Latest New FarmVille Christmas Designs Christmas Tree

FarmVille Latest Design for Christmas

http://today-online-jobs.blogspot.com


http://linuxmall.blogspot.com



http://today-online-jobs.blogspot.com

FarmVille Secrets Expert Things To Loads of Money FAST

Facebook FarmVille Secrets Expert Reveal 3 Things
You Must Do To Make Truck Loads of Money

Coins FAST! Do You Want To Make Loads And Loads Of Money And Coins ...
http://www.farmvillesecretsexpert.com


Free CSS EBooks Rachel Barlett Simon Cederholm Authers

I Found a Great E-Books for CSS Students


Author
Title
Rating
Publisher, Year, ISBN, Ref No

Rachel Andrew
The CSS Anthology
SitePoint, 2004, 0957921888, A-00124

Kynn Bartlett
Sams Teach Yourself CSS in 24 Hours (2nd Edition) (Sams Teach Yourself in 24 Hours)
Sams, 2006, 0672329069, B-00266

Andy Budd, Simon Collison & Cameron Moll
CSS Mastery
Friends of Ed, 2006, 1590596145, B-00256

Dan Cederholm & Christopher Schmitt
CSS Cookbook
O'Reilly Media, Inc., 2004, 0596005768, C-00168

Simon Collison
Beginning CSS Web Development
Apress, 2006, 1590596897, C-00388

Hakon Wium Lie & Bert Bos
Cascading Style Sheets
Addison-Wesley Professional, 2005, 0321193121, L-00129

Joseph W. Lowery
CSS Hacks and Filters
John Wiley & Sons, 2005, 0764579851, L-00154

Richard Mansfield
CSS Web Design For Dummies (For Dummies (Computer/Tech))
For Dummies, 2005, 0764584251, M-00391

David Sawyer McFarland
CSS
O'Reilly Media, 2006, 0596526873, M-00310

Eric A. Meyer
Cascading Style Sheets
O'Reilly Media, 2004, 0596005253, M-00489

Eric A. Meyer
Cascading Style Sheets 2.0 Programmer's Reference
McGraw-Hill Osborne Media, 2001, 0072131780, M-00342

Eric A. Meyer
More Eric Meyer on CSS (Voices That Matter) (VOICES)
New Riders Press, 2004, 0735714258, M-00400

Keith Schengili-Roberts
Core CSS
Prentice Hall PTR, 2003, 0130092789, S-00281

Christopher Schmitt
CSS Cookbook, 2nd Edition
O'Reilly Media, 2006, 0596527411, S-00398

Dave Shea & Molly E. Holzschlag
The Zen of CSS Design
Peachpit Press, 2005, 0321303474, S-00114

Jason Cranford Teague
DHTML and CSS Advanced
Peachpit Press, 2004, 0321266919, T-00147

Russ Weakley
Sams Teach Yourself CSS in 10 Minutes (Sams Teach Yourself)
Sams, 2005, 0672327457, W-00186

Charles Wyke-Smith
Stylin' with CSS
New Riders Press, 2005, 0321305256, W-00187

Richard York
Beginning CSS
Wrox, 2004, 0764576429, Y-00026

Richard York
CSS Instant Results (Programmer to Programmer)
Wrox, 2006, 047175126X, Y-00027

Jeffrey Zeldman, Christopher Schmitt, Mark Trammell, Ethan Marcotte, Todd Dominey & Dunstan Orchard
Professional CSS
Wrox, 2005, 07645

Download http://rapidshare.com/files/18011840/CSS.part1.rar
http://rapidshare.com/files/18005891/CSS.part2.rar

Upgrading Mikrotik Firmware and Software with Dude

Upgrading Firmware and Software with Dude

Just watch this video and get the training how to upgrade
mikrotik firmware and software by using the dude

Play Video

FaceBook FarmVille Latest Design Updated Farmville Design

Dear Rays Systems Visitors, I have some of New and Latest FarmVille Design Introduce in
November 2009.




http://linuxmall.blogspo.com (Free Linux And Support)



http://today-onlinee-jobs.blogspot.com (Online Job Portal) Must Visit
This Portal will Help you for Getting Job,
Thanks
OJP Team


Mafia_war_Secrets_Growing_Preparing_Mafia-Cash

Facebook-Mafia-War-Secrets-eBook

Every Thing is in this Books
Growing Your Mafia
Preparing YOur Mafia
USE God Father
Getting Going on Jobs
Creating Strong Cash
Winning More Fights

Dominating Mafia Wars Guide Get Cheats and Tricks - Facebook Myspace

Dominating Mafia Wars Guide Get Cheats and Tricks





www.atarh.com Are you having trouble dominating Mafia Wars on Facebook or Myspace? Here, you can find all the Mafia Wars Cheats

How to Drawing a Stie Plan in Autocad Engineering

Drawing a Site Plan

Drawing a Site Plan

The site plan you will use has been simplified so that you can draw it with a minimum of steps and get on with the external referencing. The following are essential elements:

  • Property lines

  • Access road to the site

  • North arrow

  • Indication of where the building is located on the site

The first step is to draw in the property lines.

Using Surveyor Units

You draw property lines using Surveyor units for angles and decimal feet for Linear units. In laying out the property lines, you will use relative polar coordinates, so you will enter coordinates in the format @distance<angle, in which the distance is in feet and hundredths of a foot, and the angle is in Surveyor units to the nearest minute.

Surveyor Units

Surveyor units, called bearings in civil engineering, describe the direction of a line from its beginning point. The direction (bearing), described as a deviation from the north or south toward the east or west, is given as an angular measurement in degrees, minutes, and seconds. The angles used in a bearing can never be greater than 90°, so bearing lines must be headed in one of the four directional quadrants: northeasterly, northwesterly, southeasterly, or southwesterly. If north is set to be at the top of a plot plan, south is down, east is to the right, and west is to the left. Thus, when a line from its beginning goes up and to the right, it is headed in a northeasterly direction. And when a line from its beginning goes down and to the left, it is headed in a southwesterly direction, and so on. A line that is headed in a northeasterly direction with a deviation from true north of 30 degrees and 30 minutes is shown as N30d30' E in AutoCAD notation.


With the Surveyor unit system, a sloping line that has an up-and-to-the-left direction would have a down-and-to-the-right direction if you started from the opposite end. So in laying out property lines, it is important to move in the same direction (clockwise or counterclockwise) as you progress from one segment to the next.

Laying Out the Property Lines

You will set up a new drawing and then start at the upper-right corner of the property lines and work your way around counterclockwise.

  1. Open Cabin11a from your training folder. Choose File Ø Save As, and save the drawing as Cabin12a.

  2. Click the QNew button on the Standard toolbar to open the Create New Drawing dialog box. Click Start From Scratch, and then click OK. (If the Select Template dialog box opens instead of the Create New Drawing dialog box, open the Open drop-down list and select Open With No Template - Imperial.)

  3. From the menu bar, choose Format Ø Units to open the Drawing Units dialog box, and change the precision in the Length area to two decimal places (0.00).

  4. In the Angle area, open the Type drop-down list and select Surveyor’s Units. Then change the precision to the nearest minute (N0d00' E). Click OK. You will need an area of about 250' ´ 150' for the site plan.

  5. Open the Format menu again and choose Drawing Limits. Press ¿ to accept the default 0.00,0.00 for the lower-left corner. Type 250,150¿. Don’t use the foot sign.

    We are using Decimal linear units in such a way that 1 decimal unit represents 1 foot. The foot symbol (') is used only with Architectural and Engineering units.

  6. Right-click the Snap button on the status bar, and then choose Settings. Change Snap Spacing to 10.00, and change Grid to 0.00. Then click the Grid check box to turn on the grid, but leave Snap off. Click OK.

  7. In the drawing, type z¿ a¿. Then zoom to .85x to see a blank space around the grid (see


  8. Create a new layer called Prop_line. Assign it a color and make it current.

  9. Start the Line command. For the first point, type 220,130¿. This will start a line near the upper-right corner of the grid.

