,

Your IP Address

what is my ip address?

How to Secure a Wireless Network

Wireless networks are extremely convenient, but that convenience comes at a price: security. With a traditional wired network, data is channeled through cables and cannot be easily intercepted. With a wireless network, data is beamed through the sky and can be more easily intercepted – unless, that is, you have appropriate security measures in place. This article explains how to secure a wireless network against attack.

Before outlining the steps you should take to secure a wireless network, let’s quickly look at a couple of things that you probably don’t want to do: namely, disabling SSID broadcasting and enabling MAC filtering. The SSID is the name of your wireless network and its broadcast to enable people to easily find and connect to your network. Numerous Websites – in fact, just about every Website - recommend disabling SSID broadcasting (if the bad guys can find it they can hack it, right?) and enabling MAC filtering. However, MAC filtering is so easily bypassed as to render it almost completely redundant. With regards to SSID broadcasting, you can read more about this here.

So, if you shouldn’t disable your SSID broadcast, what should you do? Read on!

1. Use encryption. To stop outsiders being able to data this transmitted over your wireless network, the data should be encrypted. There are 3 wireless encryption standards: WEP, WPA and WPA2. WEP is the oldest and most easily cracked standard, so ideally you should use WPA or, better yet, WPA2.

2. Change the default account names and passwords. The majority of access points (APs) use default account names/passwords set by the manufacturer that are known to one and all. Change them to something unique.

3. Segment your network. Even when best practice is adhered to, a wireless network will be less secure than a wired network. Segmentation creates a barrier between the physical network and wireless network – by using a firewall, for example - and enables you to control access/communication between them. Unfortunately, this can be a somewhat complex job and, unless you have a fair amount of in-house expertise, you’ll probably need to retain the services of a consultant.

4. Authenticate users. RADIUS provides you with far more control over access to the WLAN. For more information, visit Microsoft's overview on securing wireless LANs with certificate services and the FreeRADIUS Project.

5. Update your firmware. The manufacturers of AP devices often release firmware updates to fix bugs and security vulnerabilities. So, keep your firmware updated.
Security is only as strong as its weakest link. Long and too often the wireless network is the weakest link. In simple environments, the network can probably be DIY’d; however, security matters do become more challenging in complex environments and in such cases the best advice may well be to leverage the expertise of a consultant.

One final bit of advice: the value of securing your own wireless network will be eroded if your data is bounced in unencrypted form over other networks. Educate your users and make sure that they are aware of the risks associated with connecting to an insecure network.

Read more

Stay safe on a public wireless network

A few precautions to take when using wireless hotspots, to ensure that your computer’s security doesn’t land in a spot. Like everything technological, wireless hotspots are a boon and a bane. While they ensure quick and easy Internet access, they also pose big risks for your laptop.

First, communication over most public wireless networks is unencrypted, so that anyone on the same network can use some tools to read the data you transfer. Unless you’re communicating with your office via VPN (Virtual Private Network), which ensures a secure, encrypted channel even over the public network.

Second, rogue attacks are very easily executed on the public wireless network. One of these is the ‘evil twin’ attack. In this case, the attacker uses a laptop or other mobile device to place a wireless access point (WAP) close to your computer, one that gives a more powerful signal than the access point you intend to connect to. The name of such a ‘rogue’ network would probably be a known name, such as Linksys, so that you wouldn’t be suspicious about connecting. Once you do connect, all your data will flow through the attacker’s laptop to the Internet.

The third big risk is ‘over the shoulder’. Say you’re checking email or shopping online at a crowded cafĂ© or hotel lounge. There are chances of someone peeking at your usernames, passwords, and credit-card details as you enter them.

Here are a few ways in which you can guard against these risks.

• Take care while browsing
Public hotspots are definitely much less secure than your office networks. So try to avoid using them for transactions that require high levels of security, such as online banking or shopping. Reserve these for when you’re in a more secure environment.

• Use secure means
As far as possible, use VPNs for secure communication. Access email via Secure Socket Layer (SSL) sessions—many email providers support these. You could also avoid going to websites that require you to send sensitive information in clear-text, unencrypted format.

• Avoid evil twin attacks
To guard yourself against an evil twin attack while you’re trying to connect to a public network, carefully observe the icons on the screen that shows available network connections. If any icon shows two computers connected together, it’s a peer-to-peer network, something that’s used in evil twin attacks. Do not connect to such a network—the legitimate network would have the icon of a light beacon, and if it supports encryption, you will also see a padlock icon next to it. Prefer to connect to such an access point.

