>> Monday, August 10, 2009

Security researchers zero in on Twitter hackers

"This was a very targeted attack, and what the research shows is that it was aimed at one particular person, and that person's accounts on Twitter, Facebook, YouTube and LiveJournal," said Dave Marcus, director of security research at antivirus vendor McAfee.
McAfee has identified six separate DDoS attacks against various accounts registered to a user pegged as "Cyxymu," as well as a simultaneous spam e-mail campaign aimed at Cyxymu's Gmail account.
"We back-traced and correlated the data the attacks targeting Facebook, Twitter and others, and found commonalities in the IP [address] information," Marcus said.
Although McAfee was as of yet unable to identify the botnet responsible for the DDoS attacks, its trace-backs revealed that 29% of the machines composing the army of hijacked computers were located in Brazil. Turkish PCs accounted for another 9%, and Indian systems made up another 8%.
Marcus declined to guess the botnet's size. "That's kind of point of contention," he said. "In the case of Twitter, they've gone down before anyway, so it could have been small. Facebook, however, tends to be a lot more resilient, with a lot more load balancing and defensive measures." That might indicate the botnet, which
hampered Facebook but didn't knock it offline, is larger.
"We're still looking at which botnet it was that did this," Marcus said.
So is Don Jackson, director of threat intelligence for SecureWorks and a noted DDoS expert, who last year at this time investigated
Russian "cybermilitia" attacks against Georgia, the former Soviet republic that was then battling Russian military forces over a territorial dispute. "We don't have indication that it's part of a known botnet," Jackson said today. "For such a high-volume, high-profile DDoS [attack], there's a conspicuous lack of evidence."
Jackson and other researchers at SecureWorks haven't seen the usual chatter in known hacker and "hacktivist" forums, been able to locate any botnet command-and-control servers showing evidence of having ordered the DDoS attack, or found any clues that the usual commercial DDoS suspects, who make a living renting out bots for such attacks, were involved.
"Either we had a serious breakdown in our security intelligence on this, or the commercial DDoS guys have researched, and found, different ways to mask their attacks," said Jackson.
However, what data SecureWorks does have points to multiple DDoS attacks launched against the pro-Georgian blogger, Jackson said, backing what Marcus has said.
Even so, Jackson was mystified at the lack of hard information. "We have all kinds of feelers out there to find out if this is a Georgia versus Russia thing," he said. "We have all kinds of triggers that would tell us if that was the case. But so far, there's been nothing."
Last August, Russian hackers mobilized an ad hoc DDoS against numerous state-sponsored sites in Georgia, including its foreign ministry's, defense department's and president's sites. At the time, researchers said that the attacks had left Russian hacker fingerprints.
Today, Jackson said there might well be a connection between last year's attacks and those against Twitter, Facebook and others yesterday. He cited the circumstantial evidence of the dates -- Georgia attacked the break-away province of South Ossetia on August 7, and Russia responded the next day.
"There's certainly a lot constant hackers involved over there, but there's no chat about it at all in the usual places," Jackson said. "But I think it would be unusual for them to self-mobilize for an attack of this size, against one person."
That would add weight to the idea that a commercial DDoS operator might have been involved. If it was a Russian group that specializes in DDoS attacks, "the cost would be free," said Jackson, adding that it was conceivable that the botnet had been donated to the cause of hitting Cyxymu.
"Hacktivism is very much back," said McAfee's Marcus. "But it's really hard to say that this is the beginning of a trend, this targeting of individuals that leads to collateral damage [like the Twitter outage]."
On the plus side, Marcus said, when Twitter went dark for several hours the outage prevented not only the innocent from using the site, but also the criminals, who rely on Twitter as a launch platform for spam and malware distribution.
"I guarantee that they were irritated," Marcus said.
For its part, today Twitter co-found Biz Stone acknowledged that the micro-blogging site had not restored full service, and was in fact
still fending off attacks. He also hinted at a confirmation of what McAfee, SecureWorks and other security firms said today, that the attacks had some kind of political agenda.
"The ongoing, massively coordinated attacks on Twitter this week appear to have been geopolitical in motivation,"
Stone said in a company blog posted just before 2 p.m. Eastern.
"However, we don't feel it's appropriate to engage in speculative discussion about these motivations," Stone said.

