Rollback a Device Driver

If you install a device drive that does not work correctly,
you can restore the previous one fairly easily.

  1. Log in with an administrator account
  2. Right click on My Computer
  3. Select Properties
  4. Click on the Hardware tab
  5. Click on the Device Manager button
  6. Go to the device you want to reconfigure
  7. Click on the Driver tab
  8. Click on the Roll Back Drive button


Read more......

  1. Start Regedit
  2. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
  3. From there you can edit the name in the Registered Owner key


Read more......

Although you can log in locally without a password, by default, WindowsXP Pro does not allow network users to access the computer without a password. Typically you will receive an Unknown error 31 if this is the case.

To change this setting:

  1. Run gpedit.msc
  2. Go to Computer Configuration / Windows Settings / Security Settings / Local Policies / Security Options
  3. Double click on Accounts: Limit local account use of blank passwords to console login only
  4. Disable this option


Read more......

By default, the Desktop Cleanup Wizard will pop up every 60 days to cleanup your desktop.

To stop this:

  1. Right click on the desktop.
  2. Select Properties
  3. Click on the Desktop tab
  4. Click on the Customize Desktop button
  5. Uncheck Run Desktop Cleanup Wizard


Read more......

  1. Start Regedit

  2. Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

  3. Create the Dword value DisableTaskMgr

  4. Give it a value of 0 to enable it

  5. Give it a vaule of 1 to disable it


Read more......

Disable Shared Documents

To disable the Shared Documents folder that shows up on the network

  1. Start Regedit

  2. Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer \

  3. Create a new DWORD Value

  4. Give it the name NoSharedDocuments

  5. Give it a value of 1

  6. Log off or reboot


Read more......

If you mistakenly deleted the icon for the Desktop on the Quicklaunch toolbar

Go to C:\Documents and Settings\user_name\Application Data\Microsoft\Internet Explorer\Quick Launch
(where user_name is replaced by your login name)

Create a Text file called ShowDesktop.SCF with the following contents:

[Shell]
Command=2
IconFile=explorer.exe,3
[Taskbar]
Command=ToggleDesktop


Read more......

If you want to set the startup state for any or all of these keys,
you just need to edit the registry.

  1. Start Regedit
  2. Go to HKEY_CURRENT_USER \ Control Panel \ Keyboard
  3. Open InitialKeyboardIndicators
  4. Change the value to one of the following numbers
    0 - All Keys off
    1 - Caps Lock on
    2 - Num Lock on
    4 - Scroll Lock on
    For multiple keys, add their values:
    3 - Caps Lock and Num Lock on
    5 - Caps Lock and Scroll Lock on
    6 - Num Lock and Scroll Lock on
    7 - Caps Lock, Num Lock, and Scroll Lock on
  5. Log off and back on again


Read more......

  1. Click on Start / Run
  2. Enter in firewall.cpl
  3. Click on the Exceptions tab

Adding a Port for Internet Access:

  1. Click on the Add Port button
  2. Name it whatever you want
  3. Enter in the ports you want to open

Adding a Program for Internet Access

  1. Click on Add Program... button
  2. A list of all installed programs will be displayed
  3. Highlight the one you want to include for Internet access
  4. Click on the OK button


Read more......

If you are having problems with lockups, blue screens, or can only get to safe mode,
often the problem is due to a faulty device driver.

One way to help identify them is through the use of the Verfier program

  1. Start / Run / Verifier
  2. Keep the default of Create Standard Settings
  3. Select the type of drivers you want to confirm
  4. A list of drivers to be verified on the next boot will be shown.
  5. Reboot
  6. If your computer stops with a blue screen, you should get an error message with the problem driver
  7. To turn off the Verifier, run verifier /reset


Read more......

Since so many critical services are run with each svchost,
You can see which ones are being used by opening a cmd prompt and running:

tasklist /svc /fi "imagename eq svchost.exe"


Read more......

Disable Windows Tour

If you want to disable the Take Tour of Windows XP that comes up after you install WindowsXP:

  1. Start Regedit
  2. Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Tour
  3. Create a new DWORD key called RunCount
  4. Give it a value of 0


Read more......

When you open a window from My Computer or the Control Panel, and you don't see the blue bar with additional options on the left side, you may simply need to turn on Common Tasks

  1. From that same windows, go to Tools / Folder Options
  2. Check Show common tasks in folders


Read more......

