Wednesday, January 6, 2010

CSE PPT's

ARTIFICIAL INTELLIGENCE:-
A major problem in the study of intelligence and cognition is the range of often implicit assumptions about what phenomena these terms are meant to cover. Are we just talking about cognition as having and using knowledge, or are we also talking about other mental states such as emotions and subjective awareness? Are we talking about intelligence as an abstract set of capacities, or as a set of biological mechanisms and phenomena? These two questions set up two dimensions of discussion about intelligence. After we discuss these dimensions we will discuss information processing, representation, and cognitive architectures.
Download

NETWORK SECURITY
:-
Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world. This document was written with the basic computer user and information systems manager in mind, explaining the concepts needed to read through the hype in the marketplace and understand risks and how to deal with them. Some history of networking is included, as well as an introduction to TCP/IP and internet working . We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices. This is not intended to be a ``frequently asked questions'' reference, nor is it a ``hands-on'' document describing how to accomplish specific functionality. It is hoped that the reader will have a wider perspective on security in general, and better understand how to reduce and manage risk personally, at home, and in the workplace.
Download

DATA WAREHOUSING:-
Organisations are today suffering from a malaise of data overflow. The developments in the transaction processing technology has given rise to a situation where the amount and rate ofdata capture is very high, but the processing of this data into information that can be utilised for decision making, is not developing at the same pace. Data warehousing and data mining (both data & text) provide a technology that enables the decision-maker in the corporate sector/govt. to process this huge amount of data in a reasonable amount of time, to extract intelligence/knowledge in a near real time. The data warehouse allows the storage of data in a format that facilitates its access, but if the tools for deriving information and/or knowledge and presenting them in a format that is useful for decision making are not provided the whole rationale for the existence of the warehouse disappears. Various technologies for extracting new insight from the data warehouse have come up which we classify loosely as "Data Mining Techniques".
Download

STEGANOGRAPHY:-
Johannes Trithemius (1462-1516) was a German Abbot. His writing, Steganographia: hoe est ars per occultam scripturam animi sui voluntatem absentibus aperiendi certa is ostensibly a work describing methods to communicate with spirits. A rough translation of the Latin title is: Steganography: the art through which writing is hidden requiring recovery by the minds of men. Although people have hidden secrets in plain sight now called steganography throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today's security techniques.
Download

WEB TECHNOLOGIES:-
Hypertext Markup Language (HTML) is a language to specify the structure of documents for retrieval across the Internet using browser programs of the World Wide Web. HTML is an application of the Standard Generalized Markup Language(SGML). The principle is that text markup concentrates on structure rather than appearance, making the files more reuseable and leaving the visual details to the end-user softwareThe Universal Resource Locator (URL) is the `address' of a resource in the Web. It could be a file, or an index, or some program that does processing. The Web was an interesting but not particularly exciting tool used by scientific researches-until 1993, when Mosaic, a point-and-click Web browser, was developed at the National Center for Supercomputing Applications (NCSA). In olden days the web technology used for creating web pages is HTML (Hyper Text Markup Language). Now a days the most efficient and advanced Web technologies using are XML (eXtensive Markup Language), DOTNET and ASP.NET.
Download
Dwonload

INTERNET FIREWALLS
The Internet has made large amount of information available to the average computer user at home, in business and education. For many people, having access to this information is no longer just an advantage, it is essential. By connecting a private network to the Internet can expose critical or confidential data to malicious attack from anywhere in the world. The intruders could gain access to your sites private information or interfere with your use of your own systems. Users who connect their computers to the Internet must be aware of these dangers, their implications and how to protect their data and their critical systems. Therefore, security of network is the main criteria here and firewalls provide this security. The Internet firewalls keep the flames of Internet hell out of your network or, to keep the members of your LAN pure by denying them access the all the evil Internet temptations. Download the Presentation from the Below Link
Download
CRYPTOGRAPHY
E-commerce on the worldwide web is a rapidly growing and proliferating field. But there are several differences between commerce in the real world and on the Internet, and perhaps the most fundamental issue is that of trust and security. In order to build secure E-commerce applications, we need to establish a definition of various security requirements.
Download

WI-FI


The IEEE 802.11 working group published the 802.11 standard for wireless LANs in 1999.802.11b is a supplement to 802.11 that specifies a higher data rate and is currently the industry-accepted standard for WLANs. 802.11b products that meet a base standard of interoperability are certified by the Wireless Ethernet Compatibility Alliance (WECA) with the Wi-Fi logo.
Download
IP Security

In today's massively interconnected business world of the Internet, intranets, branch offices, and remote access, sensitive information constantly crosses the networks. The challenge for network administrators and other IS professionals is to ensure that this traffic is:
Download

Monday, August 31, 2009

Tips nTricks.......

