Pages

Sunday, November 7, 2010

Free Proxy Servers - Anonymous Web Surfing - Unblock Websites

http://maspireinfosystems.com/images/free-web-proxy-server.png

Learn About Free Proxy Servers, How to Unblock Websites, Surf Anonymously


Perhaps you are blocked from visiting MySpace or Facebook at work. Maybe you just want to make sure that you won't be a victim of identity theft. Or you might want to check out your bank balance at an Internet cafe - and don't want anyone to know your account or your password.

Whatever your reason - unblocking websites, protecting your identity, or surfing anonymously, free proxy servers can accomplish all of these tasks for you.

Learn where to find free proxy sites, how to use them, and their benefits here at our page dedicated to free proxy servers.
 
A lot of people are scared and concerned about their anonymity online. With many cyber criminals just waiting to steal your identity - including your personal details such as credit card numbers, one has to be a little more careful when surfing on the Internet.

It is even more crucial when you are using a public computer to view personal information. For example, if you were to go to an Internet cafe checking your bank account information, the next person to use the computer could potentially access your banking information.

But, if you use a proxy server, none of your sensitve information is stored on the computer that you are sitting at, ensuring that all your sensitive and personal information remains safe and secure.

Why Use A Free Proxy Server? 

Free proxy servers protect your identity online

“Protect yourself from identity theft with a free proxy website when using public computers”

The Truth About Public Computers 

Ask yourself this: is there any privacy in public?

Alright, let me shatter some myths for you.

Most Internet cafés claim that they are safe places for you to surf the Internet. The one thing that they don't do is tell you how to protect your sensitive information.

The biggest problem is that computers store cookies which have information about the sites you visit and these sites may save a cookie when you enter the password.

This can translate into a problem if you forget to delete the cookies and history when you logoff the public computer that you are using. If you do forget, there is the possibility that the next user could access that information and use it to gain access to the sites you visited while at the public computer.

So are public computers private and safe?

Neither.

Unless you know the precautions you need to take to erase your tracks (or use a free proxy server), don't visit any sites that you have to login to access them (think e-mail and membership sites) and don't visit any of your banking sites while on a public computer.

Try These Free Proxy Websites 

Safe, Secure, Anonymous Proxy Servers

Do you worry about your anonymity online? Or are you blocked from your favorite website at work or school? Try some of these proxy websites.
Free Proxy Server
This free proxy server has one cool design. This is a web proxy that allows you to unblock MySpace, unblock Facebook, and more.
Bypass School Filter
Designed primarily to be used at school you can use Bypass School Filter to visit MySpace, Facebook, Bebo, Orkut and more.
MySpace Proxy
Perhaps one of the most commmonly blocked websites online is MySpace. Unblock MySpace with this fast and beautifully desined site.
Orkut Proxy
Orkut is another social networking site that is typically blocked at work. Enjoy the speed and privacy provided by our Orkut inspired web proxy.
Free Proxy Website
Brand new free proxy website that will allow you to visit My Space, Facebook, Orkut, and all of the other favorite websites that you love.

Have you used free proxy servers? 

Share your experiences with anonymous web surfing.

I know that a lot of you have never heard of free proxy servers before - but a lot of you have. Share your experiences (good and bad) with free proxy servers, anonymous surfing, and identity theft.

Tuesday, November 2, 2010

WiMAX- A NEW REVOLUTION IN WIRELESS INTERNET

http://areacellphone.com/wp-content/uploads/2010/05/wimax.jpg

GadgTechWorld.blogspot.com

WiMAX is the latest technology in the field of wireless internet. In fact it is the only available technology which enables broadband in wireless internet. WiMAX is the acronym for worldwide interoperability for microwave access. To phrase in simple words, WiMAX enables the users to access high speed internet with extreme mobility. This technology has several benefits when compared with existing WiFi technology. WiMAX uses microwave as a medium for data transfer which means a tower similar to the cell phone tower is used. Due to the use of microwaves, for a range of thirty miles, the data transfer rate can be nearly 75 MBPS. This would enable high speed internet access to more than 1000 computers from a single tower. The major advantages of WiMAX are, rural areas will be able to access broadband internet very easily at a much cheaper rate, Setting up internet access for the whole city can be completed within a couple of days. This would mean that in the near future we would be able to access the internet as if we are using the cell phones. It is possible to get hooked to the net from almost anyplace in the world.

Network scale
The smallest-scale network possible is a personal area network (PAN). A PAN allows devices to communicate with each other over short distances. Bluetooth is the best example of a PAN. A local area network (LAN) can also be easily setup. A LAN allows devices to share information, but is limited to a fairly small central area, such as a company's headquarters, a coffee shop or your house. Many LANs use WiFi to connect the network wirelessly. 

WiMAX is the wireless solution for the next step up in scale, the metropolitan area network (MAN). A MAN allows large areas to be connected, i.e. the size of a city can be connected very easily.
http://hzh3.com/wp-content/uploads/2009/06/060809_wimax.gif

GET READY TO ENJOY HI-SPEED WIRELESS BROADBAND CONNECTION AT A MINIMAL COST

Capture Screenshots with ease

GadgTechWorld.blogspot.com

Save time and Enhance your Screenshots with this freeware Software.
Usually when you hit the Print Screen button it loads the current screen into your clipboard.
To save the image you have to open up an image-editing application, paste it, then save the file .
Gadwin's free PrintScreen streamlines this whole process.

It sits in your System Tray, and you can set a number of options. When you hit print screen (or whichever button you specify), you can choose to save the screen directly to a specific folder. You can also choose to save just a window, or a specific area of the screen.

Other Options:

>You can send the screen capture directly to your printer or as an email.
>Automatically resize the picture to specified dimensions.
>You can select the type of image you want to save.


Gadwin PrintScreen allows much more flexibility with that Print Screen button at the top of your keyboard.

