• Raspberry PI Boom! What a useful tiny useful computer.

  • Enter Slide 2 Title Here

  • Enter Slide 3 Title Here

Sunday, December 28, 2008

Deefunia dot com

Deefunia dot com is out now.. It's just another photo funia. For anyone who like to create photo with photo funia can try more choices at Deefunia.com.

Wednesday, November 26, 2008

photofunia programming tricks

Photofunia Programming Tricks
Image manipulation have lots of ways..
To make it realistic just using PHP is not a very hard way..

Firstly, list out what you can do with the PHP photo manipulation function..
1. stretch vertically/ horizontally
2. rotate picture
3. skew horizontally / vertically
4. reposition x and y

Secondly, develop the code.. below is some of the example for each function i have made..


coming up next... Code for creating special effects on a picture with php

Photofunia functionality

Photofunia functionality

The secrets remains inside....
Recently developing a web application which have the same function of photofunia.com and besides using PHP, photofunia use ImageMagick to stretch photo which makes the photo looks more realistic in a photo. PHP till now still don't have a lots of support for graphic stretching using gd. A driver called imageMagick which can be downloaded must be installed into the server computer in order to use it as the machine to stretch photo. ImageMagick supports for few types of language such as PHP, C, .Net, python, Pascal, perl and so on.

Get ImageMagick for free.. under GPL.

Read more about Magick Wand for PHP at MagickWand for PHP manual


Upload files php script

Upload files PHP script

Photofunia

PhotoFunia

Create your own advertisement board picture, your picture on a celebrity shirts, your picture on a glass and so on..

The magnificent of using computer automate the merge of picture and also mixture of special effects makes your photo looks real and unbelievable.

Here's some of their photo which you insert your photo in it!!!

Thursday, November 20, 2008

The Recrusive downline Code

Recently developing a affiliate programe and this code will help us to list out the downline user list from database..

From the code, it start looping few time function to list down the downline into an array and then from that array, we can extract out the listing accordingly.

function recrusive_downline($directory, $downnumber=2)
{
$list = vertline($directory);
$deep = $downnumber-1;
while(list($index, $file) = each($list))
{
if($downnumber > "0")
{

if(count(vertline($file))<>0)
{
if($deep >0)
{
$directory_tree[] = array(
'deep' => $downnumber,
'path' => $file,
'content' => recrusive_downline($file, $deep)
);
}else{
$directory_tree[] = array(
'deep' => $downnumber,
'path' => $file
);
}
}else
{
$directory_tree[] = array(
'deep' => $downnumber,
'path' => $file
);
}
}
}
return $directory_tree;
}

Sunday, October 26, 2008

Feel free to join Programminggig.net84.net forum

Our Forum is Up!!
Feel free to join our programminggig forum at www.programminggig.net84.net forum

Post up topics on anything you want to share, your problems and get reply from experts all over the world on how to solve your problem.

Learn new things from the information in forum..

Get latest info, latest news, and great things from our forum...

Join now! it's free

Thursday, August 21, 2008

My wireless problem

Wireless network problem
possible causes:
1. Network adapter not install probably
2. Network adapter not installed with correct wireless driver
3. Installed wireless network software crash with windows Wireless network software.
4. Incorrect IP and gateway
5. The firewall settings

Solve it: Cause no. 1:
1. if you are using personal computer (PC) then press down your network adapter or unplug and replug it again.
2. Check if your computer detects the network card and it will prompt up saying some new hardware was found.
3. Install with correct driver (Usually on CD given when you buy your computer).

Cause no. 2:
1. Try install another driver, computer will detect which driver is the best for your network card.
2. If installed correctly, you will see your wireless network icon on the network connections in control panel.
Cause no. 3:
1. Uninstall your network software and use only the windows given wireless software to configure which wireless to connected, ip settings and many more.
2. If you find a dialog box like below, that means that you are using windows wireless software to connect to a wireless network.

Cause no. 4:
1. always check your internet protocol (IP) by double click on your wireless network adapter on the right down corner where you will see this icon.2. a dialog box such as below will pop up. Click on the support Tab.3. The default ip for wireless will be 192.168.1.1 and make sure your ip is other than 192.168.1.1 with something like 192.168.1.x where x is number starts from 2 to 254. For example 192.168.1.200.

cause no. 5:
1. Check for firewall settings. If you have on your firewall setting, just switch it off for a few seconds to try if your computer can be connected to the wireless network or not.
2. For windows user, disable your firewall from Control panel, Windows firewall. Select off then press ok.
3. Try connect to the wireless network again, and it should work.

What should i do when my computer hangs?

Oh no, my computer hangs again

Calm down, there are several methods you can do to solve this problem.

