to respond to rapidly changing environment and market, it is imperative to have such capabilities as flexibility, adaptability, reusability, etc. for the manufacturing system. The fractal manufacturing system is one of the new manufacturing paradigms for this purpose. A basic component of fractal manufacturing system, called a basic fractal unit (BFU), consists of five functional modules such as an observer, an analyzer, an organizer, a resolver, and a reporter. Each module autonomously cooperates and negotiates with others while processing its jobs by using the agent technology. The resulting architecture has a high degree of self-similarity, one of the main characteristics of the fractal. What this actually means in this case is something that when you look at a part of it, it is similar to the whole object.

Military Radars (PPT Notes)

RADAR (Radio Detection and Ranging) is basically a means of gathering information about distant objects by transmitting electromagnetic waves at them and analyzing the echoes. Radar has been employed on the ground, in air, on the sea and in space. Radar finds a number of applications such as in airport traffic control, military purposes, coastal navigation, meteorology and mapping etc.

Smart Bombs (PPT Notes)

Introduction

Smart bombs are weapons capable of destroying enemy targets with out the need for a launch aircraft to penetrate the envelops of the air defense systems. These essentially comprise a terminal guidance unit that guides them in the last phase to achieve pinpoint accuracy. Increased accuracy means that a single, moderate-size bomb can give a better result than multiple strikes with larger, non-guided bombs.

Handfree Driving (PPT Notes)

Definition
All of us would like to drive our car with a mobile held in one hand, talking to the other person. But we should be careful; we don't know when the car just before us apply the break and everything are gone. A serious problem encountered in most of the cities, National Highways, where any mistake means no 'turning back'! There comes the tomorrows technology; Hand free driven car. Initializing the modern technological approach in Robotics.
What is the need for safety precaution?

Learn VB.NET, 1St Edition

1
Learn VB.NET, 1St Edition
 
 

Electronics Calculations Data Handbook

1
Electronics Calculations Data Handbook
 
This unique handbook consists of tables compiled as a labour-saving aid for electronics engineers, designers and technicians. The layout and content of these is designed to make them easy to use, and to contain the most valuable but tough to calculate information.


All the key data needed by electronics designers, engineers and technicians
Saves on hours of needless number-crunching
Must-have information at a glance

Download From

Cloud Computing Strategies - Dimitris N. Chorafas

1
Cloud Computing Strategies - Dimitris N. Chorafas

Sunday, 11 September 2011

Logo Package Drawing Using C (CODE)

This is a logo package by which you can draw different object using
keyboard. This program uses number of colour patterns and object movement
at the time drawing. This logo manages the cicle by which you can move into
different directions. Also can increase or decrease the radious of the circle
as you wish.
Code is given below.

Friday, 9 September 2011

Bricks "computer game" In C (CODE)

Bricks is a computer game which is played by the single player at a time. In this game a four layer of
bricks is there and you have to knock out the brick by the ball to get the point.For each knock you get 5 points.
You have maximum of four balls and each time you lose the ball 10 marks are deducted from your score.
You have to catch the ball on the paddle which is appearing on the bottom on the screen and if you will not able the catch the ball on the paddle you lose the ball. For moving the paddle use left and right arrow key.
As the ball and paddle are to be moved throughtout the game, we first store their images
in the memory using malloc() function which is used to allocate the memory.After this , the image at new coordinates is set erasing the previous location. When the ball reaches to the boundary it will pushed inside.

Major Project In C (CODE)

In this project the main menu provide the option for different
 demonstration. The item from the main menu can be selected by using the enter key or by pressing the
    hotkey which is represented by the bold character. The getoutput() function
    manage the movement of the cursor and selection of the menu item this function
    also use getkey() function to to find which key has been press by the user.
    The Showmenu() function is used to displays the menu in box drawn by menubox()
    available in the "intro.h".

INFOSYS Apptitude PAPERS

THIS FILE INCLUDES INFOSYS PAPERS FOR YEAR 2000 HELD AT IISc AND NAGPUR.

INFOSYS TEST @ IISC - 2000

IBM GLOBAL SERVICES Apptitude Quetions

IBM GLOBAL SERVICES

IBM GLOBAL SERVICES Apptitude Quetions

IBM GLOBAL SERVICES

ACCENTURE Apptitude Test Questions


Recruitment Processes (Sample Papers)   

 Accenture - Question paper - 02      

COMPANY NAME : ACCENTURE

Accenture Question Paper

Wednesday, 7 September 2011

Tuesday, 6 September 2011

Solar Power Satellites

The new millennium has introduced increased pressure for finding new renewable energy sources. The exponential increase in population has led to the global crisis such as global warming, environmental pollution and change and rapid decrease of fossil reservoirs.

