Friday 31 December 2010

Read the following lines of code. It will read the mask register from port 0x21 and then set the 1st bit in the register. As soon as it is written back to port 0x21; IRQ 0 which is derived by a timer device will be disabled

Question#2

Read the following lines of code. It will read the mask register from port 0x21 and then

set the 2nd bit in the register. As soon as it is written back to port 0x21; Keyboard will be

disabled that is connected to IRQ1.

in al, 0x21 ; read interrupt mask register

or al, 2 ; set bit for IRQ1

out 0x21, al ; write back mask register

Take out line 2 i.e.

or al, 2

modify it to solve the following parts

1. set bit to disable IRQ7

Sol:

or al, 128

Differentiate Synchronous and Asynchronous interrupts. Just give 2 to 3 differences also provide 1 to 2 examples.

Interrupts are asynchronous and unpredictable. Asynchronous means that the interrupts occur, independent of the working of the processor, i.e. independent of the instruction currently executing. Synchronous events are those that occur side by side with another activity. Interrupts must be asynchronous as they are generated by the external world which is unaware of the happenings inside the processor.

Monday 27 December 2010

How to Read 12 Digit UPC Barcode




Most bar codes in the US are 12-digit UPC (Universal Product Code) barcodes, with ten digits at the bottom of the code and one small number to each side. Impress your friends by asking them to select a random item from the kitchen with a removable label and cut the numbers off of the UPC barcode; you can then proceed to read the numbers encoded in the lines.



Saturday 18 December 2010

Norton Partition Magic 8.05 Download



Norton Partition Magic 8.05 allows you to copy, move, resize, split, or merge partitions as needed without losing data. Intuitive Windows -based browser lets you find, copy and paste files in both Windows and Linux partitions

Norton Utlilites 2010 v14.5.0



Norton Utilities is an application suite which integrates registry scanning, privacy cleaning and computer management. Using Norton Utilities,
you can safely repair the Windows registry, permanently erase all traces of your online and computer activities, as well as monitor and tune
your system for optimal performance.

Key Technologies:

* Disk Cleaner
* Disk Bleacher
* Startup Manager
* Registry Defragmenter
* Registry Cleaner
* Service Manager
* Disk Cleaner
* Disk Bleacher
* Startup Manager
* Registry Defragmenter
* Registry Cleaner
* Service Manager
* System Optimizer
* Performance TestT*

Key Benefits:

* Finds and fixes PC problems with one click-Automatically detects and fixes Microsoft? Windows? issues so you can spend more time
using your PC and less time troubleshooting.
* Speeds up PC boot time -Accelerates PC boot time and reduces unnecessary waiting by prioritizing startup applications.
* Reclaims PC memory-Optimizes the registry for quicker application launch and a faster running PC.
* Frees up hard disk space-Boosts overall PC performance by defragging your hard drive, freeing up storage space, and recouping system
resources.
* Protects your personal information-Permanently deletes unwanted sensitive files from your PC so hackers can't access your data.
* Helps prevent system errors-Undoes erroneous registry tasks and commands to help keep your PC running error-free.
* Benchmarks your PC's performance-Determines whether your PC is performing at its best by benchmarking it against similar systems.

(OS: Windows 7/XP/Vista)

Download Link:

http://www.mediafire.com/?rnt0bl5y15hu2e3

Google Earth Pro 5.0.11733



Google Earth Pro is the professional and advanced version of the famous map in real time on Google.Not surprisingly, occupies more space than the free version and is more oriented toward professional environments, rather than the domestic sphere.

Some of the areas in which Google Earth Pro is unlike the free version is that it allows more details from GPS devices using GPS or files. GPX or. LOC, the functions called 'Draw Path' and 'Draw Polygon', or the possibility making 'geocoding' with the addresses of the streets, bringing in a file. CSV.

Download Link:

http://www.mediafire.com/?dawzino3gk3m7hw

Thursday 16 December 2010

Avast 4.8 PROFESIONAL Full with Life Time Keygen



Avast! Professional Edition description

Complete ICSA certified antivirus package for small office, home office - SOHO

avast! Professional Edition is a complete ICSA certified antivirus package for small office home office use - SOHO.

