Friday, July 15, 2016

DSL and ADSL Internet Connection / Setting

Router:
A router is a device that forwards data packets along networks.


Common ports / terminals
1. WAN port = Input point for any dsl or broadband internet service.
2. ADSL port = Input point of your telephone for ADSL internet service.
3. LAN ports = Output point that’s sends data from router to your computer or other devices.


Router setup for DSL internet




1. Open the router's page by the router's ip from the internet browser. Router ip will be written mostly in the back side of your router or search in the manual. E.g.: 192.168.1.1
2. Insert router username and password (find it in manual). Mostly username: admin and password: admin
3. Go to quick setup:
  3.1 If you want to connect from ADSL router then select DHCP (auto).
  3.2 If you are connecting from broadband ISP then select PPP and insert   username and password provided by your ISP. Sometime you may also need to verify your router MAC address also.
4. Finish

Router setup for ADSL internet



1. Open the router's page by the router's ip from the internet browser. Router ip will be written mostly in the back side of your router or search in the manual. E.g: 192.168.1.1
2. Insert router username and password (find it in manual). Mostly username: admin and password: admin
3. Go to quick setup and select PPPoE option.
4. Insert username and password provided by ADSL service provider. Insert VPI: 8 and VCI: 81
5. Finish

Wednesday, July 6, 2016

Computer Virus

In reality, computer viruses aren’t so dramatic. In fact, most viruses are designed to hide, do their work quietly, and avoid detection for as long as possible. But a virus’s damage can be dramatic in the extreme, causing untold losses to data and productivity.

What is a Computer Virus?
Virus is a parasitic program that infects other legal programs, which is sometimes called the host. To infect the host program, the virus modifies the host to store a copy of the virus i.e. virus can replicate itself. Many viruses are programmed to do harm once they infect the victim’s system. A virus can be designed to do various kinds of damage. But the ability to do damage is not what defines a virus.




What can a Virus do?
- Copy themselves to other programs or areas of a disk.
- Replicate as rapidly and frequently as possible, filling up the infected system’s disks and memory, rendering the system useless.
- Display information on the screen.
- Modify, corrupt, or destroy selected files.
- Erase the contents of entire disks.
- Lie dormant for a specified time or until a given condition is met, and then become active.
- Open a “back door” to the infected system that allows someone else to access and even take control of the system through a network or Internet connection.

Preventing Infection
It is not much difficult to prevent against virus if you have a little knowledge and some utility software. Some popular antivirus programs include:
McAfee VirusScan
- Norton AntiVirus
- Virex
- PC-cillin
- Avast!

Only installing antivirus in your system is not enough. Most antivirus programs allow different settings, try to find important settings and enable them. Importantly, do not forget to update the antivirus database regularly through internet service.


Monday, July 4, 2016

DC Motor Speed Controller

Required devices:
1. 3v - 12v dc motor
2. 100k potentiometer
3. MOSFET TO-220AB
4. 12v battery



How to connect?
Connect Drain (D) of MOSFET and right end of potentiometer (P) to the +ve terminal of battery. Connect Source (S) of MOSFET to the one end of motor. Connect another end of motor and another end of 'P' to the –ve terminal of battery. Finally, connect the middle point of 'P' to the Gate (G) of MOSFET. Now you can control the speed of motor by rotating the knob of potentiometer.

NOTE
The MOSFET should be N channel enhancement  MOSFET (IRF540, IRF3205,...).
The supply voltage depend on MOSFET and the motor. Example: If the MOSFET is designed for 12v and capable of 50v. The supply voltage should be 12v.

Quadcopter vs Hexacopter vs Octacopter

1. Quadcopter
Quadcopter is one of the most popular multicopter on the market. With the four propellers, a quadcopter has more power to lift off the ground.They are fast, affordable in price they are easy to manufacture. They have four propellers to ensure that they are able to lift in the air. Mostly used in movie cinematography, areal view by attaching HD came with it.