Sometimes when you reinstall WindowsXP, you can receive an Access Denied error when trying to open a previous user's directory.
To take ownership of that folder again:

  1. Log on with an account that has administrator rights
  2. Right click on the folder
  3. Select Properties
  4. Click on the Security tab
  5. Click on the Advanced button
  6. Click on the Owner tab
  7. In the list of Names, click on your name
  8. To take ownership, click on Replace owner on subcontainers and objects
  9. Click OK and Yes


Read more......

go to google copy and paste in

?intitle:index.of? mp3
and after mp3 put in an artist or album or whatever and hit enter… what you get is lists of downloadable mp3s

eg:
?intitle:index.of? mp3 santana

enjoy downloading


Read more......

Get rid of the annoying Microsoft error reports.

There is a simple way to get rid of it:

1. Go to Start->Control panel.
2. Go to system. Now go to the Advanced tab.
3. Under the advanced tab, at the bottom click on ‘Error reporting’.

Now click on ‘Disable error reporting’.
You are done.
You will not receive the error sending report anymore


Read more......

1. All you need is your friends IP address and your Command Prompt.
2. Open your notepad and write tis code as it is……………… I would prefer you to copy this !

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3. Now save this as "Messenger.Bat".
4. Drag this file (.bat file)over to Command Prompt and press enter!
5. You would then see some thing like this:
MESSENGER
User:

6. After "User" type the IP address of the computer you want to contact.

7. Before you press "Enter" it should look like this: Before you press "Enter" it should look like this:

MESSENGER
User: IP_Address User: IP_Address
Message: Hi, How are you ? Message: Hi, How are you?

8. Now all you need to do is press "Enter", and start chatting Now all you need to do is press Enter, and start chatting.....


Read more......


Book Description
"This book covers a wide spectrum of topics relevant to implementing and managing a modern data center. The chapters are comprehensive and the flow of concepts is easy to understand."
-Cisco reviewer

Gain a practical knowledge of data center concepts

To create a well-designed data center (including storage and network architecture, VoIP implementation, and server consolidation) you must understand a variety of key concepts and technologies. This book explains those factors in a way that smoothes the path to implementation and management. Whether you need an introduction to the technologies, a refresher course for IT managers and data center personnel, or an additional resource for advanced study, you'll find these guidelines and solutions provide a solid foundation for building reliable designs and secure data center policies.
* Understand the common causes and high costs of service outages
* Learn how to measure high availability and achieve maximum levels
* Design a data center using optimum physical, environmental, and technological elements
* Explore a modular design for cabling, Points of Distribution, and WAN connections from ISPs
* See what must be considered when consolidating data center resources
* Expand your knowledge of best practices and security
* Create a data center environment that is user- and manager-friendly
* Learn how high availability, clustering, and disaster recovery solutions can be deployed to protect critical information
* Find out how to use a single network infrastructure for IP data, voice, and storage

Product Details

Hardcover: 632 pages
Publisher: Wiley (November 28, 2005)
Language: English
ISBN-10: 047177183X
ISBN-13: 978-0471771838

Download


Read more......


Book Description
PC COM ports, USB virtual COM ports, and ports in embedded systems are all addressed in this updated guide to programming, interfacing, and using serial ports. Topics include using .NET’s SerialPort class for COM-port communications on PCs; upgrading existing RS-232 designs to USB or wireless networks; and creating serial networks of embedded systems and PCs. Example circuits and code provide a quick start to projects. Installation and maintenance staff will also find tips for ensuring reliable operation and problem tracking.

Product Details

Paperback: 380 pages
Publisher: Lakeview Research; Second edition edition (December 1, 2007)
Language: English
ISBN-10: 193144806X
ISBN-13: 978-1931448062

Download


Read more......

How to Do Everything: Mac


Book Description
Have more fun and get more done with your Mac!Now you can get the most out of your Mac, whether it's an iMac, MacBook, or Mac mini. How to Do Everything: Mac shows you how to set up and customize your Mac and use all of the built-in tools and applications, such as iTunes, Mail, Safari, and the iLife and iWork suites. The revolutionary new features available in Mac OS X Leopard are also covered, such as Quick Look, Time Machine, and Spaces. Plus, you'll get details on hardware and peripherals, networking, troubleshooting, and maintenance. This is your must-have Mac guide!


