I saw Mike Knuepfel's Keyboard Frequency Sculpture a few weeks ago and thought it was an excellent idea for visualizing letter frequency data.
The height of each key corresponds to how frequently that letter is used in samples of English writing.
I wanted to see how the layout of the most frequently used letters on a QWERTY keyboard compared to those on a Dvorak
keyboard. Unfortunately, I'm no sculptor, and I couldn't see an easy
way to slice and edit the original image to rearrange the keys, so I
decided to use a color mapping instead.
The images below were created using the same letter frequency chart as the original sculpture. Pure blue is for the least frequently used letters, while pure red is most frequent.
Note
that the majority of the most frequently used keys are on the home row
in the Dvorak layout, but they're scattered all around on a QWERTY
keyboard. The QWERTY layout originated in the very early days of
mechanical typewriters, so the keys were arranged such that common
two-letter combinations were placed on opposite sides of the keyboard so
that the mechanical parts would not jam. The Dvorak layout was
designed to reduce finger motion in order to increase typing rate and
decrease errors. Despite these advantages, the Dvorak layout has still
failed to catch on.
11 Apr 2015
µTorrent Pro 3.4.2 Build 39944
The features which are present in other BitTorrent clients are here in µTorrent, including scheduling, bandwidth prioritization, RSS auto-downloading and compatibility with BitComet-Mainline DHT. µTorrent also supports peer exchange and the Protocol Encryption joint specification (compatible with Vuze / Azureus 2.4.0.0 and above and BitComet 0.63 and above).
Unlike many other torrent clients available, µTorrent does not eat away at valuable system resources; in fact, the program typically runs on approx. 6MB of memory. µTorrent is contained within a single executable file, smaller than 1 MB.
Features include:
- BitTorrent Labs icon to the status bar
- Help menu items for bundle and BitTorrent Labs
- Change logging in settings to remove OpenX
- Keyboard shortcut to refresh ads now
- Overlay image when "i" is hovered over
- Custom PDD
- Teredo Tunneling / IPv6 support
- UPnP support for all versions of Windows
- Peer exchange
- Protocol Encryption
The µTorrent software was designed to use only minimal resources, yet still offering the functionality comparable to larger BitTorrent clients. µTorrent is very user-friendly; the program updates are not scheduled and are only released when thoroughly tested. This product is available for all major releases of Windows.
µTorrent provides high quality service in a tiny package.
DOWNLOAD :
MEGA / MEGA(mirror)
USERSCLOUD
If your facing any problem fell free to mention in comments If it works dont forget to say thanks...!!
Follow Us on Facebook,Twitter,Google+ and Join our site.
Please support us just by Liking & Sharing our posts.
***Thank You***
Any Video Converter Ultimate 5.7.9
Any Video Converter Ultimate is an All-in-One DVD ripper and video converter which helps you rip DVD and convert various video formats to MP4, AVI, WMV, 3GP, 3G2, FLV, MPG and SWF. Any Video Converter Ultimate is the best DVD Ripper and video converter for your iPod, iPhone, Apple TV, Zune, PSP, PS3, all pmp, game consoles and cell phones. Besides, you can directly create DVD with DVD menu from various video formats and enjoy on your home DVD player. The new function of the program is to convert DRM M4V videos from iTunes to various devices.
Any Video Converter Ultimate can also extract audio from DVD and video, save into MP3, WMA, AAC, OGG and WAVE. It downloads and converts online videos from YouTube, Google Video, Nico Video only in one step by pasting the URL, you can also select YouTube video formats including standard FLV, normal MP4, mobile phone 3GP and HD MP4 to download and convert. Want to watch all your favorite clips, video blogs, music videos even when you're offline? If the online video you want is restricted from downloading, you can use video recording function of our program to get a good quality recording.
What's new:
1. Support converting FLAC/APE file by CUE.
2. Optimize some user interface.
3. Fix some minor bugs.
Install Notes:
1. Install Any Video Converter 5.7.9
2. Use given Name and Serials to register.
3. Done, Enjoy...
DOWNLOAD : setup+keys
MEGA / MEGA(mirror)
USERSCLOUD
keys
USERSCLOUD
If your facing any problem fell free to mention in comments
If it works dont forget to say thanks...!!
Follow Us on Facebook,Twitter,Google+ and Join our site.
Please support us just by Liking & Sharing our posts.
***Thank You***
MEGA / MEGA(mirror)
USERSCLOUD
keys
USERSCLOUD
If your facing any problem fell free to mention in comments
If it works dont forget to say thanks...!!
Follow Us on Facebook,Twitter,Google+ and Join our site.
Please support us just by Liking & Sharing our posts.
***Thank You***
10 Apr 2015
Top 5 Best free VPN's
Using a free VPN is a big risk.
If you aren’t paying for it, how is the VPN paying their costs? We
highly recommend you use a cheap VPN instead, take a look at our guide
here.
