W3cert - Learn Internet security & Ethical Hacking
Posted by AI | 10:52 PM | e learning, Hacking, hacking course, Internet security course, online hacking course, register for hacking course, w3cert | 3 comments »Google Wave invitations Available!
Posted by AI | 8:19 AM | free google wave invitations, google, google wave, google wave invitations, google wave invitations given, google wave videos, i need google wave invitation, wave | 0 comments »I have some about 6 google wave invitations !! If you are in need of it you please comment this post with your mail id . I will push you in the queue of those wave friends !
Comments make caring !!
Swine Flu H1N1
Posted by AI | 7:04 AM | affects, how swine flu spread, infection, influenza, swine flu, swine flu symptoms, vaccines for swine flu | 0 comments »20 Steps to Change your IP
Posted by AI | 3:31 AM | DOS prompt, dynamic IP, Hacking, hacking tools, IP address, ipconfig, ISP/IP, MS DOS, network security, TCP/IP, Tips, tricks | 0 comments »Basic Security through MS-DOS
Posted by AI | 3:07 AM | DOS, DOS commands, DOS prompt, Hacking, hacking tools, IP address, netstat, network connections, network security, ping, Tips, tracert, virus security | 0 comments »THE MATRIX COMES TRUE
Posted by AI | 2:42 AM | artificial intelligence, artificial limbs, bio technology, brain, equipment, Matrix, medical science, neuro, neurology, paper presentation, robotics | 0 comments »
World most famous technologies are
1.Bio-technology
2.Artificial intelligence
In addition the Bio-technology be used in the medical side with the technological instruments for process or demanding purpose likewise, Artificial intelligence was developed in the impression of ROBORTICS, programmer are given the outstanding routine by encoding the Artificial intelligence, appropriate to this the robots be able to walk, talk, swim, constant it can drive a car for the user probability.
WHY WE GO FOR THE MATRIX: Most of the significant Organization will modify their area of importance in the manufacturing of the ROBOTS, this will bring the enormous fight in the midst of other organization for the best and consequence, and they produce a lot special assortment of robot for special purpose, and in conclusion robots population will go up, ultimately if this exist various kinds of robots will structure a set of connections and there may be a opportunity to relocate the data form one to another robots, eventually the robots may get a possibility to survive the complete humankind. As a final point we deduce to demolish the robots, at this stage the mankind can't battle with the robots because they are finished up of tough steel and metal. But we can fight with our NATURAL INTELLIGENCE, for this we move on to the MATRIX.
HOW THE MATRIX IS CREATED:
Linking with the Brain:
Decades of basic research have clarified how individual neurons pass signals to one another and along pathways to the brain or muscles. Scientists know how electrical events trigger an impulse within a neuron, and how chemical processes transmit the signal from one neuron to another or to a muscle cell. Scientists also are able to monitor or stimulate a single neuron. The passage of information is a matter of electrical input and output on a minute scale, and technological advances have allowed researchers to measure these transmissions and impart their own. On a very basic level, the language spoken by humans and machines is the same.
This understanding has led to the development of neuroprosthetics, artificial devices that link the body's nervous system (mainly the brain) with the external environment. Neuroprosthetics allow passage of electrical signals in either direction. They can transmit sensory information from the external world to the brain, they also can receive commands from the brain to create motion through artificial limbs or communicate thoughts or wishes.
wanna know more about this article leave your comment we will provide you further info about this . Visit us again !!
HOW TO INSTALL A KASPERSKY KEY
Posted by AI | 7:05 AM | image explaination, install key, Kaspersky 2009, kaspersky 2009 keys, Kaspersky key, KAV, KIS | 0 comments »DOS –Disc Operating System
Posted by AI | 9:53 AM | disk operating system, DOS, dos basics, DOS commands, dos shell, functions, MS DOS, primary program, shell commands | 0 comments »INTRODUCTION:
Dos is a disk operating system with a set of programs that act as a translator between the user
and the computer in order to perform the task of the user. Ms-Dos is a popular operating system on Micro-Computers.
Related systems include MS-DOS, PC DOS, DR-DOS, Free DOS, PTS-DOS, ROM-DOS, JM-OS, and several others.This is the first program that is installed when an OS get installed. There are many version ranging from v2.0 to v7.0 .
Dos commands are of two types:
Internal Commands:
Cls : This command is used to clear the screen.
