Sunday, December 27, 2009

Show All Files

If you have fallen into the predicament of being unable to show all (hidden) files in the computer. If your question is how to show all files or my hidden files don't show. Then you may continue reading below.

This virus (or evil program whatever you might like to call it) is quite frequently found in the computers of  universities' labs. What it does is that, it deprives you of the right to show all files using the folder options. You might also use google to find other ways to correct this problem only if the solution provided here doesn't work, but as far as I'm concerned the following three methods should definitely suffice in solving this issue.


Method 1:

Open registry editor (the registry editor can be found in the WINDOWS folder under the name 'regedit', or alternaively you can type 'regedit' in the run command found in the start menu, you can also make the run dialog box appear by pressing 'Windows+R' keys together) & go to the following key (location):
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced

In the right hand area, double click - Hidden - and change the value to 1.

Now it's all done. Check it in your tools menu if the changes have taken effect.



Method 2:

1. Find the key (location):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL

2. Look at the "CheckedValue" key, This should be a DWORD key. If it isn't, delete the key.

3. Create a new key called "CheckedValue" as a DWORD (hexadecimal) with a value of 1.

4. The "Show hidden files & folders" check box should now work normally.



Method 3:

If none of the above methods work, please Use the Smart Virus Remover (625.9 KiB):


Using this Virus Remover, restore your Windows settings and your show hidden files and folders will be set to default.

.

Saturday, December 19, 2009

Final Year Project (FYP) Website

I have received some queries relating to the FYP website links, it's given as follows:

http://www.ssuet.edu.pk/~fyp


The FYP committee also used the google's site to host the FYP anouncements, but left it hanging in the middle without updating it, its link is given below:

http://sites.google.com/site/fypcedssuet

They may even decide to change the links of FYP anouncement for the upcoming new FYP batches.

Friday, November 20, 2009

Computer Security Lectures

There are a total of 14 lectures of Computer Security, though lectures are numbered to sixteen - lectures 8 and 13 don't exist.

These lectures were taught and conducted by teachers:
  1. Najm-ul-Islam Farooqui
  2. Ibrahim Muhammad Hussain
This course outline is subject to be affective for batch 2006, i.e. it may or may not change for others:
Computer Security Course Outline
Lecture one consists of introduction, history, background and issues of computer security to give you a head start for the rest of the course:
Computer Security Lecture 01

Lecture two is dedicated to the basic and introductory level of cryptology and all that is there in it, focussing mainly on classical encryption algorithms:
Computer Security Lecture 02

This lecture emphasizes only Simplified Data Encryption Standard (S-DES) which is used to get you familiar with the current computer security standards at a beginner's level:
Computer Security Lecture 03

After S-DES comes DES (i.e. without the S) for in-depth view of its algo. which has been a current standard only not too long ago and has only been replaced by new standards in the late 1990's:
Computer Security Lecture 04

A very short chapter (though article is more suitable for calling it) that only focuses on differenciating between Differential and Linear Cryptanalysis:
Computer Security Lecture 05

International Data Encryption Algorithm (IDEA) is another, new age, defacto algorithm to which this lecture is dedicated:
Computer Security Lecture 06

Though IDEA is defecto standard, this lecture introduces you to the Advance Encryption Standard (AES), the accepted standard, and teaches you substition, S-Box, Mix-Columns, Add Round Key and all etc.:
Computer Security Lecture 07

To give you a clear and elaborate understanding about the working of AES rounds, view the following animation. Change the file extention to .exe before opening the file.
Download Animation Here
An another short lecture (or rather topic) introducing to you the number theory; Primes numbers, Relatively prime numbers, GCD (greatest common divisor), Fermat's Theorem and Primitive roots:
Computer Security Lecture 09

Elaboration of  Public Key Cryptography and RSA with all the working and logic to get you at the end of understanding the Asymmetric algorithms:
Computer Security Lecture 10