Stealth Fighter (PPT Notes)

Definition
Stealth means 'low observable'. The very basic idea of Stealth Technology in the military is to 'blend' in with the background. The quest for a stealthy plane actually began more than 50 years ago during World War II when RADAR was first used as an early warning system against fleets of bombers. As a result of that quest, the Stealth Technology evolved. Stealth Technology is used in the construction of mobile military systems such as aircrafts and ships to significantly reduce their detection by enemy, primarily by an enemy RADAR. The way most airplane identification works is by constantly bombarding airspace with a RADAR signal.

When a plane flies into the path of the RADAR, a signal bounces back to a sensor that determines the size and location of the plane. Other methods focus on measuring acoustic (sound) disturbances, visual contact, and infrared (heat) signatures. Stealth technologies work by reducing or eliminating these telltale signals. Panels on planes are angled so that radar is scattered and no signal returns. Planes are also covered in a layer of absorbent materials that reduce any other signature the plane might leave. Shape also has a lot to do with the `invisibility' of stealth planes. Extreme aerodynamics keeps air turbulence to a minimum and cut down on flying noise. Special low-noise engines are contained inside the body of the plane. Hot fumes are then capable of being mixed with cool air before leaving the plane. This fools heat sensors on the ground. This also keeps heat seeking missiles from getting any sort of a lock on their targets.

Stealth properties give it the unique ability to penetrate an enemy's most sophisticated defenses and threaten its most valued and heavily defended targets. At a cost of $2 billion each, stealth bombers are not yet available worldwide, but military forces around the world will soon begin to attempt to mimic some of the key features of stealth planes, making the skies much more dangerous.

HISTORY OF STEALTH AIRCRAFT
With the increasing use of early warning detection devices such as radar by militaries around the world in the 1930's the United States began to research and develop aircraft that would be undetectable to radar detection systems. The first documented stealth prototype was built out of two layers of plywood glued together with a core of glue and sawdust. This prototype's surface was coated with charcoal to absorb radar signals from being reflected back to the source, which is how radar detection systems detect items in the air.
Jack Northrop built a flying wing in the 1940's. His plane was the first wave of stealth aircraft that actually flew. The aircraft proved to be highly unstable and hard to fly due to design flaws. The United States initially orders 170 of these aircraft from Northrop but cancelled the order after finding that the plane had stability Flaws. Then in 1964, SR-71 the first Stealth airplane launched. It is well known as 'black bird'. It is a jet black bomber with slanted surfaces. This aircraft was built to fly high and fast to be able to bypass radar by its altitude and speed.

HOW DOES STEALTH TECHNOLOGY WORK?
The idea is for the radar antenna to send out a burst of radio energy, which is then reflected back by any object it happens to encounter. The radar antenna measures the time it takes for the reflection to arrive, and with that information can tell how far away the object is. The metal body of an airplane is very good at reflecting radar signals, and this makes it easy to find and track airplanes with radar equipment.
The goal of stealth technology is to make an airplane invisible to radar. There are two different ways to create invisibility: The airplane can be shaped so that any radar signals it reflects are reflected away from the radar equipment. The airplane can be covered in materials that absorb radar signals.

Monday, 5 September 2011

Algorithm and Complexity by Herbertswilf

Algorithm and Complexity by Herbertswilf
Click On the following link to download it free.

Algorithm and Complexity by Herbertswilf

Algorithm and Complexity by Herbertswilf
Click on the following link to download it for free...

BIOS Beep Codes

When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's hardware components are working properly. Under normal circumstances, the POST will display an error message; however, if the BIOS detects an error before it can access the video card, or if there is a problem with the video card, it will produce a series of beeps, and the pattern of the beeps indicates what kind of problem the BIOS has detected.

BlueTooth PPT (Download Free)


Click on the following link to download it free..

C The Complete Reference Fourth Edition : Herbert Schildt

C The Complete Reference Fourth Edition : Herbert Schildt
Click On the following link to download it free....

Sunday, 4 September 2011

Create A Personal Screen Saver In Win Xp!

This isnt a tweak, but a great little feature! For a great way to put your digital photos to work, try creating a slide show presentation for use as a screen saver. Here's how:

1. Right-click an empty spot on your desktop and then click Properties.

Auto End Tasks to Enable a Proper Shutdown.

This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.

1. Copy the following (everything in the box) into notepad.

All Computer keyboards shortcuts...

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:

Windows key + R = Run menu

This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer

ALT + Tab = Switch between windows

ALT, Space, X = Maximize window

CTRL + Shift + Esc = Task Manager

Windows key + Break = System properties

Windows key + F = Search

Windows key + D = Hide/Display all windows

CTRL + C = copy

CTRL + X = cut

CTRL + V = paste

Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.


