Thursday, November 3, 2011

GET THE PDF OF THE WEBSITE YOU WANT

PDF my URL

Usually, I don’t list a website for the top spot of the newsletter, but I simply had to today! If you’re looking for a quick way to save a webpage for offline viewing, then I suggest checking out PDFmyURL. Just go to http://pdfmyurl.com/, and put the address of the site you want to save in the box…



…now hit the nifty-looking “P” icon off to the right, let the site do its work, and when the download window pops up save it! It’s that easy! 

GOT TO KNOW ABOUT THE PEN FLICKS HERE

I think the reason people love touch screens is because of how natural the hand gestures feel. For example, to scroll down a document, it feels better to just swipe down instead of pressing a little arrow key. If you’re looking to bring some of these intuitive gestures to your Windows computer, then might I humbly recommend that you enable Pen flicks.
To utilize pen flicks, your computer must be touch screen, or your laptop’s trackpad must support gestures. If you have a graphics tablet, then that will also allow pen flicks as well.
Begin by pressing the Start button, and selecting Control Panel.
Select the Classic view, and double click Pen and Input Devices.
penflicks1

Now choose the Flicks tab, and check the box labeled Use flicks to perform common actions quickly and easily.
penflicks2

Now you have two options: the navigation flicks, or the navigational flicks with editing. I personally prefer the latter, as it allows me to copy and paste with ease. Choose the option that best suits you, and of course, you can always change this setting.
If you select Customize, you can hand select what action a flick in a certain direction will perform. If you’d like to add a custom keyboard shortcut, just select the add option. For example. I made it so that a downward flick will close the program using the keyboard shortcut Alt+F4.
penflicks3

Finally, one last setting I’d like to bring to your attention is the flick sensitivity. If you find that you have to repeat a gesture several times before Windows recognizes it, then you should make the sensitivity more relaxed. However, if you find gestures are occurring by accident, than you should move the slider to the precise setting.
penflicks4

I hope this setting makes your computer feel a little bit more natural. Enjoy!

AUTOMATIC IMAGE RESIZING


Automatic Image Resizing in Internet Explorer

Have you ever been browsing around, looking for images in Internet Explorer and come across a picture that you know won’t fit your screen, but you click on it anyways? Well, recent versions of IE have this neat feature called Automatic Image Resizing, which will shrink large images so they can be viewed with ease.

Today we’re going to learn how to turn it off. Why, you ask? Well, say you’re hunting around for high resolution images and you want a genuine idea of how big it really is. Automatic Image Resizing will need to be turned off to do so.

Automatic Image Resizing On
image

Automatic Image Resizing Off
image

Click Tools>Internet Options
and click the Advanced tab. Scroll down until you see “Enable Automatic Image Resizing” and un-check the box next to it. Now you’ll see images in their natural full-sized state! You can turn Automatic Image Resizing back on by following the same steps and re-checking the box.

Enjoy!

Wednesday, November 2, 2011

HOW TO REMOVE A PADLOCK TO YOUR FOLDER IN WINDOWS 7

In windows 7, when I look at user folders, I see some folders have padlocks on them and others do not, what causes this and how do I remove the “padlock”. When I look at the properties of each folder, I cannot detect any difference.

How to Get Rid of the Mysterious Padlock Icon From Your File Folder

Windows 7, as in previous version of Windows, allows the creation of multiple user accounts with varying degrees of privileges on the same computer or network. As such, there are users whom have the ability to make the same changes that the computer’s owner can make (Administrator accounts). There are also users with limited abilities in updating and changing computer settings (Standard User accounts,) and users with very limited privileges whom are dis-allowed from making nearly any change to the computer’s configuration (Guest accounts.) These differing account types allow for multiple users to use the same computer without, for the most part, disturbing the programs, settings, or display of others whom they share the computer with. Occasionally however, changes made from one user account can create confusion within other user accounts; particularly when actions on one user account change how familiar icons look or behave throughout all user accounts.

