adsfundi

Monday, August 31, 2009

Fun Facts News

While India is the world's largest democracy in the world today, do you know which the oldest democracy is? Iceland! The Althing, which is the name for the parliament of Iceland, was founded in 930. So, Iceland is the worlds .

Thursday, August 27, 2009

Protocol

BitTorrent (protocol)
The BitTorrent logoBitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data. BitTorrent is one of the most common protocols for transferring large files, and by Ipoque estimates it accounted for approximately 27-55% of all Internet traffic depending on geographical location as of February 2009.

BitTorrent protocol allows users to receive large amounts of data without putting the level of strain on their computers that would be needed for standard Internet hosting. A standard hosts' servers can easily be brought to a halt if extreme levels of simultaneous data flow are reached. The protocol works as an alternative data distribution method that makes even small computers with low bandwidth capable of participating in large data transfers.

First, a user playing the role of file-provider makes a file available to the network. This first user's file is called a seed and its availability on the network allows other users, called peers, to connect and begin to download the seed file. As new peers connect to the network and request the same file, their computer receives a different piece of the data from the seed. Once multiple peers have multiple pieces of the seed, BitTorrent allows each to become a source for that portion of the file. The effect of this is to take on a small part of the task and relieve the initial user, distributing the file download task among the seed and many peers. With BitTorrent, no one computer needs to supply data in quantities which could jeopardize the task by overwhelming all resources, yet the same final result—each peer eventually receiving the entire file—is still reached.

After the file is successfully and completely downloaded by a given peer, the peer is able to shift roles and become an additional seed, helping the remaining peers to receive the entire file. The community of BitTorrent users frowns upon the practice of disconnecting from the network immediately upon success of a file download, and encourages remaining as another seed for as long as practical, which may be days.

This distributed nature of BitTorrent leads to a viral spreading of a file throughout peers. As more peers join the swarm, the likelihood of a successful download increases. Relative to standard Internet hosting, this provides a significant reduction in the original distributor's hardware and bandwidth resource costs. It also provides redundancy against system problems, reduces dependence on the original distributor and provides a source for the file which is generally temporary and therefore harder to trace than when provided by the enduring availability of a host in standard file distribution techniques.

Remote upload

When there is a transfer of data from a remote system to another remote system, the process is called "remote uploading". This is used by some online file hosting services.

Remote uploading is also used in situations where the computers that need to share data are located on a distant high speed local area network, and the remote control is being performed using a comparatively slow dialup modem connection.

For example:

The user remotely accesses a file hosting service at MyRemoteHost.
The user finds a public file at PublicRemoteHost and wants to keep a copy in their MyRemoteHost.
To have it done they "remote upload" the file from PublicRemoteHost to MyRemoteHost.
None of the hosts are located on the user's the local network.
Without remote uploading functionality, the user would be required to download the file first to their local host and then re-upload it to the remote file hosting server.

Where the connection to the remote computers is via a dialup connection, the transfer time required to download locally and then re-upload could increase from seconds, to hours or days.

Sideload

When applied to local transfers (sending data from one local system to another local system), it is often difficult to decide if it is an upload or download, as both source and destination are in the local control of the user. Technically if the user uses the receiving device to initiate the transfer then it would be a download and if they used the sending device to initiate it would be an upload. However, as most non-technical users tend to use the term download to refer to any data transfer, the term "sideload" is increasingly being used to cover all local to local transfers to end this confusion.

Download

The word's primary usage comes in the form of a verb. Increasingly, websites that offer streaming media or media displayed in-browser, such as YouTube, and which place restrictions on the ability of users to save these materials to their computers after they have been received, say that downloading is not permitted. In this context, "download" implies specifically "receive and save" instead of simply "receive". Downloads

Jumla Files Info

Use the form below to upload multiple files to jumalafiles.info. At least Flash 9 is required to view the upload tool. Please note the following before uploading:



•Max File Size: 3.17 GB.
•No copyrighted files.
•By uploading you are agreeing to the Terms of Service.
•All bulk uploaded files are placed into your default folders if you have an account with us.

Wednesday, August 26, 2009

HTML Tutorials

My First Heading



My first paragraph.

Monday, August 24, 2009

Prerequisite software for the information center

To use this information center, you must have one of the following Web browsers installed as your default system browser:
•Minimum: Microsoft Internet Explorer Version 6.0, or Mozilla-based browsers Version 1.7 or higher. On some platforms, other browsers can be used; however, some functionality might not be available for older browser levels or other browser types.