While most VPNs are priced under $10/ month this may be more than some people can afford so free VPNs are always appreciated. While these usually are limited in one way or another, the ones we have selected provide a great service at absolutely zero cost.
It’s hard for a free service to compete with a paid one due to the downsides – which we have discussed for each VPN respectively – but the services we have selected will help you achieve privacy and security while carrying out your internet activities. If you do consider getting a paid VPN but are short on cash .
WE Prefer Froot VPN
Positives: no logs, based in Romania, good client, accepts Bitcoin, allows P2P(on paid plans only) , shared IPs
Negatives: multiple simultaneous connections only allowed on most expensive plan, speed cap
Positives: great speeds, 5 simultaneous connections, easy to use software, phone support
Negatives: download cap (more can be earned), no P2P
SurfEasy is a fantastic Canadian company, with aims of bringing privacy and security to the masses, so it’s no surprise that they provide a free service alongside their normal plans. All their plans come with a whopping 5 simultaneous connections, they have easy to use clients and good speeds.
Their free plan is just as good as the normal plan but it does come with come with a data limit of 500MB (can be increased to 1.5GB with a few tasks) which is only useful for occasional/ normal use. Also in order to be able to provide the security that they do, no P2P is allowed. If you’re looking for something different they also have a Private Browser USB product, which comes with an initial fee but is valid for a life time.
Positives: entertaining, minimal logs, great performance, great clarity
Negatives: limited countries, no P2P, download cap
In many aspects TunnelBear is very similar to SurfEasy: they are Canadian, for the everyday person and don’t allow P2P. Even their pricing is similar for the paid packages. We found that TunnelBear’s support is better and their client to be a bit more useful and entertaining.
They provide 3 simultaneous connections, up to 1.5GB download limit and overall a very good company.
Positives: TPB blessed, no logs, great performance, based in Sweden
Negatives: only Swedish server, won’t be free for long
FrootVPN is a very young company and provides a completely free, absolutely no limits VPN service. They’ve also got a lot of promotion from The Pirate Bay which says a lot about it’s quality and nature. Unfortunately, while great for P2P since they have Swedish server they aren’t very useful for geo-location locked content.
While free for the moment, due to their immense influx of customers this will likely to soon so make sure you take advantage while you can. It also means that their customer service is playing catch-up and therefore can take some time to reply.
Positives: fully open source, constantly being developed, mirror sites and daily updates
Negatives: educational so does log, no P2P, slow speed
VPN Gate is developed by the University of Tsukuba by Japan and servers are ran my volunteers. It is designed as a distributed VPN system, based off of Soft-Ether, which means it’s fully open source. All of these factors, including their mirror sites and daily updates, means that it’s a fantastic tool for avoiding government censorship.
Unfortunately this does mean that P2P isn’t really allowed and connection logs are kept for nearly 3 months from all the servers. Also since it’s ran by volunteers it does mean that speeds are unreliable, limited and can change very often.
Positives: very secure way (paid or unpaid) to maintain on-line anonymity (although bear in mind that nothing is 100% secure), easy to install and use
Negatives: technically not a VPN, Slow, no P2P
We believe that CyberGhost to be the best free VPN provider out there. This is due, not only to the quality of provider, but also since we believe it is the one with the most sensible restrictions. Their speed cap means that you’ll be able to use the service as much as you want while always being protected. Granted you will be disconnected every 6 hours but this shouldn’t be a big downside.
The other VPNs listed also have a great value behind them and since they are all free you can give them a full try before deciding which one you use – absolutely perfect. So if you’re wallet is tight but you’d still like to be protected while on the internet, we’d fully recommend trying one of these completely free VPNs. Have a look below at our summary below in case you haven’t made up your mind yet.
While most VPNs are priced under $10/ month this may be more than some people can afford so free VPNs are always appreciated. While these usually are limited in one way or another, the ones we have selected provide a great service at absolutely zero cost.
It’s hard for a free service to compete with a paid one due to the downsides – which we have discussed for each VPN respectively – but the services we have selected will help you achieve privacy and security while carrying out your internet activities. If you do consider getting a paid VPN but are short on cash .
WE Prefer Froot VPN
Winner – CyberGhost
Positives: no logs, based in Romania, good client, accepts Bitcoin, allows P2P(on paid plans only) , shared IPs
Negatives: multiple simultaneous connections only allowed on most expensive plan, speed cap
CyberGhost is a large Romanian company who
has been doing fantastic developments lately. With regards to security
they are absolutely top notch, going as far as deleting your payment
details after it’s been processed, are working on some security
technologies themselves and are willing to support promising security
start ups too! Not only is their security great, but other areas of
their service such as the client and support are also fantastic.
Overall CyberGhost is a great provider, and
while their free service has a number of limitations: speed, time,
advertisement; it is superb all round.
Try Out the Best Free VPN Today!
