Does any file is troubling you ?
Are you Getting errors like these ?
It has many other flavors:
Is your windows driving you Nuts ?
Cannot delete file: Access is denied
There has been a sharing violation.
The source or destination file may be in use.
The file is in use by another program or user.
Make sure the disk is not full or write-protected and that the file is not currently in use.
Unlocker is the solution!
Time to get rid of these…
Get UNLOCKER,A nifty utility to exorcise stupid File and DLL ghosts ! You get the full power on your system and just delete/copy/unlock the file you want.
here is a little demonstration -
. Simply right click the folder or file and select Unlocker
. If the folder or file is locked, a window listing of lockers will appear
. Choose Task u want to perform on it Like Delete,Copy,etc.
. Simply click Unlock All and you are done!
Download your saviour and get the power Over your system !!!
POSTED BY XERO . ALL RIGHTS RESERVED.
Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not yet cover. If you see new toolbars in your Internet Explorer that you didn't intentionally install, if your browser crashes, or if you browser start page has changed without your knowing, you most probably have spyware. But even if you don't see anything, you may be infected, because more and more spyware is emerging that is silently tracking your surfing behaviour to create a marketing profile of you that will be sold to advertisement companies.
Spybot-S&D can also clean usage tracks, an interesting function if you share your computer with other users and don't want them to see what you worked on. And for professional users, it allows to fix some registry inconsistencies and extended reports.
Spybot-S&D can start in two modes: Easy mode for new users who want just the basic features, and Advanced mode for professional users and those who want more control. Both modes are available in the free version.
Spybot - Search & Destroy now officially "Works with Vista"
Download it From
In here I have figure out some very easy but cool ways to trace out the geographical location and various other infos like ISP details etc of a remote computer using its IP.
Well I guess its one of the most important must learn manual for boys out there if you want to impress your friends particularly gals whom you’ll meet online in a chat room and tell them their geographical locations and ISP details and make them surprised and impressed J.
In the practical execution of this manual you don’t have to work much as it is very simple only you have to use your brain to understand some symbols and some format of expressions and use your IQ to execute things the right way.
What is IP and how to get the IP of a remote system::
Getting the IP or Internet Protocol of a remote system is the most important and the first step of hacking into it. Probably it is the first thing a hacker do to get info for researching on a system. Well IP is a unique number assigned to each computer on a network. It is this unique address which represents the system on the network. Generally the IP of a particular system changes each time you log on to the network by dialing to your ISP and it is assigned to you by your ISP. IP of a system which is always on the network remains generally the same. Generally those kind of systems are most likely to suffer a hacking attack because of its stable IP. Using IP you can even execute system commands on the victim’s computer.
Lets take the example of the following IP address: 220.127.116.11 Now the first part, the numbers before the first decimal i.e. 209 is the Network number or the Network Prefix.. This means that it identifies the number of the network in which the host is. The second part i.e. 144 is the Host Number that is it identifies the number of the host within the Network. This means that in the same Network, the network number is same. In order to provide flexibility in the size of the Network, here are different classes of IP addresses:
Address Class Dotted Decimal Notation Ranges
Class A ( /8 Prefixes) 1.xxx.xxx.xxx through 126.xxx.xxx.xxxThe various classes will be clearer after reading the next few lines.
Class B ( /16 Prefixes) 128.0.xxx.xxx through 191.255.xxx.xxx
Class C ( /24 Prefixes) 192.0.0.xxx through 223.255.255.xxx
Each Class A Network Address contains a 8 bit Network Prefix followed by a 24-bit host number. They are considered to be primitive. They are referred to as "/8''s" or just "8's" as they have an 8-bit Network prefix.
In a Class B Network Address there is a 16 bit Network Prefix followed by a 16-bit Host number. It is referred to as "16's".
A class C Network address contains a 24-bit Network Prefix and a 8 bit Host number. It is referred to as "24's" and is commonly used by most ISP's.
Due to the growing size of the Internet the Network Administrators faced many problems. The Internet routing tables were beginning to grow and now the administrators had to request another network number from the Internet before a new network could be installed at their site. This is where sub-netting came in.
Now if your ISP is a big one and if it provides you with dynamic IP addresses then you will most probably see that whenever you log on to the net, your IP address will have the same first 24 bits and only the last 8 bits will keep changing. This is due to the fact that when sub-netting comes in then the IP Addresses structure becomes:
xxx.xxx.zzz.yyywhere the first 2 parts are Network Prefix numbers and the zzz is the Subnet number and the yyy is the host number. So you are always connected to the same Subnet within the same Network. As a result the first 3 parts will remain the same and only the last part i.e. yyy is variable.
For Example, if say an ISP xyz is given the IP: 203.98.12.xx Network address then you can be awarded any IP, whose first three fields are 203.98.12. Get it?
So, basically this means that each ISP has a particular range in which to allocate all its subscribers. Or in other words, all subscribers or all people connected to the internet using the same ISP, will have to be in this range. This in effect would mean that all people using the same ISP are likely to have the same first three fields of their IP Addresses.
This means that if you have done a lot of (By this I really mean a lot) of research, then you could figure out which ISP a person is using by simply looking at his IP. The ISP name could then be used to figure out the city and the country of the person. Right? Let me take an example to stress as to how cumbersome but easy (once the research is done) the above method can be.
In my country, say there are three main ISP’s:
ISP Name Network Address AllottedNow, if I get to know the IP of an e-pal of mine, and it reads: 18.104.22.168, then I can pretty easily figure out that he uses ISP III to connect to the internet. Right? You might say that any idiot would be able to do this. Well, yes and no. You see, the above method of finding out the ISP of a person was successful only because we already had the ISP and Network Address Allotted list with us. So, what my point is, that the above method can be successful only after a lot of research and experimentation. And, I do think such research can be helpful sometimes.
ISP I 203.94.47.xx
ISP II 202.92.12.xx
ISP III 203.91.35.xx
Also, this would not work, if you take it all on in larger scale. What if the IP that you have belongs to someone living in a remote igloo in the North Pole? You could not possibly get the Network Addresses of all the ISP’s in the world, could you? If yes please send it to me J.
Well now I guess you have pretty good knowledge about what an IP is and what you can do by knowing the IP of a remote system. Now lets come to the point of finding out the IP of remote system.
Well you can easily figure out the IP of a remote system using the netstat utility available in the microsoft’s version of DOS. The netstat command shows the connections in which your system is engaged to and the ports they are using. Suppose you are checking your mail in hotmail and you want to find out the IP of msn. All you need to do is to open a dos window (command.com) and type netstat. You will see all the open connections of your system. There you will see something :
Proto Local Address Foreign Address State
TCP XERO:1031 211.206.xx.xx:80 ESTABLISHEDNow you got the IP address of hotmail ass 211.206.xx.xx .
Similarly you can figure out the IP address of most http or ftp connections.
To know your own IP type the following command in a dos windows
C:\netstat –n[this commands converts the IP name into IP addresses]
this is what you will probably see on typing the above command :
Proto Local Address Foreign Address StateNow lets clarify the format used by netstat :
TCP 203.xx.251.161:1031 22.214.171.124:21 ESTABLISHED
TCP 203.xx.251.161:1043 126.96.36.199:80 FIN_WAIT_2
TCP 203.xx.251.161:1053 188.8.131.52:110 TIME_WAIT
TCP 203.xx.251.161:1058 184.108.40.206:20 TIME_WAIT
TCP 203.xx.251.161:1069 220.127.116.11:110 TIME_WAIT
TCP 203.xx.251.161:1071 18.104.22.168:80 ESTABLISHED
TCP 203.xx.251.161:1078 22.214.171.124:110 TIME_WAIT
Here 203.xx.251.161 is your IP address.
Proto : It shows the type of protocol the connection with the remote system is using.
Here TCP (transmission control protocol) is the protocol used by my system to connect to other systems.