Keyboard Shortcuts

[Alt] and [Esc] Switch between running applications

[Alt] and letter Select menu item by underlined letter

[Ctrl] and [Esc] Open Program Menu

[Ctrl] and [F4] Close active document or group windows (does not work with some applications)

[Alt] and [F4] Quit active application or close current window

[Alt] and [-] Open Control menu for active document

Ctrl] Lft., Rt. arrow Move cursor forward or back one word

Ctrl] Up, Down arrow Move cursor forward or back one paragraph

[F1] Open Help for active application

Windows+M Minimize all open windows

Shift+Windows+M Undo minimize all open windows

Windows+F1 Open Windows Help

Windows+Tab Cycle through the Taskbar buttons

Windows+Break Open the System Properties dialog box



acessability shortcuts

Right SHIFT for eight seconds........ Switch FilterKeys on and off.

Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.

Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.

SHIFT....... five times Switch StickyKeys on and off.

NUM LOCK...... for five seconds Switch ToggleKeys on and off.

explorer shortcuts

END....... Display the bottom of the active window.

HOME....... Display the top of the active window.

NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.

NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.

NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.

LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.

RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.




Type the following commands in your Run Box (Windows Key + R) or Start Run

devmgmt.msc = Device Manager
msinfo32 = System Information
cleanmgr = Disk Cleanup
ntbackup = Backup or Restore Wizard (Windows Backup Utility)
mmc = Microsoft Management Console
excel = Microsoft Excel (If Installed)
msaccess = Microsoft Access (If Installed)
powerpnt = Microsoft PowerPoint (If Installed)
winword = Microsoft Word (If Installed)
frontpg = Microsoft FrontPage (If Installed)
notepad = Notepad
wordpad = WordPad
calc = Calculator
msmsgs = Windows Messenger
mspaint = Microsoft Paint
wmplayer = Windows Media Player
rstrui = System Restore
netscp6 = Netscape 6.x
netscp = Netscape 7.x
netscape = Netscape 4.x
waol = America Online
control = Opens the Control Panel
control printers = Opens the Printers Dialog


internetbrowser

type in u're adress "google", then press [Right CTRL] and [Enter]
add www. and .com to word and go to it


For Windows XP:

Copy. CTRL+C
Cut. CTRL+X
Paste. CTRL+V
Undo. CTRL+Z
Delete. DELETE
Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
Copy selected item. CTRL while dragging an item
Create shortcut to selected item. CTRL+SHIFT while dragging an item
Rename selected item. F2
Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
Highlight a block of text. CTRL+SHIFT with any of the arrow keys
Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
Select all. CTRL+A
Search for a file or folder. F3
View properties for the selected item. ALT+ENTER
Close the active item, or quit the active program. ALT+F4
Opens the shortcut menu for the active window. ALT+SPACEBAR
Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
Switch between open items. ALT+TAB
Cycle through items in the order they were opened. ALT+ESC
Cycle through screen elements in a window or on the desktop. F6
Display the Address bar list in My Computer or Windows Explorer. F4
Display the shortcut menu for the selected item. SHIFT+F10
Display the System menu for the active window. ALT+SPACEBAR
Display the Start menu. CTRL+ESC
Display the corresponding menu. ALT+Underlined letter in a menu name
Carry out the corresponding command. Underlined letter in a command name on an open menu
Activate the menu bar in the active program. F10
Open the next menu to the right, or open a submenu. RIGHT ARROW
Open the next menu to the left, or close a submenu. LEFT ARROW
Refresh the active window. F5
View the folder one level up in My Computer or Windows Explorer. BACKSPACE
Cancel the current task. ESC
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Use these keyboard shortcuts for dialog boxes:

To Press
Move forward through tabs. CTRL+TAB
Move backward through tabs. CTRL+SHIFT+TAB
Move forward through options. TAB
Move backward through options. SHIFT+TAB
Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
Carry out the command for the active option or button. ENTER
Select or clear the check box if the active option is a check box. SPACEBAR
Select a button if the active option is a group of option buttons. Arrow keys
Display Help. F1
Display the items in the active list. F4
Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:


Display or hide the Start menu. WIN Key
Display the System Properties dialog box. WIN Key+BREAK
Show the desktop. WIN Key+D
Minimize all windows. WIN Key+M
Restores minimized windows. WIN Key+Shift+M
Open My Computer. WIN Key+E
Search for a file or folder. WIN Key+F
Search for computers. CTRL+WIN Key+F
Display Windows Help. WIN Key+F1
Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L
Open the Run dialog box. WIN Key+R
Open Utility Manager. WIN Key+U

accessibility keyboard shortcuts:

Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
Open Utility Manager. WIN Key+U

shortcuts you can use with Windows Explorer:

Saturday, 3 September 2011

MATHS-Quantitative Aptitude


Click on read more to download MATHS-Quantitative Aptitude  free pdf file.