Download here http://www.gadwin.com/printscreen/
Size: 2.76 mb

or download from Softpedia

Portable Applications for your USB Thumb Drive

GadgTechWorld.blogspot.com


















The cost of USB Thumb Drive has dropped significantly during the past few years. To make use of the amount of storage in those drives, I recommend the use of this PortableApps.

PortableApps is a collection of portable software that allow customers to add to USB Thumb Drive. There are a total of 12 different applications for your everyday use. It also included a user menu as illustrated in one of the picture I attached.



The list of these application in the standard version includes:


PortableApps Suite (Standard Edition):
  • ClamWin Portable (antivirus),
  • Mozilla Firefox - Portable Edition (web browser),
  • Gaim Portable (instant messaging),
  • OpenOffice.org Portable (office suite),
  • Sudoku Portable (puzzle game),
  • Mozilla Sunbird - Portable Edition (calendar/task manager)
  • Mozilla Thunderbird - Portable Edition (email client) and runs comfortably from a 512MB drive.
Website to download - http://portableapps.com/suite


Download complete websites to your desktop and surf them offline.

GadgTechWorld.blogspot.com

Website eXtractor saves you time and effort by downloading entire Internet sites (or the sections you stipulate) to your hard drive.

Whether you browse the web for research, work, or fun, there's nothing worse than having to wait for page after page to load in Internet Explorer or Netscape Navigator (or in other popular browsers). The problem is they will only load one page at a time. So if you are viewing a large website with a thousand pages, you'd have to click the mouse a thousand times ... and ... choose a directory/folder a thousands times when you want to save each file. You end up spending a lot of time waiting around and not enough time reading or viewing pages on the Internet.
Note: Using a regular browser to surf large websites or photo galleries takes the fun out of web browsing and makes research a real chore.
But now, with WebSite eXtractor, you can download whole websites (or parts of them) in one go to your computer. You can then view the whole site offline at your leisure - and you can whiz through the saved pages at lightning speed.
WebSite eXtractor is a great tool for researchers, journalists, students, equity analysts, business and marketing executives - as well as for those who want to browse family websites containing digital photo albums.
Advantages :
  • Transfer whole websites to CD-ROM or floppy
  • Another big benefit of the program is it changes html-links to relative names. In other words, it turns web addresses (URLs) into addresses that work on your computer.
  • Researchers, writers, and journalists can easily archive reference material from the Internet.
  • The program can download up to 100 files at a time, which saves you a huge amount of time compared to ordinary browsers.
  • Website eXtractor automatically lets you download any files that were not copied due to transfer errors or bad connections.

To download the full version use the given torrent :
http://torrents.thepiratebay.org/3655896/Website_eXtractor_9.52_Retail.3655896.TPB.torrent

If you dont have torrent client download from here :
http://www.internet-soft.com/DEMO/webextrasetup.exe

Download Multiple Free Files From Rapidshare

GadgTechWorld.blogspot.com
 
Rapidshare allows to download only a single file at a time with free account. If you want to download multiple files at the same time, you need to buy a premium account but now you can download multiple files from Rapidshare free account without paying anything with RapidShare Download Accelerator.




With RapidShare Download Accelerator, you can add all the files you'd like to download, and it will do all the annoying work for you. Now you can just sit back and watch your files download without paying a dime.

Links : Download Rapidshare Download Accelerator

Remove Autorun Virus Infection - Solution for USB, PC & Laptops

GadgTechWorld.blogspot.com

Nowadays, there is a new problem that is cropping up in almost all schools,colleges, hostels etc. where the malicious Autorun Virus is Creating Havoc by spreading to Laptops and PC through USB Drives etc.

How to Stop the Autorun PC Virus Infection ?

The free Panda USB Vaccine allows users to vaccinate their PCs in order to disable Autorun completely so that no program from any USB/CD/DVD drive (regardless of whether they have been previously vaccinated or not) can auto-execute. This is a really helpful feature as there is no user friendly and easy way of completely disabling Autorun on a Windows PC.



Panda USB Vaccine is a 100% free utility. Its tested under Windows 2000 SP4, Windows XP SP1-SP3, and Windows Vista SP0 and SP1.
Download : Click Here to get Panda USB Vaccine

Configuring BitTorrent or MuTorrent To Get Fast Downloading Speed

http://www.softsailor.com/wp-content/uploads/2010/03/BitTorrent.jpg

GadgTechWorld.blogspot.com

Normally when downloading torrents through torrent clients (Mu torrent etc) one does not get good downloading speeds and it becomes very annoying especially on slow internet connections. Actually it is not the software or torrents at fault but the default settings of MuTorrent (Or BitTorrent) are the culprits. When you download a torrent it is not only downloaded but also uploaded at the same time (Actually it is “Sharing”). Thus uploading also take your bandwidth reducing downloading speeds. By tweaking some settings you can reduce uploading speeds and increase downloading speed. Just follow the below given instructions:

1. Launch Mu Torrent and go to “Options/Preferences” (Or simply press Ctrl+P keys)
2. Change the default settings according to the below given snapshots i.e. the settings must be changed exactly as in the pictures below.
3. Click “Apply” and then “OK” and you are done

Installing and configuring a Wireless Router

GadgTechWorld.blogspot.com

http://www.mobilefish.com/images/tutorials/linksys_install.gif
A wireless router affords laptop or portable computer users greater mobility in their homes and businesses. In most home networks, wireless routers are connected to a cable or DSL modem, and the router sends the signals and information that make up an Internet protocol (IP) thread to the user's computer via radio signals rather than wires.
To communicate with the wireless router, individual computers house transceivers such as an internal expansion card, a peripheral docked by USB or, in the case of laptops, a PC card or hard-wired internal device. For those accessing the Internet through a high-speed connection, a wireless router can also serve as a hardware firewall (as opposed to a software program), enabling protection from undesirable outside computers without exhausting as many system resources as traditional firewall programs.


