Wednesday, 3 December 2014

Download PVsyst - [ Full Version ]

17:37 Posted by Unknown No comments


PVsyst is designed to be used by architects, engineer, and researchers. It is also a very useful educative tool.
It includes a detailed contextual Help menu that explains the procedures and models that are used, and offers a user-freindly approach with guide to develop a project. PVsyst is able to import meteo data from many different sources, as well as personal data.




Tuesday, 2 December 2014

All about Laplace Transform

12:50 Posted by Unknown , No comments


It is an RAR file that contains:
01. Laplace Transform by Murray R. Spiegel.

02. Laplace Transform Lecture no.03 by S Boyd.

03. Some basics about Laplace Transform by Imperial College London.

Click here to Download

Monday, 1 December 2014

User Time Control

18:06 Posted by Unknown No comments


User Time Control Center lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits (control computer time). You can schedule time intervals and the number of hours each child can use the computer per day a week. User Time Control Center can record all actions to a log file so you will know when and how much your child used the PC.

Click here to Download.

Monday, 24 November 2014

10 SEO Terms Explained

14:45 Posted by Unknown No comments
what does SEO means? Translated, SEO means Search Engine Optimisation. Everybody who has a site want's a lot of traffic on it. And the best way to get good targeted traffic is from Search Engines like Google, yahoo or Msn. But For your site to get the great traffic that you've always dreamed it must rank well in search engines. And this is where SEO comes up. SEO means optimizing your site in any legitimate way to have high rankings in the most important search engines.

I will try to give you a top 10 list with the most important terms meet in the SEO business.


1. Anchor Text. The anchor text is very important in SEO. It means the specific text for a hyperlink. Try to use as anchor text your most targeted keywords.

2. Ethical SEO. You can think about Ethical SEO as the opposite to Unethical SEO. It is SEO made without using any illegal activities that might get your site banned in the most important search engines.

3. Inbound links are links that point to your site. This are some kind of votes in your sites favor, from the search engines point of view. The more of these the better, obviously for traffic reasons, but also because they help build link popularity.

4. Keyphrase is a group of keywords.

5. Keyword is a word that is very important for your site. You keywords and keyphrases are the search terms that you want to rank high for.

6. Keyword Analysis means to analyze all the keywords that are related to your site and see which of them have more searches on search engines. You should optimize your site for related keywords that have the highest search rates.

7. The Link popularity is one of the most important thighs when it comes to SEO. Link popularity means the amount of links that point to your site. The link popularity while raise your site in the eyes of the search engines depending on the quality and quantity of the links.

8. META tags are special tags included at the top of a HTML page. Their purpose is to provide extra information about the web page. The most influential tags for search engine ranking are the Keywords tag and the Description tag.

9. Natural Links. SEO can come from natural ways too. This means that a webmaster on the net finds your site likes it and decides that it's quite useful for his visitors and links to it. This kind of links are called natural links and this are one of the most powerful links.

10. PageRank. It's some kind of ranking system invented by Google. The only real problem with PageRank in SEO is that is given much more attention that it deserves. The PageRank can bee seen with the PageRank meter included in the Google toolbar. You can think of it as a tool that measures the popularity of a wesite but only in the eyes of Google. PageRank is important but there are many other factors that are more important in the SEO process for the ranking of a website.

Sunday, 23 November 2014

Saturday, 22 November 2014

Why Linux is better than Windows

23:40 Posted by Unknown No comments
Are you tired with your Windows operating system? Is the OS infected by viruses and there are security issues as well? Well, you are not alone; there are many Windows users who are not satisfied with this operating system. Microsoft Windows might be the most popular operating system in the market but there are a number of flaws. On the other hand, Linux, a less popular operating system, is much better in terms offering hassle-free computing experience. To get Windows OS you need to pay a hefty amount while Linux is absolutely free. In this article you will find why Linux is a better choice than Microsoft Windows.