Local Address : It shows the local address ie the local IP. When the netstat command is executed without –n switch then the name of the local system is displayed and when the netstat is executed with –n switch then the IP of the local system is displayed. Here you can also find out the port used by the connection.
xxx.yyy.zzz.aaa:1024in this format you will see the local address. Here 1024 is the port to which the remote system is connected in your system
Foreign Address :: It shows the IP address of the remote system to which your system is connected. In this case also if the netstat command is excuted with –n switch then you directly get the IP of the victim but if the netstat is executed without –n switch then you will get the address of the remote system. Something like
C:\netstatProto Local Address Foreign Address State
TCP abhisek:1031 msgr.lw4.gs681.hotmail.com:80 ESTABLISHED
Here msgr.lw4.gs681.hotmail.com is the address of the foreign system . putting this address in any IP lookup program and doing a whois lookup will reveal the IP of the remote system.
Note: The port to which your system is connected can be found from this in the same way as I have shown in the case of local address. The difference is that, this is the port of the remote system to which your computer is connected to.
Below I have produced a list of ports and popular services generally found to be running.
21 :: FTP portNote: If your execute the netstat command and find ports like 12345,27374 are open and are in use then make it sure that your sweat heart computer is infected with her boyfriend.. J J J J I mean your computer is infected with some sort of Trojan.
80 :: http port
23 :: Telnet port
Below I have produced a list of commonly known Trojans and the ports they use by default. So if you find these ports open then get a good virus buster and get these stupid servers of the Trojans kicked out. Well if you want to play with these Trojan by keeping them in your computer but not letting them ruin your system performance then just disble it from the system registry run and they wont be loaded to memory each time when windows starts up
[This trick doesn’t work for all Trojans].
Netbus :: 12345(TCP)
Subseven :: 27374(TCP)
Girl Friend :: 21554(TCP)
Back Oriface :: 31337 (UDP)
Well guys and gals I hope you are now well familiar with the term IP and what is the utility of IP in cyber world and how to get the IP of a remote system to which you are connected. I hope you find my writings very easy to undertstand. I know I lack the capacity of explaining myself but I try my level best to make things very easy and clear for you’ll.
How to get the IP of a remote system while chatting through msn messenger ::
[One of the oldest tricks in the Trade]
This is a tutorial on how to get IP address from MSN messenger. This is actually
a really easy thing to do. It is not like going through the hard time and reversing
MSN messenger like many people think.
The IP address is only given when you accept or are sending a file through MSN
messenger. When you send IM's, the message is sent through the server thus hiding
your victims IP and your. But when you send a file or recieve a file, it is direct
connection between the two computers.
To obtain the IP accept a file transfer or send a file to the victim, when the file
sending is under way from the dos prompt type "netstat" without the quotation marks.
You should get a table like this:
Proto Local Address Foreign Address StateThe top name in the list is the server's address for IMing. There could be many of
TCP kick:1033 msgr-ns29.msgr.hotmail.com:1863 ESTABLISHED
TCP kick:1040 msgr-sb36.msgr.hotmail.com:1863 ESTABLISHED
TCP kick: <REMOTE HOST> ESTABLISHED
the second name in the list, as a new connection is made to the server for every
room you are IMing to. You are looking for the address of the remote host in
this table it may be something similar to "host63-7-102-226.ppp.cal.vsnl.com" or “203..64.90.6”.
without the quotation marks.
All you need to do now is to put this address in you IP lookup programe and get the IP of the remote system.
Well 50%of the work is done now. Now you know how to get the IP of a remote system, so its time to trace it down and find some details about the IP.
Tracing an IP is quite simple. You can do it the easy way by using some sweet softwares Visual IP Trace,Neotrace
Download Visual IP trace
or by our way ie. Using MS DOS or any other version of DOS.
Well I suggest you to use DOS and its tracert tool for tracing the IP cause using it will give you a clear conception about the art of tracing an IP and I guarantee that you will feel much satisfied on success than using a silly software. Furthur you will know how things work and how the IP is traced down and the different networks associated in this tracing process.
Let us take a look at tracert tool provided for DOS by Microsoft.
It is a very handy tool for peoples need to trace down an IP.
Just open any DOS windows and type tracert.
Usage: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name
Options:You will now see a description of the tracert command and the switches associated with it.
-d Do not resolve addresses to hostnames.
-h maximum_hops Maximum number of hops to search for target.
-j host-list Loose source route along host-list.
-w timeout Wait timeout milliseconds for each reply.
Well these switches doesn’t makes much difference. All you can do is to increase the timeout in milliseconds by using –w switch if you are using a slow connection and the –d switch if you wish not resolve address to hostnames by default.
By default tracert performs a maximum of 30 hops trace. Using the –h switch you can specify the number of hops to perform.
Now its time for execution.
Let us trace down the IP Google.com [126.96.36.199]
TIP: If you have done a long research (I mean a lot) then simply looking at the IP you can figure out some info from it. For example the IP 188.8.131.52 indicates that the system is in India. In India IPs generally begin with 203 and 202
C:\Documents and Settings\XERO>tracert www.google.comNote: Here I have traced Google.com. In place of Google.com you can give the IP of yahoo or any other IP you want to trace, the result will be the same.
Tracing route to www.l.google.com [184.108.40.206]
over a maximum of 30 hops:
1 12 ms 15 ms 15 ms 220.127.116.11
2 15 ms 15 ms 15 ms 18.104.22.168
3 * * * Request timed out.
4 * * * Request timed out.
5 15 ms 15 ms 15 ms 22.214.171.124
6 62 ms 62 ms 62 ms 126.96.36.199
7 62 ms 62 ms 62 ms 188.8.131.52
8 593 ms 609 ms 609 ms 184.108.40.206
9 608 ms 624 ms 609 ms 220.127.116.11
10 93 ms 77 ms 77 ms 18.104.22.168
11 93 ms 78 ms 77 ms 22.214.171.124
12 78 ms 78 ms 77 ms im-in-f104.google.com [126.96.36.199]
Now carefully looking at the results you can figure out many information about Google’s server [188.8.131.52]
First packets of data leave my ISP which is at 184.108.40.206.Similarly you can find out the different routers through which the packets of data are send and received to and from the target system. Now take a look at the 13th line and finally look at the target system ie. Google’s server im-in-f104.google.com. Now you got the address of Google’s server. Now put this address in any IP lookup programe and perform and reverse DNS lookup and you will get most of the info about this address,like the place where it is in.
Well another thing you can find out using the tracert tool is that the number of hops (routers) the target system is away from you. In case of tracerouting Google.com we find that the target system ie Google’s server is 16 hops away from my system. This indicates that there are 12 routers between my system and Google’s server.Apart from tracing an IP you can find out many usefull details about the target system using the tracert tool.
While tracerouting a target system, if you get * as an output then it indicates timeout error. Now if you peform another tracerout to the same taeget system at some other time with a good connection and in this way few times more and if you always get * as the output then take it for sure that the target system is running a firewall which prevents sending of data packets from the target system.
Some days ago I tried to tracert hotmail’s server in plain and simple way using tracert without any trick.This is what I found out :
C:\Documents and Settings\XERO>tracert www.hotmail.com
Tracing route to www.hotmail.aate.nsatc.net [220.127.116.11]
over a maximum of 30 hops:
1 18 ms 15 ms 15 ms 18.104.22.168
2 140 ms 156 ms 15 ms 22.214.171.124
3 * * * Request timed out.
4 * * * Request timed out.
5 15 ms 15 ms 15 ms 126.96.36.199
6 546 ms 546 ms 531 ms 188.8.131.52
7 78 ms 78 ms 78 ms 184.108.40.206.static.vsnl.net.in [220.127.116.11]
8 187 ms 187 ms 187 ms 18.104.22.168
9 187 ms 187 ms 187 ms glgate201-g2-0.kornet.net [22.214.171.124]
10 187 ms 187 ms 187 ms 126.96.36.199
11 312 ms 312 ms 312 ms 188.8.131.52
12 312 ms 312 ms 312 ms 184.108.40.206
13 312 ms 312 ms 328 ms 220.127.116.11
14 312 ms 312 ms 312 ms 18.104.22.168
15 * * * Request timed out.
