Banjara lambani

Monday, 30 January 2017

COMMUNICATION(BMS&IC NOTES FOR DIPLOMA STUDENTS)

COMMUNICATION

communication is a process of meaningful interaction among individual. It also an exchange of facts,ideas , opinion or emotions ny two or more persons.


special features of communication:-

1. Unavoidable
2. Two way traffic
3.social promotions
4. Continuous process
5. Universal process

sender or source:-

The communication process begins with the sender. Sender wishes to send a message to the receiver . As the source of the message you need to be clear about why you're communicating and what you want to communicate.
message:-The message is a information what sender wants to convey to the receiver.
encoding :- it is a process of putting message in words images or audio to convey to the receiver without any confusion.
channel:- channel is the medium of transmission from one person to another.
decoding:-deciding is the process by which the receiver interprets the message and translate into meaningful information
feedback:- feedback is the reaction provided by the receiver.
  receiver:- the receiver is the person or a group for whom the communication is intended.
context:- it is the situation in which your message is delivered.

channel of communication:-

communication channel simply uses various methods of sending message depending upon the type of information. its importance signifies and amount of information
1. Telephone.
2.radio
3.television
4.E-mails
5.formal printed invitation
6.personal letters
7.post cards
8. Magazine
9.questionnaire
10. Newspaper column

IMPORTANCE'S OF KNOWING YOURSELF( BMS&IC notes for diploma students)

IMPORTANCE'S OF KNOWING YOURSELF
In a process of working together it is very important to understand each other such understanding others depends on one's perception.
people can no longer depend on their intelligence to get things done perception place a vital role in an organization particularly in the fields of recruitment, selection, appraisal , promotions and so on.
The know other concepts basically focus on our ability to manage our self and how we manage relationship with others no other critical success factor that will ensure success in the workplace failure to understand that there friends have different perspectives from theirs.
People need to understand their personal feelings, emotions first before attempting to get things done through others . getting and remaining connected people is the critical for the success of leaders.


process of knowing others:-
1. Perceiving one self accurately
2.Be empathetic
3. Have positive attitude
4.Open communication


INTER GROUP COMMUNICATION:-


inter group communication concerns the way in which communication between peoples affects social relationships. Inter group communication is often characterized by power inequality, bias , competition or conflicts.




Resolving win/lose situation into win/win through inter group communication:-
conflicts arises in group because of the scarcity of freedom , position and resources. People who seek power or status within the group .
In different culture, winning is more acceptable than loosing and competition is more prevalent than co-operation all of which tends to intensity inter group conflicts thus win/lose situation are resolved into win/win through inter group communication.


win/lose:-
In this strategy one party to the conflict tries to marshal all the sources and other partly loses.
examples of win-lose can be found with superior - management relations found in contemporary organization
The negative affect's of win-lose conflicts a groups are
1, divert time and energy from the main issues
2.delay decisions
3, drive unaggressive committee numbers to the sidelines.

Sunday, 29 January 2017

INTRODUCTION TO MANAGEMENT SKILLS and SWOT ANALYSIS

INTRODUCTION TO MANAGEMENT SKILLS:-

INTERPERSONAL SKILL:-

the ability of a person to interact with other people is known as interpersonal skills, it is also refereed
as communication skills.

SOFT SKILLS:-

soft skills are essentially people skills that determine once strength as a listener , leader , communicator and conflict resolver or mediator.

HARD SKILLS:-

Hard skills are the skills that appear on a person education , experience and level of expert.

IMPORTANCE OF SOFT SKILLS:-

soft skills are very important in work place or business because a person who have technical knowledge should also have the ability to express.
                                                                              planning is necessary but education is also important and it takes soft skills to execute any idea.

knowing thyself(self discovery):

knowing thyself or yourself is a life long process. self discovery is a process where we search and identify our strength's weakness , fear and so on. even our personality is made up of many face is that you pick up and reflect from your experience.

IMPORTANCE OF KNOWING YOURSELF:-

  1. helps to control emotions.
  2. helps to take better decisions.
  3. helps to reach your goals.
  4. helps to reach relationship with others
  5. helps to express happiness and joy

PROCESS OF KNOWING YOURSELF:

  • maintain personal dairy : maintaining a dairy helps your likes and dislikes , your positions and what you want to be in the life.
  • meditation : meditation helps you to observe yourself in the present moment practicing meditation helps to reduce your anxiety , vary and excitement.
  • exercise regularly : exercise helps a person physically and mentally its is a kind of meditation.
  • walk regularly : walking is a meditation which helps you to reduce tension and  notice what is going around you.
  • driving or riding : driving is a good process particularly when you find it hard to locate a quite place around you.
  • do some outings : practice a habit of  going put for sight seeing which allows you to be wise your self.
  • develop new interest : allow your self to think something new and different which can take you to sky high in the ladder of your personal and professional  life.

