How to Wax Your Legs

Nowadays there are plenty of hair removal methods available for women in order to get rid of unwanted hair on their body. You have probably tried to shave your legs but you ended up with nasty ingrown hairs and coarse hair. Although it is one of the most common methods of hair removal, the result lasts only for a few days and you can even cut yourself easily. Contrarily, waxing is a wonderful option to have smooth and soft legs for a long time. Once you try it, you won’t ever return to the razor. Today we will give you a useful step-by-step guide on how to wax your legs right at home.
 Waxing you legs is a simple and practical hair removal alternative to achieve fabulous skin. Although it is a little bit painful, waxing is one of the most popular and most efficient ways to get rid of unwanted hair on your legs. As opposed to shaving or depilatory creams, waxing gives long term results, the hair being removed at the root.

If you regularly wax your legs, the hair will become finer, and you won’t have to deal with tapered ends and ingrown hairs any more. Waxing can be tricky for many of us, but if you do it correctly, you can save a lot of money and achieve wonderful, smooth and sexy legs right at home. Following our tips, you can learn how to wax your legs like a pro.
 First of all let the hair grow out on your legs and make sure it’s long enough to wax. The minimal length that wax can stick to is 1/4 inch. Purchase a quality roll-on waxing kit that contains waxing strips, which can be bought separately as well. Roll-on systems are hygienic, leave no mess behind and can be used easily and safely at home.


  • Two days before you plan to wax your legs, exfoliate them with a mild body scrub in order to get rid of dead skin cells. It is important to do this one or two days before the actual wax depilation to avoid eventual skin irritations.



  • Right before you start waxing, dust a little baby powder on your legs. This is a great trick, since the powder absorbs the oil from the skin’s surface and the wax can stick more easily to the hair.



  • Heat the wax in the wax warmer or a container of water heated to boiling point. Follow the instructions written on the package, mainly those referring to heating in order to avoid overheating the wax and burning yourself. Proceed according to the instructions of the producer.


  • Sit down comfortably on a surface that can be easily cleaned. Using the roll-on applicator, apply the wax carefully in a thin, uniform layer. For the best results, hold the roll-on wax applicator at a 90-degree angle. One of the most important things you should always pay attention to is to apply the wax in the direction of hair growth. This way you can cover all the hairs evenly, so you can have wonderful, smooth legs.



  • Before the wax cools down, press a strip over the wax on your feet, applying pressure and smoothing all over so the hairs can stick better into the wax. Pull the skin taught using one hand and remove the strip with the other hand, pulling the strip in the opposite direction of the hair growth. While removing the strip, make sure you keep it as close to the skin as possible, so that it will be less painful. Proceed similarly until you finish both of your legs.



  • If the waxed area stings a little bit, you can apply a slightly damp cloth over your leg to calm it instantly. After waxing apply an antiseptic product containing salicylic acid to disinfect the area, avoid irritations and to prevent ingrown hairs as well.



  • To remove all the residues of wax from the surface of your skin, soak a cotton pad into a small amount of body oil and apply it on your legs.



  • Purchasing a proper roll-on waxing kit will help you to remove unwanted hair from your legs easily and safely right at home. This costless method can give your professional results and you can enjoy your fabulous, smooth legs for a long time.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    Look Your Best For School

    Going back to school and looking great is a very important thing. everyone wishes to make a good impression by looking their best. Find out how you can upgrade your fashion style.
     Going back to school and looking your best for your first day is very important especially if you want to make a good first impression. It is always exciting to meet new people or to see old colleagues which you haven't seen for a while.
    Everyone wishes to look changed, different and better to receive complements which will automatically boost up their confidence. If you make the right choices you will definitely stand out and be the center of attention.

    The best way to upgrade your style is by changing your wardrobe, or, if you can't afford it try to be more inventive with what you have. Look through your clothes and try to mix and match. Wear clothes that fit you well and match your own style. There is no point in wearing the latest and the trendiest outfits if they don't look good on you. You can definitely be stylish by dressing with good taste even if the clothes aren't in the latest fashion trends.

    Find out your style!
    It is very important to find out your own style and to try to improve it with time. If you know how to wear clothing and you feel good wearing what you like you will exude confidence. Some clothes are designed to accentuate certain types of bodies and don't offer any advantages for other types. This is why it is important to be objective about buying clothing. If it doesn't do you justice don't buy it even if you like it. You might like it but if you put it on and it doesn't look good, you didn't really make a good deal.

    Accessorize !!!Accessorize!! Accessorize!
    Accessories are very important when it comes to an outfit. They can take an outfit from boring to fabulous in a matter of minutes. You don't have to exaggerate, all you need to do is wear an oversized necklace or a bangle and a cute handbag, and you can transform your outfit completely. Even a simple scarf can help upgrade your outfit. Accessories are very hot this year so check out the latest trends when it comes to accessories.

    Keep up with the fashion trends!
    There are so many tips and trick you can learn just by keeping track of the latest fashion trends. There are a variety of fashion designers who get their inspiration from different sources, creating different styles, to match everyone's taste. Find a fashion designer you can appeal to and inspire your outfits from his fashion collection. It really doesn't matter that you are not wearing the exact same outfit, you can inspire yourself to buy affordable clothes which have similar cuts, designs even colors.

     Pay attention to your hair and make-up!
    Hair is very important when it comes to looks and there are a variety of hairstyles to choose from. Choose a hairstyle which suites your face shape and your hair type. Go for loose hairstyles or pulled up hairstyles. As far as make-up goes simple is better. You can go for black eyeliner and sheer lip gloss. This is one of the latest make-up trends of this fall season so you will be in style when it comes to make-up as well.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    How To Dress On Your Interview

    t is said that first impression counts the most. When looking for your dream job it is crucial not to neglect all the important details regarding the job interview. Among these essential items you have to consider, your outfit plays a major role as it can highly influence the final decision. It takes a few seconds for someone to make a first impression of you, based on your body language, demeanor, but also the way you are dressed. Therefore, if you still don't know how to dress for a job interview, take a look to these basic tips.


    Creating a good first impression is important regardless your career level. Since sometimes this opinion cannot be reversed, you should be extremely attentive when choosing the right outfit for the job interview. A clean and tidy physical appearance is a must as this not only says a lot of things about you, but it also boosts self-confidence. Here's a basic guide on how to properly dress for a job interview. However, remember to stay professional without losing your personal style and adapt the outfit based on the domain of the job. The idea is not to disguise and wear a mask, but stay decent and be yourself.

    As a job interview can be a real stressful moment, make sure you choose the outfit in time. The way you dress for the job interview is highly related to the nature of the job. For example, if the job is in domains such as finance or law, the outfit should be rather classic and severe.

    Suits in a sober, plain color, white shirts, fine jewelry and a pair of simple, not too tall pumps works great. If you are looking for a job in a social environment, medical or something that has to do with kids, your should bet on the comfortable and practical side, choosing natural, comfy fabrics and pastels. A job in commerce also requires a suit.