16 * * * Request timed out.
17 * * * Request timed out.
(This continues till 30th hop)
Trace complete.I performed the same tracert many times a day but concluded with the same result. This indicates that the systems after the router 15 has firewalls installed which prevents the outgoing of data packets.
Detecting Traceroute Attempts on your System
You can detect that an attacker is performing a traceroute on your system, if you see the following symptoms:
1. If you observe port scans on very high UDP ports. This symptom means that the attacker has performed a traceroute on your system. However, it could also mean a simply port scan. Either way, it signifies the fact that your system is being scanned.
2. If the packet-monitoring tool installed in your network, picks up several outgoing TTL-exceeding messages, then it is yet another sign that someone is doing a traceroute on your system.
3. If in these log files, you also observer an outgoing ICMP port unreachable error message, then it means that since a traceroute was done on your system and as the target system i.e. your system, was reached, it responded with this error message.
You can also find our more information on the attacker (if he performs a traceroute on your system) by simply studying the sniffer log files. If you observer the TTL values, then we can easily figure out the following information on the attacker by making use of OS detection techniques discussed earlier in this white paper:
- The Operating System running on the attacker’s target system.
- Number of hops away, the attacker is from you.
UNKNOWN SOURCE .PROBABLY BY ANKIT FADIYA (By way of writing) . Article Modified According to Present Day norms.
LOCK KEYBOARD AND MOUSE USING VB.NET
This Code will lock the Keyboard and Mouse Using SendKeys function.Just compile it in VB.NET.
' must have this in order to use the SendKeys function
Public Class WinControl
' This is the function used in order to block the keyboard and mouse:
Declare Function BlockInput Lib "User32" _
(ByVal fBlockIt As Boolean) As Boolean
' This function will block the keyboard and mouse untill a window with
' the specify caption will appear or the given time in seconds has
' past ( 0 seconds - wait forever).
' If the window with the caption appears than the given key is send
' to it and the input block is removed.
Public Shared Function Wait2Send(ByVal caption As String, _
ByVal keys As String, ByVal seconds As Integer)
' Indicates if the window with the given caption was found
Dim success As Boolean = False
' Start time of the function
Dim now As DateTime = DateTime.Now
' Begining of keyboard and mouse block
While (success = False And (DateTime.Now.Subtract(now).Seconds _
< seconds Or seconds = 0))
' Activating the window with desired function
' if the window is not found an exception is thrown.
' Sending desired key stroke to the application window
' Indicates the window was found and keys sent
success = True
' Assuming window was not found and sleep for 100 miliseconds
' Release the keyboard block
I am asked at least 5 or more times a day by young, beginning "hackers", "How can I hack?" or "Is there a way to hack a web site?"
Well there is. There are, in fact, literally hundreds of ways to do this. I will discuss a few in this text to get you started. Every hacker has to start somehow and hacking web servers and ftp servers is one of the easiest ways.If you are reading this I am assuming that you already have a basic knowledge of how web servers work and how to use some form of UNIX. But I am going to
explain that stuff anyway for those of you who don't know.
Part 1: Simple UNIX Commands
Most DOS commands have UNIX and Linux equivalents. Listed below are
some of the main commands you will need to know to use a shell account.
HELP = HELPTo see who else is on the system you can type WHO. To get information about a specific user on the system type FINGER <username>. Using those basic UNIX commands you can learn all you need to know about the system you are using.
COPY = CP
MOVE = MV
DIR = LS
DEL = RM
CD = CD
Part 2: Cracking Passwords
On UNIX systems the file that contains the passwords for all the users on the system is located in the /etc directory. The filename is passwd. I bet your thinking....
"Great. All I have to do is get the file called /etc/passwd and I'll be a hacker."
If that is what you are thinking then you are dead wrong. All the accounts in the passwd file have encrypted passwords. These
passwords are one-way encrypted which means that there is no way to decrypt them. However, there are programs that can be used to obtain passwords from the file. The name of the program that I have found to be the best password cracker is called "Cracker Jack" This program uses a dictionary file composed
of thousands of words. It compares the encrypted forms of the words in the list to the encrypted passwords in the passwd file and it notifies you when it finds a match.However you can use others like “Cain and Abel” or “John The Ripper (JTR)”
To get them,never forget that GOOGLE IS YOUR BEST FRIEND !!!Some wordlists can be found at the following ftp site: sable.ox.ac.uk/ pub/wordlists. To get to the wordlist that I usually use goto that ftp site then goto the American directory. Once you are there download the file called dic-0294.tar.Z which is about 4 MB. To use that file it must be uncompressed using a program like Gzip for DOS or Winzip for Windows. After uncompressing the file it should be a text file around 8 MB and it is best to put it in the same directory as your cracking program. To find out how to use Cracker Jack/John The Ripper just read the documentation that is included with it.
Part 3: The Hard Part (Finding Password Files)
Up till now I have been telling you the easy parts of hacking a
server. Now we get to the more difficult part. It's common sense. If the system administrator has a file that has passwords for everyone on his or her system they are not going to just give it to you. You have to have a way to retrieve the “/etc/passwd” file without logging into the system. There are 2 simple ways that this can sometimes be accomplished. Often the “/etc directory”
is not blocked from FTP. To get the passwd file this way try using an FTP client to access the site anonymously then check the “/etc” directory to see if access to the passwd file is restricted. If it is not restricted then download the file and run Cracker Jack on it. If it is restricted then try plan B. On some systems there is a file called PHF in the “/cgi-bin” directory. If there is then you are in luck. PHF allows users to gain remote access to files (including the “/etc/passwd” file) over the world wide web. To try this method goto your web browser and type in this URL:
For example, if I wanted to hack St. Louis University (and I have already) Iwould type in
Here's a hint: try www.spawn.com and www.garply.com
If the preceding to methods fail then try any way you can think of to get that file. If you do get the file and all the items in the second field are X or ! or * then the password file is shadowed. Shadowing is just a method of adding extra security to prevent hackers and other unwanted people from using the password file. Unfortunately there is no way to "unshadow" a password file
but sometimes there are backup password files that aren't shadowed. Try looking for files such as “/etc/shadow” and other stuff like that.
Part 4: Logging In To "Your" New Shell
OK....This is where you use what you found using Cracker Jack.
Usernames and passwords. Run your telnet client and telent to the server that you cracked the passwords for, such as www.slu.edu. When you are connected it will give a login screen that asks for a login names and password and usually information on the operating system that the server is using (usually UNIX,
linux, aix, irix, ultrix, bsd, or sometimes even DOS or Vax / Vms). Just type in the information you got after cracking the passwd file and whatever you know about UNIX to do whatever you feel like doing. But remember that
“Hacking isn't spreading viruses or causing damage to other computer systems. It is using your knowledge to increase your knowledge. “Part 5: Newbie Info
If you feel that you have what it takes to be a serious hacker then you must first know a clear definition of hacking and how to be an ethical hacker. Become familiar with Unix environments and if you are only just starting to learn to hack, visit a local library and find some books on various operating systems on the Internet and how they work. Or you could go to a book store and buy a couple Internet security books (They often explain how hackers penetrate systems and that is something a beginner could use as an advantage.),Join forums,read Ebooks and gather as much as data and information you can collect.
Nokia N95 Tips and Tricks
This tips and tricks section will be split into two halves-
. Improving battery life, as anyone who owns a N95 will know the battery drains pretty quickly.
. Other tips and tricks that might be useful.
Maximising the Nokia N95 Battery Life.
