Tuesday, May 31, 2016

Assembly Language

,
This is a quick tutorial on Assembly Language and some related lab work I got from my TA way back when and have edited: Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%;...
Read more

Monday, May 30, 2016

Ethical Hacking Tutorial By Justprogramming

,
A complete series of hacking tutorials for those who wants to learn ethical hacking. The course is starting from scratch level. There is no prerequisite to attend this course.SHARE BY GKComputer Knowle...
Read more

Focus Areas for Policy Standards Research Proposals

,
Posted by Vint Cerf, VP & Chief Internet EvangelistTwice a year, Google’s Faculty Research Awards program seeks and reviews proposals in 23 research areas, assigning to each area a group of experienced Googlers who assess and deliberate over which proposals we should and can fund. With each call for proposals, we receive a wide array of research ideas in fields that fall within the realm of Internet policy.We would like to share with you the areas of Internet policy in which we are particularly interested to see progress and stimulate further research:Accessibility: Google is committed to supporting research that generates insights about what helps make technology a usable reality for everyone,...
Read more

Sunday, May 29, 2016

The Complete Wireshark Tutorial Installing on Linux Basic Networking Functions Packet Analysis By JerryBanfield

,
You can learn Wireshark for free using this Wireshark tutorial showing how to go from just getting started with basic networking terms to capturing packets in less than two hours! See more below to find everything included in this tutorial. This is a free preview from the Complete Wireshark Course on Udemy at https://jerrybanfield.com/udemy.Introduction to Wireshark for beginners. Basic networking terms and concepts.OSI model: What it is, different layers, and why is it important to understand.Wireshark installation and setup in a Linux environment.Introduction to the Wireshark interface.Exploring more into the Wireshark interface and understanding the output.Protocol filters in Wireshark.How...
Read more

HD Autumn Nature Wallpapers for Desktop

,
To save the image, first click to enlarge the image, then right-click on it and click on Save Image As.. or simply right-click on the thumbnail and click on Save Link AS..Note: all are high resolution images greater than 1024 x 728 ...
Read more

Google Faculty Research Awards Winter 2015

,
Posted by Maggie Johnson, Director of Education and University RelationsWe have just completed another round of the Google Faculty Research Awards, our biannual open call for research proposals on Computer Science and related topics, including systems, machine perception, structured data, robotics, and mobile. Our grants cover tuition for a graduate student and provide both faculty and students the opportunity to work directly with Google researchers and engineers.This round we received 808 proposals, an increase of 12% over last round, covering 55 countries on 6 continents. After expert reviews and committee discussions, we decided to fund 122 projects, with 20% of the funding awarded to universities...
Read more

Saturday, May 28, 2016

StarWars Movie in Command Prompt

,
Just type in telnet towel.blinkenlights.nl in the Run command and watch the episo...
Read more

How To Install An App On Windows 10 In Hindi By Kya Kaise

,
How To Install An App On Windows 10 In Hindi By Kya Kaise.SHARE BY GKComputer Knowle...
Read more

The Japanese accept the US challenge

,
Recently I blogged about a challenge from a US mega robot manufacturer to participate in a duel with a Japanese robot company. Well the Japanese have accepted the challenge and it looks like the rumble is on! Watch this space. from The Universal Machine http://universal-machine.blogspot.com/ Put the internet to work for you. Delete or edit this Recipe...
Read more

Outlook 2007 Messages Will Not Leave Outbox

,
For some reason my Outlook decided to start acting flaky. After posting a quick lament on Twitter mjolinor asked a few questions.  Once he determined it was sending/receiving fine he asked me if I had it set in Cached mode. Seeing as I had no idea what that was I found this link:In Outlook, what is Cached Exchange Mode, and how do I enable or disable it?For posteritys sake Ill copy the content here in case that link changes:Cached Exchange Mode, available in Outlook 2010, 2007, and 2003, is similar to offline folders in previous versions of Outlook, though easier to use. (For more, see In Microsoft Outlook for Windows, what are offline folders, and how do I enable and disable them?)...
Read more

Friday, May 27, 2016

IBM spends 3 billion to push the far future of computer chips

,
IBM has announced that it is investing $3 billion over the next five years to develop processors with much smaller, more tightly packed electronics than todays chips, and to sustain computing progress even after todays manufacturing technology runs out of steam. The problem is we are just physically finding it impossible to miniaturise silicon chips any more (no pun intended). Read this Cnet article to learn more. from The Universal Machine http://universal-machine.blogspot.com/ Put the internet to work for you. Turn off or edit this Recipe Recommended for you ...
Read more