Command line Interface Chat in Windows

Does the Title feel you little strange ?? Yes it is possible to chat in Command line Interface in Windows like Unix system you don't need to download any messenger. Just few simple Batch command and running the Messenger Service in windows.

Little Guide to Start Messenger Service :
1. Go To Start Click on Run (or Use Windows + R shortcut for Run)
2. Enter services.msc , Click OK
3. Search for Messenger, Right Click go to properties, probably its Disabled so make it manual, hit Start.
Well you have done it, For now.

Time For your Messenger Code (Batch File)

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


Save this code in Text file, Renaming as Messenger.bat(what ever name you love, remember to keep its extension as .Bat)

Running your Messenger :
1. Go To command prompt.
2. run your Batch file (messenger.bat)
3. Will ask for user name- enter the IP address of person whom you want to talk.
4. Then for Message - Enter Message.
5. Just wait for reply. and Njoy the Chat.

Advantage :
you can use it when you don't have messenger like Yahoo etc, your browsers are corrupted.

Disadvantage :
Messenger service is already Disabled in your service to make you secure. keeping it running makes your system unsafe. So this trick is just for the Try not an real ultimate solution.

The easiest way to learn CMD

(windows xp) open the command prompt and type 'help'. A big list will be given . And if you want to a specific command you can just type 'help command name'

How to remove New Folder.exe virus

  • An ".exe" file is being created with the same name as the folder itself in all drivers and cannot be deleted?
  • Your task manager, folder option are disabled, you "can not open the registry" because "it has been disabled by your administrator", your pen drive is infected and the system running too slow?
  • And you do not know how to remove NewFolder.exe because it recreates itself everytime you delete it.
  • Get rid of it - Security Stronghold security team has developed Newfolder.exe Virus removal.
Download the solution now

Download Now...

Manual Solution:

Step1:
1. Search for autorun.inf file. It is a read only file so you will have to change it to normal by right clicking the file , selecting the properties and un-check the read only option
2. Open the file in notepad and delete everything and save the file.
3. Now change the file status back to read only mode so that the virus could not get access again.
4. Autorun
5. Click start->run and type msconfig and click ok
6. Go to startup tab look for regsvr and uncheck the option click OK.
7. Click on Exit without Restart, cause there are still few things we need to do before we can restart the PC.
8. Now go to control panel -> scheduled tasks, and delete the At1 task listed there.

Step2:
1. Click on start -> run and type gpedit.msc and click Ok.
2.
3. If you are Windows XP Home Edition user you might not have gpedit.msc in that case download and install it from Windows XP Home Edition: gpedit.msc and then follow these steps.
4. Go to users configuration->Administrative templates->system
5. Find “prevent access to registry editing tools” and change the option to disable.
6. Opening the gate of castle: Group Edit Policies
7. Once you do this you have registry access back.

Step3:
1. Click on start->run and type regedit and click ok
2. Go to edit->find and start the search for regsvr.exe,
3. Launch the attack in the heart of castle: registry search
4. Delete all the occurrence of regsvr.exe; remember to take a backup before deleting. KEEP IN MIND regsvr32.exe is not to be deleted. Delete regsvr.exe occurrences only.
5. At one ore two places you will find it after explorer.exe in theses cases only delete the regsvr.exe part and not the whole part. E.g. Shell = “Explorer.exe regsvr.exe” the just delete the regsvr.exe and leave the explorer.exe