SWOT ANALYSIS :

S --- STRENGTH
W--- WEAKNESS
O --- OPPORTUNITY
T --- THREAT
                                                  swot analysis is an extremely useful for understanding and decision making in all types of situation in an organisation or business , it can be understood as an examination of the organisation internal strengths and weakness and its external opportunity
as well as threat.
                            it is general tool designed to be used in the preliminary  stages of decision making and strategy in various types of applications. this helps you to focus on strengths minimizes weakness and take the greatest possible advantages or opportunity available. swot analysis is an extremely useful for understanding and decision making in all types of situation in an organisation or business , it can be understood as an examination of the organisation internal strengths and weakness and its external opportunity
as well as threat.  it is general tool designed to be used in the preliminary  stages of decision making and strategy in various types of applications. this helps you to focus on strengths minimizes weakness and take the greatest possible advantages or opportunity available. swot analysis is an extremely useful for understanding and decision making in all types of situation in an organisation or business , it can be understood as an examination of the organisation internal strengths and weakness and its external opportunity
as well as threat.


How to become rich fast

 F1 Key Help
F2 Key Edit current Cell
F5 Key Goto
F7 Key Spell Check
F12 Key Save file as
CTRL and A Select entire worksheet.
CTRL and B Toggle Bold Text.
CTRL and C Copies the item or items selected to the Clipboard and can be pasted using CTRL and V.
CTRL and F Displays the Find dialog box.
CTRL and H Displays the Replace dialog box.
CTRL and I Toggles Italic Text.
CTRL and N New File.
CTRL and O Open File.
CTRL and P Print.
CTRL and S Save File.
CTRL and U Toggles Underlined Text.
CTRL and V Paste the contents of the clipboard.
CTRL and X Cut the selected item.
CTRL and Y Redo the last undone action
CTRL and Z Undoes the last action.
CTRL and 1 Displays Format Cells Dialogue Box
CTRL and 5 Toggles Strikethrough Text

Keyboard Shortcuts Result in Excel 2000 - Formulas
ALT and = Autosum
ALT and F8 Macros
CTRL and ; Insert Current Date
CTRL and : Insert Current Time

Keyboard Shortcuts, Microsoft Word

Keyboard Shortcuts, Microsoft Word

 Keyboard Shortcuts Result in Microsoft Word

CTRL and A Selects all in the current document.
CTRL and B Bold text.
CTRL and C Copies the item or text to the Clipboard and can be pasted using CTRL and V.
CTRL and D Displays the Font dialogue box.
CTRL and E Centre Alignment.
CTRL and F Displays the Find dialog box, to search the current document.
CTRL and G Displays the Go to dialog box, to go to a specific location in the current document.
CTRL and H Displays the Replace dialogue box.
CTRL and I Italic text.
CTRL and J Full Justification.
CTRL and K Create Hyperlink
CTRL and L Left Alignment
CTRL and M Tab
CTRL and N Creates a new document.
CTRL and O Displays the Open File dialogue box.
CTRL and P Displays the Print dialog box.
CTRL and R Right Alignment.
CTRL and S Displays the Save dialog box.
CTRL and U Underline text
CTRL and V Pastes the copied item or text from the Clipboard into the current position in the document.
CTRL and X Cuts the item or text selected to the Clipboard.
CTRL and Y Redo the last undone action.
CTRL and Z Undoes the last action.
CTRL and ENTER Insert Page Break.
CTRL and F2 Show Print preview.
CTRL and F4 Closes the active document window.
CTRL and F6 Opens the next document window.

Lots Of Windows Xp Tips

Lots Of Windows Xp Tips, Take A Look !

Lock XP Workstation (#1)

You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll, LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

Remove Windows XP system software (#2)

XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

New commands (#3)

For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.

Windows XP supports IPv6 (#4)

XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.

Linking Your Xbox To Your Computer

Linking Your Xbox To Your Computer

I. Introduction

Some basics and assumptions (the more you know, the more you UNDERSTAND):

Crossover cable: A crossover cable is needed to directly connect your computer and Xbox. You would plug one end of the cable to your computer and the other end into the Xbox, there are no devices in between. If you have a hub, switch, or router you will not need a crossover cable though some still will work with one. With connecting to hubs, switches, or routers you should use a straight-through cable. The image below shows the difference between the two:

To easily tell if you have a crossover or not, simply look at the two ends side by side. If all the pins, 1 through 8 on both ends are all the same color in the same order, you have a straight-through cable. If pins 1, 3 and 2, 6 are swapped you have a crossover cable. Notice the TX, RX as well. This shows why in pc to pc connections a crossover is required. Otherwise one pc will be transmitting over the same wire the other pc is trying to transmit on.