      If the interview is for a job in domains such as communication or advertising, you are allowed to wear something a little bit more original. The same thing can be applied when it comes to artistic jobs where the classic suit can easily be replaced. However, don't go to extremes and take full advantage of your creativity as it might disadvantage you. Good sense and originality should blend in this case in a harmonious way. Is up to you to put your balancing skills to the test. You can add a creative touch using unique accessories and shoes.

    A jean is not a too bad idea as long as you match it properly, especially for a job in advertising. The outfit should be in accordance with the domain you want to work, but whether you need to adopt a more conservative look or a creative one, you have to look just like a real professional.

    Two basic things for you to take into consideration are the cut and the colors of your clothes. Avoid provocative and too sexy outfits, such as a daring mini skirt, tight-fitting blazers or pants, or a deep decollete. Knee length dresses or skirts, but also pants and shirts represent some of the safest choices. As for the colors, stick to neutrals, such as black, white, gray, blue, or pastels. A black and white outfit will always look very elegant with a sophisticated touch. You can create a beautiful outfit by matching a high-waisted black skirt, a white shirt, a belt and black pumps. For those of you who are not so much into skirts, you can replace them with a pair of elegant black pants.
    As we have said before, your outfit also has to be a reflection of your personality. What better way to do this than by choosing accessories that show your personal style? Moreover, they are the best way to sweeten a too severe outfit, adding elegance and originality to your overall look. However, remember not to exaggerate with your creativity and try to stay away from oversize jewelry and too bright and daring colors. The only indispensable accessory is the watch.

    Another detail that shouldn't be omitted are the shoes. Try to avoid extreme high heels as they can be rather uncomfortable. Besides, shoes that have a special, unique and more crazy design are a total no-no. The best way to impress is to keep it as simple as possible and go for something classic, such as a pair of black shoes. As for the handbag, this should be large enough for you to put your resume, a bloc notes and a bottle of water. Choose a handbag in a light, soft color.
    After the outfit has been chosen, it's time we pass to makeup and hairstyle that need to be made following the same rules of simplicity and naturalness. You can choose a nude makeup and obtain a flawless looking skin, yet very professional. You can apply a soft coat of lip gloss or lipstick keeping everything rather natural without falling into the sexy category. Avoid too elaborated and studied hairstyles and keep everything as natural as possible going for a classic chignon. Clean and tidy should be the two words describing makeup and hairstyle for a job interview. This rule is valid for perfume too as we don't want to asphyxiate the employer. Also, pay attention to your nails.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    PHYSICS--HEAT

    Temperature
    temperature is degree of coldness or hotness of a body which expressed in term of number on chosen scale which may be fahrenheit or celcius scale
    Thermometer
    Thermometer is an instrument which used to measure the degree of hotness or coldness of a body
    -thermometer use some measurable property of a substance called thermometric properties
     The thermometric properties are
     -thermometric property are property which varies linearly and continuously with temperature also called physical property of thermometer


    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    All About Random access memory(RAM) Part 1



    Types of random access memory

    There are generally two broad categories of random access memory:
    • DRAM memories (Dynamic Random Access Module), which are inexpensive. They are used essentially for the computer's main memory
    • SRAM memories (Static Random Access Module), which are fast and costly. SRAM memories are used in particular for the processor's cache memory


    Operation of the random access memory

    The random access memory comprises hundreds of thousands of small capacitors that store loads. When loaded, the logical state of the capacitor is equal to 1, otherwise it is 0, meaning that each capacitor represents one memory bit.
    Given that the capacitors become discharged they must be constantly recharged (the exact term is refresh) at regular intervals, known as the refresh cycle. DRAM memories for example require refresh cycles of around 15 nanoseconds (ns).
    Each capacitor is coupled with a transistor (MOS-type) enabling "recovery" or amendment of the status of the capacitor. These transistors are arranged in the form of a table (matrix) thus we access a memory box (also called memory point) via a line and a column.


    Each memory point is thus characterised by an address which corresponds to a row number and a column number. This access is not instant and the access time period is known as latency time. Consequently, time required for access to data in the memory is equal to cycle time plus latency time.

    Thus, for a DRAM memory, access time is 60 nanoseconds (35ns cycle time and 25ns latency time). On a computer, the cycle time corresponds to the opposite of the clock frequency; for example, for a computer with frequency of 200 MHz, cycle time is 5 ns (1/200*106)).

    Consequently a computer with high frequency using memories with access time much longer than the processor cycle time must perform wait states to access the memory. For a computer with frequency of 200 MHz using DRAM memories (and access time of 60ns), there are 11 wait states for a transfer cycle. The computer's performance decreases as the number of wait states increases, therefore we recommend the use of faster memories.

    RAM module formats

    There are many type of random access memory. They exist in the form of memory modules that can be plugged into the mother board.
    Early memories existed in the form of chips called DIP (Dual Inline Package). Nowadays, memories generally exist in the form of modules, which are cards that can be plugged into connectors for this purpose. There are generally three types of RAM module:
    • modules in SIMM format (Single Inline Memory Module): these are printed circuit boards with one side equipped with memory chips. There are two types of SIMM modules, according to the number of connectors:
      • SIMM modules with 30 connectors (dimensions are 89x13mm) are 8-bit memories with which first-generation PCs were equipped (286, 386). 

      • SIMM modules with 72 connectors (dimensions are 108x25mm) are memories able to store 32 bits of data simultaneously. These memories are found on PCs from the 386DX to the first Pentiums. On the latter, the processor works with a 64-bit data bus; this is why these computers must be equipped with two SIMM modules. 30-pin modules cannot be installed on 72-connector positions because a notch (at the centre of the connectors) would prevent it from being plugged in.  



      • modules in DIMM format (Dual Inline Memory Module) are 64-bit memories, which explains why they do not need pairing. DIMM modules have memory chips on both sides of the printed circuit board and also have 84 connectors on each side, giving them a total of 168 pins. In addition to having larger dimensions than SIMM modules (130x25mm), these modules have a second notch to avoid confusion.


     It may be interesting to note that the DIMM connectors have been enhanced to make insertion easier, thanks to levers located either side of the connector.
    Smaller modules also exist; they are known as SO DIMM (Small Outline DIMM), designed for portable computers. SO DIMM modules have only 144 pins for 64-bit memories and 77 pins for 32-bit memories.
    • modules in RIMM format (Rambus Inline Memory Module, also called RD-RAM or DRD-RAM) are 64-bit memories developed by Rambus. They have 184 pins. These modules have two locating notches to avoid risk of confusion with the previous modules.


    Given their high transfer speed, RIMM modules have a thermal film which is supposed to improve heat transfer.
    As for DIMMs, smaller modules also exist; they are known as SO RIMM (Small Outline RIMM), designed for portable computers. SO RIMM modules have only 160 pins.