2. SurfEasy
Positives: great speeds, 5 simultaneous connections, easy to use software, phone support
Negatives: download cap (more can be earned), no P2P
SurfEasy is a fantastic Canadian company, with aims of bringing privacy and security to the masses, so it’s no surprise that they provide a free service alongside their normal plans. All their plans come with a whopping 5 simultaneous connections, they have easy to use clients and good speeds.
Their free plan is just as good as the normal plan but it does come with come with a data limit of 500MB (can be increased to 1.5GB with a few tasks) which is only useful for occasional/ normal use. Also in order to be able to provide the security that they do, no P2P is allowed. If you’re looking for something different they also have a Private Browser USB product, which comes with an initial fee but is valid for a life time.
3. TunnelBear
Positives: entertaining, minimal logs, great performance, great clarity
Negatives: limited countries, no P2P, download cap
In many aspects TunnelBear is very similar to SurfEasy: they are Canadian, for the everyday person and don’t allow P2P. Even their pricing is similar for the paid packages. We found that TunnelBear’s support is better and their client to be a bit more useful and entertaining.
They provide 3 simultaneous connections, up to 1.5GB download limit and overall a very good company.
4. FrootVPN
Positives: TPB blessed, no logs, great performance, based in Sweden
Negatives: only Swedish server, won’t be free for long
FrootVPN is a very young company and provides a completely free, absolutely no limits VPN service. They’ve also got a lot of promotion from The Pirate Bay which says a lot about it’s quality and nature. Unfortunately, while great for P2P since they have Swedish server they aren’t very useful for geo-location locked content.
While free for the moment, due to their immense influx of customers this will likely to soon so make sure you take advantage while you can. It also means that their customer service is playing catch-up and therefore can take some time to reply.
5. VPN Gate
Positives: fully open source, constantly being developed, mirror sites and daily updates
Negatives: educational so does log, no P2P, slow speed
VPN Gate is developed by the University of Tsukuba by Japan and servers are ran my volunteers. It is designed as a distributed VPN system, based off of Soft-Ether, which means it’s fully open source. All of these factors, including their mirror sites and daily updates, means that it’s a fantastic tool for avoiding government censorship.
Unfortunately this does mean that P2P isn’t really allowed and connection logs are kept for nearly 3 months from all the servers. Also since it’s ran by volunteers it does mean that speeds are unreliable, limited and can change very often.
Bonus. Tor
Positives: very secure way (paid or unpaid) to maintain on-line anonymity (although bear in mind that nothing is 100% secure), easy to install and use
Negatives: technically not a VPN, Slow, no P2P
Not strictly a VPN service, but as a widely
used free system designed to ensure online anonymity it seemed criminal
not to mention the Tor Network here. The open source Tor client allows
you connect to the internet anonymously through a distributed network
(other Tor users) using a layered encryption service known as Onion
Routing. This means that whenever you access a website your request will
pass through at least 3 different computers (called nodes), with all
information encrypted each time to provide a very high level of
security. In addition to this, because your apparent IP is that of a
random volunteer (of which there are literally hundreds of thousands),
there is no way to even determine that you are masking your identity,
which makes this service famously invaluable for dissidents living under
restrictive governments.
The main downside is that it’s not fast, as
your traffic is being bounced around volunteers’ computers across the
world. The Tor Network also ask you not to use the service for P2P
filesharing, as the amount of traffic involved puts a severe strain on
the system and damages other users’ experience.
One use the truly paranoid may have for the
Tor Network is in conjunction with Bitcoin payments, allowing them to
maintain complete anonymity when signing up to and purchasing regular
VPN packages.
Conclusion
When your considering a free VPN make sure that you’re aware of all the restrictions imposed.We believe that CyberGhost to be the best free VPN provider out there. This is due, not only to the quality of provider, but also since we believe it is the one with the most sensible restrictions. Their speed cap means that you’ll be able to use the service as much as you want while always being protected. Granted you will be disconnected every 6 hours but this shouldn’t be a big downside.
The other VPNs listed also have a great value behind them and since they are all free you can give them a full try before deciding which one you use – absolutely perfect. So if you’re wallet is tight but you’d still like to be protected while on the internet, we’d fully recommend trying one of these completely free VPNs. Have a look below at our summary below in case you haven’t made up your mind yet.
7 Apr 2015
Forbes list of Indian billionaires
Forbes list of Indian billionaires is based on an annual assessment of wealth and assets compiled and published by Forbes magazine on 25 September 2014. The combined net worth of the 2014 class of the 100 richest Indian's is $346 billion, up from $259 billion a year ago in 2013. There are only 4 women in the top 100 India's richest people. This is the first time, all the 100 Richest people are billionaires.