1. pressing ctrl+alt+del to end task (Free up memory) - from task manager
a. Click on the processes tab on the top..
b. What program should i end task?
-Any image name run under your User Name (Example here is Administrator) can be terminated. (The more you terminate, the memory you free up- so it can run more faster and prevent hang)
*Caution: PLEASE DON'T END PROCESS FOR EXPLORER.EXE (it is the skin of your windows, if you're sure how to load it again then only you can end it and reload it from the file menu)


2. press restart button/ shutdown button on your computer
a. press the restart button once to restart your computer
b. or Press the power button about 3 seconds to shut down your computer.
-let it cool down first (about 3 seconds) and then only power up again your computer to use.

How to go to safe mood in my computer?

How to go to safe mood?

Safe mood is an alternative way to boot in Windows. Safe mood usually use to change some system settings because of a software crash or failure. Here are some ways we can boot to safe mood easily.

1. Pressing F8 key when computer boots
a. keep pressing F8 key on your keyboard when the computer boots, or in black screen before Windows loads.

2. Set some settings from msconfig
a. type in msconfig into the run dialog box from start menu.
b. A dialog box as below will then show up. Select The BOOT.INI tab
c. Select /SAFEBOOT and you can either select minimal boot (which is only load the minimal programe) , network (if you want to connect with LAN) or else.
d. After click Apply, a dialog box as below will pop up asking whether you want to restart now. if you want to restart in safe mood now, then click restart now. Else, just click exit without restart.
e. after restart, you'll see that it automatically directs you to safe mood.

Google Ad-sense

Google AdSense

Do you want to get some reputation for writing blog or earning some money from what you write? Sign up for Google AdSense and you can get lots of benefits. Traffic your blog or website and get payment from the advertisement by Google AdSense.

Wednesday, August 20, 2008

Scripting registry changes - technique

5 Types of technique in scripting registry change
A brief Description

1. INF
a. Also known as Setup Information files
b. With the .inf extension
c. Able to add, change, and delete registry values
d. difficulty level for INF is medium
e. It is easy to install, just right click on it and select install
f. example of INF file
[Version]
Signature=$CHICAGO$

[DefaultInstall]
AddReg=Add.Settings
DelReg=Del.Settings

[Add.Settings]
HKLM, Software\Microsoft\Windows\CurrentVersion\Run,,,"myprogram"

[Del.Settings]
HKCU, Software\Microsoft\Windows\CurrentVersion\Run

2. REG
a. has the .reg extension
b. it is the easiest way to add, modify, or delete registry
c. example
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"avgnt"="\"C:\\Program Files\\Avira\\AntiVir PersonalEdition Classic\\avgnt.exe\" /min"
"Acrobat Assistant 8.0"="\"C:\\Program Files\\Adobe\\Acrobat 8.0\\Acrobat\\Acrotray.exe\""
"Zone Labs Client"="C:\\Program Files\\Zone Labs\\ZoneAlarm\\zlclient.exe"
"chkpendrive"="c:\\chkpendrive\\chkpendrive.exe c:\\chkpendrive\\chk.txt"
"LanSpeed2"="C:\\Program Files\\LanSpeed2\\LanSpeed2.exe"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
"Installed"="1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
"Installed"="1"
"NoChange"="1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
"Installed"="1"

3. Batch
a. has the extension of .bat
b. Example
@echo off
Reg delete %HKCV%\Explorer\MenuOrder /f

4. Script
a. You can either use VBscript or JScript to change(Windows support both)
b. example (VBScript)
Set WshShell = WScript.CreateObject("WScript.Shell")

WshShell.RegWrite "HKCU\Software\testing\",1,"REG_BINARY"
c. Example (JScript) * Case sensitive
var WshShell = WScript.CreateObject("WScript.Shell");

WshShell.RegWrite("HKCU\\Software\\Testing\\",1,"REG_BINARY");

5. MSI
a. MSI stands for Windows Installer Packages.
b. This is just like normal installer such as Microsoft Office and so on.
c. Needs to be compile only can be used.
d. Needs more higher level scripting and programming skills

Automate Check for pendrive suspicious virus files

Automate Check for Pendrive suspicious Virus Files

.ahk Code:

Explanation:
1. This is a text file reside on drive C:\chkpendrive\chk.txt
2. Install autohotkey and select load this script from c:\chkpendrive\chk.txt
3. Also create a file called drivelist.txt in c:\chkpendrive folder
inside the drivelist.txt, type in
c
d
e
f
g

4. This means that it will check for drive c, d, e, f and g for suspicious virus file which is autorun.inf
5. If found, it will automatically unhide that autorun.inf file and also disable its function
6. autorun.inf is a dangerous file where it will load another virus file such as virus.exe, virus.bat or something like this to automatically install it without you noticing it.
7. Ensure you always eject pendrive if there is a popup saying autorun.inf is found.
8. Then only plugg in again. And now you can open your pendrive without any worry anymore.