2. Hexacopter
Hexacopters are powerful than quadcopter since it has 2 more propellers than quadcopter. It can reach higher elevation than quadcopter. A hexacopter is more safe having 6 motors 120 degrees apart because it can use the rest motors when one dies. It can lift more weight than quadcopter.



3. Octacopter
Octocopter is have 8 rotating fans which brings more stability in flying. They are essentially the aerial version of the common Octotrooper and seem to occupy the role of air-to-ground fighters in the Octarian Army, supplanted by the heavier-duty Octobombers. It is used lift heavy equipment and transport.

Recover corrupt memory card

Process:
1. Insert your memory card into the computer or laptop.
2. Open and run 'command' (cmd) as an administrator.
3. type diskpart
This is open the diskpart command window.
4. Type list disk - this will show your harddisk and memory card.
5. Select your memory card by select disk 1.
6. type clean - this process must be succeeded for further process.
7. type create partition primary
8. type active.
9. type select partition 1.
10. type format fs fat32.
Complete the format and its done.


Sunday, July 3, 2016

IP Address

What is an IP Address?
IP stands for Internet Protocol. An IP address is a unique address used by different computers on a computer network to identify and communicate with one another. For example, the number "166.70.10.23" is an example of such an address. So, an IP address is used as an identifier to find electronic devices connected to one another on a network. Therefore, each device in the network must have its own unique address. An IP address is like a mailing address that is used to deliver data, that is, files, to a computer.
Some IP addresses are meant to be unique within the scope of the global Internet, whereas others are meant to be unique within the scope of a specific network. Internet Assigned Numbers Authority (IANA) creates and manages IP addresses for the public Internet. IANA allocates the superblocks of addresses to Regional Internet Registries, which in turn allocate smaller blocks of addresses to Internet service providers.

Static and Dynamic IP Address
An IP address could be static or dynamic. If the computer uses the same IP address whenever it connects to the network, then it is said to have a static IP address; if the IP address changes frequently whenever the computer connects to the network, then it is said to have a dynamic IP address. Static IP addresses are manually assigned by the network administrator, whereas the Dynamic Host Configuration Protocol (DHCP) is used to assign dynamic IP addresses.

What are IP Address classes?
IP addresses were originally organized into classes. The address class determined the potential size of the network.
The class of an address specified which of the bits were used to identify the network, the network ID, or which bits were used to identify the host ID, host computer. It also defined the total number of hosts’ subnets per network. There were five classes of IP addresses: classes A through E.
The four octets that make up an IP address are conventionally represented by a, b, c, and d respectively. The following table shows how the octets are distributed in classes A, B, and C.
Class
IP Address
Network ID
Host ID
A
a.b.c.d
a
b.c.d
B
a.b.c.d
a.b
c.d
C
a.b.c.d
a.b.c
d
Class A: Class A addresses are specified to networks with large number of total hosts. Class A allows for 126 networks by using the first octet for the network ID. The first bit in this octet, is always set and fixed to zero. And next seven bits in the octet is all set to one, which then complete network ID. The 24 bits in the remaining octets represent the hosts ID, allowing 126 networks and approximately 17 million hosts per network. Class A network number values begin at 1 and end at 127.
Class B: Class B addresses are specified to medium to large sized of networks. Class B allows for 16,384 networks by using the first two octets for the network ID. The two bits in the first octet are always set and fixed to 1 0. The remaining 6 bits, together with the next octet, complete network ID. The 16 bits in the third and fourth octet represent host ID, allowing for approximately 65,000 hosts per network. Class B network number values begin at 128 and end at 191.
Class C: Class C addresses are used in small local area networks (LANs). Class C allows for approximately 2 million networks by using the first three octets for the network ID. In class C address three bits are always set and fixed to 1 1 0. And in the first three octets 21 bits complete the total network ID. The 8 bits of the last octet represent the host ID allowing for 254 hosts per one network. Class C network number values begin at 192 and end at 223.
Class D and E: Classes D and E are not allocated to hosts. Class D addresses are used for multi-casting, and class E addresses are not available for general use: they are reserved for future purposes.