  10. Be sure Snap is turned off. Then type: @140<n90dw¿

    @90<s42d30'w¿

    @140<s67d30'e¿

    @80<n52d49'e¿

    c¿

The property lines are completed


Figure 12.3: The property lines on the site drawing

Drawing the Driveway

The driveway is 8' wide and set 5' from the horizontal property line. The access road is 8' from the parallel property line. The intersection of the access road line and the driveway lines forms corners, each with a 3' radius. The driveway extends 70' in from the upper-right corner of the property.

Let’s lay this out now.

  1. Choose Format Ø Units from the menu bar. Change the units to Architectural and the angular units to Decimal degrees. Then set the length precision to 1/16" and the angular precision to 0.00. Click OK. Because of the way AutoCAD translates decimal units to inches, your drawing is now only 112th the size it needs to be. (Use the Distance command to check it.) You will have to scale it up.

  2. Click the Scale button on the Modify toolbar.

    You can also start the Scale command by choosing Modify Ø Scale from the menu bar or by typing sc¿.

  3. Type all¿¿. For the base point, type 0,0¿.

  4. At the Specify scale factor or [Reference]: prompt, type 12¿. Then click Grid on the status bar to turn off the grid.

  5. Zoom to Extents, and then zoom out a little. The drawing looks the same, but now it’s the correct size. Check it with the Distance command, which you encountered in

  6. Offset the upper, horizontal property line 5' down. Offset this new line 8' down.

  7. Offset the rightmost property line 8' to the right (

  8. Create a new layer called Road. Assign it the color White, and make the Road layer current.

  9. Click the new lines, open the Layer Control drop-down list, and click the Road layer to move the selected lines to the Road layer. Press Esc to remove the grips.

  10. Extend the driveway lines to the access road line. Trim the access road line between the driveway lines.

  11. Fillet the two corners where the driveway meets the road, using a 3' radius
    Figure 12.4: Offset property lines (a), and the completed intersection of the driveway and access road (b)

Finishing the Driveway

A key element of any site plan is information that shows how the building is positioned on the site relative to the property lines. Property lines are staked out by surveyors. The building contractor then takes measurements off the stakes to locate one or two corners of the building. In this site, you need only one corner because we are assuming the cabin is facing due west. A close look at , shown earlier in this chapter, shows that the end of the driveway lines up with the outer edge of the back step of the cabin. Below the driveway is a square patio, and its bottom edge lines up with the bottom edge of the back step. So the bottom corner of the back step coincides with the lower-left corner of the patio. This locates the cabin on the site


Figure 12.5: The driveway and patio lined up with the cabin

Imagine the site being on a bluff of a hill overlooking land that falls away to the south and west, providing a spectacular view in that direction. To accommodate this view, we will want to change the orientation of the cabin when we Xref it into the site drawing.

  1. On the status bar, turn on Polar. Then draw a line from the upper-right corner of the property lines straight up to a point near the top of the screen.

  2. Offset this line 70' to the left. This will mark the end of the driveway.

  3. Draw a line from the lower endpoint of this offset line down a distance of 40'-4". Then, using Polar Tracking, continue this line 11'-4" to the right.

  4. Offset the 40'-4" line 11'-4" to the right. Offset the newly created line 11'-4" to the right as well.

  5. Offset the upper driveway line 24' down. These are all the lines you need to finish the site plan


    Figure 12.6: The offset lines (a), and the finished driveway and patio (b)

  6. Finish the driveway and patio by using the Trim, Fillet, and Erase commands as you have in previous chapters. The radius of the corner to fillet is 6'

  7. Make the 0 layer current, draw a north arrow, and place it in the lower-left corner.

  8. Open the Layer Properties Manager dialog box, and change the linetype for the Prop_line layer to Phantom. (You will have to load it; see

  9. Type ltscale¿, and then type 100¿. You will see the phantom linetype for the property lines.

  10. Save this drawing in your training folder as Site12a.

This completes the site plan. The next step is to attach the cabin drawing as an external reference into the site plan.

Important roll of keyboard in AutoCad

The Keyboard

The keyboard is an important tool for entering data and commands. If you are a good typist, you can gain speed in working with AutoCAD by learning how to enter commands from the keyboard. AutoCAD provides what are called alias keys—single keys or key combinations that will start any of several often-used commands. You can add more or change the existing aliases as you get more familiar with the program.

In addition to the alias keys, you can use several of the F keys (function keys) on the top row of the keyboard as two-way or three-way toggles (switches) to turn AutoCAD functions on and off. Although buttons on the screen duplicate these functions (Snap, Grid, and so on), it is sometimes faster to use the F keys.

Finally, you can activate commands on the drop-down menus from the keyboard, rather than using the mouse. If you press the Alt key, an underlined letter, called a hotkey, appears on each menu. Pressing the key for the underlined letter activates the menu. Each command on the menu also has a hotkey. Once you activate the menu with the hotkey combination, you can type the underlined letter of these commands. For a few commands, this method can be the fastest way to start them up and to select options.

While working in AutoCAD, you will need to key in a lot of data, such as dimensions and construction notes, answer questions with “yes” or “no,” and use the arrow keys. You will use the keyboard constantly. It may help to get into the habit of keeping the left hand on the keyboard and the right hand on the mouse—if you are right-handed—or the other way around, if you are left-handed.

Farmville New Hack (It Can Save and workk) (On Facebook)

I found Video about www.facebook.com Farm Ville Hack.
This is very easy to use and you can use farmville as per your
Requirement. .... Seee it ... Use it.... and Enjoy. Every one




Farmville Cheats Strategy Guide Farmville Tricks

Facebook.com FarmVille Tricks and many moree..


Facebook FarmVille Sample Designee Free

I have Some Sample Design of FarmVille Facebook.com

http://linuxmall.blogspot.com
http://today-online-jobs.blogspot.com





Computer Hardware DDR1 and SDRAM

DDR2 SDRAM

By early 2003, the original DDR-SDRAM technology was fast approaching its limits. As AMD and Intel transitioned to higher FSB speeds, DDR-SDRAM has been hard pressed to keep pace. Mainstream DDR-SDRAM tops out at PC3200. Dual-channel DDR chipsets (which combine the bandwidth of paired memory modules) using PC3200 memory limit peak bandwidth to 6,400 MB/s. That matches the bandwidth requirements of a processor with a 64-bit (8-byte) wide memory channel operating with an 800 MHz FSB, such as mainstream Pentium 4 models, but as new processors are introduced, even dual-channel DDR-SDRAM will be unable to keep up with increases in processor bandwidth.

The long-term solution is DDR2 SDRAM. DDR2 incorporates a series of evolutionary improvements on standard DDR technology, including increased bandwidth, lower voltage (1.8V versus the 2.5V of DDR), lower power consumption, and improved packaging. Just as DDR-SDRAM doubled bandwidth over SDR-SDRAM when running at the same clock rate, DDR2-SDRAM doubles bandwidth over DDR-SDRAM by doubling the speed of the electrical interface. DDR2 DIMMs use a new 240-pin connector that is incompatible with the 184pin DDR-SDRAM and earlier connectors. lists the important characteristics of DDR2-SDRAM, with PC3200 (DDR400) DDR-SDRAM shown for comparison.

Table 6-1. DDR2 characteristics

Chip

Chip clock

I/O clock

Module name

Module bandwidth

DDR400

200 MHz

400 MHz

PC3200

3,200 MB/s

DDR2-400

100 MHz

200 MHz

PC2 3200

3,200 MB/s

DDR2-533

133 MHz

266 MHz

PC2 4200

4,200 MB/s

DDR2-667

166 MHz

333 MHz

PC2 5300

5,300 MB/s

DDR2-800

200 MHz

400 MHz

PC2 6400

6,400 MB/s

DDR2-1000

250 MHz

500 MHz

PC2 8000

8,000 MB/s


Although Intel has pushed DDR2 hard since its introduction, initial uptake was slow for two reasons. First, DDR2 memory originally sold at a very high premium over DDR memory, sometimes as much as 200% to 300%. By late 2005, that differential had dropped to 15% or 20%, making DDR2 a more reasonable choice. Second, although DDR2 offers much higher bandwidth than DDR, it also suffers from much higher latency. In effect, that means that although DDR2 can deliver data at higher speed than DDR, it takes longer to start delivering the data. For applications that use primarily sequential memory access, such as video editing, the bandwidth advantage of DDR2 offers noticeably higher memory performance. For applications that access memory randomly, including many personal productivity programs, the latency advantage of DDR gives it the edge. DDR2-SDRAM DIMMs use 240 pins and can be discriminated from 168-pin SDR-SDRAM and 184-pin DDR-SDRAM memory modules by noting the number of pins and the position of the keying notch.