Cryptography in connection to Network Security is the objective of this lecture, and also outlines Diffie-Hellman Key-Exchange protocol:
Computer Security Lecture 11

Message Authentication and Hash Functions are the main ingredients of this lectue, includes Data Authentication Algorithm (DAA):
Computer Security Lecture 12

This lecture teaches you the Digital Signatures' properties, techniques and types (i) RSA approach  (ii) DSS approach:
Computer Security Lecture 14

Email security - Pretty Good Privacy (PGP) is discussed in this chapter which is pretty much all the way theory:
Computer Security Lecture 15

IPSec (IP Security) is another theoritical lecture, includes topics of transport and tunnel mode of operations, Authentication Header (AH) and Encapsulatin Security Payload (ESP):
Computer Security Lecture 16


Lecture of  Firewall was not included slides were made available for our own refference and good:
Firewall Slides

Saturday, November 7, 2009

Communication Skills - Dropped out of Curriculum


It has been quite some time that the dispute over the matter of excluding the subject of communication skills out of the curriculum has finally been resolved, now, but not for the better.

Why? Because, simply put it this way, I was surprised that once after the subject has been declared in the curriculum present in prospectus of the university (SSUET), it can be removed. I was straight under the impression that once enrolled with the commitment of the prospectus, niether of the party is allowed to change their course of action, otherwise it would in violation with Higher Education Commission (HEC) & Pakistan Engineering Council (PEC) would not approve of it.

But now it seems like the hold of either of the group HEC or PEC is rather lethargic, and pays no heed to what are the current issues in our educational sector. With some minor issues as these (by the way it is not at all a minor case), you can expect these institution to overlook these hindrances, considering the fact that they have the responsibility of correcting the national infrastructure of Pakistan by imposing strict rules in their line of duties.

Saturday, October 31, 2009

Home Education - Today's School Environment Spoils the Moral Integrity



From the day your child was you have been home educating - assisting them in their quest for knowledge of the world around them, answering their questions, teaching them to walk and talk. You have already done the hard stuff, and without a curriculum. In fact, if you truthfully look back at this stage, you yourself have not had much of a hand in all the wonderful things your child has accomplished. Our children are born with the ability to teach themselves everything they need to know about surviving in the world they live in, and they do it well. School interrupts this natural flow of learning and eventually kills it. If you leave children alone and just provide enough resources, encouragement and a caring environment, that is all you will ever need. Trust them and they will get the job done.

Home school is an option open to families in Australia and often the decision to home educate your child is made well after your child has started school. Schools are a fairly recent invention of man as they have only been around for about 150 years or so. Before that, parents always taught their children at home, and it was a natural part of life. Going to school is not the natural way for a child to learn and many children struggle with the concept of school. As a result, parents often see a change for the worse in their children. They become unhappy, angry little people unable to communicate with parents and siblings as they once did.

An Australian lecturer in education, who has been researching home education for ten years, has found that children who have had structured lessons at home as well as children who had absolutely no structure at home have both turned out to be socially and academically ahead of schooled peers. The only drawback that he found in the ten years of study was the lost wages of one parent.

Children do not need to be placed in artificial situations so that they can 'become socialised'. Socialization forced upon children in schools and playgrounds is not true socialization. Real socialization happens all the time, every minute of the day with parents, siblings, shopkeepers, in the park and best of all, children with themselves and their dreams. It happens all the time and we do not need to set it up. The type of socialization that does happen in the schoolyard is not the type most of us want for our children; the bullying and the peer pressure and the bad language, and children that grow up in charge of their own socialization grow strong and confident and able to communicate with a wide range of people.
.

Thursday, October 15, 2009

Final Year Project ( FYP ) Report Format

If you have aquired the FYP report from other sources it's just fine. But this FYP report format belongs to the original compliant according to the SSUET demands.

If you have any better ideas or report format to share with others please do so. Otherwise download the report from the links below.

