Monday, October 27, 2008
Microsoft Sliverlight Tutorials
Silverlight enables development of the next generation of Microsoft .NET-based media experiences and rich interactive applications (RIAs) for the Web. Silverlight was released in an interim, beta version as version 1.1 in 2007. However, as Microsoft realized the extent to which they would be updating, revamping, and enhancing Silverlight, they decided to upgrade the release from a build update to an official, full fledged, new version.
Silverlight is a way to design good-looking interfaces with Ajax, a way to stream your content or – in version 1.1 - a new programming model for developing cross-platform rich internet applications with real languages.
Microsoft recently announced the next iteration of Silverlight. Silverlight 2 which competes with Adobe Flash, Javascript, and Shockwave is now available for download with support for OSes like Mac, Windows, Linux and browser support of Firefox, Chrome, Safari and Windows Internet Explorer.
You can download Silverlight 2.0 from here. http://www.microsoft.com/silverlight/
Want to know more about Silverlight.
to know more about Silverlight Tutorials
Thursday, October 9, 2008
Silverlight tutorials
Silverlight applications are delivered to browsers in a text-based markup language called XAML. One important difference between Flash and XAML is, Flash is a compiled application where as XAML is text based. Search engines can analyze and index such content, which is a huge benefit for webmasters.
For regular internet users, Silverlight is a browser plug-in that supports video, audio and animations.
www.dotnetspider.com website contains good tutorials about Sliverlight tutorials for beginers.
So you can visit dotnetspider.com to read Silverlight Tutorials
Wednesday, July 2, 2008
How to Move Items Between Monitors
If you have two or more monitors connected to your computer, you may want to move items between them. These steps show you how
Things You’ll Need:
* Computer using Microsoft Windows
Step1
Click “Start” and then click on “Control Panel." If you are using an older version of Windows, click “Start," point to “Settings” and then click on “Control Panel."
Step2
If your “Control Panel” is in “Category View," click the option in the task pane that says “Switch to Classic View."
Step3
Double-click “Display.” The “Display Properties” dialog box will open.
Step4
Click on the “Settings” tab. Click “Identify.” You will see a number identifying each monitor.
Step5
Drag the monitor icons to show how you want to move the items from one monitor to another.
Step6
Click “Apply” and “OK.”
Step7
Now all you need to do is drag the item you want to move across the first monitor screen until it appears on the second one.
How to Connect Two Computers to One Monitor
Here is a step by step instruction on how to connect two computers to one Monitor
Step 1: Buy a switch box. the switch box is also called as KVM Switch. Use a search engine like Google or Yahoo to find to switch-box manufacturers. Think about buying a box with extra ports in case you might want to hook up any extra machines later on down the line.
Step2
Buy a pair of SVGA cables if they aren't included with the switch box you buy (kits including a box and cables are a more practical value for most setups).
Step3
Buy any necessary adapters if you plan to connect a PC and a Mac to one monitor.
Step4
Shut down both computers.
Step5
Connect the monitor to the switch box (probably to the center socket on most boxes).
Step6
Connect both computers to the switch box (probably to the center socket on most boxes).
Step7
Connect both computers to the switch box.
Step8
Tighten all hand-screws on monitor plugs.
Step9
Turn on monitor.
Step10
Reboot both computers.
Step11
Turn the switch box from A to B (or whatever designation the box uses) to make your different computers appear on the monitor.
How to remote control PC with free software
Things You’ll Need:
* computer
* and remote computer
* Teamviewer 3.0 full version
Here is a step by step instruction how to remote control a PC.
Step 1: It is very easy to use this software. "Teamviewer 3.0". You need to go to "www.teamviewer.com" to download the software. It is free for personal use. You can download for WIN or Mac. Use full version and you can have more fun with this software.
Step2
It is too easy to be true for using this software. You just install this software, and run it. It is also too good to be true for free personal using.
Step3
When Two computer need to communicate, you just install this software into both computer. When you run this program, each computer will have ID, and password. Through this ID and password, you can remote each other. You can use PC remote PC, PC to Mac, Mac to PC, and Mac to Mac.
It is just too good to be true this is free and work in both system.
Step4
There are more function in this remote software. I will strong recommend any one to try it.
Step5
BTW, here is some thing fun. I hook my desktop to a big screen TV. I use my laptop to remote control my desktop like TV remote. So I can watch online movie on my big TV and use my laptop do my work at the same time.
Step6
This is really great freeware. I would like to spread the word for them. If you feel the same way as me. I would like all of you to spread a word about this software to your friends and ask them to try this.
Have fun using this software.
Sunday, May 11, 2008
How to Find MAC Address of Network Interface Card of your Computer
Saturday, May 10, 2008
Find your IP Address, Country, ISP, Browser and other details
For details please Click here.