The Top 10 Richest in India are:
- Dilip Shanghvi (net worth $23.42 billion)
- Mukesh Ambani (net worth $21.2 billion)
- Azim Premji (net worth $16.4 billion)
- Pallonji Mistry (net worth $15.9 billion)
- Lakshmi Mittal (net worth $15.8 billion)
- Hinduja Brothers (net worth $13.3 billion)
- Shiv Nadar (net worth $12.7 billion)
- Godrej family (net worth $11.6 billion)
- Kumar Birla (net worth $9.2 billion)
- Sunil Mittal & Family (net worth $7.8 billion)
6 Apr 2015
The first space elevator
The idea of a space elevator had been around as early as 1895, when
Russian scientist Konstantin Tsiolkovsky first explored the concept.
Inspired by the newly-built Eiffel Tower, he described a free-standing
structure reaching from ground level into geostationary orbit. Rising
some 36,000 km (22,000 mi) above the equator and following the direction
of Earth's rotation, it would have an orbital period of exactly one day
and thus be maintained in a fixed position.
A number of more detailed proposals emerged in the mid-late 20th
century, as the Space Race got underway and manned trips to Earth orbit
became increasingly routine. It was hoped that a space elevator could
drastically reduce the cost of getting into orbit – revolutionising
access to near-Earth space, the Moon, Mars and beyond. However, the
upfront investment and level of technology required meant that such a
project was rendered impractical for now, confining it to the realm of
science fiction.
By the early decades of the 21st century, the concept was being taken
more seriously, due to progress being made with carbon nanotubes. These
cylindrical molecules offered ways of synthesising an ultra-strong
material with sufficiently high tensile strength and sufficiently low
density for the elevator cable. However, they could only be produced at
extremely small scales. In 2004, the record length for a single-wall
nanotube was just 4 cm. Although highly promising, further research
would be needed to refine the manufacturing process.
It was not until the 2040s that material for a practical, full-length
cable became technically feasible, with the required tensile strength of
130 gigapascals (GPa). Even then, design challenges persisted – such as
how to nullify dangerous vibrations in the cable, triggered by
gravitational tugs from the Moon and Sun, along with pressure from gusts
of solar wind.
Major legal and financial hurdles also needed to be overcome – requiring
international agreements on safety, security and compensation in the
event of an accident or terrorist incident. The insurance arrangements
were of particular concern, given the potential for large-scale
catastrophe if something went wrong. In the interim, smaller
experimental structures were built, demonstrating the basic concept at
lower altitudes. These would eventually pave the way to a larger and
more advanced design.
By the late 2070s,*** following 15 years of construction,* a
space elevator reaching from the Earth's surface into geostationary
orbit has become fully operational. The construction process involves
placing a spacecraft at a fixed position – 35,786 km (22,236 mi) above
the equator – then gradually extending a tether down to "grow" the cable
towards Earth. It also extends upwards from this point – to over 47,000
km (29,204 mi) – a height at which objects can escape the pull of
gravity altogether. A large counterweight is placed at this outer end to
keep it taut. Locations that are most suitable as ground stations
include French Guiana, Central Africa, Sir Lanka and Indonesia.
As with most forms of transport and infrastructure in the late 21st
century, the space elevator is controlled by artificial intelligence,
which constantly monitors and maintains the structure throughout. If
necessary, robots can be dispatched to fix problems in the cable or
other components, from ground level to the cold vacuum of space. This is
rarely required, however, due to the efficiency and safety mechanisms
in the design.
A major space boom is now underway, as people and cargo can be delivered
to orbit at vastly reduced costs, compared with traditional launches.
Over 1,000 tons of material can be lifted in a single day, greater than
the weight of the International Space Station, which took over a decade
to build at the start of the century.
Although relatively slow – taking many hours to ascend – the ride is
much smoother than conventional rockets, with no high-G forces or
explosives. Upon leaving the atmosphere and reaching Low Earth Orbit,
between 160 km (99 mi) and 2,000 km (1,200 mi), cargo or passengers can
be transferred to enter their own orbit around Earth. Alternatively,
they can be jettisoned beyond geosynchronous orbit, in craft moving at
sufficient speed to escape the planet's gravity, travelling onward to
more remote destinations such as the Moon or Mars.
In the decades ahead, additional space elevators become operational
above Earth, the Moon, Mars and elsewhere in the Solar System,* with
a considerable reduction in costs and technical risks. Construction is
also made easier by lower gravity: 0.16 g for the Moon and 0.38 g on
Mars. Further into the future, space elevators are rendered obsolete by
teleportation and similar technologies.
About telnet
The telnet program is a user interface to the TELNET protocol.
Syntax
telnet [-468ELadr] [-S tos] [-b address] [-e escapechar] [-l user] [-n tracefile] [host [port]]
Description
The telnet command is used for interactive communication with another host using the TELNET protocol. It begins in command mode, where it prints a telnet command prompt ("telnet>").
If telnet is invoked with a host argument, it performs an open command implicitly (see the Commands section below for details).
If telnet is invoked with a host argument, it performs an open command implicitly (see the Commands section below for details).