You can also tweak your Windows settings to avoid evil twin attacks. From the Wireless Networks panel, you can disable automatic connections; you can also configure your machine to “Connect to access point (infrastructure) networks only”. You could also give your home network a distinct name that cannot be confused with the names of other networks, so that there is less possibility of connecting to an ‘evil twin’ from home.

• Turn off all sharing
Your laptop may be configured for file and printer sharing. You should turn that off when you’re using a public hotspot. If you use share programs such as iTunes or have other shared directories on your laptop, you should turn those off too, unless you want to share your music and other preferences with a lot of strangers.

• Remember the basics
As always, the last line of defense is on your machine—a personal firewall and anti-virus and anti-spyware software are crucial. You should also have applied all the latest security patches to update
Read more

How to Fix External Drive Connection Problem in Windows Vista

In default mode, Windows Vista only permits NTLMv2 authentication on a network due to security reason. Certain external drives are incompatible with this authentication type. To fix this problem, LM and NTLM authentications need to be enabled. Here is the method:
  1. Click Start button.
  2. Select command/search field, type secpol.mscThe Local Security Policy utility will open.
  3. Examine the left menu and select Local Policies \ Security Options.
  4. Examine the right pane, scroll down to find Network Security:LAN Manager authentication level. Double click on it.
  5. Examine the Local Security Setting tab and there will be adrop down menu with several options. Select “Send LM &NTLM – use NTLMv2 session security if negotiated.”
  6. Some dialogs will appear. Accept it all.
  7. The computer will restart.
Read more

Securing shared folders in Windows NT, 2000 & XP

Securing shared folders in Windows NT, 2000 & XP

It is good practice to secure any folders that you share for access over the network. It is a simple process and helps prevent the spread of viruses and minimises the risk of your such shares being abused.

By default when you create a shared folder the group 'Everyone' is given permission to access that folder. This is very insecure as the Everyone group means exactly that - anyone who can access the network has permission to see what is in your shared folder, can edit the material you have stored there and can save anything that they like to it.

Although you may believe that because people do not know it exists they will not find your shared folder this is not true. There are simple tools available for identifying network shared folders, and many viruses now search for shared folders and then attempt to use the folders they find to duplicate themselves. However by following the information below you can secure your shared folders.

Under Windows 95 /98 the sharing process is different - all users have to be specifically added i.e. the Everyone group is not added by default, so the same risk does not occur. However we would recommend that access to shares is limited to only those people or groups who specifically require it.

To secure a shared folder:

Before you start, decide on who will need access to the shared folder that you have created. Access can be to either individual users by login name, or to groups of users - these are the same as those available in Outlook, however you can only use centrally defined groups. So you can choose to have either a number of specified colleagues or a relevant group e.g. your departmental staff group, or a combination of both. We would advise the use of groups where possible, as this leads to easier management, and that access should be kept to the minimum required, to reduce risks.
Open Windows Explorer or My Computer and locate the folder you wish to secure. Shared folders can be identified by the hand underneath them - in this example the Utilities folder.
Right click on the folder and select the 'Sharing' or 'Sharing and Security' option from the list provided
You will now see a dialogue box similar to the one below (they vary with operating system), giving information about the shared folder. Click on the 'Permissions' button

NB. If you have not shared the folder before you will need to click on the 'Share this folder' radio button and then select a share name for the folder - by default this is the same as its local name. By adding a $ sign after the name (e.g. Utilities$) the folder will not be openly visible on the network.
A new window (Share Permissions) lists the users or groups of users who can access the share you have created, by default this is the Everyone group.
Click on the Add button and in the lower window type the names of the users / groups that you wish to limit access to - separated by a semi-colon. If you are not sure of the names you can use the upper window to browse for them, check that the 'Look in' box is set to essex or Entire Network first.

In this case we are going to grant access to Computing Service Staff (serstaff) and Keith Brooke (kbrooke).
Click on OK.
The Share Permissions window now contains the added users. You can now use the lower portion of this window to modify what the people you have granted access to are able to do.