Manage files, folders, and applications with the Finder
Connect to the Internet and explore with Safari
Use iWork for word processing, spreadsheets, and presentations
Edit, organize, and share your pictures with iPhoto
Master iTunes and iMovie for music, video, and movies
Tweak the System Preferences
Synchronize your Mac with your iPod, PDA, or cell phone
Set up a wired or wireless network
Dual-boot between Mac OS X and Windows
Add external devices via USB and FireWire
Troubleshoot, maintain, and back up your Mac
Product Details

Paperback: 505 pages
Publisher: McGraw-Hill Osborne Media; 1 edition (January 9, 2008)
Language: English
ISBN-10: 0071502726
ISBN-13: 978-0071502726


Download


Read more......


Product Details

# Paperback: 352 pages
# Publisher: Holt Paperbacks (March 13, 2000)
# Language: English
# ISBN-10: 0805072543
# ISBN-13: 978-0805072549
# Product Dimensions: 9.1 x 6.1 x 1 inches

Product Description

Keith Devlin is the "Carl Sagan of mathematics". He writes: "Though the structures and patterns of mathematics reflect the structure of, and resonate in, the human mind every bit as much as do the structures and patterns of music, human beings have developed no mathematical equivalent of a pair of ears. Mathematics can be seen only with the eyes of the mind." All of his books are attempts to get around this problem, to "try to communicate to others some sense of what it is we experience--some sense of the simplicity, the precision, the purity, and the elegance that give the patterns of mathematics their aesthetic value."

Life by the Numbers, Devlin's companion book to the PBS series of the same name, is heavily illustrated and soothingly low on equations. But as he says, wanting mathematics without abstract notation "is rather like saying that Shakespeare would be much easier to understand if it were written in simpler language."

The Language of Mathematics is Devlin's second iteration of the approach he used in Mathematics: The Science of Patterns. It covers all the same ground (and uses many of the same words) as the latter, but with fewer glossy pictures, sidebars, and references. Devlin has also added chapters on statistics and on mathematical patterns in nature.

"The great book of nature," said Galileo, "can be read only by those who know the language in which it was written. And this language is mathematics." In The Language of Mathematics, award-winning author Keith Devlin reveals the vital role mathematics plays in our eternal quest to understand who we are and the world we live in. More than just the study of numbers, mathematics provides us with the eyes to recognize and describe the hidden patterns of life—patterns that exist in the physical, biological, and social worlds without, and the realm of ideas and thoughts within.

Taking the reader on a wondrous journey through the invisible universe that surrounds us—a universe made visible by mathematics—Devlin shows us what keeps a jumbo jet in the air, explains how we can see and hear a football game on TV, allows us to predict the weather, the behavior of the stock market, and the outcome of elections. Microwave ovens, telephone cables, children's toys, pacemakers, automobiles, and computers—all operate on mathematical principles. Far from a dry and esoteric subject, mathematics is a rich and living part of our culture. An exploration of an often woefully misunderstood subject, The Language of Mathematics celebrates the simplicity, the precision, the purity, and the elegance of mathematics.


Author

Keith Devlin is Dean of the School of Science at Saint Mary's College of California and Senior Researcher at Stanford University's center for the Study of Language and Information. A key participant in the six-part PBS television series "Life by the Numbers," he is the author of Life by Numbers; Goodbye, Descartes; Logic and Information; Mathematics: The New Golden Age; and InfoSense: Turning Information into Knowledge.

Download


password :

fortvinie


Read more......


Book Description
Since the publication of Wireless Video Communications five years ago, the area of video compression and wireless transceivers has evolved even further. This new edition addresses a range of recent developments in these areas, giving cognizance to the associated transmission aspects and issues of error resilience.

Video Compression and Communications has been updated and condensed yet remains all-encompassing, giving a comprehensive overview of the subject. Covering compression issues, coding delay, implementational complexity and bitrate, the book also looks at the historical perspective to video communication.

* New edition of successful and informative text, Wireless Video Communications
* Substantial new material has been added on areas such as H.264, MPEG4 coding and transceivers
* Clear presentation and broad scope make it essential for anyone interested in wireless communications
* Systematically converts the lessons of Shannon's information theory into design principles applicable to practical wireless systems.

This book is ideal for postgraduates and researchers in communication systems but will also be a valuable reference to undergraduates, development and systems engineers of video compression applications as well as industrialists, managers and visual communications practitioners.

From the Back Cover
Since the publication of Wireless Video Communications five years ago, the area of video compression and wireless transceivers has evolved even further. This new edition addresses a range of recent developments in these areas, giving cognizance to the associated transmission aspects and issues of error resilience.

