Search

Custom Search

Click Here

Thursday, June 26, 2008

Software Download

Software Downloads

Multimedia
http://www.getnidok idos.com/ category/ software/ multimedia


Cole2k Media Codec Pack Advanced 7.1
http://www.getnidok idos.com/ software/ cole2k-media- codec-pack- advanced- 71/103/

License: FreeRequirements: Windows 2000/XP/2003 Server/VistaLimitations: No limitationsThe Cole2k Media Advanced Codec Pack features a collection of codecs and filters for encoding/decoding a large variety of video/audio formats. Support for formats includes DivX 6.8.2 Pro, DivX Media, XviD, 3ivx, MP4, h.264, x264, AVC, Nero Digital, MPEG-2, AC3, DTS, AAC, APE, FLAC, MPC, OFR, TTA, OGG, Vorbis, WavPack, MP3, and ATRAC3 + many more. Support for container files includes MP4, MKV, OGM. Version 7.1 adds updated DivX, ffdshow, and Haali.

Note: The DivX 6.8.2 Pro encoder has a trial period limited to 15 days, after the trial period the encoder will switch to standard mode (completely optional).

http://www.getnidok idos.com/ software/ multimedia/ xilisoft- video-converter- 31530530b/ 358/

Xilisoft Video Converter is a powerful video conversion tool.
Xilisoft Video Converter can convert video files between various formats including DVD, MPEG-1/2/4, VCD, AVI, SVCD, MOV, RM, WMV, 3GP etc.
In addition, the software provides a power way to convert video formats to all popular audio formats, including MP2, MP3, AC3, RA, M4A, etc. supports multithreading, you can convert some files at the same time, all conversion processes are very easy and fast.
When converting files, you can pause, stop and continue at any moment. You can select the default setup or you yourself select the video and audio codec, setup the parameters of output.
Here are some key features of “Xilisoft

Video Converter”:

· Xilisoft Video Converter supports h264 format encoding/decoding, APE and CUE decoding, audio CD ripping, and a wizard was added etc.· It supports converting to iPod and PSP.· It supports PSP MPEG4 AVC encoding/decoding.· All properties and settings are displayed in the interface. Users can see the file properties and settings without opening another window. All settings can be easily set in the interface or keep them default.· All encoders/codecs are built-in. The software integrates with all video/audio encoders/codecs. Users can convert all supported formats once download the program.· Xilisoft Video Converter supports multi-language, such as English, Chinese, and Japanese. You can choose what language you like when using it.· It supports batch conversion. You can select all files you want to convert and Xilisoft Video Converter will automatically encode them one by one even if these files use different settings.· It Supports preview. Users can choose to preview the input files before conversion.· It can convert any clip or segment. You can convert any clip or segment by setting the start point and duration at will.
Requirements:
· Intel Pentium II 350MHz or above, or any Athlon· 64 MB RAM or above

click on the here to go to download page

Excel Calendar

Excel Calendar Template 1.4


http://www.nidokidos.org/excel-calendar-template-1-4-t17407.html

License:Free # Downloads: 1,030,856 # Requirements: Windows 95/98/Me/NT/2000/XP, Microsoft Excel # Limitations: No limitations This free Excel calendar template allows you to quickly and easily create and print a monthly calendar by simply choosing a year and month. You can also choose a color scheme for your calendar using simple form controls. Use the ready-made 2007, 2008, 2009, and 2010 calendar workbooks for adding events and holidays, planning, printing, and scheduling. Version 1.4 features new and improved calendar format, mini-calendars, and a Monday-first option; includes ready-made 12-month calendar workbooks for 2007, 2008, and 2009.

click on the here to go to download page

http://www.nidokidos.org/excel-calendar-template-1-4-t17407.html

Beware of Ctrl+C

Beware of Ctrl+C

Ctrl+C may be the most important work we do everyday. But it's not a very safe thing to do. Read on to know why. What happens when you press Ctrl+C while you are Online... We do copy various data by Ctrl + C for pasting elsewhere.

This copied data is stored in clipboard and is accessible from the net by a combination of java-scripts and ASP.