Accessibility and keyboard shortcuts in the information center

Accessibility features help users with physical disabilities, such as restricted mobility or limited vision, to use software products successfully. The major accessibility features in this product enable users to do the following tasks:
•Use assistive technologies, such as screen-reader software and digital speech synthesizer, to hear what is displayed on the screen. Consult the product documentation of the assistive technology for details about using those technologies with this product.
•Operate specific or equivalent features using only the keyboard.
•Magnify what is displayed on the screen.
In addition, the documentation was modified to include the following features to aid accessibility:
•All documentation is available in HTML formats to give the maximum opportunity for users to apply screen-reader software technology.
•All images in the documentation are provided with alternative text so that users with vision impairments can understand the contents of the images.
Use the following key combinations to navigate the interface by keyboard:

•In the Topic pane, to go to the next link, press Tab.
•To expand and collapse a node in the navigation tree, press the Right and Left arrows.
•To move to the next topic node, press the Down arrow.
•To move to the previous topic node, press the Up arrow.
•To go to the next link, button, or topic node from inside one of the views, press Tab.
•To scroll all the way up or down in a pane, press Home or End.
•To go back, press Alt+Left arrow; to go forward, press Alt+Right arrow.
•To go to the next pane, press F6.
•To move to the previous pane, press Shift+F6.
•To print the active pane, press Ctrl+P.
•To open the pop-up menu, press Alt+M.
•To move to the previous item on the pop-up menu, press the Up arrow.
•To move to the next item on the pop-up menu, press the Down arrow.
•To select an item on the pop-up menu, move to the item and press Enter.
•To close the pop-up menu, press Esc.
•To move to the contents view, press Alt+C.
•To move to the Search Results view, press Alt+R.
•To move to the Index view, press Alt+I.

Why Do I Need to Backup My Data?


Importance of Good Backup Data
After five years of providing technical support for a variety of accounting packages, one thing I've found that is sure to bring tears to the person calling support is the question: "How recent was your last good data backup? "

Backup Data As Corruption Will Happen
It is absolutely critical that users understand that corruption happens, hard drives will fail, motherboards will short out, and mistakes will erase data. Good maintenance and technical skills may increase the time between errors, but in the end Murphy always wins and you will need your data backup.

Backup Data Solutions are Affordable
What is important to stress it that having a regular" data backup does not need to be painfully or expensive. Modern technology had brought very large hard drives, Zip and Jazz, DVD and CD burners, and tape data backup systems within the reach of even a modest budget. Even though the question of which of these items are appropriate for your data backup needs and budget will depend on your particular circumstances, but the overall need for data backup is not.

True Cost of Having No Backup Data
Almost as important as admiting it can happen to you, is recognizing the cost of data loss. Most people don't realize how much they have invested into the data on their hard drive. Forget about the obvious things like financial data (Receivables, Payables, and Tax Information), which we know would be disastrous to lose. Instead think about the man-hours re-installing the base software on your computer, reconfiguring your environment to suit your preferences again.

Losing your e-mail addresses, and Internet bookmarks. Without a full data backup, getting up and going again could easily cost you several days of productivity.. How much is your time worth to you.

On the other hand, occasional full data backups, combined with nightly backups of key data, will often turn several days of lost productivity and weeks of reorganizing into an hour of restoring your disk image, and key data that may have changed since the last full backup.

Method for secure storage and verification of the administrator, power-on password and configuration information


1. A computer system, comprising: a CPU executing an operating system; and an input device coupled to said CPU; and a read only memory containing an encoded password andencoded configuration data accessible by a user only upon entering a valid password via said input device; wherein said password and said encoded configuration data is modified by system management interrupt (SMI) code executed by said CPU withoutinvolvement by said operating system; and wherein a password entered via the input device is verified by the SMI code without involvement of said operating system.

2. The computer system of claim 1 wherein said password comprises a power-on password usable to change the operating state of the computer system.

3. The computer system of claim 1 wherein said password comprises an administrator password usable to change the encoded configuration data.

4. The computer system of claim 1 wherein said read only memory contains two passwords.

5. The computer system of claim 4 wherein said passwords comprise a power-on password usable to change the operating state of the computer system and an administrator password usable to change the encoded configuration data.

6. The computer system of claim 1 wherein said password is encoded using an encryption process.

7. The computer system of claim 1 wherein said password is encoded using a hash process.

8. The computer system of claim 1 wherein said configuration data is encoded using an encryption process.

9. A read only memory device, comprising: a boot block portion; system BIOS; and an encoded password changeable only by system management interrupt ("SMI") based code executed by a processor; wherein a password entered by a user is comparedto the encoded password for verification by the SMI-based code without involvement of an operating system.


10. The read only memory device of claim 9 wherein said password is encoded by an encryption process.

11. The read only memory device of claim 9 wherein said password is encoded by a hash process.

12. The read only memory device of claim 9 wherein said password comprises a power-on password usable to change an operating state of a computer system.

13. The read only memory device of claim 9 further comprising encoded configuration data.

14. The read only memory device of claim 13 wherein said password comprises an administrator password usable to change the state of said encoded configuration data.