More of the complaints we get regarding Windows PC is about virus infection. You cannot use a Windows machine without antivirus or anti-malware. Even after having these programs installed there is still the risk of getting infected. Sometimes, viruses and malware even get past the best solutions. On the other hand, with Linux, you don't need to worry at all about this. Your PC will hardly get infected with viruses with this operating system.
Windows PC users also experience mysterious slowdowns. The reason behind this shut down could be diverse. It might be due to viruses, malware, fragmentation, or any other operating system issues. You will never experience these types of abnormal behavior from on a Linux computer. Not only the operating system but also you will hardly face mysterious application crashes with Linux.
Troubleshooting on Linux computer is very easy as you can go through the /var/log to find out what is ailing your PC. If you are not well familiar with the command line, you can install a GUI. This will allow you to scan through the log files and check for the issues and fix it. You can also run a backtrace to get all of the debugging information for the applications that you are facing problem with. Then you can fix the issues on your own or contact an Operating system support provider for Linux support.
Another most important thing is resource. To run a Windows 7 desktop your computer must have minimum 1 GB of RAM. Anything less than that makes your computer appear like it is working on slow motion. With Linux operating system you will never face this type of problem. Linux requires very less amount of hardware resources. This OS make the use of RAM to cache files until the cached files goes above the amount of RAM available on the computer. On the other hand, Windows 7 OS uses memory for cache only for the cases if there is no other demand for said memory.
These are some notable features of Linux operating system which make them stand at much better position than Windows OS in terms of safe and secure computing.

How to create Torrents

13:28 Posted by Unknown No comments
"Consider this a how-to for the newbies which want to make .torrent files, upload them to Extra Torrent, and have a full and professional looking description. It's a handy tool for those whom do not know.

This guide, as far as creating the torrent file, it based upon the UTORRENT program.
BLUE is used on the names of FOLDERS.
RED is used for emphasis.

MAKE FOLDERS FOR NEW TORRENTS & FILES SHARED:

Create a folder in My Documents called MY ET TORRENTS.
This is where you will save the new Torrent files you will make.
Not the actual files you will share!

Create a folder in My Documents called MY ET TORRENT FOLDERS.
This is where you will make folders that contain the files you will share in YOUR Torrent.
Make 1 folder for each torrent you create.


CREATE A FOLDER OF FILES TO SHARE:

IMPORTANT: Don't create the torrent file from a folder that's located on your desktop!
We'll use a VIDEO file as an example!

Create a new folder in MY ET VIDEOS with the same name as the video you'll put inside it
Copy/Move the VIDEO file into this new folder.
Copy/Move anything else that will be a part of this Torrent such as images, text or a small video sample clip from the film. You name it!


OPEN UTORRENT & CREATE A TORRENT FILE:

SELECT THE SHARING FOLDER:

Open FILE>CREATE NEW TORRENT. This opens the torrent creation box
Hit ADD DIRECTORY & select the folder holding the files to be shared. Hit OK.
You will now see the folder's path in the long box above.

SELECT THE TRACKERS:

Trackers are sites that monitor who shares & who wants.
In TORRENT PROPERTIES inside the TRACKERS: box copy & paste these sample tracker sites below:

http://trackedbyet.info:420/announce

http://denis.stalker.h3q.com/announce

http://denis.stalker.h3q.com:6969/announce

http://genesis.1337x.org:1337/announce

http://nemesis.1337x.org/announce

http://tracker.openbittorrent.com/announce

http://tracker.publicbt.com/announce

The first Tracker should have no spaces before it.
All tracker names must have a blank line between them.
There should be no spaces after the last tracker.
The box is small so use the up/sown arrows to scroll thru what you pasted.

You can add a comment if you like.
The START SEEDING box should be checked by default.

CREATE THE TORRENT:
Hit CREATE AND SAVE AS... & chose the MY ET TORRENTS folder as the SAVE IN location.
The Torrent’s name should be the same as the folder by default. If not, make it so.
Hit SAVE.
Your new Torrent fils is now created there.
You can now CLOSE the CREATE BOX.

CHECK THAT YOUR TORRENT IS WORKING:

UTORRENT will open the torrent & start SEEDING (Trying to Upload).
You should see a GREEN UP ARROW in front to show active seeding.

You should see 1 SEED (You).
SEEDS are uploading & have downloaded the whole TORRENT.

You should see 0 PEERS.
PEERS still don’t have the entire TORRENT.

Press the lower TRACKERS column to see if the trackers are working.