In this case I want to only allow Keith to read the material in the folder, so having selected Keith in the top portion I confirm that only the Read box is checked in the lower portion. I also want to limit Service staff to being able to modify material (they cannot create new material or delete existing material), so again I select them in the top portion and now ensure that the Change and Read boxes are checked.

Please note that the boxes offered in the lower portion of the window maybe different with your operating system but they can be used in the same way.

Finally you need to remove the Everyone group. Select it and then click the remove button.

Access to share is now restricted.
Read more

CCNP: Routing Study Guide


CCNP: Routing Study Guide 
Exam 640-503 By Todd Lammle 
 | 608 Pages | PDF | 8 MB


Get ready for your future today! Cisco's new Routing exam is a requirement for both the Cisco Certified Network Professional (CCNP) and Cisco Certified Design Professional (CCDP) programs. With full coverage of all exam objectives, you'll learn techniques and strategies for building scalable Cisco networks. The CD contains a testing engine, electronic flashcards for PCs and Palm devices, and valuable networking tools and utilities.


Read more

Monitoring and Managing Microsoft Exchange Server 2003


Monitoring and Managing Microsoft Exchange Server 2003
 586 pages | CHM | 19 Mb

This authoritative book teaches IT professionals responsible for Exchange messaging systems how to efficiently manage the program's many and complex system capabilities and features. Once you've designed and implemented a messaging system, the bulk of the day-to-day work involves monitoring to ensure an optimum traffic flow, accomplished by continuously reviewing and fine-tuning dozens of system specifications and components. Monitoring and Managing Microsoft Exchange 2003 teaches readers proven and innovative techniques, tools, and procedures for managing and optimizing systems of all sizes and types built on Exchange 2003. Based on the author's own twenty years of messaging system experience and the collective experience of HP, the leading implementer of Exchange Server systems, this book will be a leading resource for Exchange administrators and designers.

*Provides best practices and innovative everyday techniques for managing the enterprise Exchange environment
*Teaches readers proven procedures for managing and optimizing systems of all sizes and types
*Based on the author's own twenty years of messaging system experience

Read more

Learning Exchange Server 2003


Learning Exchange Server 2003
 CHM |440p | 8.88 MB

This is your start-to-finish guide to getting Microsoft Exchange Server 2003 into production, then maximizing its reliability, performance, and business value. Bill Boswell writes for working administrators whose responsibilities now include Exchange Server 2003. He addresses every facet of Exchange from architecture to address lists, answering three key questions: How does it work? How do I get the most out of it? How do I fix it if it breaks?

Download Link
Read more

Network Security: A Beginner's Guide


Network Security: A Beginner's Guide 
 400 pages |  PDF | 10.7 MB

All companies rely on some security mechanisms to ensure their corporate privacy and information integrity. In many cases, the ability of the technician to explain a system's vulnerabilities to managers in order to acquire funding is as important as the technical skills to build the system. This book addresses a wide range of topics, from security basics to policies, practices, and practical solutions. Though intended for network administrators, this also acts as a good primer on security concepts for the lay computer user. A rock-solid resource for all libraries.

Read more

Python Pocket Reference


Python Pocket Reference
Mark Lutz | 2009 | 208 pages | PDF | 1.4 MB

This is the book to reach for when you're coding on the fly and need an answer now. It's an easy-to-use reference to the core language, with descriptions of commonly used modules and toolkits, and a guide to recent changes, new features, and upgraded built-ins -- all updated to cover Python 3.x as well as version 2.6. You'll also quickly find exactly what you need with the handy index.
Written by Mark Lutz, who is widely recognized as today's leading Python trainer, Python Pocket Reference, Fourth Edition, is the perfect companion to O'Reilly's classic Python tutorials, Learning Python and Programming Python.


Read more

A Programmer's Guide to .NET


A Programmer's Guide to .NET

* Explains all of the significant parts of the Microsoft.NET framework -- not just one technology
* Contains practical examples showing how you can use .NET to create a variety of applications -- from console applications to XML web services
* Includes code examples written in VB.NET that can also be imported into other .NET languages
* Provides a comprehensive list of web resources in the appendix.