This guide currently gives configuration examples for setting up an FTP connection with Evox, Avalaunch, MXM, or UnleashX as your dash. It is also recommended to use FlashFXP as your FTP client though many others will work just fine.
You do not NEED an internet connection to FTP to your Xbox. When you ftp to your Xbox from a computer in your house to the Xbox in your house, no packets (data) need to go out to the internet and they shouldn't even try. The tricky part is when you want to be able to access the internet and ftp to your Xbox at the same time. How this is done and how difficult it is depends on the devices you have.
I will not list every baby step involved for how to set things, like every mouse click required. If you're not sure how to do something I've said to configure, see number 5 below.
If something is said in this guide that you don't understand or don't know how to accomplish it, try google. It is a search engine at http://www.google.com
For example, if I say "Run a command prompt" but don't mention how; don't go immediately posting in the forums asking how you run a command prompt. First, try searching in google, "how to run command prompt windows xp". I'm willing to bet you'll get your answer faster. Another example, just so we're clear, if I say "turn off your winxp firewall", you may search in google, "how to turn off windows xp firewall". Again, I'm betting your answer will come faster.
This guide now has configuration diagrams to help anyone having difficulty understanding the configuration examples I discuss. Some people simply do better with visuals. The key for the diagrams is provided

SHORTCUTS OF Windows

 SHORTCUTS OF Windows

CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD ROM

about mail

Introduction


Mail is the first software that let you store and share files on any web-mail account. If you have a web mail account with large storage space, you can use P2M to store files on it. Web-mail providers such as Gmail (Google Mail), Walla!, Yahoo and more, provide storage space that ranges from 100MB to 2GB.
P2M splits the file you want to share/store zips and encrypts it. P2M then sends the file segments one by one to your account. Once P2M uploaded all file segments, you can download them and use P2M to merge the segments back to the original file.


u can get the software from here


http://www.peer2mail.com/P2MSetup.exe


and for any info u can log to there website

http://www.peer2mail.com



How to upload a file to ur e-mail account ?


In order to send a file to an email account, Peer2Mail needs to split it into segments. Web-mail providers limit the size of an email attachment usually to a nominal 10Megs

There are 3 ways u can send ur files to the e-mail:

    *  Direct Send - P2M has a built in SMTP component that sends the segments directly to the web-mail providers. You don't need to enter your ISP details in order to use P2M. If you are using this feature please make sure you enter a value in the 'From Email Address' because some web-mail providers reject email messages where there is no 'From' address. You can even enter a fake mail address.
    * Send Via MAPI - P2M can send the segments using MAPI (Usually your outlook client). When you use this option P2M will split the files and move the sending responsibility to Outlook. Note that it will use your ISP SMTP server and details to send the files. You may enter as many recipients as you wish when using this option.
    * Send Via SMTP Server - Send the segments using your ISP SMTP Server. If you are using this feature please make sure you enter a value in the 'From Email Address' because some web-mail providers reject email messages where there is no 'From' address. You can even enter a fake mail address. You may enter as many recipients as you wish when using this option.

Play Games On PS2 Without ModChip

 Play Games On PS4 Without ModChip

In this guide, you will learn the very easy method of making copies of your PS2 and normal Playstaion games so that they are playable on the PS2. This guide will provide you with all the information you need to burn PS2 games.
You will need the following things to burn PS2 games:
a computer with a cd burner
a blank cd-r (don't use the re-recordable type a.k.a. cd-rw)
CDRWIN – The version in this guide is 3.8D
FireBurner –
PS2 patcher –
GameShark 2 for PS2 - the GameShark 2 is available at most stores that sell video games, a few examples would be Best Buy, Circuit City, or Target. You want version 1.0 of the GameShark 2. I have heard that all other versions work, but I have only tested version 1.0. GameShark2 costs about 29.95. Believe me, its worth it!!!
and a PS2 to play the games.
Burning the PS2

The process of burning ps2 games is easy. It is really only a 3 step process.(read the game, patch the game, and burn the game.)

1) insert game into cd drive.

2) Open up CDRWIN and click on the extract disk/tracks/sectors button.

3) Your settings should be as follows:

For “extract mode” select disk image/ cue sheet
For “read options” select “raw”
For “error recovery” select “abort”
For “jitter correction” select “auto”
For “subcode analysis” select “auto”
Data Speed and Audio Speed should be the same
For “read retry count” type 0
For “subcode threshold” type 300
Make sure you selected the drive that your PS2 game is in

PORT NUMBERS

Port Numbers

PORT NUMBERS

The port numbers are divided into three ranges: the Well Known Ports,
the Registered Ports, and the Dynamic and/or Private Ports.

The Well Known Ports are those from 0 through 1023.