Cycle the Battery
The first thing to do to improve the battery life, and the one which I found gave the best battery gain, is to give the battery one complete charge/discharge cycle. When first taking the phone out of the box allow the battery to charge completely before unplugging it from the power adapter. Then do everything you can to drain the battery, turn on the Bluetooth, turn on the Wi-Fi, play music, whatever it takes to drain the battery. Your goal is to drain the battery to the point where it shuts itself off, even when it shuts itself off try and turn it on again and keep draining the battery. Keep doing this till the phone will no longer boot. When this happens take the battery out and wait a few seconds. Replace the battery and attempt to turn it on again, if it turns on then use it till the phone shuts off again. Now place the N95 back on charge and leave until the charging cycle is complete. When using the Nokia N95 now it will seem to last a lot longer on battery before you get warning messages of low battery. I have a theory about how this process seems to increase battery life which may be entirely inaccurate, if so and you know why this has this effect then please share your views via the forum. I believe that this process does not change the battery in any way, rather it serves as a method in which to calibrate the N95 as to how long it can operate with the voltage that remains. Without putting the phone through a complete charge/discharge cycle the N95 has no choice but to refer to its default threshold which may have been set slightly higher when manufactured.
Turn off your Bluetooth.
The next thing to do to increase battery life is to switch the Bluetooth function to off when not in use. This may sound silly but a lot of people forget that their Bluetooth is on throughout the day, this wastes battery power and could also leave you open to an attack on your phone via Bluetooth if left switched on.
Switch off Wi-Fi Scanning.
Wi-Fi much like Bluetooth wastes battery power when in idle use. Make sure you turn this function off when not using it. This then also protects your phone from an attack via Wi-Fi.
Turn off 3G scanning if you don't use 3G.
Your Nokia N95 by default is set to periodically search for a 3G signal which also contributes to the depletion of the battery, if you don't use 3G then you can turn 3G scanning off by
Going to –> menu –> tools –> settings –> phone –> network: change the network mode setting to 'GSM'.
The three factors above will greatly increase your battery life, if you wanted to increase the battery life still further than you can perform these tasks as follows :
Adjust the Screen Brightness
The fact that the screen on your N95 lights up means that it's wasting energy, You can minimise the waste by turning down the brightness.
Go to -> menu –> tools –> settings -> general-> personalization-display: change the light sensor from the default position to 'minimum'.
Adjust the Light Time-Out.
The less time that your screen is lit up for, the more energy you're going to save.
You can adjust the light time-out by going to-> menu –> tools –> settings –> general –> personalization –> display : change the light time-out accordingly.
Power Saver Time-Out.
You can also adjust the length of time that the phone waits before going into power save mode. Obviously the sooner the Nokia N95 goes into power save mode, the more battery power you're going to save.
Go to –> menu –> tools –> settings –> general –> personalization –> display: reduce the power saver time-out option from 60 seconds to say 30 seconds.
Other Tips and Tricks
Switching Between Silent and General.
Did you know that there was a quick way to switch between the 'General' profile and the 'Silent' profile on the Nokia N95? With the keypad open just press and hold the '#' key.
Reducing the Time Between Image Captures.
Does it frustrate you that when you want to take photos in fairly quick succession you have to wait for the N95 to display the previously captured image before it will let you progress? Did you know that you can turn this feature off. When in the camera mode press options, settings - change the show captured image option to 'off'. The time between image captures is greatly reduced.
Go straight to Your Music.
If you press and then keep hold of the multimedia key it will cause you to go straight to your music player.
50+ Google Reader Productivity Hacks
Google Reader is already a tool that can be used to boost your productivity throughout the day by letting you view your favorite blog’s feeds and posts in one spot: through your Google account. But for those of us who tend to get bogged down in a lot of useless subscriptions and really need to cut down on the minutes (or hours) we spend procrastinating each day, there are a lot of little hacks to make Google Reader more productive. We’ve compiled a list of over 50 of our favorites here.
Use these basic but necessary keyboard shortcuts to make searching, organizing, sharing and reading your feeds more efficient.
- /: Use the forward slash to move your cursor to the search box and start looking for new stuff or saved items.
- g then u: Type g then u to go to your subscriptions.
- g then d: This shortcut will take you to the recommended page. If there are no recommendations, typing g then d will take you to the browse page.
- 2: Press 2 to see your subscriptions in a list view or headline view.
- ?: Find more keyboard shortcuts just for Google Reader by pressing the question mark.
- Shift-s: Pressing Shift-S will share or un-share the selected item.
- s: Star and un-star your highlighted items simply by pressing s.
- Shift-o: Open up the highlighted subscription or folder with this shortcut.
- g then h: Press g then h to go back to the Google Reader homepage.
- g then shift-s: This shortcut will take you to the “Your Shared Items” page.
- shift-n/p: n/p stands for Next/Previous, and using this combination will select the Next/Previous selection or folder.
- v: Open up the original page of the selected item in Google Reader.
- e: Quickly e-mail a page or other selection by pressing e when you’re in Google Reader.
- r: Check to see if anymore unread updates have been added when you hit the r button in the navigation.
Firefox users like their browser’s speed and ability to add on new scripts or buttons. Check out several Google Reader-specific hacks for Firefox here.
- Enhance Google Reader Preview: This script adds a Preview button so that you don’t have to open up an article or post all the way to read it.
- BlogThis2Me: The BlogThis2Me script lets you “blog Google Reader’s “BlogThis!” to your own blog system, not to blogger.com,” as long as you have Firefox and Greasemonkey.
- Smart Google Reader Subscribe Button: this script “adds an overlayed check icon when you’re subscribed to at least one of the feeds that the site advertises via auto-discovery.”
- Gbutts 1.5.1: Gbutts is short for Google buttons, and you can add your Google Reader button, as well as any other Google buttons, to your Firefox address bar.
- Better GReader: Better GReader works with Firefox adds a menu with extra options and features like Smart Subscribe, Preview Inline, Optimized Skin and others.
- Google Reader Watcher: Google Reader Watcher is an add-on that makes Firefox check your Google Reader for unread fees. This download does not require Greasemonkey.
- Quick Hide Message: Shave off milliseconds with this script, which “quickly hides the message displayed in Google Reader after performing renames, folder changes,” and other actions.
- Auto Add Feed: The Auto Add Feed script only adds feeds to Google Reader, instead of asking you where you want it to be saved.
- Title Unread Count: This hack moves the unread count in Google Reader to the front.
- Greasereader: Add even more hot keys to your Google Reader systems by reading this guide.
- Google Reader All Starred: Extract all of your starred items as links from Google Reader so that you don’t have to download each one.
- Google Reader Read by Mouse: Set up this script so that you can use a mouse-only system to read your feeds. It uses mouse buttons for the following actions: next item, previous item, and more.
Real Time Savers
If you’re serious about making your Google Reader visits more efficient, learn how to categorize by priority, use the “next” bookmarklet, and implement scripts that let you autoscroll, review your subscriptions and more.
- Categorize by priority: Stepcase Lifehack recommends categorizing your feeds by priority so that you don’t get bogged down in irrelevant articles.
- Google Reader Autoscroll: The autoscroll script lets you “view and mark items as read by means of a mouse wheel and keyboard shortcuts.”
- Mark All as Read: If you only want to read one article from a feed, you can mark everything else as read to weed out your extra entries.
- Google Reader Scroll Reducer: With this script, you’re able to comment on and view the original site without having to scroll to the top of page to get to the URL.
- The “Next” Bookmarklet: The Google Reader Blog discusses this hack, which “allows you to use Google Reader through just one link — clicking on it takes your browser to the next unread item in your reading list.”
- Review your subscriptions: Are you still getting subscriptions for some obscure hobby you were only interested in a year ago? Go through your subscriptions and delete any that you don’t really want emptied into your account regularly.
- Print Button v2.0: The Google Reader Print Button v2.0 allows users to print either the selected content or everything that’s displayed on the page in Google Reader.
