Tuesday, June 23, 2009

computer technology and devices








do you know that we can control the computer with our brain it is very simple with help of technology we are now able to controle the computer with help of our brain
and the product which is used to do all this task for us is available by many vendor online
we can get this type of device from the amazon as well as from the other online stores and
any of you is interested in
playing games with the help of yor brain we must buy it

A CPU gets its name because it is central to a computer's operation in its role of either executing or controlling all data transfer and processing; it processes data and it is a single self-contained chip or unit. The CPU's speed and performance are directly related to a PC's ability to do its work, making it by far the most vital of computer components. The question of how microprocessors do the things they do might never occur to some, and to others it might seem slightly akin to psychoanalyzing a genie that has just granted them three wishes. To be sure, the technology under a microprocessor's hood is complex and highly sophisticated, but with an understanding of a few main components, figuring out how they work is easier than it would seem. Do The Math. Before delving into the microprocessor's intricacies, it is important to form a basic understanding of how it "thinks." Whereas humans use letters, words, and a number system that includes 10 digits (0 through 9) to communicate ideas and thoughts, at the most basic level computers can only understand two digits, 0 and 1. This base-two math system is known as binary, and even the 1s and 0s are merely our translation of the values the computer understands. To a computer, 1 and 0 represent either yes or no, true or false, and are created by sending electronic pulses that either pass through a transistor (please see the "Bringing It All Together" section later in this story) to indicate "yes" or "1" or are impeded to indicate "no" or "0." Every instruction a microprocessor receives, whether programmed permanently into its instruction set or given to it as it processes an external and temporary set of instructions (software), is made up of commands that computer programmers have compiled into specific programming languages (for example, BASIC, COBOL, C, and others). In order to understand these commands, however, computers must first translate them into binary, a process that takes place within a microprocessor's decode unit. For this to work, each letter of the alphabet and each base-ten number must be assigned a binary equivalent made up of ones and zeros. To this end, programs established different systems to form standard character sets that consist of letters and numbers translated into their binary equivalents. Systems such as EBCDIC(Extended Binary-Coded Decimal Interchange Code) and ASCII (American Standard Code for Information Interchange) give letters a numerical equivalent (for example, M equals 77 in ASCII), which is then translated into a binary form computers understand. So each time you press and hold the Shift key and the m key on your computer keyboard, it sends a signal to the computer's processor which is translated internally from "M" into the binary equivalent of the number 77, or 01001101. In those terms, the letter is usable as pulses of electricity racing through a microprocessor's various parts.

the other bebfits of the brain mouse is that it is wireless in its modern form provided by the
advanced brain mouse providers they all provide it with best softwares ever made for all of us
have a google image search on the NIA BRAIN MOUSE

human memory booster, iq increaser












every one of you now a days can increase his iq but it takes a lot of time of your daily routine and other difficult things to do
we are going to introduce all of you with some of the products which are realy efficient in
increasing your iq and hence increasing the memory of your brain and
then this will be the time when you will discover some of the interesting changes in your
personality so act upon on our advice


Excellence is about arriving at human potential, of knowing, doing and making. These are dimensions of human excellence, whether in the past, present or future. They are related. If you don't have knowledge, you can't make the right things, you can't do the right things. But people must understand how to apply these principles in different contexts. In a global context, the way we do things, make things, and know things involves the new phenomena of compacted time and space. How we do things before and now, involve different modes and challenges.
How people make things now? People don't make things from resources within their territory. They source things from everywhere, all very quickly. They've to monitor the movements of goods and services so they can organise these resources from everywhere. How do you deal with this in compacted space and time?
This is where e-learning or technology comes in. If technology is a new way of communicating, and using data and information, and enables you to overcome the constraints of time and space, that's good. Some people think everybody must have e-learning. No! E- learning is one way that enables excellence to be achieved in this new context.
E-learning does not dispense with critical thinking. It only facilitates but it facilitates very well in the context of time and space. People who can see the context changing and that it would impinge on their ability to make decisions, would feel the urge of e- learning. We cannot expect somebody in the rural area to feel the same urgency. That doesn't mean that we should let them be. No, they must be involved. Once you get into it, you'd see the benefits, especially with (the focus on) agriculture and biotechnology.
Agriculture's framed from just means of livelihood to a value- added activity. For example, when we talk about fishing, you see poverty, income restricted to some seasons, backward technology, but when you see fishing as farming, it becomes an entirely different activity because you can farm on the mainland. You don't have to go out whether or not it's the monsoon season. You can use highly researched genetic stock to create what customer requires. This is the trouble with digital divide. People who know it are taking advantage of it and are benefiting from it, but people who don't, don't feel the necessity.
But it doesn't mean when you have e-learning, you have knowledge. The key to knowledge is learning: learning how to learn, how to adapt, how to unlearn and relearn. But technology assists us. For example, in an e- learning class, you can share knowledge even though you are not face-to- face. Students still ask questions and they can hear the answers. The other students can also take part.

ethical hacking courses , black hat hacking course







as most of us think the word hacker as a bad
and hot word and the listener takes the word
hacker as some one who is master of the computer systems
but one thing to remember all of you is that the word hacking and the act like a hackers have two different and disticnt meanings and cant be compared
the act of hacking is normal for those who are much more fimiliar to the world of computers
there are some young pioneers of the world of hacking who have done tremendous success and
the are noblized with the awards
The Dawn of Hacking
The first computer hackers emerge at MIT. They borrow their name from a term to describe members of a model train group at the school who "hack" the electric trains, tracks, and switches to make them perform faster and differently. A few of the members transfer their curiosity and rigging skills to the new mainframe computing systems being studied and developed on campus.
1970s
Phone Phreaks and Cap'n Crunch
Phone hackers (phreaks) break into regional and international phone networks to make free calls. One phreak, John Draper (aka Cap'n Crunch), learns that a toy whistle given away inside Cap'n Crunch cereal generates a 2600-hertz signal, the same high-pitched tone that accesses AT&T's long-distance switching system.
Draper builds a "blue box" that, when used in conjunction with the whistle and sounded into a phone receiver, allows phreaks to make free calls.
Shortly thereafter, Esquire magazine publishes "Secrets of the Little Blue Box" with instructions for making a blue box, and wire fraud in the United States escalates. Among the perpetrators: college kids Steve Wozniak and Steve Jobs, future founders of Apple Computer, who launch a home industry making and selling blue boxes.
1980
Hacker Message Boards and Groups
Phone phreaks begin to move into the realm of computer hacking, and the first electronic bulletin board systems (BBSs) spring up.
The precursor to Usenet newsgroups and e-mail, the boards--with names such as Sherwood Forest and Catch-22--become the venue of choice for phreaks and hackers to gossip, trade tips, and share stolen computer passwords and credit card numbers.
Hacking groups begin to form. Among the first are Legion of Doom in the United States, and Chaos Computer Club in Germany.
1983
Kids' Games
The movie War Games introduces the public to hacking, and the legend of hackers as cyberheroes (and anti-heroes) is born. The film's main character, played by Matthew Broderick, attempts to crack into a video game manufacturer's computer to play a game, but instead breaks into the military's nuclear combat simulator computer..
The computer (codenamed WOPR, a pun on the military's real system called BURGR) misinterprets the hacker's request to play Global Thermonuclear War as an enemy missile launch. The break-in throws the military into high alert, or Def Con 1 (Defense Condition 1).
The same year, authorities arrest six teenagers known as the 414 gang (after the area code to which they are traced). During a nine-day spree, the gang breaks into some 60 computers, among them computers at the Los Alamos National Laboratory, which helps develop nuclear weapons.