Who Owns the Internet?
The equipment--the computers, the cables, the routers, and so on are owned by government and private organizations and are paid for by taxes and user fees. In the early history of the Internet, the US government paid for many of the development and operating costs through government grants. In recent years, the US government has stepped aside except for the portions that link government organizations and let private enterprise develop the nets.
What can We Do On Internet?
* Get information on almost any subject by searching the web. It takes some skill to search efficiently, and since anyone can publish just about anything, there is lots of misinformation on the web, too. You need to develop some skill in evaluating the accuracy and reliability of the information you find.
* Send and receive email or chat or exchange messages with people all over the world. Almost as fast as the telephone, there is never a busy signal, and you never play phone tag.
* Join discussion groups about a common subject with message boards, Newsgroups and email discussion lists.
* Get or exchange software and files with the File Transfer Protocol (FTP)
* Explore the World Wide Web, which can use all of the above, and adds easy links to other resources and adds multimedia--graphics, sound, and video capabilities.
* Publish your own material on the web in blogs, message boards, or your own web pages.
What is Internet?
The Internet is a vast network that connects many independent networks spanning over 170 countries in the World. It links computers of many different types, sizes, and operating systems, and, of course, the many people of those countries that use the Internet to communicate.
The one thing all these different computers have in common is the use of the Internet Protocol, abbreviated as IP, which allows computers of different types to communicate with each other. You will often see reference to the longer abbreviation, TCP/IP, which stands for Transmission Control Protocol/Internet Protocol. Your own computer uses TCP/IP software to enable it to link to this service.
Anonymous proxy risks
By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind.
The bottom line of this is to be wary when using proxy servers, and only use proxy servers of known integrity (e.g., the owner is known and trusted, has a clear privacy policy, etc.), and never use proxy servers of unknown integrity. If there is no choice but to use unknown proxy servers, do not pass any private information (unless it is properly encrypted) through the proxy.
Dynamic vs Static IP Addresses
Static IP addresses are used primarily for servers so that they don't appear to "move" while non-servers are usually assigned dynamic IP addresses. Most dynamic IP address users are users of internet service providers (ISPs) since not all the users of an ISP are online at one time and the ISPs can "get away" with not having enough IP addresses for each user.
In order to use a dynamic IP address, a service such as Dynamic Host Configuration Protocol (DHCP) is used to assign addresses dynamically to devices as they request them. If a static address is used, it must be manually programmed into parameters of the device's network interface. (It is also possible to "fake" static IP address assignments through DHCP by assigning the same IP address to a computer — and no other — each time it is requested.)
What is a Hostname?
Computers have always needed unique addresses to talk to each other. With the advent of the Internet, the requirements for enabling computers to communicate with each other on a network included the concept of the hostname. The hostname began as a simple string of alphanumeric characters (and possibly a hyphen) and has evolved to its current definition, where hostname means a Fully Qualified Domain Name (FQDN) that absolutely and uniquely identifies every computer hooked up to the Internet via the Domain Name Service (DNS) naming hierarchy.
The true “name” a computer needs in order to communicate on a network is actually a set of numbers. The original computers connected as the Internet used small integers as the host number. For TCP/IP, the main protocol used by the Internet, each computer has a network IP address that follows a specific set of rules to assure its uniqueness and validity. (Additionally, port numbers further specify the access points for particular services on a computer).
It has always been user friendly to associate a host name with a computer (while the computer maintained its internal numerical host number or network address). One of the initial Internet RFCs, “Standardization of Host Mnemonics” lists the table that associated host numbers with their corresponding host names for the first Internet computers. This table was kept in a file called HOST.TXT that was stored on every computer that wished to communicate.
While the original file was not so daunting at 20 entries, it became quickly apparent that this solution was not scalable or flexible enough as the number of host computers connected to the Internet exploded. In order to accommodate the problem of connecting all of the new computers being added to the Internet, a hierarchical database of host names was created called DNS. DNS associates host names with their IP addresses. A complete domain name (that is, an FQDN) includes the name of the host concatenated with its domain name. This naming convention allows for a hierarchy of domain names with the host name being the most specific (and “left-most”) part.
The rules for a host name were first standardized in the original host name specification, “DoD Internet Host Table Specification”. It states that the name should be a text string consisting of the letters A through Z (upper or lower case), digits 0 through 9, the minus sign (-), and the period (.). Note, the period is only allowed as the last character of the host name if it is the delimiter of the full domain name (FQDN). No spaces are permitted as part of a name. The first character must be an alphabetic character and the last character must not be a minus sign or period. It was also recommended that the host name be no longer than 24 characters in length. Subsequently, in "Requirements for Internet Hosts - Application and Support", the host name rules were updated. The first character could now be either a letter or a digit and software dealing with host names must handle names up to 63 characters in length.