- Gmail + Google Reader: Add Google Reader into your Gmail account so you don’t have to constantly switch back and forth.
- Google Reader Filter: Get rid of duplicate and unwanted content with this script.
- Tag your items: Take advantage of the tagging feature on Google Reader. It’s there to help you stay organized and more productive.
Social Media Hacks
How much time do you waste each day checking all of your social media accounts? These hacks let you sync up Google Reader with Facebook, Twitter, Tumblr, Google Chat and more.
- Google Reader + ma.gnolia: This basic script lets you add a Google Reader post to ma.gnolia.
- Google Reader Digg News: Add a Digg button to your Google Reader posts with this script.
- Tumblr: Sync up your Google Reader and Tumblr with this script. You can attach your reblog button or Share-on-Tumblr at the bottom of articles on Google Reader.
- Managing Your Shared Items: This post from the Google Reader Blog shows you how to add and remove friends from your Gmail or GChat account.
- Google Reader and Flickr: Now you embed Flickr videos into your Google Reader, so you don’t have to switch back and forth to share with extra friends or read their comments.
- Facebook Sharer + Google Reader: Share your favorite posts and articles with Google Reader friends and Facebook friends.
- Google Reader + del.icio.us: Use this script to define tags and links for a faster way of posting to del.icio.us.
- Google Reader + Twitter: Use this script to add reader posts to Twitter.
Add-Ons and Solutions
Try out these add-ons to customize your Google Reader experience and streamline your Google accounts.
- Google Reader Notifier: This extension keeps you updated by showing you how many unread items you have in your account.
- Add a Search: Add a search engine to your Google Reader account to make searching for items faster.
- Google Reader Optimized: Use this script to view Google Reader in a larger space. The last official update was in 2006, but Google Reader users have submitted updates.
- Google Reader Romeo Script: Check out this script to access Google Reader from your cell phone — if you don’t have an iPhone.
- Google Reader Button for Internet Explorer: IE users can add on a Google Reader to their browser using this tutorial.
- iPhone Skin: iPhone users can easily view Google Reader on their phones with this special skin from developer David Cann.
- Iris: View your Google Reader subscriptions in a Firefox sidebar.
- Go behind the scenes: If you want to know how many people have subscribed to a certain feed, you can use this tutorial to speed up your search times.
Source : Bootstrapper
Great Geek Sites
My favorite site by far, Lifehacker has featured our articles on numerous occasions.
This is just a great all-around site for random geek news. An essential subscription for me.
Of Zen and Computing
Zen Bliss is one of the best writers I've come across… and his site reminds me of Starbucks Zen Tea somehow. He's got a knack for explaining things so that anybody can understand.
Whoever this guy is, he comes up with some very unique tips.
Shell Extension City
Bob at ShellCity features new freeware applications every day.
Got some great tips on Windows and related topics.
Daily Cup of Tech
Another great geek site that covers a wide range of geek topics.
This site is just starting out, but judging from the quality of some of the stuff I've read so far, I've got high hopes that this will turn into something great.
Their slogan reminds me of Fish from Ally McBeal… but they also find the best linux content.
However if you r a windows user,you can get insights of Linux here
This is pretty much the best aggregator of how-to articles that I've found, covering almost every area.
Free Software Daily
This is a digg-style news site that focuses solely on open source software.
A to Z Adsense Tips and Tricks
Many websites out there are informative and attractive, but the only (and ofcourse the biggest) concern for webmasters is “how to make money with my website”. There are many publisher programs, but the following piece of text will focus on making money with Google Adsense program.
Steps to Increase Google CTR which means more money:
[a]. Strictly adhere to the google Polices and TOS. If you are not aware, here it is
[b]. Do not alter the Google Adsense code
[c]. Do not ask your friends or visitors to click on your Google ads. Do not offer incentives for users to click on google ads. Don’t label the Google ads with text other than “Sponsored Links” or “Advertisements”
[d]. Do not click on your own ads. Google can find it out easily and if it does, your account will be banned and all your money earned is gone. Do not reload your pages excessively. If you are testing your website layout with Google Adsense, you can try the google adsense preview tool. Google does not account any clicks made in the ads displayed in the preview tool.
[e]. Do not place google ads in pop-up windows, error pages or even empty pages.
[f]. Don’t start a website merely for making money from accidental clicks like “mesothelioma attorney” or “asbestos crisis”. You will never make money out these “made-for-adsense-only” websites. Instead, write on topics what you are passionate about. Don’t waste your money on high-paying adsense keywords lists.
[g]. For short content/articles, CTR(click through rate) is best when ads are placed just above the content
[h]. For long articles, CTR improves if ads are placed somewhere in middle of the content, as visitors read the long content and then they are looking for more resources.
[i]. Use Text Ads instead of Image Ads as users get more options. If you still want to display image ads, consider ad formats that support image ads. Statistics say that the 336×280, 300×250 medium rectangle or the 160×600 wide skyscraper works excellent, if you display multiple ad units on a page.
[j]. Reports tell that the following ad format/attributes works best,
border color = background color of your web site
background color = background color of your web site
link color = blue, color of your links
url color = black, #999999
text color = black, #333333, color of your main content
[k]. Always put ads above the main fold. Just have the following heatmap as a reference before placing your ads on your pages.
[l]. Placing images next to ads or above ads does help in attracting user attention, But google does not recommend.
[m]. Blend AdLinks with other navigation links or place horizontal adlinks at the top of your webpage. AdSense publishers are permitted to click on link unit topics on their web pages, provided that they do not click on any Google ads on the resulting page.
[n]. Request your friends or colleagues to navigate your website, watch their activity, it will provide vital clues about which regions on your website draw more user attention. Try putting ads near those areas.
[o]. You can put upto 3 adsense units on a page. Try putting a large skyscraper on the right navigation sidebar of your website. That area is close to the browser scrollbar. You can also add 2 AdSense for search boxes, 1 adlink unit and 1 referral button per product (i.e., 1 AdSense referral button and 1 Firefox plus Google Toolbar referral button).
[p]. The first few lines of your content are an important factor for determining what Ads are served on your webpage. That’s the right place to put keywords in bold (strong or <b> tags) or header tags (h1, h2, etc).
[q]. Always select the setting to open Google Adsense search box results in a new browser window, so you won’t lose your visitors. Click the Open search results in a new browser window checkbox and this add target=”google_window” to your form tag.
[r]. Maximum people think the search box is on the top right corner. So you know where to put it.
[s]. Don’t syndicate full content in your RSS. If people can read everything from the newsreader window itself, why would they visit your website where your ads are.
[t]. Use URL channels to determine performance of individual pages. I track my most popular pages with Google Analytics, Statcounter and create a channel for each of the URL. You can even track Adsense Clicks with Analytics
[u]. For low CTR pages, try changing titles or adding more content to get better focused ads
[v]. Block low paying advertisers with Filters. Why to loose a visitor for 0.01 cents. Use Overture or Google Adwords Keywords tool to discover keywords that are less popular with advertisers.
[w]. The AdSense for search Top Queries report shows you what your users are looking for, by listing the 25 most common searches conducted through your AdSense for search boxes. Use this report to identify additional topics to add to your site, or to keep track of your most sought-after information. Focus and improve that content.
[x]. Not everyone has an RSS reader. Use RSS to Email services like FeedBlitz, Bloglet or Rmail to let users subscribe to your blog by email.
[y]. Try experimenting until you get highest CTR. Placement of ads depends from site to site. What is good for Yahoo is not best for google. So, try try until you find a good CTR
Happy Money Making Guys :D
Don’t Get Caught With Google Adsense Click Fraud
Considering the money to be made with Adsense, it is no wonder that they would want to get back into it.
It is that same consideration why the Google Adsense click fraud is thought of and why many people are getting into it.
