Friday, February 8, 2008

If you share your Windows XP.Professional system with many other users, you have no doubt experienced how pressing Ctrl+Alt+Del results in the name of the last user logged on to be displayed automatically in the username portion of the logon box. While this is great if you were the last one to log on, it can be frustrating if you weren’t. More often than not, users won’t even bother looking at the username portion of the box and just type their password, resulting in a failed logon.

To address this issue, you may want to consider disabling the automatic display of the last user’s name in the logon dialog box. This is accomplished via a Registry edit. To ensure that the user portion of the logon box remains unpopulated, follow these steps:

1. Click Start > Run. Type Regedit.exe in the Open text box and click OK.
2. Browse to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System
3. Right click in the right-hand side of the screen and select New > DWORD value. Name the value DontDisplayLastUserName.
4. Double-click DontDisplayLastUserName and set its value to 1.


You can subsequently re-enable the setting by changing its value to 0 if need be. Close the Registry Editor and reboot to check your new logon settings.

Wednesday, January 30, 2008

Power of Innovation!! !

Radical new tire design by Michelin. The next generation of tires.




These tires are airless and are scheduled to be out on the market very soon!!!

The bad news for law enforcement is that spike strips will not work on these tires. This is what great R&D will do, and just think of the impact on existing technology:


no more air valves
no more air compressors at Petrol Pumps
no more flat tires in the middle of long drives


These are actual pictures taken in the South Carolina plant of Michelin. It will be awhile before they are available to the automotive industry.










Great power of Innovation.........

Tuesday, January 29, 2008

I was collecting information on Natural language processing.
This is when I met ELIZA.
It is a nice program which you would definitely love.
It speaks with you!!!



ELIZA is a computer program by Joseph Weizenbaum, designed in 1966, which parodied a Rogerian therapist, largely by rephrasing many of the patient's statements as questions and posing them to the patient. Thus, for example, the response to "My head hurts" might be "Why do you say your head hurts?" The response to "My mother hates me" might be "Who else in your family hates you?" ELIZA was named after Eliza Doolittle, a working-class character in George Bernard Shaw's play Pygmalion, who is taught to speak with an upper class accent.

Want to chat with ELIZA?????

Click here to meet ELIZA

ELIZA - a friend you could never have before

Eliza: Hello. I am ELIZA. How can I help you?



This is how the page will look!!!!
But dont try the questions here...
It wont work!!!

Sunday, January 27, 2008

Last week I had my department function(virtuoso).It was really cool and I worked for 2 events in the function.One was best manager and the other was Project presentation.Project presentation was my favourite and it was rocking.One of the project presented there was steganography.This term was relatively new to me.But my senior informed me that it was a very common project and it was used by Osama Bin Laden!!!This kindled interest in me to find more on this subject.This post contains some nice information on steganography such that,even a novice could understand!!!

Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message. Today, the term steganography includes the concealment of digital information within computer files. For example, the sender might start with an ordinary-looking image file, then adjust the color of every 100th pixel to correspond to a letter in the alphabet -- a change so subtle that no one who isn't actively looking for it is likely to notice it.


Image of a tree.
By removing all but the last 2 bits of
each color component, an almost
completely black image results. Making
the resulting image 85 times brighter
results in the image below.


Image extracted from above image.

Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. This apparent message is the covertext. For instance, a message may be hidden by using invisible ink between the visible lines of innocuous documents.
The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. An unhidden coded message, no matter how unbreakable it is, will arouse suspicion and may in itself be incriminating, as in countries where encryption is illegal.Often, steganography and cryptography are used together to ensure security of the covert message.

Steganography used in electronic communication include steganographic coding inside of a transport layer, such as an MP3 file, or a protocol, such as UDP.

Monday, January 21, 2008

#include stdio.h
#include conio.h
int main(void)

{
float A,Bb,D,G,F;
A = 440;
G = 780;
Bb = 461;
D = 586;
F = 687;

sound(G); delay(500); nosound(); sound(G); delay(250); nosound(); sound(G); delay(250); nosound(); sound(G); delay(500); nosound(); sound(2*D); delay(500); nosound(); sound(2*A); delay(250); nosound(); sound(2*Bb); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(500); nosound(); sound(2*A); delay(500); nosound(); sound(G); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();

sound(G); delay(500); nosound(); sound(G); delay(250); nosound(); sound(G); delay(250); nosound(); sound(G); delay(500); nosound(); sound(2*D); delay(500); nosound(); sound(2*A); delay(250); nosound(); sound(2*Bb); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(500); nosound(); sound(2*A); delay(500); nosound(); sound(G); delay(250); nosound(); sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();

//end 2

sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound();


//end 3

sound(2*A); delay(250); nosound(); sound(G); delay(250); nosound(); sound(F); delay(250); sound(G); delay(250); sound(2*A); delay(250); sound(2*Bb); delay(500); sound(2*A); delay(500); sound(G); delay(250); sound(F); delay(250); sound(D); delay(500); nosound(); return 0;

}

This source code is not mine but probably the best that you could ever see....
It plays the airtel music!!!

Wednesday, January 16, 2008



For all those who wondered what was special about this photo,
here it is: This is a digitally altered image which shows the same person in different forms.. and u thought all chinese looked alike!!

Monday, January 14, 2008



These shortcuts are mentioned in IE itself!!!!
I discovered that today only.
And made a post out of it!!

Keyboard shortcuts

Open links in a new tab in the background CTRL+click
Open links in a new tab in the foreground CTRL+SHIFT+click
Open a new tab in the foreground CTRL+T
Open a new tab from the Address bar ALT+ENTER
Open a new tab from the search box ALT+ENTER
Open Quick Tabs (thumbnail view) CTRL+Q
Switch between tabs CTRL+TAB/CTRL+SHIFT+TAB
Switch to a specific tab number CTRL+n (n can be 1-8)
Switch to the last tab CTRL+9
Close current tab CTRL+W
Close all tabs ALT+F4
Close other tabs CTRL+ALT+F4

Mouse shortcuts

Open a link in a background tab Click the middle mouse button on a link
Open a new tab Double-click the empty space to the right of the last tab
Close a tab Click the middle mouse button on the tab

Most of you would have known this already!
But people who did not know this,would have found it very useful!!!
For those who are still using IE6, Click here to download IE7.

Saturday, January 12, 2008

Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown dramatically since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well. e-commerce is buying things from the internet but many people are unsure about its reliabilty as there are many unreputable vendors.

A small percentage of electronic commerce is conducted entirely electronically for "virtual" items such as access to premium content on a website, but most electronic commerce involves the transportation of physical items in some way. Online retailers are sometimes known as e-tailers and online retail is known as e-tail. E-commerce or electronic commerce is generally considered to be the sales aspect of e-business.

Ashop commerce is helping a great deal in the field of ecommerce with it's ecommerce software (the shopping cart software)as I have already said in one of my previous posts.AshopCommerce shopping carts are integrated with all major banks, gateways and third party processors including PayPal (full functionality integration). This helps the users since all will not have their accounts in the same bank.

Friday, January 11, 2008

I find these ads are unteresting....
How about you???