One such example can be found when a formerly normal looking shared file folder displays a padlock next to itself when viewed.

Baffling as this may be when first discovered, there’s actually a simple explanation for the odd little golden padlock icon suddenly appearing next to a previously standard looking folder: another user has changed its’ “permissions” and has “locked” the folder.

When creating shared file folders in Windows 7, there are a variety of options available which allow a user to safeguard information contained within these folders, by restricting how folders are shared amongst various users on the computer or network. By right clicking on a file folder, then selecting Properties, followed by the Security tab, you can view and modify various security options (permissions) available to different users, for that particular folder. Owners of a particular folder can choose to allow or deny other users full or partial abilities to view, edit, modify, or delete said folders and files contained within, as they see fit. As each user can change folder permissions, confusion can arise when multiple users start to change and update permissions without notifying other users of the computer on the network. Adding additional confusion, Administrator accounts and Standard User accounts have differing abilities when modifying folder permissions. Generally speaking, most permission changes made by a Standard User account, can be overridden by an Administrator account, but not vice versa.

image

As such, when you see a familiar file folder suddenly appear with a padlock next to it where there had previously been none, the first thing to do is to check the folders’ permission settings:

(Note: These steps assume you either have ownership of the folder in question, or are logging in using an Administrator account.)

Step 1. Right click the file folder.

image

Step 2. In the context menu which appears, select Properties.

image

Step 3. Click on the Security tab; find the name you log in with under Group or user names: and click to select it.

image

Step 4. The Permissions for box will update to show the permissions for the user account you selected.

image

Step 5. Scroll through the permissions list and check for any permissions which should not be associated with this folder (i.e. permission for Full Control of the folder has been set to deny for this user, when it should be set to allow.) If a wrongly set permission is found (any permission set to Deny,) follow these steps to fix it:

Step 5-1. Click the Edit button in the middle of the dialog box.

image

Step 5-2. In the dialog box which appears, select the user whose permissions are incorrectly set.

image

Step 5-3. Check the Full Control, Allow check box under Permissions for (NAME)

image

Step 5-4. Click the Apply button followed by the OK button on all dialog boxes, and check your folder icon.

image

Once permissions have been reset to Full Control, the padlock next to your folder icon should disappear. If any permissions are still set to Deny, the padlock will typically remain until Full Control is granted.

image

If, after following the above steps, you are still unable to remove the padlock icon from the folder, you may need to log in as an administrator or folder owner, backup all files located in the folder, delete, and then re-create the file folder to fully remove the errant icon. Doing so will also remove any previously defined permissions, and will un-share the folder from any other users who had been granted access to it. Why this process is occasionally necessary to clear the padlock icon from a file folder is not completely clear, other than that it is just an as yet unresolved glitch in Windows 7. However, if you really must rid your file folder of an annoying padlock icon, and all else fails, this method will usually do the job.

ADDITIONAL SECURITY TO YOUR FACEBOOK ACCOUNT

Facebook Login Notifications

Hey, Facebook users – Did you know that you can set up America’s favorite social networking site to send you an e-mail or even a text message if anyone tries to access your account from a new device?

It’s great for that extra layer of security – and I highly recommend it!
Here’s how:

While logged in to Facebook, click the arrow next to your name, then Account Settings.



Once at the Account Settings control panel click the security category off to the left, then click Edit.



Now simply choose how you’d like to receive a notification when/if your account is accessed from a new/different computer. Click Save Changes when you’re finished!


Added security to your system


Ctrl+Alt+Del to Log On – Windows 7

If you’re looking to add an extra layer of security to your Windows 7 system, then you may want to consider implementing a bit of a “human touch”, just to be extra sure. 

By requiring users to physically hit Ctrl+Alt+Del to access the log on screen in windows, you ensure that malicious programs (ones that try to mimic a system logon to hack passwords) can’t even make it through the front gate.

Here’s how you do it:


Hit Start, and in the search box type netplwiz – click the icon that appears in the list above.



