Wednesday, July 25, 2007

Wordpress Theme Generator

This online generator creates your own custom unique WordPress Theme. Without any need for HTML, JS, PHP, or CSS knowledge.

Change the colors, settings, layout, preview live, click "save" and download your unique Wordpress theme zip-file. Extract, upload, set, and you are done! If you have any questions or need additions email me.

Based on the WordPress 2.1 with Yahoo! UI (Grids,Tabs & Fonts) to support all A-Grade browsers. Theme supports Widgets. Themes examples: read more...

Few Simple Examples:



More Info
http://www.yvoschaap.com/wpthemegen/

Friday, July 20, 2007

TrueCrypt – Free Open-Source Disk Encryption Software

Introduction
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g.., file names, folder names, contents of every file, free space, meta data, etc).

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on-the-fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on-the-fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt. For an illustration of how this is accomplished, see the following paragraph.

Let's suppose that there is an .avi video file stored on a TrueCrypt volume (therefore, the video file is entirely encrypted). The user provides the correct password (and/or keyfile) and mounts (opens) the TrueCrypt volume. When the user double clicks the icon of the video file, the operating system launches the application associated with the file type – typically a media player. The media player then begins loading a small initial portion of the video file from the TrueCrypt-encrypted volume to RAM (memory) in order to play it. While the portion is being loaded, TrueCrypt is automatically decrypting it (in RAM). The decrypted portion of the video (stored in RAM) is then played by the media player. While this portion is being played, the media player begins loading next small portion of the video file from the TrueCrypt-encrypted volume to RAM (memory) and the process repeats. This process is called on-the-fly encryption/decryption and it works for all file types, not only for video files.
Note that TrueCrypt never saves any decrypted data to a disk – it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume will be dismounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you have to mount the volume (and provide the correct password and/or keyfile).

For a quick start guide, please see the chapter Beginner's Tutorial.

Vision History
4.3a

May 3, 2007

Improvements:

  • Full support for custom screen DPI settings. (Windows, GUI)

  • Other minor improvements. (Windows and Linux)


Bug fixes:

  • Fixed bug that in some cases caused the 'Safely Remove Hardware' function to fail.

  • In Windows Vista, it is now possible to read data from file-hosted TrueCrypt volumes located on UDF-formatted media mounted in read-only mode.

  • All Volume Creation Wizard GUI elements are now correctly displayed on systems with custom DPI settings. (Windows, GUI)

  • Other minor bug fixes. (Windows and Linux)


Security improvements:

  • Linux: When running without administrator privileges, TrueCrypt automatically attempts to elevate its access rights (if necessary) using the sudo command. The Linux version of TrueCrypt no longer supports the set-euid root mode of execution. These changes also prevent all discovered and undiscovered (if any) security issues related to the set-euid root mode of execution, including an issue affecting all previous Linux versions of TrueCrypt where a local non-administrator user could cause a denial of service or gain administrator privileges.


Miscellaneous:

  • If dismount is forced on a TrueCrypt volume when TrueCrypt runs in traveller mode, the TrueCrypt driver will not be unloaded when TrueCrypt exits (it will be unloaded only when the system is restarted or shut down). This prevents various problems caused by a bug in Windows (for instance, it would be impossible to start TrueCrypt again as long as there are applications using the dismounted volume). (Windows)


4.3

March 19, 2007

New features:

  • Full compatibility with 32-bit and 64-bit Windows Vista:

    • Support for User Account Control (UAC).

    • All .sys and .exe files of TrueCrypt are now digitally signed with the digital certificate of the TrueCrypt Foundation, which was issued by the certification authority GlobalSign.

    • When moving the mouse on a single-CPU computer while reading or writing data to a TrueCrypt volume, the mouse pointer stopped moving for a second every few seconds. This will no longer occur. (Windows Vista issue)

    • Other minor compatibility-related changes.

  • TrueCrypt volume is automatically dismounted if its host device is inadvertently removed.