Read more...

Microsoft ties Dynamics CRM to Twitter

Microsoft has integrated its Dynamics CRM (customer relationship management) software with Twitter, in just the latest move by an enterprise software company to latch onto the wildly popular micro-blogging service.
The social-networking
accelerator -- part of three new add-on modules Microsoft is releasing for Dynamics CRM -- culls and catalogs relevant Twitter messages, such as a discussion about the Dynamics user's company, and provides various analytic tools.
The integration, announced Thursday, is also meant to help Dynamics users boost their sales databases. Twitter usernames can be converted into a Dynamics CRM customer record or sales lead, to which more data, such as a phone number, can be added over time.
So far the accelerator is only compatible with Twitter, but Microsoft is planning to connect with other social networks as well.
Microsoft's move to connect with Twitter follows a similar announcement made in March by rival CRM vendor Salesforce.com. And an entire software company,
CoTweet was formed around the goal of tapping Twitter's potential for CRM.
Twitter itself could end up getting in the CRM game, such as through a paid service that tracks and analyzes conversations around particular brand names, Forrester Research analyst Jeremiah Owyang speculated in a recent blog
post.
Meanwhile, Microsoft's ongoing accelerator strategy reflects another trend: How traditional software vendors are responding to the rise of SaaS (software as a service), which is marked by frequent small updates, instead of a major release once a year or two.
The other two CRM accelerators announced Thursday include a module that helps customers manage sales opportunities along with partners, and one for connecting Dynamics CRM systems to company portals.
The modules can be downloaded at no charge and will be available within the next few weeks, according to Microsoft.

Read more...

Microsoft offers Office 2010 file format 'ballot' to stop EU antitrust probe

Microsoft will add a file format "ballot" to Office 2010, part of a wider move to fend off European Union (EU) antitrust regulators and block massive fines.
In a proposal submitted to the European Commission two weeks ago, Microsoft spelled out a range of promises related to Office, its desktop and server software, and other products to address antitrust concerns first expressed by officials in January 2008.
At that time, the commission announced it had
launched a pair of probes into Microsoft's business practices after receiving complaints. One of the investigations revolved around Microsoft's bundling of Internet Explorer (IE) with Windows, and was triggered by a protest filed by Norwegian browser maker Opera. The other -- prompted by a complaint submitted by the European Committee for Interoperable Systems, a trade group that has been vocal about Microsoft's behavior -- involved Office, Microsoft's market-dominant productivity suite.
Microsoft has been accused of favoring its own Office formats over rivals, and in the process hindering other developers in their attempts to build software that works smoothly with Microsoft's Word, Excel, PowerPoint and other business applications.
On July 24, Microsoft's general counsel, Brad Smith,
announced two deals to the commission, one each on IE and Office.
Microsoft is so confident that its IE proposal will be accepted by the Brussels-based regulators that it has
dumped plans to sell a special browser-free version of Windows 7 in the EU this fall. That deal centers around a "ballot screen" which will let Windows users download and install rival browsers.
Its proposal for Office includes a stipulation similar to the IE ballot; for the suite, it will let European customers select the default file format from an unspecified number of choices. Office 2010 is slated to hit the streets next year.
"Beginning with the release of Office [2010], end users that purchase Microsoft's Primary PC Productivity Applications in the EEA [European Economic Area] in both the OEM and retail channel will be prompted in an unbiased way to select default file format (from options that include ODF) for those applications upon the first boot of any one of them," Microsoft said in its proposal [
download Word document]
Microsoft did not spell out how the file format "ballot" will appear to users, or what choices, other than ODF (Open Document Format), the open-source word processing, spreadsheet and presentation document standard, will be shown.
But the company did promise to provide a tool to corporate IT departments that would let them set the default file format for Office 2010. "Beginning with the Office Customization Tool released with Office [2010], an updated Office Customization Tool that will have a mandatory prompt to affirmatively select the default format for file saving for Microsoft's Primary PC Productivity Applications will be made available to IT administrators in EEA," said Microsoft.
Although Microsoft made concessions in May 2008 to support ODF -- it made good on them in
Office 2007 Service Pack 2 (SP2), which shipped in late April 2009 -- EU officials reacted cautiously. "The commission would welcome any step that Microsoft took toward genuine interoperability, more consumer choice and less vendor lock-in," the antitrust agency said last year.
Microsoft's newest offer may hint at an impending resolution to the Office investigation. On the day Microsoft delivered its proposals, the commission said the plan needed "further investigation before the Commission reaches any conclusion as to the next steps," phrasing that the group had not used before when discussing the interoperability inquiry.
If EU regulators accept Microsoft's proposal, the deal would run at least 10 years.

