feedburner
Enter your email address:

Delivered by FeedBurner

feedburner count
Showing posts with label Education. Show all posts
Showing posts with label Education. Show all posts

tcpdump

Labels: , , , ,

http://en.wikipedia.org/wiki/Tcpdump





Steve Jobs facts

Labels: , , , , ,



Via



Windows 7: The Definitive Guide: The Essential Resource for Professionals and Power Users

Labels: , , ,



This book provides everything you need to manage and maintain Windows 7. You’ll learn all of the features and enhancements in complete detail, along with specifics for configuring the operating system to put you in full control. Bestselling author and Windows expert William Stanek doesn’t just show you the steps you need to follow, he also tells you how features work, why they work, and how you can customize them to meet your needs. Learn how to squeeze every bit of power out of Windows 7 to take full advantage of its features and programs.

Set up, customize, and tune Windows 7 : Optimize its appearance and performance, install and manage software, customize your hardware, and install printers, scanners, and faxes
Manage your files and data : Search your computer more efficiently, secure your data, share and collaborate, and get the most out of optional programs such as Windows Live Mail
Master your digital media : Create media libraries, manage digital pictures and videos, make DVDs, and create movies
Get connected and start networking : Set up a home or small-office network, conquer Internet Explorer, and master on-the-go networking
Protect your computer : Keep your family safe while on the Internet, navigate the computer security maze, and configure Windows 7’s protection features
Manage and support Windows 7 systems : Configure user accounts, disks and drives, troubleshoot and handle routine maintenance, and resolve advanced support and recovery issues
Learn advanced tips & techniques : Manage the Windows boot environment, explore Group Policy, and much more.

Download E-book Here
Via





Asia Bloggers Festival

Labels: , , , ,



I have visited Ko Nyi Lynn Seck's blog today. He has posted a new post regarding Asia Bloggers Festival.I also visited to the site that he linked to get more information.Thanks for the information Ko Nyi Lynn Seck.This is a good chance for bloggers who wants to learn new things. I really would like to join. But it will be better if I have a blogger friend who wants to join that festival. I don't want to go there alone. I have to ask some of my blogger friends who lives in bangkok.Here is the information mentioned at http://www.blogfest.asia/. You could easily register there if you would like to join the festival.



Blogfest.asia is a festival for bloggers in Asia. This is the region’s 1st cross-border gathering for blogger community. Everyone is welcome to join the festival and meet hundreds of bloggers from the neighborhood community — Australia, China, Hong Kong, Iran, Korea, Japan, Malaysia, Mongolia, Singapore, Taiwan, Thailand, Vietnam, etc.

The 3-day brainstorming and networking meet-up provides an unique opportunity to address “Change & Responsibility”, in Asia perspective. Check out the latest program and register now!

The event program at-a-glance will consist of:

* one full-day conference (11/6)
* two evening gathering / parties exclusively for participating bloggers
(11/5 & 6 evening)
* 2009 Hong Kong Blogger Con (11/7)
* Educational workshops for NGOs in Asia (11/8)

Blogfest.asia will support and work closely with associated blogger community and events in the region. It will also serve as an idea hub, community exchange point, and action camp for bloggers in Asia to make technological and social impact for the benefit of the region.

Via



Bing vs Google

Labels: , ,



You may would like to use google and new search engine from Microsoft which is bing.You could use them in a page here. http://www.bing-vs-google.com/ According to some news, Microsoft will work together with Yahoo. They both has to fight with google which is the best search engine of this IT era.








how to check firefox version

Labels: , , ,

You may want to know how to check your firefox browser version. It is not that difficult.Browse your browser, go to Help > About Mozilla Firefox , then it will show you the version of it as shown.By the way, do not download the latest version of firefox 3.5.2 which is so suck. I don't know why. Some people got similar problem like me. I just remind you in case if you want to use latest versioin. Just remember that it is so suck! :-)






RapidTyping Version 2.9.5

Labels: , ,




DOWNLOAD HERE

Source : http://mistake51area.ning.com/



Understanding DDoS attack

Labels: , , ,

As you may notice on famous social networking sites, Facebook and Twitter were down around 3 hours due to a group of hackers attacked. It happened last Thursday as I remembered. As a result, millions of users around the world could not use those sites.

Hackers attacked them by using DoS. DoS stands for "Denial-of-Service" which hackers use a program called Botnets that controls several users and commands them to attack the sites.



What I understand is that Botnets controls several users and try to send packets to the relevant sites that they attempt to attack. What happened is that the dedicated servers which were hosted by sites that got hanged and could not work properly. Social network owners suspect that those hackers are from Russia. I guess there may have some sort of political affairs related to that attack. Anyway, we should prevent our PCs or notebooks not to be controlled by Botnets. We can check Botnet installed at your PC or not by using Trend Micro RUBotted program which is a Beta version. You can down it from here. [link]





After you have checked, if there is Botnet, it will answer "No Bots Found". If it is answer "Bot Found", you need to remove it. Bots are some sort of PC worms. Millions of PCs has been affected by it around the world. You could remove it by using antivirus program. Good luck friends !

