tag:blogger.com,1999:blog-46401673955368735762024-03-13T11:17:49.895-07:00adam's bitefreeware, mobile, circuit, iPhod, iPhone, PC, Laptop, tip and tricks and article reviewadamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.comBlogger116125tag:blogger.com,1999:blog-4640167395536873576.post-26983561199666886562009-07-19T10:54:00.000-07:002009-07-19T10:56:27.929-07:00How to Install ISO/CSO Games in PSP 3000 or PSP 2000 Latest MotherboardNow, a lot of people have emailed or contacted me on this when it comes to PSP 3000. So, as for beginners I will teach you guys the way to install it. The advance PSP 3000 users doesn't need to read this....<br /><br />Ok, usually installing ISO/CSO Games if the PSP 3000 has already the CFW Loader Installed or the 5.03 CFW GEN-A Installed in the unit. If the they are not installed, the PSP Unit will not be able to identify or find it in the PSP 3000 Memory Stick (GAMES>MEMORY STICK). Click here for CFW Enabler Guide. Or Click Here for GEN-A CFW Loader Guide<br /><br />*Note: I advise you guys to buy the games first before creating an ISO backed up games. Let's also support the developers for this.<br /><br /><br /><br /><br />1) Now if you have an ISO game in your PC, connect your PSP 3000 to PC first.<br /><br />2) Your computer should detect your PSP Memory Stick and automatically open the Memory Stick Drive. If it doesn't you can go to "My Computer" and open your Memory Stick Drive(removable disk "example F:").<br /><br />3) Once you are inside, you should see lots of folders; PSP, PICTURES, VIDEO, MUSIC, etc.<br /><br />4) If you don't see any folder named "ISO" from what you are seeing now, then that means you have to create one. the example should be like this: "F:\ISO\"<br /><br />5) Now, lets say you have Monster Hunter Freedom Unite ISO with you. All you have to do is copy "MHFU.iso"and paste it into "F:\ISO\". The example should be like this: "F:\ISO\MHFU.iso"<br /><br />6) Now after that, just disconnect your PSP and go to GAMES>MEMORY STICK>Monster Hunter Freedom Unite. That's it!! :)<br /><br />*Note: Make sure that you have 5.03 ChickHEN R2 running in your PSP 3000 along with the CFW LOADER. To make this work.<br /><br />Now others may ask or search<br /><br />Q: How do you uninstall the program ChickHEN R2 and the CFW Enabler or GEN-A LOADER?<br /><br />A: Simple, just shutdown the psp unit completely. As in HOLD Turn Off long enough to make it shutdown. After that, switch the PSP Unit back on and the version of the PSP Unit should go back to Official Firmware 5.03.<br /><br />Q: I've seen some people manage to install a Customed Theme to PSP 3000, how can i install that one?<br /><br />A: You can if you want, but my suggestion to you guys is NOT TO INSTALL them. There is a chance to brick your PSP 3000.<br /><br />SOurce : http://mpsp.blogspot.comadamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com4tag:blogger.com,1999:blog-4640167395536873576.post-89148971035475062962009-04-10T08:27:00.000-07:002009-04-10T08:34:54.261-07:00How to crack a computer passwordPassword Cracking Goals, Techniques and Relative Merits and Cracking Times of Different Techniques<br /><br />Password crackers are primarily after (root or administrative account passwords) when they crack passwords. Their tools are password cracking programs that use password dictionaries. The feature lists of common password cracking programs or tools are discussed. Also listed are the suggested standard dictionary transformations for Crack, the best known tool for cracking passwords. How long it takes to crack passwords and the primary factors affecting password cracking times are covered. Why password dictionary attacks dramatically lower brute force password cracking times is discussed.<br /><br />•Goals of the Cracker<br />•Password Cracking Programs’ Feature List<br />•Password Cracking Program Examples<br />•How Long Does It Take to Crack Passwords?<br />•Table of Times to Crack Passwords<br />•Brute Force, Dictionary Comparison<br />Goals of the Cracker<br />The goal of the cracker is to obtain the root account password on UNIX systems and administrator accounts on Windows NT and 2000 systems. With some UNIX security setups, the passwords for users in the wheel, security, or root group may have significant value. Since the cracker presumably already has some degree of access to the target machine (cracking can only be performed when the attacker already possess the password hashes), it’s not likely that unprivileged accounts will be of much value to the intruder but the techniques for obtaining passwords are the same regardless of the target account.<br /><br />The intruder is likely to need only one password for an account with suitable privileges. Additional accounts may be of some value in preserving access but not likely to make much practical difference in obtaining access to the system at the desired privilege level.<br /><br />The cracking times table shows that with the computing power currently available and for the next several years, eight character passwords (the traditional length limit on UNIX systems) can be chosen that will not be cracked by brute force techniques but still most passwords are poorly chosen and fit some predictable characteristics.<br /><br />Since brute force is not likely to identify any but the weakest passwords, the intruder’s best chance is to identify techniques that are computationally efficient compared to brute force techniques and have a reasonable chance of cracking some of the passwords in the collection of accounts and password hashes in their possession. By applying what is known about how users select passwords, an intruder can tremendously increase the odds in their favor of finding passwords. With the right techniques, some poor passwords can be cracked in under a second.<br />Cracking Tool’s Feature List<br /><br />The fundamental flaw in the password system is the tendency of most people to select names and words that can be found in dictionaries as their passwords. Often such names or words are modified by applying predictable changes to them. This may be in response to system requirements to vary the kinds of characters included in a password.<br /><br />The alternative to brute force is a dictionary attack. At its simplest this means treating each word in a dictionary (electronic list) as a password and encrypting it and then comparing the resulting hashes to the hashes in the password file being cracked. If the hashes match, the password is known. It’s imperative to understand that this is only the most rudimentary form of dictionary attack and that the real power of dictionary attacks come from understanding the ways in which most people vary names and dictionary words when attempting to create a password. By applying all the common transformations to every word in the electronic list and encrypting each result the number tested passwords multiplies rapidly. Every “clever” way of manipulating words to hide their origin is know to the cracking tools.<br /><br />To understand what make weak and strong passwords, it’s necessary to understand what cracking tools can and can’t do. L0phtCrack is the leading Windows cracking tool. The easy to use L0phtCrack with its GUI interface is rather limited compared to Crack 5 and John the Ripper in its dictionary transformation capabilities. L0phtCrack can append a user specified number of characters to the end of the dictionary words. It works through the entire character set and appends every combination to each dictionary word; this includes all the letter sequences as well as digits and symbols. L0phtCrack takes less than a second to process the default dictionary of nearly 30,000 words and about a minute and a half to process two additional characters in conjunction with the 30,000 word list (on a PIII 500).<br /><br />Both Crack 5 and John the Ripper allow the user to define rule sets that control the transformations that are applied to the input dictionaries (word lists). Below are most of the transformations that John the Ripper can perform. Crack has the same capabilities.<br /><br />* Append or prepend defined characters to a word.<br />* Reverse a word.<br />* Duplicate a word.<br />* Mirror a word, i.e. append the reversed word.<br />* Rotate a word either left or right, i.e. move the first letter to the end or the last letter to the front.<br />* Upper case a word.<br />* Lower case a word.<br />* Make only the first letter a capital.<br />* Male all but the first letter a capital.<br />* Toggle the case of all characters.<br />* Toggle the case of a character at a set position.<br />* Minumum and maximum word lengths can be set or long words can be truncated at a set length.<br />* Suffixes (s, ed, ing) may be added to words.<br />* First, last or any specific character may be deleted.<br />* Characters can be replaced at a set location.<br />* Characters can be inserted at a set location.<br />* “Shift” the case, i.e. substitute the other character on the same key, e.g. ‘a’ and ‘A’ or ‘5′ and ‘%’.<br />* Shift the characters left or right by keyboard position (so an ’s’ becomes an ‘a’ or ‘d’).<br />* Replace all of one character with another.<br />* Replace all characters of a class (for example vowels, letters, non letters, digits) with a specific character.<br />* Remove all occurrences of any character from a word.<br />* Remove all characters of a class from a word.<br />* Reject a word if it contains or doesn’t contain a character, or characters from a class.<br />* Reject a word if the first, last or set character is or is not a specific character or from a class.<br />* Reject a word unless it contains at least so many of a character or characters from a class. <br /><br />In the forgoing a class might be any of the following: a letter, a vowel, a consonant, an upper case letter, a lower case letter, a digit, a symbol or punctuation, a non letter (digits, symbols and punctuation), alphanumeric or one of several others. The length limits and reject options don’t increase the possibilities but allow the cracker to skip “words” where a particular type of transformation may not make much sense; this should improve the cracking tool efficiency.<br />Cracking Tool Examples<br /><br />The words that the transformations operate on can be either from a standard dictionary (word list, one per line) or from the user name and words (or names) extracted from the /etc/passwd GECOS field. Crack appears to be limited to words from dictionaries. Rules can be combined to perform multiple transformations on the words. Below is the list of actual transformations suggested in the Crack 5 documentation:<br /><br />* Lower case pure alpha words.<br />* Lower case and pluralize alpha words.<br />* Append digits and punctuation to all pure alpha words.<br />* Lower case and reverse pure alpha words.<br />* Lower case and mirror pure alpha words.<br />* Capitalize all alphanumeric words, i.e. first letter only.<br />* Capitalize all alphanumeric words and add a variety of common punctuation so ‘cats’ becomes Cats! Cats? Cats. Cats, Cats- etc.<br />* Upper case all alphanumeric words.<br />* Remove vowels from pure alpha words.<br />* Remove white space and punctuation from those words that have it.<br />* Duplicate short words.<br />* Perform most of the similar looking character substitutions identified in the list of dont’s.