WELCOME

for any suggestion's please mail to this id:

nanduriraja537@gmail.com,raja.mic539@gmail.com

Thursday, January 27, 2011

free download Award keylogger



Award keylogger

Award Keylogger is fast, invisible and easy-to-use surveillance tool that allows you to find out what other users do on your computer in your absence. It records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. Award Keylogger can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.

Main Features:
New! Run keylogger as a Windows service
Easy-to-use, even for beginners
Absolutely invisible/stealth mode
Logs accounts and passwords typed in the every application, (Only Award Keylogger Pro can record passwords in IE7/8/9)
Logs message typed in all instant messengers
Visual surveillance, support screenshots view
Slide show for screenshots
Captures the contents behind the asterisks
Captures mouse clicks
Logs websites visited (Award Keylogger Pro only)
Captures AOL/AIM/Yahoo/ICQ chats
Keyword Detection and Notification
Records contents of password protected web pages, including Web Mail messages
Logs Windows Clipboard
Sends log by e-mail
Uploads ALL logs into the separate folders by FTP
Invisible for the firewall program
Invisible in the Windows startup list
Monitors all users of the PC
User friendly HTML file format for emailed logs
Invisible in Windows NT/2000/XP Task Manager and Windows 9.x/Me Task List
Records Windows 9.x/Me/2000/XP/VISTA logon passwords
Intercepts DOS-box and Java-chat keystrokes
Supports international keyboards
External log viewer
Supports printing of the log
Optimized for Windows XP
Exports log to HTML

Download Here:

Evercookie | advance visitor tracking method



Evercookie
Extremely Persistent Cookies
advance visitor tracking

Websites use several methods to identify a specific user visiting their service, or other third party service to which they are affiliated with. Most common Method is use of standard HTML cookies and Flash cookies, also known as Local Shared Objects.

What is Evercookie ??
Evercookie is used to produse extremely persistent cookies in client's browser. The main purpose of this is to identify a clients even after they have removed standard cookies. For this type of advance identification of user, evercookie stores the cookie data in several types of storage mechanisms availabe on the browser. If evercookie has found that user has removed any of the types of cookie, it recreates them using each mechanism available.

when creating a cookie, it uses the following storage mechanisms when available.
  1. standard HTTP cookies
  2. Local shared Objects
  3. Sliverlight Isolated Storage
  4. Storing cookies in RGB values of auto generating, force-cached PNG's usiing HTML5 Canvas tag to read pixels (Cookies) back out
  5. Storing cookies in Web History
  6. Storing cookies in HTTP ETaqs
  7. Storing cookies in web cache
  8. window.name caching
  9. Internet Explorer userData storage
  10. HTML5 Session Storage
  11. HTML5 Local Storage
  12. HTML5 Global Storage
  13. HTML5 Database Storage via SQLite
Evercookies introduce a new level of user tracking. The website will be able to track it's user, and reproduce deleted cookies, if at least one cookie or data in storage locations is not deleted by the user. And we can assume it's impossible to delete all cookies from all these locations because most of the user do not know about these type of storage of cookies.

what can you do to protect your system from this new kind of user tracking?
  1. Add-ons like NoScript prevent the creation of several of the cookies.
  2. Private browsing modes are an option as well.
Posted BY: H[4]ck3r

Tuesday, January 25, 2011

Microsoft Mathematics 4.0 Free Download


This article should be useful for the folks who are struggling to complete the mathematics school work or assignments. In contrast to Microsoft Mathematics add-in, Microsoft Mathematics 4.0 is a free standalone software which focuses in solving mathematical problems ranging from basic mathematics to complicated precalculus.

Microsoft Mathematics is an award-winning education tool consisting various powerful mathematical modules to aid in tackling the pre-algebra, algebra, trigonometry, calculus, physics and chemistry calculations.

Instead of just deriving mathematical solutions in a blackbox manner, the full-featured graphing calculator, unit converter and step-by-step assistance are the interactive features in Microsoft Mathematics to assist students in learning the fundamentals of resolving mathematical problems.