Safety password in PHP - crypt() or md5

Safety password in PHP
using crypt() or md5

php code:

Authenticating users with IP Address - PHP

Authenticating users with IP address - PHP

PHP Code:
$accepted_ip = array ("127","0","0","1");
$remote = explode(".",$remote_addr);
//set $match to true
$match = 1;
//check if there is unmatched ip
for($i = 0; $i < sizeof($accept); $i++){
if ($remote[$i] != $accept[$i]){
//if not match, set $match to false
$match = 0;
}
}
//if $match true, then allow access, else denied access.
if($match) {
echo "Access Success!";
}else{
echo "Access Denied!";
}

Explanation:
1. $remote_addr - the remote IP address of client computer. IP address with 127.0.0.1 means that that client computer is the same computer used as server computer which provide PHP services.
2. the ip address is located to an array to test whether it is same as the ip address stated there. eg. $accepted_ip

Tuesday, August 19, 2008

Cameron Highlands

Cameron Highlands

Cameron Highlands Tea farm

The famous Steamboat in Cameron Highlands ("Fantastic Steamboat")

Rose Garden - Red rose

Rose Garden - Yellow Roses

Best Of Highlands (BOH) Teafarm

Windows Special folders - registry

Windows special folders
(Location of special folders)

AppData - %USERPROFILE%\Application Data
Cache - %USERPROFILE%\Local Settings\Temporary Internet Files
Cookies - %USERPROFILE%\Cookies
Desktop - %USERPROFILE%\Desktop
Favorites - %USERPROFILE%\Favorites
History - %USERPROFILE%\Local Settings\History
Local AppData - %USERPROFILE%\Local Settings\Application Data
Local Settings - %USERPROFILE%\Local Settings
My Pictures - %USERPROFILE%\My Documents\My Pictures
NetHood - %USERPROFILE%\NetHood
Personal - %USERPROFILE%\My Documents
PrintHood - %USERPROFILE%\PrintHood
Programs - %USERPROFILE%\Start Menu\Programs
Recent - %USERPROFILE%\Recent
SendTo - %USERPROFILE%\SendTo
Start Menu - %USERPROFILE%\Start Menu
Startup - %USERPROFILE%\Start Menu\Programs\Startup
Templates - %USERPROFILE%\Templates

Registry hack - Using Regedit (a brief description)

Registry Hack using
Registry Editor
a brief description

What is registry?
1. it is a hierarchical database which describe the central repository for configuration data. It is just a big collection of settings of your windows.

What is Registry Editor?
1. Registry editor is a tool you can use to edit the registry directly.

Why Registry Editor?
1. it is powerful and simple program with a straightforward user interface.
2. simple menu
3. able to modify a key, create a key or even delete a key
4. easy to search through all keys
5. favorite keys can be bookmarked

How does registry editor look like?

Network troubleshooting tools

Network Troubleshooting tools
Brief description

Digital volt-meter (DVM)
- Test for existence of a break or a short in cable.
- Operates at the physical layer of OSI Reference Model.
- image (http://www.electronicsnmore.com/images/dvm9912.gif)

Time-domain reflectometer (TDR)
- Determine a break or short occourred within cable with sonar-like pulse.
- Operates at physical layer of OSI Reference Model.
- image (http://www.pantongt.com/TDR44.jpg)

Cable tester
- Examine a cable whether it meets performance standards for its type.
- Also test for impedance and other variables.
- Advance tester will have data link layer data-collection capabilities.
- image (http://www.vpi.us/vpi/images/items/tester-cable.jpg)

Protocol analyzer
- Hardware or software which can monitor network traffic, find faulty network components and also analyze the overall network performance.
- Operates at many layers of OSI model.
- image (http://www.colasoft.com/products/capsa/screenshot.gif)

Network monitor
- Software which monitor the network performance and gather statics.
- Operates from data link layer up through top of OSI model
- image (http://www.mikrotik.com/img/dude3.jpg)

Operating system tools
- Example : Windows NT Diagnostics tool.
- image (http://www.microsoft.com/library/media/1033/technet/images/archive/ntwrkstn/maintain/operate/hardwa04_big.gif)

Sunday, August 17, 2008

A basic Select statement with mysql and php

A basic select statement with mysql and php

****************************
//// means < \\\\ means >
****************************

////?
//define $result - what to select
$result = "select * from table_name";

//connect to database
mysql_connect("username","password","") or die ("could not connect to database.");
mysql_select_db("test") or die("error selecting db");
$result = mysql_query($query) or die (mysql_error());

//count number of result colums
$number_colums = mysql_num_fields($result);

//draw table
echo "////table\\\\";
echo "////tr\\\\";

//generate header column using loops
for ($i=0; $i<$number_colums; $i++)
{
echo "////td\\\\".mysql_field_name($result, $i)."/////td\\\\";
}
echo "/////tr\\\\";