There are five classes of available IP ranges: Class A, Class B, Class C, Class D and Class E, while only A, B and C are commonly used. Each class allows for a range of valid IP addresses. Below is a listing of these addresses.
Class
Address Range
Supports
Class A
1.0.0.1 to 126.255.255.254
Supports 16 million hosts on each of 127 networks.
Class B
128.1.0.1 to 191.255.255.254
Supports 65,000 hosts on each of 16,000 networks.
Class C
192.0.1.1 to 223.255.254.254
Supports 254 hosts on each of 2 million networks.
Class D
224.0.0.0 to 239.255.255.255
Reserved for multicast groups.
Class E
240.0.0.0 to 254.255.255.254
Reserved.
Ranges 127.x.x.x are reserved for loopback tests, for example, 127.0.0.1. Ranges 255.255.255.255 are used to broadcast to all hosts on the local network.

Call Forging Mobile Trick

To call someone from their own number or any number:
1. Go to mobivox.com and register there for free account.
2. During registration, remember to insert Victim mobile number in "Phone number
"field as shown below.
3. Complete registration and confirm your email id and then login to your account. 
click on "Direct WebCall".
4. You will arrive at page shown below. In "Enter a number" box, select your country 
and also any mobile number(you can enter yours). Now, simply hit on "Call Now"
button to call your friend with his own number.

5. That's it. Your friend will be shocked to see his own number calling him. I have
spent last two days simply playing this cool mobile hack prank.

Note: This trick is only for knowledge person. Try it only to the known person.

Turn your smartphone into universal remote

Your smartphone can do a lot more things than you ever know. Your mobile is just an electronic device which is operated by the applications (apps) installed in the mobile. It give us turn-by-turn driving directions, show us the best places to eat nearby, check us in for a flight, and entertain us while we're waiting in line.
Can we use our smartphone as a TV remote?
Yes. You'll need to download an app and purchase a few pieces of equipment. TVs, DVD players, cable boxes and stereos use an infrared (IR) signal to know when to do things like change the channel or play the DVD. To convert your phone into a universal remote you'll need to purchase a device called an IR blaster that takes the commands you give on your phone and converts them into infrared signals. There are different devices that can do this, from pear-shaped orbs you sit on your table to covers that fit around your phone to adapters you attach to the front of phone. Some IR blasters attach to your Internet router and capture signals from your phone and then transmit them to your TV, stereo or DVD player. Other devices send the signal directly from the equipment attached to your phone to the device you want to control.
There are numerous apps available for download that work with the IR blasters to control electronic devices. Some just have basic functionality while others can be programmed to turn on multiple devices with just one tap of the screen. Some apps allow you to program which room in your home you can control so you can switch back and forth easily between devices.

BRUSHLESS VS BRUSHED MOTORS

1. Brush-less Motor:  DC Brush-less Motor uses a permanent magnet external rotor, three phases of driving coils, one or more Hall effect devices to sense the position of the rotor, and the associated drive electronics.

2. Brushed Motor: A Brushed Motor has a rotating set of wound wire coils called an armature which acts as an electromagnet with two poles. A mechanical rotary switch called a commutator reverses the direction of the electric current twice every cycle, to flow through the armature so that the poles of the electromagnet push and pull against the permanent magnets on the outside of the motor.