Download Notice Here
Download Report Here
Download Report Plan Here
Download Sample Chapter
Download Sample References

Saturday, October 10, 2009

A moment preserved

A picnic on the beach, crazy enough to go in a chilly weather. And when you have nothing else to do, then THIS is the outcome of idle brainers. Simply WOWwww.

Friday, October 9, 2009

Python Software version 2.4.3

This (Python) is a free redistributable software. You can download it from other locations as well but people don't generally upload it. Its version is 2.4.3. It is in .RAR file format so you will need WinRAR to unzip it. You can download this software using the link given below, it will take you to esnips website where you can hit the download button to download it.

Download Python Here

Thursday, July 30, 2009

Ferroelectric Random Access Memory (FRAM / F-RAM / FeRAM )

Ferroelectric-RAM (FRAM / F-RAM/ FeRAM )

FRAM is alternative non-volatile memory technologies, it offer the same functionality as Flash memory by recording bits on a magnetic surface.

FRAM is similar in construction to DRAM but uses a ferroelectric layer instead of a dielectric layer to achieve non-volatility. Or a memory that uses ferroelectric film as a capacitor for storing data.

FRAM combines the best of RAM and ROM into a single package that outperforms other nonvolatile memories with remarkably fast writes, high endurance for number of rewrites and ultra-low power consumption. It reduces the burden of OEM (original equipment manufacturer) development because there is no need to differentiate between RAM and ROM

In spite of its name, ferroelectric RAM does not contain iron. The ferroelectric name was chosen because the hysteresis characteristic of the capacitor's charge is similar to ferromagnetic materials. It is somewhat misleading because the capacitor is not made of iron (ferrous), and it is not influenced by magnetic fields. Today’s FRAM uses thin film of Lead Zirconate Titanate [Pb(Zr, Ti) O3], commonly referred to as PZT; other materials are being considered. The main developer of FRAM is Ramtron International.

To date, the commercial FRAM devices have been produced at 350 nm and 130 nm. Early models required two FRAM cells per bit, leading to very low densities, but this limitation has since been removed.

Polarization in a Crystal
FRAM uses a ferroelectric capacitor composed of a crystal made up of lead and oxygen atoms plus zirconium or titanium; these crystals have two stable states. When an electric field is applied, the Zr/Ti (zirconium or titanium) atoms in the PZT change polarity, thereby producing a binary switch. The read circuit detects the polarity of the atom as a difference in voltage, which determines the 0 or 1.








Reliability:
The following tests, per JEDEC industry standard test specifications for non-volatile memory, guarantee 10 years of operation and data retention at 85°C.

Security:
FRAM is more resistant to data corruption via electric fields, radiation, etc. also, the extremely fast write times and the small 130 nm process node make it more resistant to physical attacks. Furthermore, FRAM’s much lower power consumption arguably makes it more difficult to attack with differential power analysis techniques.

Monday, June 29, 2009

Final Year Project ( FYP ) Poster Presentation

Following are the documents uploaded by the final year project FYP committee, on the same date posted here. You can use these files to prepare yourselves in advance, which is not only a good idea but many will find it a compulsory idea. It comes from personal experience that you will be on a very short leash once your last (8th) semester begins.

Don't wait for the notice, and once the papers (exams) are finished for the 7th semester, get started on your posters. Because after the 8th semester begins you will have only two weeks approximately before FYP poster presentation.

Download Poster Presentation Notice
Download Poster 1 Here
Download Poster 2 Here
Download Brochure Here
Download Tips/Help Here

Thursday, April 9, 2009

FYP Monthly Progress Report SSUET

Once your project is approved and you are underway to work on it, you will have to submit your monthly progress report begining by the month of March, that will be your first monthly progress report. Consider your Monhly progress being divided into series of 7 months, with May & June combined due to exams, upto October.

Download Monthly Progress Announcement
Download Monthly Progress Report
Download Monthly Progress Report Help

Wednesday, February 18, 2009

Visual Basic 6.0 Portable

The History of Visual Basic in short:

VB is predominantly derived from BASIC. Its first Version-1 came out in 1991, and subsequently the followup versions came upto 1998 with Version-6 as the last installment of its kind. The full support to VB6 ended in 2005, and the extended support to it ended in 2008.