Video Compression and Communications has been updated and condensed yet remains all-encompassing, giving a comprehensive overview of the subject. Covering compression issues, coding delay, implementational complexity and bitrate, the book also looks at the historical perspective to video communication.

# New edition of successful and informative text, Wireless Video Communications

# Substantial new material has been added on areas such as H.264, MPEG4 coding and transceivers

# Clear presentation and broad scope make it essential for anyone interested in wireless communications

# Systematically converts the lessons of Shannon's information theory into design principles applicable to practical wireless systems.

This book is ideal for postgraduates and researchers in communication systems but will also be a valuable reference to undergraduates, development and systems engineers of video compression applications as well as industrialists, managers and visual communications practitioners.
Product Details

* Hardcover: 702 pages
* Publisher: Wiley-IEEE Press; 2nd Ed., New Ed edition (November 16, 2007)
* Language: English
* ISBN-10: 0470518499
* ISBN-13: 978-0470518496

Download


Read more......

Microsoft ISA Server 2006 Unleashed

Book Description
ISA Server 2006 is a robust application layer firewall that provides organizations with the ability to secure critical business infrastructure from the exploits and threats of the modern computing world. ISA’s ability to act as an edge firewall, a Virtual Private Networking solution, a reverse proxy server, or a content caching device give it unprecedented flexibility and position it as a valuable security tool for many types of organizations.



ISA Server 2006 Unleashed provides insight into the inner workings of the product, as well as providing best-practice advice on design and implementation concepts for ISA. In addition to detailing commonly requested topics such as securing Outlook Web Access, deploying ISA in a firewall DMZ, and monitoring ISA traffic, this book provides up-to-date information about the new enhancements made to the 2006 version of the product. The author draws upon his experience deploying and managing enterprise ISA environments to present real-world scenarios, outline tips and tricks, and provide step-by-step guides to securing infrastructure using ISA.

Product Details


Paperback: 600 pages
Publisher: Sams; 1 edition (December 5, 2007)
Language: English
ISBN-10: 0672329190
ISBN-13: 978-0672329197

Download


Read more......


Product Details

Paperback: 134 pages
Publisher: SAS Publishing; 2 edition (May 2003)
Language: English
ISBN-10: 1590471903
ISBN-13: 978-1590471906

Download


Read more......

From the Back Cover
This is the definitive resource for every network administrator, consultant, and architect who needs to maximize availability, scalability, and performance in Windows server environments.

Drawing on two decades of Windows server experience, Jeffrey Shapiro and Marcin Policht have written the most realistic, comprehensive, and independent Windows high availability guide ever published. One step at, a time, they help you plan, implement, and manage clustering, load balancing, fault tolerance, SQL Server, Exchange Server, and much more. Along the way, they address crucial high availability topics that are virtually ignored by most books, such as disaster recovery, performance monitoring, and operations management.

Shapiro and Policht offer a clear, concise roadmap for keeping Windows servers running 24x7 and delivering on even the most challenging service-level agreements. They provide real-world case studies and easy-to-use instructions designed to help readers make better decisions more rapidly.

Coverage includes
Building the foundations for a highly available Active Directory and network architecture
Selecting and integrating high-performance hardware, storage, and networks
Installing and configuring Windows Clustering Services for both scale-out and failover
Leveraging the Microsoft Operations Framework (MOF) and Microsoft Systems Architecture (MSA)
Delivering high-performance, high availability file- and print-server solutions
Using clustering to maximize SQL Server and Exchange Server availability
Restoring failed servers: best practices and step-by-step techniques for recovering from downtime or disaster
Deploying Network Load Balancing (NLB) IIS and application servers
Administering Windows Server 2003 high-performance systems—including performance monitoring and alerts with Microsoft Operations Manager
Avoiding the pitfalls associated with Windows high availability solutions
Product Details

Paperback: 504 pages
Publisher: Addison-Wesley Professional (December 14, 2004)
Language: English
ISBN-10: 0321228782
ISBN-13: 978-0321228789

Download


Read more......


From the Back Cover
Port Your UNIX® Applications to Linux®–Quickly, Efficiently, and Reliably

Increasingly, developers, architects, and project managers face the challenge of porting their C, C++, and Java applications from UNIX® to Linux® environments. Now, there’s a definitive, start-to-finish guide to porting applications from today’s most widely used UNIX platforms: Solaris™, HP-UX, and AIX®.



