11 Apr 2015

Letter Frequencies and Keyboard Layouts

No comments :
I saw Mike Knuepfel's Keyboard Frequency Sculpture a few weeks ago and thought it was an excellent idea for visualizing letter frequency data.


The height of each key corresponds to how frequently that letter is used in samples of English writing.


I wanted to see how the layout of the most frequently used letters on a QWERTY keyboard compared to those on a Dvorak keyboard. Unfortunately, I'm no sculptor, and I couldn't see an easy way to slice and edit the original image to rearrange the keys, so I decided to use a color mapping instead.

The images below were created using the same letter frequency chart as the original sculpture. Pure blue is for the least frequently used letters, while pure red is most frequent.

QWERTY
Dvorak

Note that the majority of the most frequently used keys are on the home row in the Dvorak layout, but they're scattered all around on a QWERTY keyboard. The QWERTY layout originated in the very early days of mechanical typewriters, so the keys were arranged such that common two-letter combinations were placed on opposite sides of the keyboard so that the mechanical parts would not jam. The Dvorak layout was designed to reduce finger motion in order to increase typing rate and decrease errors. Despite these advantages, the Dvorak layout has still failed to catch on.







µTorrent Pro 3.4.2 Build 39944

No comments :











The features which are present in other BitTorrent clients are here in µTorrent, including scheduling, bandwidth prioritization, RSS auto-downloading and compatibility with BitComet-Mainline DHT. µTorrent also supports peer exchange and the Protocol Encryption joint specification (compatible with Vuze / Azureus 2.4.0.0 and above and BitComet 0.63 and above).
Unlike many other torrent clients available, µTorrent does not eat away at valuable system resources; in fact, the program typically runs on approx. 6MB of memory. µTorrent is contained within a single executable file, smaller than 1 MB.
Features include:


http://bit.cur.lv/AnyVideoConverterUltimate579softwareuserscloud


  • BitTorrent Labs icon to the status bar
  • Help menu items for bundle and BitTorrent Labs
  • Change logging in settings to remove OpenX
  • Keyboard shortcut to refresh ads now
  • Overlay image when "i" is hovered over
  • Custom PDD
  • Teredo Tunneling / IPv6 support
  • UPnP support for all versions of Windows
  • Peer exchange
  • Protocol Encryption
The customization options for icons, toolbar graphics and status icon replacements are vast, you can even create your own. µTorrent incorporates localization support and has language support; therefore it will automatically change to your system language.
The µTorrent software was designed to use only minimal resources, yet still offering the functionality comparable to larger BitTorrent clients. µTorrent is very user-friendly; the program updates are not scheduled and are only released when thoroughly tested. This product is available for all major releases of Windows.
µTorrent provides high quality service in a tiny package.

DOWNLOAD :

                            MEGA / MEGA(mirror)

                            USERSCLOUD


If your facing any problem fell free to mention in comments If it works dont forget to say thanks...!!

Follow Us on Facebook,Twitter,Google+ and Join our site.

Please support us just by Liking & Sharing our posts.
                           ***Thank You***






Any Video Converter Ultimate 5.7.9

2 comments :





Any Video Converter Ultimate is an All-in-One DVD ripper and video converter which helps you rip DVD and convert various video formats to MP4, AVI, WMV, 3GP, 3G2, FLV, MPG and SWF. Any Video Converter Ultimate is the best DVD Ripper and video converter for your iPod, iPhone, Apple TV, Zune, PSP, PS3, all pmp, game consoles and cell phones. Besides, you can directly create DVD with DVD menu from various video formats and enjoy on your home DVD player. The new function of the program is to convert DRM M4V videos from iTunes to various devices.

Any Video Converter Ultimate can also extract audio from DVD and video, save into MP3, WMA, AAC, OGG and WAVE. It downloads and converts online videos from YouTube, Google Video, Nico Video only in one step by pasting the URL, you can also select YouTube video formats including standard FLV, normal MP4, mobile phone 3GP and HD MP4 to download and convert. Want to watch all your favorite clips, video blogs, music videos even when you're offline? If the online video you want is restricted from downloading, you can use video recording function of our program to get a good quality recording.

What's new:
1. Support converting FLAC/APE file by CUE.
2. Optimize some user interface.

3. Fix some minor bugs.



http://bit.cur.lv/AnyVideoConverterUltimate579softwareuserscloud

Install Notes:

1. Install Any Video Converter 5.7.9
2. Use given Name and Serials to register.
3. Done, Enjoy...
 DOWNLOAD :     setup+keys
  

                                   MEGA / MEGA(mirror)

                                   USERSCLOUD 


 keys
                                 USERSCLOUD

 

If your facing any problem fell free to mention in comments

If it works dont forget to say thanks...!!

Follow Us on Facebook,Twitter,Google+ and Join our site.

Please support us just by Liking & Sharing our posts.

                           ***Thank You*** 





10 Apr 2015

Top 5 Best free VPN's

No comments :
Using a free VPN is a big risk. If you aren’t paying for it, how is the VPN paying their costs? We highly recommend you use a cheap VPN instead, take a look at our guide here.

While most VPNs are priced under $10/ month this may be more than some people can afford so free VPNs are always appreciated. While these usually are limited in one way or another, the ones we have selected provide a great service at absolutely zero cost. 
It’s hard for a free service to compete with a paid one due to the downsides – which we have discussed for each VPN respectively – but the services we have selected will help you achieve privacy and security while carrying out your internet activities. If you do consider getting a paid VPN but are short on cash .