<br />* Lower case and prepend digits (all words).<br />* Capitalize then reverse alphanumeric words.<br />* Reverse then capitalize words.<br />* Upper case words adding common punctuation and swapping zero for O.<br />* Upper case then duplicate, reverse and mirror words. <br /><br />A number of the preceding transformations had length limitations which have been omitted for simplicity.<br />How Long Does It Take to Crack Passwords?<br /><br />Conceptually the easiest way to crack passwords is to generate character sequences working through all possible 1 character passwords, then two character, then three character, etc. This is the brute force attack previously mentioned. It could start at any specific length password. Theoretically any possible password can be found this way but generally there is not sufficient computing power available to successfully accomplish this. A number of factors deteremine how long a brute force attack will take. Some may be under a system administrators control and others are not.<br /><br />One factor is the amount of computing power available to solve the problem. Computing power increases continually; Moore’s law anticipated a doubling of processing power every 18 months and this has so far been a close approximation to reality. This works out to about a 100 times increase each decade. Today a computer is likely to have approximately a million times the computing power available when the first UNIX was developed.<br /><br />Password cracking lends itself well to parallel processing on multiple machines with near linear gains as more machines are applied to the problem. Someone with access to many machines during off-hours at a company or educational institution may be able to apply lots of computing power. Computers with a wide range of speeds may be available. Thus the amount of computing power available for password cracking continually rises but the amount available to a single cracker or group of crackers may vary by orders of magnitude at any specific point in time.<br /><br />Another factor is the algorithm used to encrypt the password. Generally this is set by the operating system but some such as Linux and OpenBSD allow the administrator to select from different types. On OpenBSD the administrator can control loop counts for some of the options. Changing the encryption method and how many times it is applied, can greatly increase the time it takes to compute a password hash. Generally, the longer it takes to compute the hash when the password is created, the longer it will take when trying to crack the password. The standard UNIX encryption method has been changed to make it slower more than once. On the other hand, some algorithms have multiple implementations and those cracking passwords have created variants that produce the same results but run as much as 100 times faster than the version that originally encrypts the password2.<br /><br />Probably the most important factor in brute force cracking of passwords is how many passwords need to be examined to cover all possible passwords. Two factors determine this. They are the length of the password and the number of characters in the character set from which the passwords are formed. The number of possible passwords is the number of characters in the character set raised to the power represented by the password length. For example, the number of possible three character passwords formed by 26 letters is 26 cubed.<br /><br />The table below is calculated by assuming 100,000 encryption operations per second; this is a plausible number for a desktop PC today. In “Password Cracking Using Focused Dictionaries”1, Paul Bobby refers to 48000 “password combinations per second” on a “P2-400Mhz computer”. In “UNIX Password Security - Ten Years Later”2, Feldmeier and Karn refer to a “top speed of 1092.8 crypts per second on a Sun SPARCStation.” in 1989. Applying Moores law we should get between 100,000 and 200,000 crypts per second on a high end workstations eleven years later. Using L0phtCrack5, I’ve seen about 1.2 million “Tries/sec” using only alphanumeric characters and about nine hundred thousand “Tries/sec” using the full 95 character, printable ASCII character set, on a PIII 500. I believe the L0phtCrack number is at least in part a result of the weaker encryption used by NT as discussed on another page.<br /><br />Password lengths from 3 to 12 are shown. The numbers at the top, 26 - 94, indicate the number of characters from which the passwords are formed. 26 is the number of lower case letters, 36 is letters and digits, 52 is mixed case letters, 68 is single case letters with digits, symbols and punctuation, and 94 is all the displayable ASCII characters including mixed case letters. The times shown are the times to process the entire set of passwords thus the average time to crack passwords would be one half the listed times.<br /><br />26 36 52<br />3 0.18 seconds 0.47 seconds 1.41 seconds<br />4 4.57 seconds 16.8 seconds 1.22 minutes<br />5 1.98 minutes 10.1 minutes 1.06 hours<br />6 51.5 minutes 6.05 hours 13.7 days<br />7 22.3 hours 9.07 days 3.91 months<br />8 24.2 days 10.7 months 17.0 years<br />9 1.72 years 32.2 years 8.82 centuries<br />10 44.8 years 1.16 millennia 45.8 millennia<br />11 11.6 centuries 41.7 millennia 2,384 millennia<br />12 30.3 millennia 1,503 millennia 123,946 millennia <br /><br />68 94<br />3 3.14 seconds 8.3 seconds<br />4 3.56 minutes 13.0 minutes<br />5 4.04 hours 20.4 hours<br />6 2.26 months 2.63 months<br />7 2.13 years 20.6 years<br />8 1.45 centuries 1.93 millennia<br />9 9.86 millennia 182 millennia<br />10 670 millennia 17,079 millennia<br />11 45,582 millennia 1,605,461 millennia<br />12 3,099,562 millennia 150,913,342 millennia<br /><br />Even if a cracker has a thousand times more power available than assumed, e.g., 100,000 is significantly low and the crackers has lot of fast computers or a supercomputer, it’s very easy to find passwords that can’t easily be cracked. Eight character passwords using the entire character set will do, as it will take nearly two years to work through all possible passwords. Depending on the password and the brute force sequence, some passwords might fall quickly. For example if passwords were generated in the order of ASCII collating sequence, the poor password !!!111Aa might be found rather quickly.<br /><br />The time to process a cracking dictionary is determined in the same manner. The total number of passwords to be tried, which is a product of the number of words in the dictionary times the number of transformations per word, is divided by the rate it takes to encrypt passwords. Complex rule sets may impose an additional significant overhead. On today’s computers, small dictionaries (less than 100,000) with a few transformations will complete in a few seconds. The total number of passwords with large dictionaries and many transformations or huge dictionaries will be huge and the processing time correspondingly large.<br />Brute Force, Dictionary Comparison<br /><br />As brute force is the only alternative to dictionary based password cracking it’s worth taking a close look the table above. Look at how long it should take to crack eight character passwords drawing from the 95 typeable characters. One simple statement should put this in perspective. Not including NT systems, that have a seriously flawed password storage method<br />It is highly unlikely that any cracker has ever gotten even a single password, eight characters or longer, randomly created from the entire 95 printable ASCII character set.<br /><br />Randomness does have it’s surprises. If numbers are randomly selected from a billion number sequence, there is a one in a billion chance that the first number will be drawn on the first try. Very unlikely but still possible. To have a 1% chance of cracking a specific random, 8 character password from the full character set takes about 20 years of computing, at 100,000 passwords per second.<br /><br />An obscure word in the Afrikaans language, mirrored and all uppercased except the first letter is more likely to be used as a password than any single random character sequence of similar length. Further, where the single random sequence cannot be reliably found by existing technology today, the Afrikaans derived password surely can; it’s simply a matter of the cracker having and choosing to apply sufficient resources<br /><br />Any word and all the mechanical transformations that can be described to change that word into something else is a subset of all possible combinations of the same characters. As the length of the word increases, the standard transformations become an ever smaller subset of the possible permutations. For a word of meaningful length, say more than 5 characters, the word and its transformations is an infinitesimal subset of all possible combinations of the same number of all characters. In other words, the longer the passwords to be cracked, the larger the advantage of a dictionary based attack will be compared to a brute force attack. Here “dictionary based attack” is understood to include custom programmed dictionaries as described in subsequent pages in this section.<br /><br /><br />source:from:\ Geodsoftadamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-28433607729857372372008-10-11T05:46:00.000-07:002008-10-11T05:50:22.139-07:00Reason why Windows crashes is hardware conflict<strong>Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."<br /><br />You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?<br /><br />1 Hardware conflict<br /><br />The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.<br /><br />For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.<br /><br />If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:<br /><br />* Start-Settings-Control Panel-System-Device Manager.<br /><br />Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.<br /><br />Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.<br /><br />Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com<br /><br />. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).<br /><br />When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.<br /><br />To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.<br /><br />2 Bad Ram<br /><br />Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.<br /><br />But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.<br /><br />One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.<br /><br />Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.<br /><br />EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.<br /><br />3 BIOS settings<br /><br />Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.<br /><br />Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.<br /><br />A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.<br /><br />Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).<br /><br />4 Hard disk drives<br /><br />After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to<br /><br />* Start-Programs-Accessories-System Tools-Disk Defragmenter<br /><br />This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.<br /><br />The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).<br /><br />Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to<br /><br />* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.<br /><br />Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.