15. The read only memory device of claim 13 wherein said configuration data is encoded by an encryption process.

16. A read only memory device, comprising: a boot block portion; system BIOS; and encoded configuration data and an encoded password, both of said configuration data and password changeable only by system management interrupt (SMI) code thatexecutes without involvement from an operating system; wherein a password entered by a user is compared to the encoded password for verification by the SMI code without involvement of said operating system.

17. The read only memory device of claim 16 wherein said configuration data is encoded by an encryption process.

18. The read only memory device of claim 16 wherein said configuration data is encoded by a hash process.

19. The read only memory device of claim 16 wherein said configuration data includes configuration bits pertaining to a hood lock for a computer system.

20. The read only memory device of claim 16 wherein said password is encoded by an encryption process.

21. The read only memory device of claim 16 wherein said password is encoded by hash process.

22. The read only memory device of claim 16 wherein said password comprises an administrator password usable to change the state of said encoded configuration data.

23. The read only memory device of claim 16 wherein said password comprises a power-on password usable to change an operating state of a computer system.

24. A method of changing a password in a computer system, comprising: (a) receiving an original password entered by a user; (b) receiving a new password entered by a user; (c) generating an SMI; (d) encoding said user-entered originalpassword; (e) retrieving an encoded password from a read only memory device previously stored therein; (f) comparing said user-entered original and encoded password from (d) with the retrieved encoded password from (e); and (g) changing said passwordretrieved in (e) with the new password if said encoded passwords match in (f) wherein (d)-(g) are performed by system management interrupt (SMI) code.

25. The method of claim 24 further comprising precluding changing of said password retrieved in (e) if said encoded passwords do not match in (f).

26. The method of claim 24 wherein (g) includes encoding the new password and flashing a read only memory device with the new password.

27. The method of claim 24 further comprising using the SMI code to verify a user-entered password.

Saturday, August 22, 2009

Ethernets

1.2.2. Ethernets
The most common type of LAN hardware is known as Ethernet. In its simplest form, it consists of a single cable with hosts attached to it through connectors, taps, or transceivers. Simple Ethernets are relatively inexpensive to install, which together with a net transfer rate of 10, 100, or even 1,000 Megabits per second, accounts for much of its popularity.
Ethernets come in three flavors: thick, thin, and twisted pair. Thin and thick Ethernet each use a coaxial cable, differing in diameter and the way you may attach a host to this cable. Thin Ethernet uses a T-shaped “BNC” connector, which you insert into the cable and twist onto a plug on the back of your computer. Thick Ethernet requires that you drill a small hole into the cable, and attach a transceiver using a “vampire tap.” One or more hosts can then be connected to the transceiver. Thin and thick Ethernet cable can run for a maximum of 200 and 500 meters respectively, and are also called 10base-2 and 10base-5. The “base” refers to “baseband modulation” and simply means that the data is directly fed onto the cable without any modem. The number at the start refers to the speed in Megabits per second, and the number at the end is the maximum length of the cable in hundreds of metres. Twisted pair uses a cable made of two pairs of copper wires and usually requires additional hardware known as active hubs. Twisted pair is also known as 10base-T, the “T” meaning twisted pair. The 100 Megabits per second version is known as 100base-T.
To add a host to a thin Ethernet installation, you have to disrupt network service for at least a few minutes because you have to cut the cable to insert the connector. Although adding a host to a thick Ethernet system is a little complicated, it does not typically bring down the network. Twisted pair Ethernet is even simpler. It uses a device called a “hub,” which serves as an interconnection point. You can insert and remove hosts from a hub without interrupting any other users at all.
Many people prefer thin Ethernet for small networks because it is very inexpensive; PC cards come for as little as US $30 (many companies are literally throwing them out now), and cable is in the range of a few cents per meter. However, for large-scale installations, either thick Ethernet or twisted pair is more appropriate. For example, the Ethernet at GMU's Mathematics Department originally chose thick Ethernet because it is a long route that the cable must take so traffic will not be disrupted each time a host is added to the network. Twisted pair installations are now very common in a variety of installations. The Hub hardware is dropping in price and small units are now available at a price that is attractive to even small domestic networks. Twisted pair cabling can be significantly cheaper for large installations, and the cable itself is much more flexible than the coaxial cables used for the other Ethernet systems. The network administrators in GMU's mathematics department are planning to replace the existing network with a twisted pair network in the coming finanical year because it will bring them up to date with current technology and will save them significant time when installing new host computers and moving existing computers around.
One of the drawbacks of Ethernet technology is its limited cable length, which precludes any use of it other than for LANs. However, several Ethernet segments can be linked to one another using repeaters, bridges, or routers. Repeaters simply copy the signals between two or more segments so that all segments together will act as if they are one Ethernet. Due to timing requirements, there may not be more than four repeaters between any two hosts on the network. Bridges and routers are more sophisticated. They analyze incoming data and forward it only when the recipient host is not on the local Ethernet.
Ethernet works like a bus system, where a host may send packets (or frames) of up to 1,500 bytes to another host on the same Ethernet. A host is addressed by a six-byte address hardcoded into the firmware of its Ethernet network interface card (NIC). These addresses are usually written as a sequence of two-digit hex numbers separated by colons, as in aa:bb:cc:dd:ee:ff.
A frame sent by one station is seen by all attached stations, but only the destination host actually picks it up and processes it. If two stations try to send at the same time, a collision occurs. Collisions on an Ethernet are detected very quickly by the electronics of the interface cards and are resolved by the two stations aborting the send, each waiting a random interval and re-attempting the transmission. You'll hear lots of stories about collisions on Ethernet being a problem and that utilization of Ethernets is only about 30 percent of the available bandwidth because of them. Collisions on Ethernet are a normal phenomenon, and on a very busy Ethernet network you shouldn't be surprised to see collision rates of up to about 30 percent. Utilization of Ethernet networks is more realistically limited to about 60 percent before you need to start worrying about it.

