Sunday, February 04, 2007

Grep is really a Grip

Grep stands for Global (Search for) Regular Expression and Print.
It is a unix command used for a pattern matching
in files . We can find a line in a file which matches some phraces
effectively using this command. We can find more about its usage
by reading its man pages.
for example to find a user who has no password can be found
by using
$ grep '^[^:]*::' /etc/passwd
Cool na ?
Also there are so much cooL commands in unix we have to be familiar
like "sed","awk"...
we can see those on the way.

Friday, July 07, 2006

My MODEM ( SMARTLINK 134d:2189 ) Worked In Linux !!!

Its pleasure for me to say that a modem 134d:2189 smartlink
modem has worked in both fedora and suse . I was behind it for
about 4 months . I have almost lost my hope many times on the way.

0. I believe you saw the site http://lin-modems.org and used
“scanmodem” and found your modem and driver to be used.
1. I just used slmodem2.9.11 driver and compiled and installed
2. type slmodemd
3. I believe you know to compile and install a product.
4. if “slamr0 not found” is the result , just download and compile
“ungrab-winmodem” as README
5. then use wvdial / Network at ttySL0 as modem port

if you had any trouble call me @ : vivek_cs_101@yahoo.com

Friday, June 02, 2006

DIVINE NUMBER !!!




A SECRET SMILE





It links art, music and even architecture.

Think of any two numbers. Make a third by adding the first and second, a fourth by adding the second and third, and so on. When you have written down about 20 numbers, calculate the ratio of the last to the second from last. The answer should be close to 1.6180339887...
What's the significance of this number? It's the "golden ratio" and, arguably, it crops up in more places in art, music and so on than any number except pi. Claude Debussy used it explicitly in his music and Le Corbusier in his architecture. There are claims the number was used by Leonardo da Vinci in the painting of the Mona Lisa, by the Greeks in building the Parthenon and by ancient Egyptians in the construction of the Great Pyramid of Khufu.

What makes the golden ratio special is the number of mathematical properties it possesses. The golden ratio is the only number whose square can be produced simply by adding 1 and whose reciprocal by subtracting 1. If you take a golden rectangle - one whose length-to-breadth is in the golden ratio - and snip out a square, what remains is another, smaller golden rectangle. The golden ratio is also difficult to pin down: it's the most difficult to express as any kind of fraction and its digits - 10 million of which were computed in 1996 - never repeat.

It was this elusive nature that led the 15th-century Italian friar and mathematician Luca Pacioli to equate the golden ratio with the incomprehensibility of God. Although Euclid defined it around 300 BC, and the followers of Pythagoras probably knew of it two centuries earlier, it was Pacioli's three-volume treatise, The Divine Proportion, that was crucial in disseminating the golden ratio beyond the world of mathematics.

Da Vinci was a friend of Pacioli's and almost certainly would have read the book, hence the claim that he painted the face of the Mona Lisa to fit inside a hypothetical golden rectangle.

"Of course, it all depends on how you draw the rectangle!" says Mario Livio, who has written a book called The Golden Ratio and who is head of science at Baltimore's Space Telescope Science Institute.

The appeal of the divine proportion to the human eye and brain has been scientifically tested. Dozens of psychological tests, beginning with those of Gustav Fechner in the 19th century, have shown that, when subjects are presented with a range of rectangles, they invariably pick out as most pleasing ones whose sides are in the golden ratio.

But the most surprising thing is that a number deemed aesthetically pleasing by human beings also crops up in nature and science. Take the arrangement of leaves on the stem of a plant. As each new leaf grows, it does so at an angle offset from that of the leaf below. The most com mon angle between successive leaves is 137.5 - the golden angle. Why? Because 137.5 = 360 - 360/G, where G is the golden ratio. Why does the golden ratio play a role in the arrangement of leaves? It's all down to the "irrationality" of the number. Irrational numbers are ones that cannot be expressed as the ratio of two whole numbers - for instance, 5/2.

"The golden ratio is arguably the most irrational of all irrational numbers," says Livio. This can be said more precisely. Irrational numbers can be expressed as continued fractions - basically an infinite series of ever-diminishing terms. As each successive term is added, the continued fraction converges towards a single value.

"The golden ratio is the slowest of all continued fractions to converge," says Livio. This turns out to be the key property. A new leaf must collect sunlight without throwing the leaves below it into too much shadow. A plant must arrange its leaves in such a way that the greatest number can spiral around the stem before a new leaf sprouts immediately above a lower one - that is offset at 360.

"What better way to do this than to choose an angle between leaves based on a number that takes the longest to converge?" says Livio.

The golden ratio also crops up in the hard sciences. Take the growth of "quasi-crystals". These have "five-fold symmetry", which means they make a pattern that looks the same when rotated by multiples of one-fifth of 360 . In the 1990s, physicists in Switzerland and the US imaged the microscopic terrain of the surface of such crystals. They found flat "terraces" punctuated by abrupt vertical steps. The steps come in two predominant sizes. The ratio of the two step heights? The golden ratio!

Even pythagoreans may have known of the association of the golden ratio with five-fold symmetry. The symbol of their cult was the five-pointed star, and the ratio of the length of the side of each triangular point to its projected base is the golden ratio.

Perhaps the most surprising place the golden ratio crops up is in the physics of black holes, a discovery made by Paul Davies of the University of Adelaide in 1989. Black holes and other self-gravitat ing bodies such as the sun have a "negative specific heat". This means they get hotter as they lose heat. Basically, loss of heat robs the gas of a body such as the sun of internal pressure, enabling gravity to squeeze it into a smaller volume. The gas then heats up, for the same reason that the air in a bicycle pump gets hot when it is squeezed.

