Monday, March 31, 2008

ENJOY THE FREE UNLIMITED DOWNLOAD

This site is mainly designed for student, tired of searching books and magazines for no cost at all.Here, I tried my best to upload all the stuffs u guys are seaching for.

If you want any book, magazine or article ,which are not included in my site then you can inform me.I promise i will try to help you guys at any cost.

for suggestions mail me at:
webtronic@yahoo.com


thank you!


-------------------------------------------------------------------------------------
1.INTRODUCTION TO PHP
2.INTRODUCTION TO MY SQL
3.PHP AND MYSQL
4. ABOUT ASSEMBLY
5. 330 JAVA TIPS
6. COMPUTER TELEPHONE INTERFACE
7. COMPUTER NETWORK PROBLEM SOLUTION BY ANDREW
8. HACKING INTO COMPUTER SYSTEM FOR BEGINEERS
9. HOW TO WRITE BUFFER OVERFLOW
10. IP SPOOF
11. A REMOTE DESKTOP CONNECTION HANDBOOK
12. A HACKERS CRACKDOWN
MASTER KEYS TO ATTRACT WOMEN NOW
13. A VIRUS TUTOR
14. A LINUX INSTALLATION GUIDE VERSION 3.2
15.Linux+ Certification Bible Hungry Minds 2002
16. SECURITY ELECTRONIC ENGINEERING SYSTEMS, DEPARTMENT OF DEFENSE
17. CMOS
18. NAN0TECHNOLOGY MAGAZINE
19. MACHINE TO MACHINE APPLICATION OVER MOBILE NETWORKS
20. MACHINE TO MACHINE COMMUNICATION
21. MACHINE TO MACHINE COMMUNICATION FOR ELECTRONIC COMMERCE
22. 7 SEGMENT DIGITAL DISPLAY
23. PHP FUNCTION I BET U DONT KNOW
24. THE MOBILE COMMUNICATION SOCIETY
25. COSMIC CATASTROPHES BY J.CRAIG WHEELER
26. NEW ELECTORNICS MAGAZINE, DEC 2007(FROM UK)
27. INTERPRETING YOUR GRE SCORE
28.INTRODUCTION TO ANALYTICAL WRITING FOR GRE STUDYING STUDENT
29. MATH REVIEW TO TAKE GRE TEST
30. GRE PRATICE GENERAL TEST
MAKING A MAN LOVE TO WOMAN
31. STARTING WITH MACROMEDIAL FLASH(7.98mb--->40min)
32. JOKES
33. HOW TO BE CREATIVE
34. HOW TO CREATE A BOOTABLE CD
35. INTRODUCTION TO CRYPTOGRAPHY
36. A TELNET CONNECTION GUIDE FOR NEWBIES
37. TELNET COMMANDS
38. INTRODUCTION TO OPENGL
39. THE ART OF START
40. THE HACKERS DICTIONARY
41. BEGIN HACKING
42. DNS ID HACKING
43. THINGS TO BE KNOWN BY A GOOD HACKER
TOP 100 LOVE MAKING TECHNIQUES OF ALL TIME
44. HOW TO PREVENT ONSELF FROM HACKERS
45. HIJACKING CABLENET
46. IP SPOOFING
47. CRACKING A UNIVERSAL PRODUCT CODE
48. ETHERNET HACK
49. SECURITY HOLE
50. HOW TO PRACTICE IMPROVISATION
51. LAZY BLUES TABS
52. LAZY BLUES2
53. MACROMEDIA BIBLE
54. LINUX+ CERTIFICATION BIBLE
55. CYCLIC REDUNANCY CHECK(CRC)
56. HOW COMPUTER VIRUS WORKS
57. HOW INTERNET INFRASTRUCTURE WORKS
58. HOW INTERNET SEARCH ENGINE WORKS
59. HOW LCD WORKS
60. HOW WEBSERVER WORKS
61. OREILLY HTTP POCKET REFERENCE
62. A COLLECTION OF COMPUTER TIPS
63. OS ARCHITECTURE AND PROGRAMMING
64. MORE ABOUT ASSEMBLY LANGUAGE
65. 101 MOTIVATION QUOTES
66. ROBINSON CRUSOE
67. THE INTERPRETATION OF DREAM(SIGMUND FREUD)
68. PRINCIPLES OF SUCCESSFUL MANIFESTING
69. HOW TO HYPNOTISE PEOPLE AND OTHER LIVING THINGS.
70. AS A MAN THINKTH
71. GRIMM'S FAIRY TALES
73. HARY POTTER AND THE PRISONER OF AZAKABAN
74. HARY POTTER AND THE GOBLET OF FIRE
75. HARY POTTER AND THE ORDER OF THE PHOENIX
76. HARY POTTER AND THE HALF BLOOD
77. ATM PIN CRACKING
78. LOCK PICKING SECRETS
79. THE SILENCE
80. THE TWITLIGHT
81. JOKES1
82. JOKES2
83. JOKES3
84. JOKES4
85. JOKES5
86. JOKES6
87. JOKES7
88. JOKES8
89. JOKES9
90. JOKES10
91. JOKES11
92. JOKES12
93. JOKES13
94. JOKES14
95. JOKES15
96. JOKES16
97. JOKES17
98. JOKES18
99. JOKES19
100. JOKES20
101. JOKES21
102 JOKES22
103. JOKES23
104. JOKES24
105. JOKES25
106. JOKES26
107. JOKES27
108. JOKES28
109. JOKES29
110. JOKES30
111. 99 COMMANDS THE WINDOWS CAN RUN
112. TIPS AND TRICKS FOR WINDOWS XP
113. A COMPLETE GUIDE TO ASSEMBLE YOUR PC
114. REFERNCE HTML COMMAND
115. ABOUT FAT32
116. 200 WAYS TO RETRIVE HDD(553KB)
117. DATA RECOVERY AND FIXING HDD(1.91MB)