Protect your system and valuable data against computer viruses with Avast! Professional Edition.

avast! 4 Professional Edition is a collection of award winning, high-end technologies that work in perfect synergy, having one common goal: to protect your system and valuable data against computer viruses. It represents a best-in-class solution for any Windows-based workstation. This page demonstrates its most important features and provides links to further resources.

NOTE:
This product cannot be installed on a server operating system (Windows NT/2000/2003 Server families).

Here are some key features of "Avast! Professional Edition":

? Antivirus kernel
? Automatic updates
? Simple User Interface
? PUSH updates
? Enhanced User Interface
? Virus Chest
? Resident protection
? System integration
? Script blocker
? Command-line scanner
? P2P and IM Shields
? Integrated Virus Cleaner
? Network Shield
? Support for 64-bit Windows
? Web Shield
? Internationalization

Requirements:

? For a computer running Windows 95/98/Me: 486 Processor, 32MB RAM and 50MB of free hard disk space.
? For a computer running Windows NT 4.0: 486 Processor, 24MB RAM and 50MB of free hard disk space and Service Pack 3 (or higher) installed
? For a computer running Windows 2000/XP Workstation (Not Server): Pentium class Processor, 64MB RAM (128MB recommended) and 50 MB of free hard disk space
? For a computer running Windows XP 64-bit Edition: An AMD Athlon64, Opteron or Intel EM64T-enabled Pentium 4 / Xeon processor, 128MB RAM (256MB recommended) and 50 MB of free hard disk space
? For a computer running Windows Vista: Pentium 4 processor, 512MB RAM and 50 MB of free hard disk space
? The program itself requires about 20MB of hard disk space; the remainder of the recommended space is reserved for the virus recovery database file and its index (VRDB, also known as the "integrity database" from the previous version).
? A functional MS Internet Explorer 4 or higher is required for the program to work

Download Link:

http://www.mediafire.com/?7s4pjy276w0c286

McAfee® Total Protection 2010 Full Working



Ultimate, award-winning PC and online security for total peace of mind

Ingredients

* Anti-virus
* Anti-spyware
* Anti-spam
* Anti-phishing
* Two-way Firewall
* Website Safety Ratings
* Identity Protection
* Parental Controls
* Data Backup
* BONUS! McAfee Anti-Theft

Upgrading your operating system can be frightening, especially when you don't know if your old software is compatible. That's why we've been working hard to ensure that McAfee® Total Protection software is compatible with the new Windows 7 operating system. Even if you've recently purchased a McAfee product, automatic updates keep your software up to date which means when you're ready for Windows 7, McAfee is ready for you! So you can relax and put your mind at ease knowing that we've got you covered.

Download Link:

http://www.mediafire.com/?vbb9hmtogms

Perfect Optimizer v5.2.6.335 Portable

Perfect Optimizer v5.2.6.335 Portable | 7.6 MB.
Perfect Optimizer is a new technology which will optimize the speed of PC and fix computer errors. There are a lot of problems in the computer used for a period of time marked by slow speed, the blue screen, deadlock errors and so on. Various annoying problems will gradually increase.

It is easy to use Perfect Optimizer
Anyone can easily use the power functions of the Perfect Optimizer? Only click on the button of "Start Scan","Fix Errors","Clean" etc. according to the messages displayed.

Download Link:

http://www.mediafire.com/?0z7a3dkb37wxiui

Avast! Internet Security 5.0.677



Avast! provides a package of applications that aim to protect your computer from a possible virus infection or other malware threat. If you use it correctly, and in combination with other programs such as data backup utilities, it will significantly reduce the risk of your computer being attacked or infected by a virus, and thus the risk of losing important or private data.
The Avast! Internet Security application comes with an antispam filter and built-in firewall. Once installed, avast! runs silently in the background to protect your computer against all known forms of malware. You dont need to do anything else - just install and forget! Active internet users need greater protection for themselves as they shop and bank on-line. To secure against threats from infected web sites and the growing risk of identity theft, avast internet security provides you with continuous protection from its layers of antivirus, anti-spyware, anti-rootkit protection, firewall and antispam.

