• Raspberry PI Boom! What a useful tiny useful computer.

  • Enter Slide 2 Title Here

  • Enter Slide 3 Title Here

Thursday, August 21, 2008

My wireless problem

Wireless network problem
possible causes:
1. Network adapter not install probably
2. Network adapter not installed with correct wireless driver
3. Installed wireless network software crash with windows Wireless network software.
4. Incorrect IP and gateway
5. The firewall settings

Solve it: Cause no. 1:
1. if you are using personal computer (PC) then press down your network adapter or unplug and replug it again.
2. Check if your computer detects the network card and it will prompt up saying some new hardware was found.
3. Install with correct driver (Usually on CD given when you buy your computer).

Cause no. 2:
1. Try install another driver, computer will detect which driver is the best for your network card.
2. If installed correctly, you will see your wireless network icon on the network connections in control panel.
Cause no. 3:
1. Uninstall your network software and use only the windows given wireless software to configure which wireless to connected, ip settings and many more.
2. If you find a dialog box like below, that means that you are using windows wireless software to connect to a wireless network.

Cause no. 4:
1. always check your internet protocol (IP) by double click on your wireless network adapter on the right down corner where you will see this icon.2. a dialog box such as below will pop up. Click on the support Tab.3. The default ip for wireless will be and make sure your ip is other than with something like 192.168.1.x where x is number starts from 2 to 254. For example

cause no. 5:
1. Check for firewall settings. If you have on your firewall setting, just switch it off for a few seconds to try if your computer can be connected to the wireless network or not.
2. For windows user, disable your firewall from Control panel, Windows firewall. Select off then press ok.
3. Try connect to the wireless network again, and it should work.

What should i do when my computer hangs?

Oh no, my computer hangs again

Calm down, there are several methods you can do to solve this problem.

1. pressing ctrl+alt+del to end task (Free up memory) - from task manager
a. Click on the processes tab on the top..
b. What program should i end task?
-Any image name run under your User Name (Example here is Administrator) can be terminated. (The more you terminate, the memory you free up- so it can run more faster and prevent hang)
*Caution: PLEASE DON'T END PROCESS FOR EXPLORER.EXE (it is the skin of your windows, if you're sure how to load it again then only you can end it and reload it from the file menu)

2. press restart button/ shutdown button on your computer
a. press the restart button once to restart your computer
b. or Press the power button about 3 seconds to shut down your computer.
-let it cool down first (about 3 seconds) and then only power up again your computer to use.

How to go to safe mood in my computer?

How to go to safe mood?

Safe mood is an alternative way to boot in Windows. Safe mood usually use to change some system settings because of a software crash or failure. Here are some ways we can boot to safe mood easily.

1. Pressing F8 key when computer boots
a. keep pressing F8 key on your keyboard when the computer boots, or in black screen before Windows loads.

2. Set some settings from msconfig
a. type in msconfig into the run dialog box from start menu.
b. A dialog box as below will then show up. Select The BOOT.INI tab
c. Select /SAFEBOOT and you can either select minimal boot (which is only load the minimal programe) , network (if you want to connect with LAN) or else.
d. After click Apply, a dialog box as below will pop up asking whether you want to restart now. if you want to restart in safe mood now, then click restart now. Else, just click exit without restart.
e. after restart, you'll see that it automatically directs you to safe mood.

Google Ad-sense

Google AdSense

Do you want to get some reputation for writing blog or earning some money from what you write? Sign up for Google AdSense and you can get lots of benefits. Traffic your blog or website and get payment from the advertisement by Google AdSense.

Wednesday, August 20, 2008

Scripting registry changes - technique

5 Types of technique in scripting registry change
A brief Description

1. INF
a. Also known as Setup Information files
b. With the .inf extension
c. Able to add, change, and delete registry values
d. difficulty level for INF is medium
e. It is easy to install, just right click on it and select install
f. example of INF file


HKLM, Software\Microsoft\Windows\CurrentVersion\Run,,,"myprogram"

HKCU, Software\Microsoft\Windows\CurrentVersion\Run

2. REG
a. has the .reg extension
b. it is the easiest way to add, modify, or delete registry
c. example
Windows Registry Editor Version 5.00

