Huge collection of Quotes on diff. occasions now here
The wondrous feeling of being in love, they say, cannot be expressed in words alone. But this hasn't stopped us from trying. Oceans of ink have been spilled in hopes of capturing love in all its many forms. We offer you this sampling of our favorite attempts. Wonderful quotes on Love relasionships, god about different occasions n lots more......
Love is like quicksilver in the hand. Leave the fingers open and it stays. Clutch it, and it darts away.
--Attributed to Dorothy Parker (1893 - 1967), U.S. writer and wit.
HELENA: Love looks not with the eyes, but with the mind;
And therefore is wing'd Cupid painted blind.
--William Shakespeare (1564 - 1616), English poet and playwright. From A Midsummer Night's Dream, Act 1, Scene 1.
Download free high resolution wallpapers now
You can download any of these beautiful backgrounds, scenery , cities , landscapes , nature , macros by clicking the wallpaper thumbnail images.
They are all high resolution n hihg pixel Wallpapers and will also fit your wide screen Laptops or dual screen computer monitors. Will even make a perfect amazing look to ur desktop.
think differently .. , at santhosharisan
Before going into the pros and cons of having a forum on a site let's first explain what forums actually are. Most of you are familiar with them but mightn't have heard the term 'forum' before. Well forums are just another name for discussion boards, message boards and other names. They enable users of a website to interact with each other by exchanging tips and discussing hot topics related to a websites theme.
Forums save information posted on a particular topic for other people to see at any time, this creates a discussion environment. Everything that gets posted gets read again and again. The fact that the discussion isn't real time means that it rarely turns into heated arguments as people are given time to research and consider their comments before replying, this makes for mostly high-quality discussion.
Forums allow you to create robust online communities even with low traffic volumes since people often return to the site on a regular basis to catch up on whats happened since then.
hacking tricks at arisanhacks
Bad Hacker, Good Hacker
Good hackers go to heaven, bad hackers go everywhere. But who are these hackers and what is so bad or so good about them? What do they do? Where do they go? Trying to answer these questions raises even more. Consider the following recent incidences.
The Code Red Worm started its attack around July 13th, burrowing into a known “hole” or “vulnerability” in the web-server software from Microsoft (called IIS). The worm compromised the servers and defaced web sites by replacing the contents with a page that proclaimed “Hacked by Chinese”. Code Red not only defaced web sites, but also injected programs into the compromised servers that started attacking the US President’s web site, using a “Distributed Denial of Service” (or DDoS) attack. The DDoS attack is a particularly heinous gimmick that uses hundreds of thousands of compromised computers to simultaneously send a flood of spurious messages to a particular web site. This flood causes the computers at the attacked site to get bogged down, and unable to function normally. Again on August 1st, the worm reappeared and caused plenty of woes.
let us discuss about file formats !!
A file format is a particular way to encode information for storage in a computer file
Since a disc drives, or indeed any computer storage, can store only bits, the computer must have some way of converting information to 0s and 1s and vice-versa. There are different kinds of formats for different kinds of information. Within any format type, e.g., word processor documents, there will typically be several different formats. Sometimes these formats compete with each other.
Generality Some file formats are designed to store very particular sorts of data: the JPEG format, for example, is designed only to store static photographic images. Other file formats, however, are designed for storage of several different types of data: the GIF format supports storage of both still images and simple animations, and the QuickTime format can act as a container for many different types of multimedia. A text file is simply one that stores any text, in a format such as ASCII or UTF-8, with few if any control characters. Some file formats, such as HTML, or the source code of some particular programming language, are in fact also text files, but adhere to more specific rules which allow them to be used for specific purposes.
It is sometimes possible to cause a program to read a file encoded in one format as if it were encoded in another format. For example, one can play a Microsoft Word document as if it were a song by using a music-playing program that deals in "headerless" audio files. The result does not sound very musical, however. This is so because a sensible arrangement of bits in one format is almost always nonsensical in another.
how the windows stores configurations ??!!
in .ini file or in Registry ??
Windows has long used text-based configuration files to store setting information for itself, as well as for applications programs you have installed on your computer. These configuration files are better known as INI files; typical examples include WIN.INI and SYSTEM.INI, used in Windows 3.1- as well as many Windows 95-based systems. The WIN.INI file, for instance, contains user-selectable functions, such as the current printer, and whether to use wallpaper or a pattern for the desktop.
Windows 95 (and Windows NT) does not rely on INI files as much as Windows 3.1 did, and instead uses something called the Registry for storing system and application setting information. Though Windows 95 does not make heavy use of INI files, the operating system still supports them. Windows (3.1, 95, and NT) provides a handful of special built-in functions for writing and retrieving information in INI files.
Interested to know how Jpeg was encrypted !!!
Hiding the content of a message when it enters an insecure channel should be common practice. Unfortunately none of the audio-visual compression standards includes any mechanism to convert part of the bitstream into ciphertext prior to transmission.
The encryption process requires an encryption algorithm and a key. The process of recovering plaintext from ciphertext is called decryption. The accepted view amongst cryptographers is that the encryption algorithm should be published, whereas the key must be kept secret (KERKHOFF's law). In practice, the distribution of keys is difficult since keys should be exchanged only when a trusted channel has been established. Furthermore for real-time video systems there are other issues to be addressed: speed, compression efficiency, and flexibility.