Ver : This helps us to know the later version of dos.
Vol : This command shows the label of the current drive & and its serial number.
Date : This command display the current date. Also called as the system date.
Time. : This command display the current time and also the message to enter the new time
Dir : This command display the list of files and directory in the mentioned directory or drive.
Dir/P : This command show all the files pagewise. Once the screen is full of filename a message saying “press any key to continue” is displayed, he user can take his/ her own time o view the files & its details.
Dir/w : This command is used to display the content of disk i.e files width wise i.e:- five filenames perline.
Wild Characters : There are 2 wild characters.
?: denoted any one single characters.
* : denotes any no of characters.
Type : This command is used to see the content of a specific file on the screen.
Rename or Ren : This command is used to change the filename.
Copy : This commands is used to duplicate the content of one file in to another file.
Directories : A directories is a separate area on the disk to store some files.
Md
External Commands :
External commands are ones which requires certain special Dos files for their execution.
Tree : This command display path and optionally list the content of each directory and sub directory on the specified drive.
Sort : The sort filter reads input ,sorts the data and then writes the sorted data screen or to a file or another device.
Find : Locates all the lines which contain a specific string of text in a file or files.
Print : This command used to print to content of the files.
Chkdsk: This command is used to display the report regarding the status of the disk.
Diskcopy: This command is used to copy the content of one disk to another.
Attrib : Each and every file has some attributes stored for it.
Backup: The hardisk can sometimes suffer a head crash. In such occasion all data on the disk is lost and irrecoverable.
Format : To make a floppy or hardisk capable of storage.
Del tree: It is used to delete all files or directories from the drive or directory from drive or directory.
DOS Shell
DOS shell, which first appeared with DOS 4 is a program that attempts to provide an easier interface to DOS. DOS shell provides a graphical front end to DOS commands allowing most of them to be executed using the mouse, with minimal keyboard input. Note that DOS shell was not provided with MS-DOS version 6.
To run the DOS shell program type DOSSHELL
Opening Screen Display
Once DOSSHELL is launched the first screen displays a menu bar to the top, directly beneath it a list of drives which can be accessed, and then three small windows. The windows are the Directory Tree window (in which you select a directory on the currently highlighted drive), the Files window (displaying the contents of the selected directory), and a Main window giving access to the DOS command prompt, editor, DOS Q-Basic and some disk utilities.
Help from within DOS Shell
You can get help on using the DOS shell environment in the following ways –
By using the Mouse - clicking on the Help option in the menu bar
By using the keyboard - by pressing Alt+H
In both cases a pull down menu appears and you select from the menu by moving the selection bar to one of the options with either the mouse or the ↑and ↓arrow keys and then clicking on your chosen option or pressing
Basic Keys for using the Menus
Alt Activates the Menu Bar
← → Selects a menu
↓↑Selects a menu option
Esc Leaves the menu bar
Basic Keys for using the windows
Tab Moves between Drives, Directories, Files and Main windows
Arrow Keys Selects option within window
Quitting DOS Shell
There are several ways of quitting from the DOS shell environment
Press Alt+F4
Press F3
From the menu select File and choose Exit
Human Area Network Technologies REDTACTON
Posted by AI | 7:29 AM | Applications, Data exchange, HAN, handshake, IEEE 802.11, Infrared, japan, network, NTT, paper presentation, PDA, redtacton, technology, touch sensor, wireless technology | 0 comments »RedTacton is a Human Area Networking technology, which is under development, that uses the surface of the human body as a safe, high speed network transmission path. RedTacton uses weak electric fields on the surface of the body as a transmission medium. Nippon Telegraph and Telephone Corporation, developing the conducting field trials for a radical new “human area networking” technology called RedTacton that uses the naturally-occurring electrical fields of human skin to transmit data. The slim, PCMCIA- based RedTacton transceiver combines an optical receiver circuit equipped with a super-sensitive photonic electrical field sensor and a crystal to transmit data over the surface of human body at up to 10 megabits per second between wearable devices. Linked only by touch, the transceivers can also connect to similar transceivers worn by other users or embedded in any objects in real space, such as turnstiles or consumer electronics. Promising better security and far less interference than short-range wireless technologies such as Bluetooth, ZigBee and
HOW REDTACTON WORKS
Using a new super-sensitive photonic electric field sensor, RedTacton can achieve duplex communication over the human body at a maximum speed of 10 M bps.