    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    Introduction to Memory

    The Role of Memory

    The term "memory" applies to any electronic component capable of temporarily storing data. There are two main categories of memories:
    • internal memory that temporarily memorises data while programs are running. Internal memory uses microconductors, i.e. fast specialised electronic circuits. Internal memory corresponds to what we call random access memory (RAM).
    • auxiliary memory (also called physical memory or external memory) that stores information over the long term, including after the computer is turned off. Auxiliary memory corresponds to magnetic storage devices such as the hard drive, optical storage devices such as CD-ROMs and DVD-ROMs, as well as read-only memories.


    Technical Characteristics

    The main characteristics of a memory are:
    • Capacity, representing the global volume of information (in bits) that the memory can store
    • Access time, corresponding to the time interval between the read/write request and the availability of the data
    • Cycle time, representing the minimum time interval between two successive accesses
    • Throughput, which defines the volume of information exchanged per unit of time, expressed in bits per second
    • Non-volatility, which characterises the ability of a memory to store data when it is not being supplied with electricity



    The ideal memory has a large capacity with restricted access time and cycle time, a high throughput and is non-volatile.
    However, fast memories are also the most expensive. This is why memories that use different technologies are used in a computer, interfaced with each other and organised hierarchically.

    Types of Memories


    Random Access Memory

    Random access memory, generally called RAM is the system's main memory, i.e. it is a space that allows you to temporarily store data when a program is running.
    Unlike data storage on an auxiliary memory such as a hard drive, RAM is volatile, meaning that it only stores data as long as it supplied with electricity. Thus, each time the computer is turned off, all the data in the memory are irremediably erased.

    Read-Only Memory

    Read-only memory, called ROM, is a type of memory that allows you to keep the information contained on it even when the memory is no longer receiving electricity. Basically, this type of memory only has read-only access. However, it is possible to save information in some types of ROM memory.

    Flash Memory

    Flash memory is a compromise between RAM-type memories and ROM memories. Flash memory possesses the non-volatility of ROM memories while providing both read and write access However, the access times of flash memories are longer than the access times of RAM.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    Using Facebook in a secure way



    Risk of identity theft, exposure to malwares, visibility of shared data: Users who combine professional and private activities on Facebook are more exposed, given the risks to their reputation and that of their business, and the integrity of the information they share. Security and privacy are two crucial aspects to consider when private and corporate data are shared on Facebook. So, how to protect yourself adequately?

    It should be noted that Facebook reserves the right to make non-commercial use of all your information (comments, photos, links, texts, images, videos ...), whatever the type of account you are using (private or professional).

    Professional and personal life: properly configure Facebook

    Organize lists

    The Facebook lists allow you to share information (articles, links, content) within groups. They therefore act as filters: information shared with a list are only visible by contacts belonging to this list. This settings makes it possible to separate a personal (family, friends) from professional use(eg list of colleagues).
    • Lists can be used to share information on the progress of a collaborative project (event), allows the geolocation of relationships to distribute information in a meaningful way.


    Note:
    • Your contacts are not notified when you add them to a list.
    • You can add contacts to multiple lists.
    • Facebook offers several types of default lists settings. One of them (Restricted list) allows you to add contacts who won't hve access to publications and information shared publicly on your profile.

    Modify your privacy settings

    The following privacy settings must be changed if you are using Facebook for both a professional and personal basis. They are available under the following section: Home> Privacy settings:
    • Change your default privacy settings :The default privacy settings of Facebook are not efficient enough, you can pre-set the visibility of content on your Facebook account, to a targeted audience.
    • Geo-location settings : Avoid getting tracked.
    • Apps and Websites: Prevent applications to access your private data.
    • Limit the Audience for Past Posts.

    Security Settings

    Security settings can be accessed by going through: Home (top right of your Facebook page)> Account Settings> Security (tab on the left column):
    • Enable secure browsing (HTTPS secure connection), specially if you make a frequent use of unsecured WiFi networks.

    Secure your Facebook profile using applications

    Several vendors offer security applications for Facebook.
    • BitDefender offers a free application for Facebook called "Safego" (also available under Twitter) that analyzes the user's wall, posts and comments to identify malicious links and other content such as images, videos.
    • It also provides an "index of confidentiality" to help the user to manage privacy settings of their profile. Norton Safe Web application for Facebook allows Symantec to analyze the news feed links that may be potentially malicious.

    The use of proxy servers

    Access to Facebook can be blocked in different contexts (at work, at school, traveling abroad). To overcome this limitation, many users go through servers called "proxies" or proxy, which serve as an intermediary between a Web browser and Internet. Several lists of proxy servers available on internet.
    • Note that: it is impossible to know if the data passing through the proxies aren't being intercepted and reused maliciously.
    • It is therefore important to be careful when using this type of service.

    Spam and Scams to avoid on Facebook

    Facebook and Norton by Symantec published a joint white paper for an expert safe use of Facebook, titled "Spam and Scams to avoid on Facebook"

    Among the main advice of this White Paper:
    • Be cautious of videos or links with sensational headlines.
    • Activate the privacy settings of your account.
    • Use passwords that are difficult to guess.
    • Be cautious towards "attractive" free offers (discount coupons, games, etc.), especially when asked to click on the "I like" button before accessing the content.

    Safety tips from Facebook

    To protect your account, Facebook also recommends:
    • To use an up-to-date web browser, equipped with anti-phishing features,
    • Ensure the updating of security software on your PC (firewall, anti-virus, anti-spyware, anti-phishing tools).
    • Not open attachments in received e-mails (unknown senders).



    Original document published on CommentCaMarche.net




    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    How To Hide your phone number On Samsung Galaxy Ace



    If you want to hide your phone number for ALL of your contacts, under your Samsung Galaxy, follow the below procedure:
    • From the Homescreen go to:
    • Settings > Call settings > Additional settings > wait: your phone scans a few seconds.
    • The Caller ID menu shall be displayed, check "Hide Number"
    • Your new settings will be saved, tap on back to return to the homescreen.


    This manipulation works with most of the Android phones

    Note that: If you want to hide your number when calling a particular contact, here is a simpler method:
    Simply precede the phone number you are dailing with "#31#".

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    Top 3 To Hack ATM

    ATM hacking is from past is the first interest of every computer hacker.And in this article i will talk about ATM Hacking, things like how ATM Works , What are the vulnerabilities available to exploit and last but not least YES, how to patch them. So starting from the first how ATM works.

    WARNING
     Hacking ATM is highly illegal. Can Put you into cell for minimum 3 years along with fine 7 lac.This article is just for education purpose only do respect the law in your country, the author of the tutorial do not held any responsibility of the act or trails performed by you after reading the article.

    How ATM Works

    An ATM is simply a data terminal with two input and four output devices. Like any other data terminal, the ATM has to connect to, and communicate through, a host processor. The host processor is analogous to an nternet Service Provider  (ISP) in that it is the gateway through which all the various ATM networks become available to the cardholder (the person wanting the cash).