Once the User Accounts window opens up, click the Advanced tab. At the bottom you’ll see the Secure logon field. Put a check in the box next to Require users to press Ctrl+Alt+Delete



Hit OK, and you’re all set! If you want to go back to a Ctrl+Alt+Delete-free world again, just follow these steps and un-check the box!

Tuesday, November 1, 2011

knowing network problems from command prompt

You don’t have to be an IT expert to troubleshoot pesky network and Internet connection problems.  All you need is the Command Prompt utility. Any computer users familiar with MS-DOS and Windows 3.1 recognize it. Well, that utility hasn’t gone away; it’s still around, just hidden in the background.
Here’s how to access it, and how to troubleshoot basic network problems from your computer.
Press the Windows key on your keyboard. Type the text cmd in the search box – in XP this is called “Run” – and press Enter.
Here’s what should appear:

Basic rule of troubleshooting: always start with the closest possible source. You need to check your own computer for network connectivity first. Type ping 127.0.0.1 and press Enter. Your Command Prompt window should look like this if your computer’s network card has no problems:


You’ve just sent four requests for dummy data to your computer’s “loopback” IP address and it (hopefully) replied to each one. An IP address is a unique tag for your computer that tells the server where to send data; the loopback address is used for testing your computer’s network card. If there were intermittent problems or if your card were completely non-functional, the ping would have experienced some loss.
The next step up the chain is your default gateway, which is in most cases the network router. Any data entering or exiting the network has to pass through the router. To diagnose the router, you need to ping its IP address. Type ipconfig at the command prompt and look for the entry next to “Default Gateway.”


Now, ping your router the same way you pinged the loopback address: type ping <your default gateway>. In this example, you’re pinging the default gateway at 10.0.0.1. If the connection between your computer and the router is strong and stable, all four of your data packets should get a response. If not, your router has connectivity problems. As a note, wireless connections are prone to drop signal, so keep that in mind when working with a wireless router.
Let’s say you’ve tested your computer and router and that everything checks out, but you still can’t connect to a webpage. So, perform the ping test on it. Let’s use Yahoo! for an example:

Yahoo! works. Just to be sure, do another ping test, this time to Google:

Google’s homepage checks out. If you were able to ping two remote sites successfully,  you don’t have a problem with your network or Internet connection.

Sunday, September 18, 2011

NASA: Satellite pieces to hit Earth in a week


WASHINGTON (AP) — U.S. space officials say they expect a dead satellite to fall to Earth in about a week.
NASA has been watching the 6-ton (5.4-metric ton) satellite closely. On Friday officials moved up their prediction for its arrival to Sept. 23, give or take a day.
NASA scientists have calculated the satellite will break into 26 pieces as it gets closer to Earth. The odds of it hitting someone anywhere on the planet are 1 in 3,200. The heaviest piece to hit the ground will be about 350 pounds (159 kilograms), but no one has ever been hit by falling space junk in the past.
NASA expects to give the public more detailed information early next week. For now, all continents except Antarctica could be hit by satellite debris.
___
UARS satellite: http://www.nasa.gov/mission_pages/uars/uars-concept.html

iBall Slide tablet launched in India


iBall has launched its first ever Android tablet, iBall Slide in India. Priced at Rs. 13,995, this tablet is powered by Android 2.3 operating system and 1 GHz ARM Cortex A8 processor.
iBall-Slide
iBall Slide has a 7 inch capacitive touchscreen display, internal storage of 8 GB which is expandable up to 32GB with the help of microSD card, 2 megapixel front camera, Bluetooth, USB host,and HDMI port.
iBall Slide lacks 3G and Wi-Fi connectivity but it can be attached with external dongle. iBall Slide comes pre-installed with apps like E-mail, web browsing, social networking, gaming, document to go and more. iBall Slide is powered by 4400 mAh battery which offers 6.5 hours of music playback and 5 hours of video playback.