How to Replace a Computer Motherboard

Replacing a Motherboard

The exact steps required to replace a motherboard depend on the specifics of the motherboard and case, the peripheral components to be connected, and so on. In general terms, the process is quite simple, if time-consuming:

  • Disconnect all cables and remove all expansion cards from the current motherboard.

  • Remove the screws that secure the old motherboard and remove the motherboard.

  • If you are reusing the CPU and/or memory, remove them from the old motherboard and install them on the new one.

  • Replace the old back-panel I/O template with the template supplied with the new motherboard.

  • Remove and install motherboard mounting posts as necessary to match the mounting holes on the new motherboard.

  • Install the new motherboard and secure it with screws in all mounting hole positions.

  • Reinstall all of the expansion cards and reconnect the cables.

The devil is in the details. In the rest of this section, we'll illustrate the process of installing the motherboard and making all the connections properly.

MS Word Drawing Toolbar and Drawing Tools Working

DRAWING TOOLBAR

Using the tools on the Microsoft Excel toolbars, you can draw graphic objects on worksheets and macro sheets. You can also import graphics, as pictures, from other applications to enhance the appearance of your worksheets and macro sheets.
With the tools on the Drawing toolbar, you can draw lines, arcs, and transparent or filled ovals, rectangles, and polygons. Once you have added a graphic object, you can change its position, shape, or size; group it with other graphic objects; make copies of it; and format its color, border, or pattern.

To display the Patterns dialog box so you can change formatting, double-click an object. You can also select an object and choose Patterns from the Format menu.
To move a drawn object to another location on the worksheet or macro sheet, drag the object.
To resize a drawn object, select the object, point to one of the handles, and drag until it is the size you want.

Line tool
Draws a straight line.

Arrow Tool
Creates an arrow on an active worksheet or macro sheet, or adds an arrow on an active chart.

Freehand Tool
Draws freehand lines.

Rectangle Tool
Draws a rectangle or square.

Oval Tool
Draws an oval or circle.

Arc Tool
Draws an arc or circle segment.

Freehand Polygon Tool
Draws a shape that is a combination of freehand straight lines.

Filled Rectangle Tool
Draws a rectangle or square that is filled with the window background pattern and color.

Filled Oval Tool
Draws an oval or circle that is filled with the window background pattern and color.

Filled Arc Tool
Draws a circle segment that is one quarter of a full circle and is filled with the window background pattern and color.

Filled Freehand Polygon Tool
Draws a freehand polygon shape that is filled with the window background pattern and color.

Text Box Tool
Draws a text box where you can type text on a worksheet; lets you add unattached text to an active chart.

Selection Tool
Selects one or more graphic objects.

Reshape Tool
Allows you to change the shape of a polygon.

Group Tool
Creates a single group of graphic objects from multiple objects.

Ungroup Tool
Separates grouped objects into individual objects.

Bring to Front Tool
Places one or more selected objects in front of all other objects.

Send to Back Tool
Places one or more selected objects behind all other objects.

Color Tool
Changes the foreground color of a selected cell or object.

Drop Shadow Tool
Adds a shadowed rectangular object around a selected cell or cells.

HOW TO ANALYZING EXTERNAL DATA IN EXCEL

ANALYZING DATA IN EXCEL

Your users might not know that they can use Excel to analyze data from the various databases in your organization. They can use the powerful analytical tools of Excel on data they previously only viewed or edited within the database user interface. Using these features, they can pull data from your customer database, sales tracking database, product catalog, and HR systems into various sheets in a workbook and perform complex PivotTable analysis not possible using the separate applications.

This ability is provided by the use of Microsoft Query, an Office application that lives "behind" Excel. You can access Microsoft Query by clicking Data | Get External Data. You'll find three options: Run Web Query, Run Database Query, or Create New Query. The Query interface is very similar to the Design view of a query in Access. Point Query at a database, and it will allow you to build complex relational queries to get the data you need. Running the query will pull the data returned into your worksheet. Now you can build your pivot tables and perform your analysis.