Click fraud is the act of clicking on ads for the purpose of costing the advertiser money. It is simply the same as paying out cash for false leads. Many people website owners are aware of this fraud and are sharing the same sentiment that this is the one big problem that Adsense is facing.
How do you prevent being involved in this fraud?
Majority of web hosts are offering access logs. Once this is offered to you, it is necessary that you hand it over to Google as well. This allows them to look for any suspicious activity on your site. Problems like this are very serious and giving it to them is saying that you would want to help them in any way you can in solving the problem.
It can also help if you have a click monitoring software. If you do not have one yet, you should try and get one. There is absolutely no major factor preventing you from having one because most of this software is free.
As usual, all the information you have received should be turned over to Google. This is showing Google that you too are fighting against click frauds and is in no way a part of it.
Study your server logs and watch for any activity that seems suspicious. Report anything that you may find odd, may it big or small thing.
You may want to consider disabling ads for your own IP address and local geographic area. This will certainly prevent accidents and will not make Google mistake another user as you. You can do through a htaccess file. This will avoid Google mistaking as clicking on your own ads and be kicked out because of it.
Keep your Adsense off on pop ups and pop unders.
Your ads should not be displayed on content sites that promote illegal activity or tampering of the legal rights of other people or business. Included in this are the content that is considered adult and gambling ones. If you think that you may be breaking this rule, immediately remove your content or Adsense from the web page.
Be truthful and confess up to Google about times when you might have clicked on your own as, whether accidentally or intentionally. Or the times when you have done something that is against the Terms of Service that they are implementing. Be honest about anything that you may have done that is wrong. Confessing is way better than Google learning about it eventually. It would mean eventual termination and no getting back what you have worked so hard for.
Do not tell your family or friends about Adsense on your website. Chances are they may start clicking on them to help you make money without you knowing it. They may be doing more harm to you than help by trying it in the first place.
If ever someone you know chanced upon your Adsense, make sure they understand that they cannot click on your ads under any circumstances. It would be wise to brief them on important things about Adsense and what not to do with them.
Most pay per click networks have different measures in hand to protect website owners against click frauds. Other search engines can track more than 50 data points, IP address, browser’s information, users session info and pattern recognition. They also have ’systems’ available that detects fraud. Not to mention the specialized teams monitoring how things are going and helping advertisers stop click frauds.
Google offers suggestion on how to avoid click fraud. Using ‘negative keywords’ can be used to keep your Adsense showing on products and services that are in no way related to yours. Adding tracking URLs to your links so you can track the traffic coming from Google.
Do not be caught in the Google click fraud. Be aware and be wary.
What is Adsense Formula?
If you’re just geatting started, there’s a simple formula for you to understand how to earn money with google adsense:
Revenue = Traffic * CTR * CPC
You probably understand what traffic means.
So CTR is Click Through rate, and it means how many of your visitors are clicking ads. It actually depends on how your site is adsense-optimized.
CPC is Cost Per Click. Different words have different costs. Some can be about $0,01, some are over $10.
How To Increase Your Utorrent Speed By 80%
What you need:
5 minutes of your time...
Lets get started...
If you don't have Utorrent, Get it from here...
Open it up and follow these screenshots...
Click apply and ok, Now follow these screen shots...
Right click the file like i did with the one in Utorrent and do this...
That is it, You have just tweaked the speed of Utorrent by 80%!
Remember, If the torrent has no seeds, This will not work!
by Rishabh Dangwal · 4
DETAILED ANALYSIS OF PERFORMANCE SPECIFICATIONS
The Xbox 360 processor was designed to give game developers the power that they actually need, in an easy to use form. The Cell processor has impressive streaming floating-point power that is of limited use for games.
The majority of game code is a mixture of integer, floating-point, and vector math, with lots of branches and random memory accesses. This code is best handled by a general purpose CPU with a cache, branch predictor, and vector unit.
The Cell's seven DSPs (what Sony calls SPEs) have no cache, no direct access to memory, no branch predictor, and a different instruction set from the PS3's main CPU. They are not designed for or efficient at general purpose computing. DSPs are not appropriate for game programming.
Xbox 360 has three general purpose CPU cores. The Cell processor has only one.
Xbox 360's CPUs has vector processing power on each CPU core. Each Xbox 360 core has 128 vector registers per hardware thread, with a dot product instruction, and a shared 1-MB L2 cache. The Cell processor's vector processing power is mostly on the seven DSPs.
Dot products are critical to games because they are used in 3D math to calculate vector lengths, projections, transformations, and more. The Xbox 360 CPU has a dot product instruction, where other CPUs such as Cell must emulate dot product using multiple instructions.
Cell's streaming floating-point work is done on its seven DSP processors. Since geometry processing is moved to the GPU, the need for streaming floating-point work and other DSP style programming in games has dropped dramatically.
Just like with the PS2's Emotion Engine, with its missing L2 cache, the Cell is designed for a type of game programming that accounts for a minor percentage of processing time.
Sony's CPU is ideal for an environment where 12.5% of the work is general-purpose computing and 87.5% of the work is DSP calculations. That sort of mix makes sense for video playback or networked waveform analysis, but not for games. In fact, when analyzing real games one finds almost the opposite distribution of general purpose computing and DSP calculation requirements. A relatively small percentage of instructions are actually floating point. Of those instructions which are floating-point, very few involve processing continuous streams of numbers. Instead they are used in tasks like AI and path-finding, which require random access to memory and frequent branches, which the DSPs are ill-suited to.
Based on measurements of running next generation games, only ~10-30% of the instructions executed are floating point. The remainders of the instructions are load, store, integer, branch, etc. Even fewer of the instructions executed are streaming floating point—probably ~5-10%. Cell is optimized for streaming floating-point, with 87.5% of its cores good for streaming floating-point and nothing else.
Game programmers do not want to spread their code over eight processors, especially when seven of the processors are poorly suited for general purpose programming. Evenly distributing game code across eight processors is extremely difficult.
Even ignoring the bandwidth limitations the PS3's GPU is not as powerful as the Xbox 360's GPU.
Below are the specs from Sony's press release regarding the PS3's GPU.
Independent vertex/pixel shaders
51 billion dot products per second (total system performance)
136 "shader operations" per clock
The interesting ALU performance numbers are 51 billion dot products per second (total system performance), 300M transistors, and more than twice as powerful as the 6800 Ultra.
The 51 billions dot products per cycle were listed on a summary slide of total graphics system performance and are assumed to include the Cell processor. Sony's calculations seem to assume that the Cell can do a dot product per cycle per DSP, despite not having a dot product instruction.
However, using Sony's claim, 7 dot products per cycle * 3.2 GHz = 22.4 billion dot products per second for the CPU. That leaves 51 - 22.4 = 28.6 billion dot products per second that are left over for the GPU. That leaves 28.6 billion dot products per second / 550 MHz = 52 GPU ALU ops per clock.
It is important to note that if the RSX ALUs are similar to the GeForce 6800 ALUs then they work on vector4s, while the Xbox 360 GPU ALUs work on vector5s. The total programmable GPU floating point performance for the PS3 would be 52 ALU ops * 4 floats per op *2 (madd) * 550 MHz = 228.8 GFLOPS which is less than the Xbox 360's 48 ALU ops * 5 floats per op * 2 (madd) * 500 MHz= 240 GFLOPS.
With the number of transistors being slightly larger on the Xbox 360 GPU (330M) it's not surprising that the total programmable GFLOPs number is very close.
The PS3 does have the additional 7 DSPs on the Cell to add more floating point ops for graphics rendering, but the Xbox 360's three general purpose cores with custom D3D and dot product instructions are more customized for true graphics related calculations.