Read more

PHP Team Development



PHP Team Development
|150 pages | PDF | 2.7 MB|

Easy and effective team work using MVC, agile development, source control, testing, bug tracking, and more
* Work more effectively as a team by breaking up complex PHP projects into manageable sub- parts
* Develop code that is much easier to maintain with source control, agile principles, and project tracking
* Apply techniques related to process models, collaboration among team members, and continuous long-term improvement
* A precise guide with examples to illustrate practical benefits In Detail

Given the nature of the business environment today, organizations that want to build value-added enterprise PHP applications need a team of PHP people rather than an individual.
You've got a team! What next? Customizing such applications to meet with organizational objectives and maintaining these applications over time can be quite a tedious task for your team with so many people involved.

In this book, you will explore how you can break up complex PHP projects into simple sub-parts that multiple team members can work on. The book highlights the use of the MVC pattern for separating concerns in the application and agile principles to deliver code that works.

You will learn to blend the simplicity and power of PHP with evolving software engineering principles and tools to easily develop code that is easy to maintain. With this book in hand, you know how to avoid getting muddled up while working in a team and achieve success on your project with effective team work.

What you will learn from this book?

* Reduce your development time by using MVC to break down complexity in PHP projects
* Effectively use PHP frameworks to achieve project success
* Master the concepts of effective collaboration, choosing the right process, and continuous long-term process improvement
* Apply agile methodologies and pick up the practices that best suit your project
* Catch and eliminate bugs early using source control and bug tracking tools Approach

This book looks into PHP projects mainly from an enterprise view. The author's experience enables him to give you an overall picture of PHP projects and discuss factors that contribute to project success in a clear and precise manner.

Each chapter focuses specifically on how the techniques covered will make team work easier. Examples (rather than abstract best practices) are used to illustrate the practical benefits.

Who this book is written for?

This book is for PHP developers who work in teams on complex PHP projects. With this book in hand, it is easy to discover the secrets of successful PHP projects that meet today's complex enterprise demands.

This book can also be useful for project managers who are looking to be successful with PHP projects. Those who are stakeholders in PHP projects, such as clients, or those who want to sponsor PHP projects, can also learn what to expect and how to deal with a PHP project team with this book.



Read more

PHP for Teens





PHP for Teens
| 300 pages | PDF | 7 MB |

Don't limit the functionality of your web site! If you're ready to create interactive, dynamic pages for your site, then PHP for Teens is ready to show you how. You don't need any experience with 
PHP to begin. You'll learn everything you need to know along the way.

The topics covered by PHP for Teens will get you up and running whether you're using a PC, a Mac®, or Linux®. You'll cover everything from basic design and introductory PHP concepts to variables, expressions, and operators. You'll also get a quick overview of HTML and PHP form design. Take control of your web site using the power of PHP!


Read more

Wireless Java Programming with J2ME



Wireless Java Programming with J2ME
512 pages | PDF | 3 Mb

Wireless Java Programming with J2ME provides Java developers with the information, techniques, and examples needed to use Java 2 Micro Edition (J2ME) to create applications for Java-enabled wireless devices

Wireless Java Programming with J2ME presents fully-developed examples of J2ME applications designed for wireless devices. By building examples based on Sun's CLDC (Connected Limited Device Configuration) API and Mobile Information Device Profile (MIDP), readers will become familiar with the standard practices for J2ME programming for wireless devices. This hands-on guide to wireless J2ME programming is loaded with practical sample programs that can be applied in real world development.

Wireless Java Programming with Java 2 Micro Edition is being written by Yu Feng, the first-prize winner of Motorola's Wireless Application contest. MotoShop, the winning m-commerce application, takes advantage of J2ME incorporates both innovative interface design and location-based service features. The authors' in-depth knowledge and commercial interest in this technology truly separates this book from other Java books on the market.

Wireless Java Programming with Java 2 Micro Edition assumes readers are motivated to build the next generation wireless application by leveraging the J2ME technology. The book provides commercial-quality code and examples.



Read more

Computer Simulation Techniques - The Definitive Introduction


Computer Simulation Techniques - The Definitive Introduction
PDF | 183 pages | 10,2 mb

You can use this book to learn the basic simulation techniques by yourself! At the end of Chapter 1, you will find three examples. Select one of them and do the corresponding computer assignment given at the end of the Chapter.
Then, after you read each new Chapter, do all the problems at the end of the Chapter and also do the computer assignment that corresponds to your problem, By the time you reach the end of
the book, you will have developed a very sophisticated simulation model!
You can use any high-level programming language you like.