WE Prefer Froot VPN

Winner – CyberGhost

CyberGhost Logo
Positives: no logs, based in Romania, good client, accepts Bitcoin, allows P2P(on paid plans only) , shared IPs
Negativesmultiple simultaneous connections only allowed on most expensive plan, speed cap
CyberGhost is a large Romanian company who has been doing fantastic developments lately. With regards to security they are absolutely top notch, going as far as deleting your payment details after it’s been processed, are working on some security technologies themselves and are willing to support promising security start ups too! Not only is their security great, but other areas of their service such as the client and support are also fantastic.
Overall CyberGhost is a great provider, and while their free service has a number of limitations: speed, time, advertisement; it is superb all round.
Try Out the Best Free VPN Today!

2. SurfEasy

SurfEasy Logo
Positives: great speeds, 5 simultaneous connections, easy to use software, phone support
Negatives: download cap (more can be earned), no P2P
SurfEasy is a fantastic Canadian company, with aims of bringing privacy and security to the masses, so it’s no surprise that they provide a free service alongside their normal plans. All their plans come with a whopping 5 simultaneous connections, they have easy to use clients and good speeds.
Their free plan is just as good as the normal plan but it does come with come with a data limit of 500MB (can be increased to 1.5GB with a few tasks) which is only useful for occasional/ normal use. Also in order to be able to provide the security that they do, no P2P is allowed. If you’re looking for something different they also have a Private Browser USB product, which comes with an initial fee but is valid for a life time.

3. TunnelBear

TunnelBear Logo
Positives: entertaining, minimal logs, great performance, great clarity
Negatives: limited countries, no P2P, download cap
In many aspects TunnelBear is very similar to SurfEasy: they are Canadian, for the everyday person and don’t allow P2P. Even their pricing is similar for the paid packages. We found that TunnelBear’s support is better and their client to be a bit more useful and entertaining.
They provide 3 simultaneous connections, up to 1.5GB download limit and overall a very good company.

4. FrootVPN

FrootVPN Logo
Positives: TPB blessed, no logs, great performance, based in Sweden
Negatives: only Swedish server, won’t be free for long
FrootVPN is a very young company and provides a completely free, absolutely no limits VPN service. They’ve also got a lot of promotion from The Pirate Bay which says a lot about it’s quality and nature. Unfortunately, while great for P2P since they have Swedish server they aren’t very useful for geo-location locked content.
While free for the moment, due to their immense influx of customers this will likely to soon so make sure you take advantage while you can. It also means that their customer service is playing catch-up and therefore can take some time to reply.

5. VPN Gate

VPNGate Logo
Positives: fully open source, constantly being developed, mirror sites and daily updates
Negatives: educational so does log, no P2P, slow speed
VPN Gate is developed by the University of Tsukuba by Japan and servers are ran my volunteers. It is designed as a distributed VPN system, based off of Soft-Ether, which means it’s fully open source. All of these factors, including their mirror sites and daily updates, means that it’s a fantastic tool for avoiding government censorship.
Unfortunately this does mean that P2P isn’t really allowed and connection logs are kept for nearly 3 months from all the servers. Also since it’s ran by volunteers it does mean that speeds are unreliable, limited and can change very often.

Bonus. Tor

Tor Logo
Positives: very secure way (paid or unpaid) to maintain on-line anonymity (although bear in mind that nothing is 100% secure), easy to install and use
Negatives: technically not a VPN, Slow, no P2P
Not strictly a VPN service, but as a widely used free system designed to ensure online anonymity it seemed criminal not to mention the Tor Network here. The open source Tor client allows you connect to the internet anonymously through a distributed network (other Tor users) using a layered encryption service known as Onion Routing. This means that whenever you access a website your request will pass through at least 3 different computers (called nodes), with all information encrypted each time to provide a very high level of security. In addition to this, because your apparent IP is that of a random volunteer (of which there are literally hundreds of thousands), there is no way to even determine that you are masking your identity, which makes this service famously invaluable for dissidents living under restrictive governments.
The main downside is that it’s not fast, as your traffic is being bounced around volunteers’ computers across the world. The Tor Network also ask you not to use the service for P2P filesharing, as the amount of traffic involved puts a severe strain on the system and damages other users’ experience.
One use the truly paranoid may have for the Tor Network is in conjunction with Bitcoin payments, allowing them  to maintain complete anonymity when signing up to and purchasing regular VPN packages.

Conclusion

When your considering a free VPN make sure that you’re aware of all the restrictions imposed.
We believe that CyberGhost to be the best free VPN provider out there. This is due, not only to the quality of provider, but also since we believe it is the one with the most sensible restrictions. Their speed cap means that you’ll be able to use the service as much as you want while always being protected. Granted you will be disconnected every 6 hours but this shouldn’t be a big downside.
The other VPNs listed also have a great value behind them and since they are all free you can give them a full try before deciding which one you use – absolutely perfect. So if you’re wallet is tight but you’d still like to be protected while on the internet, we’d fully recommend trying one of these completely free VPNs. Have a look below at our summary below in case you haven’t made up your mind yet.

7 Apr 2015

Forbes list of Indian billionaires

No comments :

                                                             Forbes list of Indian billionaires is based on an annual assessment of wealth and assets compiled and published by Forbes magazine on 25 September 2014. The combined net worth of the 2014 class of the 100 richest Indian's is $346 billion, up from $259 billion a year ago in 2013. There are only 4 women in the top 100 India's richest people. This is the first time, all the 100 Richest people are billionaires.