Explore the features available in Microsoft Mathematics 4.0:

  1. Step-by-Step Equation Solver – An interactive assistance to aid the process of resolving complicated problems
  2. Graphing Calculator – Enable the users to visualize large data-sets in 2D and enhanced 3D color graphs
  3. Formulas and Equations Library – Eliminate unnecessary memorizations or book flipping as more than 100 commonly used equations and formulae are handily available
  4. Triangle Solver – A special graphing tool to aid in resolving trigonometry-based problems.
  5. Unit Conversion tool – Easy conversion involving length, area, volume, weight, temperature, pressure, energy, power, velocity, and time.

In case you are not aware, the previous versions of Microsoft Mathematics which was known as Microsoft Math was a standalone purchasable product which require product activation.

Anyway, the free Microsoft Mathematics 4.0 setup installer can be downloaded from Microsoft Download Center.

Saturday, January 22, 2011

How To Make Mobile Banking Safe And Secure | For Bank System And financial institutions


As we all know that wireless applications have numbers of vulnerabilities higher then the wired applications and the devices.
In India there are not lots of people who do banking through mobile but outside India there are high profile countries in which many people do banking through mobile only.So the assurance of the security is needed for them.

Here are some recommandation that the bank and the financial institutions which to be noted and to be implemented in their system.


- Implement 2 way and 2 factor authentication which goes with the traditional username and the password.If username and password are compromised, the attacker still needs the second factor to gain access to an account.

- Implement high transaction monitoring and also fraud detection system.If hacker passes the 1st factor of authentication or
the front door,he is being started tracking by tracking system.The system have to generate logs of the activity of the account and the transaction.

-Avoid storing sensitive personal information on mobile devices which can easily be retrieved.For any information that bank has to store the information on the client side device then it should implement various security and the encryption and

download Quick Hide IP 1.0 | anonymous surfing


download Quick Hide IP 1.0
anonymous surfing


Quick Hide IP 1.0 portable | 4.4 MB

If you want to use internet anonymously and hide your ip to trace. Here is a great tool for you. Quick Hide IP protects your online identity by hiding your IP address and replacing with a proxy server IP address.You will appear to access the internet from a different location, not your real location. So all websites you are visiting see the IP address of the proxy server instead of your own IP address.



Key Features
  1. Hide your IP address from the web sites you visit.
  2. Fully compatible with Internet Explorer, Chrome, Firefox, Opera.
  3. Easy way to change proxy settings on the fly.
  4. Automatically switch IP address every X minutes for better anonymous surfing.
  5. Choose your favorite hidden geographic location all around the world.
  6. Advanced proxy list testing and management.


Download here:

9 Quick Ways To Magically Free Up Space In C:\ Drive

Gone are the days of low disk space warnings, you say? Not really. Many a time, the primary partition on your hard disk is loaded up to the last few gigabytes – probably because you installed too many programs and games. You can do a clean up, but you can also free up space without the hassles of Shift + Delete. Just try these workarounds to free up some space in the C:\ drive and make your computer run faster.


1. Change Dropbox Location

SS-2011-01-03_10.42.21

If your computer has Dropbox installed, you probably chose to keep the Dropbox folder inside ‘My Documents’. You can quickly move it to any other partition to free up space in the C:\ drive. Just right click the Dropbox icon in the system tray, choose Preferences and click Move to move your Dropbox folder’s contents.

2. Relocate Program Files

image

If you are a download junkie, the program files folder on your disk is probably crammed. Use the Steam Mover utility to move programs installed in C:\Program Files\ to another partition. Specify a particular program’s directory and the target location – Steam Mover will instantly move all your files there and create symlinks in the original location. That is a lot of disk space saved.