Real-time shields. The real-time shields are the most important part of the program, as they are working continuously to prevent your computer from becoming infected. They monitor all your computers activity, checking all programs and files in real-time - i.e. at the moment a program is started or whenever a file is opened or closed.

Virus Chest. The virus chest can be thought of as a folder on your hard disk with special properties, that make it a safe, isolated place for storing potentially harmful files. You can work with the files in the virus chest, with some security restrictions.

avast! antispam filter. avast! Internet Security includes a fully integrated antispam filter to detect unwanted email.
Spam delivered to your mailbox can result in your mailbox quickly becoming full, as a result which, legitimate emails may not be received. It can also unnecessarily increase the load on the email server, internet connection, local networks etc.

Firewall. avast! Internet Security includes a fully integrated firewall which can be controlled directly from the avast! user interface.
The firewall monitors all communication between your computer and the outside world and blocks unauthorized communication based on a number of "allow" and "deny" rules. In this way, the firewall can prevent sensitive data from leaving your computer and can also block attempted intrusions by external hackers

Command-line scanner. The ashCmd program uses the same avast! scanning engine to detect potential malware infections so the results are exactly the same as running a scan via the normal program interface. The avast! command-line scanner, ashCmd.exe, is normally installed in the directory C:Program FilesAlwil Softwareavast5.
A scan is run from the command prompt using various switches and parameters. To see a description of the parameters, locate the ashCmd file and double click on it. This will open a new window in which the various parameters are displayed.

* Continuous protection against viruses and spyware
* Ensures all mails sent and received are clean
* Keeps you protected from "chat" infections
* Stops attacks from hijacked websites
* Lets you safely browse suspicious websites or run unknown applications
* Blocks hacker attacks to protect your identity
* Keeps your mailbox free from spam
* Allows safe and uninterrupted gaming
* Compatible with Windows XP, Vista and 7

Key technologies:

* Improved Antivirus and anti-spyware engine
* New avast! Sandbox
* New Silent Firewall
* New Antispam
* NewBehavior Shield
* New avast! Intelligent Scanner
* New Silent/Gaming Mode
* Real time anti-rootkit protection
* avast! Community IQ
* Behavioral Honeypots
* Smart virus updates
* Green computing
* avast! iTrack
* File System / Mail Shield
* Web Shield
* IM / P2P Shield
* Network Shield
* Script Shield

Download:

http://www.mediafire.com/?kvrwndria1o

TuneUp Utilities 2010 9.0.4700.23 With Serial Key


If your MS Windows computer’s performance is a far cry from how it was maybe a month ago, you may need to tune it up using TuneUp Utilities 2010. If you are wondering if this software is the real deal, you need not do anything but count the number of awards TuneUp Utilities got from well known and well respected computer authorities.

Fine Tune your Windows system settings with TuneUp Utilities. TuneUp Utilities optimizes the performance of your Windows computer, solves problems and helps you to customize your system. Keep your PC in top shape: With only one click, you maintain your computer and provide more stability, Disable unneeded processes and concentrate all the PC processing power on your active program, Give your Windows a new look: cool new boot screens, icons, and animations, Get the maximum from your PC and experience top speed for your work and games.

Download:

http://www.mediafire.com/?t32l46cn3g53mi3

Telnet Hacking

I am not responsible for misuse of this information.

This article describes how computer networks can be hacked remotely using telnet.  It will give you the basic idea behind how this is done.

Hackers always do things remotely. One of the oldest and most efficient ways is telnet. For the purpose of making this easy to understand, lets assume the following. A hacker located at point 1 in Georgia wants to hack a computer system located in Canada (point 5). In order to reduce his/her chances of getting caught, the hacker would pick a public place in georgia to start from. This place would be somewhere that is accessible to everyone such as a library. The hacker would then open telnet and remotely login to a computer system (point 2) in Oregon. Next he/she will spawn a connection to another machine or network (point 3) located in Nebraska. Next, the hacker will make a huge jump and make another connection overseas to network in Poland (point 4). Finally, the hacker goes in for the kill and Connects to their target network located in Canada (point 5), and does some damage.


What Happens Next?


Wednesday 15 December 2010

Xp auto log OFF

If you are facing problem that when you click login your computer logs off automatically. it is due to virus to solve this problem do the following.