Step4:
1. Click on start->search->for files and folders.
2. Their click all files and folders
3. Type “*.exe” as file name to search for
4. Click on ‘when was it modified ‘ option and select the specify date option
5. Type from date as 1/31/2008 and also type To date as 1/31/2008
6. Seek and destroy enemy soldiers: the search option
7. Now hit search and wait for all the exe’s to show up.
8. Once search is over select all the exe files and shift+delete the files, caution must be taken so that you don’t delete the legitimate exe file that you have installed on 31st January.
9. Also selecting lot of files together might make your computer unresponsive so delete them in small bunches.
10. Also find and delete regsvr.exe, svchost .exe( notice an extra space between the svchost and .exe)

Shut-down ur PC from DOS Prompt
You can shut down your pc from dos prompt like this :
type .... shutdown -s ( it'll give you 30 secs to save your work and then it'll shutdown)

for restart type shutdown -r
and for log off type shutdown -l

for more options type shutdown only.

I tested these only on win xp ...

Auto Shutdown PC with no Timers

Method:1

How To Make A Shutdown Timer!

Step 1:

Right click on your desktop and choose "New=>shortcuts".

Step 2:

In the box that says "Type the location of the shortcut",
type in "shutdown -s -t 3600" without the quotation marks and click next.

Note: 3600 are the amount of seconds before your computer shuts down. So , 60secs*60mins=3600secs.

Step 3:

Make up a name for the shortcut and you're done.
You can change the icon by right c=>properities=>change icon=>browse.

To abort

To make an abort key to stop the shutdown timer just create another shortcut and make
the "location of the shortcut" to " shutdown -a" without the quotes.

Method:2
Here is another trick to shutdown at a specific time, for example you wish to shutdown at 11:35am. Type this in

start=>Run

Type Code: at 11:35 shutdown -s

to abort

Code:

shutdown -a

**take note: all time are in 24hr, example u would like to shutdown at 8:30pm, you should type

"at 20:30 shutdown -s" without quote.


A Fast way of opening Soft wares from the Keyboard

This is a cool way to open soft wares and games or others by RUN . 1-open c:/windows/system32 put a shortcut of the software in that folder and rename it. eg. cs2 then press WINDOWS LOGO KEY + R write CS2 it will open the program of the shortcut . . , and its a good way to open soft wares secretly. . , he he he

Keyboard Shortcuts

• CTRL+C (Copy)
• CTRL+X (Cut)
• CTRL+V (Paste)
• CTRL+Z (Undo)
• DELETE (Delete)
• SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
• CTRL while dragging an item (Copy the selected item)
• CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
• F2 key (Rename the selected item)
• CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
• CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
• CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
• CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
• CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
• SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
• CTRL+A (Select all)
• F3 key (Search for a file or a folder)
• ALT+ENTER (View the properties for the selected item)
• ALT+F4 (Close the active item, or quit the active program)
• ALT+ENTER (Display the properties of the selected object)
• ALT+SPACEBAR (Open the shortcut menu for the active window)
• CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
• ALT+TAB (Switch between the open items)
• ALT+ESC (Cycle through items in the order that they had been opened)
• F6 key (Cycle through the screen elements in a window or on the desktop)
• F4 key (Display the Address bar list in My Computer or Windows Explorer)
• SHIFT+F10 (Display the shortcut menu for the selected item)
• ALT+SPACEBAR (Display the System menu for the active window)
• CTRL+ESC (Display the Start menu)
• ALT+Underlined letter in a menu name (Display the corresponding menu)
• Underlined letter in a command name on an open menu (Perform the corresponding command)
• F10 key (Activate the menu bar in the active program)
• RIGHT ARROW (Open the next menu to the right, or open a submenu)
• LEFT ARROW (Open the next menu to the left, or close a submenu)
• F5 key (Update the active window)
• BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
• ESC (Cancel the current task)
• SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
• CTRL+SHIFT+ESC (Open Task Manager).

Hide the System Files nd Folders using DOS prompt

  1. Open a Command Prompt window. (Start->All Programs->Accessories->Command Prompt). For some files, this must be run with Administrator privileges . In that case, right click on Command Prompt, and click “Run as administrator.”
  2. By default it should already open in the "C:\Users\[your_username]" directory.
  3. Type "attrib +S +H AppData" to hide the AppData directory.
  4. Type "attrib +S +H ntuser.dat.LOG1" to hide ntuser.dat.LOG1.
  5. Type "attrib +S +H ntuser.dat.LOG2" to hide ntuser.dat.LOG2.
  6. Look at your user directory in Windows Explorer and they should not be showing anymore. (A refresh might be required to see the changes)

If you ever need to undo this, simply substitute the "+S +H" with an "-S -H" in the instructions above.