Trojan Ports Block Trojan Ports to Protect System

TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250
TCP 28 Amanda.200
TCP 31 MastersParadise.920
TCP 68 Subseven.100
TCP 142 NetTaxi.180
TCP 146 Infector.141, Intruder.100, Intruder.100
TCP 171 ATrojan.200
TCP 285 WCTrojan.100
TCP 286 WCTrojan.100
TCP 334 Backage.310
TCP 370 NeuroticKat.120, NeuroticKat.130
TCP 413 Coma.109
TCP 420 Breach.450
TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100
TCP 623 Rtb666.160
TCP 660 Zaratustra.100
TCP 661 Noknok.800, Noknok.820
TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110
TCP 667 SniperNet.210, Snipernet.220
TCP 668 Unicorn.101, Unicorn.110
TCP 680 Rtb666.160
TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332
TCP 785 NetworkTerrorist.100
TCP 800 NeuroticKitten.010
TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130
TCP 901 NetDevil.130, NetDevil.140
TCP 1000 DerSpaeher.200
TCP 1001 Silencer.100
TCP 1008 AutoSpy.100
TCP 1010 DerSpaeher.200
TCP 1015 Doly.150
TCP 1111 TPort.100
TCP 1130 Noknok.800, Noknok.820
TCP 1207 SoftWAR.100
TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200
TCP 1245 VoodooDoll.006
TCP 1269 Matrix.130
TCP 1480 RemoteHack.130
TCP 1568 RemoteHack.100, RemoteHack.110
TCP 1600 DirectConnection.100
TCP 1601 DirectConnection.100
TCP 1602 DirectConnection.100
TCP 1634 NetCrack.100
TCP 1784 Snid.120, Snid.212
TCP 1999 TransmissionScout.100, TransmissionScout.110
TCP 2000 ATrojan.200, InsaneNetwork.400
TCP 2001 DIRT.220, TrojanCow.100
TCP 2003 TransmissionScout.100, TransmissionScout.110
TCP 2023 RipperPro.100
TCP 2040 InfernoUploader.100
TCP 2115 Bugs.100
TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
TCP 2332 SilentSpy.202
TCP 2589 Dagger.140
TCP 2600 DigitalRootbeer.100
TCP 2989 Rat.200
TCP 3128 MastersParadise.970
TCP 3129 MastersParadise.920, MastersParadise.970
TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
TCP 3215 BlackStar.100, Ghost.230
TCP 3333 Daodan.123
TCP 3410 OptixPro.100, OptixPro.110
TCP 3456 Force.155, TerrorTrojan.100
TCP 3505 AutoSpy.130, AutoSpy.140
TCP 3586 Snid.120, Snid.212
TCP 3700 PortalOfDoom.100
TCP 3723 Mantis.100
TCP 3800 Eclypse.100
TCP 3996 RemoteAnything.364
TCP 4000 SkyDance.220, SkyDance.229
TCP 4201 Wartrojan.160, Wartrojan.200
TCP 4225 SilentSpy.202
TCP 4321 Bobo.100
TCP 4444 AlexTrojan.200, Crackdown.100
TCP 4488 EventHorizon.100
TCP 4523 Celine.100
TCP 4545 InternalRevise.100, RemoteRevise.150
TCP 4567 FileNail.100
TCP 4666 Mneah.100
TCP 4950 ICQTrojan.100
TCP 5005 Aladino.060
TCP 5025 Keylogger.WMRemote.100
TCP 5031 NetMetro.104
TCP 5032 NetMetro.104
TCP 5033 NetMetro.104
TCP 5050 RoxRat.100
TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040
TCP 5190 MBomber.100
TCP 5277 WinShell.400
TCP 5343 WCRat.100
TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300
TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5534 TheFlu.100
TCP 5550 XTCP.200, XTCP.201
TCP 5555 Noxcape.100, Noxcape.200
TCP 5695 Assassin.100
TCP 5714 WinCrash.100
TCP 5741 WinCrash.100
TCP 5742 WinCrash.103
TCP 5802 Y3KRat.160
TCP 5810 Y3KRat.160
TCP 5838 Y3KRat.170
TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5880 Y3KRat.140
TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5883 Y3KRat.110, Y3KRat.140
TCP 5884 Y3KRat.140, Y3KRat.150
TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5886 Y3KRat.120, Y3KRat.140
TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5890 Y3KRat.140
TCP 6400 Thething.100, Thething.150
TCP 6556 AutoSpy.120, AutoSpy.122
TCP 6655 Aqua.020
TCP 6660 LameSpy.095
TCP 6666 LameRemote.100, ProjectMayhem.100
TCP 6669 Vampire.100
TCP 6670 DeepThroat.200, DeepThroat.210
TCP 6671 DeepThroat.310
TCP 6699 HostControl.101
TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190
TCP 6712 Subseven.100
TCP 6713 Subseven.100
TCP 6767 NTRC.120
TCP 6776 SubSeven.180, SubSeven.190, Subseven.200
TCP 6789 Doly.200
TCP 6796 SubSeven.214
TCP 6912 ShitHeep.100
TCP 6939 Indoctrination.100
TCP 6953 Lithium.100
TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120
TCP 6970 Danton.330
TCP 7001 Freak88.100
TCP 7119 Massaker.100
TCP 7200 Massaker.110
TCP 7300 Coced.221
TCP 7301 Coced.221
TCP 7306 NetSpy.200, NetSpy.200
TCP 7410 Phoenix.190, Phoenix.200
TCP 7511 Genue.100
TCP 7609 Snid.120, Snid.212
TCP 7614 Wollf.130
TCP 7648 BlackStar.100, Ghost.230
TCP 7788 Last.2000, Matrix.200
TCP 7826 MiniOblivion.010, Oblivion.010
TCP 7887 SmallFun.110
TCP 7891 Revenger.100
TCP 7979 VagrNocker.200
TCP 7997 VagrNocker.200
TCP 8000 XConsole.100
TCP 8011 Way.240
TCP 8012 Ptakks.215, Ptakks.217
TCP 8110 LoseLove.100
TCP 8111 LoseLove.100
TCP 8301 LoseLove.100
TCP 8302 LoseLove.100
TCP 8372 NetBoy.100
TCP 8720 Connection.130
TCP 8734 AutoSpy.110
TCP 8811 Force.155
TCP 8899 Last.2000
TCP 9000 Aristotles.100
TCP 9301 LoseLove.100
TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170
TCP 9401 InCommand.100, InCommand.110, InCommand.170
TCP 9402 InCommand.100, InCommand.110
TCP 9561 CRatPro.110
TCP 9563 CRatPro.110
TCP 9580 TheefLE.100
TCP 9696 Danton.210, Ghost.230
TCP 9697 Danton.320, Danton.330, Ghost.230
TCP 9870 R3C.100
TCP 9872 PortalOfDoom.100
TCP 9873 PortalOfDoom.100
TCP 9874 PortalOfDoom.100
TCP 9875 PortalOfDoom.100
TCP 9876 Rux.100, SheepGoat.100
TCP 9877 SmallBigBrother.020
TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120
TCP 9879 SmallBigBrother.020
TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300
TCP 10001 DTr.130, DTr.140
TCP 10013 Amanda.200
TCP 10067 PortalOfDoom.100
TCP 10100 Gift.240
TCP 10101 NewSilencer.100
TCP 10167 PortalOfDoom.100
TCP 10528 HostControl.100, HostControl.260
TCP 10607 Coma.109
TCP 10666 Ambush.100
TCP 11011 Amanda.200
TCP 11050 HostControl.101
TCP 11051 HostControl.100, HostControl.260
TCP 11223 AntiNuke.100, Progenic.100, Progenic.110
TCP 11225 Cyn.100, Cyn.103, Cyn.120
TCP 11306 Noknok.800, Noknok.820
TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 11991 PitfallSurprise.100
TCP 12043 Frenzy.2000
TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400
TCP 12346 Netbus.160, Netbus.170
TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317
TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402
TCP 12389 KheSanh.210
TCP 12478 Bionet.210
TCP 12623 Buttman.090, Buttman.100
TCP 12624 Buttman.090, Buttman.100
TCP 12625 Buttman.100
TCP 12904 Akropolis.100, Rocks.100
TCP 13473 Chupacabra.100
TCP 13753 AFTP.010
TCP 14100 Eurosol.100
TCP 14194 CyberSpy.840
TCP 14286 HellDriver.100
TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14501 PCInvader.060, PCInvader.070
TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14504 PCInvader.050, PCInvader.060
TCP 15092 HostControl.100, HostControl.260
TCP 15382 SubZero.100
TCP 15432 Cyn.210
TCP 15555 ICMIBC.100
TCP 16322 LastDoor.100
TCP 16484 MoSucker.110
TCP 16661 Dfch.010
TCP 16969 Progenic.100
TCP 16982 AcidShiver.100
TCP 17300 Kuang.200
TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100
TCP 17593 AudioDoor.120
TCP 19191 BlueFire.035, BlueFire.041
TCP 19604 Metal.270
TCP 19605 Metal.270
TCP 19991 Dfch.010
TCP 20000 Millenium.100
TCP 20001 Millenium.100, PshychoFiles.180
TCP 20002 AcidKor.100, PshychoFiles.180
TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220
TCP 21212 Schwindler.182
TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135
TCP 21579 Breach.2001
TCP 21584 Breach.2001
TCP 21684 Intruse.134
TCP 22068 AcidShiver.110
TCP 22115 Cyn.120
TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600
TCP 22223 Rux.400, Rux.500, Rux.600
TCP 22456 Bla.200, Bla.503
TCP 22457 AcidShiver.120, Bla.200, Bla.503
TCP 22784 Intruzzo.110
TCP 22845 Breach.450
TCP 22847 Breach.450
TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23032 Amanda.200
TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110
TCP 23456 EvilFTP.100, VagrNocker.400
TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155
TCP 23477 DonaldDick.153
TCP 24000 Infector.170
TCP 24307 Wildek.020
TCP 25386 MoonPie.220
TCP 25486 MoonPie.220
TCP 25555 FreddyK.100, FreddyK.200
TCP 25556 FreddyK.100
TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400
TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400
TCP 25982 MoonPie.135, MoonPie.200
TCP 26274 Delta.050
TCP 27160 MoonPie.135, MoonPie.200
TCP 27184 Alvgus.100, Alvgus.800
TCP 27374 Muerte.110, Subseven.210, SubSeven.213
TCP 28429 Hack'a'Tack.2000
TCP 28430 Hack'a'Tack.2000
TCP 28431 Hack'a'Tack.2000
TCP 28432 Hack'a'Tack.2000
TCP 28433 Hack'a'Tack.2000
TCP 28434 Hack'a'Tack.2000
TCP 28435 Hack'a'Tack.2000
TCP 28436 Hack'a'Tack.2000
TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 29891 Unexplained.100
TCP 30000 Infector.170
TCP 30001 Error32.100
TCP 30003 LamersDeath.100
TCP 30029 AOLTrojan.110
TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30103 NetSphere.131
TCP 30947 Intruse.134
TCP 31320 LittleWitch.400, LittleWitch.420
TCP 31337 BackOrifice.120, Khaled.100, OPC.200
TCP 31415 Lithium.101
TCP 31416 Lithium.100, Lithium.101
TCP 31557 Xanadu.110
TCP 31631 CleptoManicos.100
TCP 31745 Buschtrommel.100, Buschtrommel.122
TCP 31785 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31787 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31789 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31791 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31887 BDDT.100
TCP 31889 BDDT.100
TCP 32100 ProjectNext.053
TCP 32418 AcidBattery.100
TCP 32791 Akropolis.100, Rocks.100
TCP 33291 RemoteHak.001
TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214
TCP 33577 SonOfPsychward.020
TCP 34324 TelnetServer.100
TCP 34763 Infector.180, Infector.190, Infector.200
TCP 35000 Infector.190, Infector.200
TCP 35600 Subsari.140
TCP 36794 BugBear.100
TCP 37237 Mantis.020
TCP 37651 YAT.210
TCP 37653 YAT.310
TCP 40308 Subsari.140
TCP 40412 TheSpy.100
TCP 40421 MastersParadise.970
TCP 40422 MastersParadise.970
TCP 40999 DiemsMutter.110, DiemsMutter.140
TCP 41626 Shah.100
TCP 44444 Prosiak.070
TCP 45673 Akropolis.100, Rocks.100
TCP 47262 Delta.050
TCP 48006 Fragglerock.200
TCP 49683 HolzPferd.210
TCP 50000 Infector.180
TCP 50130 Enterprise.100
TCP 50766 Fore.100
TCP 51234 Cyn.210
TCP 51966 Cafeini.080, Cafeini.110
TCP 54321 PCInvader.010
TCP 57341 NetRaider.100
TCP 57922 Bionet.084
TCP 58008 Tron.100
TCP 58009 Tron.100
TCP 59090 AcidReign.200
TCP 59211 DuckToy.100, DuckToy.101
TCP 59345 NewFuture.100
TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101
TCP 60411 Connection.100, Connection.130
TCP 60412 Connection.130
TCP 60552 RoxRat.100
TCP 63536 InsaneNetwork.500
TCP 63878 AphexFTP.100
TCP 63879 AphexFTP.100
TCP 64969 Lithium.100
TCP 65000 Socket.100
UDP 1 SocketsDeTroie.250
UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820
UDP 1130 Noknok.800, Noknok.820
UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
UDP 2989 Rat.200
UDP 3128 MastersParadise.970
UDP 3129 MastersParadise.920, MastersParadise.970
UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
UDP 3333 Daodan.123
UDP 3800 Eclypse.100
UDP 3996 RemoteAnything.364
UDP 4000 RemoteAnything.364
UDP 5555 Daodan.123
UDP 5881 Y3KRat.110, Y3KRat.140
UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
UDP 5883 Y3KRat.110, Y3KRat.140
UDP 5884 Y3KRat.140, Y3KRat.150
UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5886 Y3KRat.120, Y3KRat.140
UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150
UDP 6953 Lithium.100
UDP 8012 Ptakks.217
UDP 10067 PortalOfDoom.100
UDP 10167 PortalOfDoom.100
UDP 10666 Ambush.100
UDP 11225 Cyn.100, Cyn.103, Cyn.120
UDP 11306 Noknok.800, Noknok.820
UDP 12389 KheSanh.210
UDP 12623 Buttman.090, Buttman.100
UDP 12625 Buttman.100
UDP 14100 Eurosol.100
UDP 23476 DonaldDick.155
UDP 26274 Delta.050
UDP 27184 Alvgus.100
UDP 28431 Hack'a'Tack.2000
UDP 28432 Hack'a'Tack.2000
UDP 28433 Hack'a'Tack.2000
UDP 28434 Hack'a'Tack.2000
UDP 28435 Hack'a'Tack.2000
UDP 28436 Hack'a'Tack.2000
UDP 29891 Unexplained.100
UDP 30103 NetSphere.131
UDP 31320 LittleWitch.400, LittleWitch.420
UDP 31337 BackOrifice.120, OPC.200
UDP 31416 Lithium.100, Lithium.101
UDP 31789 Hack'a'Tack.100, Hack'a'Tack.112
UDP 31791 Hack'a'Tack.100, Hack'a'Tack.112
UDP 33333 Blackharaz.100
UDP 47262 Delta.050
UDP 49683 HolzPferd.210
UDP 60000 MiniBacklash.100