Options
-4 | Force IPv4 address resolution. |
-6 | Force IPv6 address resolution. |
-8 | Request 8-bit operation. This causes an attempt to negotiate the TELNET BINARY option for both input and output. By default telnet is not "8-bit clean" (it does not recognize 8-bit character encodings such as Unicode). |
-E | Disables the escape character functionality; that is, sets the escape character to "no character". |
-L | Specifies an 8-bit data path on output. This causes the TELNET BINARY option to be negotiated on just output. |
-a | Attempt automatic login. Currently, this sends the user name via the USER variable of the ENVIRON option if supported by the remote system. The username is retrieved via the getlogin system call. |
-b address | Use bind on the local socket to bind it to a specific local address. |
-d | Sets the initial value of the debug toggle to TRUE. |
-r | Emulate rlogin. In this mode, the default escape character is a tilde. Also, the interpretation of the escape character is changed: an escape character followed by a dot causes telnet to disconnect from the remote host. A ^Z (Control-Z) instead of a dot suspends telnet, and a ^] (Control-Close Bracket, the default telnet escape character) generates a normal telnet prompt. These codes are accepted only at the beginning of a line. |
-S tos | Sets the IP type-of-service (TOS) option for the telnet connection to the value tos. |
-e escapechar | Sets the escape character to escapechar. If no character is supplied, no escape character will be used. Entering the escape character while connected causes telnet to drop to command mode. |
-l user | Specify user as the user to log in as on the remote system. This is accomplished by sending the specified name as the USER environment variable, so it requires that the remote system support the TELNET ENVIRON option. This option implies the -a option, and may also be used with the open command. |
-n tracefile | Opens tracefile for recording trace information. See the set tracefile command below. |
host | Specifies a host to contact over the network. |
port | Specifies a port number or service name to contact. If not specified, the telnet port (23) is used. |
Protocol
Once a connection has been opened, telnet will attempt to enable the TELNET LINEMODE option. If this fails, then telnet
will revert to one of two input modes: either "character at a time" or
"old line by line" depending on what the remote system supports.
When LINEMODE is enabled, character processing is done on the local system, under the control of the remote system. When input editing or character echoing is to be disabled, the remote system will relay that information. The remote system will also relay changes to any special characters that happen on the remote system, so that they can take effect on the local system.
In "character at a time" mode, most text typed is immediately sent to the remote host for processing.
In "old line by line" mode, all text is echoed locally, and (normally) only completed lines are sent to the remote host. The "local echo character" (initially "^E") may be used to turn off and on the local echo (this would mostly be used to enter passwords without the password being echoed).
If the LINEMODE option is enabled, or if the localchars toggle is TRUE (the default for "old line by line"; see below), the user's quit, intr, and flush characters are trapped locally, and sent as TELNET protocol sequences to the remote side. If LINEMODE has ever been enabled, then the user's susp and eof are also sent as TELNET protocol sequences, and quit is sent as a TELNET ABORT instead of BREAK. There are options (see toggle autoflush and toggle autosynch, below) which cause this action to flush subsequent output to the terminal (until the remote host acknowledges the TELNET sequence) and flush previous terminal input (in the case of quit and intr).
When LINEMODE is enabled, character processing is done on the local system, under the control of the remote system. When input editing or character echoing is to be disabled, the remote system will relay that information. The remote system will also relay changes to any special characters that happen on the remote system, so that they can take effect on the local system.
In "character at a time" mode, most text typed is immediately sent to the remote host for processing.
In "old line by line" mode, all text is echoed locally, and (normally) only completed lines are sent to the remote host. The "local echo character" (initially "^E") may be used to turn off and on the local echo (this would mostly be used to enter passwords without the password being echoed).
If the LINEMODE option is enabled, or if the localchars toggle is TRUE (the default for "old line by line"; see below), the user's quit, intr, and flush characters are trapped locally, and sent as TELNET protocol sequences to the remote side. If LINEMODE has ever been enabled, then the user's susp and eof are also sent as TELNET protocol sequences, and quit is sent as a TELNET ABORT instead of BREAK. There are options (see toggle autoflush and toggle autosynch, below) which cause this action to flush subsequent output to the terminal (until the remote host acknowledges the TELNET sequence) and flush previous terminal input (in the case of quit and intr).
