Disqus for Cyber Fort

Showing posts with label windows. Show all posts
Showing posts with label windows. Show all posts

Monday 5 August 2013

How File Compression Works

Be The First To Comment

Introduction to How File Compression Works

Most types of computer files are fairly redundant --
they have the same information listed over and over again.
If you download many programs and files off the Internet, you've probably encountered ZIP files before. This compression system is a very handy invention, especially for Web users, because it lets you reduce the overall number of bits and bytes in a file so it can be transmitted faster over slower Internet connections, or take up less space on a disk. Once you download the file, your computer uses a program such as WinZip or Stuffit to expand the file back to its original size. If everything works correctly, the expanded file is identical to the original file before it was compressed.
At first glance, this seems very mysterious. How can you reduce the number of bits and bytes and then add those exact bits and bytes back later? As it turns out, the basic idea behind the process is fairly straightforward. In this article, we'll examine this simple method as we take a very small file through the basic process of compression.
Most types of computer files are fairly redundant -- they have the same information listed over and over again. File-compression programs simply get rid of the redundancy. Instead of listing a piece of information over and over again, a file-compression program lists that information once and then refers back to it whenever it appears in the original program.
As an example, let's look at a type of information we're all familiar with: words.
In John F. Kennedy's 1961 inaugural address, he delivered this famous line:
"Ask not what your country can do for you -- ask what you can do for your country."
The quote has 17 words, made up of 61 letters, 16 spaces, one dash and one period. If each letter, space or punctuation mark takes up one unit of memory
, we get a total file size of 79 units. To get the file size down, we need to look for redundancies.
Immediately, we notice that:
  • "ask" appears two times
  • "what" appears two times
  • "your" appears two times
  • "country" appears two times
  • "can" appears two times
  • "do" appears two times
  • "for" appears two times
  • "you" appears two times
Ignoring the difference between capital and lower-case letters, roughly half of the phrase is redundant. Nine words -- ask, not, what, your, country, can, do, for, you -- give us almost everything we need for the entire quote. To construct the second half of the phrase, we just point to the words in the first half and fill in the spaces and punctuation.


Redundancy and Algorithms

Most compression programs use a variation of the LZ adaptive dictionary-based algorithm to shrink files. "LZ" refers to Lempel and Ziv, the algorithm's creators, and "dictionary" refers to the method of cataloging pieces of data.
The system for arranging dictionaries varies, but it could be as simple as a numbered list. When we go through Kennedy's famous words, we pick out the words that are repeated and put them into the numbered index. Then, we simply write the number instead of writing out the whole word.
So, if this is our dictionary:
  1. ask
  2. what
  3. your
  4. country
  5. can
  6. for
  7. you
Our sentence now reads:  "1 not 2 3 4 5 6 7 8 -- 1 2 8 5 6 7 3 4"
If you knew the system, you could easily reconstruct the original phrase using only this dictionary and number pattern. This is what the expansion program on your computer does when it expands a downloaded file. You might also have encountered compressed files that open themselves up. To create this sort of file, the programmer includes a simple expansion program with the compressed file. It automatically reconstructs the original file once it's downloaded.
But how much space have we actually saved with this system? "1 not 2 3 4 5 6 7 8 -- 1 2 8 5 6 7 3 4" is certainly shorter than "Ask not what your country can do for you; ask what you can do for your country;" but keep in mind that we need to save the dictionary itself along with the file.
In an actual compression scheme, figuring out the various file requirements would be fairly complicated; but for our purposes, let's go back to the idea that every character and every space takes up one unit of memory. We already saw that the full phrase takes up 79 units. Our compressed sentence (including spaces) takes up 37 units, and the dictionary (words and numbers) also takes up 37 units. This gives us a file size of 74, so we haven't reduced the file size by very much.
But this is only one sentence! You can imagine that if the compression program worked through the rest of Kennedy's speech, it would find these words and others repeated many more times. And, as we'll see in the next section, it would also be rewriting the dictionary to get the most efficient organization possible.