    Most host processors can support either leased-line or dial-up machines. Leased-line machines connect directly to the host processor through a four-wire, point-to-point, dedicated telephone line. Dial-up ATMs connect to the host processor through a normal phone line using a modem and a toll-free number, or through an Internet service provider using a local access number dialed by modem.
    Leased-line ATMs are preferred for very high-volume locations because of their thru-put capability, and dial-up ATMs are preferred for retail merchant locations where cost is a greater factor than thru-put. The initial cost for a dial-up machine is less than half that for a leased-line machine. The monthly operating costs for dial-up are only a fraction of the costs for leased-line.
    The host processor may be owned by a bank or financial institution, or it may be owned by an independent service provider. Bank-owned processors normally support only bank-owned machines, whereas the independent processors support merchant-owned machines.




    Methods of Hacking ATM

    1. Magnetic Reader

    Most ATM hackers have a device called Magnetic Reader which they attach over the card slot on the ATM, and as any one pin the card inside automatically it reads the magnetic information. And with the advancement of time the with the help of wireless technology, the magnetic reader automatically transmitted the details to fraudsters in a nearby location.

    2. Hidden Camera
    Obviously this is one of the easy method to hack an ATM machine but this is something more than hack, here we are not penetrating the ATM. As we all know our ATM is protected by a PIN which acts as our password so if some one have to get money after stealing our card he/she should have the PIN code too,  these days criminals have a solution for this too.

    3. They enter into the ATM when guard is outside put hand on the ATM cam and silently in 5 or 6 seconds,  just  install a hidden camera near by the keypad of the ATM from the user enter his/her PIN CODE, and again using the latest technology (wireless) and the PIN is digitally recorded and now hacker have the choice whether he want to get the details remotly or he/she will go to ATM and get the details by himself/herself.

    Protection Against ATM Hacking
    1. Do Hide the keypad when you enter your PIN CODE.

    2. See All around if found any camera which you think not supposed to be there do inform the ATM guard and the near by Bank.

    3. DO confirm completeness of the transaction after getting the money most people get trapped into this as the said above in second method.

    4. If any criminal caught to and say to extract money from ATM, to save your money just reverse your PIN Account number. Like if my PIN CODE is 1234, if some one having PIN Code like 7777 then just put a 0 (Zero) in the last digit, money will stuck half in the ATM and half outside.
    Hope you like the article :)

    WARNING

    This article is just for education purpose only do respect the law in your country, the author of the tutorial do not held any responsibility of the act or trails performed by you after reading the article.


    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    Windows Best Command Prompt







     Save A List of Files to a Text File by Extension

    dir *.ext /s /b > files.txt

    This command line will create a file called files.txt. When you open this file, there will be a complete list of all the files in that directory and all subdirectories with the .ext extension. You can then open up this text file in any text editor and work this the information.By changing the ext part, you can select different files. For example, if you wanted to list all of the PDF documents, you would type:
     dir *.pdf /s /b > files.txt
    Get Your IP Address Information

    ipconfig /all

    This will retrieve a pile of information about your network connection and IP information. From this command, you can get:

        Host Name
        Primary DNS Suffix
        Node Type
        IP Routing Enabled
        WINS Proxy Enabled
        DNS Suffix Search List
        Connection-specific DNS Suffix
        Network Adapter Description
        Physical (MAC) Address
        DHCP Enabled
        IP Address
        Subnet Mask
        Default Gateway
        DNS Servers

    Get Installed Driver Information

    driverquery

    It can be very useful when troubleshooting to know what drivers are installed on a system. This command will give you a complete listing of the drivers and when they were installed.
    Copy Files Via Infrared Port

    irftp filename.ext

    This will fire up the Wireless Link dialog so that you can copy the specified file via an infrared port.
    Find Files Opened By Network Users

    openfiles /query

    If you are running a system and you want to know who has files open on your computer, this command will provide you a list of those users and the files that they have open.

        Note: If you get an error saying The system global flag ‘maintain objects list’ needs to be enabled to see local opened files, you can fix this issue by typing openfiles /local on. You will have to reboot the system but it will resolve the issue.

    Monitor Port Activity

    netstat -a 30

    This will show you all of the TCP/IP ports that are being used on your system and what they are connecting to (or being connected from). It will continue to monitor these ports and refresh the information every 30 seconds. You can change the refresh rate by changing the number at the end of the command.


    Recover Information From A Corrupt File

    recover filename.ext

    If you have a disk with damaged sectors, you can attempt to recover as much information as possible from the damaged file. Data that is not damaged can be retrieved but data in damaged sectors will be lost.
    Defragment Remote Computer

    rexec remotePC defrag C: /F

    This command used the rexec command to force a defragment of the C: drive on the computer named remotePC. You can use whatever you want to for the command (I just used defrag C: /F as an example). This is very useful for remote maintenance.
    Retrieve Detailed System Information

    systeminfo

    With this command, you can retrieve the following information:

        Host Name
        OS Name
        OS Version
        OS Manufacturer
        OS Configuration
        OS Build Type
        Registered Owner
        Registered Organization
        Product ID
        Original Install Date
        System Up Time
        System Manufacturer
        System Model
        System type
        Processor(s)
        BIOS Version
        Windows Directory
        System Directory
        Boot Device
        System Locale
        Input Locale
        Time Zone
        Total Physical Memory
        Available Physical Memory
        Virtual Memory Max Size
        Virtual Memory Available
        Virtual Memory In Use
        Page File Location(s)
        Domain
        Logon Server
        Hotfix(s)
        NetWork Card(s)

    Automatically Defragment C: Daily

    schtasks /create /tn "Defrag C" /tr "defrag c: /f" /sc daily /st 23:00:00 /ru "System"

    This will set your computer to automatically perform a complete defrag of the C: drive each day at 11:00:00 PM (23:00:00). It does this by creating a scheduled task called Defrag C. It will run this command under the computer’s system account.
    Map A Drive Letter to a Folder

    subst W: C:\windows

    Sometimes, your directory structure can get pretty deep and complicated. You can simplify this a bit by mapping a drive letter to commonly used folders. In the example that I have given, this will create a drive letter W: and map it to the C:\windows directory. Then, whenever you go into My Computer, you will see a W: drive and when you browse to it, it will automatically take you to the contents of the C:\windows folder.

    You can do this with any unused drive letter and any folder that exists on your system.
    List All Tasks Running On The Computer

    tasklist

    It’s always good to know what is running on your system. This is the command line version of the processes tab in Taks Manager.
    Kill A Program

    taskkill /im programname.exe /f

    If, when using the tasklist command, you discover that there is something running you just want killed. This is the way to do it! Just note the program name and use it in place of programname.exe.
    Reboot a Remote Computer

    shutdown -r -f -m \\remotePC -c "System will be rebooted in 20 seconds"

    Sometimes, you just need to reboot a system. This will do it remotely and give the user a 20 second warning.