//generate results table body
while ($row = mysql_fetch_row($result))
{
echo "////tr\\\\";
for ($i=0; $i<$number_colums; $i++)
{
echo "////td\\\\";

//test if have null value then generate null words
if (!isset($row[$i])){
echo "null";
}else{
echo $row[$i];
}
echo "/////td\\\\";
}
echo "/////tr\\\\";
}
echo "/////table\\\\";
?\\\\

MySql insert, update, AND delete

MySql Insert, Update, and Delete

Insert statement
insert into tableName (column1, column2...) values (value1, value2 ...)
Example:
insert into tableName (id, name) values (null, 'John')
* The null can be use in the column which is auto_increment so that the database will auto assign new id for the next data.

Update statement
update tableName set column1=value1, column1=value2 where column=idvalue
Example:
update tableName set name='johnson' where id=5
*From here, it will change the name of data id number 5 to 'johnson'

Delete statement
delete from tableName where column=idvalue
Example:
delete from tableName where id=5
*It will delete the row for id number 5

Wednesday, August 6, 2008

The OSI Reference Model - Networking

The OSI Reference Model
The OSI model is also called ISO OSI (Open System Interconnection) reference model. It is because it deals with connecting open systems which is systems that are open for communication with other systems.

The principle of OSI reference Model
1. A layer should be created where different level of abstraction is needed.
2. Each layer should perform their own defined function.
3. The function of each layer should be chosen and defined by internationally standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow across the interfaces.
5. The number of layers should be large enough and the same layer should not have the same function.

The seven layer of OSI model

Tuesday, August 5, 2008

scour.com - the search engine

Scour.com

Why choose Scour?
1. it's a search engine
2. it can be as powerful as Google
3. it holds the most appropriate result by selecting from people's comments and rating.
4. it can search through few famous search engine like Google, Yahoo, Msn, and Scour itself.
5. it's free
6. you can even get points from each search you perform
7. points are accumulate and can use to redeem visa gift card to use as cash.
8. just get points as easy as using its search engine, give rating on each result and also comments.

Join Now!! it's free and easy to get points with each search
http://scour.com

Wednesday, July 30, 2008

Types of Networks

Types of Networks
1. Peer-to-Peer

Computer works as servers and clients in sharing resources and using resources.

Advantages:
a. Easy to set up
b. Inexpensive

c. Additional computers or software packages are not required
d. local cont
rol of resources is maintained by each individual themself.
e. no specific staff is required to maintain the network.
f. each individ
ual computer are not dependent on the functional of central computer.

Disadvanteges:
a. Network security weak and limited to only password protection
b. users might have to remembe
r multiple password for each shared resources.
c. It is difficult and time-consuming to backup data from many different computer.
d. very easily get poor performance if the load of network sharing is too high.
e. There is lack of a central or
ganizational policies and scheme. Each users have to seek by themself for data from each different computer.

2. Server-Based

Provide centralized control of network resources rely on the server computer. The server provide security and network administration.

Advantages:
a. Security is centrally controlled by the server computer.
b. Simplified administration for large numbers of accounts and network.
c. Optimized and faster access to files/ resources.
d. Protecting data through backups are easier.
e. User have to only remember one password to access the network resources.

Disadvantages:
a. The hardware and software of server-based computer are more expensive.
b. Additional and technical administrator stuff required to maintain network.
c. If the server fails, the entire network will unable to function properly.

The IDE/EIDE devices

The IDE/EIDE devices
IDE(Integrated Drive Electronics) is the usual interface for hard drive. Why called IDE, IDE means that the drive has a built-in controller inside itself rather than a separate chip as a part of the motherboard chipset. Integrating the chip into the drive itself leaves manufacturers free to develop the new technology of IDE devices without worrying weather it is compatible with that chipset on certain motherboard. IDE drives are mainly compatible with the ATA (AT attachment) starndad. Which means that we can even install old drive in a new system.

EIDE(Enhanced Integrated Drive Electonics) devices were named because at the time of developing, they supported the ATA-2 standard rather than the original ATA standard. Since then, all IDE devices now fall into this category and the term EIDE is often lost and we can just refer it to IDE devices.

Tuesday, July 29, 2008

File System

File System
There are three basic file systems in windows. They are FAT, FAT32, and NTFS.

FAT (File Allocation Table)
1. FAT system divides sectors of physical disk (eg. hard disk) into allocation units called clusters.
2. FAT is also known as FAT16
3. it has existed in its present from in MS-DOS since version 4.0
4. Maximum size for FAT16 is 2GB.
5. FAT directories can only support filenames of eight characters with a three-character file extension (eg. exe)
6. FAT's attributes is simple - one byte and eight possible attributes.
7. Works well with small partitions that have relatively few files.