When you double click on your seeding torrent, you’ll view its running properties. Here you can add or remove trackers for testing purposes. THE ORIGINAL TORRENT IS NOT CHANGED.

In the OTHER SETTINGS section, Don’t check the initial seeding box even though it sounds logical. I had very bad speed results my first time out. It isn’t checked by default.

The other 3 boxes ENABLE DHT, PEER EXCHANGE & LOCAL PEER DISCOVERY are checked by default. They should be.


CREATE AN ET WEB PAGE FOR YOUR TORRENT:

Login to ET and click on the UPLOAD A TORRENT link you’ll see in the upper-left side of the main page.

TORRENT FILE:
Browse to your MY ET TORRENTS folder & select your new TORRENT file.

CATEGORY:
Pick what type of file your sharing.

INFO URL:
Optional web address about the file

NAME:
Check the box marked GENERATE NAME FROM TORRENT FILE

DESCRIPTION:
The description box will display your custom text on the web page.

By adding script like "[img][/img]" around an address of an image stored online, you can display that image on your TORRENT’s page such as .

What you type in there is what will make your new torrent's web page look sweet and professional.

What's in the Description box will show up between the standard info box on the top of every page & the Comments at the bottom.

DON’T WORRY TOO MUCH ABOUT THE DESCRIPTION BOX AT THIS TIME.
There’s a great editor with all the script buttons you can ever want to use.

EDIT YOUR TORRENT’S WEB PAGE:

You must be logged in with your ET ID to see the editing option!

Once you create the torrent page, you can go to it & EDIT it using a custom PAGE EDITOR.

The EDIT button is to the right of ADMIN ACTION.
It sounds official but on YOUR page, you are an ADMIN.

In the EDIT mode, there are all kinds of helpful script buttons to add text, images & much more.
You can look at some other people’s pages to see what info they like to post.
Commonly seen eye-candy is actors, a brief plot description, technical info about the file & pictures.
In music torrents, the BITRATE or overall quality is a good fact to display

Any pictures on your web-page must be stored somewhere on the web already.
You can use images you found on the web.
If you have some you made, you have to upload them somewhere online.
http://tinypic.com/ is a popular place for free image storage.
http://photobucket.com/ is another. It now controls tinypic.
You can also use your Win Live Hotmail/Photos storage.

Here's a larger list. It’s below with a short description.

To add images, type in the full address of the image, highlight it with your mouse and use the image button above.

That's it! You can go word then image then more words. Whatever order you like.
Just save when you’re done and check out how the page looks now!

Fill in the last 2 boxes and hit SAVE


WATCH YOUR TORRENT FOR PEERS:

Once people start to download your torrent, you will see Peers grow in your UTORRENT display.

Usually UTORRENT will slow or stop seeding once you have uploaded as much data as you downloaded for that TORRENT, depending on what it’s set to.
To keep this from happening on your job, R-CLICK on your TORRENT and choose FORCE START.
This will let you seed for as long as you want.

The PEERS column can show you info about each peer connected such as how much of the file he has & his upload/download speeds.

You might need to seed for a few days till there’s enough people who are being seeds themselves.

Remove Bad Sectors

12:58 Posted by Unknown No comments
Bad Sectors:
To make it easy for all of to understand what a bad sector is I will try to explain it away from the technical terms. Consider you have a piece of paper and the entire paper is the writable zone where your hard disk saves information. On this piece of paper we draw lines to divide it in small squares. One small square represents a sector of your hard disk, and if we divide one square in to 4 squares we can obtain, imaginary of course, 4 cluster. Ok know you want to write a sentence on the paper. You will notice that there no room to write the sentence in only one small square and you will need a certain amount of squares from different portions of the paper; know write down your sentence.