    Tip : To open Command Prompt, click Start, click Run, type cmd, and then click OK. Best Command Prompt for Windows


    15 Popular Command Prompt Tricks & Hacks
    Save A List of Files to a Text File by Extension

    dir *.ext /s /b > files.txt

    This command line will create a file called files.txt. When you open this file, there will be a complete list of all the files in that directory and all subdirectories with the .ext extension. You can then open up this text file in any text editor and work this the information.By changing the ext part, you can select different files. For example, if you wanted to list all of the PDF documents, you would type:

    dir *.pdf /s /b > files.txt
    Get Your IP Address Information

    ipconfig /all

    This will retrieve a pile of information about your network connection and IP information. From this command, you can get:

        Host Name
        Primary DNS Suffix
        Node Type
        IP Routing Enabled
        WINS Proxy Enabled
        DNS Suffix Search List
        Connection-specific DNS Suffix
        Network Adapter Description
        Physical (MAC) Address
        DHCP Enabled
        IP Address
        Subnet Mask
        Default Gateway
        DNS Servers

    Get Installed Driver Information

    driverquery

    It can be very useful when troubleshooting to know what drivers are installed on a system. This command will give you a complete listing of the drivers and when they were installed.
    Copy Files Via Infrared Port

    irftp filename.ext

    This will fire up the Wireless Link dialog so that you can copy the specified file via an infrared port.
    Find Files Opened By Network Users

    openfiles /query

    If you are running a system and you want to know who has files open on your computer, this command will provide you a list of those users and the files that they have open.

        Note: If you get an error saying The system global flag ‘maintain objects list’ needs to be enabled to see local opened files, you can fix this issue by typing openfiles /local on. You will have to reboot the system but it will resolve the issue.

    Monitor Port Activity

    netstat -a 30

    This will show you all of the TCP/IP ports that are being used on your system and what they are connecting to (or being connected from). It will continue to monitor these ports and refresh the information every 30 seconds. You can change the refresh rate by changing the number at the end of the command.


    Recover Information From A Corrupt File

    recover filename.ext

    If you have a disk with damaged sectors, you can attempt to recover as much information as possible from the damaged file. Data that is not damaged can be retrieved but data in damaged sectors will be lost.
    Defragment Remote Computer

    rexec remotePC defrag C: /F

    This command used the rexec command to force a defragment of the C: drive on the computer named remotePC. You can use whatever you want to for the command (I just used defrag C: /F as an example). This is very useful for remote maintenance.
    Retrieve Detailed System Information

    systeminfo

    With this command, you can retrieve the following information:

        Host Name
        OS Name
        OS Version
        OS Manufacturer
        OS Configuration
        OS Build Type
        Registered Owner
        Registered Organization
        Product ID
        Original Install Date
        System Up Time
        System Manufacturer
        System Model
        System type
        Processor(s)
        BIOS Version
        Windows Directory
        System Directory
        Boot Device
        System Locale
        Input Locale
        Time Zone
        Total Physical Memory
        Available Physical Memory
        Virtual Memory Max Size
        Virtual Memory Available
        Virtual Memory In Use
        Page File Location(s)
        Domain
        Logon Server
        Hotfix(s)
        NetWork Card(s)

    Automatically Defragment C: Daily

    schtasks /create /tn "Defrag C" /tr "defrag c: /f" /sc daily /st 23:00:00 /ru "System"

    This will set your computer to automatically perform a complete defrag of the C: drive each day at 11:00:00 PM (23:00:00). It does this by creating a scheduled task called Defrag C. It will run this command under the computer’s system account.
    Map A Drive Letter to a Folder

    subst W: C:\windows

    Sometimes, your directory structure can get pretty deep and complicated. You can simplify this a bit by mapping a drive letter to commonly used folders. In the example that I have given, this will create a drive letter W: and map it to the C:\windows directory. Then, whenever you go into My Computer, you will see a W: drive and when you browse to it, it will automatically take you to the contents of the C:\windows folder.

    You can do this with any unused drive letter and any folder that exists on your system.
    List All Tasks Running On The Computer

    tasklist

    It’s always good to know what is running on your system. This is the command line version of the processes tab in Taks Manager.
    Kill A Program

    taskkill /im programname.exe /f

    If, when using the tasklist command, you discover that there is something running you just want killed. This is the way to do it! Just note the program name and use it in place of programname.exe.
    Reboot a Remote Computer

    shutdown -r -f -m \\remotePC -c "System will be rebooted in 20 seconds"

    Sometimes, you just need to reboot a system. This will do it remotely and give the user a 20 second warning.

    Tip : To open Command Prompt, click Start, click Run, type cmd, and then click OK.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    How toThe Blogger Navbar To Hover Effect / Peek A Boo Effect



    This is quiet a popular post as many dont like the navbar, but it can be useful.The navbar has progressed over the years to include extra options such as bookmarking and of course has the quick links into your account.So how about a hover effect navbar ?.Basically the navbar will only appear when you place your cursor over the space were it sits.Take a look at the demo below and place your cursor over the area were the navbar should be.
    Removing navbar and setting peek-a-boo effect are not against blogger T.O.S.We set navbar to hover effect in three easy steps.
    Have Hover Effect Blogger Navbar

    Follow these simple steps.

    1.Select 'Design' then 'Edit Html' for your blog.

    2.Find this piece of code in your blogs html :

    ]]></b:skin>

    3.Add the code below just BEFORE ]]></b:skin>

        #navbar-iframe{opacity:0.0;filter:alpha(Opacity=0)}
        #navbar-iframe:hover{opacity:1.0;filter:alpha(Opacity=100, FinishedOpacity=100)}


    Click save template and that's it check out your blog with its new hover navbar.

    Just remove the code to set the navbar back to standard or to see how to remove it completely

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    How To Increase Readers To A New Blog

    I suppose there is no point in spicing up your blog if you get no visitors.Getting your blog noticed is not an easy task but there are steps you can take to give your blog a push in the right direction.

    Remember you need to keep posting to your blog, this is one of the most used phrases but 'content is king'.Try to publish a post once a day or at least five time a week if you are posting more than once a day try leave a gap between the posting times.

    Here is the list of Eight ways to get started :
    1. Submit your blog to search engines
    2. Click here to add your blog to Google Click here to add your blog to Bing
    3. Get a feedburner for your blog :
    4. Click here to see how
    5. Join and submit you blog to Blog Directories :
    6. I will cover Blog Directories in a later post for now here's a great post by Loren Baker on the subject :20 Essential Blog Directories to Submit Your Blog To
    7. Leave your link :
    8. Were ever you go on the Internet leave your link. When you Comment on other blogs,Forums etc.. leave a link to your blog. Don't spam when commenting if you don't leave proper relevant comments most will be deleted.
    9. Traffic Exchange
    10. If your willing to go the extra mile a resource rarely taken advantage of by bloggers is Traffic exchanges. This will automatically drive traffic to your blog. (Don't use traffic exchanges if your blog has AdSense it is against their T.O.S. and could get you banned)
    11. Press Release
    12. Why not create a free press Release. A Press release can get you a good result but only when you do it the right way. If you want to try press release, Click Here for an article on how to write a quality Press Release Here's a list of free press release Distribution Sites
    13. Tell your friends online on offline !
    14. Twitter-Facebook-Myspace-Bebo-Friendster there are so many social networks were you can connect with friends and let them know about your blog.Check these two posts to have your blog automatically connect with social networks : Feedburner ConnectTwitterfeed Connect
    15. Leave your blog link at the foot of all your Emails.
    16. If you like me send lots of funny Emails you can add your blog URL at the bottom of the Email.Most of these emails get sent on again and again and now a link to your blog is been sent with them. Most Email providers like Gmail have a setting to automatically leave a link at the bottom of all your Emails just check out your Email settings.