Searching for Patterns

In our previous example, we picked out all the repeated words and put those in a dictionary. To us, this is the most obvious way to write a dictionary. But a compression program sees it quite differently: It doesn't have any concept of separate words -- it only looks for patterns. And in order to reduce the file size as much as possible, it carefully selects which patterns to include in the dictionary.
If we approach the phrase from this perspective, we end up with a completely different dictionary.
If the compression program scanned Kennedy's phrase, the first redundancy it would come across would be only a couple of letters long. In "ask not what your," there is a repeated pattern of the letter "t" followed by a space -- in "not" and "what." If the compression program wrote this to the dictionary, it could write a "1" every time a "t" were followed by a space. But in this short phrase, this pattern doesn't occur enough to make it a worthwhile entry, so the program would eventually overwrite it.
The next thing the program might notice is "ou," which appears in both "your" and "country." If this were a longer document, writing this pattern to the dictionary could save a lot of space -- "ou" is a fairly common combination in the English language. But as the compression program worked through this sentence, it would quickly discover a better choice for a dictionary entry: Not only is "ou" repeated, but the entire words "your" and "country" are both repeated, and they are actually repeated together, as the phrase "your country." In this case, the program would overwrite the dictionary entry for "ou" with the entry for "your country."
The phrase "can do for" is also repeated, one time followed by "your" and one time followed by "you," giving us a repeated pattern of "can do for you." This lets us write 15 characters (including spaces) with one number value, while "your country" only lets us write 13 characters (with spaces) with one number value, so the program would overwrite the "your country" entry as just "r country," and then write a separate entry for "can do for you." The program proceeds in this way, picking up all repeated bits of information and then calculating which patterns it should write to the dictionary. This ability to rewrite the dictionary is the "adaptive" part of LZ adaptive dictionary-based algorithm. The way a program actually does this is fairly complicated, as you can see by the discussions on Data-Compression.com.
No matter what specific method you use, this in-depth searching system lets you compress the file much more efficiently than you could by just picking out words. Using the patterns we picked out above, and adding "__" for spaces, we come up with this larger dictionary:
  1. ask__
  2. what__
  3. you
  4. r__country
  5. __can__do__for__you 
And this smaller sentence: "1not__2345__--__12354"
The sentence now takes up 18 units of memory, and our dictionary takes up 41 units. So we've compressed the total file size from 79 units to 59 units! This is just one way of compressing the phrase, and not necessarily the most efficient one. (See if you can find a better way!)
So how good is this system? The file-reduction ratio depends on a number of factors, including file type, file size and compression scheme.
In most languages of the world, certain letters and words often appear together in the same pattern. Because of this high rate of redundancy, text files compress very well. A reduction of 50 percent or more is typical for a good-sized text file. Most programming languages are also very redundant because they use a relatively small collection of commands, which frequently go together in a set pattern. Files that include a lot of unique information, such as graphics or MP3 files, cannot be compressed much with this system because they don't repeat many patterns (more on this in the next section).
If a file has a lot of repeated patterns, the rate of reduction typically increases with file size. You can see this just by looking at our example -- if we had more of Kennedy's speech, we would be able to refer to the patterns in our dictionary more often, and so get more out of each entry's file space. Also, more pervasive patterns might emerge in the longer work, allowing us to create a more efficient dictionary.

Lossy and Lossless Compression

The type of compression we've been discussing here is called lossless compression, because it lets you recreate the original file exactly. All lossless compression is based on the idea of breaking a file into a "smaller" form for transmission or storage and then putting it back together on the other end so it can be used again.
Lossy compression works very differently. These programs simply eliminate "unnecessary" bits of information, tailoring the file so that it is smaller. This type of compression is used a lot for reducing the file size of bitmap pictures, which tend to be fairly bulky. To see how this works, let's consider how your computer might compress a scanned photograph.
A lossless compression program can't do much with this type of file. While large parts of the picture may look the same -- the whole sky is blue, for example -- most of the individual pixels are a little bit different. To make this picture smaller without compromising the resolution, you have to change the color value for certain pixels. If the picture had a lot of blue sky, the program would pick one color of blue that could be used for every pixel. Then, the program rewrites the file so that the value for every sky pixel refers back to this information. If the compression scheme works well, you won't notice the change, but the file size will be significantly reduced.