"avgnt"="\"C:\\Program Files\\Avira\\AntiVir PersonalEdition Classic\\avgnt.exe\" /min"
"Acrobat Assistant 8.0"="\"C:\\Program Files\\Adobe\\Acrobat 8.0\\Acrobat\\Acrotray.exe\""
"Zone Labs Client"="C:\\Program Files\\Zone Labs\\ZoneAlarm\\zlclient.exe"
"chkpendrive"="c:\\chkpendrive\\chkpendrive.exe c:\\chkpendrive\\chk.txt"
"LanSpeed2"="C:\\Program Files\\LanSpeed2\\LanSpeed2.exe"





3. Batch
a. has the extension of .bat
b. Example
@echo off
Reg delete %HKCV%\Explorer\MenuOrder /f

4. Script
a. You can either use VBscript or JScript to change(Windows support both)
b. example (VBScript)
Set WshShell = WScript.CreateObject("WScript.Shell")

WshShell.RegWrite "HKCU\Software\testing\",1,"REG_BINARY"
c. Example (JScript) * Case sensitive
var WshShell = WScript.CreateObject("WScript.Shell");


5. MSI
a. MSI stands for Windows Installer Packages.
b. This is just like normal installer such as Microsoft Office and so on.
c. Needs to be compile only can be used.
d. Needs more higher level scripting and programming skills

Automate Check for pendrive suspicious virus files

Automate Check for Pendrive suspicious Virus Files

.ahk Code:

1. This is a text file reside on drive C:\chkpendrive\chk.txt
2. Install autohotkey and select load this script from c:\chkpendrive\chk.txt
3. Also create a file called drivelist.txt in c:\chkpendrive folder
inside the drivelist.txt, type in

4. This means that it will check for drive c, d, e, f and g for suspicious virus file which is autorun.inf
5. If found, it will automatically unhide that autorun.inf file and also disable its function
6. autorun.inf is a dangerous file where it will load another virus file such as virus.exe, virus.bat or something like this to automatically install it without you noticing it.
7. Ensure you always eject pendrive if there is a popup saying autorun.inf is found.
8. Then only plugg in again. And now you can open your pendrive without any worry anymore.

Safety password in PHP - crypt() or md5

Safety password in PHP
using crypt() or md5

php code:

Authenticating users with IP Address - PHP

Authenticating users with IP address - PHP

PHP Code:
$accepted_ip = array ("127","0","0","1");
$remote = explode(".",$remote_addr);
//set $match to true
$match = 1;
//check if there is unmatched ip
for($i = 0; $i < sizeof($accept); $i++){
if ($remote[$i] != $accept[$i]){
//if not match, set $match to false
$match = 0;
//if $match true, then allow access, else denied access.
if($match) {
echo "Access Success!";
echo "Access Denied!";

1. $remote_addr - the remote IP address of client computer. IP address with means that that client computer is the same computer used as server computer which provide PHP services.
2. the ip address is located to an array to test whether it is same as the ip address stated there. eg. $accepted_ip

Tuesday, August 19, 2008

Cameron Highlands

Cameron Highlands

Cameron Highlands Tea farm

The famous Steamboat in Cameron Highlands ("Fantastic Steamboat")

Rose Garden - Red rose

Rose Garden - Yellow Roses

Best Of Highlands (BOH) Teafarm

Windows Special folders - registry

Windows special folders
(Location of special folders)

AppData - %USERPROFILE%\Application Data
Cache - %USERPROFILE%\Local Settings\Temporary Internet Files
Cookies - %USERPROFILE%\Cookies
Desktop - %USERPROFILE%\Desktop
Favorites - %USERPROFILE%\Favorites
History - %USERPROFILE%\Local Settings\History
Local AppData - %USERPROFILE%\Local Settings\Application Data
Local Settings - %USERPROFILE%\Local Settings
My Pictures - %USERPROFILE%\My Documents\My Pictures
NetHood - %USERPROFILE%\NetHood
Personal - %USERPROFILE%\My Documents
PrintHood - %USERPROFILE%\PrintHood
Programs - %USERPROFILE%\Start Menu\Programs
Recent - %USERPROFILE%\Recent
Start Menu - %USERPROFILE%\Start Menu
Startup - %USERPROFILE%\Start Menu\Programs\Startup
Templates - %USERPROFILE%\Templates

Registry hack - Using Regedit (a brief description)

Registry Hack using
Registry Editor
a brief description

What is registry?
1. it is a hierarchical database which describe the central repository for configuration data. It is just a big collection of settings of your windows.