<br /><br />Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to<br /><br />* Start-Programs-Accessories-System Tools-ScanDisk<br /><br />Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.<br /><br />5 Fatal OE exceptions and VXD errors<br /><br />Fatal OE exception errors and VXD errors are often caused by video card problems.<br /><br />These can often be resolved easily by reducing the resolution of the video display. Go to<br /><br />* Start-Settings-Control Panel-Display-Settings<br /><br />Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.<br /><br />If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to<br /><br />* Start-Settings-Control Panel-System-Device Manager<br /><br />Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.<br /><br />If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.<br /><br />The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.<br /><br />Another useful way to resolve video problems is to go to<br /><br />* Start-Settings-Control Panel-System-Performance-Graphics<br /><br />Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).<br /><br />Look up your video card's manufacturer on the internet and search for the most recent drivers for it.<br /><br />6 Viruses<br /><br />Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to<br /><br />Start-Settings-Control Panel-Add/Remove Programs<br /><br />Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.<br /><br />A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.<br /><br />7 Printers<br /><br />The action of sending a document to print creates a bigger file, often called a postscript file.<br /><br />Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.<br /><br />If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.<br /><br />8 Software<br /><br />A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.<br /><br />The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.<br /><br />Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org<br /><br />Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.<br /><br />Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.<br /><br />Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.<br /><br />Remember to restore all the BIOS settings back to their former settings following installation.<br /><br />9 Overheating<br /><br />Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.<br /><br />One remedy is to get a bigger better fan and install it on top of the CPU.<br /><br />CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.<br /><br />10 Power supply problems<br /><br />With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.<br /><br />If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.<br /><br />It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.</strong>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-76989795463577991452008-10-03T09:48:00.000-07:002008-10-03T10:03:37.269-07:00White LED Flashlight ConversionsMany flashlights can be easily converted to use white LEDs instead of regular incandescent bulbs. The flashlight can quickly be returned to its original bulb and battery configuration later if you wish. Of course this procedure will void the warranty on your flashlight, but the only permanent modification made is increasing the size of the hole in the reflector assembly. Since I live in a remote area with no streetlights and am a volunteer firefighter, flashlights are very important and are used daily by everyone in the family. I normally use Maglite® flashlights in different sizes for reliability reasons, but have been frustrated with short battery and bulb life. I normally get only 5 hours on 2xAA batteries, and have to change bulbs every 2 sets of batteries or so. Converted white LED MiniMaglites® have become my favorite flashlights! Though the LED conversions are not as bright as normal bulbs, the batteries last over 6 times as long, and I have not replaced an LED bulb yet despite running them at over their maximum current. Otherpower.com sells super-bright white LEDs that are perfect for flashlight conversions, plus LED clusters that fit normal automotive taillight bulb sockets, available at any auto parts store. We made various attempts at figuring out how to mass-produce the spacer with resistor -- and we've decided not to offer them for sale because we can't manufacture them cheaply. Much better to make your own anyway! You can check out our line of efficient lighting products in the Renewable Energy section of our web shopping cart. MiniMaglite® LED Conversions<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_acXeHxpl2Gg/SOZNwj5w4SI/AAAAAAAAARg/wDKlD627Cuk/s1600-h/f1.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 100px;" src="http://3.bp.blogspot.com/_acXeHxpl2Gg/SOZNwj5w4SI/AAAAAAAAARg/wDKlD627Cuk/s320/f1.png" alt="" id="BLOGGER_PHOTO_ID_5252971512040841506" border="0" /></a>Alkaline batteries are often the best choice for flashlights, since they retain more power when sitting unused for long periods of time. And you can expect over 6 times longer battery life when using a white LED bulb! This is important when a flashlight must sit in your truck for weeks or months without use. In this situation, NiCad or NiMh rechargables would most likely have little power left in them after sitting for months. Alkaline N-cells are inexpensive and usually locally .<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_acXeHxpl2Gg/SOZOaxONSII/AAAAAAAAARo/XIdS1tHLz1o/s1600-h/f2.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="http://1.bp.blogspot.com/_acXeHxpl2Gg/SOZOaxONSII/AAAAAAAAARo/XIdS1tHLz1o/s320/f2.png" alt="" id="BLOGGER_PHOTO_ID_5252972237170755714" border="0" /></a><br /> Take off the flashlight head and remove the incandescent bulb. Save the bulb for future use if you ever decide to return your flashlight to its original condition. Trim the tabs off of the LED leads using nippers. A flat needle file or sandpaper can help smooth the lead. Trim the LED leads off to 1/4 inch in length. Insert the LED into the bulb socket. If does not light up, reverse the LED and it will. If not, check your batteries, and also make sure the LED leads are not touching each other. Remove the reflector, and using a 1/4 inch drill bit carefully widen the hole for the bulb to 1/4 inch. Our LED bulbs do not need reflectors since they emit light at a set 20° angle, but the reflector assembly is needed in a MiniMaglite® for the switch to function properly. Now try your flashlight with the original AA batteries. It should light up, but somewhat dimmly. If you run it like this, the batteries will last for weeks of continous on-time. It's not very bright, but it is enough light to find the keyhole or make your way to the bathroom. To run the LED at full brightness you'll need to use 3 N cells. Next, Install the 3 N-cell batteries. Install a spacer (containing an internal current-limiting resistor) You'll need to build a spacer to hold the resistor and make the whole battery pack come out to the right length. Our prototype used a 3/8 inch length of 1/2 inch diameter wooden dowel (see photos below). We drilled short holes at the ends of the dowel for battery contacts made of small machine screws. We then drilled an off-center hole all the way through the spacer for the resistor, and wrapped each resistor lead around the contacts.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_acXeHxpl2Gg/SOZPR7Z9RrI/AAAAAAAAARw/XaICy8cnep4/s1600-h/f3.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 177px; height: 145px;" src="http://1.bp.blogspot.com/_acXeHxpl2Gg/SOZPR7Z9RrI/AAAAAAAAARw/XaICy8cnep4/s320/f3.png" alt="" id="BLOGGER_PHOTO_ID_5252973184797198002" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_acXeHxpl2Gg/SOZP2uqRNeI/AAAAAAAAAR4/DevQwCMN-Ac/s1600-h/f4.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="http://4.bp.blogspot.com/_acXeHxpl2Gg/SOZP2uqRNeI/AAAAAAAAAR4/DevQwCMN-Ac/s320/f4.png" alt="" id="BLOGGER_PHOTO_ID_5252973817031112162" border="0" /></a>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-29067347285946832662008-09-29T07:11:00.000-07:002008-09-29T07:13:57.737-07:00Emergency LightEmergency Light <br />The circuit of automatic emergency light presented here has the following features: 1. When the mains supply (230V AC) is available, it charges a 12V battery up to 13.5V and then the battery is disconnected from the charging section. 2. When the battery discharges up to 10.2V, it is disconnected from the load and the charging process is resumed. 3. If the mains voltage is available and there is darkness in the room, load (bulb or tube) is turned on by taking power from the mains; otherwise the battery is connected to the load. 4. When the battery discharges up to 10.2V and if the mains is not yet available, the battery is completely disconnected from the circuit to avoid its further discharge. The mains supply of 230V AC is stepped down to 18V AC (RMS) using a 230V AC primary to 0-18V AC, 2A secondary transformer (X1), generally used in 36cm B&W TVs. Diodes D1 through D4 form bridge rectifier and capacitor C5 filters the voltage, providing about 25V DC at the output. Charging section includes 33-ohm, 10-watt resistor R2 which limits the charging current to about 425 mA when battery voltage is about 10.2V, or to 325 mA when battery voltage is about 13.5V. When the battery charges to 13.5V (as set by VR2), zener diode D17 goes into breakdown region, thereby triggering triac TR1. Now, since DC is passing through the triac, it remains continuously ‘on’ even if the gate current is reduced to zero (by disconnecting the gate terminal). Once the battery is fully charged, charging section is cut-off from the battery due to energisation of relay RL2. This relay remains ‘on’ even if the power fails because of connection to the battery via diode D10. S4, a normally closed switch, is included to manually restart the charging process if required. Battery disconnect and charging restart section comprises an NE555 timer (IC2) wired in monostable mode. When the battery voltage is above 10.2V (as indicated by red LED D15), zener diode (D16) remains in the breakdown region, making the trigger pin 2 of IC2 high, thereby maintaining output pin 3 in low voltage state. Thus, relay RL3 is ‘on’ and relay RL4 is ‘off.’ But as soon as the battery voltage falls to about 10.2V (as set by preset VR1), zener diode D16 comes out of conduction, making pin 2 low and pin 3 high to turn ‘on’ relay RL4 and orange LED D13. This also switches off relay RL3 and LED D15. Now, if the mains is available, charging restarts due to de-energisation of relay RL2 because when relay RL4 is ‘on,’ it breaks the circuit of relay RL2 and triac TR1. But if the mains supply is not present, both relays RL3 and RL1 de-energise, disconnecting the battery from the remaining circuit. Thus when battery voltage falls to 10.2 volts, its further discharge is eliminated. But as soon as the mains supply resumes, it energises relay RL1, thereby connecting the battery again to the circuit. Light sensor section also makes use of a 555 timer IC in the monostable mode. As long as normal light is falling on LDR1, its resistance is comparatively low. As a result pin 2 of IC3 is held near Vcc and its output at pin 3 is at low level. In darkness, LDR resistance is very high, which causes pin 2 of IC3 to fall to near ground potential and thus trigger it. As a consequence, output pin 3 goes high during the monostable pulse period, forward biasing transistor T3 which goes into saturation, energising relay RL5. With auto/bypass switch S2 off (in auto mode), the load gets connected to supply via switch S3. If desired, the load may be switched during the day-time by flipping switch S2 to ‘on’ position (manual). Preset VR3 is the sensitivity control used for setting threshold light level at which the load is to be automatically switched on/off. Capacitors with the relays ensure that there is no chattering of the relays. When the mains is present, diode D8 couples the input voltage to regulator IC1 whereas diode D10 feeds the input voltage to it (from battery) in absense of mains supply. Diode D5 connects the load to the power supply section via resistor R5 when mains is available (diode D18 does not conduct). However, when mains power fails, the situation reverses and diode D18 conducts while diode D5 does not conduct. . The load can be any bulb of 12 volts with a maximum current rating of 2 amperes (24 watts). Resistor R5 is supposed to drop approximately 12 volts when the load current flows through it during mains availability . Hence power dissipated in it would almost be equal to the load power. It is therefore desirable to replace R5 with a bulb of similar voltage and wattage as the load so that during mains availability we have more (double) light than when the load is fed from the battery. For setting presets VR1 and VR2, just take out (desolder one end) diodes D7, D10 and D18. Connect a variable source of power supply in place of battery. Set preset VR1 so that battery-high LED D15 is just off at 10.2V of the variable source. Increase the potential of the variable source and observe the shift from LO BAT LED D13 to D15. Now make the voltage of the source 13.5V and set preset VR2 so that relay RL2 just energises. Then decrease the voltage slowly and observe that relay RL2 does not de-energise above 10.2V. At 10.2V, LED D15 should be off and relay RL2 should de-energise while LED D13 should light up. Preset VR3 can be adjusted during evening hours so that the load is ‘on’ during the desired light conditions<br /><br /><br />Download Circuit Diagram : <br /><a href="http://www.ziddu.com/download/2280897/3.gif.html">http://www.ziddu.com/download/2280897/3.gif.html</a>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-70304066869687663472008-09-29T07:06:00.000-07:002008-09-29T07:09:48.931-07:00Car anti theft wireless alarm<a name="12">Car anti theft wireless alarm</a>.<br />This FM radio-controlled anti- theft alarm can be used with any vehicle having 6- to 12-volt DC supply system. The mini VHF, FM transmitter is fitted in the vehicle at night when it is parked in the car porch or car park. The receiver unit with CXA1019, a single IC-based FM radio module, which is freely available in the market at reasonable rate, is kept inside. Receiver is tuned to the transmitter's frequency. When the transmitter is on and the signals are being received by FM radio receiver, no hissing noise is available at the output of receiver. Thus transistor T2 (BC548) does not conduct. This results in the relay driver transistor T3 getting its forward base bias via 10k resistor R5 and the relay gets energised. When an intruder tries to drive the car and takes it a few metres away from the car porch, the radio link between the car (transmitter) and alarm (receiver) is broken. As a result FM radio module gene-rates hissing noise. Hissing AC signals are coupled to relay switching circ- uit via audio transformer. These AC signals are rectified and filtered by diode D1 and capacitor C8, and the resulting positive DC voltage provides a forward bias to transistor T2. Thus transistor T2 conducts, and it pulls the base of relay driver transistor T3 to ground level. The relay thus gets de-activated and the alarm connected via N/C contacts of relay is switched on. If, by chance, the intruder finds out about the wireless alarm and disconnects the transmitter from battery, still remote alarm remains activated because in the absence of signal, the receiver continues to produce hissing noise at its output. So the burglar alarm is fool-proof and highly reliable<br /><br />Download Circuit Diagram : <a href="http://www.ziddu.com/download/2280900/wireleddcarralarm.gif.html">http://www.ziddu.com/download/2280900/wireleddcarralarm.gif.html</a>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com1tag:blogger.com,1999:blog-4640167395536873576.post-42055814038359728772008-09-15T08:15:00.002-07:002008-09-15T08:20:13.823-07:00PBS Switch Debouncing Circuit<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 12"><meta name="Originator" content="Microsoft Word 12"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CADAMLI%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_filelist.xml"><link rel="themeData" href="file:///C:%5CDOCUME%7E1%5CADAMLI%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_themedata.thmx"><link rel="colorSchemeMapping" href="file:///C:%5CDOCUME%7E1%5CADAMLI%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_colorschememapping.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:trackmoves/> <w:trackformatting/> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:donotpromoteqf/> <w:lidthemeother>EN-US</w:LidThemeOther> <w:lidthemeasian>X-NONE</w:LidThemeAsian> <w:lidthemecomplexscript>X-NONE</w:LidThemeComplexScript> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:splitpgbreakandparamark/> <w:dontvertaligncellwithsp/> <w:dontbreakconstrainedforcedtables/> <w:dontvertalignintxbx/> <w:word11kerningpairs/> <w:cachedcolbalance/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathpr> <m:mathfont val="Cambria Math"> <m:brkbin val="before"> <m:brkbinsub val="--"> <m:smallfrac val="off"> <m:dispdef/> <m:lmargin val="0"> <m:rmargin val="0"> <m:defjc val="centerGroup"> <m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"> <w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"> <w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"> <w:lsdexception locked="false" priority="39" name="toc 1"> <w:lsdexception locked="false" priority="39" name="toc 2"> <w:lsdexception locked="false" priority="39" name="toc 3"> <w:lsdexception locked="false" priority="39" name="toc 4"> <w:lsdexception locked="false" priority="39" name="toc 5"> <w:lsdexception locked="false" priority="39" name="toc 6"> <w:lsdexception locked="false" priority="39" name="toc 7"> <w:lsdexception locked="false" priority="39" name="toc 8"> <w:lsdexception locked="false" priority="39" name="toc 9"> <w:lsdexception locked="false" priority="35" qformat="true" name="caption"> <w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"> <w:lsdexception locked="false" priority="1" name="Default Paragraph Font"> <w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"> <w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"> <w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"> <w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"> <w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"> <w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"> <w:lsdexception locked="false" unhidewhenused="false" name="Revision"> <w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"> <w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"> <w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"> <w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"> <w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"> <w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"> <w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"> <w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"> <w:lsdexception locked="false" priority="37" name="Bibliography"> <w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Helvetica; panose-1:2 11 6 4 2 2 2 2 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:536881799 -2147483648 8 0 511 0;} @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1107304683 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0in; margin-bottom:.0001pt; text-align:right; mso-pagination:widow-orphan; direction:rtl; unicode-bidi:embed; font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman";} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.0in 1.0in 1.0in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} </style> <![endif]--><span style="font-size: 13.5pt; font-family: "Helvetica","sans-serif";">The 555 circuit can be re-triggered if the input is held low longer than the output pulse. To prevent this happening, I have included a further timing circuit comprised of the 1Meg resistor and 47n capacitor. Normally, the 47n capacitor is discharged via the 1 Meg resistor. When the switch is pressed the capacitor quickly charges and provides a brief negative pulse to the 555 input. When the capacitor is fully charged, the potential across the voltage divider formed by the 10k and 1Meg resistors is insufficient to retrigger the monostable. Releasing the switch quickly discharges the capacitor. The output of a 555 monostable is suitable for connecting to TTL and CMOS logic circuits.
<br />
<br />Download Schematic Diagram and Part List :
<br /></span><span class="tahoma12bold"></span><a href="http://www.ziddu.com/download/2175163/PBSSwitchDebouncingCircuit.pdf.html" class="download">http://www.ziddu.com/download/2175163/PBSSwitchDebouncingCircuit.pdf.html </a>
<br />adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-86786744596059140542008-09-15T08:06:00.000-07:002008-09-15T08:10:09.737-07:00Nicad Battery ChargerThis simple charger uses a single transistor as a constant current source. The voltage across the pair of 1N4148 diodes biases the base of the BD140 medium power transistor. The base - emitter voltage of the transistor and the forward voltage drop across the diodes are relatively stable. The charging current is approximately 15mA or 45mA with the switch closed. This suits most 1.5V and 9V rechargeable batteries. The transformer should have a secondary rating of 12V ac at 0.5amp, the primary should be 220/240volts for Europe or 120volts ac for North America.<br /><br />Download Schematic Diagram and Part List :<br /><span class="tahoma12bold"><a href="http://www.ziddu.com/download/2175121/NicadBatteryCharger.pdf.html" class="download"><b>http://www.ziddu.com/download/2175121/NicadBatteryCharger.pdf.html</b></a></span>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-82421876374948318242008-09-15T08:02:00.000-07:002008-09-15T08:04:14.455-07:00Video AmplifierDownload Schematic Diagram and PartList of Video Amplfier<br /><br /><span class="tahoma12bold"></span><a href="http://www.ziddu.com/download/2174640/Videoamplifier.pdf.html" class="download">http://www.ziddu.com/download/2174640/Videoamplifier.pdf.html </a>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-24440968170453099742008-09-15T07:53:00.000-07:002008-09-15T07:58:32.429-07:00Traffic Light ProjectTraffic Light Project<br />This project operates red, amber and green LEDs in the<br />correct sequence for a single UK traffic light. The time<br />taken for the complete red - red & amber - green - amber<br />sequence can be varied from about 7s to about 2½<br />minutes by adjusting the 1M preset. Some amber LEDs<br />emit light that is almost red so you may prefer to use a<br />yellow LED. The 555 astable circuit provides clock<br />pulses for the 4017 counter which has ten outputs (Q0 to<br />Q9). Each output becomes high in turn as the clock<br />pulses are received. Appropriate outputs are combined<br />with diodes to supply the amber and green LEDs. The<br />red LED is connected to the ÷10 output which is high for<br />the first 5 counts (Q0-Q4 high), this saves using 5 diodes<br />for red and simplifies the circuit.