Read More

Sunday 4 August 2013

Windows 8: Set up VPN Connection to Secure Data Transfer

4 Comments

Today we are able to send data from one part of the world to other sitting at home through Internet. VPN (Virtual Private Network) broadens a private network to carry out the resources in the network across public networks like that of Internet. It is responsible for sending and receiving data from a host computer across shared or public networks likely that of a private network through all the functionality, security and management policies of the network. It also makes your data transfer safer. Here is the tutorial how to set up VPN connection on your Windows 8 computer.



VPN not only allows you to transfer data in more secured way, but also allows you to access websites which are not available in your country. If you are corporate officer, you can connect to company’s network using this VPN.

How to set up VPN connection in Windows 8

Setting up of VPN connection is same as that of earlier versions of Windows, but as the interface of Windows 8 have changed many users may find it little tricky. So, here is how you can set the VPN connection in Windows 8.

Steps to create VPN connection in 8

Follow the steps given below to set a new VPN connection on your Windows 8 computer.
  • In the metro start screen, type “VPN connection”
  • Next, from the sidebar that appears select settings and you can see the option, set up new VPN connection


    • In the create wizard, enter the VPN address and also the name for the connection

      • Now hit the Create button
      • This ends the create wizard. In order to connect to the newly created network, go to the system tray and click on the network icon and you will be able to see the new VPN available under connection.


        • Upon clicking on connect button, you will be promoted to enter the username and password. Click OK and the VPN will connect with the authentication provided.


          • Once you are connected with the network, under networks you can see the status connected.


          • You can follow the same procedures you can create multiple connections on your Windows 8 system.
            Upon following the tutorial here you can create a new VPN connection on your Windows 8 system and make your data transfer safe and secure over Internet.

Read More

Saturday 3 August 2013

Enable Network Sharing on Windows 8

Be The First To Comment
Features on Windows 8, here is one more change brought out in the new OS. We are talking about the network sharing with Windows 8. It is now much easier to set the network sharing or turn Network Sharing on or off with the new OS. When you try to connect on a network, your Windows 8 system asks you whether you want to turn sharing on between PCs and connect to network devices or not and the system sets the further proceedings according to your decision. Here is the tutorial how you can turn Network Sharing on or off in Windows 8.


If you haven’t turned on the network sharing feature, then you can carry it out later on. In earlier versions of Windows OS like that of Windows 7, when you want to turn sharing on or off your network, you need to go to the Network and Sharing Center and select homegroup and sharing options, but this is not the case in Windows 8 rather it is much easier.

Steps to Turn Network Sharing on or off in Windows 8

Follow the steps below to Turn Network Sharing on or off in Windows 8:
  • Switch to Windows 8 desktop and click the Network icon in the notification area
  • Now you can see an interface on the right side screen that shows you all the available Networks
  • Next, Right-click on the Network that you are currently connected with


    • You can now see an option to Turn sharing on or off, simply click on it


      • When you are prompted about Do you want to turn on sharing between PCs and connect to devices on this network, click on Yes turn on sharing and connect to devices.
      Once you have completed all the steps described here you can see that Network sharing option is enabled on your Windows 8 system.
      But, this network sharing setting is only availed for Wi-Fi, Ethernet, VPN, and dial-up connections, and not for domain networks.
      Once you enable network sharing, the system starts preparing the files and folders that are to be shared on the network. Upon following the steps described here you can easily Turn Network Sharing on or off on your Windows 8 system.
Read More

Sunday 28 July 2013

COMMON ERROR OF PC AND THEIR SOLUTION

2 Comments
Hello..
Today I have tried to gather some common PC errors that we face daily life but we can't understand sometimes exact problem and their temporary solutions. I hope you guys would love the post and should have positive respose about this article so, lets start.... 




1. MONITOR LED IS BLINKING
Check all the connections like Monitor Cable, Data cables, RAM, Display Card , CPU connections.sometimes loose connection may cause this type of problem.