    Important: Before you physically remove a device (such as a USB flash drive) where a mounted TrueCrypt volume resides, you should always dismount the volume in TrueCrypt first, and then perform the 'Eject' operation (right-click the host device in the 'Computer' or 'My Computer' list) or use the 'Safely Remove Hardware' function (built in Windows, accessible via the taskbar notification area).

  • Ability to write data to file-hosted volumes located on devices that use a sector size other than 512 bytes (e.g., new hard drives, DVD-RAM, some MP3 players and USB flash drives, etc.)

  • Support for devices with a GPT partition table (GUID partitions). (Windows Vista/2003/XP)

  • After a partition is successfully encrypted, the drive letter assigned to it (if any) is automatically removed. (Windows)

  • Volume name (label) is displayed in device/partition selector. (Windows)

  • New hotkey: 'Wipe Cache'. (Windows)

  • New command line switch '/q background' for launching the TrueCrypt Background Task. (Windows)


Improvements:

  • Portions of the TrueCrypt device driver redesigned.

  • Maximum allowed size of FAT32 volumes increased to 2 TB (note that NTFS volumes can be larger than 2 TB).

  • Traveller Disk Setup improved. (Windows)

  • Volumes hosted on read-only media will always be mounted in read-only mode. (Windows Vista/2003/XP)

  • Improved support for big-endian platforms.

  • Other minor improvements (Windows and Linux)


Bug fixes:

  • The built-in FAT format facility now functions correctly on big-endian platforms.

  • Improved handling of partitions and devices during volume creation. (Windows)

  • Improved handling of low-memory conditions. (Windows)

  • Fixed bug that rarely caused system errors when dismounting all volumes. (Windows)

  • Tray icon is recreated when Windows Explorer is restarted (e.g. after a system crash).

  • Other minor bug fixes. (Windows and Linux)


Security improvements:

  • Improved security of set-euid root mode of execution. Volume can be dismounted only by the user who mounted it or by an administrator (root). (Linux)


Miscellaneous:

  • The option 'Cache passwords and keyfiles in memory' in the password prompt dialog window no longer sets the default setting (to set the default setting, select Settings > Preferences and enable or disable the option 'Cache passwords in driver memory'). (Windows)


Removed features:

  • 64-bit block ciphers are being phased out. It is no longer possible to create new volumes encrypted with 64-bit-block encryption algorithms (Blowfish, CAST-128, and Triple DES). Note that it is still possible to mount such volumes.

4.2a

July 3, 2006

Bug fixes:

  • Writing to a TrueCrypt volume under Linux no longer causes the system to stop responding under certain conditions.

  • Occasional application errors no longer occur when selecting a file (Windows XP SP2 issue).

  • Fixed bug that caused installation of the TrueCrypt driver to fail under certain configurations of 64-bit Windows.

  • TrueCrypt volumes mounted in a remote session under Windows 2000 can now be accessed.

  • TrueCrypt Volume Creation Wizard no longer blocks hot keys of certain applications. (Windows)

  • Other minor bug fixes (Windows and Linux)


Improvements:

  • It will not be required to reinstall the TrueCrypt kernel module after every minor Linux kernel update.

  • Other minor improvements (Windows and Linux)


Security improvements:

  • The Linux version of TrueCrypt now uses the TrueCrypt Random Number Generator (ported from the Windows version of TrueCrypt) instead of using only the Linux built-in random number generator. (This change was necessary due to a flaw in the Linux built-in random number generator: Data from the mouse and keyboard, which are the most important sources of random data, are not read by the Linux built-in random number generator when the user has only a USB mouse/keyboard.)
    Note: The Linux version of TrueCrypt still uses the Linux built-in random number generator. However, it is now merely one of the data sources used by the TrueCrypt random number generator.

  • Interactive mount mode, which allows the user to avoid passing sensitive parameters via command line. (Linux)

  • TrueCrypt volume is unmapped if mounting it to a directory fails. (Linux)

  • When the 'Never Save History' option is enabled, TrueCrypt sets its “current directory” to the user's home directory (in traveller mode, to the directory from which TrueCrypt was launched) after a container or keyfile is selected via the Windows file selector. Therefore, the Windows file selector will not “remember” the path of the last selected container or keyfile. (Windows)


4.2

April 17, 2006

New features:

  • TrueCrypt volumes can now be created under Linux.