Commands
The following telnet commands are available. Unique prefixes are understood as abbreviations.
auth argument ... | The auth command controls the TELNET AUTHENTICATE protocol option. If telnet was compiled without authentication, the auth command will not be supported. Valid arguments are as follows:
|
||||||||||||||||||||||||||||||||||||||||
close | Close the connection to the remote host, if any, and return to command mode. | ||||||||||||||||||||||||||||||||||||||||
display argument ... | Display all, or some, of the set and toggle values (see below). | ||||||||||||||||||||||||||||||||||||||||
encrypt argument ... | The encrypt command controls the TELNET ENCRYPT protocol option. If telnet was compiled without encryption, the encrypt command will not be supported. Valid arguments are as follows:
|
||||||||||||||||||||||||||||||||||||||||
environ arguments... | The environ command is used to propagate environment variables across the telnet link using the TELNET ENVIRON protocol option. All variables exported from the shell are defined, but only the DISPLAY and PRINTER variables are marked to be sent by default. The USER variable is marked to be sent if the -a or -l command-line options were used. Valid arguments for the environ command are:
|
||||||||||||||||||||||||||||||||||||||||
logout | Send the TELNET LOGOUT protocol option to the remote host. This command is similar to a close command. If the remote host does not support the LOGOUT option, nothing happens. But if it does, this command should cause it to close the connection. If the remote side also supports the concept of suspending a user's session for later reattachment, the logout command indicates that the session should be terminated immediately. | ||||||||||||||||||||||||||||||||||||||||
mode type | type is one of several options, depending on the state of the session. telnet asks the remote host to go into the requested mode. If the remote host says it can, that mode takes effect. Options for type are as follows:
|
||||||||||||||||||||||||||||||||||||||||
open host [[-l] user][- port] | Open a connection to the named host. If no port number is specified, telnet will attempt to contact a telnet daemon at the standard port (23). The host specification may be a host name or IP address. The -l option may be used to specify a user name to be passed to the remote system, like the -l command-line option. When connecting to ports other than the telnet port, telnet does not attempt telnet protocol negotiations. This makes it possible to connect to services that do not support the telnet protocol without making a mess. Protocol negotiation can be forced by placing a dash before the port number. After establishing a connection, any commands associated with the remote host in /etc/telnetrc and the user's .telnetrc file are executed, in that order. The format of the telnetrc files is as follows: Lines beginning with a #, and blank lines, are treated as comments (ignored). The rest of the file should consist of hostnames and sequences of telnet commands to use with that host. Commands should be one per line, indented by whitespace; lines beginning without whitespace are interpreted as hostnames. Lines beginning with the special hostname ‘DEFAULT’ will apply to all hosts. Hostnames including ‘DEFAULT’ may be followed immediately by a colon and a port number or string. If a port is specified it must match exactly with what is specified on the command line. If no port was specified on the command line, then the value ‘telnet’ is used. Upon connecting to a particular host, the commands associated with that host are executed. |
||||||||||||||||||||||||||||||||||||||||
quit | Close any open session and exit telnet. An end of file condition on input, when in command mode, will trigger this operation as well. | ||||||||||||||||||||||||||||||||||||||||
send arguments | Send one or more special telnet protocol character
sequences to the remote host. The following are the codes which may be
specified (more than one may be used in one command):
|
||||||||||||||||||||||||||||||||||||||||
set argument value, unset argument value | The set command will set any one of a number of telnet variables to a specific value or to TRUE. The special value off turns off the function associated with the variable. This is equivalent to using the unset command. The unset command will disable or set to FALSE any of the specified variables. The values of variables may be interrogated with the display command. The variables which may be set or unset, but not toggled, are listed here. In addition, any of the variables for the toggle command may be explicitly set or unset.
|
||||||||||||||||||||||||||||||||||||||||
slc state | The slc command ("Set Local Characters") is used to set or change the state of the the special characters when the TELNET LINEMODE option has been enabled. Special characters are characters that get mapped to TELNET commands sequences (like ip or quit) or line editing characters (like erase and kill). By default, the local special characters are exported. state may be one of the following:
|
||||||||||||||||||||||||||||||||||||||||
status | Show the current status of telnet. This includes the name of the remote host, if any, as well as the current mode. | ||||||||||||||||||||||||||||||||||||||||
toggle arguments ... | Toggle (between TRUE and FALSE) various flags that control how telnet responds to events. These flags may be set explicitly to TRUE or FALSE using the set and unset
commands. More than one flag may be toggled at once. The state of these
flags may be examined with the display command. Valid flags are:
|
||||||||||||||||||||||||||||||||||||||||
z | Suspend telnet. This command only works when the user is using the C Shell (csh). | ||||||||||||||||||||||||||||||||||||||||
! [command] | Execute a single command in a subshell on the local system. If command is omitted, then an interactive subshell is invoked. | ||||||||||||||||||||||||||||||||||||||||
? [command] | Get help. With no arguments, telnet prints a help summary. If a command is specified, telnet will print the help information for just that command. |
Environment
telnet uses at least the HOME, SHELL, DISPLAY, and TERM environment variables. Other environment variables may be propagated to the other side via the TELNET ENVIRON option.