Thursday, September 15, 2011

Future of Glass (Day Made of Glasss)


Corning Inc's video of what they envision for the future, as portrayed by making everything inside a household made of glass and function digitally. The video really speaks for itself as to what could be the future of the common household in a few years from now. Some questions asked by experts on this field are; will the regular rates applied to the common household remain the same. Benchmark lending, Insurance options, and credit mortgages just to name a few. Since for many these things are modeled on current structuring in a household, would making giant technological advances change the norm? Do these things simply improve upon itself or are completely rebuilt from the ground up. Just as auto insurance could change with the future cars on the road, home insurance can head towards non massive changes in a system or it can change to a completely new set up. Will insurance become expensive and even too much for the normal person that can afford such a home, one of the many questions that could be raised. It is still a far fetched thing to guess insurance rates, and only thing that can happen is to let the future get here and well see for ourselves.

The Self Repairable Vehicle for the Future (Concept)

Audi A9 (Future Concept)
Audi, the great manufacturer of luxury and amazing cars has proposed a plan for a unique car unlike the world has ever seen before. Though this concept has been floating around for sometime now, the jaw dropping effects still remains when one hears "being able to fix itself automatically". The Audi A9 is a concept car from reputed Spanish designer; Daniel Garcia. The car is a low emission hybrid for the future. It Features a single-piece widescreen windshield and a roof formed by nanotechnology material which in a funny way has yet to be discovered that has a unique "automatic-system" that repairs damage and can be adjusted for colors and opacity.
Another amazing feature is the "electronic painting" system that would allow the owner to change color by pressing a single button. Any color desired can be applied to the vehicle in a simple one-step process. Only time will tell if this car will ever see the light of day.
(Source: Audi Concepts, Future Concepts)

Credit Card of the Future( Credit Card 2.0)

There has been an upwards trend on gadgets and peripherals implementing credit cards that are making transactions as easy as a swipe and click anywhere. Well credit cards are about to get even more fancy due to some awesome futuristic tech, call it the credit card 2.0.
Major banks such as Chase, Capital One, Wells Fargo and Citi Bank in the near future could offer these type of credit card to its customers. This concept card allows users to simultaneously link all their accounts in one card, hide their account number digitally, and deactivate the magnetic strip until it needs to be used again.  Talk about secure and insurance all under one plastic card. Whats great is this card works just like any other credit card. Works will  all magnetic readers, so its not necessary to go and replace current credit supporting applications. Would have same 0 apr card credit fee as any other card depending on bank, and rules and eligibility requirements.
The card makes use of a pin to show the credit card number, much like a smartphone lock screen requiring a code to get inside the smartphone, etc. Several banks are in talks with the company Dynamics, maker of this awesome tech, to make use of such cards. Your future Chase, Bank of America, Citi Bank, and Capital One credit card could very well be one of these awesome 2.0 Cards. I personally would like having one of these. What's not to like about a futuristic looking card offering security ,insurance, and easy of personal convenience all in one card.

Friday, September 2, 2011

A DIY UAV That Hacks Wi-Fi Networks, Cracks Passwords, and Poses as a Cell Phone Tower






Just a Boy and His Cell-Snooping, Password-Cracking, Hacktastic Homemade Spy Drone via Rabbit-Hole
Last year at the Black Hat and Defcon security conferences in Las Vegas, a former Air Force cyber security contractor and a former Air Force engineering systems consultant displayed their 14-pound, six-foot-long unmanned aerial vehicle, WASP (Wireless Aerial Surveillance Platform). Last year it was a work in progress, but next week when they unveil an updated WASP they’ll be showing off a functioning homemade spy drone that can sniff out Wi-Fi networks, autonomously crack passwords, and even eavesdrop on your cell phone calls by posing as a cell tower.
WASP is built from a retired Army target drone, and creators Mike Tassey and Richard Perkins have crammed all kinds of technology aboard, including an HD camera, a small Linux computer packed with a 340-million-word dictionary for brute-forcing passwords as well as other network hacking implements, and eleven different antennae. Oh, and it’s autonomous; it requires human guidance for takeoff and landing, but once airborne WASP can fly a pre-set route, looping around an area looking for poorly defended data.
And on top of that, the duo has taught their WASP a new way to surreptitiously gather intel from the ground: pose as a GSM cell phone tower to trick phones into connecting through WASP rather than their carriers--a trick Tassey and Perkins learned from another security hacker at Defcon last year.
Tassey and Perkins say they built WASP so show just how easy it is, and just how vulnerable you are. “We wanted to bring to light how far the consumer industry has progressed, to the point where public has access to technologies that put companies, and even governments at risk from this new threat vector that they’re not aware of,” Perkins told Forbes.