FAT32
1. It is the FAT system with 32-bit number internally.
2. It is not designed to operate with fewer than 64K clusters, but can go up to 232 cluster (about 4 billion).
3. FAT32 needs a larger cluster size only when partitions reach 2TB.
4. FAT32 can be used only by windows 2000, Windows98 and Windows95 OEM service release 2.

NTFS (The New Technology File System)
1. It was developed from HPFS (High Performance Filing System) which was introduced in OS/2
2. The major difference with FAT system is that the information about file allocation is not stored at the start of the partition.
3. Provides support for links within the file system.
4. NTFS has the capability to support very large file systems.
5. NTFS security comes in the following four sections:
a. Logon - every user must uniquely identify themselves.
b. Ownership - every resources on the system owned by a user.
c. Permission - resource on system is at the discretion of its owner.
d. Auditing - any permission that has been granted is recorded.
6. NTFS is the only file system that supports local security.

Monday, July 28, 2008

The Registry Hive

The Registry Hive


In windows, registry is the heart. Every action or settings are recorded inside registry. In Microsoft windows, Registry are divided into subtrees. From the root, there are five subtrees (HKEY_LOCAL_MACHINE, HKEY_CURRENT_USER, HKEY_USERS, HKEY_CLASSES_ROOT, and also HKEY_CURRENT_CONFIG).

1. HKEY_LOCAL_MACHINE
keep all settings for the harware currently installed in the machine.

2. HKEY_CURRENT_USER
Keep all settings for the user profile for the person currently logged on to the machine

3. HKEY_USERS
Keeps the DEFAULT profile which describe how windows will behaves when no one is logged on or keeps settings for new created user.

4. HKEY_CLASSES_ROOT
Keeps all the file association information and the OLE(object linking and embedding) registration database.

5. HKEY_CURRENT_CONFIG
Keeps all the hardware configuration at boot-up time.

Major System Files in Windows

Major System Files in Widows.
Make sure this files and programs are there. Else, your windows won't function properly.

1. AUTOEXEC.BAT
This file is used by MS-DOS and other operating system at startup. for this file, it does not have to be present, if it is, the commands in this file will be used when the computer goes through startup process. It contains the instruction lines to run any programs automatically at startup for example, Mouse.com or myprograme.exe. It will run during the boot process and also can be run any other time when you call out autoexec at the MS-DOS prompt. For mordern operating system, IO.SYS are used.

2. BOOT.INI
This is a hidden system file in the root directory of the primary partition. It has the menu which appears each time the PC is started. Like some computer which two operating system, it enable us to choose which is the operating system we want to use. If the user does not react within 30 seconds and the PC will automatically boot to the default OS.BOOT.INI. It can be accessed using notepad but for better way of controlling options for the startup menu is through the System Properties in start> Control Panel.

3. COMMAND.COM
This command-line processor interprets commands from user. We can change any settings or do some of copy and paste, edit, and many more routine from here.

4. CONFIG.SYS
This file is used by MS-DOS with AUTOEXEC.BAT and other operating system at startup. It can only be run during the boot process of PC. It may not be present but if it does, the commands inside this file will be used when the computer goes through the startup process. It normally contains the instructions to load device drivers( for example CD-ROM drive, Sound card driver).

5. IO.SYS
For Windows 9X system, this file replaced the three main DOS files which is MSDOS.SYS, CONFIG.SYS, and alsl AUTOEXEC.BAT. it is then replaced by NTLDR for Windows XP and also Windows 2000. So you won't find this file running under Windows XP and Windows 2000.

6. MSDOS.SYS
This program is the controller for software interaction with MS-DOS kernel. Older system, programes, or games which need the use of MS-DOS to load will need MSDOS.SYS. However, for newer programes or systems, normally they don't need this file to load the programe. This is also one of the files needed to boot MS-DOS.

7. WIN.COM
This files will loads the GUI(Graphic User Interface) for Windows 9X by loading this three files: KRNL32.DLL, GDI.EXE and also USER.EXE. This three file must not be deleted or your computer windows will stop function and need to be formated.

Types of servers - Networking

Types of Servers - Networking

1. File Server
Servers that provide users to stores, retrieve, edit or even delete documents and other files. Data can be easily backed up and protected from a file server.

2. Print Server
Print server is a server with the ability to share the printer connected to it by all network users. Print server provide a central point of controlling printing jobs. It have print queues and are said to spool each individual print job to an actual printer for printing.

3. Communication/ Mail servers
Server which providing email services, messaging, or groupware functions. An example of a communication/ mail servers that run on windows is Microsoft Exchange Server or Lotus Notes.

4. Application Servers
This is a term generically applied to servers that provide access for users to applications. It can be a server which running database server or email program. In some contexts, it might also can be refer to a file server which stores network versions of applications such as Microsoft Office. Everyone on the same network can access and use application that installed in application servers without installing it to their own computer.