PowerShell v3 in a Year Day 2 Where Object

,
Topic: Where-ObjectAlias: ?, where? is an alias for the Where-Object cmdlet in PowerShell. As noted in the help, Where-Object "[s]elects objects from a collection based on their property values." In version 2 PowerShells Where-Object only had 10 parameters, but, since one of these was the set of 8 common parameters, it was really 2.FilterScriptInputObjectCommonParameters (the usual 8 suspects)Most of the time, you used Where-Object with a pipeline and put some sort of comparison operator in the FilterScript. For instance, if you wanted to see if a file existed in a folder you could use this approach where the pipelined object was the InputObject,dir | Where {$_.name -eq index.dat}In version...
Read more

PowerShell v3 in a Year Day 11 Rename Item

,
Topic: Rename-Item
Alias: ri, ren


In cmd.exe the equivalent command to Rename-Item was simply ren. Nicely enough, ren still works as an alias for the Rename-Item cmdlet, but, there are a few more bells and whistles in PowerShell. For example, ren, in cmd.exe gives us this for help:
Renames a file or files.

RENAME [drive:][path]filename1 filename2.
REN [drive:][path]filename1 filename2.

Note that you cannot specify a new drive or path for your destination file.
Hardly the most verbose help Ive ever seen. In PowerShell, you get the following:
SYNOPSIS
    Renames an item in a Windows PowerShellprovider namespace.


SYNTAX
    Rename-Item[-Path] <String> [-NewName]<String>[-Credential <PSCredential>] [-Force[]][-PassThru []][-Confirm ]][-WhatIf []][-UseTransaction    []][]

    Rename-Item[-NewName] <String> [-Credential<PSCredential>][-Force ]][-PassThru[]]-LiteralPath <String> [-Confirm[]] [-WhatIf []][-UseTransaction []][]


DESCRIPTION
    The Rename-Item cmdletchanges thename ofa specifieditem. Thiscmdlet doesnot affectthe contentof theitem beingrenamed.

    You cannot useRename-Item tomove anitem,such asby specifyinga pathalong withthe newname. Tomove andrename anitem,use theMove-Item cmdlet. 
Somewhat more robust, but, still spare at times. To give insight into the main elements of the cmdlet, I will go through the parameters one by one.

-Path
Specifies thepath tothe itemto rename.

Required?                    true
Position?                    1
Default value
Accept pipelineinput?       true(ByValue, ByPropertyName)
Accept wildcardcharacters?  false
Path simply indicates the location of the item to be renamed. This cannot be omitted, unless you are passing items via the pipeline as it accepts pipeline input both ByValue and ByPropertyName. Quite simply, this tells me what I am renaming by file path.

-NewName
Specifies thenew nameof theitem. Enteronly aname,not apath andname. Ifyou entera paththat isdifferent fromthe path that is specified inthe Pathparameter,Rename-Item generatesan error.To renameand movean item, use the Move-Itemcmdlet.

You cannotuse wildcardcharacters inthe valueof NewName.To specifya namefor multiplefiles,use theReplace operatorin aregular expression.For moreinformation aboutthe Replaceoperator,type "get-help about_comparison_operators". For a demonstration,see theexamples.

Required?                    true
Position?                    2
Default value
Accept pipelineinput?       true(ByPropertyName)
Accept wildcardcharacters?  false
NewName is precisely what it indicates, the new name to be used in place of the old file name. As noted in the help, do not enter the path, merely the file name. Again, this is a required argument. One thing I have found here is to call various aspects of the original file name, such as basename, name, etc, with a pipelined object. This allows you to manipulate the file in clever ways at times. It takes a little experimentation to figure out just how to tweak things this way, but, it is a very useful technique. Take, for example, this scenario: I have a set of files in a directory for which I want to use the base name (that is the file name without the extension), but, I want to add in an incremented, zero-filled integer value along with a new extension. I might accomplish this as shown below:
$counter = 0;
Get-ChildItem -Path C:Directory* |
ForEach-Object {
    $Counter++;
    Rename-Item-Path $_.fullname -NewName ("$($_.BaseName)_{0:0000}.tif" -f $counter)
}
When this runs it will take a file name, lets say DCIM_1247.JPG, extract the basename (DCIM_1247), increment the counter to 1, then, pass the new integer value via the format specifier to the placeholder to generate a new file, DCIM_1247_0001.tif. This is a stilted example, but, can give an idea of how you can make some interesting manipulations in flight.

-Credential
Specifies auser accountthat haspermission toperform thisaction. Thedefault isthe currentuser.

Type auser name, such as "User01"or "Domain01User01", or enter a s.PSCredential object, such as one generated by the Read more
 

Computer Info Copyright © 2016 -- Powered by Blogger