What is Registry Editor?
1. Registry editor is a tool you can use to edit the registry directly.

Why Registry Editor?
1. it is powerful and simple program with a straightforward user interface.
2. simple menu
3. able to modify a key, create a key or even delete a key
4. easy to search through all keys
5. favorite keys can be bookmarked

How does registry editor look like?

Network troubleshooting tools

Network Troubleshooting tools
Brief description

Digital volt-meter (DVM)
- Test for existence of a break or a short in cable.
- Operates at the physical layer of OSI Reference Model.
- image (http://www.electronicsnmore.com/images/dvm9912.gif)

Time-domain reflectometer (TDR)
- Determine a break or short occourred within cable with sonar-like pulse.
- Operates at physical layer of OSI Reference Model.
- image (http://www.pantongt.com/TDR44.jpg)

Cable tester
- Examine a cable whether it meets performance standards for its type.
- Also test for impedance and other variables.
- Advance tester will have data link layer data-collection capabilities.
- image (http://www.vpi.us/vpi/images/items/tester-cable.jpg)

Protocol analyzer
- Hardware or software which can monitor network traffic, find faulty network components and also analyze the overall network performance.
- Operates at many layers of OSI model.
- image (http://www.colasoft.com/products/capsa/screenshot.gif)

Network monitor
- Software which monitor the network performance and gather statics.
- Operates from data link layer up through top of OSI model
- image (http://www.mikrotik.com/img/dude3.jpg)

Operating system tools
- Example : Windows NT Diagnostics tool.
- image (http://www.microsoft.com/library/media/1033/technet/images/archive/ntwrkstn/maintain/operate/hardwa04_big.gif)

Sunday, August 17, 2008

A basic Select statement with mysql and php

A basic select statement with mysql and php

//// means < \\\\ means >

//define $result - what to select
$result = "select * from table_name";

//connect to database
mysql_connect("username","password","") or die ("could not connect to database.");
mysql_select_db("test") or die("error selecting db");
$result = mysql_query($query) or die (mysql_error());

//count number of result colums
$number_colums = mysql_num_fields($result);

//draw table
echo "////table\\\\";
echo "////tr\\\\";

//generate header column using loops
for ($i=0; $i<$number_colums; $i++)
echo "////td\\\\".mysql_field_name($result, $i)."/////td\\\\";
echo "/////tr\\\\";

//generate results table body
while ($row = mysql_fetch_row($result))
echo "////tr\\\\";
for ($i=0; $i<$number_colums; $i++)
echo "////td\\\\";

//test if have null value then generate null words
if (!isset($row[$i])){
echo "null";
echo $row[$i];
echo "/////td\\\\";
echo "/////tr\\\\";
echo "/////table\\\\";

MySql insert, update, AND delete

MySql Insert, Update, and Delete

Insert statement
insert into tableName (column1, column2...) values (value1, value2 ...)
insert into tableName (id, name) values (null, 'John')
* The null can be use in the column which is auto_increment so that the database will auto assign new id for the next data.

Update statement
update tableName set column1=value1, column1=value2 where column=idvalue
update tableName set name='johnson' where id=5
*From here, it will change the name of data id number 5 to 'johnson'

Delete statement
delete from tableName where column=idvalue
delete from tableName where id=5
*It will delete the row for id number 5

Wednesday, August 6, 2008

The OSI Reference Model - Networking

The OSI Reference Model
The OSI model is also called ISO OSI (Open System Interconnection) reference model. It is because it deals with connecting open systems which is systems that are open for communication with other systems.

The principle of OSI reference Model
1. A layer should be created where different level of abstraction is needed.
2. Each layer should perform their own defined function.
3. The function of each layer should be chosen and defined by internationally standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow across the interfaces.
5. The number of layers should be large enough and the same layer should not have the same function.

The seven layer of OSI model

Tuesday, August 5, 2008

scour.com - the search engine


Why choose Scour?
1. it's a search engine
2. it can be as powerful as Google
3. it holds the most appropriate result by selecting from people's comments and rating.
4. it can search through few famous search engine like Google, Yahoo, Msn, and Scour itself.
5. it's free
6. you can even get points from each search you perform
7. points are accumulate and can use to redeem visa gift card to use as cash.
8. just get points as easy as using its search engine, give rating on each result and also comments.

Join Now!! it's free and easy to get points with each search