  • Ability to create a 'dynamic' container whose physical size (actual disk space used) grows as new data is added to it. (Dynamic containers are pre-allocated NTFS sparse files.)

  • Volume passwords/keyfiles can be changed under Linux.

  • Keyfiles can be created under Linux.

  • Volume headers can be backed up and restored under Linux.

  • Multiple keyfiles can be selected in the file selector by holding the Control (Ctrl) or Shift key (Windows).

  • It is now possible to enable and directly set keyfiles by dragging the icon of keyfile(s) or of keyfile search path(s) to the password entry window (Windows only).

  • New Linux command line option: -u, --user-mount, which can be used to set default user and group ID of the file system being mounted to the user and group ID of the parent process. Some file systems (such as FAT) do not support user permissions and, therefore, it is necessary to supply a default user and group ID to the system when mounting such file systems.

  • The build.sh script can now perform automatic configuration of the Linux kernel source code, which is necessary in order to compile TrueCrypt on Linux. Note that this works only if the installed version of the kernel enables/supports it.

  • TrueCrypt volume properties can be viewed under Linux.

  • New Mount Option: 'system'. It is possible to place paging (swap) files on a TrueCrypt volume that is mounted with this option enabled. Thus, it is possible to use TrueCrypt to on-the-fly encrypt a paging file. (Windows, command line usage)

  • New Mount Option: 'persistent'. A volume mounted with this option enabled is not displayed in the TrueCrypt GUI and is prevented from being auto-dismounted ('Dismount All' will not dismount the volume either). (Windows, command line usage)


Improvements:

  • It is now possible to mount a single TrueCrypt volume from multiple operating systems at once (for example, a volume shared over network), provided that the volume is mounted as read-only under each system (Windows).

  • Current directory is never left set to a removable device after a file (e.g., a container, keyfile, header backup) stored on it is selected via file selector in TrueCrypt. Therefore, it will be possible to 'Safely Remove' the device in such cases. (Windows)

  • Improved security of set-euid root mode of execution (Linux).

  • Other minor improvements


Bug fixes:

  • It is now possible to dismount volumes that cannot be opened (for example, after disconnecting and reconnecting a USB flash drive formatted as NTFS containing a mounted TrueCrypt volume).

  • Fixed bug that sometimes caused the mount process to fail under Linux when one or more TrueCrypt volumes were already mounted.

  • Command line argument buffer is now wiped upon exit (Windows, command line usage).

  • Other minor bug fixes


4.1

November 25, 2005

New features:

  • New mode of operation implemented: LRW.

    LRW mode is more secure than CBC mode and is suitable for disk encryption. LRW mode is to become an IEEE standard for sector-based storage encryption. (For more information on LRW mode, see chapter Technical Details, section Modes of Operation in the documentation).

    Volumes created by this version of TrueCrypt can be encrypted only in LRW mode. However, volumes created by previous versions of TrueCrypt can still be mounted by this version of TrueCrypt.

    To prevent a recently discovered attack, which affects plausible deniability, we strongly recommend that you move data from your TrueCrypt volume to a new volume created by this version. Description of the attack: If a series of certain plaintext blocks is written to a mounted volume (i.e., if it is correctly encrypted), it is, with a very high probability, possible to distinguish the volume from random data. This affects volumes created by all versions of TrueCrypt prior to 4.1, except volumes encrypted with AES-Blowfish or AES-Blowfish-Serpent.

  • The encryption algorithm test facility (Tools -> Test Vectors) now supports LRW mode.


Improvements:

  • AES routines by Dr. Brian Gladman updated to the latest version.

  • Improved support for using TrueCrypt under non-administrator accounts on Linux (set-euid root).

  • A new instance of TrueCrypt will be created only if necessary.

  • Other minor improvements


Bug fixes:

  • Password input field will be correctly wiped after each mount attempt.