Introduction to TCP/IP Networks

1.2.1. Introduction to TCP/IP Networks
TCP/IP traces its origins to a research project funded by the United States Defense Advanced Research Projects Agency (DARPA) in 1969. The ARPANET was an experimental network that was converted into an operational one in 1975 after it had proven to be a success.
In 1983, the new protocol suite TCP/IP was adopted as a standard, and all hosts on the network were required to use it. When ARPANET finally grew into the Internet (with ARPANET itself passing out of existence in 1990), the use of TCP/IP had spread to networks beyond the Internet itself. Many companies have now built corporate TCP/IP networks, and the Internet has grown to a point at which it could almost be considered a mainstream consumer technology. It is difficult to read a newspaper or magazine now without seeing reference to the Internet; almost everyone can now use it.
For something concrete to look at as we discuss TCP/IP throughout the following sections, we will consider Groucho Marx University (GMU), situated somewhere in Fredland, as an example. Most departments run their own Local Area Networks, while some share one and others run several of them. They are all interconnected and hooked to the Internet through a single high-speed link.
Suppose your Linux box is connected to a LAN of Unix hosts at the Mathematics department, and its name is erdos. To access a host at the Physics department, say quark, you enter the following command:
$ rlogin quark.physics
Welcome to the Physics Department at GMU
(ttyq2) login:
At the prompt, you enter your login name, say andres, and your password. You are then given a shell
[1] on quark, to which you can type as if you were sitting at the system's console. After you exit the shell, you are returned to your own machine's prompt. You have just used one of the instantaneous, interactive applications that TCP/IP provides: remote login.
While being logged into quark, you might also want to run a graphical user interface application, like a word processing program, a graphics drawing program, or even a World Wide Web browser. The X windows system is a fully network-aware graphical user environment, and it is available for many different computing systems. To tell this application that you want to have its windows displayed on your host's screen, you have to set the DISPLAY environment variable:
$ DISPLAY=erdos.maths:0.0
$ export DISPLAY
If you now start your application, it will contact your X server instead of quark's, and display all its windows on your screen. Of course, this requires that you have X11 runnning on erdos. The point here is that TCP/IP allows quark and erdos to send X11 packets back and forth to give you the illusion that you're on a single system. The network is almost transparent here.
Another very important application in TCP/IP networks is NFS, which stands for Network File System. It is another form of making the network transparent, because it basically allows you to treat directory hierarchies from other hosts as if they were local file systems and look like any other directories on your host. For example, all users' home directories can be kept on a central server machine from which all other hosts on the LAN mount them. The effect is that users can log in to any machine and find themselves in the same home directory. Similarly, it is possible to share large amounts of data (such as a database, documentation or application programs) among many hosts by maintaining one copy of the data on a server and allowing other hosts to access it. We will come back to NFS in
Chapter 14. Of course, these are only examples of what you can do with TCP/IP networks. The possibilities are almost limitless, and we'll introduce you to more as you read on through the book.
We will now have a closer look at the way TCP/IP works. This information will help you understand how and why you have to configure your machine. We will start by examining the hardware, and slowly work our way up.

TCP/IP Networks

1.2. TCP/IP Networks
Modern networking applications require a sophisticated approach to carrying data from one machine to another. If you are managing a Linux machine that has many users, each of whom may wish to simultaneously connect to remote hosts on a network, you need a way of allowing them to share your network connection without interfering with each other. The approach that a large number of modern networking protocols uses is called packet-switching. A packet is a small chunk of data that is transferred from one machine to another across the network. The switching occurs as the datagram is carried across each link in the network. A packet-switched network shares a single network link among many users by alternately sending packets from one user to another across that link.
The solution that Unix systems, and subsequently many non-Unix systems, have adopted is known as TCP/IP. When talking about TCP/IP networks you will hear the term datagram, which technically has a special meaning but is often used interchangeably with packet. In this section, we will have a look at underlying concepts of the TCP/IP protocols.