Read more...

>> Wednesday, July 8, 2009

Space Race
from sputnik to Apollo to Neil Armstrong, the race to the moon combined politics, technology and triumphs. Relive this exciting time in our space program

Read more...

Mars Recovers
watch as two NASA revers embark on an incredible journey to uncover the secrets of mars. Discover how the martian landscape is similar to Earth's - and how its very very difficult

Read more...

Solar Blast
Powerful blast from the sun have the power to fry satellites, crash ATM's and even strand airplanes in the sky

Read more...

PIRANHA PICTURES: Yard-long "Megapiranha" Fossil Found

Eight to ten million years ago, South America's waters harbored a toothier, three-foot (one-meter) version of today's famed, flesh-eating piranhas.

Alberto Cione, a paleontologist at Argentina's La Plata Museum, first noticed the evidence of Megapiranha pananensis (pictured in an artist's rendering)--an upper jaw with three unusually large and pointed teeth--in his collection in the 1980s. The remains had been discovered half a century earlier in a riverside cliff in northeastern Argentina.

Cione and his colleagues now report that Megapiranha bridges the evolutionary gap between modern-day piranhas and plant-eating pacu fish. The new study appears in the June 2009 issue of the Journal of Vertebrate Paleontology.

Read more...

Egypt Asks for Loans of Artifacts Held Abroad

Egypt will request temporary loans of some of its most cherished artifacts currently on display at museums abroad, antiquities officials announced on Sunday. The requested items include the famous bust of Nefertiti currently at the Altes Museum in Berlin, Germany, and the Rosetta Stone at the British Museum in London.

Most of the items are meant for display at the 2012 opening of the new Grand Egyptian Museum, which is being built near the pyramids at Giza (see a map of Egypt).

Nefertiti's bust is requested for display at the Atun Museum, which is set to open in the Nile Delta city of Meniya in 2010, Egypt's Supreme Council of Antiquities announced in a statement.

All five of the artifacts are on a list of unique items that Zahi Hawass, head of Egypt's antiquities council, has said should be returned permanently to their homeland.

But in an email to National Geographic News, Hawass said that the antiquities council will request a letter of guarantee from the Egyptian government "that will secure the safe return of these objects to the lending institutions."

(Hawass is an Explorer-in-Residence with the National Geographic Society, which owns National Geographic News.)

"We are not 'Pirates of the Caribbean,'" he added. "We respect our contacts. We are in the 21st century."

Diplomatic Move

The recent statement from the Egyptian antiquities council called the requests a "diplomatic move."

Earlier this month a dispute escalated between Egypt and Germany over a previous request for the temporary return of the bust of Nefertiti.

Germany's Minister of State for Culture said the 3,400-year-old limestone bust is too fragile to travel the 3,000 miles (4,828 kilometers) to Cairo.

Hawass told National Geographic News "it will be a scientific war" if Germany refuses to loan the iconic artwork. The antiquities chief also said he would organize a worldwide boycott of loans to German museums if the request is denied.

Meanwhile, Egypt's Ministry of Culture says it will mail official letters to France, Germany, Great Britain, and the United States this week to request the temporary loans.

Hawass said Egypt will deal with each museum on an individual basis.

"If a museum cooperates with us, then we will continue our good relations and cooperate with them in a mutually beneficial, scientific manner," he said.

Hannah Boulton, a spokesperson for the British Museum, said that the museum will wait for the letter before commenting in detail and that museum policy is to consider any request.

She added, however, that any such loan would only be temporary.

"Obviously a precondition of the loan from the museum's collections is the recognition that the ownership is rested within the British Museum," she said.