<br /><br />Download Schematic Diagram and Part List :<br /><span class="tahoma12bold"></span><a href="http://www.ziddu.com/download/2174637/trafficlight.pdf.html" class="download">http://www.ziddu.com/download/2174637/trafficlight.pdf.html </a>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-2659224572706774142008-09-15T07:44:00.000-07:002008-09-15T07:52:52.955-07:00Temperature Switch ProjectTemperature Switch Project<br />This project will provide you an understanding of the use of germanium diode and how it works compared to the more common silicon diode. It works on the principle that as the temperature surrounding the germanium diode increases, the back resistance decreases sharply.<br />At room temperature, the germanium diode D1 has a typical back resistance of 10K ohm. At this value, the base of transistor Q1 is turned ON, causing transistor Q2 to turn ON as well. When this happens, the base of transistor Q3 is kept to ground causing it to turn OFF hence the buzzer is OFF.<br />When the temperature of the surrounding increases, the back resistance of the germanium diode D1 decreases sharply causing the base of transistor Q1 to pull down to near ground potential. This cause the transistors Q1 and Q2 to turn OFF. Transistor Q3 is now forward bias through resistor R2 and diode D2. This caused the buzzer to turn ON indicating that the ambient temperature has risen. The sensitivity of the circuit can be adjusted by adjusting variable resistor VR1 and subjecting diode D1 to a temperature that will trigger the buzzer.<br /><br />Download Schematic Diagram and Partlist :<br /><span class="tahoma12bold"></span><a href="http://www.ziddu.com/download/2174632/TemperatureSwitchProject.pdf.html" class="download">http://www.ziddu.com/download/2174632/TemperatureSwitchProject.pdf.html </a>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-65157041421730697602008-09-15T07:39:00.000-07:002008-09-15T07:41:51.930-07:00Simple Home Security Monitorin ProjectSimple Home Security Monitoring Project<br />This project is a standalone simple home security monitoring project that will trigger a buzzer when the magnetic contact is opened. Magnetic contacts are usually NC (Normally Closed) and are used on doors and windows. They consists of two parts namely a magnet and a reed switch. When the reed switch is in close proximity to the magnet, the switch will close and vice versa. Usually the magnet is fitted to the door and the reed switch is fitted to the door frame in close proximity to one another such that when the door is closed, the two parts are in close contact and hence the switch is closed. When the door is opened, the magnet will be a distance away from the reed switch and hence the switch will open.<br /><br />Download Schematic Diagram and part list :<br /><br /><span class="tahoma12bold"></span><a href="http://www.ziddu.com/download/2174628/SimpleHomeSecurityMonitoringProject.pdf.html" class="download">http://www.ziddu.com/download/2174628/SimpleHomeSecurityMonitoringProject.pdf.html </a>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-64198571905940165602008-09-15T07:35:00.000-07:002008-09-15T07:38:49.551-07:00Simple but reliable car battery testerThis circuit uses the popular and easy to find LM3914 IC. This IC is very simple to drive, needs no voltage regulators (it has a built in voltage regulator) and can be powered from almost every source. This circuit is very easy to explain: When the test button is pressed, the Car battery voltage is feed into a high impedance voltage divider. His purpose is to divide 12V to 1,25V (or lower values to lower values). This solution is better than letting the internal voltage regulator set the 12V sample voltage to be feed into the internal voltage divider simply because it cannot regulate 12V when the voltage drops lower (linear regulators only step down). Simply wiring with no adjust, the regulator provides stable 1,25V which is fed into the precision internal resistor cascade to generate sample voltages for the internal comparators. Anyway the default setting let you to measure voltages<br /><span style="font-size:100%;">between 8 and 12V but you can measure even from 0V to 12V setting the offset trimmer to 0 (but i think that under 9 volt your car would not start). There is a smoothing capacitor (4700uF 16V) it is used to adsorb EMF noise produced from the ignition coil if you are measuring the battery during the engine working. Diesel engines would not need it, but i'm not sure. If you like more a point graph rather than a bar graph simply disconnect pin 9 on the IC (MODE) from power. The calculations are simple (default) For the first comparator the voltage is : 0,833 V corresponding to 8 V * * * * * voltage is : 0,875 V corresponding to 8,4 V ... .. for the last comparator the voltage is : 1,25 V corresponding to 12 V Have fun, learn and don't let you car battery discharge... ;-)<br /><br />Download Schematic Diagram<br /></span><span class="tahoma12bold"></span><a href="http://www.ziddu.com/download/2174626/Simplebutreliablecarbatterytester.pdf.html" class="download">http://www.ziddu.com/download/2174626/Simplebutreliablecarbatterytester.pdf.html </a><br /><span style="font-size:100%;"><br /></span>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-52860917968478904112008-09-15T07:29:00.000-07:002008-09-15T07:33:45.353-07:00Power Failure Alarm ProjectPower Failure Alarm Project<br />This project is a power supply monitoring device that will trigger a buzzer when the mains supply cuts off. At the same time, the light emitting diode will be turned ON. This device is helpful to inform the loss of power supply to some critical installation such as a pump in a fish tank. Once the buzzer sound, one will know that there is a loss of power supply and actions need to be taken to rectify the situation by providing alternative power supply or relocating the installation.<br />Circuit Description<br />The circuit shown below consists of a AC relay. If the mains input is 120V AC, use a 120V AC relay. If the mains input is 240V AC, use a 240V AC relay. The relay is a Single Pole Double Throw (SPDT) type where the COM will be connected to NC terminal if it is not energised. Once energised, the COM terminal will be connected to the NO terminal.<br /><br />Download Schematic Diagram<br /><span class="tahoma12bold"></span><a href="http://www.ziddu.com/download/2174622/PowerFailureAlarmProject.pdf.html" class="download">http://www.ziddu.com/download/2174622/PowerFailureAlarmProject.pdf.html </a>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-69465814372723648112008-09-15T07:18:00.000-07:002008-09-15T07:21:59.957-07:00LED TorchLED Torch.<br />A common problem with small torches is the short life-span both of the batteries and the bulb. The average incandescent torch, for instance, consumes around 2 Watts. The LED Torch in Fig. 1 consumes just 24 mW, giving it more than 80 times longer service from 4 AA alkaline batteries (that is, up to one month's continuous service). Although the torchs light output is modest, it is nonetheless quite sufficient to illuminate a pathway for walking.<br />The LED Torch is based on a 7555 timer running in astable mode (do not use an ordinary 555). A white LED (Maplin order code NR73) produces 400 mcd light output, which, when focussed, can illuminate objects at 30 metres. Try Conrad Electronic for what appears to be a stronger white LED (order code 15 37 45-11).<br />A convex lens with short focal length is placed in front of the LED to focus the beam. If banding occurs at the beams perimeter, use another very short focal length lens directly in front of the LED to smooth the beam.<br /><br />Download Schematic Diagram :<br /><a class="download" href="http://www.ziddu.com/download/2174612/LEDTorch.pdf.html">http://www.ziddu.com/download/2174612/LEDTorch.pdf.html </a>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-45311692514569166402008-09-15T07:09:00.000-07:002008-09-15T07:11:33.114-07:00Free Hidden ElectricityFREE Hidden Electricity!<br />This Instructable will show you how to tap into a FREE source of electricity! All you need is a phone line! All phone lines have a constant flow of voltage, around 40-70 volts (up to 100 volts when it rings!), but you can't just plug stuff into it and expect it to work. You can really mess with your phone system by doing that. I discovered how to do it the right way<br />What You Need...<br />1. Small project enclosure 2. (1) 240ohm resistor 3. (1) 510ohm resistor 4. (1) LM317L Regulator 5. (1) KBP210 Bridge Rectifier 6. (2) Phone line cables<br /><br />Download Schematic Diagram :<br /><br /><a class="download" href="http://www.ziddu.com/download/2174617/phoneelectricity.pdf.html">http://www.ziddu.com/download/2174617/phoneelectricity.pdf.html </a>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-65626684770666989632008-09-14T01:10:00.000-07:002008-09-14T01:23:36.962-07:00activate and unlock iPhone with 1.1.1<strong>This tutorial assumes that your iPhone has firmware version 1.1.1.</strong> If you are unsure, here is how to check: On the emergency dial screen dial <strong>*3001#12345#*</strong> and tap Versions. Firware version should be <strong>04.01.13_G</strong>. If it's 03.14.08_G you have v1.0.2 and need to <a href="#recovery-restore-mode">update it to 1.1.1 first</a>.<br /><br /><h1 id="Bypass-Activation-and-Jailbreak">Bypass activation and prepare phone for software installation</h1> <ol><li>Make sure you have a SIM-card with PIN turned off, and power on your phone (the supplied AT&T card works fine). </li><li>On the activation screen, <strong>slide for emergency</strong> and dial: <strong>*#301#</strong> to make the phone call itself. (If the incoming call dialog quickly disappears but it keeps ringing, just dial <strong>0</strong> (remove *#301# first), and it will call itself) </li><li><strong>Answer</strong> the call, and tap on <strong>Hold</strong> </li><li>Phone will call it self again, tap <strong>Decline</strong>. You will now be returned to the normal dialer. </li><li>Tap on contacts, and tap the + icon to add a new. The only info you are going to add to this contact are <strong>two URL's</strong>. To add a URL, tap <strong>Add new URL</strong>. The first URL is <i>prefs</i> followed by a colon: <strong>prefs:</strong> and the second is <strong>i.unlock.no</strong>. Tap Save. </li><li>Your contact now has two "web pages" - tap on the first one (prefs:). This will take you to the settings dialog. The reason you want this, is because you need to connect to a Wi-Fi network, so tap on Wi-Fi, and get connected to a network, and make sure the icon on top of the screen is indicating that you are connected. While you are in the settings dialog, you should also set: <strong>General → Auto-Lock → Never</strong>. </li><li>Now, press the home button, and again, <strong>slide for emergency</strong> dial <strong>0</strong>, <strong>Answer</strong> the call, <strong>Hold</strong> and <strong>Decline</strong> the new call so that you get to the contacts. Tap on your contact (No Name), and this time tap on the other home page, <strong>i.unlock.no</strong> </li><li>Safari will launch and show you a webpage. Tap on <strong>Tap here to jailbreak your iPhone</strong> </li><li>Phone will return to activation screen and after a few seconds the phone should restart. </li><li>If the phone does not restart after waiting a full minute, please make sure that you have your phone connected to the computer and try again. </li><li>When the phone starts again, it should no longer say <i>slide for emergency</i>, but rather <strong>Slide to unlock</strong> It means it was successfull! Activation is now bypassed, and phone prepared for software installation! <i>(If you are going to use an AT&T SIM, you won't need to do the next step.)