Wednesday, February 18, 2009

What is a Flat File?

A computer, in its most simplified definition, is nothing more than a device that stores, processes, communicates, and manipulates data. Data is at the heart of every computer program, every web site, and even every video game.

The computer has revolutionized modern life by enabling a level of speed and accuracy to handling information that has never before been possible. Computers accomplish this quite simply by following a set of instructions called code.

A flat file is a static document, spreadsheet, or textual record that typically contains data that is not structurally related. Flat files are called so because there is little that can be accomplished with the information contained in them other than reading, storing, and sending.

Flat files are typically basic data sets that are used for configuration data storage for applications and programs. The average computer user will not typically see them much. There are basic address book-like examples of a flat file that can be used, but modern users typically desire a more robust and sophisticated method of calling up their information than to rely on the limited capability of a flat file structure.

Flat files are commonly used by and found in database management systems, typically belonging in and organized into flat file databases. A flat file database is really nothing more than an organization criterion assigned to a sample set of flat files.

Programmers probably use flat files and flat file databases much more often than the average computer when constructing applications in database management systems such as MySQL, a popular DBS that supports multiple programming languages.

Flat files are also commonly used by website developers for use within languages they utilize such as PHP or ASP.

It has been noted that flat files, since they are simple data files, take up much less space than structured files. However, the utility reading flat files must be rather sophisticated in that it will need to know what to do with the flat file once it has been accessed.

Notepad to create log files

Notepad can be used to make log files. Just give it a try: Open Notepad and type .LOG on the first line, then save the file as desired. Now every time the file is opened the current date and time will be appended to it, which make it super-quick to create simple texty log files for whatever you want. Of course, every word processor and many text editors have shortcut keys for inserting the date, but simplicity does have its appeal. The Microsoft knowledgebase says this feature only applies to Windows 98 and ME, but it seems to work fine in XP as well.

Friday, January 16, 2009

Enhance Broadband speed(dial-up*)

This is for broad band connections, though it might work for dial up.

· Make sure you are logged on as "Administrator".
· Start->Run->type gpedit.msc
· Expand the "Local Computer Policy" branch.
· Expand the "Administrative Templates" branch.
· Expand the "Network Branch".
· Highlight the "QoS Packet Scheduler" in left window.
· In right window double-click the "Limit Reserved Bandwidth" setting.
· On setting tab check the "Enabled" item.
· Where it says "Bandwidth limit %" change it to read 0.

Effect is immediate on some systems, some need to re-boot. This is more of a "counter what Microsoft Windows XP does" thing. In other words, programs can request up to 20% of the bandwidth be reserved for them, even with QoS disabled.

Monday, December 8, 2008

Block USB drives

It is easy to lock a machine down, disable the floppy, and cdrom in the bios. Many times when you try to disable USB - it disables it entirely.

This can be a real pain on newer laptops or systems that don't even have a PS2 interface for the mouse or keyboard.

There is a simple registry change that will keep the USB storage drivers from starting when the system boots. Keeps people from walking up to a PC and copying data off with a USB key, but allows you to keep your scanner, keyboard, and mouse working.

As always - back your system up before messing around in the registry.

Just open regedit and browse to this key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor

Notice the value 'Start'

Switch this value to 4, and USB storage devices are disabled.

Switch this value to 3, and USB storage devices are enabled.

Monday, November 24, 2008

Mozilla Firefox

Keyboard shortcuts

Spacebar (page down)
Shift-Spacebar (page up)
Ctrl+F (find)
Alt+N (find next)
Ctrl+D (bookmark page)
Ctrl+T (new tab)
Ctrl+K (go to search box)
Ctrl+L (go to address bar)
Ctrl++ (increase text size)
Ctrl+- (decrease text size)
Ctrl-W (close tab)
F5 (reload)
Alt-Home (go to home page)
Control-L Go to address bar
Control-Enter will automatically fill in the “www” and the “.com” and take you there.
Shift-Enter
will automatically fill in the “www” and the ".net" addresses.
Control-Shift-Enter
will automatically fill in the “www” and the ".org" addresses.
Ctrl+Tab (rotate forward among tabs)

Ctrl+Shft+Tab (rotate to the previous tab)

Ctrl+1-9 (choose a number to jump to a specific tab)

Mouse shortcuts

Middle click on link (opens in new tab)
Shift+scroll down (previous page)
Shift+scroll up (next page)

Ctrl+scroll up (decrease text size)
Ctrl+scroll down (increase text size)
Middle click on a tab (closes tab)

Difference between I18n & L10n

Internationalization involves writing and designing an application so that it can be used with different languages, date, time, currency and other values without software modification.

Localization involves writing and designing an application capable of dealing with a specific region, country or language. In a sense, every application written for a specific area is localized. Usually, though, real localization is achieved by core code that accesses locale, location, political or other specific components and modules along with translating text.

A tax or accounting package that deals with, say, the U.S., Canada, Mexico and Brazil would need to be i18n'ed so that displays, reports and values would not have to be specific for each country, but also l10n'ed to handle different accounting and reporting procedures and taxes.

Proper internationalization facilitates localization. Internationalized applications are easier to localize than applications that have hard-coded text, number formats, embedded image names, etc.

Internationalization is typically a design and implementation job for a software engineer. Localization is typically a translation job for those who provide user visible elements. In some cases, however, when a a country or region requires custom features, some localization tasks may require new software modules or business logic. Hopefully the well-internationalized application has been designed for that issue and makes it easy to simply plug in additional functionality without modifying core application logic.

Check out more.

Tuesday, November 11, 2008

What is a Spam?

As wikipedia says, Spam is the abuse of electronic message system to indiscriminately send unsolicited bulk messages. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, Online classified ads spam, mobile phone messaging spam, Internet forum spam and junk fax transmissions.

In other words, we can say spam is flooding the internet with multiple copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Almost all spams are commercial advertising, often for dubious/malicious products, get-rich-quick schemes, etc. Spams cost the sender very little to send, most of the costs are paid by the recipient or the carriers rather than by the sender.

E-mail spams target individual users with direct mail messages. E-mail spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. Email spams typically cost users money out-of-pocket to receive. Many people - anyone with measured phone service - read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for ISPs and online services to transmit spam, and these costs are transmitted directly to subscribers.

How to get rid of Spams?? Read this http://gnosis.cx/publish/programming/filtering-spam.html

Monday, November 3, 2008

Rename several files at once

To rename several files at once:

· Select all of them in any folder view, or in the Windows Explorer, rename the FIRST one in the list, and the rest will follow.

To turn off filenames:

· Hold down the Shift-key when you click to open a folder in Windows Explorer or when switch into thumbnail view. This will turn of the file names, giving more space for the thumbnails. Doing it again turns them back on.

· Try grouping your files. In the top menu bar select View - Arrange icons by - Type, and then View - Arrange icons by… - Show in groups.

Enjoy !!

Enhance Windows Performance !!!

Here is how one can improve the performance of a Windows machine.

· Start > right-click on My Computer and select Properties.

· Click on the "Advanced" tab.
· See the "Performance" section? Click "Settings".
· Disable the following:

Fade or slide menus into view
Fade or slide ToolTips into view
Fade out menu items after clicking
Show Shadows under menus
Slide open combo boxes
Slide taskbar buttons
Use a background image for each folder type
Use common tasks in folders
There, now Windows will still look nice and perform faster.

Clean Prefetch in Windows XP

This is a unique technique for Windows XP. It is well known that it is necessary to scrub registry and TEMP files for Win9X/ME/2000 periodically. Prefetch is a new and very useful technique in Windows XP. However, after using XP some time, the prefetch directory can get full of junk and obsolete links in the Prefetch catalog, which can slow down a computer noticeably.

· Open C(system drive):/windows/prefetch, delete those junk and obsolete files, reboot. It is recommended to carry out this operation on a monthly basis.

Cheers !!!

Saturday, October 25, 2008

Secure your Desktop Icons and Settings , Block Websites

Save your desktop settings and secure it from your nerdy friend by playing with the registry. Simply launch the Registry Editor; go to:


HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

In the right pane create a new DWORD Value named NoSaveSettings and modify it's value to 1. Refresh and restart for the settings to get saved.

Block websites without Software

*Browse C:\WINDOWS\system32\drivers\etc.
*Find the file named "HOSTS".
*Open it in notepad.
*Under "127.0.0.1 localhost" Add 127.0.0.2 www.abcxyz.com .
*Try accessing that site. It is no longer accessable.

For every site after that you want to block, add the entry to this file like
127.0.0.3 www.abcxyz1.com
127.0.0.4 www.abcxyz2.com
127.0.0.5 www.pqrstu.com

Enjoy !