Photo : Google



How to Fix "Google Error We're sorry"

Labels: , , , ,

When I tried to browse my blog after I came back from dinner, I saw the following page showing

We’re Sorry…
… but your query looks similar to to automated requests from a computer virus or spyware application. To protect our users, we can’t process your request right now.

We’ll restore your access as quickly as possible, so try again soon. In the meantime, if you suspect that your computer or network has been infected, you might want to run a virus checker or spyware remover to make sure that your systems are free of viruses and other spurious software.

We apologize for the inconvenience, and hope we’ll see you again on Google.



During that time I could browse all google services except blogspot addresses.I tried to find out the solution via the net but I could not.I could browse my blog by using proxy.Luckily I got the following page to contact google.

http://www.google.com/support/websearch/bin/request.py?contact_type=ban




According to some forum, my IP address has been banned by google for a while. Some said one day (24 hours).Luckily I found that page and filled the form. Then submitted to google. It could recover immediately after a few hours.( I can't remember exactly. Around 1 hour I guess).Use this page to check your IP address.[link] Actually the procedure was written in this blog.[link] I could not browse it since google has been banned me.I could read it later after my problem has solved. I share about this if you got similar problem, you could solve it by using several ways. Good luck !!



Diary 27th July 2009

Labels: , , , , , , , ,


I took some photos during last week. I love most of them. But I'm not satisfied with my photo taking skill. I need to learn more and more. I have learnt some lessons last week.I found out that moving objects are difficult to get the right focus. I'm glad that I got some experiences. Actually I would like to participate in Thai International Photo Contest 2009.[Link] But I'm a bit late for this year. I will try to participate in next coming year. I'm glad that there are some users who visit to my blog very often. I would like to say thanks to those who often visit to my blog.I promise that I will try to post valuable posts as much as I could. My mid-term exam is coming. Wish me best of luck for the exam.I will post my new posts after my mid-term exam. Currently you could go and visit my uploaded new photos on my flickr and enjoy viewing my photos on flickr.

http://www.flickr.com/photos/mmboyz/





Father, Son and One Sparrow

Labels: , , ,


What is that? (Τι είναι αυτό;) 2007 from MovieTeller on Vimeo.



Photo Credit : [link]



About the Use of Dot-Slash in Commands

Labels: , ,


The combination of a dot followed directly by a forward slash (./) is often used to precede commands in Linux and other Unix-like operating systems. Although this requirement can seem confusing and even tedious to new users, it exists for good reason and can be useful to understand.

Commands in Unix-like operating systems are either built-ins or executables. The former (e.g., alias, cd, echo, kill, ls and pwd) are part of the shell that is currently running, and thus the shell can always locate them. In contrast, the shell needs help in finding the latter, which can be divided into compiled programs and shell scripts. A compiled program is a program whose source code (i.e., its original, human-readable form) has been converted through the use of a compiler into an executable file (i.e., a ready-to-run form).

A shell is a program that provides the traditional, text-only user interface for Unix-like operating systems. Its primary function is to read commands that are typed in at the command line (i.e., in a text-only mode) and then execute (i.e., run) them. A shell script is a short program that is written in a shell programming language and interpreted (i.e., converted into runnable form) by a shell process.

When some text is typed into a shell and then the ENTER key is pressed, the shell assumes that it is a command. The shell immediately checks to see if the first string (i.e., sequence of characters) in that text is a built-in command or the absolute path (i.e., location relative to the root directory) to an executable.



If it is neither of these, the shell will search the directories listed in that users' PATH environmental variable for a file with that name. PATH (all upper case letters) tells the shell which directories to search for commands in response to commands issued by the user.

If the command is found, it will be executed, assuming that there are no other problems. If it is not found, an error message, such as command not found, will be returned.

Most users work most of the time in their home directory and subdirectories thereof because of convenience and for safety reasons. However, by default such directories are not included in the user's PATH variable. Thus when the user creates a script or compiles a program in one of those directories and attempts to run it by merely typing in its name, an error message will be returned.

However, this problem can be easily overcome by typing a dot and slash in front of the command name. This is merely an abbreviated way to inform the shell that the absolute path of that file is the current directory (i.e., the directory in which the user is currently working). In Unix-like operating systems, a single dot is used to represent the current directory in a path (i.e., the location of a file or directory in the filesystem), including those used in commands. Likewise, forward slashes are used to separate directories and files in paths.



Files in the current directory can be accessed for reading and writing by merely entering the command name (e.g., cat or vi) followed by the name of the file. That is, no absolute path is necessary. However, when execution is desired, either an absolute path (or its dot slash equivalent) or the inclusion of the directory containing the command's executable file in the PATH variable is necessary. This is a built-in safety mechanism.