</i></li></ol><br /><h1 id="Unlock-the-SIM-lock">Unlock the SIM-lock on jailbroken 1.1.1</h1> <ol><li>Open installer, and install the update if prompted. </li><li>Go to sources and tap <strong>Edit</strong> and <strong>Add</strong> </li><li>Add this URL: <strong>http://i.unlock.no</strong> </li><li>Tap <strong>Done</strong> and then <strong>Refresh</strong> </li><li>Go to <strong>Install</strong> (at bottom) and scroll down to the <strong>Unlocking Tools</strong> category and install <strong>AnySIM</strong> </li><li>When installed you can press the home button, and you will find a new AnySIM icon on your home screen. Launch it and follow the instructions. </li><li>The unlocking process will take about 5-10 minutes, in the end it should say it was successful! </li><li>To clean up your phone, launch Installer and uninstall AnySIM. Then go to Settings → General → Auto-Lock and set it to a prefered value. </li></ol>Congratulations, you are done!<br /><br /><br /><h1 id="how-to-jailbreak-1.1.2-and-1.1.3">How to jailbreak 1.1.2 or 1.1.3.</h1> <p>Regardless of whether you want to use 1.1.2 or 1.1.3 firmware, you must start with a jailbroken 1.1.1. <a href="#how-to-downgrade-1.1.2-or-1.1.3">Downgrade instructions are available here</a> and <a href="#Bypass-Activation-and-Jailbreak">Jailbreak for 1.1.1 here</a>. When done continue reading here. Note: even if you want to use 1.1.3, you need to upgrade to and jailbreak 1.1.2 first. You should also unlock your 1.1.2 before upgrading.</p> <h2 id="jailbreak-1.1.2">Upgrading to 1.1.2</h2> <ol><li>On a 1.1.1 phone, open Installer and install <strong>OktoPrep</strong> located in the Tweaks 1.1.1 category. </li><li>Download the 1.1.2 firmware file from Apple: <a onclick="this.target='blank'" href="http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4037.20071107.5Bghn/iPhone1,1_1.1.2_3B48b_Restore.ipsw">iPhone1,1_1.1.2_3B48b_Restore.ipsw</a> (right click link and save target) </li><li>Connect your phone to your computer and open iTunes on the "summary" page. </li><li>Hold down the SHIFT key (Windows) or Option/ALT-key (Mac) on your keyboard while clicking on the <strong>Upgrade</strong> button (not the restore button!). A file browsing dialog should appear, and you must select the firmware file you downloaded in the previous step. </li><li>While the phone is upgrading, <a href="http://conceitedsoftware.com/iphone/site/112jb.html">download the 1.1.2 jailbreak archive</a> and extract the files to your computer. </li><li>If you don't already have Java on your computer, you need to <a href="http://www.java.com/en/download/manual.jsp?locale=en">download and install Java runtime first</a>. If you are unsure, check the jailbreak.jar file in the archive you extracted previously - it should have an icon with a coffee cup </li><li>When your phone is done upgrading, and shows the Slide for emergency screen, you need to launch the jailbreak java application on your computer. Windows users double click on the windows.bat file, while Mac users can double click on jailbreak.jar file. </li><li>An application should appear, with a "Jailbreak" button - click on it and wait while it's jailbreaking. This will take a few minutes, and your phone will restart a few times at the end. </li><li>Your phone should now show "Slide to unlock" instead of emergency. If it does, everything was successfull. </li></ol> <p>If are going to use TurboSIM or a similar SIM-adapter you don't need to unlock - it should work right away. If your phone did not have 1.1.2 when you bought it (old bootloader), you can unlock it to work with any sim-card. To do so, install anySIM 1.2.1u located in Utilities category. <strong>Open Settings enable Airplane Mode (very important!)</strong> (and set Auto lock to never if you haven't already) and then you can launch anySIM and follow the instructions shown.</p> <p>Important: 1.1.2 has a bug that causes phone/SMS to crash when used in foreign countries. To fix this, you must Install and run <strong>iWorld</strong> found in the Tweaks (1.1.2) in Installer. Run the application and select your country. When phone has rebooted you can uninstall iWorld.</p><br /><h2 id="jailbreak-1.1.3">Upgrading to 1.1.3</h2> <p>This requires that you already have jailbroken 1.1.2. Open Installer, and Install <strong>Official 1.1.3 Upgrader</strong> found in the System category. This will download the entire 165MB firmware over Wi-Fi, patch it, and upgrade your phone automaticly. So it may take some time - normally 10-30 minutes. When done your phone should reboot directly to a jailbroken 1.1.3 firmware.</p><br /><h1 id="International-menu-and-edge-fix">A few tweaks</h1> <ul><li>[1.1.1] If you want to enable the International menu, install <strong>Enable International menu</strong> which is found in the <strong>Unlocking Tools category</strong>. This will let you choose keyboards, and set your phone to use your prefered regional settings, like date and phone number formatting. Be alerted though - it looks like Apple haven't finished this feature completely yet (which is probably why it's deactivated) so there may be some issues. In my case Fahrenheit and Celsius is mixed up in the Weather application for instance! </li><li>[1.1.1] By default, the EDGE settings found in <strong>Settings → General → Network → EDGE</strong> are not saved when phone is restarted. To fix this, install <strong>EDGE Settings fix</strong> which is found in the <strong>Unlocking Tools category.</strong>. </li><li>If YouTube does not work ("You must first connect to iTunes..."), try to install <strong>YouTube activation</strong> which is found in the <strong>Unlocking Tools category</strong>. Also make sure that the phone has correct date. </li><li>If you for some reason need to deliver your phone to Apple (service etc.), i recommend that you revert the unlock first so that they (hopefully) can't see it's been unlocked. Install <strong>OneSIM</strong> which is found in the <strong>Unlocking Tools category</strong>, and tap on the new icon it creates to run it. <a href="#recovery-restore-mode">After you are done, do a restore in iTunes</a>. </li></ul>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-38629285287650003132008-09-14T01:09:00.000-07:002008-09-14T01:10:10.736-07:00Fix iPhone Application crashing issueIf you are having trouble with an iPhone application downloaded from the App Store where it opens up and immediately exits (crashes) every time you try to launch it then here are some solutions that you might want to try out to resolve the problem<br /><p trdan="2" niej8="1">It appears that the reason for the application crashes that many iPhone users have reported is due to a problem with Digital Rights Management (DRM) that is embedded in each <a href="http://www.iphonehacks.com/iphone_applications/" trdan="0" niej8="1">iPhone app</a> installed via the App Store.</p> <p trdan="0" niej8="1">There are some solutions that you can try to fix the problem:</p> <p><strong trdan="0" niej8="1">Reboot</strong> <strong trdan="0" niej8="1">iPhone</strong></p> <p trdan="0" niej8="1">Perform a hard reboot of your iPhone, i.e turn your iPhone off completely, by pressing and holding the Sleep/Wake button (on top ) for a few seconds then slide the red slider. Turn it back on by holding the Sleep/Wake button until the Apple logo appears. This can clear potentially problematic data, preventing some type of crashes.</p> <p><strong trdan="0" niej8="1">Delete the iPhone Application:</strong></p> <p trdan="0" niej8="1">If the above solution does not help, try deleting the application from your iPhone and then re-sync it back to your iPhone. </p> <p trdan="0" niej8="1">To delete an application from your iPhone, simply press and hold on the application icon on your iPhone's home screen until it begins to wiggle along with other application icons (just as you would to rearrange them). A small black circle with an "x" on it should appear on the top-left corner of the icon. Tap on the "x" of the iPhone app that is giving you trouble to uninstall it. </p> <p trdan="0" niej8="1">When thats done, sync your iPhone with iTunes which should result in the application you just deleted to get synced to your iPhone again.</p> <p trdan="0" niej8="1">Few iPhone users have observed that re-downloading the deleted application directly from iPhone's App Store (rather than using iTunes on your computer) also helps in resolving the crashing problem.</p> <p trdan="1" niej8="1"><strong trdan="0" niej8="1">Restore iPhone</strong>:</p> <p trdan="0" niej8="1">If deleting the application or full reboot does not resolve the crashing issue, try performing a restore of your iPhone. Connect it to your Mac or PC and, in iTunes, click the Restore button under the Summary tab. Please do remember restoring the phone will erase contacts, calendars, photos and other data on the phone, but will restore automatically backed-up information including text messages, notes, call history, contact favorites, sound settings, widget settings, etc.</p>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-37642235491338209962008-09-14T01:05:00.000-07:002008-09-14T01:08:13.519-07:00Boost Your iPhone 3G's Signal Strength<div class="entry-body"> <p trdan="0" niej8="0">We were assuming that Apple's iPhone 3G will automatically fall back to 2G in case there is no 3G coverage for voice and data connections. </p> <p trdan="0" niej8="0">But based on complaints from many iPhone 3G users, it appears that iPhone 3G is not quick enough in switching from 3G to 2G which could result in low or no signal. So if you are observing low signal strength on your iPhone, then there is a simple but manual trick to solve the problem.</p><p trdan="0" niej8="0">This comment over at iPhone Atlas reader, w4rmk confirms that iPhone 3G is not quick enough in switching from 3G to 2G.</p> <p trdan="0" niej8="0">W4rmk wrote <em trdan="0" niej8="0">"Yesterday I tried to make a phone call (new iPhone 3G). I was standing outside in the Denver, Colorado area (which has 3G) and the display said “No Signal”. I walked around waiting for a signal to come in for about 5min with no luck. I went into settings and turned off 3G and immediately got 4 bars on the edge network. So the iPhone is failing to switch to edge when there is no 3G connection."