The Top 10 Richest in India are:
  1. Dilip Shanghvi (net worth $23.42 billion)
  2. Mukesh Ambani (net worth $21.2 billion)
  3. Azim Premji (net worth $16.4 billion)
  4. Pallonji Mistry (net worth $15.9 billion)
  5. Lakshmi Mittal (net worth $15.8 billion)
  6. Hinduja Brothers (net worth $13.3 billion)
  7. Shiv Nadar (net worth $12.7 billion)
  8. Godrej family (net worth $11.6 billion)
  9. Kumar Birla (net worth $9.2 billion)
  10. Sunil Mittal & Family (net worth $7.8 billion)

6 Apr 2015

The first space elevator

1 comment :
 
The idea of a space elevator had been around as early as 1895, when Russian scientist Konstantin Tsiolkovsky first explored the concept. Inspired by the newly-built Eiffel Tower, he described a free-standing structure reaching from ground level into geostationary orbit. Rising some 36,000 km (22,000 mi) above the equator and following the direction of Earth's rotation, it would have an orbital period of exactly one day and thus be maintained in a fixed position.
A number of more detailed proposals emerged in the mid-late 20th century, as the Space Race got underway and manned trips to Earth orbit became increasingly routine. It was hoped that a space elevator could drastically reduce the cost of getting into orbit – revolutionising access to near-Earth space, the Moon, Mars and beyond. However, the upfront investment and level of technology required meant that such a project was rendered impractical for now, confining it to the realm of science fiction.
By the early decades of the 21st century, the concept was being taken more seriously, due to progress being made with carbon nanotubes. These cylindrical molecules offered ways of synthesising an ultra-strong material with sufficiently high tensile strength and sufficiently low density for the elevator cable. However, they could only be produced at extremely small scales. In 2004, the record length for a single-wall nanotube was just 4 cm. Although highly promising, further research would be needed to refine the manufacturing process.
It was not until the 2040s that material for a practical, full-length cable became technically feasible, with the required tensile strength of 130 gigapascals (GPa). Even then, design challenges persisted – such as how to nullify dangerous vibrations in the cable, triggered by gravitational tugs from the Moon and Sun, along with pressure from gusts of solar wind.
Major legal and financial hurdles also needed to be overcome – requiring international agreements on safety, security and compensation in the event of an accident or terrorist incident. The insurance arrangements were of particular concern, given the potential for large-scale catastrophe if something went wrong. In the interim, smaller experimental structures were built, demonstrating the basic concept at lower altitudes. These would eventually pave the way to a larger and more advanced design.
By the late 2070s,*** following 15 years of construction,* a space elevator reaching from the Earth's surface into geostationary orbit has become fully operational. The construction process involves placing a spacecraft at a fixed position – 35,786 km (22,236 mi) above the equator – then gradually extending a tether down to "grow" the cable towards Earth. It also extends upwards from this point – to over 47,000 km (29,204 mi) – a height at which objects can escape the pull of gravity altogether. A large counterweight is placed at this outer end to keep it taut. Locations that are most suitable as ground stations include French Guiana, Central Africa, Sir Lanka and Indonesia.
As with most forms of transport and infrastructure in the late 21st century, the space elevator is controlled by artificial intelligence, which constantly monitors and maintains the structure throughout. If necessary, robots can be dispatched to fix problems in the cable or other components, from ground level to the cold vacuum of space. This is rarely required, however, due to the efficiency and safety mechanisms in the design.
A major space boom is now underway, as people and cargo can be delivered to orbit at vastly reduced costs, compared with traditional launches. Over 1,000 tons of material can be lifted in a single day, greater than the weight of the International Space Station, which took over a decade to build at the start of the century.
Although relatively slow – taking many hours to ascend – the ride is much smoother than conventional rockets, with no high-G forces or explosives. Upon leaving the atmosphere and reaching Low Earth Orbit, between 160 km (99 mi) and 2,000 km (1,200 mi), cargo or passengers can be transferred to enter their own orbit around Earth. Alternatively, they can be jettisoned beyond geosynchronous orbit, in craft moving at sufficient speed to escape the planet's gravity, travelling onward to more remote destinations such as the Moon or Mars.
In the decades ahead, additional space elevators become operational above Earth, the Moon, Mars and elsewhere in the Solar System,* with a considerable reduction in costs and technical risks. Construction is also made easier by lower gravity: 0.16 g for the Moon and 0.38 g on Mars. Further into the future, space elevators are rendered obsolete by teleportation and similar technologies.

About telnet

No comments :

The telnet program is a user interface to the TELNET protocol.

Syntax

telnet [-468ELadr] [-S tos] [-b address] [-e escapechar] [-l user] 
       [-n tracefile] [host [port]]

Description

The telnet command is used for interactive communication with another host using the TELNET protocol. It begins in command mode, where it prints a telnet command prompt ("telnet>").

If telnet is invoked with a host argument, it performs an open command implicitly (see the Commands section below for details).

Options

-4 Force IPv4 address resolution.
-6 Force IPv6 address resolution.
-8 Request 8-bit operation. This causes an attempt to negotiate the TELNET BINARY option for both input and output. By default telnet is not "8-bit clean" (it does not recognize 8-bit character encodings such as Unicode).
-E Disables the escape character functionality; that is, sets the escape character to "no character".
-L Specifies an 8-bit data path on output. This causes the TELNET BINARY option to be negotiated on just output.
-a Attempt automatic login. Currently, this sends the user name via the USER variable of the ENVIRON option if supported by the remote system. The username is retrieved via the getlogin system call.
-b address Use bind on the local socket to bind it to a specific local address.
-d Sets the initial value of the debug toggle to TRUE.
-r Emulate rlogin. In this mode, the default escape character is a tilde. Also, the interpretation of the escape character is changed: an escape character followed by a dot causes telnet to disconnect from the remote host. A ^Z (Control-Z) instead of a dot suspends telnet, and a ^] (Control-Close Bracket, the default telnet escape character) generates a normal telnet prompt. These codes are accepted only at the beginning of a line.
-S tos Sets the IP type-of-service (TOS) option for the telnet connection to the value tos.
-e escapechar Sets the escape character to escapechar. If no character is supplied, no escape character will be used. Entering the escape character while connected causes telnet to drop to command mode.
-l user Specify user as the user to log in as on the remote system. This is accomplished by sending the specified name as the USER environment variable, so it requires that the remote system support the TELNET ENVIRON option. This option implies the -a option, and may also be used with the open command.
-n tracefile Opens tracefile for recording trace information. See the set tracefile command below.
host Specifies a host to contact over the network.
port Specifies a port number or service name to contact. If not specified, the telnet port (23) is used.