    These are just a short list of ideas and suggestions try to cover as many as you can.I have are more tips to help get visitors to your blog Search Engine Blog Tips.And keep posting make sure there is content there for people to see and remember only good content will bring them back.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    How to use your Pen Drive as RAM

    RAM (Random Access Memory) is the memory which computer uses to work on different processes. The more RAM you have, the faster the process is. Usually, these days the computers come with atleast 1 GB of RAM. But, that’s not enough to run some High Memory consuming softwares. Especially, the Games require a big amount of RAM to play smoothly. I have faced many problems with Games on my computer due to RAM. So, here I am going to show you how you can use your USB Pen Drive as RAM. The process explained below is for Windows 7 OS. For other, it might be slight different.

     Step 1: Go to Start followed by Control Panel.

    Step 2: Click on System and Security, then select System.

     Step 3: Now select Advanced system settings from the left side.

    Step 4: The dialog box will open in Advanced tab, click on Settings, then go to Advanced tab.

    Step 5: From there, you will see Virtual Memory, just click on Change…

    Step 6: In Windows 7, the box Automatically manage paging file size for all drives comes prechecked, so we have to uncheck it to perform the operation.

    Step 7: Now, from the local drives list, click on your Pen Drive letter, eg. H and set the Custom Size for it. If you have 4 GB Pen Drive, then enter 700 in Initial Size and 3072 in Maximum size and hit Set.


    Now, the computer will restart and everything is done ! 
    Enjoy it .

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    What is PC Case?

    Introduction

    The case (or chassis) of a computer is the metallic box which houses the various internal components. Cases also have other uses, such as blocking noise produced by the computer, and protection from electromagnetic radiation. There are norms for guaranteeing such protection in a manner compliant with existing regulation. 

    The main considerations when choosing a case are its form factor, its dimensions, how many drive slots it has, its power requirements, the connectors it has on the side, and finally its design and colour. Although the cases that housed the first PCs all looked alike, today cases come in all shapes; some are even transparent, so that users can "soup up" their computers, such as by installing neon lights inside (this is called "case modding.") 

    Power supply

    Most cases come with a power supply. The power supply provides electrical current to all of the computer's components. In the United States and Canada, power supplies deliver 110V current at 60 Hz, while in Europe the standard is 220V at a frequency of 50 Hz, which is why most computer power supplies have a switch so that you can choose the voltage.

    It is essential to make sure that the switch is in the correct position for the right voltage, so that there is no risk that the CPU components will deteriorate.
    The power supply must have enough power to provide electricity to all of the computer's devices.
    Close attention should also be paid to the amount of sound that the power supply makes.




    Form factor

    Form factor refers to the format of the motherboard slot, the kinds of connectors used, and how they are laid out. It determines which type of motherboard can be inserted in the case.

    Size

    The case's size affects how many slots are available for disk drives, as well as how many slots there are for internal hard drives. Cases are generally grouped by size as follows:
    • Big tower: This is a large case (60 to 70 cm high), with four to six 5"1/4 slots and two to three slots each 3"1/2 on the side, as well as two to three internal 3"1/2 slots.
    • Medium tower: This is a medium-sized case (40 to 50 cm high), with three to four 5"1/4 slots on the side and two internal 3"1/2 slots.
    • Mini-tower: This is a small case (35 to 40 cm in height), typically with three 5"1/4 slots and two 3"1/2 slots on the side, as well as two internal 3"1/2 slots
    • Barebone or mini-PC: This is the smallest kind of case (10 to 20 cm high). Most barebone PCs are pre-assembled computers built with a small form factor (SFF) motherboard. They generally have one or two 5"1/4 slots and one 3"1/2 slot on the side, as well as one internal 3"1/2 slot.

    Ventilation

    A case houses all of the computer's internal electronic components. Sometimes, a computer's electronics can reach very high temperatures. For this reason, you must choose a case with good ventilation, meaning that it has as many fans as possible, as well as air vents. It is recommended to choose a case which includes at least an air intake in front, a removable air filter, and an air outlet in the rear.

    Connections

    For obvious reasons involving ease of use, more and more cases are including a panel of connectors on the side. In order to work, these connectors must be hooked up internally to the motherboard.


    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    What is Motherboard?Part 3


    The processor socket

    The processor (also called the microprocessor) is the computer's brain. It runs programs using a set of instructions. The processor is characterised by its frequency, the rate at which it executes instructions. This means that an 800 MHz processor can carry out 800 million operations per second.
    The motherboard has a slot (sometimes several, for multi-processor motherboards) into which the processor is inserted, called the processor socket or slot.
    • Slot: A rectangular connector into which the processor is mounted vertically.
    • Socket: In addition to being the general term, it also refers more specifically to a square-shaped connector with many small connectors into which the processor is directly inserted.



    Within these two large families, there are different versions used, depending on the type of processor. Whatever slot or socket is used, it is essential that the processor be inserted gently, so that none of its pins are bent (it has hundreds of them). To make inserting them easier, a concept called ZIF (Zero Insertion Force) has been created. ZIF sockets have a small lever, which, when lifted, allows the processor to be inserted without applying any pressure, and when lowered, it holds the processor in place.
    The processor generally includes some sort of foolproof device, in the form of a notched corner or coloured markings, which must be aligned with the corresponding markings on the socket.

    Since the processor releases heat, it is necessary to dissipate it, to keep the circuits from melting. This is why it is generally mounted atop a heat sink (sometimes called a cooler or radiator), which is made of a metal which conducts heat well (copper or aluminium) in order to increase the microprocessor's heat transfer surface. The heat sink includes a base in contact with the processor and fins in order to increase the heat transfer surface. A fan generally accompanies the cooler in order to improve air circulation around it and to improve the heat transfer. The unit also includes a fan which vents hot air from the case and let fresh air come in from outside.

    RAM connectors

    RAM (Random Access Memory) is used to store data while the computer is running; however, its contents are wiped out as soon as the computer is switched off or restarted, as opposed to mass storage devices such as hard drives, which keep information safe even while turned off. This is why RAM is called "volatile."
    Why, then, is RAM used at all, when hard drives cost less per byte stored? The answer is that RAM is extremely fast when compared to mass storage devices like hard drives. It has a response time on the order of a few dozen nanoseconds (about 70 for DRAM, 60 for EDO RAM, and 10 for SDRAM; as little as 6 ns for DDR SDRAM) as opposed to a few milliseconds for a hard drive.
    RAM comes in the form of modules which plug into motherboard connectors.