Installing a Wireless Router
First, turn off the PC and modem, then remove the Ethernet cable from the PC and plug it into the router's WAN port. Install a second Ethernet cable between the PC's Ethernet port and one of the router's Ethernet ports. Power the modem, router and then PC, waiting for the system to boot and initialize before attempting an Internet connection.
Most routers are programmed with the manufacturer's default settings, including the network's name or service set identifier (SSID), channel and sign-on password. These default settings generally may be changed using included software or an online setup utility provided by the router's manufacturer.
Configure the router by entering the router configuration IP address at the URL provided, followed by the configuration utility ID and the default password. To find your router's default IP address and the default login info, refer to the owner's manual. If you own a Linksys router, a popular brand, the IP address is usually 192.168.1.1. Two other popular brands, D-Link and Netgear, generally use 192.168.0.1.

Connecting a Printer to a Wireless Router

First, check the documentation that came with your printer to determine how it's designed to connect to computers. Connections made through Ethernet, USB and (obsolescent) parallel ports are common, but newer printers are sometimes wireless-enabled and allow you to simply add them to your wireless network.
Refer to the owner's manual for your particular wireless router. Inside, find the default IP address and the default login info. If you own a Linksys router, the IP address is usually 192.168.1.1. Other popular brands D-Link and Netgear generally use 192.168.0.1.

Connecting Two Wireless Routers

Bridging two wireless routers involves configuring both networks manually. Visit each network location - which should be recognized by your computer automatically - and configure the appropriate Service Set Identifier (SSID), Wireless Encryption Protocol (WEP) or WiFi Protected Access (WPA) key and authentication information. Make sure you know the SSID and WEP or WPA key ahead of time.

Connecting an Xbox 360 to a Wireless Router

Connecting an Xbox 360 to a wireless router allows you to use Xbox Live without physically connecting your Xbox to a cable. Power up your Xbox system and the router, then plug the wireless networking adapter into the two slots at the Xbox's rear. Unplug any existing Ethernet cables and connect the USB connector to the port adjacent to the adapter. Use the system area of the Xbox dashboard to adjust your network settings. This should connect you to the wireless network.

Monday, November 1, 2010

DHCP-(Dynamic Host Control Protocol)

IP addresses, by contrast, not only must be unique on a given internetwork, but also must reflect the structure of the internetwork. As noted above, they contain a network part and a host part, and the network part must be the same for all hosts on the same network. Thus, it is not possible for the IP address to be configured once into a host when it is manufactured, since that would imply that the manufacturer knew which hosts were going to end up on which networks, and it would mean that a host, once connected to one network, could never move to another. For this reason, IP addresses need to be reconfigurable.
http://www.networkingreviews.com/images/dhcp-server-client.jpg
In addition to an IP address, there are some other pieces of information a host needs to have before it can start sending packets. The most notable of these is the address of a default router—the place to which it can send packets whose destination address is not on the same network as the sending host. Most host operating systems provide a way for a system administrator, or even a user, to manually configure the IP information needed by a host. However, there are some obvious drawbacks to such manual configuration. One is that it is simplya lot of work to configure all the hosts in a large network directly, especially when you consider that such hosts are not reachable over a network until they are configured.


Even more importantly, the configuration process is very error-prone, since it is necessary to ensure that every host gets the correct network number and that no two hosts receive the same IP address. For these reasons, automated configuration methods are required. The primary method uses a protocol known as the Dynamic Host Configuration Protocol (DHCP).

DHCP relies on the existence of a DHCP server that is responsible for providing configuration information to hosts. There is at least one DHCP server for an administrative domain. At the simplest level, the DHCP server can function just as a centralized repository for host configuration information. Consider, for example, the problem of administering addresses in the internetwork of a large company. DHCP saves the network administrators from having to walk around to every host in the company with a list of addresses and network map in hand and configuring each host manually. Instead, the configuration information for each host could be stored in the DHCP server and automatically retrieved by each host when it is booted or connected to the network. However, the administrator would still pick the address that each host is to receive; he would just store that in the server. In this model, the configuration information for each host is stored in a table that is indexed by some form of unique client identifier, typically the “hardware address” (e.g., the Ethernet address of its network adaptor). A more sophisticated use of DHCP saves the network admininstrator from even having to assign addresses to individual hosts. In this model, the DHCP server maintains a pool of available addresses that it hands out to hosts on demand. This considerably reduces the amount of configuration an administrator must do, since now it is only necessary to allocate a range of IP addresses (all with the same network number) to each network.

Since the goal of DHCP is to minimize the amount of manual configuration required for a host to function, it would rather defeat the purpose if each host had to be configured with the address of a DHCP server. Thus, the first problem faced by DHCP is that of server discovery.

To contact a DHCP server, a newly booted or attached host sends a DHCPDISCOVER message to a special IP address (255.255.255.255) that is an IP broadcast address. This means it will be received by all hosts and routers on that network. (Routers do not forward such packets onto other networks, preventing broadcast to the entire Internet.) In the simplest case, one of these nodes is the DHCP server for the network. The server would then reply to the host that generated the discovery message (all the other nodes would ignore it). However, it is not really desirable to require one DHCP server on every network because this still creates a potentially large number of servers that need to be correctly and consistently configured. Thus, DHCP uses theconcept of a relay agent. There is at least one relay agent on each network, and it isconfigured with just one piece of information: the IP address of the DHCP server. Whena relay agent receives a DHCPDISCOVER message, it unicasts it to the DHCP server and awaits the response, which it will then send back to the requesting client. The processof relaying a message from a host to a remote DHCP server is shown in diagram 1-A Diagram 1-B shows the format of a DHCP message. The message is actually sent using a protocol called UDP (the User Datagram Protocol) that runs over IP. 
DHCP is derived from an earlier protocol called BOOTP, and some of the packet fields are thus not strictly relevant to host configuration. When trying to obtain configuration information, the client puts its hardware address (e.g., its Ethernet address) inthe chaddr field. The DHCP server replies by filling in the yiaddr (“your” IP address)field and sending it to the client. Other information such as the default router to be used by this client can be included in the options field.