Protocol

Once a connection has been opened, telnet will attempt to enable the TELNET LINEMODE option. If this fails, then telnet will revert to one of two input modes: either "character at a time" or "old line by line" depending on what the remote system supports.

When LINEMODE is enabled, character processing is done on the local system, under the control of the remote system. When input editing or character echoing is to be disabled, the remote system will relay that information. The remote system will also relay changes to any special characters that happen on the remote system, so that they can take effect on the local system.

In "character at a time" mode, most text typed is immediately sent to the remote host for processing.

In "old line by line" mode, all text is echoed locally, and (normally) only completed lines are sent to the remote host. The "local echo character" (initially "^E") may be used to turn off and on the local echo (this would mostly be used to enter passwords without the password being echoed).

If the LINEMODE option is enabled, or if the localchars toggle is TRUE (the default for "old line by line"; see below), the user's quit, intr, and flush characters are trapped locally, and sent as TELNET protocol sequences to the remote side. If LINEMODE has ever been enabled, then the user's susp and eof are also sent as TELNET protocol sequences, and quit is sent as a TELNET ABORT instead of BREAK. There are options (see toggle autoflush and toggle autosynch, below) which cause this action to flush subsequent output to the terminal (until the remote host acknowledges the TELNET sequence) and flush previous terminal input (in the case of quit and intr).

Commands

The following telnet commands are available. Unique prefixes are understood as abbreviations.
auth argument ... The auth command controls the TELNET AUTHENTICATE protocol option. If telnet was compiled without authentication, the auth command will not be supported. Valid arguments are as follows:

disable type Disable the specified type of authentication. To obtain a list of available types, use the auth disable ? command.
enable type Enable the specified type of authentication. To obtain a list of available types, use the auth enable ? command.
status List the current status of the various types of authentication.
Note that the current version of telnet does not support authentication.
close Close the connection to the remote host, if any, and return to command mode.
display argument ... Display all, or some, of the set and toggle values (see below).
encrypt argument ... The encrypt command controls the TELNET ENCRYPT protocol option. If telnet was compiled without encryption, the encrypt command will not be supported.

Valid arguments are as follows:

disable type [input|output] Disable the specified type of encryption. If you do not specify input or output, encryption of both is disabled. To obtain a list of available types, use "encrypt disable ?".
enable type [input|output] Enable the specified type of encryption. If you do not specify input or output, encryption of both is enabled. To obtain a list of available types, use "encrypt enable ?".
input This is the same as "encrypt start input".
-input This is the same as "encrypt stop input".
output This is the same as "encrypt start output".
-output This is the same as "encrypt stop output".
start [input|output] Attempt to begin encrypting. If you do not specify input or output, encryption of both input and output is started.
status Display the current status of the encryption module.
stop [input|output] Stop encrypting. If you do not specify input or output, encryption of both is stopped.
type type Sets the default type of encryption to be used with later "encrypt start" or "encrypt stop" commands.
Note that the current version of telnet does not support encryption.
environ arguments... The environ command is used to propagate environment variables across the telnet link using the TELNET ENVIRON protocol option. All variables exported from the shell are defined, but only the DISPLAY and PRINTER variables are marked to be sent by default. The USER variable is marked to be sent if the -a or -l command-line options were used.

Valid arguments for the environ command are:

define variable value Define the variable variable to have a value of value. Any variables defined by this command are automatically marked for propagation ("exported"). The value may be enclosed in single or double quotes so that tabs and spaces may be included.
undefine variable Remove any existing definition of variable.
export variable Mark the specified variable for propagation to the remote host.
unexport variable Do not mark the specified variable for propagation to the remote host. The remote host may still ask explicitly for variables that are not exported.
list List the current set of environment variables. Those marked with an asterisk ("*") will be propagated to the remote host. The remote host may still ask explicitly for the rest.
? Prints out help information for the environ command.
logout Send the TELNET LOGOUT protocol option to the remote host. This command is similar to a close command. If the remote host does not support the LOGOUT option, nothing happens. But if it does, this command should cause it to close the connection. If the remote side also supports the concept of suspending a user's session for later reattachment, the logout command indicates that the session should be terminated immediately.
mode type type is one of several options, depending on the state of the session. telnet asks the remote host to go into the requested mode. If the remote host says it can, that mode takes effect. Options for type are as follows:

character Disable the TELNET LINEMODE option, or, if the remote side does not understand the LINEMODE option, then enter "character at a time" mode.
line Enable the TELNET LINEMODE option, or, if the remote side does not understand the LINEMODE option, then attempt to enter "old-line-by-line" mode.
isig (-isig) Attempt to enable (disable) the TRAPSIG mode of the LINEMODE option. This requires that the LINEMODE option be enabled.
edit (-edit) Attempt to enable (disable) the EDIT mode of the LINEMODE option. This requires that the LINEMODE option be enabled.
softtabs (-softtabs) Attempt to enable (disable) the SOFT_TAB mode of the LINEMODE option. This requires that the LINEMODE option be enabled.
litecho (-litecho) Attempt to enable (disable) the LIT_ECHO mode of the LINEMODE option. This requires that the LINEMODE option be enabled.
? Prints out help information for the mode command.
open host [[-l] user][- port] Open a connection to the named host. If no port number is specified, telnet will attempt to contact a telnet daemon at the standard port (23). The host specification may be a host name or IP address. The -l option may be used to specify a user name to be passed to the remote system, like the -l command-line option.