A user could eliminate the need to precede commands by a dot slash by appending a single dot to the PATH variable, because this would tell the shell to also search the current directory. However, this is generally not advisable on safety and security grounds. For example, were the user to inadvertently create a shell script with the same name as a standard command, the shell could execute the former instead of the latter, thereby causing the system to malfunction, or worse.1

A better alternative if one wants to eliminate the need to precede commands by a dot slash is to create a special directory for the executable files of such commands, and then add this directory to the PATH variable. For example, a user named bob could create a directory named bin in his home directory (i.e., /home/bob/bin/) for this purpose.

Another approach for making it easy to run a program that is installed in a non-standard directory is to create a symbolic link to it (using the ln command with its -s option), and then put the link in a directory that is already in the PATH variable. This can be a safer alternative to adding more directories to PATH.

The command "." [dot] means "run a command script in the current shell"


via



ping.php

Labels: , ,



Meta tags are generally used to include information about a document such as author name, creation date, copyright information etc. They always placed between the tags of an HTML document.
Each Meta tag has two important attributes:

1) HTTP-EQUIV or NAME and
2)CONTENT

The HTTP-EQUIV attribute takes one of the values mentioned below:

1)CONTENT-TYPE: The most commonly used content type is text/html. Other types can be employed to include the character set for the document. This helps the browser to load the appropriate character before document display.

2)EXPIRES: Specifies the date and time after which a document should be considered expired. This can be used by web robots update content in a search engine.

3)CACHE-CONTROL: Determines the caching of the document.

4)CONTENT-LANGUAGE: Used to specify the language in which the document is written.

5)REFRESH: This value is commonly used to either redirect users to a different page or refresh the contents of the present page.

The HTTP-EQUIV attribute is used in place of the NAME attribute to indicate that the property should be treated as an HTTP header.


The above code tells the browser to load http://www.nyinyimyanmar.co.cc/ 10 seconds after the current document has finished loading. Not all browsers support this, so authors should provide an alternate means of moving to the new page where necessary. The Refresh header is sometimes used for "splash screens" or when a page has moved, but the technique is not very effective since users may not even be looking at the window that is to be refreshed. Some search engines penalize pages that use a Refresh of a few seconds or less.Suppose www.livescore.com I'm sure that page has to refresh automatically whenever the score is updated



What is Perl script?

Labels: , ,

Ans : Script written in Perl language. Perl means Practical Extraction and Report Language and is optimized for data processing.



Telnet vs SSH

Labels: , ,

ssh stands for Secure Shell and telnet is only kept around for old network appliances and routers.ssh has compression so over slow links it better than telnet.ssh allows tunneling of X, again compressed, which makes remote X faster and secure.Also nautilus supports ssh as a remote transport which makes for a very useful option for remote file browsing.Telnet is insecure.Both Telnet and SSH were almost similar protocols.Telnet transmitted all information as plain text, including sensitive information like passwords etc.SSH uses a very strong cryptography mechanism to shield the connection from possible hijackers and eavesdroppers.



Guitar For Dummies, 2nd Edition

Labels: , ,

Today I found one useful e book.Guitar For Dummies. This is just 2nd edition.If you could play the guitar, it may be useful for you.



DOWNLOAD HERE



How to Twitter

Labels: , ,



Go to this link to see the good looking design.[ link ]

I want to share a nice blog with my friends.http://blog.iqmatrix.com
You could read How to Twitter : A Beginner's Guide & Mind Map article there.
I have downloaded the Law of Belief | Mind Map from there.Here is the download link.[link]. They don't allow the users to download free for some e books. We must purchase them.Anyway, this is a nice blog.



How To Teach So Students Remember

Labels: , ,


This e book may be useful especially for teachers.When you teach a lesson, do your students remember the information the next day or the next week? Will they retain that information long enough to use it on a high-stakes test and, most importantly, will they retain it well enough to make use of it in their lives beyond school? How to Teach So Students Remember offers seven steps to increase your students capacity to receive information in immediate memory, act on it in working memory, store it in long-term memory, and retrieve and manipulate it in unanticipated situations, to use what they have learned when they need it.

Step by step, you will discover

1)how to reach your students and get them to attend to incoming information;

2)how to encourage reflection to better enable students to make connections to prior knowledge;

3)how to help students recode new concepts in their own words to clarify their understanding;

4)how to use feedback to provide a framework for learning and show the brain what s important to remember;

5)how to incorporate multiple rehearsal strategies that provide multiple avenues to stored material;

6)how to structure review processes so students retain information beyond the test; and

7)how to align instruction, review, and assessment to help students more easily retrieve information.

DOWNLOAD HERE



Google Docs for Everyone

Labels: , ,



DOWNLOAD HERE




Blog Templates for Bloggers

Labels: ,


I have already created Blogger Templates Blog.[Link]. All templates are free templates and free to use everywhere. Enjoy using them.


http://blogspot-blogtemplates.blogspot.com/