Files
/etc/telnetrc | global telnet startup values |
~/.telnetrc | user customized telnet startup values |
Examples
telnet myhost.com
Attempts to open a connection to the remote host myhost.com. If a connection is established, the host will prompt for a login name and password.
telnet -l myusername myhost.com:5555
Attempts to open a connection to the remote host myhost.com on port 5555, using the login name myusername. If successful, the host will prompt for myusername's password.
telnet
Opens a local telnet> prompt, where you can enter any of the commands listed above. For example, entering the following command at the prompt:
telnet> open myhost.com
...will attempt to open a connection to myhost.com, as in our first example.
Encrypt
The process of making data unreadable by other humans or computers for the purpose of preventing others from gaining access to its contents. Encrypted data is generated using an encryption program such as PGP, encryption machine, or a simple encryption key and appears as garbage until it is decrypted. In order to read or use the data, it must be decrypted, and only those who have the correct password or decryption key can make the data readable again.
A very basic encryption technique known as simple substitution, substitution cipher, or Caesar cipher
(named after Julius Caesar) that shifts the letters of the alphabet
over a few characters. For example, as shown below the alphabet has been
shifted over four characters.Encrypt key:
a=e, b=f, c=g, d=h, e=i, f=j, g=k, h=l, i=m, j=n, k=o, l=p, m=q,
n=r, o=s, p=t, q=u, r=v, s=w, t=x, u=y, v=z, w=a, x=b, y=c, and z=d.
Decrypt key:
a=w, b=x, c=y, d=z, e=a, f=b, g=c, h=d, i=e, j=f, k=g, l=h, m=i, n=j, o=k, p=l, q=m, r=n, s=o, t=p, u=q, v=r, w=s, x=t, y=u, and z=v
Using this technique a user could encrypt the message . Below is an example of how this could be done using Perl.my (%key, $new); my $alpha = "abcdefghijklmnopqrstuvwxyz"; my $message = "computer hope free help for everyone"; @alpha = split(//, $alpha); my $i=1; foreach $alpha (@alpha) { if ($i >= 23) { $i = -3; } $key{$alpha} = $alpha[$i+3]; $i++; } @message = split(//,$message); foreach $message (@message) { if ($message =~/[a-z]/i) { $new .= "$key{$message}"; } else { $new .= "$message"; } } print "Old: $message\nEncrypted: $new\n";
Conversion Tool
A version of the above code is also available online to encrypt and convert your own text.
PGP
Short for Pretty Good Privacy, PGP was freeware released in 1991 by Philip Zimmermann,
PGP is a public-key authentication and encryption method based on the
IDEA single-key and RSA public-key encryption algorithms. PGP is now a
product of PGP Corporation
and still widely used encryption tool. After its initial release the
U.S. government files charges against Philip alleging he broke U.S.
encryption laws. These charges were later dropped.
Non-commercial United States citizens can also freely obtain PGP from various websites. MIT has a great page containing PGP for various platforms, see the MIT distribution site for PGP for downloads.
MIT
Short for Massachusetts Institute of Technology, MIT is a coeducational, privately endowed research University that is well known for its computer science and engineering departments and programs.
- The official MIT page can be found at http://www.mit.edu/
Decryption
Decryption is the process of taking encoded or
encrypted text or other data and converting it back into text that you
or the computer can read and understand. This term could be used to
describe a method of un-encrypting the data manually or with
un-encrypting the data using the proper codes or keys.
Data may be encrypted to make it difficult for someone to steal the information. Some companies also encrypt data for general protection of company data and trade secrets. If this data needs to be viewable, it may require decryption. If a decryption passcode or key is not available, special software may be needed to decrypt the data using algorithms to crack the decryption and make the data readable.
Data may be encrypted to make it difficult for someone to steal the information. Some companies also encrypt data for general protection of company data and trade secrets. If this data needs to be viewable, it may require decryption. If a decryption passcode or key is not available, special software may be needed to decrypt the data using algorithms to crack the decryption and make the data readable.
PERL
1.
Short for Practical Extraction and Reporting Language, Perl is an interpreted free and open source programming language first developed by Larry Wall in 1987 that is similar to the C language. Perl is one of the more commonly used languages in writing CGI scripts and programming for Internet and web page applications. Below is an example of a Perl script that prints "Hello World!".
#!/usr/bin/perl
print "Hello World!\n";
print "Hello World!\n";
Files that include Perl code on a web server may have any file extension; however, commonly end in .CGI, .PL, or .PLX.
If you're running a Linux distro, often Perl will already be installed on the computer. However, if you're using MacOS or Microsoft Windows you'll need to download and install a Perl client. We recommend ActiveState or Strawberry for Perl, found on the links below.
2. Linux command, see the perl command page for further information and syntax of this command.
CGI
1. Short for Common Gateway Interface, CGI allows visitors to a web page to send and receive information from a server. A common example of how a CGI script can be used is by allowing a user to type a set of keywords, pass those keywords to a CGI application to process a search, and then return results based on the search to the web page. Often CGI scripts and executables are run through CGI-BIN directory.
2. Short for Computer Generated Imagery, CGI is any image or sequence of images that have been generated with the aid of computers.