When connecting to ports other than the telnet port, telnet does not attempt telnet protocol negotiations. This makes it possible to connect to services that do not support the telnet protocol without making a mess. Protocol negotiation can be forced by placing a dash before the port number.

After establishing a connection, any commands associated with the remote host in /etc/telnetrc and the user's .telnetrc file are executed, in that order.

The format of the telnetrc files is as follows: Lines beginning with a #, and blank lines, are treated as comments (ignored). The rest of the file should consist of hostnames and sequences of telnet commands to use with that host. Commands should be one per line, indented by whitespace; lines beginning without whitespace are interpreted as hostnames. Lines beginning with the special hostname ‘DEFAULT’ will apply to all hosts. Hostnames including ‘DEFAULT’ may be followed immediately by a colon and a port number or string. If a port is specified it must match exactly with what is specified on the command line. If no port was specified on the command line, then the value ‘telnet’ is used. Upon connecting to a particular host, the commands associated with that host are executed.
quit Close any open session and exit telnet. An end of file condition on input, when in command mode, will trigger this operation as well.
send arguments Send one or more special telnet protocol character sequences to the remote host. The following are the codes which may be specified (more than one may be used in one command):

abort Sends the TELNET ABORT (Abort Processes) sequence.
ao Sends the TELNET AO (Abort Output) sequence, which should cause the remote system to flush all output from the remote system to the user's terminal.
ayt Sends the TELNET AYT (Are You There?) sequence, to which the remote system may or may not choose to respond.
brk Sends the TELNET BRK (Break) sequence, which may have significance to the remote system.
ec Sends the TELNET EC (Erase Character) sequence, which should cause the remote system to erase the last character entered.
el Sends the TELNET EL (Erase Line) sequence, which should cause the remote system to erase the line currently being entered.
eof Sends the TELNET EOF (End Of File) sequence.
eor Sends the TELNET EOR (End of Record) sequence.
escape Sends the current telnet escape character.
ga Sends the TELNET GA (Go Ahead) sequence, which likely has no significance to the remote system.
getstatus If the remote side supports the TELNET STATUS command, getstatus will send the subnegotiation to request that the server send its current option status.
ip Sends the TELNET IP (Interrupt Process) sequence, which should cause the remote system to abort the currently running process.
nop Sends the TELNET NOP (No Operation) sequence.
susp Sends the TELNET SUSP (Suspend Process) sequence.
synch Sends the TELNET SYNCH sequence. This sequence causes the remote system to discard all previously typed (but not yet read) input. This sequence is sent as TCP urgent data (and may not work if the remote system is a 4.2 BSD system -- if it doesn't work, a lower case "r" may be echoed on the terminal).
do cmd Sends the TELNET DO cmd sequence. cmd can be either a decimal number between 0 and 255, or a symbolic name for a specific TELNET command. cmd can also be either help or ? to print out help information, including a list of known symbolic names.
dont cmd, will cmd, wont cmd Similar to do.
? Prints out help information for the send command.
set argument value, unset argument value The set command will set any one of a number of telnet variables to a specific value or to TRUE. The special value off turns off the function associated with the variable. This is equivalent to using the unset command. The unset command will disable or set to FALSE any of the specified variables. The values of variables may be interrogated with the display command. The variables which may be set or unset, but not toggled, are listed here. In addition, any of the variables for the toggle command may be explicitly set or unset.