Messages left with the Altes Museum and with two other institutions being asked for loans—the Louvre in Paris, France, and the Museum of Fine Arts in Boston, Massachusetts—went unreturned.

Top Five

Hawass, who champions the repatriation of Egyptian artifacts, has previously called for the permanent return to Egypt of all five items on the list for temporary loans.

(Read "Egypt's Antiquities Chief Combines Passion, Clout to Protect Artifacts" [October 24, 2006].)

The requested items include:

• Nefertiti's bust at the Altes Museum. The painted limestone likeness of the Egyptian queen has been in Germany since 1913, a year after German archaeologists discovered it at a site 150 miles (240 kilometers) south of Cairo.

• The Rosetta Stone at the British Museum. The writing in three languages on the 1,600-pound (726-kilogram) slab of rock was essential to deciphering Egyptian hieroglyphics.

• The Zodiac ceiling from the Dendera Temple at the Louvre in Paris. Archaeologists consider the zodiac an Egyptian representation of the astrological calendar.

• The statue of Hemiunu, an architect of the Great Pyramid, at the Roemer-Pelizaeus Museum in Hildesheim, Germany.

• The statue of Ankhaf, builder of the Chephren Pyramid, at the Museum of Fine Arts in Boston.

Hawass said the current requests for temporary loans of the five items are sincere.

"The temporary return of artifacts from museums in Europe and the United States will allow Egyptians who do not travel the opportunity of seeing wonderful masterpieces," he said.

"I believe that our request for the return of these artifacts temporarily is a fair one."



Read more...

Treasure wars Video, who owns the past?

Read more...

>> Sunday, July 5, 2009

Webpage maker pro

Web Page Maker is an easy-to-use web page editor that allows you to create and upload web pages in minutes without knowing HTML. Simply drag and drop objects onto the page and position them freely in the layout. It comes with several pre-designed templates that help you to get started. It also includes ready-to-use navigation bars that can be inserted into the page. Additional features include built-in color picker, Java script library, image library and built-in FTP client.

* Super easy-- no HTML or programming needed.
* Drag and drop text, images, animations, flash, sound any where on web page and position them freely in the layout.
* The ability to create Rectangles, roundrects, Ellipses.
* Change the color of linked text on mouse over,etc.
(Full version ONLY) See Examples
* 8 pre-designed templates are offered.
* Several ready-to-use Java Script effects are offered.
* Resize things with pixel accuracy. ( shift + arrow keys )
* Preview web page in browser with one-click.
* Publish your web site with just one-click.

Read more...

VCD Cutter latest 4.1

VCDCutter is a MPEG,VCD and Movie Player. This version can play MPG,VCD,or
other movie files(such as MPG,DAT,AVI,MOV). Very friendly and menu driven
with full featured control with movie file. VCDCutter can extract MPG,frame
from VCD or MPG file, cutting your favourite part or whole MPG file to disk
when playing

Read more...

Ulead video studio pro 6.0

Ulead VideoStudio is a consumer video editing software that lets users quickly and easily produce their own home videos complete with attractive titles, video filters, transitions, and sound. Unlike other software, Ulead VideoStudio features an intuitive step-based interface that helps users get started right away. By following the steps, from Start to Finish, you will be creating video masterpieces before you know it. Once you have completed your video projects, you can share them on tape, e-mail, the Web or burn your own high-quality VCDs, SVCDs and DVDs.

VideoStudio is easy-to-use video editing and disc authoring software for creating professional-looking videos and slide shows. Produce complete movies with the time-saving Movie Wizard or use easy editing tools. Share your creation in any format from DVD to mobile phones to the latest high-definition home theater systems. Even upload directly to YouTube to let the whole world in on the fun.

* Grab photos and video from anywhere – camcorders, cameras or TV
* Edit with the easy Movie Wizard, or with hands-on professional editing tools
* Make movies pop by adding titles, music and special effects
* Create movie & slideshow discs to share with family and friends


Read more...