MS Word Tips Page Orientation Margins Newpaper Columns


MS Word Tips For Office Automation

Select the page orientation

Procedure
On the File menu, click Page Setup.
Click the Paper Size tab.
Under Orientation, click Portrait or Landscape.

TIP
To change the page orientation for part of a document, select the pages and then change the orientation as usual. In the Apply to box, click Selected Text. Word automatically inserts section breaks before and after the pages with the new orientation. If your document is already divided into sections, you can click in a section or select multiple sections, and then change the orientation.

Change the page margins
Switch to page layout view or print preview.
To change the left or right page margin, point to a margin boundary on the horizontal ruler. When the pointer changes to a double-headed arrow, drag the margin boundary.
To change the top or bottom page margin, point to a margin boundary on the vertical ruler. When the pointer changes to a double-headed arrow, drag the margin boundary.

TIPS
To specify exact margin measurements, click Page Setup on the File menu, and then click the Margins tab. You can also set other options on the Margins tab, such as a gutter or mirror margins.
To change the margins for part of a document, select the text and then set the margins on the Margins tab (Page Setup dialog box, File menu). In the Apply to box, click Selected Text. Word automatically inserts section breaks before and after the text with the new margin settings. If your document is already divided into sections, you can click in a section or select multiple sections, and then change the margins.

Create newspaper columns
Procedure
Switch to page layout view.
To format the entire document in columns, click Select All on the Edit menu.
To format part of the document in columns, select the text.
To format existing sections in columns, click in a section or select multiple sections.
Click Columns in Format menu.
Drag to select the number of columns you want.
If you want to adjust the column widths and spacing, drag the column markers on the horizontal ruler.
Tip
To set exact column widths and spacing, follow steps 1 and 2. Then click Columns on the Format menu, and select the options you want.

Balance column length for newspaper columns
Procedure
If your text is not already formatted in columns, create the columns.
In page layout view, click at the end of the columns you want to balance.
On the Insert menu, click Break.
Click Continuous.
Remove newspaper columns
Procedure
Switch to page layout view.
If your document is divided into sections, click in the section or select multiple sections you want to change.
Click Columns, and then drag to select a single column.

Nokia Mobile Tricks All Nokia Mobile Codes Tips and Tricks


N O K I A M O B I L E
TIPS & TRICKS


*3001#12345# (TDMA phones only)
*3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5%
#3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370#
*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.
*#4720# Deactivate Half Rate Codec.
*#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type.
*#9999# Phones softw
are version if *#0000# does not work.
*#06# For checking the International Mobile Equipment Identity (IMEI Number).
IMEI number: * # 0 6 #
Software version: * # 0 0 0 0 # or * # 9 9 9 9 # or * # 3 1 1 0 #
Simlock info: * # 9 2 7 0 2 6 8 9 #
*#06#
This will show your warranty details *#92702689#
*3370#
Basically increases the quality of calling sound, but decreases battery length.
#3370#




Deactivates the above
*#0000#
Shows your software version
*#746025625# This shows if your phone will allow sim clock stoppage
*4370#
Half Rate Codec activation. It will automatically restart
#4370#
Half Rate Codec deactivation. It will automatically restart
Restore Factory Settings
To do this simply use this code *#7780#
Manufacturer Info
Date of Manufacturing *#3283#
#pw+1234567890+ 1# Provider Lock Status. (use the "*" button to obtain the "p,w"and "+" symbols).
#pw+1234567890+ 2# Network Lock Status. (use the "*" button to obtain the "p,w"and "+" symbols).
#pw+1234567890+ 3# Country Lock Status. (use the "*" button to obtain the "p,w"and "+" symbols).
#pw+1234567890+ 4# SIM Card Lock Status. (use the "*" button to obtain the "p,w" Go to Topand "+" symbols).
*#147# (vodafone) this lets you know who called you last.
*#1471# Last call (Only vodofone).
*#21# Allows you to check the number that "All Calls" are diverted to
*#2640# Displays security code in use.
*#30# Lets you see the private number.
*#43# Allows you to check the "Call Waiting" status of your phone.
*#61# Allows you to check the number that "On No Reply" calls are diverted to.
*#62# Allows you to check the number that "Divert If Unreachable (no service)" calls are diverted to.
*#67# Allows you to check the number that "On Busy Calls" are diverted to.
*#67705646# Removes operator logo on 3310 & 3330.
*#73# Reset phone timers and game scores.
*#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop
*#7760# Manufactures code.
*#7780# Restore factory settings.
*#8110# Software version for the nokia 8110.
*#92702689# Displays - 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for norepairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again. ( Favourite )
*#94870345123456789 # Deactivate the PWM-Mem.
**21*number# Turn on "All Calls" diverting to the phone number entered.
**61*number# Turn on "No Reply" diverting to the phone number entered.
**67*number# Turn on "On Busy" diverting to the phone number entered.
12345 This is the default security code.
press and hold # Lets you switch between lines
IMEI number: * # 0 6 #
Software version: * # 0 0 0 0 #
Simlock info: * # 9 2 7 0 2 6 8 9 #
Enhanced Full Rate: * 3 3 7 0 # [ # 3 3 7 0 # off]
Half Rate: * 4 7 2 0 #
Provider lock status: #pw+1234567890+ 1
Network lock status #pw+1234567890+ 2
Provider lock status: #pw+1234567890+ 3
SimCard lock status: #pw+1234567890+ 4
NOKIA 6110/6120/6130/ 6150/6190
IMEI number: * # 0 6 #
Software version: * # 0 0 0 0 #
Simlock info: * # 9 2 7 0 2 6 8 9 #
Enhanced Full Rate: * 3 3 7 0 # [ # 3 3 7 0 # off]
Half Rate: * 4 7 2 0 #

Operating MS Windows and Windows Components


Microsoft WINDOWS


WHAT’S ON YOUR WINDOWS SCREEN

Depending on how you computer is set up, various item appear on your desktop when start Windows. Here are four important ones.