Scientists Fit Cyborg Beetles With Generators that Turn Their Own Wings into Power Plants




For years now, DARPA and other free-thinking research institutions have been developing micro-air-vehicles (MAV), usually modeled after insects. But building a tiny, lightweight flying robot is tough when you need a power supply--like an onboard battery--to keep the MAV flying. Then researchers turned to insect mind control--implanting live insects with machinery that lets humans manipulate their movements--but the problem remained: neural control hardware requires a battery to run.
Now, a team of Michigan researchers may have finally solved the battery problem by demonstrating an energy scavenger that derives power straight from the insects own wing motion. Using a tethered Green June Beetle and a couple of piezoelectric generators mounted on its wings, the researchers were able to generate 45 µW (that’s microwatt, or one one-thousandth of a milliwatt) of power.
What’s more, they think they could improve that by an order of magnitude if they made the beetle a true cyborg and directly implanted the generators to the insect’s flight muscles. That’s enough power to run the onboard neuro-hardware needed to manipulate the beetles--which means basically the ability to tell a Green June beetle to fly depends on the power generated from flight.
That’s pretty cool, considering DARPA and the rest of the cyborg insect research establishment has a variety of roles in mind for the sensor laden drone insects of the future, including search and rescue, intelligence and surveillance, environmental monitoring and the like.




Monday, August 22, 2011

RESUME FORMAT SAMPLES


resume1

resume2

resume3

resume4

resume5

resume 6

resume7
resume8

resume9

resume10

resume11

resume12


please become a member to receive the updates from this blog to your mails whenever i post the new things

Saturday, August 20, 2011

C Program to do Subtraction matrix by using 2D (2 Dimensional) Array

C Program to do Subtraction matrix by using 2D (2 Dimensional) Array:-------------

#include <stdio.h>
#include <conio.h>
main()
{
	int a[2][2],b[2][2],c[2][2],i,j;
	clrscr();
	printf("Enter the elements of matrix a=\n");
	for(i=0;i<2;i++)
	{
		for(j=0;j<2;j++)
		{
			scanf("%d",&a[i][j]);
		}
	}
	printf("matrix is=\n");
	for(i=0;i<2;i++)
	{
		for(j=0;j<2;j++)
		{
			printf("%d\t",a[i][j]);
		}
		printf("\n");
	}
	printf("Enter the elements of matrix b=\n");
	for(i=0;i<2;i++)
	{
		for(j=0;j<2;j++)
		{
			scanf("%d",&b[i][j]);
		}
	}
	printf("Matrix is=\n");
	for(i=0;i<2;i++)
	{
		for(j=0;j<2;j++)
		{
			printf("%d\t",b[i][j]);
		}
		printf("\n");
	}
	for(i=0;i<2;i++)
	{
		for(j=0;j<2;j++)
		{
			c[i][j]=a[i][j]-b[i][j];
		}
	}
	printf("Substraction=\n");
	for(i=0;i<2;i++)
	{
		for(j=0;j<2;j++)
		{
			printf("%d\t",c[i][j]);
		}
		printf("\n");
	}
	getch();
}
Thanks Friends For Visiting..!

FOR TCS JOB PLACEMENT PAPER- 03 aug 2011

DOWNLOAD HERE


friends please be a follower if you like this blog