In common usage today, hostname refers specifically to the FQDN that comprises the name of the host, a period, and the domain name. The domain name is composed of labels that begin with the top-level domain and are arranged right to left for the second and, possibly, third level labels. The host name and the domain labels are separated by periods. The total length of the hostname as an FQDN cannot exceed 255 character with each domain name label having a maximum length of 63 characters. For example, if a company’s domain name is “example.com.” and a particular computer in the company has been named “plato”, the hostname for that computer will be “plato.example.com.”. Note, that technically FQDNs end in a period to unambiguously define the hostname and to be sure that it is not part of a longer domain name. (although in common usage this final period is often omitted).
The exact rules for the new hostname definition that has evolved is also more rigorous than that of the related original host name specification. The DNS naming rules are explained in “Domain Names – Concepts and Facilities”, “Domain Names – Implementation and Specification”, and “Clarifications to the DNS Specification”.
To summarize, a hostname is a Fully Qualified Domain Name that uniquely and absolutely names a computer. It is composed of the host name and the domain name. The domain name in turn is one or more domain labels that place the computer in the DNS naming hierarchy. The host name and the domain name labels are separated by periods and the total length of the hostname cannot exceed 255 characters.
Now that the syntax of the name of the host as part of the hostname is understood, how does one choose a good name for their computer? Several web sites offer suggestions and the choice is up to the system administrator whose whimsy is only limited to the fact that no two computers in one domain space can have the same host name (because the two computers would have the same hostname!).
RFC 1178, “Choosing a Name for Your Computer” contains several guidelines on how to name—and how not to name—your computers.
A summary of sample guidelines for good host names:
- Use words/names that are rarely used.
- Use theme names.
- Use real words.
- Don't worry about reusing someone else's hostname.
- There is always room for an exception.
- Don't overload other terms already in common use.
- Don't choose a name after a project unique to that machine.
- Don't use your own name.
- Don't use long names.
- Avoid alternate spellings.
- Avoid domain names.
- Avoid domain-like names.
- Don't use antagonistic or otherwise embarrassing names.
- Don't use digits at the beginning of the name.
- Don't use non-alphanumeric characters in a name.
- Don't expect case to be preserved
What is a Proxy Server?
Web proxies
A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.
When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the least-recently used documents, and LFU removes the least-frequently used documents.
Web proxies can also filter the content of Web pages served. Some censorware applications — which attempt to block offensive Web content — are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.
A special case of web proxies are "CGI proxies." These are web sites which allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity.
You may see references to four different types of proxy servers:
- Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)
- Anonymous Proxy - This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.
- Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.
- High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.
What is an IP address?
Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.
Because the numbers may be tedious to deal with, an IP address may also be assigned to a Host name, which is sometimes easier to remember. Hostnames may be looked up to find IP addresses, and vice-versa. At one time ISPs issued one IP address to each user. These are called static IP addresses. Because there is a limited number of IP addresses and with increased usage of the internet ISPs now issue IP addresses in a dynamic fashion out of a pool of IP addresses (Using DHCP). These are referred to as dynamic IP addresses. This also limits the ability of the user to host websites, mail servers, ftp servers, etc. In addition to users connecting to the internet, with virtual hosting, a single machine can act like multiple machines (with multiple domain names and IP addresses).
If you are connected to Internet now, you can check your IP address by clicking here.
Friday, May 9, 2008
Common Errors in PC & Their Solutions
Check all the connections like Monitor Cable, Data cables,RAM, Display Card , CPU connections.
2. CONTINUOS THREE BEEPS
Problem in RAM Connection.
3. THREE BEEPS ( 1 Long 2 Short)
Problem in Display Card Connection
4. THREE LONG BEEPS PERIOD WISE
Problem in BIOS or RAM (Basic Input Output System)
5. CONTINUOS NON-STOP BEEPING
Key Board Problem (I.e.; Some Key is pressed for Longer time)
6. FDD LED IS GLOWING CONTINUOSLY
Data cable to be connected properly (twisted cable).
7. NO DISPLAY ON THE SCREEN AT ALL
Hard Disk cable connected wrongly. Connect rightly seeing the Red mark (Faces power supply) and then Restart.
8. POWER LED IS OFF
a. Check main power cord
b. Check S.M.P.S.
c. Check Mother Board connection
9. SHOWING CMOS ERROR
Replace 3 Volt battery of Mother Board . Set Original Settings Manually.(Refer CMOS Setup chart)
Enter your search termsSubmit search form
10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT WORKING PROPERLY
Check Power cord of FDD , Data Cables , set CMOS & Finally the Check drive.