Configuring TCP/IP

Configuring TCP/IP - Client side configuration.

IP Address - IP address is unique in a network. Each computer will have different IP address. IP address will somehow look something like this 192.168.1.1.

Subnet mask - This allows Windows to determine the network and host addresses from the IP address. Subnet mask usually have different numbers when a larger network devided into few subnetwork. The default setting for subnet mask on a local network will look something like 255.255.255.0. The 0 at the last number means that the ip address used on network have a unique numbers range from 0 to 254 can be used.

Default gateway - This will be the ip address of the router interface that connects the local network to external netwoks such as the internet. Type in the router ip address and you will be able to surf the internet without any error.

DNS (Domain Name System) - Normally the DNS server from internet will obtain the ip address of a website such as www.google.com to 72.14.235.147 so that the computer knows where to send or retrieve information packets from.

Monday, July 21, 2008

How to setup a IIs server

How To set up a IIS server on computer?


1. First, goto start > control panel > add or remove programs.
(a dialog box like below will show up)

2. Select windows components wizard and then click on the "internet Information Services(IIS) to install it.
3. Click on next and then it will require you to insert windows CD in order to install it on your computer.
















4. Finally, you will see an extra icon on your administrative tools from control panel there. The icon will look something like.

5. Then, your IIS (Internet Information services) like ftp and http can be used already.

Monday, July 14, 2008

Recover data from encrypted ntfs partition

How to recover data from encrypted ntfs(New Technology File System) partition after system format?

Normally, we unable to access a particular folder on a ntfs drive system such as my documents folder. Here, I will show you some trick on how to recover your files which is protected after formatting.

1. Login with administrator equivalent on the operating system.
2. Right click on the drive which the folder you want to recover is inside it.
3. Click on tools tab> backup now. A wizard will get started which you can customize the folder to backup.
4. Now you are able to restore the files you wanted.

Friday, July 11, 2008

Hijackthis

Hijackthis

This is a useful tool to diagnosis a computer especially there is suspicious viruses or spyware in your computer. It can return a result showing that what is running on your computer and from the text file it created, we will able to determine which program is running on your computer. But, remember, do not delete any process which is used by windows. If not, your computer windows will be corrupted. Consult computer expert before you make any decision to delete that suspecius program.


Useful software

Useful Software
Video editing
1. Windows Movie maker
Useful for beginners till Advance.. the graphic user interface is user friendly and easy to work with video editing, enhancing video, adding wording into it and so on...

2. Adobe after effect
Useful for Intermediate to advance user. It have the ability to add some video effect using masking technique. It also can add extra sound or effect such as smoke, haze, or even power shooting effect. Try it out and you will like it.. Able to boost your creativity and editing skills..

3. Ulead video studio
Ulead video studio is a well known editing software. It has the ability to edit a full length video and also adding some effect into it. The rendering of software when you are done editing is good and can produce a high res video and also sound.


Sound editing
1. Adobe audition
Adobe audition is a software you can use for editing music sound. You can even produce your own music using it. It has the layer-type arrangement which can give you the power to record sound layer by layer (just like what those pro usually do in studio). Other than that, you can use to reduce noise, make the sound amplitude higher and many more. You also can use it to make sound for a video and merge it from adobe audition.

2. Sound forge
Sound forge has the power almost same as adobe audition. But it interface is slightly different. Sound forge also a powerful tool which let you edit your sound wav, mp3 and many more.

3. Gold wav
Gold wav slightly same as sound forge and adobe audition, but its functions not as good as sound forge and adobe audition. If you like to make your life simple and only do some simple wav editing, i recommend this.

Graphic editing
1. Adobe Photoshop
Adobe photoshop always use by pro to edit a photo or coloring. You are able to create a extra big photo from adobe photoshop and also a very dense resolution. This enable you to create a very nice photo. Other than that, it also can fix photo easily using the tools provided. If you are curious to add effect into your photo, this is the software.

2. Corel painter
Corel painter can be use to add color to your drawings easily. It is very useful for a artist to color their work nicely and digitally.

Thursday, July 10, 2008

The origins of Javascript (brief)

The origins of Javascript (brief)

JavaScript was originally named LiveScript. It was developed by Netscape. In 1995, LiveScript became a joint venture of Netscape and Sun Microsystems and then its name was changed to Java Script. A language standard for JavaScript was developed by the European Computer Manufacturers Association (ECMA) as ECMA-262 in late 1990s. International Standards Organization (ISO) has also approved this standard. Microsoft's JavaScript is named JScript. The popular browser which is Netscape 7 (NS7) and also Internet Explorer 6 (IE6) at that time both implement languages that conform to ECMA-262. JavaScript official name is called ECMAScript.