    Expansion slots

    Expansion slots are compartments into which expansion cards can be inserted. These are cards which give the computer new features or increased performance. There are several types of slots:
    • ISA slots (Industry Standard Architecture): For inserting ISA slots. The slowest ones are 16-bit.
    • VLB slots (Vesa Local Bus): Bus formerly used for installing graphics cards.
    • PCI slot (Peripheral Component InterConnect): used for connecting PCI cards, which are much faster than ISA cards and run on 32 bits
    • AGP slot (Accelerated Graphic Port): A fast port for a graphics card.
    • PCI Express slot (Peripheral Component InterConnect Express): Faster bus architecture than AGP and PCI buses.
    • AMR slot (Audio Modem Riser): This type of slot is used for connecting mini-cards to PCs which are buit for it.
     

    the input-output connectors.

    The motherboard has a certain number of input/output sockets found on the rear panel.

    Most motherboards have the following connectors:
    • A serial port, for connecting old peripherals;
    • A parallel port, mainly for connecting old printers;
    • USB ports (1.1, low-speed, or 2.0, high-speed), for connecting more recent peripherals;
    • RJ45 connector (called LAN or ethernet port) used for connecting the computer to a network. It corresponds to a network card integrated into the motherboard;
    • VGA connector (called SUB-D15), for connecting a monitor. This connector interfaces with the built-in graphics card;
    • Audio plugs (Line-In, Line-Out and microphone), for connecting sound speakers or a hi-fi system, as well as a microphone. This connector interfaces with the built-in sound card;


    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    What is Motherboard?Part 2

    Integrated components

    The motherboard includes some on-board components, meaning that they are integrated into its printed circuitry:
    • The chipset, a circuit which controls the majority of resources (including the bus interface with the processor, cache memory and random-access memory, expansion cards, etc.)
    • The CMOS clock and battery,
    • The BIOS,
    • The system bus and the expansion bus.



    What's more, recent motherboards generally include a number of onboard multimedia and networking devices which can be disabled:
    • integrated network card;
    • integrated graphics card;
    • integrated sound card;
    • upgraded hard drive controllers.

    The chipset

    The chipset is an electronic circuit whose job is to coordinate data transfers between the various components of the computer (including the processor and memory). As the chipset is integrated into the motherboard, it is important to choose a motherboard which includes a recent chipset, in order to maximise the computer's upgradeability.
    Some chipsets may include a graphics or audio chip, which means that it is not necessary to install a graphics card or sound card. However, it is sometimes advised to disable them (whenever possible) in the BIOS setup and to install high-quality expansion cards in the appropriate slots.

    The CMOS clock and battery

    The real time clock (or RTC for short) is a circuit which synchronises system signals. It is made from a crystal which, as it vibrates, gives off pulses (called timer ticks) in order to keep the system elements running on the same time. The timer frequency (expressed in MHz) the number of times the crystal vibrates each second, i.e. the number of timer ticks per second. The higher the frequency, the more information the system can process.
    When the computer is turned off, the power supply stops providing electricity to the motherboard. When the computer is turned on again, the system is still on the right time. An electronic circuit, called the CMOS (Complementary Metal-Oxyde Semiconductor, sometimes called the BIOS CMOS), saves some system information, such as the time, the system date, and a few essential system settings.
    The CMOS is kept powered by a battery (a button battery), or a battery located on the motherboard. Information on the hardware installed in the computer (such as the number of tracks or sectors on each hard drive) are stored in the CMOS. As the CMOS is a form of slow storage, certain systems sometimes recopy the CMOS's content into the RAM (fast storage); the term "memory shadow" is used to describe this process of copying the data into RAM.
    The "complementary metal-oxide semiconductor" is a transistor manufacturing technology, the latest in a long line which includes the TTL ("Transistor-transistor-logic"), the TTLS (TTL Schottky) (faster), or the NMOS (negative channel) and PMOS (positive channel).
    The CMOS allows many complementary channels to run on a single chip. Compared with TTL or TTLS, CMOS is much slower, but it consumes far less energy, which is why it is used in computer clocks, which run on batteries. The term CMOS is sometimes incorrectly used to refer to computer clocks.
    When the system time keeps getting reset, or the clock runs late, all that is usually necessary is to change the battery.

    The BIOS

    The BIOS (Basic Input/Output System) is the basic program used as an interface between the operating system and the motherboard. The BIOS is stored in ROM (read-only memory, which can not be rewritten), so it uses data contained within the CMOS to find out what the system's hardware configuration is.
    The BIOS can be configured using an interface (named the BIOS setup), which can be accessed when the computer is booting just be pressing a key (usually the DEL key. In reality, the BIOS setup is only used as an interface for configuration; the data is stored in the CMOS. For more information, check your motherboard's manual.)

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    What is Motherboard?Part 1



    Motherboard - HauptPlatineCarte mère

    Introduction to motherboards

    The primary component of a computer is the motherboard (sometimes called the "mainboard"). The motherboard is the hub which is used to connect all of the computer's essential components.
     


    As its name suggests, the motherboard acts as a "parent" board, which takes the form of a large printed circuit with connectors for expansion cards, memory modules, the processor, etc.

    Characteristics

    There are several ways in which a motherboard can be characterised, in particular the following:
    • the form factor,
    • the chipset,
    • the type of processor socket used,
    • the input-output connectors.

    Motherboard form factor

    The term "form factor" is normally used to refer to the motherboard's geometry, dimensions, arrangement, and electrical requirements. In order to build motherboards which can be used in different brands of cases, a few standards have been developed:
    • AT baby/AT full format is a format used in the earliest 386 and 486 PCs. This format was replaced by the ATX format, which shape allowed for better air circulation and made it easier to access the components;
    • ATX: The ATX format is an upgrade to Baby-AT. It was intended to improve ease of use. The connection device on an ATX motherboard is designed to make plugging in peripherals as easy as possible (for example, the IDE connectors are located beside the disks.) What's more, motherboard components are arranged in parallel, so as to improve heat removal.
      • ATX standard: The ATX standard format is traditionally 305x244 mm. It includes an AGP connector and 6 PCI connectors.
      • micro-ATX: The microATX format is an upgrade to ATX, which has the same primary advantages in a smaller format (244x244 mm), with a lower cost. Micro-ATX includes an AGP connector and 3 PCI connectors.
      • Flex-ATX: FlexATX is an expansion of microATX which offers manufacturers greater flexibility when designing their computers. It includes an AGP connector and 2 PCI connectors.
      • mini-ATX: miniATX is a compact alternative to the format microATX (284x208 mm), and includes an AGP connector and 4 PCI connectors instead of 3 that come with microATX. It is mainly intended for mini-PCs (barebone computers).
    • BTX: The BTX format (Balanced Technology eXtended), supported by Intel, is a format designed to improve upon the arrangement of components, so as to optimise air circulation, acoustics, and heat dissipation. The various connectors (memory slots, expansion slots) are aligned in parallel, in the direction in which air circulates. Additionally, the microprocessor is located in the front end of the case, by the air intake, where the air is freshest. The BTX power cord is the same as with ATX power supplies. The BTX standard defines three formats:
      • BTX standard, with standard dimensions of 325x267 mm;
      • micro-BTX, with small dimensions (264x267 mm);
      • pico-BTX, with much smaller dimensions (203x267 mm).
    • ITX: The ITX format (Information Technology eXtended), supported by Via, is an extremely compact format designed for miniature configurations such as mini-PC. There are two major ITX formats:
      • mini-ITX, with small dimensions (170x170 mm) and a PCI slot;
      • nano-ITX, with extremely small dimensions (120x120 mm) and a miniPCI slot. For this reason, the choice of the motherboard (and its form factor) depends on which case is chosen. The table below summarises the characteristics of the various form factors.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    All about Processor . Part 3