In the case where DHCP dynamically assigns IP addresses to hosts, it is clear that hosts cannot keep addresses indefinitely, as this would eventually cause the server to exhaust its address pool. At the same time, a host cannot be depended upon to give back its address, since it might have crashed, been unplugged from the network,or been turned off. Thus, DHCP allows addresses to be “leased” for some period of time. Once the lease expires, the server is free to return that address to its pool. A host with a leased address clearly needs to renew the lease periodically if in fact it is still connected to the network and functioning correctly.  It is important to note that DHCP may also introduce some more complexity into network management,since it makes the binding between physical hosts and IP addresses muchmore dynamic. This may make the network manager’s job more difficult if, for example,it becomes necessary to locate a malfunctioning host.

Satellite internet- a new sense of technology

Today the world is mostly operating with help of satellites.so i posted here some of the useful information about the satellite internet access.

The satellite internet access is a wireless service that is extremely used in all over the world. But due to the non-availability of terrestrial internet access it cannot be connected.. It is also very popular among users of ‘movable’ locations.

http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2009/07/satellite_diagram.png
Let us see how does these satellite internet works?
The wireless connectivity and instant access to anywhere in the world 24x7 has lead technologists to now tap on internet access via satellite! This is a world wide availability that is being sourced and includes connectivity at sea and within land vehicles. The system basically comes in three types and the variants all use the connectivity enhanced via the local satellite service.
Connectivity via special hardware components:

The internet connectivity via satellite can be tapped through interface presence, like the telephone network that is ‘public-switched’ as in the case of the squawk box applications. In this case, a physical and separate internet ‘connection’ is not required. The system operates with the support of a server-to-queue-data connectivity and includes an FTP or File Transfer Protcol. In the case of connectivity via system hardware components, the transmitting station or the teleport is supported by two important components.

The internet connection is made possible when the ISP routers are connected to the designed proxy servers. This connectivity enforces the band-width limits of the QOS or ‘quality of service’, thus enabling user traffic. This connectivity is furthered to the DVB encapsulator and then, the S modem. The DVB-S modem then transmits an RF or radio frequency to the outdoor unit, through the up converter connected via a feed line. The system components also include a block up converter, an optional low noise block converter, an optional orthomode transducer, a feed horn and a waveguide. This connectivity is routed to an Earth station, which is a setup that consists of an outdoor and indoor unit.


Connectivity with help of the software components:

In case of remote sites, most satellite internet connections or one-way multicast applications need custom programming technology. This requires the software to be able to effectively filter, store and offer access to a selection interface and data. The transmitting station also needs to incorporate some software to handle access control and queuing-sending-encapsulating of the data on a prior basis. The remote sites require a programming back up to be able to provide authentication and take care of the proxy server settings essential to the operation. The filtering operation is provided by the DVB card driver, while the non-standard IP stacks address asymmetry and latency issues. The data is encrypted to be accessible to any satellite receiver.

The IP-over-satellite units usually incorporate proxy servers that are paired at the end-points and VPNs or virtual private network implementations. This is to ensure that communication between the clients and servers need not accept the inherent latency. The virtual private network implementations are designed for satellite links to handle long packet travel time. In connectivity via software components, the upload speeds are limited by the user's modem, and latency is high. The download speeds in such connectivity can be much faster than that in the case of dial-up.

Connectivity with one-way terrestrial return:
The satellite internet connectivity via one-way terrestrial return uses the traditional dial up access. The system has out-bound data traveling through a telephone-based modem.This enables the users to surf and download at broadband speeds! The GPRS enables a mobility that transmits in the field of 50 to 53 dBW. However, downloads are handled by satellite. While a license is required for the uplink station, there is no such requirement for users. Another type of the same system incorporates the use of the General Packet Radio Service. This system enhances the back-channel by using a standard GPRS connection. The upload volume in this system is low and the service is charged by volume uploaded. The mobile or satellite internet connectivity that is broadband enhanced can be accessed with the help of the recommended satellite dish width, a note-book and GPRS-GSM telephone.
If you know any further information about this post you can comment here and your comments are welcomed.

2012

2012 END OF THE WORLD - BELIEFS


SCIENTIFIC EXPERTS from around the world are predicting that five years from now, all life on Earth could well come to an end. Some are saying it’ll be humans that would set it off. Others believe that a natural phenomenon will be the cause. And the religious folks are saying it’ll be God himself who would press the stop button. The following are some likely arguments as to why the world would end by the year 2012.
http://thephilosophizers.com/wp-content/uploads/2010/01/world-end-2012-conspiracy-prediction-nostradamus.jpg

Reason One: Mayan calendar
The first to predict 2012 as the end of the world were the Mayans, a bloodthirsty race that were good at two things -- building highly accurate astrological equipment out of stone and sacrificing virgins.

Thousands of years ago they managed to calculate the length of the lunar moon as 329.53020 days, only 34 seconds out. The Mayan calendar predicts that the earth will end on December 21, 2012. Given that they were pretty close to the mark with the lunar cycle, it’s likely they’ve got the end of the world right as well.


Reason two: Sun storms
Solar experts from around the world monitoring the sun have made a startling discovery. Our sun is in a bit of strife. The energy output of the sun is, like most things in nature, cyclic and it’s supposed to be in the middle of a period of relative stability. However, recent solar storms have been bombarding the earth with lot of radiation energy. It’s been knocking out power grids and destroying satellites. This activity is predicted to get worse and calculations suggest it’ll reach its deadly peak sometime in 2012.

Reason three: The Atom smasher
Scientists in Europe have been building the world’s largest particle accelerator. Basically, its a 27 km tunnel designed to smash atoms together to find out what makes the universe tick. However, the mega-gadget has caused serious concern, with some scientists suggesting that it’s properly even a bad idea to turn it on in the first place. They’re predicting all manner of deadly results, including mini black holes. So when this machine is fired up for its first serious experiment in 2012, the world could be crushed into a super-dense blob the size of a basketball.

Reason Four: Super Volcano

Yellowstone National Park in United States is famous for its thermal springs and old faithful geyser. The reason for this is simple -- it’s sitting on top of the world’s biggest volcano and geological experts are beginning to get nervous sweats. The Yellowstone volcano has a pattern of erupting every 650,000 years or so, and we’re many years overdue for an explosion that will fill the atmosphere with ash, blocking the sun and plunging the earth into a frozen winter that could last up to 15,000 years. The pressure under the Yellowstone is building steadily, and geologists have set 2012 as a likely date for the big bang.

Reason Five: The Physicists
This one’s case of bog -- simple maths mathematics. Physicists at Berkely University have been crunching the numbers. They’ve determined that the earth is well overdue for a major catastrophic event. Even worse, they’re claiming that their calculations prove that we’re all going to die, very soon. They are also saying that their prediction comes with a certainty of 99 per cent; and 2012 just happens to be the best guess as to when it occurs.

Reason Six: Earth’s Magnetic field
We all know the Earth is surrounded by a magnetic field that shields us from most of the sun’s radiation. What you might not know is that the magnetic poles we call North and South have a nasty habit of swapping places every 750,000 years or so -- and right now we’re about 30,000 years overdue. Scientists have noted that the poles are drifting apart roughly 20-30 kms each year, much faster than ever before, which points to a pole-shift being right around the corner. While the pole shift is under way, the magnetic field is disrupted and will eventually disappear, sometimes for up to 100 years. The result is enough UV outdoors to crisp your skin in seconds, killing everything it touches.
http://www.wallpaperez.info/wallpaper/movie/2012-1944.jpg

Nano Technology

Introduction to Nanotechnology
Nanotechnology is defined as the study and use of structures between 1 nanometer and 100 nanometers in size. To give you an idea about this is, it would take eight 100 nanometer particles side by side to match the width of a human hair.


Introduction to the Nanoparticles
Scientists have been studying and working with nano particles for centuries, but the effectiveness of their work has been hampered by their inability to see the structure of nano particles. In recent decades the development of microscopes capable of displaying particles as small as atoms has allowed scientists to see what they are working with.















 





Applications of Nano Technology:
Medicine
Researchers are developing customized nano particles the size of molecules that can be deliver drugs directly to diseased cells in human body. When it's perfected, this method should be greatly reduce the damage treatment such as chemotherapy does to a patient's healthy cells. Nano medicine refers to future developments in medicine that will be based on the ability to build nano robots. In the future these nano robots could actually be programmed to repair specific diseased cells, functioning in a similiar way to antibodies in our natural healing processes

Electronics
Nanotechnology holds some answers for how we might increase the capabilities of electronics devices while we reduce their weight and power consumption.

Space
Nanotechnology may hold the key to making space-flight more practical. Advancements in nano materials make lightweight solar sails and a cable for the space elevator possible. By significantly reducing the amount of rocket fuel required, these advances could lower the cost of reaching orbit and traveling in space.

Food
Nanotechnology is having an impact on several aspects of food science, from how food is grown to how it is packaged. Companies are developing nano materials that will make a difference not only in the taste of food, but also in food safety, and the health benefits that food delivers

Fuel Cells
Nanotechnology is being used to reduce the cost of catalysts used in fuel cells to produce hydrogen ions from fuel such as methanol and to improve the efficiency of membranes used in fuel cells to separate hydrogen ions from other gases such as oxygen.

Solar Cells

Companies have developed nanotech solar cells that can be manufactured at significantly lower cost than conventional solar cells.

Batteries
Companies are currently developing batteries using nano materials. One such battery will be a good as new after sitting on the shelf for decades. Another battery can be recharged significantly faster than conventional batteries.

Fuels
Nanotechnology can address the shortage of fossil fuels such as diesel and gasoline by making the production of fuels from low grade raw materials economical, increasing the mileage of engines, and making the production of fuels from normal raw materials more efficient.

Chemical Sensors

Nanotechnology can enable sensors to detect very small amounts of chemical vapors. Various types of detecting elements, such as carbon nano tubes, zinc oxide nanowires or palladium nano particles can be used in nanotechnology-based sensors. Because of the small size of nano tubes, nano wires, or nano particles, a few gas molecules are sufficient to change the electrical properties of the sensing elements. This allows the detection of a very low concentration of chemical vapors.

Better Air Quality
Nanotechnology can improve the performance of catalysts used to transform vapors escaping from cars or industrial plants into harmless gasses. That's because catalysts made from nano particles have a greater surface area to interact with the reacting chemicals than catalysts made from larger particles. The larger surface area allows more chemicals to interact with the catalyst simultaneously, which makes the catalyst more effective.

Cleaner Water
Nanotechnology is being used to develop solutions to three very different problems in water quality. One challenge is the removal of industrial wastes, such as a cleaning solvent called TCE, from groundwater. Nano particles can be used to convert the contaminating chemical through a chemical reaction to make it harmless. Studies have shown that this method can be used successfully to reach contaminates dispersed in underground ponds and at much lower cost than methods which require pumping the water out of the ground for treatment.

Fabric
Making composite fabric with nano-sized particles or fibers allows improvement of fabric properties without a significant increase in weight, thickness, or stiffness as might have been the case with previously-used techniques.

Sporting Goods
If you are a tennis or golf fan, you will be glad to hear that even sporting goods has wandered into the nano realm. Current nanotechnology applications in the sports arena include increasing the strength of tennis racquets, filling any imperfections in club shaft materials and reducing the rate at which air leaks from tennis balls.

Multiple Access Techniques In Cellular Systems

Hi this is an article about the Multiple Access Techniques used in the cellular systems.





                                                                                                                                                                The goal in the design of a cellular system is to be able to handle as many calls as possible in a given bandwidth with the specifi ed blocking probability (reliability).

Multiplexing deals with the division of the resources to create multiple channels. Multiplexing can create channels in frequency, time, etc., and the corresponding terms are then frequency division multiplexing (FDM), time division multiplexing (TDM), etc. Since the amount of spectrum available is limited, we need to fi nd ways to allow multiple users to share the available spectrum simultaneously. Shared access is used to implement a multiple access scheme when access by many users to a channel is required.

For example, one cancreate multiple channels using TDM, but each of these channels can be accessedby a group of users using the ALOHA multiple access scheme. The multiple access schemes can be either reservation-based or random.

Multiple access schemes allow many users to share the radio spectrum. Sharing the bandwidth effi ciently among users is one of the main objectives of multiple access schemes.



The variability of wireless channels presentsboth challenges and opportunities in designing multiple access communicationssystems. Multiple access strategy has an impact on robustness and interference levels generated in other cells. Therefore, multiple access schemes are designed to maintain orthogonality and reduce interference effects.

Multiple access schemes can be classifi ed as reservation-based multiple access (e.g., FDMA, TDMA, CDMA) and random multiple access (e.g., ALOHA, CSMA) . If data traffi c is continuous and a small transmission delay is required (for example in voice communication) reservationbased multiple access is used. The family of reservation-based multiple access includes frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA). In many wireless systems for voice communication, the control channel is based on random multiple access and the communication channel is based on FDMA, TDMA, or CDMA.

The reservation-based multiple access technique has a disadvantage in that once the channel is assigned, it remains idle if the user has nothing to transmitwhile other users may have data waiting to be transmitted. This problem is critical when data generation is random and has a high peak-rate to average-rate ratio. In this situation, random multiple access is more effi cient, because a communication channel is shared by many users and users transmit their data in a random or partially coordinated fashion.

ALOHA and carrier sense multiple access (CSMA) are examples of random multiple access. If the data arrives in a random manner, and the data length is large, then random multiple access combined with a reservation protocol will perform better than both random- and reservationbased schemes.

GPRS in GSM















Hi this is about the GPRS technology that is widely used in GSM Phones.

The general packet radio service (GPRS) enhances GSM data services
signifi cantly by providing end-to-end packet switched data connections. This is
particularly effi cient in Internet/intranet traffi c, where short bursts of intense data
communications are actively interspersed with relatively long periods of inactivity.
Because there is no real end-to-end connection to be established, setting up a
GPRS call is almost instantaneous and users can be continuously on-line. Users have the additional benefi ts of paying for the actual data transmitted, rather than for connection time. Because GPRS does not require any dedicated end-to-end connection, it only uses network resources and bandwidth when data is actually being transmitted. This means that a given amount of radio bandwidth can be shared effi ciently among many users simultaneously.

The next phase in the high-speed road map is the evolution of current short message service (SMS), such as smart messaging and unstructured supplementary service data (USSD), toward the new GPRS, a packet data service using TCP/IP and X.25 to offer speeds up to 115 kbps. GPRS has been standardized to optimally
support a wide range of applications ranging from very frequent transmissions of medium to large data volume. Services of GPRS have been developed to reduce connection set-up time and allow an optimum usage of radio resources. GPRS provides a packet data service for GSM where time slots on the air interface
can be assigned to GPRS over which packet data from several mobile stations is multiplexed.


A similar evolution strategy, also adopting GPRS, has been developed for DAMPS (IS-136). For operators planning to offer wideband multimedia services, the move to GPRS packet-based data bearer service is signifi cant; it is a relatively small step compared to building a totally new 3G IMT-2000 network. Use of the GPRS network architecture for IS-136 packet data service enables data subscription roaming with GSM networks around the globe that support GPRS and its evolution. The IS-136 packet data service standard is known as GPRS-136. GPRS-136 provides the same capabilities as GSM GPRS. The user can access either X.25 or an IP-based data network. GPRS provides a core network platform for current GSM operators not only to expand the wireless data market in preparation for the introduction of 3G services, but also a platform on which to build IMT-2000 frequencies should they acquire them.

The implementation of GPRS has a limited impact on the GSM core network. It simply requires the addition of new packet data switching and gateway nodes, and an upgrade to existing nodes to provide a routing path for packet data between the wireless terminal and a gateway node. The gateway node provides interworking with external packet data networks for access to the Internet, intranet, and databases.

GPRS supports all widely used data communicationsprotocols, including IP, so it is possible to connect with any data source fromanywhere in the world using a GPRS mobile terminal.  GPRS supports applications ranging from low-speed short messages to high-speed corporate LAN communications. However, one of the key benefi ts of GPRS — that it is connected through the existing GSM air interface modulation scheme — is also a limitation, restricting its potential for delivering higher data rates than 115 kbps. To build even higher rate data capabilities into GSM, a new modulation scheme is needed.

GPRS can be implemented in the existing GSM systems. Changes are required in an existing GSM network to introduce GPRS. The base station subsystem (BSS) consists of a base station controller (BSC) and packet control unit (PCU). The PCU supports all GPRS protocols for communication over the air interface. Its function is to set up, supervise, and disconnect packet switched calls. The packet control unit supports cell change, radio resource confi guration, and channel assignment. The base station transceiver (BTS) is a relay station without protocol functions. It performs modulation and demodulation.

HSCSD (High Speed Circuit Switching Data)

Hi this is one data transfering technology used in the GSM mobiles for internet usage.

High-speed circuit switched data (HSCSD) is a feature that enables the co-allocation of multiple full rate traffi c channels (TCH/F) of GSM into an HSCSD confi guration. The aim of HSCSD is to provide a mixture of services with different air interface user rates by a single physical layer structure. The available capacity of an HSCSD confi guration is several times the capacity of a TCH/F, leading to a significant enhancement in air interface data transfer capability.
http://www.tech-faq.com/images/Article_Images/High-Speed-Circuit-Switched-Data.jpg

Ushering faster data rates into the mainstream is the new speed of 14.4 kbps per time slot and HSCSD protocols that approach wireline access rates of up to 57.6 kbps by using multiple 14.4 kbps time slots. The increase from the current baseline of 9.6 kbps to 14.4 kbps is due to a nominal reduction in the error- correction overhead of the GSM radio link protocol (RLP), allowing the use of a higher data rate.

For operators, migration to HSCSD brings data into the mainstream, enabled in many cases by relatively standard software upgrades to base station (BS) and mobile switching center (MSC) equipment. Flexible air interface resource allocation allows the network to dynamically assign resources related to the air interface
usage according to the network operator’s strategy, and the end-user’s request for a change in the air interface resource allocation based on data transfer needs. The provision of the asymmetric air interface connection allows simple mobile equipment to receive data at higher rates than otherwise would be possible with a symmetric connection.

For end-users, HSCSD enables the roll-out of mainstream high-end segment services that enable faster web browsing, fi le downloads, mobile video-conference and navigation, vertical applications, telematics, and bandwidth-secure mobile local area network (LAN) access. Value-added service providers will also be able
to offer guaranteed quality of service and cost-effi cient mass-market applications, such as direct IP where users make circuit-switched data calls straight into a GSM network router connected to the Internet. To the end-user, the value-added service provider or the operator is equivalent to an Internet service provider that offers a fast, secure dial-up Internet protocol service at cheaper mobile-to-mobile rates. HSCSD is provided within the existing mobility management.  Roaming is also possible. The throughput for an HSCSD connection remains constant for the duration of the call, except for interruption of transmission during handoff. The handoff is simultaneous for all time slots making up an HSCSD connection. Endusers wanting to use HSCSD have to subscribe to general bearer services. Supplementary services applicable to general bearer services can be used simultaneously with HSCSD.



Firmware on most current GSM PC cards needs to be upgraded. The reduced RLP layer also means that a stronger signal strength is necessary. Multiple time slot usage is probably only effi ciently available in off-peak times, increasing overall off-peak idle capacity usage. HSCSD is not a very feasible solution for bursty
data applications.


ENHSCSD=FALSE,
object: BSC [BASICS]
range: TRUE, FALSE
default: FALSE

Enable HSCSD, this parameter specifies whether the feature 'High Speed Circuit Switched Data (HSCSD)' is enabled for the BSC or not.

Notes:
1) This parameter enables HSCSD for the BSC base only. To activate it, however, it must be explicitly enabled for each BTS (see CREATE BTS [BASICS]: BTSHSCSD).

2) As a mandatory precondition for HSCSD the features 'early classmark sending' (see SET BTS  [OPTIONS]:EARCLM) and 'pooling' (see parameter ENPOOL) must be enabled! 

Principle: HSCSD is a feature which allows the 'bunching' of up to 4 consecutive radio timeslots for data connections of up to 38,4 (= 4 x 9,6) kbit/s (multislot connections). The data rate depends on the bearer capability requested by the MS and the negotiation result between MS and MSC. Each HSCSD connection consists of 1 main TCH which carries the main signalling (both FACCH and SACCH) and further 1..3  secondary TCHs. All radio timeslots used for one connection are FR timeslots located on the same TRX and
use the same frequency hopping mode and the same TSC. 

Connection modes: There are 2 types of multislot connections:
Symmetric and asymmetric ones. In symmetric mode all secondary TCHs are bi-directional (UL and DL) and in asymmetric mode the secondary channels are only uni-directional (DL) TCHs or can be a mix of  bi-directional and uni-directional TCHs (example: One 'HSCSD 3+2' call consists of: one main TCH, one secondary bi-directional TCH and one secondary uni-directional TCH). The downlink based asymmetry allows the use of a receive rate higher than the transmission rate and is thus very typical for Internet  applications. The asymmetric mode is only possible for non-transparent data connections.

Resource allocation: The BSC is responsible for the flexible air resource allocation. It may alter the number of TCH/F as well as the channel codings used for the connection. Reasons for the change of the resource allocation may be either the lack of radio resources, handover and/or the maintenance of the service quality. The change of the air resource allocation is done by the BSC using 'service level upgrading and downgrading' procedures. For transparent HSCSD connections the BSC is not allowed to change the user data rate, but it may alter the number of TCHs used by the connection (in this case the data rate per TCH changes). For non-transparent calls the BSC is also allowed to downgrade the user rate to a lower value.

Handover: 

In symmetric mode individual signal level and quality reporting for each used channel is applied. For an asymmetric HSCSD configuration individual signal level and quality reporting is used for the main TCH. The quality measurements reported on the main channel are based on the worst quality measured on the main and the unidirectional downlink timeslots used. In both symmetric and asymmetric HSCSD configuration the neighbour cell measurements are reported on each uplink channel used. All TCHs used in an HSCSD connection are handed over simultaneously. The BSC may alter the number of timeslots used for the connection and the channel codings when handing the connection over to the new channels. All kinds of inter-cell handovers are supported, intracell handover is possible only with cause 'complete to inner' or 'inner to complete'.

Data Evolution in GSM Technology

Hi this is about the evolution in GSM Technology for data transfers.