11. SHOWING HDD ERROR OR HARD DISK FAILURE
a. Check Power Cord
b. Check connection of HDD
c. Check Data cable
d. Check Hard Disk parameters in CMOS or Auto detecting Setting Partitions by Fdisk Command, then format it to set track 0.
12. MOTHER BOARD HANGS DUE TO UNSTABILIZED POWER SUPPLY
a. Check S.M.P.S
b. RAM not functioning properly.
c. Software problem (due to using pirated software)
d. CPU fan not functioning properly.
13. DANCING SCREEN
a. Check Display card connection
b. Virus Problem
c. Video Memory Problem
14. SHAKING SCREEN
a. Earthing problem
b. Magnetic waves comes around.
15. CPU CABINET SHOCK
a. Check Earthing
b. Check main power cord.
16. NON-SYSTEM DISK ERROR
a. Floppy Drive having different disk (Non-Bootable Disk) OR CMOS Parameters for Hard Disk may not be set properly.
b. Hard Disk Partitions may not be created.
c. Hard Disk may not be formatted.
7. MISSING OPERATING SYSTEM
The System files missing namely Ie; command.com} - User File IO.SYS & MS_DOS.SYS } - Hidden Files. These above three files required for Start up of the system that can be transferred by using SYS C: Command OR While the time of formatting by using Format c:/u/s
18. MISSING COMMAND INTERPRETOR
May the file Command.com is corrupted OR Infected by Virus OR Some one has Erased it.
19. SHOWING I/O ERROR
a. The type of Hard Disk in CMOS may not be set properly.
b. Operating system used for formatting is not valid
20. SHOWING DIVIDE OVER- FLOW MESSAGE
a. May some Directories or Files crash with other files.
b. Use CHKDSK/F or SCANDISK Command to correct it.
21. HARD DISK MAKING NOISE WHILE PROCESSING
a. Unstabilized power supply.
b. Check for Loose Contact.
c. Do not use Y Connectors for Hard Disk.
d. It may create Bad Sector OR Weak Hard Disk.
22. HARD DISK HANGS WHILE PROCESSING
Check for Bad Sector by using CHKDSK or SCANDISK Command. If found format the Hard Disk and set Partition before that area.(This is the only procedure to use Hard Disk with Bad Sector) OR (To avoid Bad Sectors use Standard Power Supply)
23. HARD DISK NOT DETECTED
a. Check Power Connector
b. Check Data Cables
c. Check Jumpers
24. PARTITION NOT SHOWN
Operating System where the Hard Disk formatted is not supported with present Mother Board. For Eg: Hard Disk formatted with Pentium System will hide their partitions for 486 System.
25. MMX/DLL FILE MISSING
May the above files may be corrupted due to power failure or Virus. Make available above files from other Computer. OR Reinstall Windows 98 Operating System. (This procedure will not make any effect on existing Data).
26. WINDOWS REGISTRY ERROR
This will happen due to sudden ON/OFF of the system. Final solution is to Reinstall Operating System.
27. DISPLAY COLOUR DOES NOT MATCH
a. Configure Display Card properly with their CD.
b. The Standard setting for Windows is set it to 800x600 for better performance.
28. UNKNOWN DEVICE FOUND
May the Driver utility is not provided with operating system . Insert Driver CD and install software for the above Device. (Every Device requires driver utility to set active
Schedule a PC reboot, shutdown, or hibernate with WinOF
WinOFF is a nifty utility that lets you schedule all sorts of power-related actions. You can set your computer to shutdown 60 minutes from now. Or you can tell it a specific time to shut down. There's even an option to shut down the system when your CPU is idle, under the assumption that this means your computer is probably finished with whatever task you set for it.
Don't want to do a complete shutdown? You can put your computer in suspend or hibernate mode. Or if you just want to make sure your PC is fresh and ready to go in the morning, you can schedule a middle of the night reboot.
some of the features quoted from the creator's Site:
Shut down the computer at certain hour (e.g. at 12:00).
Shut down the computer in several minutes (e.g. in 15 minutes).
Shut down the computer when the CPU becomes idle.
Several types of shut down (shut down, restart, log off, power off, suspend, hibernate and lock computer).
Option for hang up the modem instead of doing a shut down.
Option for set a password to protect the access to the configuration.
Complete command line support for batch process.
Option for capture the desktop and/or execute a program before the shut down.
Option for run the program when starting Windows session, for daily programmed shut down.
Immediate shut down and computer lock from the traybar icon menu.
Option for show an alert window, which allow the cancellation of the shut down.
Works with Windows 9x/Me/NT/2000/XP.
Dual English/Spanish version.
For more details, visit http://www.ampsoft.net/utilities/WinOFF.php