Three of IBM’s most-experienced Linux porting specialists lead you through your entire project: scoping, analysis, recoding, and testing. They present a start-to-finish porting methodology, realistic discussions of key porting tasks, and a questionnaire for assessing the work involved in any new project. You’ll discover what Linux offers in terms of APIs, library functions, versioning, system features, and tools–and the implications for your project. Next, the authors address each individual UNIX® platform in detail, identifying specific porting challenges and best-practice solutions. Coverage includes



· Understanding the Linux environment: GNU binutils, Java environments, shells, packaging options, and more

· Uncovering and addressing project unknowns, variables, and other risks

· Handling specific platform differences: standards, compilers, linkers, versioning, system/library calls, threads, and more

· Testing and debugging ported applications using the GNU debugger and Linux memory leak and performance tracing tools

· Contains quick references to UNIX® and Linux APIs, compilers, and linker options, and a discussion of porting issues unique to IBM’s POWER™ architecture

Whether you need a start-to-finish guide or a concise reference, you’ll find this book an indispensable resource for all your UNIX®-to-Linux porting projects.

Product Details

Paperback: 720 pages
Publisher: Prentice Hall PTR; 1st edition (April 12, 2006)
Language: English
ISBN-10: 0131871099
ISBN-13: 978-0131871090

Download


Read more......


From the Back Cover
Software Engineering with Microsoft Visual Studio Team System is written for any software team that is considering running a software project using Visual Studio Team System (VSTS), or evaluating modern software development practices for its use.



It is about the value-up paradigm of software development, which forms the basis of VSTS: its guiding ideas, why they are presented in certain ways, and how they fit into the process of managing the software lifecycle. This book is the next best thing to having an onsite coach who can lead the team through a consistent set of processes.



Sam Guckenheimer has been the chief customer advocate for VSTS, responsible for its end-to-end external design. He has written this book as a framework for thinking about software projects in a way that can be directly tooled by VSTS. It presents essential theory and practical examples to describe a realistic process for IT projects.



Readers will learn what they need to know to get started with VSTS, including


The role of the value-up paradigm (versus work-down) in the software development lifecycle, and the meanings and importance of “flow”
The use of MSF for Agile Software Development and MSF for CMMI Process Improvement
Work items for planning and managing backlog in VSTS
Multidimensional, daily metrics to maintain project flow and enable estimation
Creating requirements using personas and scenarios
Project management with iterations, trustworthy transparency, and friction-free metrics
Architectural design using a value-up view, service-oriented architecture, constraints, and qualities of service
Development with unit tests, code coverage, profiling, and build automation
Testing for customer value with scenarios, qualities of service, configurations, data, exploration, and metrics
Effective bug reporting and bug assessment
Troubleshooting a project: recognizing and correcting common pitfalls and antipatterns
This is a book that any team using or considering VSTS should read.

Product Details

Paperback: 304 pages
Publisher: Addison-Wesley Professional; 1 edition (May 19, 2006)
Language: English
ISBN-10: 0321278720
ISBN-13: 978-0321278722

Download


Read more......

Practical Electronics Handbook


an Sinclair's Practical Electronics Handbook combines a wealth useful day-to-day electronics information, concise explanations and practical guidance in this essential companion to anyone involved in electronics design and construction. The compact collection of key data, fundamental principles and circuit design basics provides an ideal reference for a wide range of students, enthusiasts, technicians and practitioners of electronics who have progressed beyond the basics.
The sixth edition is updated throughout with new material on microcontrollers and computer assistance, and a new chapter on digital signal processing

* Invaluable handbook and reference for hobbyists, students and technicians
* Essential day-to-day electronics information, clear explanations and practical guidance in one compact volume
* Assumes some previous electronics knowledge but coverage to interest beginners and professionals alike

Download


Read more......


Download


Read more......


Book Description
* Essential reading for administrators of Red Hat Linux who download the software
* The book to read after The Official Red Hat Linux User's Guide (0-7645-4967-7)
* Includes high-end Red Hat administration instruction on features such as GRUB and ext3
* Advanced topics cover creating network scripts, configuring Apache and Samba, Kickstart installations, and configuration of major protocols such as SSH, LDAP, DHCP, and BIND
RED HAT PRESS™
Linux Solutions from the Experts at Red Hat
Red Hat-the world's leading Linux company-presents a series of unrivaled guides that are reviewed and approved by the experts at Red Hat. Each book is packed with invaluable tips and techniques that are ideal for everyone from beginning to advanced network and systems professionals, as well as home and small businesses.