Read more

Introduction to C++ Programming and Graphics



Introduction to C++ Programming and Graphics
372 Pages | PDF | 3 MB

C++ has grown rapidly in response to the practical need for a programming language that is able to efficiently handle composite and diverse data types. Today, C++ dominates the commercial market and is favored among application developers. Introduction to C++ Programming and Graphics offers a venue for rapidly learning the language by concisely revealing its grammar, syntax and main features, and by explaining the key ideas behind object oriented programming (OOP), with emphasis on scientific computing.

The book reviews elemental concepts of computers and computing, describes the primary features of C++, illustrates the use of pointers and user-defined functions, and analyzes the construction of classes. Distinctive features include: An effective selection and presentation of topics and supporting examples A tutorial on the usage of MATLAB® functions in C++ code Tables for translating MATLAB® and Fortran 77 into C++ code, illustrating syntactic differences between these languages Chapters on graphics and GUI programming based on the VOGLE library and the GLUT, GLUI and GTK+ utility toolboxes.
This invaluable resource provides a basic, concise introduction to C++ for the novice, allowing the reader to easily grasp the necessary concepts, rather than trying to absorb an extensive reference book. Scientists, engineers, professionals and students familiar with the general principles of computer programming and proficient in an easy programming language will find this volume an ideal entry point into C++.


Read more

HTML and XHTML Pocket Reference



HTML and XHTML Pocket Reference
PDF | 104 pages | 2,3 mb

Jennifer Niederst-Robbins, the author of our definitive guide on standards-compliant design, Web Design in a Nutshell, offers you the perfect little guide when you need answers immediately: HTML and XHTML Pocket Reference. This revised and updated new edition takes the top 20% of vital reference information from her Nutshell book, augments it judiciously, cross-references everything, and organizes it according to the most common needs of web developers.The result is a handy book that offers the bare essentials on web standards in a
small, concise format that you can use carry anywhere for quick reference. This guide will literally fit into your back pocket.


Read more

Essential ASP.NET 2.0


Essential ASP.NET 2.0
CHM | 384 pages | 10,8 mb

Essential ASP.NET 2.0 is the Microsoft developer's definitive reference for ASP.NET 2.0 programming. It covers all you need to know to build robust, well-designed Web applications with ASP.NET 2.0, Visual Studio 2005, and .NET 2.0. ASP.NET MVP Fritz Onion and Developer Security MVP Keith Brown draw on their unparalleled experience working with ASP.NET 2.0 and teaching it to professional developers. From data binding to security, UIs to performance, they demystify ASP.NET 2.0's most difficult areas, and introduce little-known techniques for leveraging it to the fullest.



Read more

Object Oriented Programming in Eiffel



Object Oriented Programming in Eiffel
PDF | 450 pages | 2.18 MB

Provides a clear introduction to the Eiffel programming language. Covers the language, logical assertions, and design of object-oriented systems, making it ideal for a new programmer or those unfamiliar with object-oriented programming. Paper. DLC: Object-oriented prog. The book is an introductory text on Eiffel for the new programmer, or for a non object-oriented programmer. It covers the Eiffel language, logical assertions and the design of object-oriented systems.


Read more

HTML Professional Projects



HTML Professional Projects
PDF | 752 pages | 18.75 MB

No other book on HTML offers a project-based approach for higher-end users. This project-oriented approach gives you hands-on exercises that you can apply in the real world. "HTML Professional Projects" focuses on developing four types of Web sites: corporate intranet, e
-commerce, non-profit/ government-related, and public relations. Rather than simply describing the tags and symbols used in HTML, the author will indoctrinate you to the idea that before one line is coded, the underlying business process is being considered.


Read more

Web Publishing with FileMaker and PHP


Web Publishing with FileMaker and PHP
English | 2007 | 432 pages | PDF | 5,4 MB


Whether you are a FileMaker developer who is new to web publishing, a web developer who is new to FileMaker, or a complete beginner looking to put your data online, this book is for you.
In Part I, you learn the basics of how web publishing works and how to write your own HTML and PHP.
In Part II, you learn how to build a FileMaker database and install and configure the FileMaker Server to host the database. In Part III, you learn how to put it all together to create web pages that talk to your database and allow people to view the data and, if you like, modify it. Throughout the book, publishing a FileMaker Product Catalog to the web is used as an example. Each chapter builds on the previous chapter. When you are done, you will have a working website!
Detailed information on how to…
Master web publishing
Read and write basic HTML
Read and write basic PHP
Build a FileMaker database
Install and configure FileMaker Server
Publish your FileMaker data to the web
Work with portals and container fields
Repurpose your FileMaker layouts on the web


Read more

Object-Oriented Design and Patterns


Object-Oriented Design and Patterns 
472 Pages | PDF | 15 MB
An object-oriented design text that's student oriented too!