MY COMPUTER:
Double-click this icon to see your computer’s contents and manage your files.

NETWORK NEIGHBORHOOD
Double click this icon to see available resources on the network, if you computer is or can be connected to one.

RECYCLE BIN
The Recycle Bin is a temporary storage place for deleted files. Yu can use it to retrieve files deleted in error.

PROGRAMME MANAGER
You can find your old program groups by clicking the Start button and then pointing to Programs. You groups appear as folders on the Programs menu.

FILE MANAGER
To manage your files, you click the Start button, point to Programs, and then click Windows Explorer. Your directories appear as folders.

MS-DOS PROMPT
To open an MS-DOS window, you click the Start button, point to Programs and then click MS-DOS Prompt.

CONTROL PANEL
To open Control Panel, you click the Start button, point to Settings, and then click Control Panel.

PRINT MANAGER
To set up a printer or look at information about documents you’re printing, you click the Start button, point to Settings, and then click Printers.

RUN COMMAND
To use the Run command, you click the Start button, and then click Run. You can run MS-DOS-based and Windows-based programs, open folders, and connect to network resources by using Run.

TASK SWITCHING
You can use the taskbar to switch between open windows. Just click the button on it that represents the window you want to switch to. You can also use ALT+TAB, just as you did in earlier versions of Windows.

CLOSE BUTTON:
To close a window, you click the Close button in the upper-right corner of the window, next to the Minimize and Maximize buttons.

WHAT’S NEW IN WINDOWS?
Windows offers many new, exciting features, in addition to improvements to many features you may be familiar with from earlier versions of Windows. This section mentions just a few of these features.
For a complete listing, look up “what’s new” in the Help Index.

NEW IMPROVED INTERFACE: Windows now features the Start button and taskbar. Click the Start button to quickly open the program, find documents and use system tools. Use the taskbar to switch between programs as easily as changing channels on your TV.

WINDOWS EXPLORER: Windows Explorer is a powerful way to browse through and manage your files, drives, and network connections.

LONG FILENAMES: Windows now supports long filenames to make your files easier to organize and find.

IMPROVED GAME & MULTIMEDIA SUPPORT: You will enjoy the faster will enjoy the faster video capability for games, enhanced support for MS-DOS-based games, and improved performance for playing video and sound files.

PLUG AND PLAY HARDWARE COMPATIBILITY: You can just insert the card for your Plug and Play hardware in your computer. When you turn on your computer, Windows recognizes and sets up your hardware for you automatically.

32-BIT PREEMPTIVE MULTITASKING: Windows now let’s you use many programs at once: do more in less time!

MICROSOFT EXCHANGE: Use Microsoft Exchange to view and work with all types of electronic communications, including e-mail and faxes.

THE MICROSOFT NETWORK: You can use this new, affordable, and easy-to-use online service to communicate with people worldwide, using e-mail, bulletin boards, and the Internet.

BACKING UP YOUR OLD FILES
Most Windows setups are easy and trouble-free, however, any time you update your computer’s operating system. It is possible that an error could occur (such as system failure due to incompatible hardware, or a power failure) that may temporarily or permanently prevents access to data.
Before you set up Windows 95, you might want to back up certain system files. The files you should back up include the following:
All initialization (ini) files in your Windows directory.
All registry data (dat) files in your Windows directory.
All password (pwl) files in your Windows directory.
All files specified in the Config.sys and Autoexec.bat files.
Your config.sys and Autoexec.bat files, located in the root directory of your startup drive (usually drive C)
Proprietary network configuration files and long scripts.
You may also want to back up personal or business data that is on the hard disk.
Just before setting up Windows 95, make sure your network software, if any, is working. The settings from the existing network configuration are used in Windows 95.

WHAT’S NEW IN WINDOWS?
Windows offers many new, exciting features, in addition to improvements to many features you may be familiar with from earlier versions of Windows. This section mentions just a few of these features.
For a complete listing, look up “what’s new” in the Help Index.

NEW IMPROVED INTERFACE: Windows now features the Start button and taskbar. Click the Start button to quickly open programs, find documents, and use system tools. Use the taskbar to switch between programs as easily as changing channels on your TV.

WINDOWS EXPLORER: Windows Explorer is a powerful way to browse through and manage your files, drives and network connections.

LONG FILESNAME: Windows now supports long filenames to make your files easier to organize and find.

IMPROVED GAME AND MULTIMEDIA SUPPORT: You will enjoy the faster video capability for games, enhanced support for MS-DOS-based games, and improved performance for playing video and sound files.

PLUG AND PLAY HARDWARE COMPATIBILITY: You can just insert the card for your Plug and Play hardware in your computer. When you turn on your computer, Windows recognizes and sets up your hardware for you automatically.
32-BIT PREEMPTIVE MULTITASKING: Windows now let’s you use many programs at once: do more in less time

MICROSOFT EXCHANGE: Use Microsoft Exchange to view and work with all types of electronic communications, including e-mail and faxes.

THE MICROSOFT NETWORK: You can use this new, affordable, and easy-to-use online service to communicate with people worldwide, using e-mail, bulletin boards, and the Internet.

USING YOUR PERSONAL COMPUTER Some Tips


USING YOUR PERSONAL COMPUTER

Once you have set up your computer, you are ready to take advantage of its versatility in this lesson you will also learn about the special keys on the key board, how to change your computer's operating speed and how to reset and turn off your computer.

SPECIAL KEYS ON THE KEYBOARD)

Some of the keys on your keyboard serve special functions when your computer is running software programs. You should become familiar with some of the more important keys, which are shown here on the keyboard:

Function
Keys 1-l0 Perform special functions within application programs

Tab Moves the cursor to the right in normal mode (and to the left in shift mode in some application programs).

Control Works with other keys to Perform special (control) functions, such editing operations in MS-DOS, GWBASIC and MS WORD etc.

Shift Produces uppercase characters Or symbols when used with the main character keys. Produces lowercase characters when CAPS lock is on.

Alternate Works with other keys to enter alternate character codes not otherwise available on a standard key board.

Backspace Move the cursor back one space, deleting the character to the left.


Enter Ends a line of keyboard input or executes a command. (This key may be called the Return key in some of your software documentation.)

Caps Lock Changes the letter key from lower to uppercase; changes back to lowercase when pressed again.

Escape Cancels the current command line or operation.

Nurn Lock Num Lock or Numeric Lock changes the function of the numeric / cursor keys from numeric to cursor positioning; changes when pressed again.

Scroll Lock Controls scrolling in some applications.

Print Screen Prints the screen display on a line printer

Home, End Within application programs,
Page Up, control cursor location
Page Down

Insert Turn insert function on and off.

Delete Deletes characters to the right

The Caps Lock, Num Lock and Scroll Lock keys work as toggles that is, on-off switches - when you press them. When you press the Caps Lock or the Num Lock key, the corresponding light in the upper right corner of the key boards (or otherwise) goes on. When you press these Keys a second time, the light goes off. Try pressing one of these- keys a few times and watch the indicator light go on and off.