Book Info
Delivers all the know-how you need to manage Linux networks and systems, troubleshoot problems, and provides optimum client service. Your single official source for documentation, instruction, and answers about Red Hat Linux 8. Softcover.

Product Details

Paperback: 600 pages
Publisher: John Wiley & Sons; 1 edition (October 14, 2002)
Language: English
ISBN-10: 0764516957
ISBN-13: 978-0764516955

Download


Read more......

Routing TCP/IP, Volume 1

Book Description
A detailed examination of interior routing protocols -- completely updated in a new edition



A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols

  • A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers
  • Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies

    Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1, Second Edition, includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks initiated through routing protocols, and provide greater control over the propagation of routing information for all the IP interior routing protocols. Routing TCP/IP, Volume 1, Second Edition, provides a detailed analysis of each of the IP interior gateway protocols (IGPs). Its structure remains the same as the best-selling first edition, though information within each section is enhanced and modified to include the new developments in routing protocols and Cisco implementations. What's New In This Edition? The first edition covers routing protocols as they existed in 1998. The new book updates all covered routing protocols and discusses new features integrated in the latest version of Cisco IOS Software. IPv6, its use with interior routing protocols, and its interoperability and integration with IPv4 are also integrated into this book. Approximately 200 pages of new information are added to the main text, with some old text removed. Additional exercise and solutions are also included.


    Product Details

    Hardcover:
    Publisher: Cisco Press; 1st Edition
    Language: English
    ISBN-10:
    ISBN-13:

    Download


    Read more......

  • HTML Complete Course


    Book Description
    Written by a Web design expert and illustrated throughout in full color, this Complete Course shows you how to master the ins and outs of HTML, the language of the Web, while working on a single project. Fifteen sessions and nearly 100 step-by-step tutorials, accompanied by vivid color images and screen shots, walk you through building a slick, fully functional Web site from start to finish, using HTML and JavaScript™. After completing the course, you’ll have an impressive portfolio piece, a professional-looking Web site you can adapt to meet your needs, and a thorough understanding of HTML fundamentals. All of the files used to build the Web site conform to XHTML and CSS standards. CD-ROM Contents


    Image viewing and editing tools PhotoPlus and Irfanview freeware versions
    WS_FTP Pro software that lets you connect to a Web server to upload, modify, and download your Web site files
    HandyTools for Web Designers power pack freeware version, including Handy File Find & Replace, Handy ImageMapper, Gif Color Mapper, ColourSpy, and Gradientex
    Product Details

    Paperback: 368 pages
    Publisher: Wiley; Pap/Cdr edition (October 10, 2003)
    Language: English
    ISBN-10: 0764540920
    ISBN-13: 978-0764540929

    Download


    Read more......


    Book Description

    A cutting-edge response to Ralph Kimball's challenge to the data warehouse community that answers some tough questions about the effectiveness of the relational approach to data warehousing
    Written by one of the best-known exponents of the Bill Inmon approach to data warehousing
    Addresses head-on the tough issues raised by Kimball and explains how to choose the best modeling technique for solving common data warehouse design problems
    Weighs the pros and cons of relational vs. dimensional modeling techniques
    Focuses on tough modeling problems, including creating and maintaining keys and modeling calendars, hierarchies, transactions, and data quality
    Product Details

    Paperback: 456 pages
    Publisher: Wiley (August 8, 2003)
    Language: English
    ISBN-10: 0471324213
    ISBN-13: 978-0471324218

    Download


    Read more......

    Firewalls 24seven


    Firewalls is a guide to protecting an Internet-connected network from external threats--a complex task. You not only need to be aware of the known vulnerabilities of your system, you also need to remain alert to potential attacks. Firewalls are tools that help you do this by controlling access to and from your network. This book teaches the basics of network operation and how a firewall is put together. It's important to understand risk, and the book helps explain risk management and how it impacts a security policy. You'll also see how hackers target and penetrate systems. There's a guide to TCP/IP and common Internet services. From this base camp, Firewalls begins to climb the mountain of Internet security. The basic technologies and security requirements that fit together to form a firewall are introduced, along with the security policies of the authors' "perfect firewall."