Now updated to reflect the innovations of Java 5.0, Cay Horstmann's Object-Oriented Design & Patterns, 2nd Edition continues to offer a student-oriented guide to object-oriented design.

Drawing from his extensive experience as a programmer and teacher, Horstmann helps you appreciate the value of object-oriented design principles, and gives you a context for applying these principles and techniques in your own designs. Throughout the text, outstanding pedagogy, carefully developed exercises and examples, and a strong emphasis on problem solving make object-oriented design principles accessible to readers with limited programming experience.

* Integrates the use of Java 5.0 constructs throughout, including generics and the java.util.concurrent library.
* Presents high-interest examples, including ones from the Java 5.0 library and user-interface programming.
* Uses concepts such as interfaces, inner classes, reflection, and multithreading to introduce advanced Java language concepts.
* Encourages you to master topics in object-oriented design, user-interface programming, and practical software development techniques.
* Illustrates design patterns and their application using the Swing user interface toolkit and the Java collections library.
* Introduces programming tools such as BlueJ, javadoc, and JUnit.
* Provides a crash course in Java for readers who know C++.


Download Link
Read more

Professional C# 2008


Professional C# 2008 
 1848 pages | PDF | 21,6 MB

Updated for .NET 3.5 and Visual Studio® 2008, this book is the ultimate guide to C# 2008 and its environment. Beginning with a look into the architecture and methodology of .NET, the team of superlative authors explains why the C# language cannot be viewed in isolation, but rather, must be considered in parallel with the .NET Framework. 
After gaining an understanding of the foundation of C#, you'll then go on to examine the fundamentals of C# programming with each successive chapter. New examples provide helpful explanations on how to use C# to solve various tasks. Plus, completely new chapters on LINQ, SQL, ADO.NET entities, Windows Communication Foundation, Windows Workflow Foundation, Windows Presentation Foundation, arrays, system transactions, tracing, and event logging all deliver essential information to help you gain a clear and thorough understanding of all that C# 2008 has to offer.

Download Link

Read more

HTML: A Beginner's Guide, Second Edition



HTML: A Beginner's Guide, Second Edition 
550 pages | PDF | 10,3 MB  

Essential skills for first-time programmers! This easy-to-use book explains the  fundamentals of HTML and Web development. The modular approach of this series--including  drills, sample projects, and mastery checks--makes it easy to learn to use this powerful  programming language at your own pace.

Download Link

Read more

How to Disable Auto Update for Adobe Application

For you Adobe users, when you are connected to the internet, for some period of time you will notice a white icon in the Windows taskbar with percentage progress is performing download. It is Adobeauto update activity, one of the most disturbing features in Adobe applications (Photoshop, Premier, Illustrator, etc.). It might slow down your internet connection and works similar to bot. You can disable this feature.
If your computer is currently connected to the internet:
  1. Open your Windows Explorer, and browse X:\Program Files\Common Files\Adobe\Updater 5X represents your main drive.
  2. Search and run AdobeUpdater.exe files.
  3. The update screen will appear. Search the Preferences button. Click on it.
  4. Search Automatically Check for updates checkbox and uncheck it.
  5. Click OK.
If your computer is currently not connected to the internet:
  1. Open your Windows Explorer.
  2. Browse to X:\Documents and Settings\[username]\Local Settings\Application Data\Adobe\Updater5 for Windows XPuser or X:\[username]\AppData\Local\Adobe\Updater5 for Vista user. X represents your main drive.
  3. Search and open AdobeUpdaterPrefs.dat using Notepad.
  4. Search and find 1 in the file and change the value from 1 to 0.
  5. If the file does not exist, add the line 0 anywhere between thetags.
  6. Save and close the file.
Read more

101 American English Idioms


101 American English Idioms 
 136 pages | PDF | 10,6 MB

101 American English Idioms is designed to help bridge the gap between "meaning" and "thrust" of American colloquialisms by providing a situation and a graphic illustration of that situation, so that the imagery created by the expression can be felt, rather than simply learned as a stock definition.