2. CONTINUOUS THREE BEEPS
Problem in RAM Connection .mostly of beeping sounds produced form RAM.

3. THREE BEEPS ( 1 Long 2 Short)
Problem in Display Card Connection..MAKE IT CLEAN

4. THREE LONG BEEPS PERIOD WISE
Problem in BIOS or RAM (Basic Input Output System)(Ram Access Memory)

5. CONTINUOUS NON-STOP BEEPING
Key Board Problem (I.e.; Some Key is pressed for Longer time)

6. FDD LED IS GLOWING CONTINUOUSLY
Data cable to be connected properly (twisted cable).do not use brakeble wire.

7. NO DISPLAY ON THE SCREEN AT ALL

Hard Disk cable connected wrongly. Connect rightly seeing the Red mark (Faces power supply) and then Restart.chek it from cpu to monitor.

8. POWER LED IS OFF
a. Check main power cord
b. Check S.M.P.S.
c. Check Mother Board connection
d. Check switch once again at cpu and monitor

9. SHOWING CMOS ERROR
Replace 3 Volt battery of Mother Board . Set Original Settings Manually.(Refer­ CMOS Setup chart) Enter your search terms.Submit search form.

10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT WORKING PROPERLY
Check Power cord of FDD , Data Cables , set CMOS & Finally the Check drive.

11. SHOWING HDD ERROR OR HARD DISK FAILURE

a. Check Power Cord
b. Check connection of HDD
c. Check Data cable
d. Check Hard Disk parameters in CMOS or Auto detecting Setting Partitions by Fdisk Command, then format it to set track 0.

12. MOTHER BOARD HANGS DUE TO UNSTABILIZED POWER SUPPLY
a. Check S.M.P.S
b. RAM not functioning properly.
c. Software problem (due to using pirated software)
d. CPU fan not functioning properly.
e. warm air shouldn't be temperd inside CPU.

13. DANCING SCREEN
a. Check Display card connection
b. Virus Problem
c. Video Memory Problem

14. SHAKING SCREEN
a. Earthing problem
b. Magnetic waves comes around.

15. CPU CABINET SHOCK
a. Check Earthing
b. Check main power cord.

16. NON-SYSTEM DISK ERROR

a. Floppy Drive having different disk (Non-Bootable Disk) OR CMOS Parameters for Hard Disk may not be set properly.
b. Hard Disk Partitions may not be created.
c. Hard Disk may not be formatted.

17. MISSING OPERATING SYSTEM
The System files missing namely Ie; command.com} -User File IO.SYS & MS_DOS.SYS } - Hidden Files. These above three files required for Start up of the system that can be transferred by using SYS C: Command OR While the time of formatting by using Format c:/u/s

18. MISSING COMMAND INTERPRETOR
May the file Command.com is corrupted OR Infected by Virus OR Some one has Erased it.

19. SHOWING I/O ERRORa. The type of Hard Disk in CMOS may not be set properly.
b. Operating system used for formatting is not valid.

20. SHOWING DIVIDE OVER- FLOW MESSAGE
a. May some Directories or Files crash with other files.
b. Use CHKDSK/F or SCANDISK Command to correct it.

21. HARD DISK MAKING NOISE WHILE PROCESSING
a. Unstabilized power supply.
b. Check for Loose Contact.
c. Do not use Y Connectors for Hard Disk.
d. It may create Bad Sector OR Weak Hard Disk.

22. HARD DISK HANGS WHILE PROCESSING
Check for Bad Sector by using CHKDSK or SCANDISK Command. If found format the Hard Disk and set Partition before that area.(This is the only procedure to use Hard Disk with Bad Sector) OR (To avoid Bad Sectors use Standard Power Supply)

23. HARD DISK NOT DETECTED
a. Check Power Connector
b. Check Data Cables
c. Check Jumpers

24. PARTITION NOT SHOWN
Operating System where the Hard Disk formatted is not supported with present Mother Board. For Eg: Hard Disk formatted with Pentium System will hide their partitions for 486 System.