After this, Visual Basic .NET (which came out in 2002) replaced the earlier versions so that it was not backward compatible and introduced the .NET framework as its working platform, this version is also known as VB7. The current stable version continuing this (.NET) chain of VB is Visual Basic 2008 (a.k.a (also known as) VB9.)



Portable Version:

Visual Basic 6 is small and convenient to get a hands-on experience for the beginners and newbies. Although not supported by Microsoft anymore, it can still be experimented with, and small semester projects can easily be deployed using this language.

The portable version of VB6 available here is only capable of making executable files, nonetheless which is definitely enough for small tasks / projects.


Note: Unzip or Unrar and open Vb6, and start your work right away.

.

Thursday, February 12, 2009

FYP Proposal Interview

Final Year Project proposal interview will be scheduled relatively between first and second weeks of initial announcement of the proposal submission. The following documents will be posted by FYP committee for  FYP students to prepare themselves for the interview.

Download Proposal Notice
Download Proposal List

They will probably ask you to present them with convincing/appropriate reasons and facts so as to enable them to approve your project on concrete basis. If you give poor explainations or are unable to portray a good presentation, chances are likely that they would ask you to come up or add something new in your existing project or a totally new project altogether.

Tuesday, January 27, 2009

Final Year Project ( FYP ) Proposal & Registration

Following are the documents which were presented to the final year students of  SSUET  batch 2006 on the date posted here. The original publishing and last submission dates are also mentioned in one of the documents in which the anouncement is made. You can check out the links given below for the documents.

Furthermore, you can take the hints from here and prepare your documents in advance, it a good suggestion and practice from personal experience, because the time frame given to you will be between 10 days to 12 or 15 days Maximum.

Thursday, January 8, 2009

C Language (TC)

This is Turbo-C (TC) C-Language software. One of the most basic software learning tools available. It's in  .RAR format, so you will need WinRAR to unzip it. You can download this by using the link given below, it will take you to esnips website where you can hit the download button to download it.

Download TC Here

Tuesday, January 6, 2009

SSUET : Index Page

It's entirely upto you to make your own index page or if you just simply want to use the attachment here, then click the link below to download the file.



Download Here

SSUET : Lab Title Page

It's entirely upto you to make your own title page or if you just simply want to use the attachment here, then click the link below to download the file.

Download Here

SSUET : Background Logo

Click on the image to enlarge it for a better view



Monday, January 5, 2009

SSUET : written Logo

Click on the image to enlarge it for a better view



SSUET : Logo ( Simple: Black, Colored: Green )

Click on the image to enlarge it for a better view





SSUET : Computer Engineering Department ( CED ) Logo

Click on the image to enlarge it for a better view



Sunday, January 4, 2009

4 Bit Counter


Click on the image to enlarge it for a better view



Saturday, January 3, 2009

Electronic Components


Click on the image to enlarge it for a better view



Circuit Elements & Logic Gates


Click on the image to enlarge it for a better view



Friday, January 2, 2009

Active & Passive Components

Active Components


ACTIVE components increase the power of a signal and must be supplied with the signal and a source of power.

  • BJT Transistor
  • FET Transistor
  • Operational Amplifier
  • Logic Gates


Passive Components

PASSIVE components do not increase the power of a signal. They often cause power to be lost. Some can increase the voltage at the expense of current, so overall there is a loss of power.

  • Resistor
  • Capacitor
  • Inductor
  • Diode

Thursday, January 1, 2009

Resistor Color Bands (Codes of the bands)

Click on the image to enlarge it for a better view


Black 0
Brown 1
Red 2
Yellow 3
Orange 4
Green 5
Blue 6
Violet 7
Gray 8
White 9
Gold 5 %
Silver 10 %
Empty 20 %