The book is divided into nine sections. The title of each section reflects a notion or a manifestation of the physical world, the world of behavior, or the world of the senses with which the reader may easily identify. It is hoped that the natural tone of the language of the situations in which the idiom is presented  will help to convey the feeling of the idiom and the circumstances under which it may be used. The illustrations graphically depicting the meaning of the components of the expressions not only add an element of humor, hut also serve to highlight the contrast between the literal and actual meaning of the idioms as presented in the text.
 
An index is included to facilitate recall and location of the expressions. 101 American English Idioms is intended primarily for all students of English. Nevertheless, because  If the graphic humor of the idioms in caricature, native speakers of English will also find the book refreshingly entertaining.

Download Link

Read more

How to Log on to Windows XP if You Forget Your Password

How to Log on to Windows XP if You Forget Your Password

Here is a simple way to access Windows XP with Administrator rights and privileges if you have password protected your User account on your Windows XP system and can't remember the password(s) to login. Whenever Windows XP is installed on a system, it creates a default account called "Administrator" and by default this account is not password protected. Therefore, if you bought a brand name computer (such as Dell, HP, Compaq or Sony)or you have installed Windows XP yourself. You should be able to login to the computer through the unprotected Administrator account.

1. Reboot your machine.
2. Press F8 before the Windows boot screen appears.
* Do not press F5 as used on the NT/9x series of Windows.
3. You will be prompted with a boot options menu.
4. Select the Start Windows in Safe Mode option.

5. Click through several self-explanatory screens until your reach the familiar 'Welcome' screen.
6. Note that this welcome screen is limited to 256 colors and 640x480 resolution because the primary graphics will have been set to the Windows Safe Mode software VGA adapter. You will not be able to change this mode even in Display options, while Windows is running in Safe Mode.

7. Find the icon for the Administrator user. If the default settings of your system haven't been changed, there should be no password for this account.
*The Safe Mode Welcome screen might display some of the other users on your system.
8. Login as the admin.
9. Press Yes at the prompt asking if you would like to continue using Safe Mode.

10. Continue on to the User Settings control panel. Here you can change any of the other passwords for user on the machine. Make any changes you want.
11. Reboot your computer. As long as you don't press any keys (i.e. F8) during the boot-up the computer will startup normally.
12. Login as the user for which you set the password.

TIPS

• You can access the Administrator account through the login prompt without logging into safe mode. If the computer utilizes the welcome screen instead of the standard NT domain login prompt, you can press Ctrl + Alt + Del twice to get to the login prompt. This is only true if you are running Windows XP Professional Edition. Windows XP Home Edition will also allow you to use this method to log on.

• Some users are smart enough to password protect their Administrator account when they install windows. If that's the case, you'll have to know that password in order for this method to work.

• There is a way to crack the windows "SAM" and system files to retrieve the original passwords Monitor, you need a program such as LC5 installed on a computer, and the SAM file in C:\WINDOWS\system32\config if LC5 is not installed on the computer that you forgot disk because as soon as you can get into the hard drive, windows is using the file so you cant copy it.

• Use SysInternals ERD Commander to change the admin. password. Boot from the CD and select the locksmith option to change whatever password you like. Alas, this product seems to have been discontinued, however there are many other options out there for resetting the password so long as you are willing to spend a little money.

• Much simpler is simply to rename or delete the SAM file (renaming is safer). For this you need to boot the box using some other operating system on a CD and then mount the drive (otherwise Windows locks the SAM file and won't let you touch it). NTFSDOS is also a good utility for this purpose. Find the SAM file and change the first character. After you reboot, all the accounts are still there, but they all have null passwords. Note: if you rename the SAM file on XP SP2, when you reboot, XP fails to initialize and forces you to reboot in safe mode. However when you boot into safe mode you get the same message, so don't try this method on XP SP2.

WARNING
• This method does not work with machines running XP SP2, you will need to use "safe mode with networking" instead.

• Use these instructions for ethical purposes only, please. Accessing Windows Administrator and changing passwords could be construed as illegal entry and electronic trespass in a court of law.

• This whole process is pointless if you know the administrator's password as you can easily remove passwords without going into safe mode. Assuming that your PC only has one user profile with administrative powers.
Read more