  • Hidden volume protection now works if set via 'Mount with Options'.

  • Containers located on volumes that are accessible only in local user name space can now be mounted.

  • The option /keyfile now works if specified with '/auto devices' or '/auto favorites' (command line usage)

  • Volumes whose paths contain spaces can be mounted (Linux)

  • Several localization issues fixed

  • Other minor bug fixes


4.0

November 1, 2005

New features:

  • TrueCrypt volumes can now be mounted on Linux. The Linux version of TrueCrypt is available at http://www.truecrypt.org/downloads.php

  • It is now possible to write to outer volume without risking that a hidden volume within it will get damaged (overwritten):

    When mounting an outer volume, the user can now enter two passwords: One for the outer volume, and the other for a hidden volume within it, which he/she wants to protect. In this mode, TrueCrypt does not actually mount the hidden volume. It only decrypts its header and retrieves information about the size of the hidden volume (from the decrypted header). Then, the outer volume is mounted and any attempt to save data to the area of the hidden volume will be rejected by the driver (until the outer volume is dismounted). For further details, please see the section 'Protection of Hidden Volumes against Damage' in the documentation.

  • Support for the x86-64 (64-bit) platform

  • TrueCrypt now runs on Windows XP x64 Edition (64-bit) and Windows Server 2003 x64.

  • Support for big-endian hardware platforms (PowerPC, SPARC, Motorola, etc.)

  • Full support for keyfiles. Keyfiles provide protection against keystroke loggers and may strengthen protection against brute force attacks. Keyfile is a file whose content is combined with a password. Until correct keyfile is provided, no volume that uses the keyfile can be mounted. Any number of, and any kind of files (for example, .mp3, .jpg, .exe, .avi) may be used as TrueCrypt keyfiles. TrueCrypt never modifies the keyfile contents. Therefore, it is possible to use, for example, five files in your large mp3 collection as TrueCrypt keyfiles (and inspection of the files will not reveal that they are used as keyfiles). TrueCrypt can also generate a file with random content, which can be used as a keyfile. For more information on keyfiles, see the chapter Keyfiles in the documentation.

  • Support for language packs (localizations). Language packs may be downloaded at: http://www.truecrypt.org/localizations.php

  • Whirlpool hash algorithm added.

    The size of the output of this hash algorithm is 512 bits. It was designed by Vincent Rijmen (co-designer of the AES encryption algorithm) and Paulo S. L. M. Barreto. The first version of Whirlpool was published in November 2000. The second version, now called Whirlpool-T, was selected for the NESSIE (“New European Schemes for Signatures, Integrity and Encryption") portfolio of cryptographic primitives (a project organized by the European Union, similar to the AES contest). TrueCrypt uses the third (final) version of Whirlpool, which was adopted by the International Organization for Standardization (ISO) and the IEC in the ISO/IEC 10118-3:2004 international standard.

  • Auto-Dismount facility, which can be set to dismount a volume after no data has been written/read to/from it for specified number minutes. It can also be set to dismount all mounted TrueCrypt volumes when:
    - user logs off
    - entering power saving mode
    - screen saver is launched
    Auto-dismount can be configured and activated in the Preferences (select Settings -> Preferences)

  • TrueCrypt settings are not saved to the Windows registry file. Instead, they are stored in XML files in the folder where application data are saved on the system (for example, in C:\Documents and Settings\YourUserName\Application Data\TrueCrypt). In traveller mode, the configuration XML files are saved to the folder from which you run the file TrueCrypt.exe.

    Note: When you install this version of TrueCrypt, all TrueCrypt settings that were stored by previous versions in the registry file will be automatically removed.

  • Tray icon. Right-clicking the tray icon opens a popup menu with the most used functions. Left-clicking the tray icon opens the main TrueCrypt window and puts it into the foreground.