The Registered Ports are those from 1024 through 49151

The Dynamic and/or Private Ports are those from 49152 through 65535


************************************************************************
* PLEASE NOTE THE FOLLOWING: *
* *
* 1. UNASSIGNED PORT NUMBERS SHOULD NOT BE USED. THE IANA WILL ASSIGN *
* THE NUMBER FOR THE PORT AFTER YOUR APPLICATION HAS BEEN APPROVED. *
* *
* 2. ASSIGNMENT OF A PORT NUMBER DOES NOT IN ANY WAY IMPLY AN *
* ENDORSEMENT OF AN APPLICATION OR PRODUCT, AND THE FACT THAT NETWORK *
* TRAFFIC IS FLOWING TO OR FROM A REGISTERED PORT DOES NOT MEAN THAT *
* IT IS "GOOD" TRAFFIC. FIREWALL AND SYSTEM ADMINISTRATORS SHOULD *
* CHOOSE HOW TO CONFIGURE THEIR SYSTEMS BASED ON THEIR KNOWLEDGE OF *
* THE TRAFFIC IN QUESTION, NOT WHETHER THERE IS A PORT NUMBER *
* REGISTERED OR NOT. *
************************************************************************


WELL KNOWN PORT NUMBERS

The Well Known Ports are assigned by the IANA and on most systems can
only be used by system (or root) processes or by programs executed by
privileged users.

Ports are used in the TCP [RFC793] to name the ends of logical
connections which carry long term conversations. For the purpose of
providing services to unknown callers, a service contact port is
defined. This list specifies the port used by the server process as
its contact port. The contact port is sometimes called the
"well-known port".

To the extent possible, these same port assignments are used with the
UDP [RFC768].

The range for assigned ports managed by the IANA is 0-1023.

Port Assignments:

Procedure used to recover data from a quick-erased CD-RW disc

 Procedure used to recover data from a quick-erased CD-RW disc

1. Make a file of exactly the size of the cdrw disc's capacity (650MB in my case).
(this step may not be needed)

2. With Nero I created a new project and added the file to it so that I have the disc filled. I gues you can also fill up the disc with other files.
The reason why I fill the disc is because I want Nero to make a session that uses the entire disc. Like I wrote earlier in this thread I experienced that my CD-Drive refuses to read off the disc beyond the session's boundaries. When you quick-erase a disc there is no session anymore so the drive will not read at all. Burning a new session will overwrite the data and burning only a small session will NOT make the drive read the other data that is still on the disc.
The reason why I used the one big file is so that I could later on recognize which part of the disc was overwritten by this file because this file contained all zeros (0x00).

3. I pressed burn and selected disc-at-once. Then while Nero was burning the leadin I pressed cancel. My CD-Drive finished writing the lead-in and Nero reported an error.
This is what was accomplished however: Now the disc contains a session that says that the used disc size is the complete disc. Nero did not get to writing file because I cancelled it. Good thing because I don't want Nero to write any files because my old data will get overwritten!
I gues it works the same with different writing software. Another method that I used during a test was simply press the reset button of the computer when the burning software was done with writing the lead-in and started with the files.

4. I had to restart the computer after cancelling burning.
With the cdrw disc inserted I saw in "my computer" that windows recognized that the disc was 650MB, clicking on it gave an error. Good so far!

Now with IsoBuster you can extract the sectors from a disc to a file. This is what I did.
I gues that if you have data-recovery software at this point it will be usefull because now (if all went well;)) the CD-Drive WILL read data from the entire disc. Anyway, I used ISO-Buster because the files that I needed to recover where a bit odd for nowadays (.XM, .S3M, .MP3):
In IsoBuster I had to do several steps

Registry Disassembled a basic tutorial



Registry Disassembled a basic tutorial

The registry is a hierarchical database that contains virtually all information about your computer's configuration. Under previous version of Windows, those setting where contained in files like config.sys, autoexec.bat, win.ini, system.ini, control.ini and so on. From this you can understand how important the registry is. The structure of the registry is similar to the ini files structure, but it goes beyond the concept of ini files because it offers a hierarchical structure, similar to the folders and files on hard disk. In fact the procedure to get to the elements of the registry is similar to the way to get to folders and files.
In this section I would be examing the Win95\98 registry only although NT is quite similar.

The Registry Editor
The Registry Editor is a utility by the filename regedit.exe that allows you to see, search, modify and save the registry database of Windows. The Registry Editor doesn't validate the values you are writing: it allows any operation. So you have to pay close attention, because no error message will be shown if you make a wrong operation.
To launch the Registry Editor simply run RegEdit.exe ( under WinNT run RegEdt32.exe with administer privileges).
The registry editor is divided into two sectios in the left one there is a hierarchical structure of the database (the screen looks like Windows Explorer) in the right one there are the values.