Speed Up by closing IDLE services

This trick helps you increase your speed by closing all the idle background services. To enable this feature, you will need to be logged into your computer with administrative rights.

1. Click Start button and click on Run option.
2. In the Run box, type the command “Rundll32.exe advapi32.dll,ProcessIdleTasks” and press Ok buttHere system will take some time to end the background idle tasks.


Restore Default Desktop Icons

You can restore the all windows default desktop icons, if you accidentally deleted them from your computer desktop.

List of windows default icons.

  • My Computer
  • Internet Explorer
  • My Documents
  • My Network Places
  • Recycle Bin

Fellow the given steps to restore the windows default icons:

  • Go to Start Button and open Run
  • Type the given command to open windows Desktop items dialog box.
    Control desk.cpl,,@Web
  • Click OK
  • Now Select Items that you want on your Desktop
  • Click Ok

Surf Blocked Sites

Are you frustrated because you are not able to visit your favorite websites in your school or college or any place where some sites are blocked? There are two methods to access these sites:


First Method:

Search the banned website, for example www.pctipsntricks.wordpress.com in Google or Yahoo! search engine. Then open the cached copy of that page to access the website. You can get also cache link of that website, if you search in Google with keyword cache:[URL] and get cache link to access the website.

Second Method:

Below are the list of various sites from which you can surf the blocked websites !

Use Notepad as a Diary


Want to write your diary on your computer? You can do it without using any software.

1. Open Notepad

2. Type “.LOG”

3. Save it

4. Now every time you open this file notepad will automatically insert date and time to the last line of the file. You can type anything after that line and save it. In this way you can use it as a diary.

Shutdown,Restart or Logoff System through Network

Windows XP has a built-in feature (shutdown tools) that is used to shutdown any connected computers from any one computer. Using this feature, you can log off, restart and shutdown any computer in your network. This tip is very useful for you, if you are a Network Administrator at your company, because if you have experience to shutdown all connected computers daily in your local area network one by one, definitely that job is annoying responsibility for you.Follow the given steps to configure shutdown tool on your computer:To use this feature, you will need to be logged into your computer with administrative rights.To perform this task, first make sure your both computers are directly connected or connected to network.Click Start button then type shutdown -i in Run option then press Enter for next.

A small windows dialog box will appear with the title “Remote Shutdown Dialog”.

Here first click on “Add” button to add computer, a small Add computers window will open, here type the name or IP address of the computer (you can add many computer for same action) that you want to turned off, then press OK for next.

Now select the action “What do you want these computers to do (log off, restart or shutdown)”. If you want to warn your users about this action, select the check box “Warn users of the action” then set time, display warning for 30 seconds or more.

Now select the option that describes the reason to shutdown the computers and also type some comments for users.

Now when you press the OK button, the users will see a “System Shutdown Windows “with time and comments that you had been set.


Hide the Text below Desktop icons

Works on: All versions of Windows

Some icons you use so regularly that you don’t need that annoying text below the icon. A good example of this is Internet Explorer or Mozilla Firefox. We all know what those icons look like. To remove that text, just follow these instructions.

Right-click on the shortcut icon, and choose Rename. Now hold down the Alt key and type in 255 on the keypad to the right of the keyboard. You can’t use the number keys right above the keyboard. If you have a laptop, you can turn on Numlock and then use the little number keys next to the regular letters.

The way this works is that the Alt+255 character is blank, so the shortcut filename is actually just named with a character that is completely blank. For the first shortcut on the desktop, you would use Alt+255, but for the next shortcut, you’ll have to enter the combination twice (Alt+255, Alt+255). For the third, three times… and so on. This is because you can’t name two different shortcuts or files the same thing. Entering Alt+225 twice would give you two blanks instead of one.

Now we have a beautiful icon, with no text underneath it!