3. Move iTunes Backups or Delete Podcasts Automatically

Podcasts that you download using iTunes are in your main partition, right inside your music folder. You can quickly use the Edit > Preferences dialog to move them to another partition. This is quite a confusing process, and there’s a detailed guide here on how you can go about doing it.

You can also set iTunes to automatically delete podcasts that you’ve already listened to. You can do that by going to your Podcasts list and choosing Settings from the bottom, and then altering the choices in the ‘Episodes to keep’ option.

4. Change the default My Documents location

image

If you have a large number of files saved up in My Documents, you can move the folder to another partition in the disk to free up some disk space. Right click your documents folder, choose Properties, click the Location tab and hit Move to choose a new location for your documents. This is a pretty easy step, and could potentially save you plenty of disk space.

5. Use Symlinks When Desperate

Symlinks are your best bet when you have very little space left in the main partition. When you create symlinks, your folders will be accessible from the original location but their contents will actually be stored in the place the symlink is pointing to. The Link Shell extension for Windows Explorer makes it easy to create symlinks via the right click menu. You pick a link source and then you can go to the destination to drop a hard clone/soft link.

6. Power up CCleaner

If you thought CCleaner cleans all the temporary files in your C:\ drive, think again. Previously mentioned CCleaner Enhancer adds extra definitions to clean junk files left by over 270 applications. Just get the Enhancer installer which downloads the latest .ini file with definitions and you’re done – you can quickly reclaim more disk space in the C:\ drive!

7. Delete System Restore Points

System Restore files could be occupying considerable size in your hard disk partition and it makes sense to delete all these restore points except the latest one. You can use More Options in the Disk Cleanup utility to accomplish this. If you have CCleaner installed, you can use the System Restore cleaner from the Tools tab and remove individual system restore points quite quickly. The Disk Cleanup utility could help you gain more disk space by permanently deleting hibernation and other temporary files.

8. Look at the disk usage graph

The quickest way to find what’s hogging your hard disk is to deploy a disk usage graph. Install any one of these tools, and you can instantly see the amount of space used by the files and folders in your hard disk as neat and pretty graphs. These tools also give you an option to trash these folders immediately. Your only other choice is to use the Symlinks workaround mentioned above, in case you just don’t want to remove them from the partition.

9. If you don’t want to fiddle with any of these methods, just resize the partition using a partition manager like Easeus. That’d do the trick.

Just make sure you have backed up your data before you try anything mentioned here. More tips? Tell them in the comments!

Credo E-Bone Concept Bus

Credo E-Bone Concept Bus

This Credo E-Bone concept bus is powered by hydrogen fuel cells.

Credo E-Bone Concept Bus

Credo E-Bone Concept Bus

Credo E-Bone Concept Bus

Credo E-Bone Concept Bus

Credo E-Bone Concept Bus

Credo E-Bone Concept Bus

Credo E-Bone Concept Bus

Credo E-Bone Concept Bus

Credo E-Bone Concept Bus

Credo E-Bone Concept Bus

Credo E-Bone Concept Bus

A Man hacked 3,200 Gmail Accounts


  • Sometimes you read about a criminal who is so much of a small-minded pervert and borderline mutant you almost can’t help but admire him. George Bronk is just such a criminal: the 23-year old has just pleased guilty to hacking into the email accounts of 3,200 girls, looking for nude photographs, then posting the pictures to their public Facebook profiles. That’s some single-minded skeeviness.
  • Bronk was arrested in late October after he used the same technique that was popularized by hacker David Kernell to break into Sarah Palin’s email. Namely, Bronk scoured his victims’ Facebook accounts looking for the answers to security questions used for password recovery by services like Gmail and Yahoo Mail.
  • Once he had access to an email account, it was go time: he’d do an extensive search for nude photographs sent by the account holder, then trigger a Facebook password recovery to get into their account and post the pictures live to their profiles.
  • Gronk did this to over 172 women: he even convinced one woman to send him even more explicit photos of herself by threatening to post the ones he’d already stolen if she didn’t.
  • Gronk now faces six years in prison for felony hacking, child pornography (it seems several of the girls were minors) and identity theft charges.
  • Wow. Most pervs would stop at just getting the naked photos, but the added step of posting them to the girls’ own Facebook profile? That’s just the creep-de-la-creep.

Free download isteal Keylogger v2


Free download isteal Keylogger v2
Remote installation keylogger


Isteal is a good keylogger for hacking. It also has the remote installation feature which makes it a nice tool for hacker. Keyloggers are used for hacking email accounts, facebook accounts and other type of accounts.

Features of our isteal keylogger
  1. 100% FUD from all anti-virus
  2. Send Logs To Emails ( gmail,yahoo,aol,hotmail ) and Ftp account
  3. Decreased Server Size
  4. Optimized Memory UsageIcon Changer
  5. Time Setter
  6. Melt server after using
  7. Start up adder
  8. Became active after every start up of windows
  9. And many other features
How To Use This Remote Keylogger
  1. Download keylogger from below and extract that
  2. Give them the required information
  3. Create New Gmail Account Specially for keylogger ( its recommended )
  4. And Log that gmail username and password in keylogger
  5. Now Click on build
  6. It will create a server.exe
  7. Send that Server.exe to victim and ask them to run
  8. You done the all task now you will receive the logs to the given gmail account
Download Here

Password protect your USB drive with USB secure


Password protect your USB drive
download USB SECURE 1.4.0



USB Secure helps you password protect USB drive, thumb drive, memory stick, pen drive, jump drive, flash drive and external hard drive. It supports plug and play and runs automatically once a USB drive is plugged in, asking you the password for it. USB Secure is hassle free and it doesn’t need a rocket scientist to master.

You can easily lock USB drives with USB Secure and can also password protect memory sticks and all other external storage devices with just a single mouse click. An easy to use setup program will guide you to put the program on your USB drive. It can automatically detect all such drives currently plugged into your PC. After installing simply run the software, set and confirm a password, protect USB drive and sit back and relax!

It’s not necessary to run the software every time you want to protect USB drive; you can simply choose ‘Protect This USB Drive’ option from the Windows Autoplay that pops up every time you plug-in your USB drive. You can also double click the USB drive in your PC to launch the program. To unprotect your secure USB drive, click 'Unprotect' and enter correct password to access your data again.

Another great feature of USB Secure is that it doesn’t require any Administrator rights to run and therefore there is no need to install it at the other end to retrieve the password protected data. The program also supports plug & play and asks for a password immediately when the drive is plugged-in. Password protect USB drive and other portable media with USB Secure.

Download here:

Wednesday, January 5, 2011

Cryptography n network security

CODE

http://www.mediafire.com/?zghwmhdzmqm

Artificial Intelligence & Global risk

CODE

http://www.mediafire.com/?ltijvtixgcm

Advances in Computer Power& Numerical algorithm

CODE

http://www.mediafire.com/?tnmdpd2nyr9

Artificial Intelligence

CODE

http://www.mediafire.com/?fyzuj1yxltj

Boimetrics

CODE

http://www.mediafire.com/?5smzkddjhic

BlueTooth

CODE

http://www.mediafire.com/?nzyzzgsrxxt

ppt on Cellphones n calls

CODE

http://www.mediafire.com/?7tmpzcsprn3

Data Mining

CODE

http://www.mediafire.com/?g0dl7nzysmx

Distribution medium access for next generation

CODE

http://www.mediafire.com/?blymvrn3yyd

e-hacking

CODE

http://www.mediafire.com/?v4rzjokdtlm

Human Oriented interaction wid robot

CODE

http://www.mediafire.com/?fzydk2xmlmd

Identity Management

CODE

http://www.mediafire.com/?ymmx0thjzds

Mobile Computing

CODE

http://www.mediafire.com/?kfcmllmiing

Mobile MultiRobot Systems

CODE

http://www.mediafire.com/?ynatnmiya6d

Network Security

CODE

http://www.mediafire.com/?yjnkmjkj9m0

Realtime 3d Human Capture System

CODE

http://www.mediafire.com/?5ylmntgnstj

RealTime data Ware housing

CODE

http://www.mediafire.com/?jzeizwtzndw

Real time Systems

CODE

http://www.mediafire.com/?m3ryzmietxx

A ppt on Robots

CODE

http://www.mediafire.com/?cymvcymuwzl

UML

CODE

http://www.mediafire.com/?y910ddvvtnm

vending Machine

CODE

http://www.mediafire.com/?tneyj9qiptn

VistabookSpeechSystems

CODE

http://www.mediafire.com/?xyiy54triyd

Windows Vista

CODE

http://www.mediafire.com/?nmmkdz1mshz

WeB 3.0

CODE

http://www.mediafire.com/?nmouit22a1g

wireless networks

CODE

http://www.mediafire.com/?hbxgzazmjmw

Posted by Srikanth at 11:09 AM 0 comments

SEMINAR TOPICS WITH ABSTRACT

WIRELESS LAN SECURITY

CODE

http://www.ziddu.com/download/2975603/wlan.doc.html

WIRELESS APPLICATION PROTOCOL

CODE

http://www.ziddu.com/download/2975604/wirelessapplicationprotocol.doc.html

WAVELET TRANSFORMS

CODE

http://www.ziddu.com/download/2975605/WAVELET_TRANSFORMS.DOC.html

VOICE OVER INTERNET PROTOCOL

CODE

http://www.ziddu.com/download/2975606/voiceoverip.doc.html

WiMAX

CODE

http://www.ziddu.com/download/2975607/Wimax_Emerging_wireless_technology.DOC.html

ARTIFICIAL NEURAL NETWORK

CODE

http://www.ziddu.com/download/2975639/artificialneuralnetwork.doc.html

ATM

CODE

http://www.ziddu.com/download/2975640/atm.doc.html

64-BIT MICRO PROCESSOR

CODE

http://www.ziddu.com/download/2975641/64bitmultiprocessor.doc.html

ADAPTIVE CONTROL SYSTEM

CODE

http://www.ziddu.com/download/3006526/adaptivecontrolsystem.sho.DOC.html

COMPOSITE MATERIALS

CODE

http://www.ziddu.com/download/3006527/compositematerials.sho.DOC.html

3D MACHINE VISION SYSTEM

CODE

http://www.ziddu.com/download/3006528/3dmachinevisionsystems.sho.DOC.html

AIR BRAKE SYSTEM

CODE

http://www.ziddu.com/download/3006529/airbrakesystem.sho.DOC.html

GENETIC ALGORITHM

CODE

http://www.ziddu.com/download/3006620/geneticalgorithm.sho.DOC.html

FUEL CELLS

CODE

http://www.ziddu.com/download/3006621/fuelcells.sho.DOC.html

INTELLIGENT COOLING SYSTEM

CODE

http://www.ziddu.com/download/3006622/intelligentcoolingsystem.sho.DOC.html

DIESEL ENGINE

CODE

http://www.ziddu.com/download/3006623/dieselengine.sho.DOC.html

METALLURGICAL CHANGES IN SYSTEMS

CODE

http://www.ziddu.com/download/3006750/metallurgicalchangesinsystems.sho.DOC.html

SIX SIGMA

CODE

http://www.ziddu.com/download/3006751/sixsigma.sho.DOC.html

LIQUID NITROGEN

CODE

http://www.ziddu.com/download/3006752/liquidnitrogen.sho.DOC.html

MICROELECTROMECHANICAL SYSTEMS

CODE

http://www.ziddu.com/download/3006753/microelectromechanicalsystems.sho.DOC.html

NEURAL NETWORKS

CODE

http://www.ziddu.com/download/3006753/microelectromechanicalsystems.sho.DOC.html

AUTOMATIC SPEED CONTROL SYSTEM

CODE

http://www.ziddu.com/download/3006530/automaticspeedcontrolsystem.sho.DOC.html

AUTOCONFIGURING ARTIFICIAL NEURAL NETWORK

CODE

http://www.ziddu.com/download/2975642/AUTOCONFIGURINGARTIFICIALNEURAL.doc.html

BLUETOOTH TECHNOLOGY

CODE

http://www.ziddu.com/download/2975643/bluetoothtechnology.doc.html

BLUETOOTH TECHNOLOGY IN WIRELESS COMMUNICATIONS

CODE

http://www.ziddu.com/download/2975676/BLUETOOTHTECHNOLOGYINWIRELESSCOMMUNICATIONS.doc.html

CODING OF DIGITAL AUDIO

CODE

http://www.ziddu.com/download/2975677/CODING_OF_DIGITAL_AUDIO.DOC.html

CONTACTLESS SMART CARD

CODE

http://www.ziddu.com/download/2975678/contactless_smartcard.DOC.html

DCOM TECHNICAL OVERVIEW

CODE

http://www.ziddu.com/download/2975679/dcomtechnicaloverview.doc.html

CODE DIVISION MULTIPLE ACCESS

CODE

http://www.ziddu.com/download/2975680/codedivisionmultipleacess.doc.html

DIGITAL IMAGE PROCESSING

CODE

http://www.ziddu.com/download/2975732/DIGITAL_IMAGE_PROCESSING.DOC.html

DOMAIN NAME SYSTEM

CODE

http://www.ziddu.com/download/2975733/domainnamesystem.doc.html

DIGITAL DISPLAY TECHNOLOGY

CODE

http://www.ziddu.com/download/2975734/Digital_Display_Technology.DOC.html

DISTRIBUTED SYSTEMS

CODE

http://www.ziddu.com/download/2975735/Disrtibuted_Systems.DOC.html

DIGITAL SIGNATURE

CODE

http://www.ziddu.com/download/2975736/digitalsignature.doc.html

E-CASH PAYMENT

CODE

http://www.ziddu.com/download/2975749/ecashpaymentsystem.doc.html

EMBEDDED SYSTEMS

CODE

http://www.ziddu.com/download/2975750/EMBEDDED_SYSTEMS.DOC.html

FREE SPACE OPTICS

CODE

http://www.ziddu.com/download/2975751/freespaceoptics.doc.html

Fuzzy Coordination of FACTS

CODE

http://www.ziddu.com/download/2975752/FuzzyCoordinationofFACTSControllersfor.doc.html

EDGE Compact and EDGE Classic Packet Data Performance

CODE

http://www.ziddu.com/download/2975753/EDGECompactandEDGEClassicPacketDataPerformance.doc.html

ATM

CODE

http://www.ziddu.com/download/2975772/atm.doc.html

FUZZY LOGIC CONTROL DESIGN

CODE

http://www.ziddu.com/download/2975773/FUZZYLOGICINCONTROLDESIGN.doc.html

GSM

CODE

http://www.ziddu.com/download/2975774/gsm.doc.html

FUZZY LOGIC

CODE

http://www.ziddu.com/download/2975775/FUZZY_LOGIC.DOC.html

FUZZY LOGIC IN EMBEDDED SYSTEMS

CODE

http://www.ziddu.com/download/2975776/FUZZYLOGICINEMBEDDEDSYSTEMS.doc.html

HOLOGROPHY

CODE

http://www.ziddu.com/download/2982520/holography.sho.doc.html

HIDING DATA IN IMAGES BY SIMPLE SUBSTITUTION

CODE

http://www.ziddu.com/download/2982521/hidingdatainimagesbysimplesubstitution.sho.DOC.html

INTELLIGENT WIRELESS VIDEO CAMERA

CODE

http://www.ziddu.com/download/2982522/intelligentwirelessvideocamera.sho.DOC.html

HIGH PERFORMANCED DSP CAPABILITY

CODE

http://www.ziddu.com/download/2982523/highperformancedspcapability.sho.DOC.html

IMAGE PROCESSING

CODE

http://www.ziddu.com/download/2982524/imageprocessing.sho.doc.html

MULTIMEDIA MESSAGING SERVICE

CODE

http://www.ziddu.com/download/2982568/mms.sho.doc.html

MOBILE ADHOC NETWORK

CODE

http://www.ziddu.com/download/2982569/MobileAdhocNetwork.sho.doc.html

LATEST SMART CARD FEATURES

CODE

http://www.ziddu.com/download/2982570/latestsmartcardfeatures.sho.doc.html

MICRO CONTROLLERS CABLE MODEMS

CODE

http://www.ziddu.com/download/2982571/microcontrollerscablemodems.sho.DOC.html

IPV4-IPV6 TRANSITION TECHNOLOGY

CODE

http://www.ziddu.com/download/2982572/ipv4-ipv6transitiontechnology.sho.DOC.html

MOBILE COMPUTING

CODE

http://www.ziddu.com/download/2982592/mobilecomputing.sho.doc.html

MULTI RESOLUTION WATERMARK BASED ON WAVELET

CODE

http://www.ziddu.com/download/2982593/multiresolutionwatermarkbasedonwavelet.sho.DOC.html

NANOTECHNOLOGY

CODE

http://www.ziddu.com/download/2982594/NANOTECHNOLOGY.sho.doc.html

NEW TRENDS IN CRYPTOGRAPHY

CODE

http://www.ziddu.com/download/2982595/newtrendsincryptography.sho.DOC.html

NETWORK CUSTODY SYSTEM

CODE

http://www.ziddu.com/download/2982596/networkcustodysystem.sho.doc.html

RSA ALGORITHM

CODE

http://www.ziddu.com/download/2982638/rsaalgorithm.sho.doc.html

ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING

CODE

http://www.ziddu.com/download/2982639/orthogonalfrequencydivisionmultiplexing.sho.DOC.html

ORGANIC LED

CODE

http://www.ziddu.com/download/2982640/organicled.sho.DOC.html

PUBLIC KEY INFRASTRUCTURE

CODE

http://www.ziddu.com/download/2982641/publickeyinfrastructure.sho.doc.html

SATELLITE COMMUNICATIONS

CODE

http://www.ziddu.com/download/2982642/satellite_communication.sho.DOC.html

SLAMMER WORM: THE FASTEST SPREADING BOMBSHELL ON THE INTERNET

CODE

http://www.ziddu.com/download/2982665/slammerworm.sho.doc.html

SECURITY ISSUES

CODE

http://www.ziddu.com/download/2982666/securityissues.sho.DOC.html

SECURE INTERNET VERIFICATION BASED ON IMAGE PROCESSING

CODE

http://www.ziddu.com/download/2982667/cureinternetverificationbasedonimageprocessing.sho.DOC.html

SMART ANTENNA

CODE

http://www.ziddu.com/download/2982668/smartantenna.sho.doc.html

SILICON ON PLASTIC

CODE

http://www.ziddu.com/download/2982669/silicononplastic.sho.doc.html

TACTILE SENSING SYSTEM USING NEURAL SYSTEM

CODE

http://www.ziddu.com/download/2982697/tactilesensingsystemusingneuralsystem.sho.DOC.html