Things are not so simple, however, for a spinning black hole, since there is an outward "centrifugal force" acting to prevent any shrinkage of the hole. The force depends on how fast the hole is spinning. It turns out that at a critical value of the spin, a black hole flips from negative to positive specific heat - that is, from growing hotter as it loses heat to growing colder. What determines the critical value? The mass of the black hole and the golden ratio!

W

C Puzzles to Puzzle



Get puzzled in davinci code era as a code breaker.
link here

Saturday, May 27, 2006

DEFEND SPY-WARE

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?

Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). Spy-ware is
a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.

Check Here:
If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware

If you want to remove the "spyware" try these.
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.


If you would like to prevent "spyware" being install.
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html

Usefull tools...
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.

----------------------------------------------------------------------------
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
link

Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!


Download the BrowserVillage Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!

Friday, March 31, 2006

My First Experience with Os

Let me tell about my system : SYSTEM IN BLACK

Name: lindose

256 Mb.2.4Ghz.subwoof 2.1.

“my cd drive(Samsung combo) has crashed 4+1 times since I have brought.”

“ and fifthly cd drive would automatically open and close (cd drive error)“

“my HDD(Seagate ) changed once”

Frankly speaking, iam a great headache to the servicers

I have made all sort of work in my lindose

So keep it in mind while buying a new one ! ok!

Let me tell one thing

Iam a btech comp cs student . I took this branch only to

buy a computer and play games. I was really fond of it( now.. also ).

OK

Coming to the point.

As usual I just got up from bed to do something great.

Whole of my last night was filled with os’s . just discover it WOW.

It was happening just an year before.

I heard that to go to BIOS just press del from bootup.

There in BIOS change the first boot device. These valuable informations

are from my friend BENIN . Thanks to him. Then i put the cd in the tray

Cd drive is ok(suffering from 5th problem ) . Everything is ok now.

Now it’s the time to crash.

Booted from cd……….

I just read and just gone through all hurdles and atlast the time came to reap .

Booting for first time …..

Its one of my greatest time in computer world….

Dedicating to those great ones who are writing code for kernel and games.

Contd.

Friday, February 24, 2006

HOW TO COMPILE A LINUX KERNEL ?

In essence, a new kernel is generated in 3 steps.

1 .#make config

This runs bash scripts scripts/configure ,which read in the arch/i386/config.in.

Configuration scripts are easier to handle can called with
2 #make menuconfig

for a menu-driven installation on the console, or with

3 # make xconfig

for a menu driven installation under xwindows.

4 #make oldconfig

ensures that the old default valuesare accepted without further query.

5 # make depend

is a purely technical operation .it uses the capability of GNU c compiler.

6 # make

to make a bootable linux kernel.

7 #make boot

must be called . then a further mechanism is implemented which enables the loading of the linux kernel immediately in the memory above 1mbyte

8 #make drivers

will only cause the sources in the drivers / subdirectory that is,the drivers ,to be compiled.

9 #make SUBDIRS=drivers

should be called .this approach can also be called for other subdirectories.

A large number of device drivers and filesystems can be created as modules this can be done by

10. #make modules


link

Tuesday, January 24, 2006

Windows

In developing countries like India,Pakistan…. People are using
Windows (which is not original)means pyrated .

Ignorancy is the 1st problem developing countries faced,facing………..

Many people are ignorant of copyright law.
____________

Those who have installed windows can see options to accept
agreement before installing. Many people just put “yes” and forward it.

Any one read it ??

By using this pyrated cds of windows , Microsoft can take legal action against us.

Thus window users are in real threat..

Strictly speaking window users are doing same thing as thieves do.
Thief robs directly.
Pyrated users indirectly.

A honest man cant tolerate this.

Do u??


Don’t worry Solution is coming…………….

Be contd….
_________________________________________
comments are welcomed…

LINUX DISTRIBUTIONS

1. Debian GNU Linux: http://www.debian.org

a default installation provides a very little in the
way of user programs .It provides a lot of options of increase the software
selection both during and after software installation.
Debian suffers from a sort of anti-gunk problem.


2. Fedora Linux: http://www.fedora.redhat.com

It is a freely redistributed version of Redhat
And has some advantages and disadvantages too.


3. Gentoo Linux :http://www.gentoo.org

Provide rather minimalist(but gunk free)experience
From its initial installation. Its packaging is built from compiling from source
Code.If u are not a programmer or highly technical u probably want to shy away from this distribution.

4. Mandrake Linux: http://www.mandrakelinux.com

This distribution is geared to desktop users .
It provides X windows(KDE GNOME..)
It installs a lot of program can be easily considered gunky.
MANDRIVA is its newer version released.

5. Red Hat Linux –http://www.redhat.com

One of the oldest current linux distribution
And popular too particularly in North America.

6. Slackware-http://www.slackware.com

Oldest of surviving linux distribution.
It offers gunk-free distribution up on installation like gentoo and debian
But it is difficult for a new user.

7. SuSE http://www.suse.com or http://www.novell.com

Originated as german distribution,but the company has since been purchae by U.S.-based Novell.simillar to mandrake or Redhat in
The amount of gunk.

8. Xandros-http://www.xandros.com

It provides numerous tools that are handy for
typical home and office desktop users .

9. Ubuntu-http://www.ubuntu.com

It originates from Africa and considered
Tool box of linux.
It is obtained freely from site .cd’s will be send free of cost to your home
after registration.


SUGGESTIONS
AND
COMMENTS ARE MOST WELCOME..