ayt If telnet is in localchars mode, or LINEMODE is enabled, and the status character is typed, a TELNET AYT sequence is sent to the remote host. The initial value for the "Are You There" character is the terminal's status character.
echo This is the value (initially "^E") which, when in "line by line" mode, toggles between doing local echoing of entered characters (for normal processing), and suppressing echoing of entered characters (for entering, say, a password).
eof If telnet is operating in LINEMODE or "old line by line" mode, entering this character as the first character on a line will cause this character to be sent to the remote system. The initial value of the eof character is taken to be the terminal's eof character.
erase If telnet is in localchars mode (see toggle localchars below), and if telnet is operating in "character at a time" mode, then when this character is typed, a TELNET EC sequence (see send ec above) is sent to the remote system. The initial value for the erase character is taken to be the terminal's erase character.
escape This is the telnet escape character (initially "^[") which causes entry into telnet command mode (when connected to a remote system).
flushoutput If telnet is in localchars mode (see toggle localchars below) and the flushoutput character is typed, a TELNET AO sequence (see send ao above) is sent to the remote host. The initial value for the flush character is taken to be the terminal's flush character.
forw1, forw2 If telnet is operating in LINEMODE, these are the characters that, when typed, cause partial lines to be forwarded to the remote system. The initial value for the forwarding characters are taken from the terminal's eol and eol2 characters.
interrupt If telnet is in localchars mode (see toggle localchars below) and the interrupt character is typed, a TELNET IP sequence (see send ip above) is sent to the remote host. The initial value for the interrupt character is taken to be the terminal's intr character.
kill If telnet is in localchars mode (see toggle localchars below), and if telnet is operating in "character at a time" mode, then when this character is typed, a TELNET EL sequence (see send el above) is sent to the remote system. The initial value for the kill character is taken to be the terminal's kill character.
lnext If telnet is operating in LINEMODE or "old line by line" mode, then this character is taken to be the terminal's lnext character. The initial value for the lnext character is taken to be the terminal's lnext character.
quit If telnet is in localchars mode (see toggle localchars below) and the quit character is typed, a TELNET BRK sequence (see send brk above) is sent to the remote host. The initial value for the quit character is taken to be the terminal's quit character.
reprint If telnet is operating in LINEMODE or "old line by line" mode, then this character is taken to be the terminal's reprint character. The initial value for the reprint character is taken to be the terminal's reprint character.
rlogin This is the rlogin mode escape character. Setting it enables rlogin mode, as with the r command-line option (see above).
start If the TELNET TOGGLE-FLOW-CONTROL option has been enabled, then this character is taken to be the terminal's start character. The initial value for the kill character is taken to be the terminal's start character.
stop If the TELNET TOGGLE-FLOW-CONTROL option has been enabled, then this character is taken to be the terminal's stop character. The initial value for the kill character is taken to be the terminal's stop character.
susp If telnet is in localchars mode, or LINEMODE is enabled, and the suspend character is typed, a TELNET SUSP sequence (see send susp above) is sent to the remote host. The initial value for the suspend character is taken to be the terminal's suspend character.
tracefile This is the file to which the output, caused by netdata or option tracing being TRUE, will be written. If it is set to "-", then tracing information will be written to standard output (this is the default).
worderase If telnet is operating in LINEMODE or "old line by line" mode, then this character is taken to be the terminal's worderase character. The initial value for the worderase character is taken to be the terminal's worderase character.
? Displays the legal set (or unset) commands.
slc state The slc command ("Set Local Characters") is used to set or change the state of the the special characters when the TELNET LINEMODE option has been enabled. Special characters are characters that get mapped to TELNET commands sequences (like ip or quit) or line editing characters (like erase and kill). By default, the local special characters are exported.

state may be one of the following:
check Verify the current settings for the current special characters. The remote side is requested to send all the current special character settings, and if there are any discrepancies with the local side, the local side will switch to the remote value.
export Switch to the local defaults for the special characters. The local default characters are those of the local terminal at the time when telnet was started.
import Switch to the remote defaults for the special characters. The remote default characters are those of the remote system at the time when the TELNET connection was established.
? Prints out help information for the slc command.
status Show the current status of telnet. This includes the name of the remote host, if any, as well as the current mode.
toggle arguments ... Toggle (between TRUE and FALSE) various flags that control how telnet responds to events. These flags may be set explicitly to TRUE or FALSE using the set and unset commands. More than one flag may be toggled at once. The state of these flags may be examined with the display command. Valid flags are:

authdebug Turns on debugging for the authentication code. This flag only exists if authentication support is enabled.
autoflush If autoflush and localchars are both TRUE, then when the ao, or quit characters are recognized (and transformed into TELNET sequences; see set above for details), telnet refuses to display any data on the user's terminal until the remote system acknowledges (via a TELNET TIMING MARK option) that it has processed those TELNET sequences. The initial value for this toggle is TRUE if the terminal user had not done an "stty noflsh", otherwise FALSE (see stty).
autoencrypt, autodecrypt When the TELNET ENCRYPT option is negotiated, by default the actual encryption (or decryption) of the data stream does not start automatically. The autoencrypt (or autodecrypt) command states that encryption of the output (input) stream should be enabled as soon as possible.

Note that this flag exists only if encryption support is enabled.
autologin If the remote side supports the TELNET AUTHENTICATION option, telnet attempts to use it to perform automatic authentication. If the TELNET AUTHENTICATION option is not supported, the user's login name is propagated using the TELNET ENVIRON option. Setting this flag is the same as specifying the a option to the open command or on the command line.
autosynch If autosynch and localchars are both TRUE, then when either the intr or quit characters is typed (see set above for descriptions of the intr and quit characters), the resulting telnet sequence sent is followed by the TELNET SYNCH sequence. This procedure should cause the remote system to begin throwing away all previously typed input until both of the telnet sequences have been read and acted upon. The initial value of this toggle is FALSE.
binary Enable or disable the TELNET BINARY option on both input and output.
inbinary Enable or disable the TELNET BINARY option on input.
outbinary Enable or disable the TELNET BINARY option on output.
crlf If this is TRUE, then carriage returns will be sent as CR LF. If this is FALSE, then carriage returns will be send as CR NUL. The initial value for this toggle is FALSE.
crmod Toggle carriage return mode. When this mode is enabled, most carriage return characters received from the remote host will be mapped into a carriage return followed by a line feed. This mode does not affect those characters typed by the user, only those received from the remote host. This mode is not very useful unless the remote host only sends carriage return, but never line feed. The initial value for this toggle is FALSE.
debug Toggles socket level debugging (useful only to the super user). The initial value for this toggle is FALSE.
encdebug Turns on debugging information for the encryption code. Note that this flag only exists if encryption support is available.
localchars If this is TRUE, then the flush, interrupt, quit, erase, and kill characters (see set above) are recognized locally, and transformed into (hopefully) appropriate TELNET control sequences (respectively ao, ip, brk, ec, and el; see send above). The initial value for this toggle is TRUE in "old line by line" mode, and FALSE in "character at a time" mode. When the LINEMODE option is enabled, the value of localchars is ignored, and assumed to always be TRUE. If LINEMODE has ever been enabled, then quit is sent as abort, and eof and are sent as eof and susp; see send above).
netdata Toggles the display of all network data (in hexadecimal format). The initial value for this toggle is FALSE.
options Toggles the display of some internal telnet protocol processing (having to do with telnet options). The initial value for this toggle is FALSE.
prettydump When the netdata toggle is enabled, if prettydump is enabled the output from the netdata command will be formatted in a more user-readable format. Spaces are put between each character in the output, and the beginning of telnet escape sequences are preceded by an asterisk ("*") to aid in locating them.
skiprc When the skiprc toggle is TRUE, telnet does not read the telnetrc files. The initial value for this toggle is FALSE.
termdata Toggles the display of all terminal data (in hexadecimal format). The initial value for this toggle is FALSE.
verbose_encrypt When the verbose_encrypt toggle is TRUE, TELNET prints out a message each time encryption is enabled or disabled. The initial value for this toggle is FALSE. This flag only exists if encryption support is available.
? Displays the legal toggle commands.
z Suspend telnet. This command only works when the user is using the C Shell (csh).
! [command] Execute a single command in a subshell on the local system. If command is omitted, then an interactive subshell is invoked.
? [command] Get help. With no arguments, telnet prints a help summary. If a command is specified, telnet will print the help information for just that command.