Just try this:
1) Copy any text by Ctrl + C
2) Click the Link: http://www.sourceco desworld. com/special/ clipboard. asp
3) You will see the text you copied was accessed by this web page.

Do not keep sensitive data (like passwords, credit card numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information.

Friday, June 20, 2008

Thursday, June 12, 2008

Wireless networking

Wireless networking
Wireless networks are based on the IEEE 802.11 standards. A basic wireless network consists of multiple stations communicating with radios that broadcast in either the 2.4GHz or 5GHz band (though this varies according to the locale and is also changing to enable communication in the 2.3Ghz and 4.9Ghz ranges).
802.11 networks are organized in two ways: in a BSS one station acts as a master with all the other stations associating to it; this is termed infrastructure mode and the master station is termed an access point (AP). In BSS mode all communication passes through the AP; even when one station wants to communicate with another wireless station messages must go through the AP. In the second form of network there is no master and stations communicate directly. This form of network is termed an IBSS and is commonly know as an adhoc network.
802.11 networks were first created in the 2.4GHz band using protocols defined by the IEEE 802.11b standard. These specifications include the operating frequencies, MAC layer characteristics including framing and transmission rates (communication can be done at various rates). Later the 802.11a standard defined operation in the 5GHz band, including different signalling mechanisms and higher transmission rates. Still later the 802.11g standard was defined to enable use of 802.11a signalling and transmission mechanisms in the 2.4GHz band in such a way as to be backwards compatible with 802.11b networks.

Separate from the underlying transmission techniques 802.11 networks have a variety of security mechanisms. The original 802.11 specifications defined a simple security protocol called WEP. This protocol uses a fixed pre-shared key and the RC4 cryptographic cipher to encode data transmitted on a network. Stations must all agree on the identity of the fixed key in order to communmicate. This scheme was shown to be easily broken and is now rarely used except to discourage transient users from joining networks. Current security practice is given by the IEEE 802.11i specification which defines new cryptographic ciphers and an additional protocol to authenticate stations to an access point and exchange keys for doing data communication. Further, cryptographic keys are periodically refreshed and there are mechanisms for detecting intrusion attempts (and for countering intrusion attempts). Another security protocol specification commonly used in wireless networks is termed WPA. This was a precursor to 802.11i defined by an industry group as an interim measure while waiting for 802.11i to be ratified. WPA specifies a subset of the requirements found in 802.11i and is designed for implementation on legacy hardware. Specifically WPA defines the TKIP protocol that is derived from the original WEP protocol. 802.11i permits use of TKIP but most stations will instead use the AES cipher for encrypting data; a cipher that is too computationally costly to be implemented on legacy hardware.
Other than the above protocol standards the other important standard to be aware of is 802.11e. This defines protocols for deploying multi-media applications such as streaming video and voice over IP (VoIP) in an 802.11 network. Like 802.11i, 802.11e also has a precursor specification termed WME (and now WMM) that has been defined by an industry group as a subset of 802.11e that can be implemented now to enable multi-media applications while waiting for the final ratification of 802.11e. The most important thing to understand about 802.11e and WME/WMM is that it enables prioritized traffic use of a wireless network through Quality of Service (QoS) protocols and enhanced media access protocols. Proper implementation of these protocols enable high speed bursting of data and prioritized traffic flow.
FreeBSD 6.0 supports networks that operate using 802.11a, 80.211b, and 802.11g. The WPA and 802.11i security protocols are likewise supported (in conjunction with any of 11a, 11b, and 11g) and QoS and traffic prioritization required by the WME/WMM protocols are supported for a limited set of wireless devices.
Basic setup
To use wireless networking you need a wireless networking card and to configure the kernel with the appropriate wireless networking support. The latter is separated into multiple modules so that you need only configure the software you are actually going to use.
The first thing you need is a wireless device. The most commonly used devices are those that use parts made by Atheros. These devices are supported by the ath driver and require the following modules:
device ath # Atheros IEEE 802.11 wireless network driver
device ath_hal # Atheros Hardware Access Layer
device ath_rate_sample # John Bicket's SampleRate control algorithm.
The Atheros driver is split up into three separate pieces: the driver proper (ath), the hardware support layer that handles chip-specific functions (ath_hal), and an algorithm for selecting which of several possible rates for transmitting frames (ath_rate_sample here). If instead of an Atheros device you had another device you would select the module for that device; e.g.
device wi