Brush-less DC Motor Pros
  • Electronic commutation based on Hall position sensors
  • Less required maintenance due to absence of brushes
  • Speed/Torque- flat, enables operation at all speeds with rated load
  • High efficiency, no voltage drop across brushes
  • High output power/frame size.
    Reduced size due to superior thermal characteristics. Because BLDC has the winding on the starter, which is connected to the case, the heat dissipation is better
  • Higher speed range - no mechanical limitation imposed by brushes/commutator
  • Low electric noise generation

Brushed DC Motor Pros
Two wire control
Replaceable brushes for extended life
Low cost of construction
Simple and inexpensive control
No controller is required for fixed speeds
Operates in extreme environments due to lack of electronics

LED vs CFL vs Incandescent Light Bulb

Which light bulb is better?
1. Incandescent light bulb is an electric light with a wire filament heated to a high temperature, by passing an electric current through it, until it glows with visible light (incandescence).
2. Compact fluorescent lamp (CFLbulb remains the same as in other fluorescent lighting: electrons that are bound to mercury atoms are excited to states where they will radiate ultraviolet light as they return to a lower energy level; this emitted ultraviolet light is converted into visible light as it strikes the fluorescent coating on the bulb.
3. LED lamp is a light-emitting diode (LED) product which is assembled into a lamp (or light bulb) for use in lighting fixtures.














Now, from the above chart you can easily find out that which one is better.

N computing

1 CPU Multiple Users
It is referred as Virtual Desktop or Desktop Virtualization or Cloud Desktop Virtualization or NComputing.


For example, you are going open a cyber and you will need 10 or more computers. Buying 10 individual CPU will need more finance. Using a single CPU for just using internet is not efficient in term of cost. For the cost reduction and CPU full processor's use, a single CPU can be use for multiple users i.e. using a single CPU for more than one monitor, keyword and mouse. For such a configuration we need some hardware and software.

NComputing is a desktop virtualization company that manufactures hardware and software to create virtual desktops (sometimes called zero clients or thin clients) which enable multiple users to simultaneously share a single operating system instance.

NComputing Products:
X-series - Direct Connect
X-series access devices connect via CAT 5 cable to a PCI card that is installed in a shared PC. The technology supports up to two PCI cards. The maximum distance between the PC and an access device is 10 m (33 ft). The X-series comes in kits which include one PC card and several access terminals, depending on the specific product.

L-series - Ethernet connect
Unlike the X-series, the NComputing L-series does not use a PCI card. L-series access devices connect each user’s keyboard, mouse, other USB devices and monitor back to the shared PC over standard Ethernet cables through a router or switch. An entry-level server supports approximately 30 users. The L-series comes in kits that include NComputing’s vSpace software and one access device. and best

U-series - USB connections
The U-series are the simplest of all to connect, because they connect into USB ports on the host computer, and thus no network switches or PCI cards are required. USB has an inherent distance limit.

Battery Backup Time Calculation

The following procedure and formula will help you to calculate your UPS / INVERTER Battery Backup Time.

Formula:
Battery Backup time = (Battery volt * Battery Ah rating) / (Total watts on Load)

Example:
Battery = 12v 35Ah
Load = 20 watt CFL + 10 watt ADSL router = 30 watt

Then,
Battery Backup time = (12 * 32) / 30 = 14 hour

Note: This calculation shows only approximate value because there will be some loss of energy when converting 12v battery power to 220v through inverter.

Universal or Master Remote for CRT TV

Master remotes can easily linked up with devices like TV / DVD that has been listed in its manual. You can find several types of master remotes in the market. Here I am going to explain 'how to set up master remote' for your television (CRT TV).
This is a most common Universal Remote you will find in the market.

Setting Procedure:
1. Press key set + power at once then light will glow on.
2. Find the Brand name of your TV and 3 digit code in the manual.
3. Enter the 3 digit code then light will go off.
4. Check the working of remote. If not try another 3 digit code.

Note: If the Brand name of your TV is not listed in the manual.
Try this:
1. Press key set + power at once then light will glow on.
2. Then press 000, to reset the remote.
3. Again follow step 1.
4. Now start pressing key vol+ step by step until your TV dislay volume signal then immediately press set key.

Now your master remote must work.

Note: The functioning key may be altered or changed. Try pressing all key and check by yourself.