Tweak now registry cleaner pro

The Registry is a heart and soul of any Windows system. It contains information that controls how your Windows appears and how it behaves. Most applications today use registry to store configuration and other important data. When you install an application, a new registry entries will be created. This entries will automatically be deleted when you uninstall the application. Unfortunately, it is not always work that way. Sometimes, you will find that some applications fail to remove their own registry entries. This entry will become obsolete. After a long period, after installing and uninstalling a lot number of applications, your Windows registry will contain a large number of obsolete entries. This will significantly increase the registry size and thus will slowdown your computer, because Windows will need more time to load, search, and read data from registry.

To keep your computer in top performance, it is recommended to periodically clean your Windows registry.

Why using TweakNow RegCleaner?

Fast: using a high performance engine, TweakNow RegCleaner quickly scan your registry to find obsolete entries.
Accurate: using complex algorithm TweakNow RegCleaner accurately identify obsolete entries.
Secure: TweakNow RegCleaner automatically create backup file before deleting obsolete entries from your registry.

Read more...

Total video converter 3.21

Total Video Converter is a total solution for video conversion which supports reading, playing all kinds of video and audio formats and converting them to popular video formats. Total Video Converter includes a powerful media conversion engine internally so that you can convert media files with very fast speed.

Strongly recommended main features with particularly attractive characteristic:

l .Convert all kinds of videos to mobile videos or audios (mp4, 3gp, xvid, divx mpeg4 avi, amr audio) which are used by cellphone, PDA, PSP;
2 .High compatibility and high efficiency for Importing RMVB or RM video/audio;
3 .Convert various videos to MPEG videos compatible with standard DVD/SVCD/VCD;
4 .Rip DVD to popular videos of all sorts;
5 .Extract audio from various of videos and convert which to all kinds of audios (mp3, ac3, ogg, wav, aac);
6 .RIP CD to audios of all sorts directly.
7 .Support using with command line(pro version)
8 .Combine several video and audio files to one video file
9 .Demultiplex or extract video and audio from one file
10 .Multiplex video and audio to one file

Read more...

Roboform pro for all users and administrators (free)

RoboForm allows you to:
. Manage your passwords and Log In automatically.
. Fill long registration and checkout forms with one click.
. Encrypt your passwords to achieve complete security.
. Generate random passwords to maximize password strength.
. Fight Phishing by entering passwords only on matching web sites.
. Defeat Keyloggers by not using the keyboard to type passwords.
. Back up your passwords and copy them between computers.
. Synchronize passwords between computers using GoodSync.

RoboForm Password Manager is
. Portable: RoboForm2Go runs from USB key, no install needed.
. Phone-friendly: sync your passwords to Windows Mobile and Palm.
. Universal: works with Internet Explorer, AOL/MSN, Firefox.
. IE 8, IE 7 and Vista are fully supported.

Read more...

RADMIN remote admin

Radmin is a remote control program that lets you work on another computer through your own. You see the remote computer's screen in a resizable window on your own monitor, or as the full screen. Your mouse and keyboard control the remote computer so you can work on it as if you were sitting right in front of it.



Radmin Structure:
The Radmin system includes two applications:

Radmin Server, which is installed on a remote computer.

Radmin Viewer on the local computer that shows the remote screen display on your own monitor.
To get started, make sure Radmin Server is running on the remote computer. Then run Radmin Viewer on the local computer and connect to the remote computer via the existing TCP/IP connection.

Read more...

Photo to dvd Film maker

"The easiest way to make films out of your favorite photos"
BSEditor: PhotoToFilm is the Perfect Companion for everyone who uses a digital camera. With PhotoToFilm you can easily make small movies out of your pictures and compress them (ie : using DivX) in order to distribute your production to your friends and relative. PhotoToFilm allows you to add professional looking effects in a few clicks and makes video authoring a game.

PhotoToFilm features ...

* User friendly interface
* Makes transitions (such as cross fading) Between your photos
* Features dynamic images support
* Sound track (MP3) support
* Supports most popular photos formats (JPEG, Bitmaps)
* OSD : On Video dynamic text insertion
* Creates movies using codecs present on your computer (such as DivX)
* Ability to burn DVDs (requires CopyToDVD)
* International support

Read more...