TCP/IP Networks

1.2. TCP/IP Networks
Modern networking applications require a sophisticated approach to carrying data from one machine to another. If you are managing a Linux machine that has many users, each of whom may wish to simultaneously connect to remote hosts on a network, you need a way of allowing them to share your network connection without interfering with each other. The approach that a large number of modern networking protocols uses is called packet-switching. A packet is a small chunk of data that is transferred from one machine to another across the network. The switching occurs as the datagram is carried across each link in the network. A packet-switched network shares a single network link among many users by alternately sending packets from one user to another across that link.
The solution that Unix systems, and subsequently many non-Unix systems, have adopted is known as TCP/IP. When talking about TCP/IP networks you will hear the term datagram, which technically has a special meaning but is often used interchangeably with packet. In this section, we will have a look at underlying concepts of the TCP/IP protocols.

Linux Network Administrators Guide

1.1. History
The idea of networking is probably as old as telecommunications itself. Consider people living in the Stone Age, when drums may have been used to transmit messages between individuals. Suppose caveman A wants to invite caveman B over for a game of hurling rocks at each other, but they live too far apart for B to hear A banging his drum. What are A's options? He could 1) walk over to B's place, 2) get a bigger drum, or 3) ask C, who lives halfway between them, to forward the message. The last option is called networking.

Of course, we have come a long way from the primitive pursuits and devices of our forebears. Nowadays, we have computers talk to each other over vast assemblages of wires, fiber optics, microwaves, and the like, to make an appointment for Saturday's soccer match.[1] In the following description, we will deal with the means and ways by which this is accomplished, but leave out the wires, as well as the soccer part.

We will describe three types of networks in this guide. We will focus on TCP/IP most heavily because it is the most popular protocol suite in use on both Local Area Networks (LANs) and Wide Area Networks (WANs), such as the Internet. We will also take a look at UUCP and IPX. UUCP was once commonly used to transport news and mail messages over dialup telephone connections. It is less common today, but is still useful in a variety of situations. The IPX protocol is used most commonly in the Novell NetWare environment and we'll describe how to use it to connect your Linux machine into a Novell network. Each of these protocols are networking protocols and are used to carry data between host computers. We'll discuss how they are used and introduce you to their underlying principles.

We define a network as a collection of hosts that are able to communicate with each other, often by relying on the services of a number of dedicated hosts that relay data between the participants. Hosts are often computers, but need not be; one can also think of X terminals or intelligent printers as hosts. Small agglomerations of hosts are also called sites.

Communication is impossible without some sort of language or code. In computer networks, these languages are collectively referred to as protocols. However, you shouldn't think of written protocols here, but rather of the highly formalized code of behavior observed when heads of state meet, for instance. In a very similar fashion, the protocols used in computer networks are nothing but very strict rules for the exchange of messages between two or more hosts.

Friday, August 21, 2009

How to Unlock Your Nokia Cell Phone

Typically when you purchase a cell phone, the company that sold you the phone (ex: AT&T) 'locked' the phone before you bought it, so you can only use it on their network. This means that you can't use your phone if on any other network, even if you change the SIM (which is an abbreviation for Subscriber Identity Module) card. The SIM card is the little piece of plastic that identifies your phone to the cellular network. Changing your SIM card to have your phone work on another network is useful especially if you want to travel to another country and want to buy a pre-paid SIM card so you can have cell phone access without roaming charges. There are services that offer to provide unlocking capabilities for a fee, but don't pay for them! You can do it yourself for free, which is the perfect price.

Nokia N95 phone
var wh_color_link = '006398';
var wh_link_weight = 'bold';
var wh_link_size = "1.2em";
var wh_embed_channel = "";
randNum =Math.random();

google_max_num_ads = '4';
xchannels += "1663181275+";

function google_ad_request_done(google_ads) {
var s = '';
var i;

if (google_ads.length == 0) { return; }

if (google_ads.length == 1) {
s += '
' +
'' + google_ads[0].line1 + '
' +
'' + google_ads[0].line2 + ' ' + google_ads[0].line3 + '' +
'
' + google_ads[0].visible_url + '';

} else if (google_ads.length > 1) {

for(i = 0; i
' +
'' + google_ads[i].line1 + '
' +
'' + google_ads[i].line2 + ' ' + google_ads[i].line3 + '' +
'
' + google_ads[i].visible_url + '';
}


}

s = "
"
+ "" + s + "";

document.write(s);
return;
}
google_ad_client = "pub-9543332082073187";
google_ad_output = 'js';
google_ad_type = 'text';
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = "468x60_as";
google_feedback = 'on';
//embedded_ads, google sky, page wide track, intro photo, RQ4, PH 3000-4000, 50+ edits, RL Below, no related vids, Computers and Electronics, Main namespace
var show_browse = false;
if (show_embed_ads) {
google_ad_channel = wh_embed_channel +'+5613791162+7733764704+1640266093+9503394424+9665908481+3311607322+3607312525+8388126455+8941458308+6876289738+7122150828+' + xchannels;
} else {
}
//-->
google_protectAndRun("render_ads.js::google_render_ad", google_handleError, google_render_ad);

