Friday, February 8, 2008
If you share your Windows XP.Professional system with many other users, you have no doubt experienced how pressing Ctrl+Alt+Del results in the name of the last user logged on to be displayed automatically in the username portion of the logon box. While this is great if you were the last one to log on, it can be frustrating if you weren’t. More often than not, users won’t even bother looking at the username portion of the box and just type their password, resulting in a failed logon.
To address this issue, you may want to consider disabling the automatic display of the last user’s name in the logon dialog box. This is accomplished via a Registry edit. To ensure that the user portion of the logon box remains unpopulated, follow these steps:
1. Click Start > Run. Type Regedit.exe in the Open text box and click OK.
2. Browse to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System
3. Right click in the right-hand side of the screen and select New > DWORD value. Name the value DontDisplayLastUserName.
4. Double-click DontDisplayLastUserName and set its value to 1.
You can subsequently re-enable the setting by changing its value to 0 if need be. Close the Registry Editor and reboot to check your new logon settings.
Labels: Windows corner...
Wednesday, January 30, 2008
Power of Innovation!! !
Radical new tire design by Michelin. The next generation of tires.
These are actual pictures taken in the South Carolina plant of Michelin. It will be awhile before they are available to the automotive industry.
Labels: Techno delights
Tuesday, January 29, 2008
I was collecting information on Natural language processing.
This is when I met ELIZA.
It is a nice program which you would definitely love.
It speaks with you!!!
ELIZA is a computer program by Joseph Weizenbaum, designed in 1966, which parodied a Rogerian therapist, largely by rephrasing many of the patient's statements as questions and posing them to the patient. Thus, for example, the response to "My head hurts" might be "Why do you say your head hurts?" The response to "My mother hates me" might be "Who else in your family hates you?" ELIZA was named after Eliza Doolittle, a working-class character in George Bernard Shaw's play Pygmalion, who is taught to speak with an upper class accent.
Want to chat with ELIZA?????
Click here to meet ELIZA
ELIZA - a friend you could never have before
Eliza: Hello. I am ELIZA. How can I help you?
This is how the page will look!!!!
But dont try the questions here...
It wont work!!!
Labels: Techno delights
Sunday, January 27, 2008
Last week I had my department function(virtuoso).It was really cool and I worked for 2 events in the function.One was best manager and the other was Project presentation.Project presentation was my favourite and it was rocking.One of the project presented there was steganography.This term was relatively new to me.But my senior informed me that it was a very common project and it was used by Osama Bin Laden!!!This kindled interest in me to find more on this subject.This post contains some nice information on steganography such that,even a novice could understand!!!
Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message. Today, the term steganography includes the concealment of digital information within computer files. For example, the sender might start with an ordinary-looking image file, then adjust the color of every 100th pixel to correspond to a letter in the alphabet -- a change so subtle that no one who isn't actively looking for it is likely to notice it.
Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. This apparent message is the covertext. For instance, a message may be hidden by using invisible ink between the visible lines of innocuous documents.
The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. An unhidden coded message, no matter how unbreakable it is, will arouse suspicion and may in itself be incriminating, as in countries where encryption is illegal.Often, steganography and cryptography are used together to ensure security of the covert message.
Steganography used in electronic communication include steganographic coding inside of a transport layer, such as an MP3 file, or a protocol, such as UDP.
Labels: Cryptography, Techno delights
Monday, January 21, 2008
#include
#include
int main(void)
{
float A,Bb,D,G,F;
A = 440;
G = 780;
Bb = 461;
D = 586;
F = 687;
sound(G); delay(500); nosound(); sound(G); delay(250); nosound(); sound(G); delay(250); nosound(); sound(G); delay(500); nosound(); sound(2*D); delay(500); nosound(); sound(2*A); delay(250); nosound(); sound(2*Bb); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(500); nosound(); sound(2*A); delay(500); nosound(); sound(G); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();
sound(G); delay(500); nosound(); sound(G); delay(250); nosound(); sound(G); delay(250); nosound(); sound(G); delay(500); nosound(); sound(2*D); delay(500); nosound(); sound(2*A); delay(250); nosound(); sound(2*Bb); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(500); nosound(); sound(2*A); delay(500); nosound(); sound(G); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();
//end 2
sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();
//end 3
sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound(); return 0;
}
This source code is not mine but probably the best that you could ever see....
It plays the airtel music!!!
Labels: Programming
Wednesday, January 16, 2008
For all those who wondered what was special about this photo,
Labels: Photography
Monday, January 14, 2008
I discovered that today only.
And made a post out of it!!
Keyboard shortcuts
Open links in a new tab in the background CTRL+click
Open links in a new tab in the foreground CTRL+SHIFT+click
Open a new tab in the foreground CTRL+T
Open a new tab from the Address bar ALT+ENTER
Open a new tab from the search box ALT+ENTER
Open Quick Tabs (thumbnail view) CTRL+Q
Switch between tabs CTRL+TAB/CTRL+SHIFT+TAB
Switch to a specific tab number CTRL+n (n can be 1-8)
Switch to the last tab CTRL+9
Close current tab CTRL+W
Close all tabs ALT+F4
Close other tabs CTRL+ALT+F4
Mouse shortcuts
Open a link in a background tab Click the middle mouse button on a link
Open a new tab Double-click the empty space to the right of the last tab
Close a tab Click the middle mouse button on the tab
Most of you would have known this already!
But people who did not know this,would have found it very useful!!!
For those who are still using IE6, Click here to download IE7.
Labels: Internet, Windows corner...
Saturday, January 12, 2008
Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown dramatically since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well. e-commerce is buying things from the internet but many people are unsure about its reliabilty as there are many unreputable vendors.
A small percentage of electronic commerce is conducted entirely electronically for "virtual" items such as access to premium content on a website, but most electronic commerce involves the transportation of physical items in some way. Online retailers are sometimes known as e-tailers and online retail is known as e-tail. E-commerce or electronic commerce is generally considered to be the sales aspect of e-business.
Ashop commerce is helping a great deal in the field of ecommerce with it's ecommerce software (the shopping cart software)as I have already said in one of my previous posts.AshopCommerce shopping carts are integrated with all major banks, gateways and third party processors including PayPal (full functionality integration). This helps the users since all will not have their accounts in the same bank.
Labels: Other posts
Friday, January 11, 2008
Labels: Fun