Coolsoft power MP3 cutter, converter and recorder

Power MP3 Cutter(MP3 Sound Cutter) can cut mp3 or wav sound piece from big mp3 or wav format files directly. You can add fade-in and fade-out effect to the exported audio easily. You can also choose to cut selected audio or unselected audio. Another powerful function is that it can do batch cut job, give it a cut job list, it will do the job one by one automatically. By using high quality decoder and encoder, the sound quality loss will be minimized.

Power MP3 Recorder and converter (MP3 Sound Recorder and converter) can record mp3 or wav files from any sound sources of your computer, such as PC sound card, cassette tape, microphone, CD player, radio, TV, etc. The target mp3 bitrate can vary from 8kbps to 320kbps. Power MP3 Recorder(MP3 Sound Recorder and converter) also supports queue recording, you can arrange recording at any time as you want. It can pause and resume the recording automatically by detecting sound level, so you will not hear silence while hearing the playback. By using high quality encoder, it will only produce high quality mp3 audio. It is very easy to use.

Read more...

Easy DVD Shrink pro

Easy DVD Shrink is an easy-to-use DVD copying software to get perfect duplicates of your favorite movies on DVD or Hard Drive with just a few clicks. The shrinking engine can fit any DVD video (up to 9.4GB) on to your DVD disc (4.7GB/Single Layer or 8.5GB/Dual Layer) with no loss of content or quality. It preserves all existing DVD contents including original menus, trailers, language tracks, subtitles, and etc. You can freely adjust the target sizes of your DVD backup.

Minimum System Requirements

· Any PC running the following platforms:
- Windows 2000 Professional/Server
- Windows XP Home/Professional
- Windows Server 2003
· 128 MB RAM
· 4.3 GB of free hard disk space (Disk space is used for storing the output video file.)

Read more...

DVD Cutter and ripper

DVD Cutter is a multifunctional and easy-to-use DVD cutter software, it enables you to cut DVD files easily by setting the start time and the end time with high quality. Then you can capture your favorite clips from your movie.

DVD Cutter has other powerful functions as well. It can quickly convert your DVD files to many other video formats including DVD to MP4, H.264, AVI, MP3, WMV, WMA, FLV, MKV, MPEG-1, MPEG-2, 3GP, 3GPP, VOB, DivX, Mov, RM, RMVB, M4A, AAC, WAV, etc
The conversion work shall finished automatically without image and sound quality loss!

Besides, it also provides edit and join functions.With it, you can crop video, effect video and customize the video settings( customize video and audio bitrate, adjust resolution, set frame rate, etc.) according to the uses' need.

Read more...

DIVx video encoder and decoder

Dr. DivX is an encoding application able to convert popular video formats to the high quality DivX format by following a simple wizard-based flow. Dr. DivX is very simple and intuitive, catering to any new user’s basic requirements while it is powerful enough to allow a professional to use its advanced features like editing, resizing, multiplexing, improving video quality, and freedom for selecting various filters etc. required in a professional environment.

This version of Dr. DivX supports video encoding from the following sources.

· Video Files – Multiple popular video format files, including script files like .avs format.

· Digital Camera – Direct input from a Digital MiniDV Camcorder.

· Live Capture – Direct input from a Capture Card.

Read more...

Boilsoft RM converter

Boilsoft RM Converter lets you easily to convert Real Media files(*.rm, *.rmvb) to AVI, MPEG-1, MPEG-2, VCD, SVCD, DVD files.



Features:

1. Convert rm, rmvb to AVI, DivX, Xvid

2. Convert rm, rmvb to Standard MPEG-1

3. Convert rm, rmvb to MPEG-1 with VCD extensions(VCD).

4. Convert rm, rmvb to Standard MPEG-2

5. Convert rm, rmvb to MPEG-2 Super Video CD extensions(SVCD).

6. Convert rm, rmvb to MPEG-2 with DVD extensions(DVD).

7. Support Batch Convert

Read more...

BadCopy Pro (CRC error recovery software)

BadCopy Pro is a leading data recovery tool for floppy disk, CD-ROM, CD-R/W and other storage media. It can effectively recover and rescue corrupted or lost data from damaged, unreadable or defective disks. Various damage situations and all file types are supported.



System Requirement:
OS: Win95/98/Win2000/Windows Me/Windows XP/Windows NT 4.0
32MB RAM, 1MB Free Hard Disk Space

Read more...