Environment

telnet uses at least the HOME, SHELL, DISPLAY, and TERM environment variables. Other environment variables may be propagated to the other side via the TELNET ENVIRON option.

Files

/etc/telnetrc global telnet startup values
~/.telnetrc user customized telnet startup values

Examples

telnet myhost.com
Attempts to open a connection to the remote host myhost.com. If a connection is established, the host will prompt for a login name and password.
telnet -l myusername myhost.com:5555
Attempts to open a connection to the remote host myhost.com on port 5555, using the login name myusername. If successful, the host will prompt for myusername's password.
telnet
Opens a local telnet> prompt, where you can enter any of the commands listed above. For example, entering the following command at the prompt:
telnet> open myhost.com
...will attempt to open a connection to myhost.com, as in our first example.

Encrypt

No comments :


EncryptThe process of making data unreadable by other humans or computers for the purpose of preventing others from gaining access to its contents. Encrypted data is generated using an encryption program such as PGP, encryption machine, or a simple encryption key and appears as garbage until it is decrypted. In order to read or use the data, it must be decrypted, and only those who have the correct password or decryption key can make the data readable again.
A very basic encryption technique known as simple substitution, substitution cipher, or Caesar cipher (named after Julius Caesar) that shifts the letters of the alphabet over a few characters. For example, as shown below the alphabet has been shifted over four characters.

Encrypt key:

 a=e, b=f, c=g, d=h, e=i, f=j, g=k, h=l, i=m, j=n, k=o, l=p, m=q, n=r, o=s, p=t, q=u, r=v, s=w, t=x, u=y, v=z, w=a, x=b, y=c, and z=d.
  
Decrypt key:

a=w, b=x, c=y, d=z, e=a, f=b, g=c, h=d, i=e, j=f, k=g, l=h, m=i, n=j, o=k, p=l, q=m, r=n, s=o, t=p, u=q, v=r, w=s, x=t, y=u, and z=v

Using this technique a user could encrypt the message . Below is an example of how this could be done using Perl.
 
 
my (%key, $new);
my $alpha = "abcdefghijklmnopqrstuvwxyz";
my $message = "computer hope free help for everyone";
@alpha = split(//, $alpha);
my $i=1;
foreach $alpha (@alpha) {
  if ($i >= 23) { 
     $i = -3;
  }
  $key{$alpha} = $alpha[$i+3];
  $i++;
}
@message = split(//,$message);
foreach $message (@message) {
if ($message =~/[a-z]/i) {
  $new .= "$key{$message}"; 
} else { 
  $new .= "$message"; }
}
print "Old: $message\nEncrypted: $new\n";

 

 Conversion Tool

A version of the above code is also available online to encrypt and convert your own text.

PGP

No comments :

Short for Pretty Good Privacy, PGP was freeware released in 1991 by Philip Zimmermann, PGP is a public-key authentication and encryption method based on the IDEA single-key and RSA public-key encryption algorithms. PGP is now a product of PGP Corporation and still widely used encryption tool. After its initial release the U.S. government files charges against Philip alleging he broke U.S. encryption laws. These charges were later dropped.
Non-commercial United States citizens can also freely obtain PGP from various websites. MIT has a great page containing PGP for various platforms, see the MIT distribution site for PGP for downloads.

MIT

No comments :
 MIT

Short for Massachusetts Institute of Technology, MIT is a coeducational, privately endowed research University that is well known for its computer science and engineering departments and programs.


Decryption

No comments :
Decryption is the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand. This term could be used to describe a method of un-encrypting the data manually or with un-encrypting the data using the proper codes or keys.


Data may be encrypted to make it difficult for someone to steal the information. Some companies also encrypt data for general protection of company data and trade secrets. If this data needs to be viewable, it may require decryption. If a decryption passcode or key is not available, special software may be needed to decrypt the data using algorithms to crack the decryption and make the data readable.

PERL

No comments :
1. 
 Short for Practical Extraction and Reporting Language, Perl is an interpreted free and open source programming language first developed by Larry Wall in 1987 that is similar to the C language. Perl is one of the more commonly used languages in writing CGI scripts and programming for Internet and web page applications. Below is an example of a Perl script that prints "Hello World!".

#!/usr/bin/perl
print "Hello World!\n";

Files that include Perl code on a web server may have any file extension; however, commonly end in .CGI, .PL, or .PLX.
If you're running a Linux distro, often Perl will already be installed on the computer. However, if you're using MacOS or Microsoft Windows you'll need to download and install a Perl client. We recommend ActiveState or Strawberry for Perl, found on the links below.