How to install Mikrotik 3.15 on Sun VirtualBox virtual machine

How to install Mikrotik 3.15 on Sun VirtualBox virtual machine

How to obtain access to Mikrotik OS for training/educational purpose? Easy step by step video of setting up and OS installing for beginners. Requirements - Installed Sun VirtualBox software available under http://www.virtualbox.org/wiki/Downloads

Any Futher Help Plz contact us for free mikrotik Help & Support

Computer and Videos Game Trend in 1990 to 2009

Computer and Videos Game Trend

Computer games, almost every 2nd Pearson like to play games on computer. This trend starts after 1990. As per survey 40% females and 60% males play games on
computer. When any one get a free time, peoples like to spend time on computer. Some of peoples like to play games on web; many web sites provide this facility to play games on online. 10000 of gaming server every time online on web. Entertainment software is one of the fasters grosing industries in the U.S. Economy. In fact according to Pricewaterhouse Coopers, the sector remains “one of the above-average growth segments of the global entertainment industries through 2011. and also music trend on the top i just read a articles about music trend. and windows 7 music download on the top.

California, Washington, Texas, New York and Massachusetts currently have the highest concentration of video game jobs. Collectively, these areas directly employ 16,604 workers and post 70 percent of the industry total indirect employment.

I found a really interesting game MMO online game: AION, I already mention many gaming server work online, AION have many features.
PowerWiki
Character Creating
Fortresses
Artifacts
Glossary
Legions

AION Hot Topics
Where’s Tutty?
Having a hard time finding Tutty? Find out where the elusive Porgus has gone.
Pathfinding
Think of pathfinding as an in-game GPS to make sure your don’t lose your way. It can be used to find location and NPCs.
Channels
You will discover the need for Channels when you first begin Aion. It can be an integral part to finding your friends and group members and playing in a relatively uncrowned setting.

AION also provide the forums support, if you feel any problem to play game or have any problem to understand it you can put the question in AION forums. In Featured media AION also provide, Wallpaper, Screenshot, Concept Art and AION Vides.
Very simple to play, just create a login and start playing game, for help read stories in AION forums. Different types of forum helps you online like, AION News & Announcements, Aion Character Image, Hot Videos General Discussion, Suggestion Box (your suggestions is important for AION) and technical Support.

Australian Umpire Cheats Pakistan in Semifinal

Australian Umpire Cheats Pakistan in Semifinal

In ICC CHAMPTION Trophy Semi Final, Pakistan Vs New Zeeland Australian Umpire Cheats with Pakistan Team, in the whole match 2 to 3 wrong decision by Australian Umpire there is some thing behind this cheat.
The Wrong decision of Umer Akmal Out Ball First Touch the bad then pad but Australian umpire declare out. Another wrong decision on Rana Ball he did’t give him LBW Out. Once more time on the ball of Shahid Afradi again Umpire wrong decision.
Only one wrong decision by umpire can change the face of cricket match. Every one know New Zeland cant win the Final, and if in Semi Final Pakistan Win the match than Australian Team cant win the final Match.

JNCIA JNO-400 100% pass Answers for Questions

1
Master Switch

2
There is no encryption in LLDP

3
Dedicated master and backup routing engines
Ability to upgrade all members of a virtual chassis from the master switch
Ability to interconnect members of a virtual chassis using the 10-Gigabit Ethernet uplink ports

4
Drop the traffic
Shut down the interface so traffic will be blocked

5
Ethernet-switching-options {
Voip{
Interface ge-0/0/5.0{
Vlan voice-over-ip;
Forwarding-class expedited-forwarding;
}

6
Set routing-options static route 0.0.0.0/0 next-hop 10.1.1.1

7
RSTP
LLDP
Family Ethernet-switching for all ports

8
/config/db/config

9
Allows and LLDP-MED-enabled switch to deliver VLAN and Class of Service (CoS) settings to a neighboring IP phone.

10
It allows any one supplicant on the interface to be authenticated; one authentication is successful, only successfully authenticated supplicant is allowed access at one time

11
JUNOS facilitates separate control and forwarding planes
All processes run in their own protected memory space to prevent against complete system failure when a single process fails

12
DHCP snooping drops DHCPOFFER messages from DHCP servers on untrusted interfaces
DHCP snooping treats access ports as untrusted interfaces and trunk ports as trusted interfaces by default

13
Contents in the /v directory are automatically removed upon a successful software upgrade

14
Spanning Tree Protocol (STP) cannot be configured on the interface

15
J-Web access uses the same authentication method as the CLI

16
DAI requires DHCP snooping to be configured

17
Show vrrp

18
[edit protocols ospf]
Root#

19
Syslog
Traceoptions

20
Routing Engine
Packet Forwarding Engine

21
Filtering

22
File show /config/rescue.conf.gz

23
Regardless of whether version X is newer than version Y, the new switch joins the virtual chassis operationally only after its software is upgraded or downgraded to match that the current master switch

24
Show interfaces ge-0/0/0 extensive

25
Use the monitor traffic interface command
Use the packet capture utility under the J-web troubleshoot tab

26
The interface is up and active

27
[edit firewall family Ethernet-switching]

28
Interface
MAC address

CPU control packets are sent over the lowest member link within the bundle
Load balancing is enabled by default and does not require any special configuration

VLANs

Perform the initial configuration manually with the JUNOS CLI
Initiate the EZ-setup wizard from the shell prompt by typing ezsetup
Initiate the J-Web EZ-setup initial Configuration wizard through the LCD menu by choosing initial Setup

RADIOUS
TACACS+

0 through 9

Bridging can reduce the number of collisions on a LAN
Bridging allows mixed physical media types on a common LAN

If a second “commit” does not occur within 10 minutes the system performs a “rollback 1”, “commit” sequence.


Modify the metric of an OSPF route
Advertise static routes through OSPF

User@switch> request system software add

MSTP supports up to 64 MSTIs per region
MSTP uses the CST to be backwards compatible with STP and RSTP

Learning
Discarding
Forwarding
EX4200 switches support copper or fiber network ports, depending on the switch mode

RADIOUS access-accept

MTU
Duplex mode

Access mode is the default mode for al ports
In access mode, ports receive and transmit untagged Ethernet frames by default

Only the first eight ports are provided with power

VLAN ID
802.1p priority

The routers participating in VRRP all use the same virtual MAC address for a particular virtual IP address
The routers participating in VRRP must share a common group ID to provide redundancy for the virtual IP address defined under that group

The destination MAC address determines which lookup tables is used

2 seconds

15 seconds

The single-blower fan tray used for the EX 3200 switches is field replaceable
The EX3200 switches support either 4-port 1-Gigabit Ethernet uplink modules

Egress filter tables

The authentication is performed using the local password database

[edit system services]
Root#delete web-management

Set interfaces vlan unit 2 family inet address 10.10.10.1/24

Lower route preferences are more preferred
Direct and local routes always have the best route preference

Show ntp status
Show ntp associations

The active configuration is the same as the configuration of roolback 0
The active configuration is the configuration currently operational on the switch

MAC spoofing
MAC flooding

Request system configuration rescue save

Line card

The maximum distance between two virtual chassis member switches can exceed 3 meters
When building a virtual chassis, the dedicated virtual chassis port (VCP) and the 10-Gigabit Ethernet uplink virtual chassis extender port (VCEP) can be used at the same time

RARIOUS access-accept

Your must reboot the switch
You must have console access to the switch

Protocol updates
System management
Forwarding table maintenance

Exhibit stanza B

The destination MAC address determines which lookup table is used
If the agrees port belongs to the ingrees Packet Forwarding Enginer, the packet is switched locally

DHCPREQUEST
DHCPDISCOVER

Run show version
Edit system login
Delete system syslog

User@switch> request system software add

VLAN ID
802.1p priority

Always power up the desired master switch first and assign it with the highest mastership priority

Trunk

The JUNOS software evaluates all terms in a policy sequentially, when it finds that the route matches all the criteria specified in the from clause for a term, it applies the actions specified in the then clause and stopes processing gurther terms.