</em></p> <p trdan="0" niej8="0">I am a little surprised that iPhone 3G did not switch to 2G automatically. </p> <p trdan="0" niej8="0">So in case you observe low or no signal strength on your new iPhone 3G, try turning off 3G manually, this will force iPhone to switch to 2G. It might take few seconds but you could see a boost in your iPhone's signal strength as w4rmk observed. (The assumption here is that you are in an area with good 2G coverage). </p> <center><img alt="iPhone 3G - Turn 3G off" src="http://www.iphonehacks.com/images/08-Jul/Turn3Goff.png" border="0" /><br /><br /></center> <p trdan="0" niej8="0">iPhone 3G not switching between 3G and 2G quickly could be some technical issue as I have observed similar behavior with other 3G phones as well, lets hope Apple finds a solution, as turning 3G off manually is quite painful. </p> </div>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-12304837444657005872008-09-14T00:37:00.000-07:002008-09-14T00:42:25.743-07:00Battery Life Tips of your iPhoneThe iPhone 3G’s battery life is either terrific or terrible, depending on your<br />point of view. When accessing the 3G network, it gets longer battery life than<br />any other phone—and yet that’s only 5 hours of talk time, compared with 8<br />on the original iPhone.<br />But never mind all that; the point is that if you’re not careful, the iPhone 3G’s<br />battery might not even make it through a single day without needing a<br />recharge. So knowing how to scale back its power appetite could come in<br />extremely handy.<br />The biggest wolfers of electricity on your iPhone are its screen and its wireless<br />features. Therefore, you can get longer life from each charge by:<br />• Dimming the screen. In bright light, the screen brightens (but uses<br />more battery power). In dim light, it darkens.<br />You can use this information to your advantage. By covering up the sensor<br />as you unlock the phone, you force it into a low-power, dim-screen<br />setting (because the phone believes that it’s in a dark room). Or by holding<br />it up to a light as you wake it, you get full brightness. In both cases,<br />you’ve saved all the taps and navigation it would have taken you to find<br />the manual brightness slider in Settings.<br />• Turning off 3G. If you don’t see a 3 icon on your iPhone 3G’s status bar,<br />then you’re not in a 3G hot spot , and you’re not getting any<br />benefit from the phone’s battery-hungry 3G radio. By turning it off, you’ll<br />double the length of your iPhone 3G’s battery power, from 5 hours of talk<br />time to 10.<br />To do so, from the Home screen, tap SettingsÆGeneralÆNetworkÆ<br />Enable 3G Off. Yes, this is sort of a hassle, but if you’re anticipating a long<br />day and you can’t risk the battery dying halfway through, it might be<br />worth doing. After all, most 3G phones don’t even let you turn off their<br />3G circuitry.<br />• Turning off Wi-Fi. From the Home screen, tap SettingsÆWi-FiÆOn/Off.<br />If you’re not in a wireless hot spot anyway, you may as well stop the thing<br />from using its radio. Or, at the very least, tell the iPhone to stop searching<br />for Wi-Fi networks it can connect to..<br />• Turning off the phone, too. In Airplane mode, you shut off both Wi-Fi<br />and the cellular radios, saving the most power of all.<br />• Turning off Bluetooth. If you’re not using a Bluetooth headset, then for<br />heaven’s sake shut down that Bluetooth radio. In Settings, tap General,<br />and turn off Bluetooth.<br />• Turning off GPS. If you won’t be needing the iPhone to track your location,<br />save it the power required to operate the GPS chip and the other<br />location circuits. In Settings, tap General, and turn off Location Services.<br />• Turning off “push” data. If your email, calendar, and address book are<br />kept constantly synced with your Macs or PCs, then you’ve probably gotten<br />yourself involved with Yahoo Mail, Microsoft Exchange<br />or MobileMe . It’s pretty amazing to know that your iPhone is<br />constantly kept current with the mothership—but all that continual sniffing<br />of the airwaves, looking for updates, costs you battery power. If you<br />can do without the immediacy, visit SettingsÆFetch New Data; consider<br />turning off Push and letting your iPhone check for new information, say,<br />every 15, 30, or 60 minutes.adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-88767623789954321282008-09-14T00:36:00.001-07:002008-09-14T00:36:58.432-07:00iPhone’s existenceiIn the first year of the iPhone’s existence, Apple sold 6 million of them;<br />brought the thing to 70 countries; and inspired an industry of misbegotten<br />iPhone lookalikes from other companies. By the end of Year<br />One, you could type iPhone into Google and get 229 million hits.<br />Now there’s a new iPhone, the iPhone 3G. More importantly, there’s a new<br />version of the iPhone’s software, called iPhone 2.0. And then there’s the<br />iPhone App Store, which offers thousands of add-on programs written by<br />individuals, software companies, and everything in between.<br />This is huge. Remember how mystified everyone was when Apple called<br />its music player the iPod—instead of, say, iMusic or iSongs or something?<br />The reason was that Apple had much bigger plans for the iPod—photos,<br />videos, documents, and so on. Maybe they should have saved that name<br />for the iPhone.<br />Yes, the iPhone is still an iPod. And it’s still the best Internet phone you’ve<br />ever seen. It shows fully formatted email (with attachments, thank you)<br />and displays entire Web pages with fonts and design intact. It’s still tricked<br />out with a tilt sensor, proximity sensor, light sensor, Wi-Fi, Bluetooth, and<br />that amazing multitouch screen.<br />Therefore, it’s still a calendar, address book, calculator, alarm clock, stopwatch,<br />stock tracker, traffic reporter, RSS reader, and weather forecaster. It<br />even stands in for a flashlight and, with the screen off, a pocket mirror.<br />But now, thanks to the App Store, the iPhone is a fast, wicked fun pocket<br />computer. All those free or cheap programs can turn it into a medical reference,<br />musical keyboard, time tracker, remote control, voice recorder, tip<br />calculator, e-book reader, and so on. And whoa, those games! Hundreds of<br />them, with smooth 3-D graphics and tilt control.<br />All of this sends the iPhone’s utility and power through the roof. Calling it<br />a phone is practically an insuladamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-32386220608495756482008-09-12T13:51:00.000-07:002008-09-12T13:56:37.164-07:00YawcamThis might be useful for home, small business, or shop owners here that use their webcam for surveillance purposes.<br /><br />What is Yawcam?<br />Yawcam is a shortening for Yet Another WebCAM software, and that's exactly what it is ;-)<br />More precise Yawcam is a webcam software for windows written in java. The main ideas for Yawcam are to keep it simple and easy to use but to include all the usual features.<br /><br />Yawcam is completely free to use! <br /><br />Yawcam features:<br />.: Video streaming<br />.: Image snapshots<br />.: Built-in webserver<br />.: Motion detection<br />.: Ftp-upload<br />.: Text and image overlays<br />.: Password protection<br />.: Online announcements for communities<br />.: Scheduler for online time<br />.: Multi languange<br /><br />Download Link : http://www.ziddu.com/download/2151226/yawcam_install.exe.htmladamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-13132263263779628162008-09-10T12:33:00.000-07:002008-09-10T13:14:40.079-07:00Replacing the Logic Board of your iPodWhen your iPod was young, did life seem so wonderful? A<br />miracle? Was it beautiful? Magical? That’s because the logic<br />board was working perfectly. But logic boards are components<br />like any other, and they go bad from time to time. If yours is<br />making you clinical, cynical, or fanatical because it’s not so<br />logical or dependable (in fact, it’s a vegetable), replacing the<br />logic board is the cure, as we show in this chapter. The cure<br />to Supertramp, however, we have not yet discovered.<br /><br />Check the Signs of a Bad Logic Board<br />The logic board is the brain of your iPod. No joke—your iPod is a miniature<br />computer. The logic board contains the microprocessor as well as the connections<br />to the various other components and systems: the battery, the hard drive or flash<br />memory, the display, the audio, the data ports, and so on. If something goes<br />wrong with your logic board, it’s not unlike massive head trauma in a human.<br />A bad logic board reveals itself in different ways. Your iPod might not turn on,<br />even when you plug it into a charger. If the iPod does turn on, it might show the<br />sad face or the folder icon, or it might freeze on the Apple logo.<br />It’s hard to diagnose a bad logic board from the symptoms alone, because<br />they’re the same symptoms that you get from other problems. Before you<br />decide that the logic board is bad, be sure to rule out other possible causes.<br />For instance, if the iPod doesn’t turn on, check out the battery, or if you get<br />the folder icon, you might want to look into the hard drive or the software.<br />Restoring your iPod in iTunes might do the trick.<br />When you’re reasonably convinced that the other components are in good<br />working order, the logic board looks more and more like the culprit.<br /><div><div><br /><div><br /><div><div><div><div><div><div>To replace the logic board in a first-generation iPod:<br />1. Open the iPod according to the instructions .<br />2. Pull the battery from the back of the hard drive. There is adhesive<br />holding it down.<br />3. Unplug the battery from the logic board</div><br /><div></div><a href="http://3.bp.blogspot.com/_acXeHxpl2Gg/SMgimHtM7pI/AAAAAAAAAQQ/juwY6natkLY/s1600-h/i1.png"><img id="BLOGGER_PHOTO_ID_5244479804371955346" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="http://3.bp.blogspot.com/_acXeHxpl2Gg/SMgimHtM7pI/AAAAAAAAAQQ/juwY6natkLY/s320/i1.png" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><div><img id="BLOGGER_PHOTO_ID_5244480371985594882" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" alt="" src="http://4.bp.blogspot.com/_acXeHxpl2Gg/SMgjHKO1ugI/AAAAAAAAAQY/5-ptk0XC1cg/s320/i2.png" border="0" /><br /><br /></div><br /><div></div><br /><br /><br /><br /><br /><br /><br /><div></div><br /><br /><br /><br /><br /><div>4. Carefully slide the hard drive from the orange hard drive connector.<br />5. Pull the hard drive from the iPod .<br />6. Find the four T6 Torx screws in the logic board. A large piece of rubber covers one of<br />them. Remove this piece of rubber to expose the fourth screw .<br />7. With your T6 Torx screwdriver, remove all four screws</div><br /><br /><div><a href="http://2.bp.blogspot.com/_acXeHxpl2Gg/SMgkVfECQyI/AAAAAAAAAQo/OfZASjLh_ew/s1600-h/i4.png"><img id="BLOGGER_PHOTO_ID_5244481717607220002" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="http://2.bp.blogspot.com/_acXeHxpl2Gg/SMgkVfECQyI/AAAAAAAAAQo/OfZASjLh_ew/s320/i4.png" border="0" /></a></div><a href="http://2.bp.blogspot.com/_acXeHxpl2Gg/SMgjxytwuRI/AAAAAAAAAQg/qUTdzQVPqOg/s1600-h/i3.png"><img id="BLOGGER_PHOTO_ID_5244481104407214354" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" alt="" src="http://2.bp.blogspot.com/_acXeHxpl2Gg/SMgjxytwuRI/AAAAAAAAAQg/qUTdzQVPqOg/s320/i3.png" border="0" /></a><br /><br /><br /><br /><br /><div></div><br /><br /><br /><br /><br /><div></div><br /><br /><br /><br /><br /><div></div><br /><br /><br /><br /><div><a href="http://3.bp.blogspot.com/_acXeHxpl2Gg/SMglsT5TIJI/AAAAAAAAAQw/E4nAsNdq48k/s1600-h/i5.png"><img id="BLOGGER_PHOTO_ID_5244483209258016914" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="http://3.bp.blogspot.com/_acXeHxpl2Gg/SMglsT5TIJI/AAAAAAAAAQw/E4nAsNdq48k/s320/i5.png" border="0" /></a><br /><br />4. Carefully slide the hard drive from the orange hard drive connector.