The registry is organized into keys and subkeys. Each key contains a value entry , each one has a name, a type or a class and the value itself. The name is a string that identifies the value to the key. The length and the format of the value is dependent on the data type.

As you can see with the Registry Editor, the registry is divided into five principal keys: there is no way to add or delete keys at this level. Only two of these keys are effectively saved on hard disk: HKEY_LOCAL_MACHINE and HKEY_USERS. The others are jusr branches of the main keys or are dynamically created by Windows.

HOW TO RESET YOUR LOST BIOS PASSWORD

Here's a DOS trick for Windows 9x, that will reset (delete) your motherboard's BIOS password (aka CMOS password) without any need to open up your computer to remove the battery or mess with jumpers.

This method can come in very handy in the event you ever lose and forget your BIOS password or if you acquire used computers where the unknown previous owners had BIOS passwords set (in fact, this happened to me long ago—I was given a used computer, but there was no way I could enter the CMOS to make changes). It's important to note here that the password we are talking about is only the one that prevents a user from entering the BIOS setup at bootup, not the one that stops you from getting past the boot.

Normally, at bootup you can press a key (usually the DEL key) to access your BIOS allowing you to view it or make changes. With a password set, there is no way to enter setup. Though a password can provide a basic and very effective level of PC security, losing it can be a real headache if you don't know how to fix the problem.

The MS-DOS command that will makes this trick possible is the DEBUG command (debug itself is a utility—debug.exe—which is located in your Windows Command folder). This is not a command to be taken lightly—in other words, it's not a command to play with! You can cause serious corruption with this command and can end up not being able to even boot your computer! Debug is used to work with binary and executable files and allows you to alter (hex edit) the contents of a file or CPU register right down to the binary and byte level.

To begin debug mode, type debug at a MS-DOS prompt or you can specify a file, i.e., DEBUG FILE.EXE. There is a difference in screen output between the two methods. When you type DEBUG alone, debug responds with a hyphen (-) prompt waiting for you to enter commands. The second method, with a file specified, loads the file into memory and you type all the commands on the line used to start debug. In this tip, we will be writing to the BIOS, so the first method is the one that would be used. All debug commands can be aborted at any time by pressing CTRL/C.

JPG,JPEG,JPE File associations fixes

 JPG,JPEG,JPE File associations fixes

This reg file will restore the default file associations.
1. Copy the following (everything in the box) into notepdad.
QUOTE
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\.jpe]
"PerceivedType"="image"
@="jpegfile"
"Content Type"="image/jpeg"
[HKEY_CLASSES_ROOT\.jpe\OpenWithProgids]
"jpegfile"=hex(0):
[HKEY_CLASSES_ROOT\.jpe\PersistentHandler]
@="{098f2470-bae0-11cd-b579-08002b30bfeb}"
[HKEY_CLASSES_ROOT\.jpeg]
"PerceivedType"="image"
@="jpegfile"
"Content Type"="image/jpeg
[HKEY_CLASSES_ROOT\.jpeg\jpegfile]
[HKEY_CLASSES_ROOT\.jpeg\jpegfile\ShellNew]
[HKEY_CLASSES_ROOT\.jpeg\OpenWithProgids]
"jpegfile"=hex(0):
[HKEY_CLASSES_ROOT\.jpeg\PersistentHandler]
@="{098f2470-bae0-11cd-b579-08002b30bfeb}"
[HKEY_CLASSES_ROOT\.jpg]
"PerceivedType"="image"
@="jpegfile"
"Content Type"="image/jpeg"

REVERSE CODING

REVERSE CODING

# Released by Cybnet Security Group
# legalz: modify and use at will, if you make any changes, improvements, updates or use the code
# in another project, please send us what you did and give credit
# if you have any questions, post them at forum.hackerthreads.net
# be sure to check out hackerthreads.org for updates and new tutorials/downloads

Index:
1.Introduction
2.Disclaimer
3.Hexadecimal
4.RAM and ROM
5.ASM
6.Needed programs
7.Cracking
8.Conclusion
---------------------------
---Introduction----------

Welcome to my Reverse Coding tutorial! In this paper, you will
learn how to crack and modify your own software. I'll try to get
into as much detail as possible, yet also dumb it down a bit. =)
------------------------------------------------------------------------------------------------------
---Disclaimer------------

All information is purely for educational purposes only! The author
cannot be held responsible for any (ab)use of this information.
USE AT YOUR OWN RISK!!!
------------------------------------------------------------------------------------------------------
---Hexadecimal----------

To begin, I'm going to teach you about hexadecimal, so if you already
know it, then move on. Even if you do already know it, I suggest
sticking around for a refreshment of your memory.=)

WINDOWS SHORTCUT

WINDOWS SHORTCUT

Run Commands:

compmgmt.msc - Computer management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt


Run Commands to access the control panel:

Add/Remove Programs control appwiz.cpl
Date/Time Properties control timedate.cpl
Display Properties control desk.cpl
FindFast control findfast.cpl
Fonts Folder control fonts
Internet Properties control inetcpl.cpl
Keyboard Properties control main.cpl keyboard
Mouse Properties control main.cpl
Multimedia Properties control mmsys.cpl
Network Properties control netcpl.cpl
Password Properties control password.cpl
Printers Folder control printers
Sound Properties control mmsys.cpl sounds
System Properties control sysdm.cpl

ABOUT INTERNET OF THINGS

ABOUT INTERNET OF THINGS

The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.