Spanning Tree Protocol (STP) cannot be configured on the interface

[edit interfaces vlan]

Monitor interface ge-0/0/0

The power allocations pool is calculated based on the lower-capacity power supply

Trunk mode

Using VLANs groups users based on business needs
Using VLANs, LAN membership can be dynamically changed using software configuration

RSTP
LLDP
Family ethernet-switching for all ports

Time to live
Chassis ID

/config/db/config

The EX 4200 switches can be interconnected to from a single virtual chassis
The EX 4200 switches support redundant load-sharing AC power supplies

Syslog
Traceoptions

Console connections to individual member switches are redirected to the master switch
Manage the entire virtual chassis by configuring a single management IP address on the Virtual Management Ethernet (vme) interface

The group numbers do not match

The switch will compare route preferences and use the route with the lowest route preference

It allows any one supplicant on the interface to be authenticate; once authentication is successful, only the successfully authenticated supplicant is allowed access at the one time

If the 4-port 1-Gigabit Ethernet uplink module is installed, the last four built-in network ports are not usable

[edit protocols ospf]
Root#

Show vrrp

Choose which routes to send to a RIP neighbor

RADIOUS
TACACS+

Ge-/0/0/0 {
Unit 0 {
Family Ethernet-switching;
}

The minimum valid SNMP configuration includes only a community name
A valid DHCP server configuration must not include a BOOTP (DHCP relay) configuration

[edit system services]
Root#delete web-management

Common spanning tree

Ether-switching-options{
Voip{
Interface ge-0/0/5.0{
Vlan voice-over-ip;
Forwarding-class expedited-forwarding;
}

Multiple software process
Sepration of control and forwarding planes

Backup port
Alternate port
Designated port

Hop count
Bandwidth

Configure root authentication
Configure me0 management Ethernet port

Flooding

DAI examines ARP packets on Layer 2 access interfaces by default

RSTP

Aging

Booth HTTP and HTTPS can be used to access J-Web
J-Web access uses the same authentication method as the CLI

10

Use the monitor traffic interface command
Use the packet capture utility under the J-Web Troubleshoot tab

You apply the firewall filter under the [edit vlans] hierarchy
You define the firewall filter under the [edit firewall Ethernet-switching] hierarchy

Allows an LLDP-MED enabled switch to deliver VLAN and Class of Service (CoS) settings to a neighboring IP phone

The authentication is performed using the local password database

32768

OSPF routes learned using ge-0/0/0

Bridging can reduce the number of collisions on a LAN
Bridging allows mixed physical media types on a common LAN
Bridging user Layer 2 bridge tables to intelligently forward traffic towards its destination

Set protocols ospf area 0.0.0.0 interface ge-0/0/1.0
Set protocols ospf area 0.0.0.0 interface ge-0/0/2.0

WHAT IS THE USE OF SPECIAL KEYS ON THE KEYBOARD

SPECIAL KEYS ON THE KEYBOARD

Some of the keys on your keyboard serve special functions when your computer is running software programs. You should become familiar with some of the more important keys, which are shown here on the keyboard:

Function
Keys 1-l0 Perform special functions within application programs

Tab Moves the cursor to the right in normal mode (and to the left in shift mode in some application programs).

Control Works with other keys to Perform special (control) functions, such editing operations in MS-DOS, GWBASIC and MS WORD etc.

Shift Produces uppercase characters Or symbols when used with the main character keys. Produces lowercase characters when CAPS lock is on.

Alternate Works with other keys to enter alternate character codes not otherwise available on a standard key board.

Backspace Move the cursor back one space, deleting the character to the left.


Enter Ends a line of keyboard input or executes a command. (This key may be called the Return key in some of your software documentation.)

Caps Lock Changes the letter key from lower to uppercase; changes back to lowercase when pressed again.

Escape Cancels the current command line or operation.

Nurn Lock Num Lock or Numeric Lock changes the function of the numeric / cursor keys from numeric to cursor positioning; changes when pressed again.

Scroll Lock Controls scrolling in some applications.

Print Screen Prints the screen display on a line printer

Home, End Within application programs,
Page Up, control cursor location
Page Down

Insert Turn insert function on and off.

Delete Deletes characters to the right

The Caps Lock, Num Lock and Scroll Lock keys work as toggles that is, on-off switches - when you press them. When you press the Caps Lock or the Num Lock key, the corresponding light in the upper right corner of the key boards (or otherwise) goes on. When you press these Keys a second time, the light goes off. Try pressing one of these- keys a few times and watch the indicator light go on and off.

JNO-400 Enterprise Switching Dumps JNCIA-Ex

Q: 1 Within a virtual chassis, which type of switch maintains the forwarding table?
A. line card
B. master switch
C. routing switch
D. forwarding switch
Answer: B

Q: 2 Which built-in security mechanism in the Link Layer Discovery Protocol (LLDP) can be used to encrypt advertisements?
A. There is no encryption in LLDP.
B. A plain-text password can be used.
C. MD5 hashing of the password can be used.
D. SHA-1 hashing of the password can be used.
Answer: A

Q: 3 What are three key features of virtual chassis? (Choose three.)
A. dedicated active and standby switch fabrics
B. dedicated master and backup routing engines
C. ability to configure vcp-0 and vcp-1 interfaces to run at various speeds
D. ability to upgrade all members of a virtual chassis from the master switchE. ability to interconnect members of a virtual chassis using the 10-Gigabit Ethernet uplink ports
Answer: B, D, E

Q: 4 Which two actions are available when configuring the MAC limiting feature? (Choose two.)
A. Drop the traffic.
B. Change the forwarding-class of the traffic.
C. Redirect the traffic with changed loss-priority.
D. Shut down the interface so traffic will be blocked.
Answer: A, D

Q: 5 You are configuring the voice VLAN feature on an EX-series switch on interface ge-0/0/5.Which configuration would you use?
A. ethernet-switching-options {voice-vlan {interface ge-0/0/5.0 {vlan voice-over-ip;forwarding-class expedited-forwarding;}
. ethernet-switching-options {voip {interface ge-0/0/5.0 {member-vlan voice-over-ip;forwarding-class expedited-forwarding;}
C. ethernet-switching-options {voip {interface ge-0/0/5.0 {vlan voice-over-ip;forwarding-class expedited-forwarding;}
D. ethernet-switching-options {voice-vlan {interface ge-0/0/5.0 {member-vlan voice-over-ip;forwarding-class expedited-forwarding;}
Answer: C


Q: 6 You want to configure a static default route to the gateway 10.1.1.1. Which set command will accomplish this task?
A. set routes static route 0.0.0.0/0 gateway 10.1.1.1
B. set protocols static route 0.0.0.0/0 next-hop 10.1.1.1
C. set family inet static route 0.0.0.0/0 next-hop 10.1.1.1
D. set routing-options static route 0.0.0.0/0 next-hop 10.1.1.1
Answer: D

Q: 7 Which three are included in the factory-default configuration? (Choose three.)
A. RSTP
B. LLDP
C. SNMP
D. user authentication
E. family ethernet-switching for all ports
Answer: A, B,

: 8 Which directory contains the rollback 4 configuration?
A. /config
B. /var/config
C. /var/db/rollback
D. /config/db/config
Answer: D

Q: 9 Which statement describes a benefit of Link Layer Discovery Protocol-Media Endpoint Discovery (LLDP-MED)?
A. Allows an LLDP-MED-enabled switch to deliver VLAN and Class of Service (CoS) settings to aneighboring IP phone.
B. Allows an LLDP-MED-enabled switch to disable the interface when an invalid LLDP-MED advertisement is received from a neighboring IP phone.
C. Allows an LLDP-MED-enabled switch to forward the advertisements received from a neighboring IP phone on one LAN segment to another segment.
D. Allows an LLDP-MED-enabled switch to request an LLDP-MED advertisement from a neighboring IP phone when a periodic update is not received in a specific interval.
Answer: A

Q: 10 Which statement is correct about the single-secure mode of 802.1X?
A. It does not require any supplicant on the interface; no supplicant is able to gain access.
B. It allows any one supplicant on the interface to be authenticated; once authentication is successful, any other devices on the same interface will gain access.
C. It allows any number of supplicants on the interface to be authenticated; only supplicants with their own successful authentication are allowed access at the same time.
D. It allows any one supplicant on the interface to be authenticated; once authentication is successful, only the successfully authenticated supplicant is allowed access at one time.
Answer: D

Further Questions Contact Get Free 100% Passing Gurantee