    A large section of the book is taken up with comparative reviews of most of the main freeware and commercial firewall products currently available. This is a useful tool that gives you everything you're likely to need when deciding how to choose a firewall for your network.

    Firewalls is a very practical book aimed at the experienced network administrator who may be unfamiliar with Internet security. Real-world examples and plenty of tips and warnings make this a welcome addition to the system administrator's bookshelf.

    Book Info
    Delivers advanced coverage of firewalls to enable you to implement effective and secure firewalling on your network. Learn how to avoid security weaknesses of TCP/IP, HTTP, FTP, RPC, BootP, and SNMP. Softcover. --This text refers to an out of print or unavailable edition of this title.

    Product Details

    Paperback: 544 pages
    Publisher: Sybex Inc; 2 Sub edition (March 2002)
    Language: English
    ISBN-10: 0782140548
    ISBN-13: 978-0782140545

    Download


    Read more......

    Principles of Lasers and Optics


    Review
    "Targeted to first-year graduates in physics and electrical engineering, it also may serve as a reference on mathematical and analytical methods used to understand optoelectronic applications." Photonics Spectra

    Book Description
    This book describes the fundamental principles of the laser and the propagation of laser radiation in bulk and guided wave components. All solid state, gas, and semiconductor lasers are analyzed as macroscopic devices with susceptibility originating from quantum mechanical interactions. Additional analysis of the unique properties of coherent laser light in optical components is derived from fundamental principles.

    Product Details

    Hardcover: 260 pages
    Publisher: Cambridge University Press (February 21, 2005)
    Language: English
    ISBN-10: 0521642299
    ISBN-13: 978-0521642293

    Download


    Read more......

    Michael Madana Kamaraju (2008)

    Chitaaru.Kommana
    Come.On.Baby
    Jum.Jum.Jummani.Prema
    Kanulalogililona
    Naa.Raasi.Kanya.Raasi
    Pampara.Panaasa


    Read more......

    Parugu (2008)

    Parugulu Parugulu
    Nammavemogane Nammavemogane
    Yelageylaga Yelageylaga
    ChalChalChalo ChalChalChalo
    Hrudhayam Hrudhayam
    Manakanna Podichey


    Read more......

    Boothnath (2008)

    Mere Buddy
    Hum To Hain Aandhi
    Banku Bhaiya
    Samay Ka Pahiya
    Chalo Jaane Do
    Mere Buddy
    Bhoothnath Theme


    Read more......

    Na Pancha Pranam (2008)

    Jare Jare
    Naa Pancha Pranalu
    Challore
    Dooram Dooram
    Bangaru Konda
    Jare Jare


    Read more......

    Nero Premium Edition

    http://rapidshare.com/files/105400348/Nero_Premium_Edition.part1.rar
    http://rapidshare.com/files/105440534/Nero_Premium_Edition.part2.rar


    Read more......

    Gamyum Movie CamRip


    http://rapidshare.com/files/104627783/Gamyum-1.AVI
    http://rapidshare.com/files/104704883/Gamyum-2.AVI
    http://rapidshare.com/files/104956217/Gamyum-3.AVI
    http://rapidshare.com/files/105477169/Gamyum-4.AVI
    http://rapidshare.com/files/104708972/Gamyum-5.AVI


    Read more......

    Kalidasu (2008)

    Cheemalemo Chakkara
    Ellake Ellake
    Hey Baby Hey Baby
    Pada Padarey
    Prema (Okasari Karam)
    Thadisi Mopedu


    Read more......

    Somberi (2008)

    Borladukunna
    Kandome Jara Vadandi Bavalu
    Kothiki Thoka Yenduku Guru
    Sudha Badhakam
    Surru Surranakura Sureeda
    Yepani Cheyanu


    Read more......

    Avathaarudu (2008)

    Ishtam
    Madhilona
    Mecchave
    Merupu Tuaali
    Pilla Pilla


    Read more......

    Locking the desktop

    If you are leaving your computer for a while and do not wish to turn it off, but want to assure that no-one else can use the computer while you are away, locking the desktop is the best option.

    By pressing WINDOWSKEY+L, you password protect your system just as if you had logged out or restarted the computer. The advantage is that any programs or processes that were running when you locked the desktop will stay open and running in the background, ready for you to resume work or play.


    Read more......