for devices based on the Intersil Prism parts.
With a device driver configured you need to also bring in the 802.11 networking support required by the driver. For the ath driver this is at least the wlan module:
device wlan # 802.11 support (Required)
Past this you will need the modules that implement cryptographic suport for the security protocols you intend to use. These are intended to be dynanmically loaded on demand by the wlan module but for now they must be statically configured. The following modules are available:
device wlan_wep # WEP crypto support for 802.11 devices
device wlan_ccmp # AES-CCMP crypto support for 802.11 devices
device wlan_tkip # TKIP and Michael crypto support for 802.11 devices
wlan_ccmp and wlan_tkip are only needed if you intend to use the WPA and/or 802.11i security protocols. If your network is to run totally open (i.e. with no encryption) then you don't even need the wlan_wep support.
Aside from the above modules there are two other modules that are needed only if you intend to operate an access point (AP) and plan to enable WPA/802.11i/802.1x. The wlan_xauth module is used to construct an authenticator based on the hostapd program; it delegates authentication requests for stations associating to an access point to an external agent (hostapd in this case). The wlan_acl module implements an access control mechanism whereby an AP can restrict the stations that associate based on their MAC address. Like WEP this is provided to discourage casual users from joining a network; in practice it provides little true security to a wireless network. In summary you might add one or both of the following to your configuration if you plan to build an access point:
device wlan_xauth # External authenticator support for 802.11 devices
device wlan_acl # MAC-based ACL support for 802.11 devices
With this information in the kernel configuration file, recompile the kernel and reboot your FreeBSD box (or load the modules using kldload in which case there is no need to reboot).

Bluetooth Technology

Bluetooth Technology

"Automatic communication between various devices within a small area in a house or an office makes it possible to provide unique and innovative services to a professional worker or a small group of workers using portable devices. Bluetooth technology has this potential and is coming along fast and quick. It will replace clumsy wires, make information transfer automatic without synchronization cradles and introduce many new applications. Technology visionaries hope that it will do what infra red could not do over the past six years." - Editor


In an attempt to standardize data transfer and synchronization between disparate mobile devices in the short-distance range, Intel and Microsoft established in 1998 a major industry consortium that included IBM, Toshiba, Ericsson, Nokia, and Puma Technology. Code-named Blue Tooth for the 10th century Danish king who unified Denmark, the companies have created a single synchronization protocol to address end-user problems arising from the proliferation of various mobile devices -- including smart phones, smart pagers, PDAs, handheld PCs, copiers, printers, notebooks, and many future digital appliances at home -- that need to keep data consistent from one device to another. The proposed Bluetooth solutions (hardware and software-based) would automatically synchronize mobile devices when end-users enter their offices or home. Intel and others are designing the sending and receiving radio frequency chip sets. Price point for hardware is in $5-20 range eventually.
Since the start of this initiative in 1998, interest in Bluetooth has grown tremendously - signified by 1800 members of Bluetooth consortium by mid 2000.
While Bluetooth consortium demonstrated prototype products in the 1999-2000, there are no production-quality enduser products using blue tooth technology as of now, as far as we know. Component products (radios and chips) that can be integrated into finished products have started becoming available from Ericsson and others. However, here is an opportunity for more start-up companies. irDA is a competing technology and has been implemented in many products for over 6-7 years now but BlueTooth has a few distinct advantages - with Ericsson/Microsoft/Intel team behind it. In our opinion, there are relative benefits with several competing technologies - there is some overlap too. Let competitive products thrive so that we the users get the best solutions.

What is Bluetooth?