AVG anti spyware 7.5.0.50

Anti-Virus programs offer insufficient protection against urgently growing threats like Trojans, Worms, Dialers, Hijackers, Spyware and Keyloggers. That's where the protection of ewido anti-spyware begins and supplements existing security applications to create a complete security system - because only a complete security system works effectively.

AVG Anti -Spyware software which we are providing you is completely version you can directly install on your system and and run updates it will completely protect your computer from all viruses, malware, spyware and etc...

So what are you waiting for order now and protect your computer from spyware, malware and many other viruses

Read more...

2D and 3d animation creator

2D&3D Animator produces high-quality images, titles, banner ads and buttons for your Web page or for a presentation.

It comes with an object-oriented design interface that enables you to edit graphics, manipulate text and layers (graphic animations), apply special effects, and then compile the animated graphic all from within the same program. You can add shadow to object, make it glow, and draw it with opacity. Further add cool deformation, transition and color adjustment effects.

You can create animations from your own pictures (JPG, GIF, BMP, AVI, ICO, PNG) and add 3D text and shapes. In addition to font size and color, you can use colored lighting, textures and more. The layers technology helps to control over the object's placement, size, motion, and appearance.

The ready-made templates make the product easier to use. You can choose one of several ready-made templates for banners, buttons or logos. Once you select a template, you can begin to alter it any way you want. By double-clicking on objects you bring up tool bars and options.

To cut loading time for your visitors, have the program optimize your graphic by removing extraneous material. Once finished, output may be exported as GIF or AVI clips as well as JPEG, ICO, PNG or Bitmap images.

Read more...

YOGA Kundalini (Special yoga classes)

The word YOGA comes from the root Yuj which means to join, and in its spiritual sense, it is that process by which the human spirit is brought into near and conscious communion with, or is merged in, the Divine Spirit, according as the nature of the human spirit is held to be separate from (Dvaita, Visishtadvaita) or one with (Advaita) the Divine Spirit. As, according to Vedanta, the latter proposition is affirmed, Yoga is that process by which the identity of the two (Jivatman and Paramatman)—which identity ever exists, in fact—is realised by the Yogin or practitioner of Yoga. It is so realised because the Spirit has then pierced through the veil of Maya which as mind and matter obscures this knowledge from itself. The means by which this is achieved is the Yoga process which liberates the Jiva from Maya. So the Gheranda-Samhita says: “There is no bond equal in strength to Maya, and no power greater to destroy that bond than Yoga.” From an Advaitic or Monistic standpoint, Yoga in the sense of a final union is inapplicable, for union implies a dualism of the Divine and human spirit. In such case, it denotes the process rather than the result. When the two are regarded as distinct, Yoga may apply to both. A person who practises Yoga is called a Yogin.


File format: PDF
Pages: 168

Read more...

Web creation CSS, HTML, XHTML

An understanding of correct, semantic markup is essential to any web professional, so this book explains how XHTML should be used to structure content so that the markup adheres to current web standards. You’ll learn about the wide range of HTML elements available to you, and you’ll learn how and when to use them through building example web pages. Without creative use of Cascading Style Sheets (CSS), websites would all look largely the same. CSS gives you the ability to set your website apart from the rest while maintaining the integrity of your markup. You’ll learn how CSS works and how to apply styles to your pages, enabling you to realize your design ideas in the browser.


JavaScript can be used to make your website easier and more interesting to use. This book provides information on appropriate uses of this technology and introduces the concepts of programming using it. You’ll also see how JavaScript works as part of the much-hyped technique Ajax and in turn where Ajax fits into the wider Web 2.0 picture.

The book concludes by covering server-side technologies, acting as a guide to the different options available and explaining differences between available products. With insights from renowned experts such as Jason Fried of 37signals, Daniel Burka of Digg and Pownce, and Chris Messina of Citizen Agency, Foundation Website Creation provides invaluable information applicable to every web project, regardless of size, scope, or budget.

File format: PDF

Read more...