25. MMX/DLL FILE MISSING
May the above files may be corrupted due to power failure or Virus. Make available above files from other Computer. OR Reinstall Windows 98 Operating System. (This procedure will not make any effect on existing Data).

26. WINDOWS REGISTRY ERROR
This will happen due to sudden ON/OFF of the system. Final solution is to Reinstall Operating System.

27. DISPLAY COLOUR DOES NOT MATCH
a. Configure Display Card properly with their CD.
b. The Standard setting for Windows is set it to 800x600 for better performance.

28. UNKNOWN DEVICE FOUND
May the Driver utility is not provided with operating system . Insert Driver CD and install software for the above Device...



hope u like this efforts...
Read More

Friday 26 July 2013

How to Install Microsoft .NET Framework 3.5 Offline in Windows 8 without Internet Connection

Be The First To Comment
                                                                    


Posted by  February 18th, 2013 11 Comments »






Read More

7 Best Techniques To Prevent Computer Hacking

4 Comments

In line with the technological advancement are the security threats to information system that have greatly affected many people and business organizations worldwide. Network intruders definitely had the best time of their lives when they successfully hacked computers and stole huge amount of money and even personal identifications of private individuals. Who would have thought this will happen? It is a serious matter but it can be prevented. Here’s how:
 1.   Install a firewall. Having a firewall means hackers and viruses are blocked 

from computer networks. With this, only authorized data can pass through as network traffic is intercepted. Some of the best firewalls are fromMcAffeeBlackICE, Sygate, Norton and Zone Alarm. You can purchase them online or at any office supply store.
2.   Install an anti-virus software. Technically, all computers are prone to viruses because these can be forwarded in a blink of an eye. Thus there’s a necessity to have an updated version of anti-virus software. But to identify a computer virus one must understand what is it and it is advisable not to open email attachments received from unknown senders. Also, do not click the websites that instantly pop up for this might create havoc to your computer.
You might also like this top 5 Free Full Version Antivirus Software
3.  Update operating systems. As much as possible, see to it that operating systems are updated regularly. This is very easy and costs nothing since the latest versions of software can be downloaded for free over the web. For Microsoft windows, visit this http://windowsupdate.microsoft.com for the latest updates.
4.   Learn more about network security. Knowledge is power, indeed! Knowing something about information security certainly makes you more alert and conscious of this computer hacking. There are many publications available that tackle about effective security tools. Furthermore, even online you will find a lot of information about network security that are really beneficial.
5.   Disable unnecessary network services. Unimportant features in a system should be disabled because updates for this aren’t regular especially if not actively used. Most likely this will be a possible threat to your security. For your safety, use only software that is necessary to what you normally do.
6.   Conduct a vulnerability test. Doing so is a cost-effective way of evaluating the current security program installed.Hiring a computer consultant to do so will simply lessen the burden. With this, you will be able to determine the weaknesses and restrictions of the program and if there’s a need for network appraisal.
7.   Develop a personal security policy–Self-discipline is necessary here so that you will be able to implement this. One of the best personal security policies is choosing a unique password such as letters and numbers combined. Make sure to change it every 3 months to lessen hackers ability to identify a functioning password.
 As you can see, computer hacking can be prevented. All you need is simply the basic knowledge of the technical aspects of the computer and the security tools needed to guard yourself against becoming a cyber-crime victim.




Read More

Thursday 25 July 2013

Apply Two Passwords to your Facebook Profile

1 Comment
Account hijacking is a big problem on Facebook, where attackers figure out your passwords and take over your account. While you should always select strong and unique passwords for each online account you have, it is increasingly clear that just relying on a password is not enough security. This is where two-factor authentication comes in.
Read More

Monday 22 July 2013

How to use Mobile Camera as PC Webcam - Android - Symbian

Be The First To Comment
Online chatting has been redefined with the video chat technology and more and more webcams are taking birth introducing new and vast technology, well but side by side webcams are somewhat expensive and can do only one task live streaming you to your friends and family members. Well if you wanna save your money and side by side want the same webcam experience, you can convert your mobile camera into PC webcam with small apps and tools easily. 
Well we have three best options tat work universally on every platform, so we are going to use Smartcam as our first source, Mobiola web camera and the second source and the third one is specifically for android that’s iP webcam.