<br />5. Pull the hard drive from the iPod .<br />6. Find the four T6 Torx screws in the logic board. A large piece of rubber covers one of<br />them. Remove this piece of rubber to expose the fourth screw .<br />7. With your T6 Torx screwdriver, remove all four screws<br /><br /><br /></div><br /><div></div><a href="http://2.bp.blogspot.com/_acXeHxpl2Gg/SMgnj4rsYpI/AAAAAAAAARA/CdBmryI7TCQ/s1600-h/i7.png"><img id="BLOGGER_PHOTO_ID_5244485263537496722" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="http://2.bp.blogspot.com/_acXeHxpl2Gg/SMgnj4rsYpI/AAAAAAAAARA/CdBmryI7TCQ/s320/i7.png" border="0" /></a><br /><br /><br /><br /><br /><div></div><br /><br /><br /><br /><div></div><br /><br /><br /><br /><br /><a href="http://1.bp.blogspot.com/_acXeHxpl2Gg/SMgqLT8pvOI/AAAAAAAAARY/tezYJz_w1UU/s1600-h/i8.png"><img id="BLOGGER_PHOTO_ID_5244488139894537442" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="http://1.bp.blogspot.com/_acXeHxpl2Gg/SMgqLT8pvOI/AAAAAAAAARY/tezYJz_w1UU/s320/i8.png" border="0" /></a><br /><br /><div></div><br /><br /><br /><br /><br /><div></div><br /><br /><br /><br /><br /><div><a href="http://2.bp.blogspot.com/_acXeHxpl2Gg/SMgmtLybZnI/AAAAAAAAAQ4/jn9otlZuKhc/s1600-h/i6.png"></a></div></div></div></div></div></div></div></div></div>adamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-15622509389799827672008-09-09T12:32:00.000-07:002008-09-09T12:44:14.789-07:00My Ferrari 4000 Series Laptop<img id="BLOGGER_PHOTO_ID_5244106972363136402" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="http://4.bp.blogspot.com/_acXeHxpl2Gg/SMbPgcPanZI/AAAAAAAAAQI/gNmU5aNxHmw/s320/acer+ferrari+4000.gif" border="0" /><a href="http://1.bp.blogspot.com/_acXeHxpl2Gg/SMbPaviq75I/AAAAAAAAAQA/MffRc8oXOI4/s1600-h/acer+ferrari+back.gif"><img id="BLOGGER_PHOTO_ID_5244106874464956306" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="http://1.bp.blogspot.com/_acXeHxpl2Gg/SMbPaviq75I/AAAAAAAAAQA/MffRc8oXOI4/s320/acer+ferrari+back.gif" border="0" /></a><br />Acer goes from the brilliant red design of the Acer Ferrari 3000 to a more conservative—but just as sleek—black checkered design. It retains some of the cool-looking red streaks along the side and front edge of the notebook, and yes, the yellow prancing horse emblem still graces the center of the notebook. The cover is made from carbon fiber, which is stronger and lighter than aluminum. (Acer uses it only in its Ferrari line.) The interior of the Ferrari 4000 has a rubberized coating, perhaps emulating the look of Formula One tires. The keyboard has an ergonomic smile contour to it, which is okay for typing but takes a few minutes to get used to. The only real design complaint we have is that the mouse buttons are a bit noisy when pressed.<br /><br />Though not as eye-popping as many of today's specially treated screens, such as the Editors' Choice-winning HP Pavilion dv4000's ($1429) BrightView screen, the Ferrari's 15.4-inch LCD is vivid enough for movie watching, even with the matte finish, thanks to its high resolution (1,680-by-1,050).<br /><br />The 6.6-pound Ferrari 4000 comes with a good feature set, including four USB ports, a FireWire port, and a 5-in-1 card reader (MMC, MS, MS Pro, SD, XD). Video connections include both VGA and DVI-D ports. Built-in Bluetooth and Wi-Fi 802.11g are included, as is a dual-layer DVD±RW drive. The Toshiba Qosmio F25 ($1, 999) has a greater range of AV ports, including a TV tuner. The Ferrari 4000 also comes with an impressively large and fast 100GB hard drive (5,400 rpm). Many of today's notebook hard drives, like the 80GB drive (4,200 rpm) found in the HP dv4000, are smaller and slower.<br /><br />With hardware like the 1.8-GHz Turion 64 ML-34 processor, double the memory (1GB DDR RAM), and a faster hard drive, the Ferrari 4000 edged out the HP dv4000 on our SYSmark 2004 tests. The Ferrari 4000's terrific graphics chipset trounced the dv4000's integrated Intel chipset and helped the system achieve impressive gaming results. Battery life reached 3 hours 43 minutes, thanks mostly to the 71-Wh battery.<br /><br />The Acer Ferrari 4000 has a great new look, and new hardware under the hood makes it purr. It's only a matter of time before Jeff Gordon and Danica Patrick get their hands on one.<br /><br /><br /><br />Acer Inc.<br /><br />http://www.acer.com<br /><br /><br />Type: Gaming, General Purpose, Media<br />Operating System: MS Windows XP Professional<br />Processor Name: Mobile AMD Turion 64 ML-34<br />Processor Speed: 1.8 GHz<br />RAM: 1 GB<br />Weight: 6.6 lb<br />Screen Size: 15.4 inches<br />Screen Size Type: widescreen<br />Graphics Card: ATI Radeon x700<br />Storage Capacity: 100 GB<br />Networking Options: 802.11g<br />Primary Optical Drive: Dual-Layer DVD+/-RWadamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0tag:blogger.com,1999:blog-4640167395536873576.post-57678526442888671742008-09-09T09:34:00.000-07:002008-09-09T09:36:13.323-07:00Keyboard shortcuts for WindowsWindows system key combinations<br />• F1: Help <br />• CTRL+ESC: Open Start menu <br />• ALT+TAB: Switch between open programs <br />• ALT+F4: Quit program <br />• SHIFT+DELETE: Delete item permanently <br /><br /><br />Windows program key combinations<br />• CTRL+C: Copy <br />• CTRL+X: Cut <br />• CTRL+V: Paste <br />• CTRL+Z: Undo <br />• CTRL+B: Bold <br />• CTRL+U: Underline <br />• CTRL+I: Italic <br /><br /><br /><br />Mouse click/keyboard modifier combinations for shell objects<br />• SHIFT+right click: Displays a shortcut menu containing alternative commands <br />• SHIFT+double click: Runs the alternate default command (the second item on the menu) <br />• ALT+double click: Displays properties <br />• SHIFT+DELETE: Deletes an item immediately without placing it in the Recycle Bin <br /><br /><br />General keyboard-only commands<br />• F1: Starts Windows Help <br />• F10: Activates menu bar options <br />• SHIFT+F10 Opens a shortcut menu for the selected item (this is the same as right-clicking an object <br />• CTRL+ESC: Opens the Start menu (use the ARROW keys to select an item) <br />• CTRL+ESC or ESC: Selects the Start button (press TAB to select the taskbar, or press SHIFT+F10 for a context menu) <br />• ALT+DOWN ARROW: Opens a drop-down list box <br />• ALT+TAB: Switch to another running program (hold down the ALT key and then press the TAB key to view the task-switching window) <br />• SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the automatic-run feature <br />• ALT+SPACE: Displays the main window's System menu (from the System menu, you can restore, move, resize, minimize, maximize, or close the window) <br />• ALT+- (ALT+hyphen): Displays the Multiple Document Interface (MDI) child window's System menu (from the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window) <br />• CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI) program <br />• ALT+underlined letter in menu: Opens the menu <br />• ALT+F4: Closes the current window <br />• CTRL+F4: Closes the current Multiple Document Interface (MDI) window <br />• ALT+F6: Switch between multiple windows in the same program (for example, when the Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and the main Notepad window) <br /><br /><br />Shell objects and general folder/Windows Explorer shortcuts<br />For a selected object: • F2: Rename object <br />• F3: Find all files <br />• CTRL+X: Cut <br />• CTRL+C: Copy <br />• CTRL+V: Paste <br />• SHIFT+DELETE: Delete selection immediately, without moving the item to the Recycle Bin <br />• ALT+ENTER: Open the properties for the selected object <br /><br />To copy a file<br />Press and hold down the CTRL key while you drag the file to another folder. <br />To create a shortcut<br />Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder. <br />Back to the top<br /><br />General folder/shortcut control<br />• F4: Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer) <br />• F5: Refreshes the current window. <br />• F6: Moves among panes in Windows Explorer <br />• CTRL+G: Opens the Go To Folder tool (in Windows 95 Windows Explorer only) <br />• CTRL+Z: Undo the last command <br />• CTRL+A: Select all the items in the current window <br />• BACKSPACE: Switch to the parent folder <br />• SHIFT+click+Close button: For folders, close the current folder plus all parent folders <br /><br /><br />Windows Explorer tree control<br />• Numeric Keypad *: Expands everything under the current selection <br />• Numeric Keypad +: Expands the current selection <br />• Numeric Keypad -: Collapses the current selection. <br />• RIGHT ARROW: Expands the current selection if it is not expanded, otherwise goes to the first child <br />• LEFT ARROW: Collapses the current selection if it is expanded, otherwise goes to the parent <br /><br /><br />Properties control<br />• CTRL+TAB/CTRL+SHIFT+TAB: Move through the property tabs <br /><br /><br />Accessibility shortcuts<br />• Press SHIFT five times: Toggles StickyKeys on and off <br />• Press down and hold the right SHIFT key for eight seconds: Toggles FilterKeys on and off <br />• Press down and hold the NUM LOCK key for five seconds: Toggles ToggleKeys on and off <br />• Left ALT+left SHIFT+NUM LOCK: Toggles MouseKeys on and off <br />• Left ALT+left SHIFT+PRINT SCREEN: Toggles high contrast on and off <br /><br /><br /><br />Microsoft Natural Keyboard keys<br />• Windows Logo: Start menu <br />• Windows Logo+R: Run dialog box <br />• Windows Logo+M: Minimize all <br />• SHIFT+Windows Logo+M: Undo minimize all <br />• Windows Logo+F1: Help <br />• Windows Logo+E: Windows Explorer <br />• Windows Logo+F: Find files or folders <br />• Windows Logo+D: Minimizes all open windows and displays the desktop <br />• CTRL+Windows Logo+F: Find computer <br />• CTRL+Windows Logo+TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray) <br />• Windows Logo+TAB: Cycle through taskbar buttons <br />• Windows Logo+Break: System Properties dialog box <br />• Application key: Displays a shortcut menu for the selected item <br /><br />Microsoft Natural Keyboard with IntelliType software installed<br />• Windows Logo+L: Log off Windows <br />• Windows Logo+P: Starts Print Manager <br />• Windows Logo+C: Opens Control Panel <br />• Windows Logo+V: Starts Clipboard <br />• Windows Logo+K: Opens Keyboard Properties dialog box <br />• Windows Logo+I: Opens Mouse Properties dialog box <br />• Windows Logo+A: Starts Accessibility Options (if installed) <br />• Windows Logo+SPACEBAR: Displays the list of Microsoft IntelliType shortcut keys <br />• Windows Logo+S: Toggles CAPS LOCK on and off <br /><br /><br />Dialog box keyboard commands<br />• TAB: Move to the next control in the dialog box <br />• SHIFT+TAB: Move to the previous control in the dialog box <br />• SPACEBAR: If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option, this selects the option. <br />• ENTER: Equivalent to clicking the selected button (the button with the outline) <br />• ESC: Equivalent to clicking the Cancel button <br />• ALT+underlined letter in dialog box item: Move to the corresponding itemadamhttp://www.blogger.com/profile/17978617778241507120noreply@blogger.com0