VC object oriented programming

C++ Unleashed is a survey of advanced topics in C++. The goal of this book is to provide a focused examination of each of these topics, covering the essential information you need to fully exploit the power of the C++ language. Many of the topics in this book deserve a book in their own right. Because it is not possible, given the available space, to cover every aspect of some of these subjects, the chapters in this book explain only what is most necessary for you to gain a working understanding of the technologies they describe. Often, you will find that the information provided here is sufficient for your immediate needs. Even if that is not always the case, these chapters provide a useful foundation in these advanced issues that will allow you to quickly gain a more comprehensive understanding of them with further study.


File format: PDF
Pages: 946

Read more...

VB DB Programming in 21 days

Welcome to Teach Yourself Database Programming with Visual Basic 5 in 21 Days, Second Edition. You cover a lot of ground in the next 21 lessons--from developing fully functional input screens with fewer than 10 lines of Visual Basic code and writing Visual Basic code libraries, to handling complex user security and auditing in multiuser applications, to creating online help files for your Visual Basic programs, and much more. Whether you are a power user, a business professional, a database guru, or a Visual Basic programmer, you'll find something in this book to help you improve your Visual Basic and database skills.

Each week you focus on a different aspect of database programming with Visual Basic. In Week 1, you learn about issues related to building simple database applications using the extensive collection of data controls available with Visual Basic. In Week 2, you concentrate on techniques for creating database applications using Visual Basic code. In Week 3, you study advanced topics such as SQL data definition and manipulation language, and issues for multiuser applications such as locking schemes, database integrity, and application-level security. You also learn techniques for creating ODBC-enabled Visual Basic applications.


File format: HTML

Read more...

Tricks of JAVA programming gurus

The Book of JavaScript teaches readers how to add interactivity, animation, and other tricks to their web sites with JavaScript. Rather than provide a series of cut-and-paste scripts, thau! takes the reader through a series of real world JavaScript code with an emphasis on understanding. Each chapter focuses on a few important JavaScript features, shows how professional web sites incorporate them, and takes readers through examples of how they might add those features to their own web sites.

This thoroughly updated 2nd edition includes new chapters on Ajax, revised appendices, and new examples throughout. Summary sections and assignments close each chapter, making the book perfect for use in college courses or independent study.


File format: HTML

Read more...

Thinking in JAVA second edition

Learning a complex new language is no easy task especially when it s an object-oriented computer programming language like Java. You might think the problem is your brain. It seems to have a mind of its own, a mind that doesn't always want to take in the dry, technical stuff you're forced to study.

The fact is your brain craves novelty. It's constantly searching, scanning, waiting for something unusual to happen. After all, that's the way it was built to help you stay alive. It takes all the routine, ordinary, dull stuff and filters it to the background so it won't interfere with your brain's real work--recording things that matter. How does your brain know what matters? It's like the creators of the Head First approach say, suppose you're out for a hike and a tiger jumps in front of you, what happens in your brain? Neurons fire. Emotions crank up. Chemicals surge.



File format: PDF
Pages: 1156

Read more...

TCP/IP Protocols in networking

The purpose of this tutorial is to train system administrators how to solve complicated server networking issues using standard libpcap and networking tools. The course breaks troubleshooting into 4 categories based on protocol: ethernet, IP, TCP, and application. For each category, the instructor will describe the important components of the protocol, how to use tools to monitor for errors, how to correlate the output from the tools, and the corrective actions that need to be taken. All teaching examples are in the form of case studies based off of production experiences. Example tools include tcpdump, tethereal, Wireshark, netstat, arp, route and ifconfig. Example case studies include troubleshooting arp, IP routing, TCP states, DNS, DHCP, and SMB/NFS. This tutorial provides a detailed whitepaper in addition to the presentation slides.

Attendees will learn how to apply a troubleshooting methodology using the correct tools to locate problems a server has communicating on a network. The attendee will then be able to identify the faulty component and apply the appropriate fix


File format: HTML

Read more...

Learn SQL in 21 days easy study material

Learn Sturctural Query Lanuage in 21 days. The Structures Query Language, SQL is a query language which is used with relational database. This chapter starts by describing some of the terms used in data processing and how they relate to SQL. The later part of this chapter describes relational database and how SQL is used to query them

File format: HTML

Read more...

Back to TOP