Wednesday, July 9, 2008

The Attrib function

The Attrib Function

In the Tutorial on how to kill a pendrive virus, i have found that some of us didn't really understand how the attrib function works. Now in this post, i will describe the use of attrib and shows some sample.

This is what a command prompt will show if we type in : attrib /?
Displays or changes file attributes.

ATTRIB [+R | -R] [+A | -A ] [+S | -S] [+H | -H] [drive:][path][filename]
[/S [/D]]

+ Sets an attribute.
- Clears an attribute.
R Read-only file attribute.
A Archive file attribute.
S System file attribute.
H Hidden file attribute.
[drive:][path][filename]
Specifies a file or files for attrib to process.
/S Processes matching files in the current folder
and all subfolders.
/D Processes folders as well.

Some examples:
1. attrib -s
This will remove the System file attribute on every file in that folder.
2. attrib -s /s
This will remove the System file attribute on each file under each folder or subfolder.
3. attrib +h
This will make all files become hidden as it add the hidden file attribute on each file.
4. attrib +h myprograme.exe
This will add the hidden file attribute on the myprograme.exe only.
5. attrib -s -h -r
This will remove all the System file attribute, Hidden file attribute, and also Read-only file attribute on each file.
6. attrib +s +h
This will add system file attribute and hidden file attribute to each file.

Tuesday, July 8, 2008

How to record an audio from computer without wire

How to convert a movie file type into a music file type

A couple days ago, one of my friend asking me how to convert a movie file to a mp3. Another friend answer: "if you want to convert from a .fla movie file to a .mpeg, or from some other movie format to another, it's possible. But it's not possible to convert a movie file to a music type file such as mp3, wma, wav, or else".. Actually, i have a way to convert it easily.. Here is it:





1. Open up your volume control from the corner of taskbar.
2. It will pop up a dialog box something like this.





3. Goto "options" -> "Properties" -> select "recording" radio button.
4. Press on ok button









5. Select checkbox either on the stereo mixer or mono mixer depend on your own choice.
6. Launch your recording program (eg. Sound Forge, Adobe Audition, Gold Wav or any recording software)
7. Start press record on your program.
8. While recording, start your video which you want to save only the sound of that video.
9. After finish recording, stop your recording from your recording program.
10. That's it.... It's not very hard..

Monday, July 7, 2008

What is TCP and UDP?

What is TCP and UDP?

TCP stands for Transmission Control Protocol. It is a type of method used by computer to send data from a computer to another computer. With this method, two computer can guarantee the data arrived safely and correctly. This type of transferring data tends to be quicker but puts a high load on the computer as it has to monitor the connection and the data going across.

UDP stands for User Datagram Protocol. The computer normally use this type of method to send data packages with hopes that other side will get the data. UDP does not connect directly to the receiving computer like TCP does, but rather sends the data out and relies on the devices in between the sending computer and receiving computer to get the data by itself. By using this type of transmission, it is not guarantee that the data will reach its destination. On the other hand, this method has a very low overhead and it is very useful for services that are not that important to work on.

Saturday, July 5, 2008

Convert ppt to jpeg

Convert ppt to graphic file
This tutorial will show you how easily you can convert your power point presentation file into a graphic file.

1. Create a power point file and press the 'save as' from the 'file' drop down menu.
2. Type in filename as you like and select the 'save as type' drop down menu and select the graphic file format you want to save. There are a few types of graphic format you can save into:
a) GIF (Graphics Interchange Format)
b) JPEG (File Interchange format)
c) PNG (Portable Network Graphics Format)
d) TIFF (Tag Image File Format)
e) Device Independent Bitmap
f) Windows metafile
and so on...

To connect to a mysql database from php

Connect to a mysql database from php
for beginners

//Define variable//
//starting by assigning the address of server, username, and also password
//"127.0.0.1" or "localhost" means that mysql database is installed on the machine where it will connected by php.
$servername = "127.0.0.1";

//the default username for mysql database server is "root".
$username = "root";

//the default password for mysql database is "".
$password = "";

// Declare connection //
//use mysql_connect to make a connection to the mysql server
$dbconnect = mysql_connect($servername,$username,$password);

//test if $dbconnect return successful connection.
if (!$dbconnect){
print "There are some error connecting to database";
}

//select the database which you want to use. Here, i'll illustrate database selection named mydatabase.
$select = mysql_select_db("mydatabase");

//test if $select for database return successful selection.
if (!$select){
print mysql_error()."
\n";
}

Another way is to create a function call "connectit()" which can be access anytime from any page. Remember to define the variable $servername, $username, and $password in order to use the connectit() function.

function connectit(){
//connect to mydatabase
global $servername, $username, $password;
$dbconnect = mysql_connect($servername, $username, $password);
if (!$dbconnect){
print "there are some problem connecting to database...";
}
$select = mysql_select_db("mydatabase");
if (!$select){
print mysql_error()."
\n";
}
return $dbconnect;
}

mysql_close() is adviseable to be used to close a connection at the last action after connected to mysql database. eg.
mysql_close($dbconnect);

Thursday, July 3, 2008

Simple tricks to free up your ram

Very Simple tricks to free up your ram..
by unload some startup programs


Sometimes, we feel that the computer starts getting slower, there are several possibilities. One of them is the computer is running too many programs. "I didn't run any program".. is normally people will answer. Why it happen? it is because you have installed lots of programs.. So how to solve that problem? Here are some simple steps...