Saturday, March 29, 2008

ADDING A NEW RAM IN UR LAPTOP

FOR Dell

Memory
Dell™ Vostro™ 1700 and Inspiron™ 1720/1721 Service Manual

Removing a Memory Module

Replacing a Memory Module



Your computer has two user-accessible SODIMM sockets, one accessed from beneath the keyboard (DIMM A), and the other accessed from the bottom of the computer (DIMM B).

You can increase your computer memory by installing memory modules on the system board. See "Specifications" in your Owner's Manual for information on the memory supported by your computer. Install only memory modules that are intended for your computer.

NOTICE: If your computer has only one memory module, install the memory module in the connector labeled "DIMMA."
NOTICE: If you need to install memory modules in two connectors, install a memory module in the connector labeled "DIMMA" before you install a module in the connector labeled "DIMMB."
NOTE: Memory modules purchased from Dell are covered under your computer warranty.

--------------------------------------------------------------------------------

Removing a Memory Module
CAUTION: Before you begin any of the procedures in this section, follow the safety instructions in the Product Information Guide.

DIMM A Memory Module
The DIMM A memory module is located under the keyboard.

A.Follow the procedures in Before You Begin.


B.Remove the hinge cover (see Removing the Hinge Cover).


C.Remove the keyboard (see Removing the Keyboard).


NOTICE: To prevent damage to the memory module connector, do not use tools to spread the memory module securing clips.

D.Use your fingertips to carefully spread apart the securing clips on each end of the memory module connector until the module pops up.


E.Remove the module from the connector.



1.

memory module (DIMM A)

2.

securing clips (2)



DIMM B Memory Module
The DIMM B memory module is located under the memory module cover on the bottom of the computer.







A.Follow the procedures in Before You Begin.





B.Turn the computer over.


C.Loosen the captive screw on the memory module cover, then remove the cover and set it aside.





1.
memory module cover


2 .
captive screw



NOTICE: To prevent damage to the memory module connector, do not use tools to spread the memory module securing clips.

D.Use your fingertips to carefully spread apart the securing clips on each end of the memory module connector until the memory module pops up.


E.Remove the memory module from the connector.





1.


securing clips (2)


2.

memory module






Replacing a Memory Module
CAUTION: Before you begin any of the procedures in this section, follow the safety instructions in the Product Information Guide.

DIMM A Memory Module
The DIMM A memory module is located under the keyboard.

A.Follow the procedures in Before You Begin.





B.Align the notch in the memory module edge connector with the tab in the connector slot.


C.Slide the memory module firmly into the slot at a 45-degree angle, and rotate the module down until it clicks into place. If you do not feel the click, remove the module and reinstall it.


NOTE: If the memory module is not installed properly, the computer may not boot. No error message indicates this failure.




1.


tab


2.


notch




D.Replace the keyboard (see Replacing the Keyboard).


E.Replace the hinge cover (see Replacing the Hinge Cover).


F.Insert the battery into the battery bay, or connect the AC adapter to your computer and an electrical outlet.


G.Turn on the computer.


As the computer boots, it detects the additional memory and automatically updates the system configuration information.

To confirm the amount of memory installed in the computer, click Start ® Help and Support® Dell System Information.

DIMM B Memory Module
The DIMM B memory module is located under the memory module cover on the bottom of the computer.

A.Follow the procedures in Before You Begin.





B.Turn the computer over.


C.Loosen the captive screw on the memory module cover, then remove the cover and set it aside.





1.


memory module cover


2.


captive screw





D.Align the notch in the module edge connector with the tab in the connector slot.

E.Slide the module firmly into the slot at a 45-degree angle, and rotate the module down until it clicks into place. If you do not feel the click, remove the module and reinstall it.


NOTE: If the memory module is not installed properly, the computer may not boot. No error message indicates this failure.


1.

tab

2.

notch




NOTICE: If the cover is difficult to close, remove the module and reinstall it. Forcing the cover to close may damage your computer.

F.Replace the memory module cover and tighten the screw.

G.Insert the battery into the battery bay, or connect the AC adapter to your computer and an electrical outlet.

H.Turn on the computer.


As the computer boots, it detects the additional memory and automatically updates the system configuration information.

Wednesday, March 26, 2008

parallel port with c

Parallel port is a very commonly known port, widely used to connect the printer to the PC. If you see the backside of your computer, there will be a p...Read More...