Unlock your 3G i`PhoneMillions of Satisfied Customers Unlock Your 3G i`Phone Now!www.Unlock-the-iPhone.com
Flexilis Mobile SecurityProtection From Theft, Data Loss & Hackers! 30 Days Free Then $4.95/mowww.Flexilis.com
Unlock Your Wii ConsolePlay any game on your Wii. No chip installation required.WiiUnlock.scgcinema.com
Develop Psychic PowersWith this Free Report from a true Psychic learn how to reveal secretswww.AboutAstro.com/psychic/
Hide these ads
0)
e.style.setAttribute('csstext', 'display: inline; clear: both; height: 80px; width:500px;', 0);
else
e.setAttribute('style', 'display: inline; clear: both; height: 80px; width:500px;');
} else {
google_max_num_ads = '0';
}
//--->

Thursday, August 20, 2009

Sony EricssonUnlock Code

Unlocks Ericsson so that you can use it on any GSM network in the world, such as: T-Mobile, Cingular, Orange, Rogers, Vodafone, and more!
Requires no technical knowledge. No Software/Drivers to install, no cable necesary. You just need to enter a code into your phone
Includes instructions on how to enter code into phone
Fast service and support
Cannot damage Phone
Place Your Order:From the list below, find the service provider that your cellphone is currently locked to and click the "Buy Now" button.
Ericsson Cingular/AT&T Unlock Code 20$

Ericsson T-Mobile USA Unlock Code 25$

Ericsson 3G UK Unlock Code 45$

Ericsson Amena Spain Unlock Code 45$

Ericsson BOUYGUE France Unlock Code 20$

Ericsson Fido Canada Unlock Code 20$

Ericsson Movistar Spain Unlock Code 30$

Ericsson Optimus Portugal Unlock Code 55$


Ericsson Orange Spain Unlock Code 50$

Ericsson Rogers Canada Unlock Code 20$

Ericsson SFR France Unlock Code 50$

Ericsson T-Mobile UK Unlock Code 75$

Ericsson Vodafone Australia Unlock Code 25$

Ericsson Vodafone Portugal Unlock Code 60$

Ericsson Vodafone UK Unlock Code 45$

Samsung Service codes for different models of Samsung mobile phones


For all:
*#06# Show IMEI
*#9999# Show mobile Software Version
*#0837# Show mobile Software Version (instructions)
*#0001# Show Serial Parameters
*#9125# Activates the smiley when charging
*#0523# LCD Contrast



*#9998*228# Battery status (capacity, voltage, temperature)
*#9998*246# Program status
*#9998*289# Change Alarm Buzzer Frequency
*#9998*324# Debug Screens
*#9998*364# Watchdog
*#9998*377# EEPROM Error Stack - Use side keys to select values
*#9998*427# Trace Watchdog
*#9998*523# Change LCD contrast
*#9998*544# Jig detect
*#9998*636# Memory status
*#9998*746# SIM File Size
*#9998*778# SIM Service Table
*#9998*785# RTK (Run Time Kernel) errors - if ok then phn is reset, info is put in memory error


*#9998*786# Run, Last UP, Last DOWN
*#9998*837# Mobile Software Version
*#9998*842# Test Vibrator - Flash the screenlight during 10 sec and vibration activated


*#9998*862# Vocoder Reg - Normal, Earphone or Carkit
*#9998*872# Diag
*#9998*947# Reset On Fatal Error
*#9998*999# Last/Chk


*#9998*9266# Yann debug screen (Debug Screens?)
*#9998*9999# Software version


*0001*s*f*t# Changes serial parameters (s=?, f=0.1, t=0.1)
*0002*?# unknown Samsung's comand
*0003*?# unknown Samsung's comand


For Mobile phones SGH (R210, T100, A300...)
if Samsung code is in format *#9998*xxx#
try write in this *#0xxx#


SGH-600
SGH-2100


*2767*3855# Full EEPROM Reset (THIS CODE REMMOVES SP-LOCK! but also changes IMEI to 447967-89-400044-0

*2767*2878# Custom EEPROM Reset


Samsung mobile phone codes: Samsung E700


*2767*688# remove USER CODE and SIMLOCK


Samsung mobile phone codes: Samsung V200


Unlocking:
Power on the mobile phone without SIM card and type these codes:


*2767*63342# and press green button
*2767*3855# and press green button
*2767*2878# and press green button
*2767*927# and press green button
*2767*7822573738# press button


Phone will be unlocked, but all trims are reseted !!!
Mobile phone must be fully charged


Samsung mobile phone codes: Samsung S500
Unlocking
*2767*MVT# (*2767*688#) E2P MVT Reset
*#SIMLOCK# (*#7465625#)

Designing Autonomous Mobile Robots


Designing Autonomous Mobile Robots introduces the reader to the fundamental concepts of this complex field. The author addresses all the pertinent topics of the electronic hardware and software of mobile robot design, with particular emphasis on the more difficult problems of control, navigation, and sensor interfacing.