COMPONENTS OF THE INTERNET

WORLD WIDE WEB

The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

Home automation using Arduino UNO


Home automation using Arduino UNO:

Components:
There are main three components required in this project:

 Arduino UNO
 TSOP 1738
 RC-5 Remote control

1. ARDUINO UNO 1.1 Introduction to Arduino UNO Fig.1.1 Arduino UNO Board Arduino is a popular open-source single-board microcontroller, descendant of the open-source Wiring platform, designed to make the process of using electronics in multidisciplinary projects more accessible. The hardware consists of a simple open hardware design for the Arduino board with an Atmel AVR processor and on-board input/output support. The software consists of a standard programming language compiler and the boot loader that runs on the board. Arduino hardware is programmed using a Wiring-based language (syntax and libraries), similar to C++ with some slight simplifications and modifications, and a Processing-based integrated development environment. Current versions can be purchased pre-assembled;. Additionally, variations of the Italian-made Arduino—with varying levels of compatibility—have been released by third parties; some of them are programmed using the Arduino software.The Arduino project received an honorary mention in the Digital Communities category at the 2006 Prix Ars Electronica.


An Arduino board consists of an 8-bit Atmel AVR microcontroller with complementary components to facilitate programming and incorporation into other circuits. An important aspect of the Arduino is the standard way that connectors are exposed, allowing the CPU board to be connected to a variety of interchangeable add-on modules known as shields. Official Arduinos have used the megaAVR series of chips, specifically the ATmega8, ATmega168, ATmega328, ATmega1280, and ATmega2560. A handful of other processors have been used by Arduino compatibles. Most boards include a 5 volt linear regulator and a 16 MHz crystal oscillator (or ceramic resonator in some variants), although some designs such as the LilyPad run at 8 MHz and dispense with the onboard voltage regulator due to specific form-factor restrictions. An Arduino's microcontroller is also pre-programmed with a boot loader that simplifies uploading of programs to the on-chip flash memory, compared with other devices that typically need an external programmer. At a conceptual level, when using the Arduino software stack, all boards are programmed over an RS-232 serial connection, but the way this is implemented varies by hardware version. Serial Arduino boards contain a simple inverter circuit to convert between RS-232-level and TTL-level signals. Current Arduino boards are programmed via USB, implemented using USB-to-serial adapter chips such as the FTDI FT232. Some variants, such as the Arduino Mini and the unofficial Boarduino, use a detachable USB-to-serial adapter board or cable, Bluetooth or other methods. (When used with traditional microcontroller tools instead of the Arduino IDE, standard AVR ISP programming is used. The Arduino board exposes most of the microcontroller's I/O pins for use by other circuits. The Diecimila, now superseded by the Duemilanove, for example, provides 14 digital I/O pins, six of which can produce pulse-width modulated signals, and six analog inputs. These pins are on the top of the board, via female 0.1 inch headers. 

DSP LAB PROGRAM'S PART-A

DSP LABA List of Experiments Using MATLAB/ Code Composer Studio and Objectives.

1.    Verification of sampling theorem.
2.    Impulse response of a given system.
3.    Linear convolution of two given sequences.
4.    Circular convolution of two given sequences.
5.    Autocorrelation of a given sequence and verification of its properties.
6.    Cross correlation of given sequences and verification of its properties.
7.    Solving a given difference equation. 
8.    Computation of N point DFT of a given sequence and to plot magnitude and phase spectrum.
9.    Linear convolution of two sequences using DFT and IDFT.
10. Circular convolution of two given sequences using DFT and IDFT
11. Design and implementation of FIR filter to meet given specifications.
12. Design and implementation of IIR filter to meet given specifications.

 B. LIST OF EXPERIMENTS USING DSP PROCESSOR

1.    Linear convolution of two given sequences.
2.    Circular convolution of two given sequences.
3.    Impulse response of a given system.
4.    Difference Equations. 

PART-A
EXPERIMENTS USING MAT LAB


01a.Program to Verify Sampling Theorem. Ex: x(t)=sin(2Ï€100t).

dt=.001;
t=.01:dt:.02;
%fm=input('enter i/p signal freq:');
xi=sin(2*pi*100*t);
%fs=input('enter the sampling frequency:');
fs=1000;
ps=1/fs;
n=0:1:50;
xs=sin(2*pi*100*(n*ps));
nps=n*ps;
xr=xs*sinc(fs*(ones(length(n),1)*t-nps'*ones(1,length(t))));
figure(1);
subplot(3,1,1);plot(t,xi);
subplot(3,1,2);stem(n,xs);
subplot(3,1,3);plot(t,xr);

MAT LAB PROGRAM'S PART2


Program to plot the curve for equation y=sin(x)+cos(x) as x varies from 0 to 2*pi


x=0:10:340;
y=sind(x)+cosd(x);
plot (x,y);
xlabel('angle in degree');
ylabel('magnitude');
title('curve for the equation y=sin(x)+cos(x)');


program to generate two sinusoids and computation of their product


t=0:0.001:0.1;
f1=input('enter the freq of first sinusoid');
f2=input('enter the freq of second sinusoid');
y1=sin(2*pi*f1*t);
y2=sin(2*pi*f2*t);
y=y1.*y2;
p1=fft(y1);
p2=fft(y2);
p3=fft(y);

subplot(2,2,1)
plot(y1)
xlabel('time');
ylabel('amplitude');
title('first sinusoid in time domain');

subplot(2,2,2)
plot(y2)
xlabel('time');
ylabel('amplitude');
title('second sinusoid in time domain');

subplot(2,2,3)
plot(abs(p1))
xlabel('time');
ylabel('magnitude');
title('first sinusoid in freq domain');



subplot(2,2,4)
plot(abs(p2))
xlabel('time');
ylabel('magnitude');
title('second sinusoid in freq domain');


figure,subplot(2,1,1)
plot(y1)
xlabel('time');
ylabel('amplitude');
title('product of two sinusoids in time domain');

subplot(2,1,2)
plot(abs(p3))
xlabel('time');
ylabel('amplitude');
title('product of two sinusoids in freq domain');



MAT LAB PROGRAM'S

MAT LAB PROGRAM'S

program to evaluate the quadratic equation ax^2+bx+c


A=input(‘enter the value of  A=’);
B=input(‘enter the value of  B=’);
C=input(‘enter the value of  C=’);
X1=(-b+sqrt(b^2-4*a*c))/(2*a)
X1=(-b-sqrt(b^2-4*a*c))/(2*a)

OUTPUT:

Enter the value of  A=1
Enter the value of  B=4
Enter the value of  C=4

X1=-2
X1=-2


program to calculate the full quantities(x in deg)



x=input('enter the value of x in degrees=');
y1=sind(x/6)
y2=cosd(x)
y3=tand(x/2)
y4=(sind(x/6))^2+(cosd(x/6))^2

 OUTPUT

enter the value of x in degrees=30

y1 =0.0872

y2 = 0.8660

y3 = 0.2679

y4 =1

General Description of arm processor

General Description:

VT-2148-2.0 provides a hardware platform for developing embedded system using LPC2148 device.These features make VT-2148-2.0 board ideal for instrumentation, communication and other demanding application areas where flexibility and in-circuit hardware upgradeability is of paramount important.VT-2148-2.0 board comes with complete drivers for windows98/Me/2000/XP/2007.LPC-2148 code examples and windows DLL interface which can be used to interface it to most common programming language.It comes with complete Kiel development software and sample codes. It is also ideal for classroom training in colleges and universities. Engineers can upgrade their hardware development Skills using ARM.ARM board consists of the following:                    
  • VT-2148-2.0 board fitted in soft wooden box.
  • 12v DC Power adaptor for Relay and Stepper motor Operation.
  • USB Cable for Hex File downloading and 5v dc power for VT 2148-2.0 board.
  • DC & Stepper Motor
  • Speaker
  • Inbuilt ADC, DAC, RTC
  • RESET, USP, ISP Program buttons.
  • Technical/Operational Manual with hardware Schematics and Sample Programs.
  • Software CD.








Introduction to exception interrupts and vector tables

 Introduction to exception interrupts and vector tables

Exceptions arise whenever the normal flow of a program has to be halted temporarily,
for example, to service an interrupt from a peripheral. Before attempting to handle an
exception, the ARM7TDMI processor preserves the current processor state so that the
original program can resume when the handler routine has finished.