    Integrated Circuits

    Once combined, transistors can make logic circuits, that, when combined, form processors. The first integrated circuit dates back to 1958 and was built by Texas Instruments.
    MOS transistors are therefore made of slices of silicone (called wafers) obtained after multiple processes. These slices of silicone are cut into rectangular elements to form a "circuit". Circuits are then placed in cases with input-output connectors and the sum of these parts makes an "integrated circuit". The minuteness of the engraving, written in microns (micrometers, written µm) defines the number of transistors per surface unit. There can be millions of transistors on one single processor.
    Moore's Law, penned in 1965 by Gordon E. Moore, cofounder of Intel, predicted that processor performance (by extension of the number of transistors integrated in the silicone) would double every twelve months. This law was revised in 1975, bringing the number of months to 18. Moore’s Law is still being proven today.
    Because the rectangular case contains input-output pins that resemble legs, the term "electronic flea" is used in French to refer to integrated circuits.

    Families

    Each type of processor has its own instruction set. Processors are grouped into the following families, according to their unique instruction sets:
    • 80x86: the "x" represents the family. Mention is therefore made to 386, 486, 586, 686, etc.
    • ARM
    • IA-64
    • MIPS
    • Motorola 6800
    • PowerPC
    • SPARC
    • ...



    This explains why a program produced for a certain type of processor can only work directly on a system with another type of processor if there is instruction translation, called emulation. The term "emulator" is used to refer to the program performing this translation.

    Instruction Set

    An instruction set is the sum of basic operations that a processor can accomplish. A processor’s instruction set is a determining factor in its architecture, even though the same architecture can lead to different implementations by different manufacturers.
    The processor works efficiently thanks to a limited number of instructions, hardwired to the electronic circuits. Most operations can be performed using basic functions. Some architecture does, however, include advanced processor functions.

    CISC Architecture

    CISC (Complex Instruction Set Computer) architecture means hardwiring the processor with complex instructions that are difficult to create using basic instructions.
    CISC is especially popular in 80x86 type processors. This type of architecture has an elevated cost because of advanced functions printed on the silicone.
    Instructions are of variable length and may sometimes require more than one clock cycle. Because CISC-based processors can only process one instruction at a time, the processing time is a function of the size of the instruction.

    RISC Architecture

    Processors with RISC (Reduced Instruction Set Computer) technology do not have hardwired, advanced functions.
    Programs must therefore be translated into simple instructions which complicates development and/or requires a more powerful processor. Such architecture has a reduced production cost compared to CISC processors. In addition, instructions, simple in nature, are executed in just one clock cycle, which speeds up program execution when compared to CISC processors. Finally, these processors can handle multiple instructions simultaneously by processing them in parallel.

    Technological Improvements

    Throughout time, microprocessor manufacturers (called founders) have developed a certain number of improvements that optimize processor performance.

    Parallel Processing

    Parallel processing consists of simultaneously executing instructions from the same program on different processors. This involves dividing a program into multiple processes handled in parallel in order to reduce execution time.
    This type of technology, however, requires synchronization and communication between the various processes, like the division of tasks in a business: work is divided into small discrete processes which are then handled by different departments. The operation of an enterprise may be greatly affected when communication between the services does not work correctly.

    Pipelining

    Pipelining is technology that improves instruction execution speed by putting the steps into parallel.
    To understand the pipeline’s mechanism, it is first necessary to understand the execution phases of an instruction. Execution phases of an instruction for a processor with a 5-step "classic" pipeline are as follows:
    • FETCH: (retrieves the instruction from the cache;
    • DECODE: decodes the instruction and looks for operands (register or immediate values);
    • EXECUTE: performs the instruction (for example, if it is an ADD instruction, addition is performed, if it is a SUB instruction, subtraction is performed, etc.);
    • MEMORY: accesses the memory, and writes data or retrieves data from it;
    • WRITE BACK (retire): records the calculated value in a register.



    Instructions are organized into lines in the memory and are loaded one after the other.
    Thanks to the pipeline, instruction processing requires no more than the five preceding steps. Because the order of the steps is invariable (FETCH, DECODE, EXECUTE, MEMORY, WRITE BACK), it is possible to create specialized circuits in the processor for each one.
    The goal of the pipeline is to perform each step in parallel with the preceding and following steps, meaning reading an instruction (FETCH) while the previous step is being read (DECODE), while the step before that is being executed (EXECUTE), while the step before that is being written to the memory (MEMORY), and while the first step in the series is being recorded in a register (WRITE BACK). 

    In general, 1 to 2 clock cycles (rarely more) for each pipeline step or a maximum of 10 clock cycles per instruction should be planned for. For two instructions, a maximum of 12 clock cycles are necessary (10+2=12 instead of 10*2=20) because the preceding instruction was already in the pipeline. Both instructions are therefore being simultaneously processed, but with a delay of 1 or 2 clock cycles. For 3 instructions, 14 clock cycles are required, etc.

    The principle of a pipeline may be compared to a car assembly line. The car moves from one workstation to another by following the assembly line and is completely finished by the time it leaves the factory. To completely understand the principle, the assembly line must be looked at as a whole, and not vehicle by vehicle. Three hours are required to produce each vehicle, but one is produced every minute!

    It must be noted that there are many different types of pipelines, varying from 2 to 40 steps, but the principle remains the same.
    Superscaling

    Superscaling consists of placing multiple processing units in parallel in order to process multiple instructions per cycle.
    HyperThreading

    HyperThreading (written HT) technology consists of placing two logic processors with a physical processor. Thus, the system recognizes two physical processors and behaves like a multitasking system by sending two simultaneous threads, referred to as SMT (Simultaneous Multi Threading). This "deception" allows processor resources to be better employed by guaranteeing the bulk shipment of data to the processor.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS