BGA 14 to DIP:
Download:
==========
Gerber Files: http://www.megaupload.com/?d=XPN4T40S
Posted by Circuit Negma on November 10, 2006
40 Pin Dip to 8 SOIC Converter:
Download Link:
============
Gerber Files : http://www.megaupload.com/?d=28Z27L2D
Posted in PCB | Leave a Comment »
Posted by Circuit Negma on November 10, 2006
Voltage Divider calculator:
This calculator aid the user with a voltage divider network to solve for any varaible in the voltage divider network. For example the user can input any three variables and let the calculator determine the forth variable.
To clear the Text Fields, the user must click on that field and it will clear automatically.
===================================================
Download Link:
—————-
http://www.megaupload.com/?d=VJ7068IO
Source Code: http://www.megaupload.com/?d=9JGRT8K6
Download Instructions:
————————
1. Right Click on the downloaded File.
2. Left Click on unzip. if you can not see winzip or unzip in the poped up menu. you need to download winzip.
http://www.winzip.com
3. Double click the unziped folder.
4. double click on “Voltage_Divider.jar” or “Voltage_Divider”.
A. If this does not work, go to START –> RUN –> type in “CMD” (without the “”), then type in the following command :
java -jar “X:\folder name\Voltage_Divider.jar”
X: is the drive name, EX: C
location of the program, Ex: Voltage_Divider
EX: java -jar C:\Voltage_Divider\Voltage_Divider.jar
B. If this does not work, then you need to download –> J2SE v 1.4.2_13 JRE [Java(TM) 2 Runtime Environment, Standard Edition 1.4.2_13]
https://sdlc6e.sun.com/ECom/EComActionServlet;jsessionid=65A1E940BCCCB55A2E1FA2802BBE5CED
Posted in Java | 9 Comments »
Posted by Circuit Negma on November 6, 2006
Current Bugs:
—————-
1. GUI works very well under 1280-1024 desktop settings. if the screen resolution is less than 1280-1024 you will not be able to see the complete GUI (graphical user interface) of the program. I am currently working on rebuilding the GUI.
2. The program work only up to 16-Bits at best.
===================================================
Download Link:
—————-
http://www.megaupload.com/?d=4VQZTCGW
Download Instructions:
————————
1. Right Click on the downloaded File.
2. Left Click on unzip. if you can not see winzip or unzip in the poped up menu. you need to download winzip.
http://www.winzip.com
3. Double click the unziped folder.
4. double click on “ADC_Tool.jar” or “ADC_Tool”.
If this does not work, then you need to download –> J2SE v 1.4.2_13 JRE [Java(TM) 2 Runtime Environment, Standard Edition 1.4.2_13]
https://sdlc6e.sun.com/ECom/EComActionServlet;jsessionid=65A1E940BCCCB55A2E1FA2802BBE5CED
Posted in Java | Leave a Comment »
Posted by Circuit Negma on November 1, 2006
Orig. Document: http://www.bleepingcomputer.com/startups/
====================================================================
There are currently 16080 startup items in our database.
Startup programs are programs that are automatically started by Windows when the operating system starts. The problem is that many programs, viruses, hijackers, spyware, and other malware set themselves to start automatically when Windows starts. As more and more programs are started automatically, your computer’s valuable resources are drained, thus making your computer start to operate slow.
This database will allow you to search for programs that you find starting automatically on your computer and determine if they are considered to be malware (harmful), unnecessary to run, or necessary to run. To examine your computer for programs that are automatically started by Windows, you can download and install Autoruns by Sysinternals. You can then search for entries found in the programs output using this database to determine if the program should be running. If from the information you decide they are not necessary to run, you can uncheck that entry in the Autoruns program and it will no longer start.
Each entry in the database will have a Status assigned to it. The key to this status is the following:
Posted in Uncategorized | Leave a Comment »
Posted by Circuit Negma on November 1, 2006
Original Document: http://www.bleepingcomputer.com/startups/aDir-16272.html
=================================================================
How to remove a Trojan, Virus, Worm, or other Malware
Table of Contents
Dialers, Trojans, Viruses, and Worms Oh My!
If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.
Malware – Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.
This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won’t be covered under this tutorial.
Before we continue it is important to understand the generic malware terms that you will be reading about.
Adware – A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware. There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.
Backdoor – A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.
Dialler – A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.
Hijackers – A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker’s own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information.
Spyware – A program that monitors your activity or information on your computer and sends that information to a remote computer without your knowledge.
Trojan – A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.
Virus – A program that when run, infects other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive or displaying a joke in a small box. This type of infection also is localized to your computer and does not have the ability to spread to another computer. The word virus is commonly used a general term that encompasses trojans, worms, and viruses.
Worm – A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.
Just like any program, in order for the program to work, it must be started. Malware programs are no different in this respect and must be started in some fashion in order to do what they were designed to do. For the most part these infections run by creating a configuration entry in the Windows Registry in order to make these programs start when your computer starts.
Unfortunately, though, in the Windows operating system there are many different ways to make a program start which can make it difficult for the average computer user to find manually. Luckily for us, though, there are programs that allow us to cut through this confusion and see the various programs that are automatically starting when windows boots. The program we recommend for this, because its free and detailed, is Autoruns from Sysinternals.
When you run this program it will list all the various programs that start when your computer is booted into Windows. For the most part, the majority of these programs are safe and should be left alone unless you know what you are doing or know you do not need them to run at startup.
At this point, you should download Autoruns and try it out. Just run the Autoruns.exe and look at all the programs that start automatically. Don’t uncheck or delete anything at this point. Just examine the information to see an overview of the amount of programs that are starting automatically. When you feel comfortable with what you are seeing, move on to the next section.
How to remove these infections
We have finally arrived at the section you came here for. You are most likely reading this tutorial because you are infected with some sort of malware and want to remove it. With this knowledge that you are infected, it is also assumed that you examined the programs running on your computer and found one that does not look right. You did further research by checking that program against our Startup Database or by searching in Google and have learned that it is an infection and you now want to remove it.
If you have identified the particular program that is part of the malware, and you want to remove it, please follow these steps.
Download and extract the Autoruns program by Sysinternals to C:\Autoruns
How to protect yourself in the future
In order to protect yourself from this happening again it is important that take proper care and precautions when using your computer. Make sure you have updated antivirus and spyware removal software running, all the latest updates to your operating system, a firewall, and only open attachments or click on popups that you know are safe. These precautions can be a tutorial unto itself, and luckily, we have one created already:
Simple and easy ways to keep your computer safe and secure on the Internet
Please read this tutorial and follow the steps listed in order to be safe on the Internet. Other tutorials that are important to read in order to protect your computer are listed below.
Understanding Spyware, Browser Hijackers, and Dialers
Understanding and Using Firewalls
Safely Connecting a Computer to the Internet
Using Spybot – Search & Destroy to remove Spyware from Your Computer
Using Ad-Aware SE to remove Spyware & Hijackers from Your Computer
Using SpywareBlaster to protect your computer from Spyware, Hijackers, and Malware
Using IE-Spyad to enhance your privacy and Security
Now that you know how to remove a generic malware from your computer, it should help you stay relatively clean from infection. Unfortunately there are a lot of malware that makes it very difficult to remove and these steps will not help you with those particular infections. In situations like that where you need extra help, do not hesitate to ask for help in our computer help forums. We also have a self-help section that contains detailed fixes on some of the more common infections that may be able to help. This self-help section can be found here:
Posted in Uncategorized | 1 Comment »