CGI is commonly used in movies to generate the simulated, realistic
looking images or animated objects commonly referred to as special
effects. The 1976 movie Futureworld was the first feature film to use 3D computer generated images.
Avast Internet Security 2015
Avast Internet Security is an antivirus that needs no introduction. Praised by many users for its PC protection, Avast (no longer avast!) is a multi-function security program that's very easy to use and one whose power is no longer in doubt.
Everything you need to secure your PC
Avast Internet Security offers real-time protection for your computer. It continually updates its database of virus definitions to guarantee maximum protection against online threats, including viruses, spyware and rootkits. Five types of scans are available to verify their presence on your PC and eliminate them. In addition, attacks by spam emails and phishing are neutralized by the anti-spam agent.Other types of scans are available, not just for viruses, but to optimize and improve the performance of your PC. First off is a feature that allows you to scan your computer to see if any programs need to be updated. Then, the newly added features help detect any deficiencies in terms of performance (the GrimeFighter module), and scan your local network to detect security flaws affecting your Wi-Fi, your connected devices, or your router.
To make things easier when performing these scans, the 2015 version of Avast Internet Security includes the Smart Scan feature, which combines all the essential scans into one single unified scan.
Avast Internet Security also provides you with a wide range of tools for carrying out different tasks. These tools convert Avast Internet Security into a real multifunction program that goes far beyond your basic antivirus software. Avast Internet Security also offers a feature for cleaning up your browsers: VPN Secure Line, a VPN service; SafeZone, an environment that allows you to browse securely and privately online so that you can make purchases or do online banking with very little risk; Sandbox, which allows you to run programs with less risk on the operating system by using a virtual environment; remote troubleshooting; a firewall; and a feature for creating recovery disks.
Finally, you're able to adjust several settings that let you customize Avast Internet Security's configuration. You can also access statistics showing personal and general usage.
SETUP
Keys
An accessible interface and increased performance
Despite its large number of features, Avast Internet Security is still a very accessible program with excellent ergonomics and a generally accessible interface that's extremely easy to use.For the 2015 version, Avast Internet Security maintains the same interface as its predecessor, which also underwent a complete overhaul. It retains its customizable home page, as well as the side menu to access the program's features.
To make the program easier to use, the 2015 version of Avast Internet Security provides you with a whole new support system, in addition to online help that's regularly updated.
Finally, regarding the performance of the antivirus, Avast Internet Security 2015 includes new technologies such as Secure DNS, scan HTTPS, and Home Security Network. These features are intended to strengthen the security provided by the software, but I won't burden you with all the technical details.
A first rate Antivirus
With its accessible interface, reinforced protection, and advanced settings, Avast remains a prime choice for those seeking a complete and reliable antivirus.What's new
- Smart Scan: combines all the essential scans into one single scan (antivirus, browser add-ons, software updates, home network, GrimeFighter).- Home Network Security: scans your local network to detect any security flaws affecting your Wi-Fi, your connected devices, or your router.
- Secure DNS: provides protection against DNS hijacking on your router/client.
- Scan HTTPS: The antivirus is now able to detect and decrypt traffic protected by TLS/SSL through a web content filtering component. This feature will protect you against any viruses infiltrating via HTTPS traffic and is compatible with SPDY + HTTPS/HTPP traffic.
DOWNLOAD :
KEYS :-
MEGA / MEGA(mirror)
USERSCLOUD
If your facing any problem fell free to mention in comments
If it works dont forget to say thanks...!!
Follow Us on Facebook,Twitter,Google+ and Join our site.
Please support us just by Liking & Sharing our posts.
***Thank You***
5 Apr 2015
Malwarebytes Anti-Malware Premium 2.1.4.1018
Malwarebytes Anti-Malware Premium Final Crack 2015 is very powerful anti-malware software that help you to protect your PC from all types of advanced latest malware including viruses, Trojans, spyware, adware and rootkits. Malwarebytes provides you the ultimate protection for your PC or Laptop.Malwarebytes Anti-Malware PRO can detect and remove you malware where even the best known anti-virus. Malwarebytes Anti-Malware Crack And Serial Key PRO detects and removes malware where even the best known anti-virus and anti-malware applications fail.
Malwarebytes Anti-Malware Premium Features:
- Password protect key program settings.
- Integrated Malwarebytes Chameleon.
- Private security module system.
- Ignore list for both the scanner and Protection Module
- A small list of extra utilities to help remove malware manually.
Windows XP, Windows Vista, Windows 7, Windows 8/8.1 (32-bit & 64-bit).
DOWNLOAD :
MEGA / MEGA(mirror)
USERSCLOUD
If your facing any problem fell free to mention in comments
Follow Us on Facebook,Twitter,Google+ and Join our site.
Please support us just by Liking & Sharing our posts.
***Thank You***
Subscribe to:
Posts
(
Atom
)