SMART CARD

CODE

http://www.ziddu.com/download/2982698/smartcard.sho.doc.html

SOCKET INTERFACE

CODE

http://www.ziddu.com/download/2982699/socketinterface.sho.doc.html

SPEECH RECOGNITIONS USING DSP

CODE

http://www.ziddu.com/download/2982700/speechrecognitionusingdsp.sho.DOC.html

STORAGE AREA NETWORK

CODE

http://www.ziddu.com/download/2982701/storageareanetwork.sho.doc.html

WAVELET TRANSFORMS

CODE

http://www.ziddu.com/download/2982746/wavelettransforms.sho.DOC.html

WIRELESS WLAN SECURITY

CODE

http://www.ziddu.com/download/2982747/wlan.sho.doc.html

3G WIRELESS TECHNOLOGY

CODE

http://www.ziddu.com/download/2982748/3gwirelesstechnology.sho.doc.html

VOICE OVER INTERNET PROTOCOL

CODE

http://www.ziddu.com/download/2982749/voiceoverip.sho.doc.html

TOOL COMMAND LANGUAGE

CODE

http://www.ziddu.com/download/2982750/toolcommandlanguage.sho.doc.html

ENTERPRISE SECURITY

CODE

http://www.ziddu.com/download/2989688/hysicalSecurityandConvergenceEngineering.RaHuL.sho.pdf.html

CODE

http://www.ziddu.com/download/2989689/aholisticviewofenterprisesecurity.RaHuL.sho.ppt.html

CURRENT DIFFERENTIAL PROTECTION

CODE

http://www.ziddu.com/download/2910667/currentdifferentialprotection.DOC.html

APPLICATION OF GENETIC ALGORITHM TO ECONOMIC LOAD DISPATCH

CODE

http://www.ziddu.com/download/2910668/licationofgeneticalgorithmictoeconomicloaddispatch.DOC.html

ARTIFICIAL INTELLIGENCE TECHNIQUES IN POWER SYSTEMS

CODE

http://www.ziddu.com/download/2910669/artificialintelligencetechniquesinpowersystems.DOC.html

APPLICATION OF SHUNT ACTIVE POWER FILTER

CODE

http://www.ziddu.com/download/2910670/applicationofshuntactivepowerfilter.DOC.html

AN EXPERT SYSTEM FOR POWER PLANTS

CODE

http://www.ziddu.com/download/2910671/anexpertsystemforpowerplants.DOC.html

AUTOMATIC VEHICLE LOCATOR

CODE

http://www.ziddu.com/download/2329473/automaticvehiclelocator.pdf.html

NANO TECHNOLOGY IN MEMORY DEVICES

CODE

http://www.ziddu.com/download/2329474/nanotechnologyinmemorydevices.pdf.html

DIGITAL SIGNAL PROCESSORS

CODE

http://www.ziddu.com/download/2329475/Digitalsignalprocessors.pdf.html

BIOCHIPS

CODE

http://www.ziddu.com/download/2329476/Biochips.pdf.html

EMBEDDED SYSTEM DIGITAL BIKE OPERATING SYSTEM

CODE

http://www.ziddu.com/download/2329477/embeddedsysdigitalbikeoperatingsystem.pdf.html

VLSI DESIGN

CODE

http://www.ziddu.com/download/2329498/VLSIdesign.pdf.html

4G COMMUNICATION

CODE

http://www.ziddu.com/download/2329527/4gcomm.pdf.html

ADAPTIVE MISSILE GUIDANCE

CODE

http://www.ziddu.com/download/2329528/adaptivemissleguidance.pdf.html

BATTERY MODEL FOR EMBEDDED SYSTEMS

CODE

http://www.ziddu.com/download/2329529/Batterymodelforembeddedsystems.pdf.html

PC TO PC COMMUNICATION WITH INFRARED

CODE

http://www.ziddu.com/download/3187204/pctopccommunicationwithinfrared.pdf.html

CODE

http://www.ziddu.com/download/3187251/PresentationofSoftwareDefinedRadio.ppt.html

SOFTWARE DEFINED RADIO

CODE

http://www.ziddu.com/download/3187205/Software_Defined_Radio.pdf.html

HUMAN COMPUTER INTERFACE

CODE

http://www.ziddu.com/download/3187291/hci.ppt.html

CYBER CRIMES

CODE

http://www.ziddu.com/download/3225722/cybercrime.pdf.html

LinkWithin

Related Posts Plugin for WordPress, Blogger...