When an exception occurs, for example an IRQ exception, the following actions are taken:
First the address of the next instruction to be executed (PC + 4) is saved into the link
Register(LR). Then the CPSR is copied into the SPSR of the exception mode that is about to be
entered (i.e. SPSR_irq). The PC is then filled with the address of the exception mode
interrupt vector. In the case of the IRQ mode this is 0x00000018(See Vector Table 2.6). At the same time the mode is changed to IRQ mode, which causes R13 and R14 to be replaced by the IRQ R13 and R14 registers. On entry to the IRQ mode, the I bit in the CPSR is set, causing the IRQ interrupt line to be disabled. If you need to have nested IRQ interrupts, your code must manually re-enable the IRQ interrupt and push the link register onto the stack in order to preserve the original return address. From the exception interrupt vector your code will jump to the exception ISR. The first thing your code must do is to preserve any of the registers R0-R12 that the ISR will use by pushing them onto the IRQ stack. Once this is done you can begin processing the exception. When an exception occurs the CPU will change modes and jump to the associated interrupt vector. Once your code has finished processing the exception it must return back to the user mode and continue where it left off. However the ARM instruction set does not contain a “return” or “return from interrupt” instruction so manipulating the PC must be done by regular instructions. The situation is further complicated by there being a number of different return cases. First of all, consider the SWI instruction. In this case the SWI instruction is executed, the address of the next instruction to be executed is stored in the Link register and the exception is processed. In order to return from the exception all that is necessary is to move the contents of the link register into the PC and processing can continue. However in order to make the CPU switch modes back to user mode, a modified version of the move

Structure of Current Program Status Register (CPSR)

Structure of Current Program Status Register (CPSR)


In addition to the register bank there is an additional 32 bit wide register called the ‘currentprogram status register’ (CPSR). The CPSR contains a number of flags which report andcontrol the operation of the ARM7 CPU.
Fig2. 4 Current Program Status Register and Flags reference

The top four bits (28 to 31) of the CPSR contain the condition codes which are set by the CPU. The condition codes report the result status of a data processing operation. From the condition
codes you can tell if a data processing instruction generated a negative (N), zero(Z), carry(C) or
overflow (V) result. The lower eight bits (0 to 7) in the CPSR contain flags which may be set or cleared by the application code. Bits 7 and 8 are the I and F bits. These bits are used to enable and disable the two interrupt sources which are external to the ARM7 CPU. You should be careful when programming these two bits because in order to disable either interrupt source the bit must be set to ‘1’ not ‘0’ as you might expect. Bit 5 is the THUMB bit.

Condition Code flags:  There are four bits Bit 28 to bit 31 are kept aside for representing the status of a data processing operation. Functions of these flags are as follows.

Negative Flag Bit(31):  This flag bit indicates the result of an arithmetic or logical operation is negative. It is set 1 if result of arithmetic or logical operation is negative otherwise it is reset to 0.

Zero Flag (Bit 30): Set and reset according to the flag setting operation is zero or not. It records zero condition. It is set 1 if result of arithmetic or logical operation is zero otherwise it is reset to 0.

Carry Flag (Bit 29): This can also be called as Unsigned overflow Flag. Set and reset according to the flag setting operation results in a carry or not. It is set 1 if result of 32 bit arithmetic operation generates carry, otherwise it is reset to 0.

LPC 2148(ARM7) Development Board

LPC 2148(ARM7) Development Board

The principle feature of the ARM 7 microcontroller is that it is a register based load-and-store architecture with a number of operating modes. While the ARM7 is a 32 bit microcontroller, it is also capable of running a 16-bit instruction set, known as “THUMB”. This helps it achieve a greater code density and enhanced power saving. While all of the register-to-register data processing instructions are single-cycle, other instructions such as data transfer instructions, are multi-cycle. To increase the performance of these instructions, the ARM 7 has a three-stage pipeline. Due to the inherent simplicity of the design and low gate count, ARM 7 is the industry leader in low-power processing on a watts per MIP basis. Finally, to assist the developer, the ARM core has a built-in JTAG debug port and on-chip “embedded ICE” that allows programs to be downloaded and fully debugged in-system.ARM processors are typical of RISC (Reduced Instruction Set Computers) processors in that they implement a load and store architecture. Only load and store instructions can access memory. Data processing instructions operate on register contents only. The RISC philosophy is implemented with four major design rules: 

The following list gives some the silent features of ARM7 processor

         32-bit RISC-processor core (32-bit instructions)
         37 pieces of 32-bit integer registers (16 available)
         Pipelined (ARM7: 3 stages)
         Cached (depending on the implementation)
         Von Neuman-type bus structure (ARM7), Harvard (ARM9)
         8 / 16 / 32 -bit data types
         7 modes of operation (usr, fiq, irq, svc, abt, sys, und)
         Simple structure ,reasonably good speed / power consumption ratio
         Fully 32-bit instruction set in native operating mode
         32-bit long instruction word
         All instructions are conditional
         Normal execution with condition AL (always)
         For a RISC-processor, the instruction set is quite diverse with different  addressing modes
         36 instruction formats
         All instructions are conditional
         In normal instruction execution (unconditional) condition field contents of AL is used (Always)
        
In conditional operations one of the 14 available conditions is selected