1. First, open up run from start menu..
2. Type in 'msconfig' into the text box. (As shown in the picture on the right)





3. A dialog box will appear and there will be 7 tabs on it (general, system.ini, win.ini, boot.ini, services, startup, and tools.
4. Select the startup tabs.





5. Click on the 'Disable all' button below and click on apply.
6. Then, Click on ok.




7. A dialog box will popup (Something like the right picture), asking weathere you are going to restart now or later. Just click restart now and your computer will reboot.
8. This time, your startup program should be fewer, and along with this, you will have more extra memory to use for other programs. Your computer will then run faster..
9. After reboot, a dialog box name "System configuration Utility" will pop up and give you a notice about you've change your startup settings. Just click on "Don't show this message or launch the windows system configuration utility when widows start" and press ok.
10. That's it..

Wednesday, July 2, 2008

Wow, i saw another RSS/XML button

Yet another RSS/XML button

I think we all would first wondering what RSS can do? and should we use it?Here's some comment and information about RSS.

1. RSS is Really Simple Syndication.

2. RSS is a family of web feed. It helps us to collect data we want from a few certain web site.

3. We can organize our RSS with feed readers.

4. Some popular feed readers include :
a) Amphetadesk for Windows, Linux, Mac
b) FeedReader for Windows
c) NewsGator for Windows and integrates with Outlook

5. There are also web-based feed readers available for us:
a) My Yahoo
b) Bloglines
c) Google Reader

6. Why we should use it?
a) there are free feed readers available
b) easily stay informed with information we want to know
c) safe time from browsing through pages from a web site.
d) ensure your own privacy by protect a web to directly trace you as reader

Tuesday, July 1, 2008

Ways to process result set in php mysql

3 ways we can use to run a so-called 'mysql loop' to retrieve data from results in mysql database.

1. mysql_fetch_row()
2. mysql_fetch_assoc()
3. mysql_fetch_object()

Example:
1. mysql_fetch_row()

if (mysql_num_rows($result)>0){
while($row = mysql_fetch_row($result)){
echo $row[0]. "\n";
}

}


2. mysql_fetch_assoc()

if (mysql_num_rows($result)>0){
while($row = mysql_fetch_assoc($result)){
echo $row['item_name']."\n";
}
}


3. mysql_fetch_object()

if (mysql_num_rows($result)>0){
while($row = mysql_fetch_object($result)){
echo $row->itemName."\n";
}
}

Take a deep break, Delicious, Yummy..

Tea time at Chatz Brasserie - Parkroyal Kuala Lumpur hotel

Tire of doing programming stuff, lets have some tea time here... delicious buffet style...


Some Delicious Cake..

Colorful...

Sweet...
plus ice-cream

not forgetting..

and also

emmm... Yummy

Enough with pendrive /thumbdrive virus!!

Ten steps to say goodbye to Pendrive Virus!!

Most of us nowadays face with tons of viruses. One of them is a pendrive or thumbdrive virus. Pendrive or thumbdrive virus will not actually duplicate itself into your computer on the first time you plug in the usb port. It is the time you double click on the drive you see on your 'my computer'. I normally will delete that virus myself because a antivirus are not 100% guarantee will help you remove that virus. Things to be do when you plug in a usb pendrive.


1. Goto 'start' and then 'run'.
2. Type in cmd in the box and click run.




3. Type in: cd\
4. Type in the drive name with (:) then press enter eg. f:
(You will see something like the picture on the right hand side.)


5. Type in attrib ( to see if any hidden or hidden system file).
* pendrive virus normally come with the autorun.inf and also the virus installer itself. The attribute of both file will be hidden or hidden system so that you cannot see it when open from 'my computer'.
6. Check for the word ' S H ' or 'S H R' in front. * that will probably is the virus file.

7. Unhide it with this command: attrib -s -h -r *.* (then enter)
8. Delete the virus file with its name such as: del *.inf
* it is to delete the autorun.inf which will launch the virus something.exe to install quietly when you double click the drive from "my computer".

9. If you are very sure about the virus name, just type in this command: del something.exe (then enter).
* it will delete the virus name something.exe.
10. Be sure to eject your pendrive and reconnect it again before you open your files on that pendrive.