Edit following values and type the correct path of shell :

Shell = explorer.exe
Userinit=X:\windows\system32\userinit.exe

NOTE: These files may also be deleted by spywares. You may need to extract them using Windows CD.

Steps for rectifying this problem:


Log on to a networked computer.
Run Regedit.exe
Point your cursor to HKEY_LOCAL_MACHINE
Select File > Connect Remote Registry
Type computer name (infected computer)
Navigate to the following location in registry of destination or infected computer


HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon


Edit these two values in right pane:

Shell
Userinit


Change these two values to
Shell=explorer.exe
Userinit = x:\windows\system32\userinit.exe
Exit from Registry
Restart Infected computer.
You should be able to log on to computer.
if it not work then go to back steps and just copy orwrite the file userinit.exe

workded successfully tested 100 percent gauranted

Shutdown Your System Faster with these Simple tweaks

Is your system shutting down too slow ? With a few registry tweaks the system can be shut down far more faster. Check  these registry tweaks for faster System Shutdown.The results are quite impressive

Backup and Restore Registry In Windows 7, XP and Vista

There are several tweaks or tricks that need editing registry values. But registry values being a key part in Windows operations needs careful handling. If you screw it up doing something else, it is really tedious to revert back to the older settings. So, we recommend all tweak-lovers and geeks (to recommend their readers) to follow these simple steps to create a backup your registry before making a any changes to it, so, that you have a way-out of an unintentional mess.

Start up Xp faster with a simple registry tweak

Windows Xp can be configured to load a lot faster with a simple registry tweak

Steps :

1.Open Run from the Start Menu and type”regedit“(without quotations).After that press OK which will open the Registry Editor.

2.Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ContentIndex in the left pane and look for StartupDelay. Change the default value from 4800000 to 50000 and reboot your computer for the changes to take effect.

After this your System will start much faster.If you face any difficulties please write to me in the Comments.

Disclaimer: It is not recommended to edit the registry without proper Knowledge. I don't guarantee that this will work for everyone.Do this at your own Risk.

Use Windows 7 and Vista For 1 Year Without Activation

If all other possible ways to activate Windows has failed, you are left with only one which is to activate windows by phone. What if that also has failed somehow? Here is a nice registry (as well as a command line) trick to postpone Windows activation for 1 year or just to say, use Windows without activating it.

Monday 13 December 2010

Change case

Here's a tip that will change your text to ALL CAPS, all lowercase, sentence format and others. This can be done by highlighting the text you want to have this change, and then go to Format->Change Case and choose one of the options. Another, quicker, way of doing this is to highlight the desiblue text and then press Shift + F3 (the function key all the way on top of keyboard). Keep pressing it until you get the desiblue result. Try it out!

Make a scrap note

This tip will save a scrap note from a word document. If you have a word or paragraph in the document (say a famous quote), you can first highlight it, then drag and drop it onto your desktop. Make sure you have shrinked the window size of Word (press the middle button on the upper right corner). Once you have dragged and dropped the highlighted text on the desktop, a scrap document will be created. You can later use it.

Clean out files in Prefetch Folder

There are files located in the Prefetch folder (C:\Windows\Prefetch) that you may safely delete. These files are usually left there by other programs that were using. By Deleting all the items in this folder your computer speed increases.

Shutdown Windows Faster

All versions of Windows have the same problem. It usually takes a little longer to shutdown when you have the Exit Sound enabled. To disable this go to Start->Settings->Control Panel->Sounds and Audio Devices->Sounds. Scroll down and look for Exit Windows. Click on it once and then under Sounds, choose None. You should see faster shutdown times.

Remove MSN Instant Messenger Program

Some of us just don't like to use this IM program. I myself have looked in the Add/Remove Program panel and can't find any way to remove it there. I found out how to do it with a little research. Just go to Start->Run and type in rundll32 setupapi,InstallHinfSection BLC.Remove 128 %SystemRoot%\INF\msmsgs.inf and hit ENTER. Do a copy and paste to avoid typographical errors.

Welcome to VU Jungle

Welcome to VU Jungle Here you will find useful Information to enhance the speed of you PC. Tips and Tricks also see Video Lectures

Twitter Delicious Facebook Digg Stumbleupon Favorites More