"Think of a connected world of electronic devices and appliances around you! You click on an icon for a device and you are linked to it, automatically and transparently"
Bluetooth technology eliminates the need for numerous and inconvenient cable attachments for connecting fixed computers, mobile phones, mobile computers, handheld devices, digital cameras and even new breed of digital appliances. It will enable users to connect a wide range of computing and telecommunications devices easily and simply, without the need to buy, carry, or connect cables - quite often proprietary to a specific device. It delivers opportunities for rapid ad hoc connections, and the possibility of automatic, unconscious, connections between devices. It creates the possibility of using mobile data in a variety of applications.
Bluetooth makes wireless communication and networking between devices in a small localized area of a room or a small office as easy as switching on the light. In Bluetooth all the connections between devices are instantaneous and invisible and the devices can talk even if they are not in line of sight because Bluetooth utilizes a radio-based link. Your laptop could send information to a printer in the next room, or your microwave could send a message to your mobile phone telling you that your meal is ready.
Bluetooth is actually a standard for wireless communications between devices in a personal area network (PAN) using radio frequency for a short range (around 10 meters). So any two devices that follow the standard can communicate and exchange data between each other without the need of any connection to be made between them. A group of Bluetooth devices like a mobile phone, a digital camera, a hand held device etc. can instantly form a network with each other as soon as they are switched on. You could have a mobile phone in your pocket and you could be sending e-mails using your laptop without making any connection between your laptop and the mobile. Your refrigerator could be placing an order with the supermarket if your milk supply has been exhausted using your mobile phone.
Briefly, Bluetooth technology

uses radio waves in 2.4 GHz band - therefore, no line of sight is required
supports multipoint, not just point to point
works in a small confined area - 10 to 15 meters apart
is able to support speeds of 1-2 Mbps today but will offer higher speeds in future
chip sets are relatively inexpensive (though more expensive than IrDA)- $10 to $20 today in large quantities - will go down in future
has significant industry support with over 1800 members in the industry consortium

How Bluetooth Technology Works

"Connective convenience"

Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment together with little or no work by the user. Unlike infra-red, Bluetooth does not require line-of-sight positioning of connected units. The technology uses modifications of existing wireless LAN techniques but is most notable for its small size and low cost. The current prototype circuits are contained on a circuit board 0.9cm square, with a much smaller single chip version in development. The cost of the device is expected to fall very fast, from $20 initially to $5 in a year or two. It is envisioned that Bluetooth will be included within equipment rather than being an optional extra. When one Bluetooth product comes within range of another, (this can be set to between 10cm and 100m) they automatically exchange address and capability details. They can then establish a 1 megabit/s link (up to 2 Mbps in the second generation of the technology) with security and error correction, to use as required. The protocols will handle both voice and data, with a very flexible network topography.

This technology achieves its goal by embedding tiny, inexpensive, short-range transceivers into the electronic devices that are available today. The radio operates on the globally-available unlicensed radio band, 2.45 GHz (meaning there will be no hindrance for international travelers using Bluetooth-enabled equipment.), and supports data speeds of up to 721 Kbps, as well as three voice channels. The bluetooth modules can be either built into electronic devices or used as an adaptor. For instance in a PC they can be built in as a PC card or externally attached via the USB port.



Each device has a unique 48-bit address from the IEEE 802 standard. Connections can be point-to-point or multipoint. The maximum range is 10 meters but can be extended to 100 meters by increasing the power. Bluetooth devices are protected from radio interference by changing their frequencies arbitrarily upto a maximum of 1600 times a second, a technique known as frequency hopping. They also use three different but complimentary error correction schemes. Built-in encryption and verification is provided.
Moreover, Bluetooth devices won't drain precious battery life. The Bluetooth specification targets power consumption of the device from a "hold" mode consuming 30 micro amps to the active transmitting range of 8-30 milliamps (or less than 1/10th of a watt). The radio chip consumers only 0.3mA in standby mode, which is less than 3 % of the power used by a standard mobile phone. The chips also have excellent power-saving features, as they will automatically shift to a low-power mode as soon as traffic volume lessens or stops.
Bluetooth devices are classified according to three different power classes, as shown in the following table.
Power Class Maximum Output Power
1 100 mW (20 dBm)
2 2.5 mW (4 dBm)
3 1 mW (0 dBm)
But beyond untethering devices by replacing the cables, Bluetooth radio technology provides a universal bridge to existing data networks, a peripheral interface, and a mechanism to form small private ad hoc groupings of connected devices away from fixed network infrastructures. Designed to operate in a noisy radio frequency environment, the Bluetooth radio uses a fast acknowledgment and frequency hopping scheme to make the link robust. Bluetooth radio modules avoid interference from other signals by hopping to a new frequency after transmitting or receiving a packet. Compared with other systems operating in the same frequency band, the Bluetooth radio typically hops faster and uses shorter packets. This makes the Bluetooth radio more robust than other systems. Short packages and fast hopping also limit the impact of domestic and professional microwave ovens. Use of Forward Error Correction (FEC) limits the impact of random noise on long-distance links. The encoding is optimized for an uncoordinated environment.