The 6800 Ultra has 16 pixel pipes, 6 vertex pipes, and runs at 400 MHz. Given the RSX's 2x better than a 6800 Ultra number and the higher frequency of the RSX, one can roughly estimate that it will have 24 pixel shading pipes and 4 vertex shading pipes (fewer vertex shading pipes since the Cell DSPs will do some vertex shading). If the PS3 GPU keeps the 6800 pixel shader pipe co-issue architecture which is hinted at in Sony's press release, this again gives it 24 pixel pipes* 2 issued per pipe + 4 vertex pipes = 52 dot products per clock in the GPU.
If the RSX follows the 6800 Ultra route, it will have 24 texture samplers, but when in use they take up an ALU slot, making the PS3 GPU in practice even less impressive. Even if it does manage to decouple texture fetching from ALU co-issue, it won't have enough bandwidth to fetch the textures anyways.
For shader operations per clock, Sony is most likely counting each pixel pipe as four ALU operations (co-issued vector+scalar) and a texture operation per pixel pipe and 4 scalar operations for each vector pipe, for a total of 24 * (4 + 1) + (4*4) = 136 operations per cycle or 136 * 550 = 74.8 GOps per second.
Given the Xbox 360 GPU's multithreading and balanced design, you really can't compare the two systems in terms of shading operations per clock. However, the Xbox 360's GPU can do 48 ALU operations (each can do a vector4 and scalar op per clock), 16 texture fetches, 32 control flow operations, and 16 programmable vertex fetch operations with tessellation per clock for a total of 48*2 + 16 + 32 + 16 = 160 operations per cycle or 160 * 500 = 80 GOps per second.
Overall, the automatic shader load balancing, memory export features, programmable vertex fetching, programmable triangle tesselator, full rate texture fetching in the vertex shader, and other "well beyond shader model 3.0" features of the Xbox 360 GPU should also contribute to overall rendering performance.
The PS3 has 22.4 GB/s of GDDR3 bandwidth and 25.6 GB/s of RDRAM bandwidth for a total system bandwidth of 48 GB/s.
The Xbox 360 has 22.4 GB/s of GDDR3 bandwidth and a 256 GB/s of EDRAM bandwidth for a total of 278.4 GB/s total system bandwidth.
Why does the Xbox 360 have such an extreme amount of bandwidth? Even the simplest calculations show that a large amount of bandwidth is consumed by the frame buffer. For example, with simple color rendering and Z testing at 550 MHz the frame buffer alone requires 52.8 GB/s at 8 pixels per clock. The PS3's memory bandwidth is insufficient to maintain its GPU's peak rendering speed, even without texture and vertex fetches.
The PS3 uses Z and color compression to try to compensate for the lack of memory bandwidth. The problem with Z and color compression is that the compression breaks down quickly when rendering complex next-generation 3D scenes.
HDR, alpha-blending, and anti-aliasing require even more memory bandwidth. This is why Xbox 360 has 256 GB/s bandwidth reserved just for the frame buffer. This allows the Xbox 360 GPU to do Z testing, HDR, and alpha blended color rendering with 4X MSAA at full rate and still have the entire main bus bandwidth of 22.4 GB/s left over for textures and vertices.
When you break down the numbers, Xbox 360 has provably more performance than PS3. Keep in mind that Sony has a track record of over promising and under delivering on technical performance. The truth is that both systems pack a lot of power for high definition games and entertainment.
However, hardware performance, while important, is only a third of the puzzle. Xbox 360 is a fusion of hardware, software and services. Without the software and services to power it, even the most powerful hardware becomes inconsequential. Xbox 360 games—by leveraging cutting-edge hardware, software, and services—will outperform the PlayStation 3.
-- BY Douglas C Perry
Posted by XERO .ALL RIGHTS RESERVED.
Create a Game with Game Maker 7.0 Lite
- Download and install Game Maker 7.0 Lite from http://www.yoyogames.com/gamemaker/try (the game comes with a simple game called catch the clown that it teaches you how to build)
- Create a new sprite, and load an image of your character. Name it Char1.
- Then create an object. (click on the blue orb on the tool bar :) The sprite for this object should be "Char1."
- Then make a room, (also located on the tool bar) and place your new object inside. ( in the objects tab of the new room, select char1 and click the main room body to add it:)
- Set the object's actions. (Steps below)
- Press the add event button and select "arrow keys"(looks like a keyboard, no, not the ones with green or red arrows next to them:) . For example, select the up key, then in the actions window, put move actions. Explained below
- To add the actions, go to the move tab and select "jump to" not jump to random or anything. Set the parameters(put stuff in the text boxes.) You want to move up right? so in the Y variable textbox, little Y next to it:), put -4. Yes negative, the game works like a backward grid(for those geometry savvy:) Moving right is still positive X and moving left is negative X. Keep the X box at 0. You only want to move up with this key right? NO, up!:) Anyway, Start the game by clicking the play button. If you set this up right, then you should be able to move upwards.
- Repeat the steps above for all of the other keys, down, right, and left. Afterwards...
- Start your game and you will be able to move around.
If you're not happy with Game Maker 7.0, try these...
* StageCast Creator
* Game maker (GM)
* Dark Basic
* The Games Factory (TGF)
* RPG Maker XP
Things You'll Need
* A small image of your character.
* A decent internet connection(to stop freezing)
* A game program (see step 1 and tips)
"Browse the world without any limit for free with safety" New revolution in the field of proxy, simple to use and faster. No more slot limitations, time limits, geographical limits, bandwidth problems in same old proxies. Switch to UltraSurf 8.9
UltraSurf is the flagship software product from UltraReach Internet Corp. for Internet anti-censorship. It enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely.
As the safety and convenience of the users is our first priority, the most prominent features of UltraSurf 8 are that it has implemented a complex proxy with complete transparency and a high level of encryption on the Microsoft Internet Explorer (IE) platform. UltraSurf 8 enables users to browse any website freely just the same as using the regular IE browser while it automatically searches the highest speed proxy servers in the background.
UltraSurf 8 implements almost all browser functions based on HTTP and user needs, such as browsing websites, login and posting on web forums, using Web mail, uploading and downloading data files, real time audio, video and other multimedia programs, etc. Please refer to the “UltraSurf 8 Users Guide” for detailed information.
UltraSurf 8 is a green software, which means no installation process is needed nor system setting is required to change when using the software. It is simply an executable on Windows platform.
Download the UltraSurf 8 client software now
Download the UltraSurf 6 User Guide in English at:
Download Ultrasurf userguide
Note: The English version is for ultrasurf 6. You may use it as the reference for current version ultrasurf 8.
FreeGate is a software utility that enables Chinese and Iranian surfers to view websites banned by their government (see Internet censorship in the People's Republic of China). Developer Dynamic Internet Technology (DIT) estimates Freegate has 200,000 users.The software takes advantage of a range of proxy servers assigned to changeable internet addresses, which allows users in China, Iran and Myanmar access to sites banned by the Chinese, Iranian and Myanmar governments. The program exploits open proxies, which allow users to penetrate firewalls used to block web sites
by Rishabh Dangwal · 6
Virtual Dj Studio 5.3---
Virtual DJ Studio is not like all of the other DJ programs out there. While other programs limit you to two players with a Cross-Fader, Virtual DJ Studio provides you with an entire studio.
Virtual DJ Studio gives you a mixer-board interface. Each line offers things you would expect from a typical mixer - volume fader, mute, crossfader assignment, etc. Additionally, each line contains an MP3/WAV/Karaoke
player, with all of the controls you might expect - including a Pitch/Tempo control. If you have two or more sound cards/audio devices, you can route any line to your secondary device, for headphone preview or beat-matching. Alternatively, you might use this feature to simply allow more control with your external mixer.
DOWNLOAD AND ENJOY!!!!
by sa.m · 1
WINDOWS MEDIA PLAYER-12
Windows Media Player (WMP) is a digital media player and media library application developed by Microsoft that is used for playing audio, video and viewing images on personal computers running the Microsoft Windows operating system, as well as on Pocket PC and Windows Mobile-based devices. Editions of Windows Media Player were also released for Mac OS, Mac OS X and Solaris but development of these has since been discontinued.
SO FRIENDS ENJOY THE ENHANCED SOUND QUALITY BY DOWNLOADING IT NOW!!!!
by sa.m · 0
First of all I'm going to talk about ISO/OSI.
The Open Systems Interconnect Model (OSI)
The Open Systems Interconnect (OSI) model was developed by the International Standards Organization (ISO) and helps to identify how the functions of the protocols relate to each other. By showing how the functions relate, we'll define how the parts of the protocol stack connect to permit machines to effectively communicate. As we look at the OSI model, remember it is just a model concept- we don't actually see it when two hosts work together :]. The model, however, is the standard and to communicate we must adhere to it. Basically if two computers that are have similar configuration, they will communicate. If their not, you may end up get nasty error messages, failure to initialize services, or no communication at all.
The OSI Model contains seven layers:
The chart below compares the layers of the ISO-OSI model to the layers of the DoD model. These models give us a sense of how the communication is expected to take place. Moving from the highest layers down to the wire, we see the application needs to be able to operate without being concerned about identifying all of the lower-level hardware and maintaining drivers for each device.
1. The Application Layer provides support to any end user application programming interface. This layer is responsible for working with the originated data stream and communicates them with lower levels. Examples of Applications Programming Interface (API) would be Mail API (MAPI), MS Fax API (FAPI), Telephone API (TAPI), and internet Server API (ISAPI).
2. The Presentation Layer provides platform to platform translation of syntax for the purpose of data exchange. Modification of data according to a common set of rules is done at this layer. Compression and encryption, for instance, are also done here.
3. The Sessions Layer provides for the establishment, maintenance, and recovery form failures that occur between applications. When 2 computers establish a session to share data, control of the flow and direction, and the recovery of missing and corrupt data, is the responsibility of this layer. Depending on the type of application, you might see a simplex, a half-duplex, or a full-duplex of data flow. Simplex is a one-way data flow. Half duplex is basically the same as simplex but implies that there is a duplex channel to permit full duplex if configured to do it. Full duplex provides two-way data flow. By providing appropriate checkpoint methods, the wire between both the computers can stay full of data. Only the data that does not make it properly to the other computer needs to be resent.
4. The Transport Layer guarantees the data is delivered in the right order and in a reliable manner. Here again we consider error checking and correction as a means to put the information in the right order and to make certain that the whole message is received.
5. The Network Layer provides routing between internetworks and shields the layers above from the details of the lower layers (the physical topology for example). It is at this level that we first find addressing (IP Address)
6. The Datalink Layer provides reliable transfer of data across the physical link (i.e. the LAN cable). The datalink layer functions to provide formatting, error detection, link management, and data flow control. Again we find addressing, this time at the hardware layer (Example: Hardware address of the network interface card.)
7. The Physical Layer accepts data from the datalink layer and puts in the right format for the physical medium. this layer specifies the requirements for the wire such as voltage levels, connector types, and handshake.
Department of Defense (DoD) Overview
More than one theory can be used to identify how components in the TCP/IP protocol stack connect dissimilar systems. This is how each Microsoft TCP/IP component or utility fits this model.
The DoD four-layer mode contains:
Network Interface Layer
Transport (transmission) Layer
Application Layer (known earlier as process layer)
The Network Interface Layer is the lowest layer in the model. It is responsible for putting frames on and off the wire. In order to get the frames to higher levels, which is where the routing and switching take place, there must be information that permits computers to find each other on the subnetwork. This is the network address of the network card. The Network Interface Card (NIC) contains a hardware address that is mapped to and used by the higher level protocols to pass the information up and down the stack and back and forth across the wire.
TCP/IP can be used in a wide variety of LAN, WAN, and dial-up environments. Supported LAN typed include: Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), and ARCnet. Supported WAN types include serial lines and packet-switched networks such as X.25, Frame Relay, and ATM. Metropolitan Area Network (MAN) types of topologies supported using TCP/IP are the same as the previously mentioned WAN types.
Each of the LAN, MAN, WAN, and Dial-up types have different requirements for cables, signaling, data encoding, and so on. The Network Interface layer specifies is the equivilent to the Datalink and Physical layers of the OSI Model as shown up on the chart.
The Internet Layer has protocols that provide three specific serives:
1. A connectionless delivery service
2. A mechanism to break the data up into individual packets of frames on the transmitting side and to put back together on the recievers side. This is process I believe is also known as Fragmentation and Reassembly.
3. The routing functions necessary to interoperate with other networks.
Five protocols are implemented at this layer:
-The Internet Protocol (better known as IP) which addresses and routes packets
-The Address Resolution Protector (ARP) which determines the hardware address at the recieving host.
-Internet Control Message Protocol (ICMP) which sends error messages to the IP when problems crop up.
-Internet Group Management Protocol (IGMP) which informs the routers of the availability of multicast groups.
These protocols do their jobs by encapsulating internet datagrams and running all the necessary routing algorithms. (A datagram is a connectionless or one way communication--It is sent with no configuration. Just like when you send a letter to someone) The user data orriginates in one of the higher level protocols and is passed down to the internet layer. The router, then, examines the IP of the datagram to determine whether the destination is local or not (remote). If both machines are on the same network (this is called a local network), the datagram is forwarded directly to the destination of the host. If the destination is on another network (this is called a remote network), the datagram is forwarded to the default gateway (locally attached gateway--router--to remote networks).
When a network joins the Internet, the administrator must apply for and recieve a valid IP network and host the number from Internet and Information Center (InterNIC). The hosts carry out the functions mentioned here through the use of these numbers, which, when combined, is known as an IP address.
The Transport Layer has protocols that provide communications sessions between connected computers. The desired method of data delivery determines the transport protocol. The two transport protocols provided within TCP/IP are the transmission control protocols, and the User Datagram Protocol (UDP). TCP provides the virtual circuit service to make the end-to-end connection for the applications. Data Transfer is made reliable throught the use of connections and acknowledgements. The UDP provides delivery but does not use connections or acknowledgements, so it is less reliable but faster. These connectionless protocols I think are define unreliable because nothing is telling you the data was received at the right place. If that's confusing, try to think of it as a letter. You send the message but their is no way of knowing it reached it's intended recipient. A connection-oriented protocol however is kind of like making a phone call. You can tell the person on the other side received the message, and possibly understood it.
The terms "host-to-host" or transmission layer are used interchangeably with the transport layer. The Transport Layer is responsible for error detection and correction in the DoD model and is analogous to the Transport Layer in the OSI model.
In the Application Layer Microsoft implements two program interfaces at the application layer to allow the applications to utilize the services of the TCP/IP Protocol Stack. These are Windows Sockets and NetBIOS.
The windows sockets interface provide a standard API under Microsoft Windows to many transport protocols such as IPX and TCP/IP. This open standard library of function calls, data structures, and programming procedures permits Windows applications to take advantage of the TCP/IP. This will pretty much allow you to exchange data with foreign or non-NetBIOS systems.
NetBIOS provides a standard interface to protocols that support NetBIOS naming and message services, like TCP/IP and NetBEUI. NetBIOS is used in Microsoft products to permit application communication, with lower layer protocols as well. Three TCP ports provide NetBIOS support. These are port 137 which is NetBIOS Name Service, port 138 which is Datagram Service, and port 139 for session service.
Here are some TCP/IP utilities and services at the application layer:
FTP, SMTP, SNMP, and Telnet
Oh by the way, I may not have been very clear on encapsulation. it's basically the process of adding a header to the data accepted from a higher protocol. When the application originates data, or sends a request to get data , the data or request moves down the total size of the information until it reaches the wire. The individual ones and zeros are sent via the wire to the remote computer where each of the headers is opened or peeled off, I try to think of it as peeling an onion.. idk =D. Anyways... The header information is stripped off at each layer and sent upward to reach, finally, the intended application.
Created By VAX