Covering topics such as advanced sensor fusion, control systems for a wide array of application sensors and instrumentation, and fuzzy logic applications, this volume is essential reading for engineers undertaking robotics projects as well as undergraduate and graduate students studying robotic engineering, artificial intelligence, and cognitive science. Its state-of-the-art treatment of core concepts in mobile robotics challenges readers to explore new avenues in an exciting field. The accompanying CD-ROM provides software routines for the examples cited as well as an electronic version of the text.

Authored by a well-know pioneer of mobile robotics. Learn how to approach the design of robots and complex control system with confidence.

Introduction to Mobile Computing


Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere. Ubiquitous computing and nomadic computing are synonymous with mobile computing. Information access via a mobile device is plagued by low available bandwidth, poor connection maintenence, poor security, and addressing problems. Unlike their wired counterparts, design of software for mobile devices must consider resource limitation, battery power and display size. Consequently, new hardware and software techniques must be developed. For example, applications need to be highly optimized for space, in order to fit in the limited memory on the mobile devices. For Internet enabled devices, the good old TCP/IP stack cannot be used; it takes too much space and is not optimized for minimal power consumption. Given the plethora of cellular technologies that have emerged in such a market, it becomes extremely difficult to provide support for inter-device communication.

A new hardware technology solution, Bluetooth, has been proposed to overcome this barrier. Any device with a Bluetooth chip will be able to communicate seamlessly with any other device having a similar chip irrespective of the communication technologies they might be using. For the sake of explanation, an analogy can be drawn between the Java Virtual Machine and Blue tooth.

In the recent past, cellular phone companies have shown an interesting growth pattern. The number of customers has been steadily increasing but the average airtime per user has slowed to a constant. To increase the user average connect time, many cellular providers have started providing data services on their networks which entices the user to use the mobile device for both voice and data communication. Typical data services include chat, e-mail, Internet browsing. An example of this type of service is SMS (Short Message Service). It is a data service in a GSM cellular network that allows the users to send a maximum of 160-character message at a time (similar to paging). Inherently, this service is not feasible for browsing, checking e-mail or chatting. GSM networks provide another service called GPRS (General Packet Radio Service) that allows information to be sent and received across the cellular network.

There has also been a recent effort defining common standards for providing data services on hand-held devices. WAP (Wireless Application Protocol) and KVM (Kilobyte Virtual Machine) deserve a mention here. WAP is a protocol suite that comprises of protocols tailored for small devices. WAP has been developed by the WAP Forum [ www.wapforum.org] and runs over an underlying bearer protocol like IP or SMS. In the WAP model, a service provider operates a WAP gateway to convert Internet content to a miniaturized subset of HTML that is displayed by a mini-browser on the mobile device. Companies like Nokia, Ericsson and Motorola have already developed WAP enabled phones. As of now, these phones are available and functional mostly in Europe.

HTML, the de-facto Internet language, is not optimized for these devices. Handheld devices are characterized by small display sizes, limited input capabilities and limited bandwidth. The HTML document model consisting of headers, titles, paragraphs, etc, does not work well for a 10 row by 15 character wide screen. Keeping in mind the memory constraints of the mobile device, the browser should not be heavy (i.e. the markup language should not be too detailed). Alternative markup languages that have been proposed include HDML (Handheld Device Markup Language -- a prevalent standard), WML (Wireless Markup Language -- WAP brainchild) and Compact HTML . Details about these standards can be obtained from w3c site. Curious readers can also subscribe to the mailing list. The popular mini-browser in the market right now is UP.browser from phone.com. The browser has been licensed to many cellular phone manufacturers like Motorola, Ericsson, Sony and Toshiba.

The above mentioned KVM is Sun Microsystems's answer to the different mobile device platforms. KVM is a lightweight version of the Java Virtual Machine and allows applications to be written once for the different wireless platforms. By wireless platforms I mean the mobile device operating systems. Currently there are three contenders: Microsoft [www.microsoft.com/windowsce] with its Windows CE (Consumer Electronics), Symbian [www.symbian.com] with its EPOC operating system, and the current market leader 3Com [www.3com.com] with its PalmOS.

Stay tuned...mobile computing is the way the world is heading!