Bluetooth guarantees security at the bit level. Authentication is controlled by the user by using a 128 bit key. Radio signals can be coded with 8 bits or anything upto 128 bits. The Bluetooth radio transmissions will conform to the safety standards required by the countries where the technology will be used with respect to the affects of radio transmissions on the human body. Emissions from Bluetooth enabled devices will be no greater than emissions from industry-standard cordless phones. The Bluetooth module will not interfere or cause harm to public or private telecommunications network.


The Bluetooth baseband protocol is a combination of circuit and packet switching. Slots can be reserved for synchronous packets. Each packet is transmitted in a different hop frequency. A packet nominally covers a single slot, but can be extended to cover up to five slots. Bluetooth can support an asynchronous data channel, up to three simultaneous synchronous voice channels, or a channel, which simultaneously supports asynchronous data and synchronous voice. It is thus possible to transfer the date asynchronously whilst at the same time talking synchronously at the same time. Each voice channel supports 64 kb/s synchronous (voice) link. The asynchronous channel can support an asymmetric link of maximally 721 kb/s in either direction while permitting 57.6 kb/s in the return direction, or a 432.6 kb/s symmetric link.

Modes of operation

An interesting aspect of the technology is the instant formation of networks once the bluetooth devices come in range to each other. A piconet is a collection of devices connected via Bluetooth technology in an ad hoc fashion. A Piconet can be a simple connection between two devices or more than two devices. Multiple independent and non-synchronized piconets can form a scatternet. Any of the devices in a piconet can also be a member of another by means of time multiplexing. i.e a device can be a part of more than one piconet by suitably sharing the time. The Bluetooth system supports both point-to-point and point-to-multi-point connections. When a device is connected to another device it is a point to point connection. If it is connected to more that one (upto 7 ) it is a point to multipoint connection. Several piconets can be established and linked together ad hoc, where each piconet is identified by a different frequency hopping sequence. All users participating on the same piconet are synchronized to this hopping sequence. If a device is connected to more than one piconet it communicates in each piconet using a different hopping sequence. A piconet starts with two connected devices, such as a portable PC and cellular phone, and may grow to eight connected devices. All Bluetooth devices are peer units and have identical implementations. However, when establishing a piconet, one unit will act as a master and the other(s) as slave(s) for the duration of the piconet connection. In a piconet there is a master unit whose clock and hopping sequence are used to synchronize all other devices in the piconet. All the other devices in a piconet that are not the master are slave units. A 3-bit MAC address is used to distinguish between units participating in the piconet. Devices synchronized to a piconet can enter power-saving modes called Sniff and hold mode, in which device activity is lowered. Also there can be parked units which are synchronized but do not have a MAC addresses. These parked units have a 8 bit address, therefore there can be a maximum of 256 parked devices.


Voice channels use either a 64 kbps log PCM or the Continuous Variable Slope Delta Modulation (CVSD) voice coding scheme, and never retransmit voice packets. The voice quality on the line interface should be better than or equal to the 64 kbps log PCM. The CVSD method was chosen for its robustness in handling dropped and damaged voice samples. Rising interference levels are experienced as increased background noise: even at bit error rates up 4%, the CVSD coded voice is quite audible.