2.  Linux command, see the perl command page for further information and syntax of this command.

CGI

No comments :
1. Short for Common Gateway Interface, CGI  allows visitors to a web page to send and receive information from a server. A common example of how a CGI script can be used is by allowing a user to type a set of keywords, pass those keywords to a CGI application to process a search, and then return results based on the search to the web page. Often CGI scripts and executables are run through CGI-BIN directory.
2. Short for Computer Generated Imagery, CGI is any image or sequence of images that have been generated with the aid of computers. CGI is commonly used in movies to generate the simulated, realistic looking images or animated objects commonly referred to as special effects. The 1976 movie Futureworld was the first feature film to use 3D computer generated images.

Avast Internet Security 2015

No comments :

http://gostud.blogspot.com/2015/04/avast-internet-security-2015-with-full-keys.html



Avast Internet Security is an antivirus that needs no introduction. Praised by many users for its PC protection, Avast (no longer avast!) is a multi-function security program that's very easy to use and one whose power is no longer in doubt.

Everything you need to secure your PC

Avast Internet Security offers real-time protection for your computer. It continually updates its database of virus definitions to guarantee maximum protection against online threats, including viruses, spyware and rootkits. Five types of scans are available to verify their presence on your PC and eliminate them. In addition, attacks by spam emails and phishing are neutralized by the anti-spam agent.
Other types of scans are available, not just for viruses, but to optimize and improve the performance of your PC. First off is a feature that allows you to scan your computer to see if any programs need to be updated. Then, the newly added features help detect any deficiencies in terms of performance (the GrimeFighter module), and scan your local network to detect security flaws affecting your Wi-Fi, your connected devices, or your router.
To make things easier when performing these scans, the 2015 version of Avast Internet Security includes the Smart Scan feature, which combines all the essential scans into one single unified scan.
Avast Internet Security also provides you with a wide range of tools for carrying out different tasks. These tools convert Avast Internet Security into a real multifunction program that goes far beyond your basic antivirus software. Avast Internet Security also offers a feature for cleaning up your browsers: VPN Secure Line, a VPN service; SafeZone, an environment that allows you to browse securely and privately online so that you can make purchases or do online banking with very little risk; Sandbox, which allows you to run programs with less risk on the operating system by using a virtual environment; remote troubleshooting; a firewall; and a feature for creating recovery disks.
Finally, you're able to adjust several settings that let you customize Avast Internet Security's configuration. You can also access statistics showing personal and general usage.

SETUP

Keys

 

An accessible interface and increased performance

Despite its large number of features, Avast Internet Security is still a very accessible program with excellent ergonomics and a generally accessible interface that's extremely easy to use.
For the 2015 version, Avast Internet Security maintains the same interface as its predecessor, which also underwent a complete overhaul. It retains its customizable home page, as well as the side menu to access the program's features.
To make the program easier to use, the 2015 version of Avast Internet Security provides you with a whole new support system, in addition to online help that's regularly updated.
Finally, regarding the performance of the antivirus, Avast Internet Security 2015 includes new technologies such as Secure DNS, scan HTTPS, and Home Security Network. These features are intended to strengthen the security provided by the software, but I won't burden you with all the technical details.

A first rate Antivirus

With its accessible interface, reinforced protection, and advanced settings, Avast remains a prime choice for those seeking a complete and reliable antivirus.

What's new

Smart Scan: combines all the essential scans into one single scan (antivirus, browser add-ons, software updates, home network, GrimeFighter).
Home Network Security: scans your local network to detect any security flaws affecting your Wi-Fi, your connected devices, or your router.
- Secure DNS: provides protection against DNS hijacking on your router/client.
Scan HTTPS: The antivirus is now able to detect and decrypt traffic protected by TLS/SSL through a web content filtering component. This feature will protect you against any viruses infiltrating via HTTPS traffic and is compatible with SPDY + HTTPS/HTPP traffic.




DOWNLOAD :

SETUP :-
                              MEGA / MEGA(mirror)

                              USERSCLOUD

KEYS :-
                             MEGA / MEGA(mirror)

                            USERSCLOUD


If your facing any problem fell free to mention in comments

If it works dont forget to say thanks...!!

Follow Us on Facebook,Twitter,Google+ and Join our site.

Please support us just by Liking & Sharing our posts.

                           ***Thank You*** 





5 Apr 2015

Malwarebytes Anti-Malware Premium 2.1.4.1018

2 comments :


Malwarebytes Anti-Malware Premium Final Crack 2015 is very powerful anti-malware software that help you to protect your PC from all types of advanced latest malware including viruses, Trojans, spyware, adware and rootkits. Malwarebytes provides you the ultimate protection for your PC or Laptop.Malwarebytes Anti-Malware PRO can detect and remove you malware where even the best known anti-virus. Malwarebytes Anti-Malware Crack And Serial Key PRO detects and removes malware where even the best known anti-virus and anti-malware applications fail.






Malwarebytes Anti-Malware Premium Features:
  • Password protect key program settings.
  • Integrated Malwarebytes Chameleon.
  • Private security module system.
  • Ignore list for both the scanner and Protection Module
  • A small list of extra utilities to help remove malware manually.
Support Opearting System:
Windows XP, Windows Vista, Windows 7, Windows 8/8.1 (32-bit & 64-bit).


DOWNLOAD :

                     MEGA / MEGA(mirror)

                    USERSCLOUD 


If your facing any problem fell free to mention in comments

Follow Us on Facebook,Twitter,Google+ and Join our site.

Please support us just by Liking & Sharing our posts.

                           ***Thank You***