C-Apptitude questions frequently asked in interviews.

Click on the read more to get apptitude questios.

Data Warehousing and Data Mining

Description

Data Warehousing and Data Mining Techniques for Cyber Security
Product Description
Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, tremendous amount of data collected and stored in large databases has far exceeded our human ability to comprehend–without the proper tools. There is a critical need for data analysis that can automatically analyze data, summarize it and predict future trends. In the modern age of Internet connectivity, concerns about denial of service attacks, computer viruses and worms are extremely important. Data Warehousing and Data Mining Techniques for Cyber Security contributes to the discipline of security informatics. The author discusses topics that intersect cyber security and data mining, while providing techniques for improving cyber security. Since the cost of information processing and internet accessibility is dropping, an increasing number of organizations are becoming vulnerable to cyber attacks. This volume introduces techniques for applications in the area of retail, finance, and bioinformatics, to name a few. Data Warehousing and Data Mining Techniques for Cyber Security is designed for practitioners and researchers in industry. This book is also suitable for upper-undergraduate and graduate-level students in computer science.

55 ways to have fun with google

55 ways to have fun with google
“The variation in style of each chapter was quite refreshing. Some chapters are quite short, others consist of just pictures, there are a couple of quizzes, short stories, a few games you can play with Google, plenty of interesting facts … an excellent book for anyone who has an interest in Google or just wants to know what else you can do with the most popular search engine in the world. This isn’t a complicated reference guide on how to use Google as a tool – it’s an entertaining book on how to use Google as a toy!”

Vector Models for Data-Parallel Computing

Vector Models for Data-Parallel Computing

How to speed up the systems performance?

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.
2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.
3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.
4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.
The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.
Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.
Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.
5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.
6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.
7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.
8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.
10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.
11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.
12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.
14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.
15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.
16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.
17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.
18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.
19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.
20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.
21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.
22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.
23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.

Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.

Level of Defences in Network Security- A Case Study

Abstract  A secured network is one which is free of unauthorized access, threats and hackers. This paper describes the different levels of network security. A brief overview of the Network Security, its need, different threats and related protection techniques are presented. The paper presents a general overview of the most common network security threat measures and the steps which can be taken to protect an educational institution and to ensure that data travelling across the network is safe and secure. The objective of the paper is to highlight the loopholes in the existing network of computer science department of Geetanjali Institute of Technical Studies. The paper presents the setup of an Ideal Network Defense System in the institute.
Keywords  Network Security, IP Sec, VLANs, Firewalls, Antivirus Packages, MAC Filtering, Access Control Lists, Tokens, Security Policies, Intrusion Detection, UTM.
Abstract  A secured network is one which is free of unauthorized access, threats and hackers. This paper describes the different levels of network security. A brief overview of the Network Security, its need, different threats and related protection techniques are presented. The paper presents a general overview of the most common network security threat measures and the steps which can be taken to protect an educational institution and to ensure that data travelling across the network is safe and secure. The objective of the paper is to highlight the loopholes in the existing network of computer science department of Geetanjali Institute of Technical Studies. The paper presents the setup of an Ideal Network Defense System in the institute.
Keywords  Network Security, IP Sec, VLANs, Firewalls, Antivirus Packages, MAC Filtering, Access Control Lists, Tokens, Security Policies, Intrusion Detection, UTM.
Abstract  A secured network is one which is free of unauthorized access, threats and hackers. This paper describes the different levels of network security. A brief overview of the Network Security, its need, different threats and related protection techniques are presented. The paper presents a general overview of the most common network security threat measures and the steps which can be taken to protect an educational institution and to ensure that data travelling across the network is safe and secure. The objective of the paper is to highlight the loopholes in the existing network of computer science department of Geetanjali Institute of Technical Studies. The paper presents the setup of an Ideal Network Defense System in the institute.
Keywords  Network Security, IP Sec, VLANs, Firewalls, Antivirus Packages, MAC Filtering, Access Control Lists, Tokens, Security Policies, Intrusion Detection, UTM.

Friday, 2 September 2011

Extended Googling

Google offers several services that give you a head start in focusing your search. Google Groups
(http://groups.google.com)

Great Google Secrets

Google is clearly the best general-purpose search engine on the Web (see www.pcmag.com/searchengines)
But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.
But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.

Dictionary of Electronics : Stan Gibilisco



 

The Illustrated Dictionary of Electronics—8th Edition has been revised, clarified, and updated,
reflecting technological advances of recent years. New definitions have been added in
the fields of wireless technology, robotics, and artificial intelligence. Every effort has been
made to be concise and accurate, without “talking down” to the reader.
Click on Read more to download it free.