    Renaming The Start Button:

    To rename the start button, you will need a hex editor.
    My preference is UltraEdit

    Copy the \windows\explore.exe file to a new name (e.g. explorer_1.exe)
    With the hex editor, open that file and go to offset 412b6
    You will see the word start with blanks between each letter
    Edit it be any 5 characters or less
    Save the file
    Boot to DOS
    Copy the existing c:\windows\explorer.exe to explorer.org
    Copy explorer_1.exe to explorer.exe
    You will also need to replace the explorer.exe in the c:\windows\system32\dllcache file as well with the new one.

    Note: If the partition is NTFS and you can't access the files from DOS:

    Start Regedit
    Go to
    HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon.
    Change the value of Shell from Explorer.exe to explorer_1.exe


    Read more......

    Wanna tell your friends about the do’s and do nots in your computer when they login in your absence. Well you can do it pretty easily by displaying a legal notice at system start-up . Follow these simple steps

    Click on start>run(win key+r)
    Then tpye “regedit” there, this opens up the registry editor, now goto

    HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>
    CurrentVersion>policies>system

    Now when you high light system, on the right you can find

    * “legalnoticecaption”
    * “legalnoticetext”

    Right click in them to add you own notice or custom message

    “legalnoticecaption”=”enter your notice caption”
    “legalnoticetext”=”enter your legal notice text”


    Read more......

    To change the icons used for specific drives .
    Open regedit by typing regedit into start->run

    then navigate to

    HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Explorer

    now create a key(KEY not VALUE!!) called DriveIcons under Explorer...
    now within DriveIcons, create another key with the drive letter you want to change (e.g.,HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    Explorer\DriveIcons\K)...
    create another key within the drive letter key called DefaultIcon...
    now set the default String value equal to the icon you want to use.
    if you have a file that has more than one icon in it, such as a DLL file, use the standard
    C:\full_path\icon_file.dll,n ) where n is the number of the icon within the file icon_file.dll


    Read more......
















    Download Here


    Read more......

    Swasa (2008)

    Bhaga Bhaga
    College Kurrallu
    Nannu Naa Manasuni
    Nee Kalle Palike
    Ninginaina Cheragalanaa
    Samayam
    Swasa Revisited
    Swasa Theme


    Read more......

    Subham (2008)

    Gundelo Dhamunte
    Itaga E Prema
    Koilaa Koilaa
    Ela Marachi Pogalanu
    Challani Gaali
    Eneno Aasalu


    Read more......

    Kantri (2008)

    123 Nenoka Kantri
    Ammaho
    Vayasunamy
    I Go Crazy
    Janthar Manthar
    Raamare


    Read more......

    Bale Dongalu (2008)

    Chota Chota Udyoganiki
    Manasulo Nuvvena
    Neethone Kalisi Unta
    Panchadara Yedarilo
    Pasandaina Vela
    Romeo Juliet


    Read more......

    NINNA NEDU REPU (2008)

    VayaseTheliyani
    Oohallo
    Jil Jil Jawani
    Thadi Vedi
    NinnaNeduRepu
    Searching ofLife Theme Music


    Read more......

    Aata Modalaindi (2008)

    Chali Champesthundi
    Chukkala Chukkala
    Gamyam Leni Jeevitham
    Na Vayase Padaharu
    Nee Letha Pedhavaula Pyna
    Orugallu Kurrade


    Read more......

    Andariki Vandanaalu (2008)

    Endhukaya Neekintha
    Oho Jajimalli
    Paytese Vayasu
    Rajakeyam
    Ramba Oorvasi Menaka
    Slokam
    Vandemataram


    Read more......

    Naa Manasukemaindi (2008)

    Sakhude Sakhude
    Kristhu Purvame Ayina
    Naalo Sagamai1
    Gopala Gopala
    Devadasukunna Crazu
    Naalo Sagamai2
    Olammi Ori Nayano


    Read more......

    Sirf (2008)

    Pehla Woh Pyaar
    Life Peechhe Peechhe
    Ghar Tera Ghar Mera
    Zindagi Ki Kahani
    Tujhpe Fida
    Khel Jo Khele
    Mumbai Nagariya
    Zindagi Ki Kahani


    Read more......

    Tashan (2008)

    Dil Haara
    Pooja Ka Tashan
    Chhaliya
    Jimmy Ka Tashan
    Dil Dance Maare
    Bachchan Pande Ka Tashan
    Falak Tak
    Bhaiyyaji Ka Tashan
    Tashan Mein


    Read more......