After that take scissor and cut a word from the sentence in the middle of it. You as a person can still read the sentence because we can realize what word is creating problem from the sentence but a computer to show you that sentence needs all of the words to reproduce it for you. The part that you cut from the sentence is our Bad Block, and now you can understand how the hard disk functions. And all of you know that on the driver is more then a sentence written, and that it contains millions of letters and numbers and also holds information about all of the boards, along whit their drivers, that are in your personal computer.
Some surface errors have connections with the hardware equipment of the computer directly and can create physically bad sectors on the hard drive, and that means a cluster from the hard disk sector is unreadable. The writing action on the hard disk is possible thanks to a “writing head” that revolves at a distance of 0.3 microns over the writable layer of the disk. If one or more heads actually touch the writable disk the chance to destroy that cluster is almost 100%.
By definition, the bad sectors are a portion of writable part of hard disk that can not be read or write. So because of this definition the data that are on the bad sectors may be lost forever.
You can be easily come to know that your hard disk have bad sectors, most of the time are errors that appear because of the more often alerts from the partition or the Windows.
Bad sectors also known as simple as “bad” can appear to any hard disk after a time of function. In most of the cases the bad sectors that appear are not in a bigger quantity from your stocking space (about 0.01% for newer hard disk). For the new generation of hard disk there are some spare clusters just for these problems. When a bad sector appears the safety measure remove the information that it contains to a spear cluster and it avoids the lost of data or the corruption of the data.
In a generally idea a bad sector is a big problem for your hard disk and for your entire computer. There are some programs that can repair them if there are not physically and are from data corruption.
To fix Bad Sectors
Let’s try to explain the question that grinds us all when we talk about the hard disk. Can we actually repair a bad block? Before of the answer you must find some information about what is a hard disk, how does it work, what are bad blocks? After that you must identify them because you will need the exact location of the affected sectors. After you have done that you must follow few steps:
Before you try to resolve the problem with the bad sector you must extract the data that was written to that block. To do this you must run a Recovery program that you can find freeware on the net.
Bad sectors are unreadable parts on your hard disk but the nature of them must not be always physically and that part of the platens to be destroyed. Let’s suppose that you have a 20 gigabits partition on your hard disk that has bad sectors. After the identification program it will indicate you where are the blocks situated on the partition. So this way you can allocate them in to another partition that you must never use again. Another scenario can be created and the bad sectors can be at the beginning of the partition in the middle of it and at the end of the partition. I know it’s a little bit tricky because you can’t just go on and create three new partitions to eliminate the bad sectors from use. In this case most of the new hard disk has a spare space available just for this type of scenarios. You must access the CASH memory of the hard disk and indicates to the hard disk that instead of writing down on the effected blocks it must write to the spare blocks, in other words hide the bad blocks.
Another way to restore the hard disk is to use the low level format option. Many of you may think that low level format is a program . Wrong! The low level format option is set for any BIOS and can be easily use if you know some command line programming, like Disk Operating System (DOS). The low level format can take to be complete a very long period of time but in the most cases we can obtain marvelous results. Actually the low level option takes every cluster of the hard disk and identifies them again and writes down on the memory of the hard disk what sectors can be written and witch blocks are un-writable. This procedure is the best that can be because it will need no effort from your side to try and avoid the bad blocks that already exists and the hard disk itself know where the bad blocks are.
In conclusion the bad blocks can’t be fixed. The problem is a permanent and we can only try to use the hard disk until it is dead for good. But if you are having financial problem this is a best way to keep going with your old hard disk. Some programs like Flobo HDD repair and HDD Regenerator are well-known in regard to hide the bad sectors.
Note: I apologize for spellings and grammatical mistakes in this article.

12 Tips to maintain a virus free computer

12:55 Posted by Unknown No comments
Is your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer.

1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use a good anti-spam software. And finally NEVER click on any links in the emails that comes from untrusted sources.


2. USB thumb/pen drives is another common way by which viruses spread rapidly. So it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is a safe way to open a pen drive.

3. Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).

4. As we all know, Internet is the main source of all the malicious programs including viruses, worms, trojans etc. In fact Internet contributes to virus infection by up to 80%. So here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum extent.

Don’t click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
You can also use a pop-up blocker to automatically block those pop-ups.

5. Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from malicious websites.

6. Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from virues. If PC security is your first option then it is recommended that you go for a shareware antivirus software over the free ones. Most of the antivirus supports the Auto-Protect feature that provides realtime security for your PC. Make sure that this feature is turned on.

7. Install a good Antispyware program, that operates against Internet malware and spyware.

8. Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still do a scan before opening.

9. Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.

10. Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.

11. While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.

12. And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other malicious programs.