Wednesday, August 19, 2009

Web Hosting articles

All aspects of web hosting are reviewed in this section. Reviews, advices, guides, user experience, ratings, documentation and much more.
Advanced Hosting articles - reviews of types of advanced servers (VPS, Colocation, Dedicated, Managed hosting), advantages of advanced hosting, questions to consider, instructions how to buy.
Connectivity articles - reviews of types of internet access, detailed information about broadband, DSL, Cable internet, types of modems, wireless networks, types of server access.
Consulting Services articles: web design, web development, website marketing, search engines, website ranking, templates - reviews, advices, case studies and other articles. Find out how to Make Money using Ebay and Amazon.
General Web Hosting articles - Linux, Windows, Budget, Ecommerce, Reseller and Adult hosting reviewed. Find out about advantages of each type of hosting, how to choose appropriate web hosting, which facts to pay attention to and how to run a web site.
Product and Services articles - be informed about web hosting related services: domain registration (addon-domains, parked domains, expired domains), merchant accounts, shopping carts, backup services, SSL certificates (website security, firewalls), Internet phones / VOIP, web hosting managed services (Control panes, spam protection, load balancing, network monitoring).

FREE Web Hosting Deal

Pay Nothing for One Full Year - Best Deal of the Summer.
Get up to 5 FREE Domain Names with Hosting
Up to 300GB of Disk Space and 3,000GB of Bandwidth
Up to $475 in FREE Marketing Money
90 Day Money Back Guarantee and 24x7 Support
Free Site Building Tools
See Why 7 Million Customers Trust 1&1

Price: As low as $3.99/mo
Disk Space: Up to 2250
Bandwidth: Upto 8,000
Support Times: 24x7 Support
Special Offer: One Year FREE Web Hosting Offer Ends August 31st! Order Now.

Introduction of ResellersPanel

Launched in April 2003, ResellersPanel is the first and so far the only company in the web hosting business offering a completely free, fully-automated reseller hosting program, which has developed the private label reseller idea to the fullest by helping approximately 100 000 resellers to establish their own full-blown web hosting companies and create brand awareness. ResellersPanel is an innovator in yet another aspect, namely that unlike other alternatives on the market, the entire platform, web hosting control panels, website building tools, turn-key templates and application programming interface software allowing a full customization of client websites, have been created, developed and designed in-house by ResellersPanel entirely on its own. In addition to the free program, the company offers also a cPanel reseller hosting program, dedicated, semi-dedicated and virtual private servers, domain name registration, and boasts one of the fastest and most reliable client support teams in the industry.

ResellersPanel Launches a Free PHP Script Installation Website

ElefanteInstaller.com will help inexperienced webmasters build a personal blog, a community forum or a photo gallery quickly and easily, but will also assist web hosting resellers in presenting their online offers more successfully.
ResellersPanel, the synonym of free reseller web hosting, announces that it has recently launched elefanteinstaller.com – a new website, which offers detailed descriptions, demo versions and the free installation of more than 30 open source PHP scripts, among them phpBB2, WordPress, Joomla, Mambo, osCommerce, Drupal, Coppermine and many others, grouped in the following categories: Blog, Forum, CMS, E-Commerce, Photo Gallery, Wiki, Classified Ads, Calendar, Guestbook, Project Management, Client Management, Ad Management, Customer Support. The one-click automated script installation available through the new Elefante Installer website will help users avoid the difficulties related to the otherwise quite complicated PHP script installation process, which requires at least some basic knowledge of MySQL, phpMyAdmin, the Apache web server, etc., on their part.Typing the elefanteinstaller.com URL into a web browser will take the visitors to a website where they can see detailed explanations of the functionalities of the various PHP scripts and learn how each script is working in real website environment through the admin and client demo accounts provided. However, if a given reseller’s customer opens elefanteinstaller.com through the respective link placed on that reseller’s web store, the Elefante website will also display the hosting offers of the very reseller whose store the client has been referred from. In this case the name of that reseller’s store will appear in the URL of the Elefante website immediately after the domain name itself, which will increase its brand awareness, and elefanteinstaller.com will in fact serve as an additional reseller web store.Each web hosting plan offered on the reseller web stores and, respectively, on the new Elefante website, has been optimized to accommodate websites based on the various scripts elefanteinstaller.com is offering, and comes with a free website builder, free domain name registration and PHP script installation options, and a set of free marketing tools for boosting website popularity. Moreover, all users can download for free any of the Joomla templates and WordPress themes currently on offer, and create dynamic, content-rich, professionally-looking, multi-language personal and business websites, online communities, blogs or e-commerce portals quickly and easily.Nick Blaskov, CFO of ResellersPanel, said that the new Elefante Installer website is designed to help people who would like to have a website of their own establish a successful online presence, that now even novices can install popular PHP packages and create a blog, a forum, an e-shop, a gallery or a guestbook in a matter of seconds, without having to possess PHP script configuration and installation knowledge or any server administration, web design and programming skills, and without the help of a professional webmaster, and that all accounts ordered through the Elefante website will be hosted on an entirely new in-house developed semi-cluster platform, wherein last generation Quad-Core servers distribute the load generated by the different hosting services between each other, thus making it several times faster than the widespread one-server ones.