#1. Smartcam Package :

Smartcam Package simply provides an easy to install option for your all devices, Symbian, Android, iPhone and connect them as a webcam for your pc.
  1. Download Smartcam Package and extract it in your pc, it’s a simple zip package so just right click and choose extract.
  2. Now it contains a .exe file for your computer and applications for your android device, Symbian device and iPhone. You can use the one in package or you can download them online for newer versions.
  3. Now after you have installed on both devices just fire it up using Bluetooth or USB connectivity and follow instructions and you will be live streaming your mobile camera video as PC webcam.

#2. Mobiola Web Camera :

Mobiola Web camera is available for iOS Devices, Blackberry, Symbian but its nor free and you have to pay little cost to get that app running.
  1. Purchase Mobiola Web Camera software or download as trial version.
  2. Now juts install app on your device after purchasing their device application.
  3. That’s it now follow instructions and start chatting with your friends.


#3. iP Webcam for Android                           Devices :

iP Webcam for Android is simple application fro converting your Android Device into a wireless PC Webcam. This free application can be installed right into your pc and can used just by a simple iP (internet protocol address).
  1. Download iP Webcam Android App.
  2. Install the application on your phone and connect to the same Wi-Fi network connected to your PC.
  3. Now just follow the instruction on your app and you will be able to connect your device camera with your PC and use it as a webcam.
So now these were the three easy options fro converting your device camera into a simple and free PC webcam. So no investment but still the same fun of video chatting is continued. Have fun and do comment.


Read More

Sunday 14 July 2013

How to run Android apps on PC

Be The First To Comment

Now here i am going to discuss about how you can use android apps on your windows OS or Mac OS. If you are really fond of using android applications but unfortunately you don't have any android supported Phone. Then don't worry this article will helps you make your dreams come true. In these days Bluestacks is one of the famous and working Software Which convert any android apps in Windows or mac version. 
Every person who use internet on smartphone always use Android  Market to find number of different application based on their required and needs. Some People use android market for their business purpose or some peoples just for download funny and interesting applications including games. Android market have millions of different application based on number of different categories. 

Steps To Use Android Apps On PC 


  • Now Install Bluestacks on your operation System.
  • After the successful installation Open your Bluestacks.
  • Now Bluestacks is ready to use, Its helps to convert any android file with .apk extension in OS version.
  • If you don't have any apps saved in your PC then you can directly download it from Bluestacks.
  • Now open your Bluestacks and their is available search box in center or otherwise on the right corner.
  • Simply type the name of any android apps which you want to use on PC.
  • Now Download your apps by using Bluestacks and your apps is ready to use.

Read More

Monday 8 July 2013

Make Your Own Operating System

3 Comments
HERE IS AWESOME POST, YOU CAN MAKE YOUR OWN OPERATING SYSTEM.


You might be using Windows,LINUX or Mac Operating System from very long. Ever wondered how these Operating System are made ? Or Ever think of making own Operating System ?

The Operating System you are going to create online will be Linux Operating System. There is no technical skills required for creating an own Linux Operating System online. Linux is a kernel, which can be used to create Operating Systems. Operating System(s) created by using Linux kernel are called Linux Operating System(s). Example of Linux Operating Systems are Ubuntu and SUSE
To create own Operating System you don’t need to be a computer master or a programmer, all you need is a website: SUSE Studio.
Yes, you can create your own Operating System online from 

www.susestudio.com


SUSE Studio is a program launched by SUSE Operating System community, this program helps user to create his or her own Operating System online for free.
All you have to do is to visit www.susestudio.com, Sign in with your account, have to select a base package and desktop environment, 32 bit or 64 bit and then have to customize it like Logo, Soft-wares etc. once you have created your Own Linux Operating System, you have to click on build and have to download an ISO image. You can burn this ISO image in a CD/DVD and can use that CD/DVD to install your own Operating System, just like you do with Windows CD..


comment you like this post its free...
Read More