From a radio access perspective, adding 3G capabilities to 2G systems mainly means supporting higher data rates. Possible scenarios depend on spectrum availability for the network service provider. Depending on the spectrum situation, two different migration paths can be supported:

Reframing of existing spectrum bands
New or modified spectrum bands
http://www.galtotronic.com/images/Gsm_network.png

Two 3G radio access schemes are identifi ed to support the different spectrum scenarios:

1. Enhanced data rates for GSM evolution (EDGE) with high-level modulation in  a 200 kHz TDMA channel is based on plug-in transceiver equipment, thereby allowing the migration of existing bands in small spectrum  segments.

2. Universal mobile telecommunications services (UMTS) is a new radio  access network based on 5 MHz WCDMA and optimized for effi cient support of 3G services. UMTS can be used in both new and existing spectra.

From a network point of view, 3G capabilities implies the addition of packet switched (PS) services, Internet access, and IP connectivity. With this approach, the existing mobile networks reuse the elements of mobility support, user authentication service handling, and circuit switched (CS) services. With packet switched services, IP connectivity can then be added to provide a mobile multimedia core network by evolving the existing mobile network.

GSM is moving to develop enhanced cutting-edge, customer-focused solutions to meet the challenges of the new millennium and 3G mobile services [29]. When GSM was fi rst introduced, no one could have predicted the dramatic growth of the Internet and the rising demand for multimedia services. These developments have brought about new challenges to the world of GSM. For GSM operators, the emphasis is now rapidly changing from that of instigating and driving the development of technology to fundamentally enabling mobile data transmission to that of improving speed, quality, simplicity, coverage, and reliability in terms of tools and services that will boost mass market take-up.

Users are increasingly looking to gain access to information and services wherever they are and whenever they want. GSM should provide that connectivity. Internet access, web browsing and the whole range of mobile multimedia capability are the major drivers for development of higher data speed technologies. Current data traffi c on most GSM networks is modest, less than 5% of total GSM traffi c. But with the new initiatives coming to fruition during the course of the next two to three years, exponential growth in data traffi c is forecast. The use of messaging-based applications may reach up to about 90% by the year 2008. GSM data transmission using high-speed circuit switched data (HSCSD) and GPRS may reach a penetration of about 80% by 2008 [1]. GSM operators have two nonexclusive options for evolving their networks to 3G wideband multimedia operation: (1) using GPRS and EDGE in the existing radio spectrum, and in small amounts of the new spectrum; or (2) using WCDMA in the new 2 GHz bands, or in large amounts of the existing spectrum. Both approaches offer a high degree of investment fl exibility because roll-out can proceed in line with market demand with the extensive reuse of existing network equipment and radio sites.

In the new 2 GHz bands, 3G capabilities are delivered using a new wideband radio interface that offers much higher user data rates than are available today — 384 kbps in the wide area and up to 2 Mbps in the local area. Of equal importance for such services is the high-speed packet switching provided by GPRS and its connection to public and private IP networks.

GSM and digital (D)AMPS (IS-136) operators can use existing radio bands to deliver some of the 3G services, even without the new wideband spectrum by evolving current networks and deploying GPRS and EDGE technologies. In the early years of 3G service deployment, a large proportion of wireless traffic will still be voice-only and low-rate data. So whatever the ultimate capabilities of 3G networks, effi cient and profi table ways of delivering more basic wireless services are still needed.

The significance of EDGE for today’s GSM operators is that it increases data rates up to 384 kbps and potentially even higher in a good quality radio environment using current GSM spectrum and carrier structures more efficiently. EDGE is both a complement and an alternative to new WCDMA coverage. EDGE also has the effect of unifying the GSM, D-AMPS and WCDMA services through the use of dual-mode terminals.

List of commands in Windows Command Prompt

Hi this is a list of commands from a-z that we use in windows command prompt. Other than this any commands you knows please write in comments.
http://tinyhacker.com/wp-content/uploads/2009/12/windowsxpcommandline.png
A-Z windows XP commands

A
ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
ATTRIB Change file attributes

B
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info

C
CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location•
CSCcmd Client-side caching (Offline Files)
CSVDE Import or Export Active Directory data

D
DATE Display or set the date
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DISKPART Disk Administration
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
DSRM Remove items from Active Directory

E
ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE Delete one or more files
EXIT Quit the current script/routine and set an errorlevel
EXPAND Uncompress files
EXTRACT Uncompress CAB files

F
FC Compare two files
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files
FOR /F Loop command: against the results of another command
FOR Loop command: all options Files, Directory, List
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations

G
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line

H
HELP Online Help

I
iCACLS Change file and folder permissions
IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP

K
KILL Remove a program from memory

L
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file

M
MAPISEND Send email from the command line
MBSAcli Baseline Security Analyzer.
MEM Display memory usage
MD Create new folders
MKLINK Create a symbolic link (linkd)
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files



N
NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights

P
PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
POWERCFG Configure power settings
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory

Q
QGREP Search file(s) for lines that match a given pattern.

R
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Registry: Read, Set, Export, Delete keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files
REPLACE Replace or update one file with another
RD Delete folder(s)
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)

S
SC Service Control
SCHTASKS Schedule a command to run at a specific time
SCLIST Display NT Services
SET Display, set, or remove environment variables
SETLOCAL Control the visibility of environment variables
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SLMGR Software Licensing Management (Vista/2008)
SOON Schedule a command to run in the near future
SORT Sort input
START Start a program or command in a separate window
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration

T
TASKLIST List running applications and services
TASKKILL Remove a running process from memory
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TLIST Task list with full path
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file

U
USRSTAT List domain usernames and last login

V
VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label



W
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands

X
XCACLS Change file and folder permissions
XCOPY Copy files and folders
:: Comment / Remark