Friday, March 14, 2008

Machine to machine communication

Machine to machine communication (M2M) has received increasing attention in recent years. Progress in short range networking, growth of mobile networks, and advances in user devices have allowed strong progress in this area. While services as, for example, fleet management, supply chain management, and remote metering are becoming common, M2M is still in its starting phase. In Europe and elsewhere, industry, research and standards organisations join forces to realize “The Internet of things”. This concept seeks to combine applications and objects in our day-to-day environment to improve business processes and simplify our personal lives.


Services

The M2M communications market in 2006 is focused on vehicular, security and also telemetry applications. Figure 1 shows how data are gathered by a reading device in a local area (e.g. a car, house, neighbourhood). The data are conveyed through a wide area network, typically a mobile network, to a mediation or application platform where they are read, and from where a response may be sent. Typical applications include automatic meter reading (AMR), management of vending machines, fleet management, Pay As You Drive (PAYD) vehicle insurance, road toll, and health surveillance. Mobile payment and ticketing by means of barcodes is also becoming popular since mobile phones support such applications without much additional configuration, as figure 2 illustrates.


Figure 1: M2M network structure

Operator roles

Due to their commercial and technical positioning, operators have a natural role in M2M communication. This is, among others, due to operators’ proximity to end users and direct control and ownership of backbone infrastructures. The next five years will be crucial to the positioning of operators. Orange, BT, and Telenor are already competing on the M2M market. Orange is offering 3rd party service development using its M2M platform ‘Connect’. Orange also offers complete services, such as fleet management, which is priced at around 1 euro per day and vehicle in France. BT Redcare is structured in three units, offering services on Alarm and Telemetry, Supply Chain Management, and Vehicle Tracking. Finally, in the Nordic Region, where remote reading of power meters is becoming mandatory, Telenor’s Cinclus is dedicated to large scale AMR deployments (around 8 million by 2010), and simultaneously envisaging alarm and control applications that may complement the service.


Figure 2: Mobile cinema tickets using 2D barcodes (source: TMN)

The Internet of things

Large scale deployments in the metering and vehicular areas, sometimes as a result of regulations and initiatives such as the EU’s eCall, will foster the creation of a widespread M2M infrastructure that can accommodate additional applications. This will contribute to ubiquitous and context aware services and implementation of the “Internet of things”. The network will sense where you are and know what you need from your environment as long as you allow it to do so. This may include finding your way around the traffic, paying your bills or simply diverting a session to the device that happens to be closer to you.

Conclusion

The M2M market will continue to grow in the next years. Interworking of machines will have strong implications on the way we communicate and live. Service paradigms will shift towards computing ubiquity, service pervasiveness, and networking of sensors and objects. Business implications of this evolution are still to be fully understood and require close attention from operators.






Thursday, March 13, 2008

A little about embedded system

The world being sophisticated, we people are being lazy day by day. Today we want control on every thing without moving an inch, and this is possible only with the use of embedded system. Knowingly or unknowingly, it has penetrated in human life that no one has ever imagined. Mobile devices(Cell phones, wrist watches, IPods), home appliances( ACs, refrigerator, microwave ovens), industries(Robotics, motion controllers, AC/DC drives, stepper motor controller, sensors, invertors), space application, military applications and satellite applications are the major field where embedded system commonly used.

Knowing the area of implementation, it will be more interesting for us to know what embedded system is.
An embedded system is a combination of computing hardware, software and perhaps additional mechanism or other parts, designed to perform a specific function. Here, we design hardware for specific purpose and software are embedded to perform the mission. The word embedded reflects the fact that these systems are usually an integral part of a larger system i.e. it is a component within some larger system. We think, our computer is a single & complete embedded system, which is really wrong. The PC consists of several embedded systems, each of which is made with their own autonomous hardware and software for a dedicated purpose. For example, it has keyboard, mouse, display device, modem, sound card, graphic card and many more. Each of these devices contains a processor and software that guides them move on its way to obtain the specific goal.
However, being familiar with many electronic devices, we are not able to feel the presence of embedded system because at an instant of designing, the existence of processor and software are made exotic to the user.The working principle of embedded system depends upon software coded in it. This software can be written in any platform of programming but at the end they are converted to low level language for compilation. Embedded software can’t usually be run on other embedded system without significant modification. Each system is guided specially for the particular application to make the design simple and reduce the system cost. So unnecessary circuitry is eliminated and hardware resources are shared whenever possible. Further, to store code of the software, we need a ROM whose size is determined the complexity of the system. Similarly, for the temporary storage of run time data, a RAM memory is used. All the embedded system also contains some types of inputs and outputs. For example, in a microwave oven, input is given through the panel and temperature probe, and the output may be either communication signals or display.

Embedded system is a rapidly growing technology. Researches are being held to enhance the quality, decrease the cost and broaden the field of embedded system. The embedded system conference in Silicon Valley, in 2008 is assumed to be major issue in the world of embedded system where 350 world wide exhibitors will show us tomorrow’s embedded technology solutions ( http://www.cmpegevents.com/web/esv/exposition/).