  • Optionally, TrueCrypt can now continue running in the background after its main window is closed. This is referred to as TrueCrypt Background Task. When the main TrueCrypt window is closed, the TrueCrypt Background Task handles the following tasks/functions:
    1) Hot keys
    2) Auto-dismount
    3) Notifications (e.g., when damage to hidden volume is prevented)
    4) Tray icon
    For more information, see the chapter TrueCrypt Background Task in the documentation.

  • When a mounted volume is right-clicked in the drive list (in the main TrueCrypt window), a context menu is opened. From this menu, the user can select functions such as 'Repair Filesystem' or 'Check Filesystem' (front-end to the 'chkdsk' tool).

  • Containers stored on a locally mapped network drive can now be mounted.

  • Container stored on a remote server can be mounted via UNC path (e.g., \\server\share\volume).

  • Option to display password (typed in input field)

  • 'Favorite Volumes' facility, which is useful if you often work with more than one TrueCrypt volume at a time and you need each of them to be mounted as the same drive letter every time. For more information, see the chapter 'Main Program Window', section 'Program Menu', subsection 'Volumes -> Save Currently Mounted Volumes as Favorite' in the documentation.

  • Functions 'Backup Volume Header' and 'Restore Volume Header' added to the Tools menu. Both the standard volume header and the hidden volume header area are always backed up (copied to the backup file) even if there is no hidden volume within the volume (to preserve plausible deniability of hidden volumes).

    Note: If you do not have enough free space to backup all files, we highly recommend that you at least use this facility to backup the volume header, which contains the master key (size of the backup file will be 1024 bytes). If the volume header is damaged, the volume is, in most cases, impossible to mount.

  • System-wide hot keys (which can be used, for example, to dismount all TrueCrypt volumes, etc.)

  • Users can now set actions to perform upon log on to Windows. The actions can be any of the following:
    - Start TrueCrypt
    - Mount all device-hosted TrueCrypt volumes
    - Mount favorite volumes
    These actions can be enabled in the Preferences (select Settings -> Preferences).

  • Title bar of the password prompt dialog window now displays path to volume being mounted

  • When the 'Never save history' option is enabled, TrueCrypt clears the registry entries created by the Windows file selector for TrueCrypt. Therefore, the Windows file selector will not remember the path of the last mounted container after you exit TrueCrypt. Note that even when this option is enabled, the file selector will still remember the path, but only until you exit TrueCrypt.

  • 'Set Header Key Derivation Algorithm' added to the Volumes menu. It allows the user to re-encrypt a volume header with a header key derived using a different PRF function (e.g., instead of HMAC-SHA-1 you could use HMAC-Whirlpool). Note: Volume header contains master encryption key with which volume is encrypted. Therefore, data stored on the volume will not be lost after this function is used.

  • Number of bytes read/written from/to a volume since it was mounted is displayed in the Volume Properties window.

  • Preserving container timestamps can now disabled in the Preferences (Settings -> Preferences).

  • Command line usage:

    if '/silent' is specified, interaction with user (prompts, error messages, warnings, etc.) is suppressed.

    If '/m timestamp' is specified, volume/keyfile timestamps are not preserved.

    '/keyfile' may be used to specify a keyfile or a keyfile search path.

    '/auto favorites' may be used to mount favorite volumes.

    '/auto' is implicit if '/quit' and '/volume' are specified.

    If '/q preferences' is specified, TrueCrypt loads/saves settings.

  • Auto-Mount Devices keeps prompting for a password until a volume is successfully mounted or until cancelled. Warning is displayed after each unsuccessful mount.

  • If the Shift key is down when clicking 'Auto-Mount Devices' and if there are cached passwords, then password prompt will be bypassed (mounting will be attempted only with cached passwords).

  • It is now possible to run multiple instances of the TrueCrypt application simultaneously.


Improvements:

  • Mounting of fragmented file-hosted volumes (containers) takes significantly less time.

  • New SHA-1 routines by Brian Gladman, which are approx. three times faster than the original ones (speeds up mounting).

  • Enhancements to the random number generator:

    Hash function output is XORed into the pool (in E4M and the previous versions of TrueCrypt the values produced by a hash function replaced the original values in the pool).

    Input to hash function will always be the entire pool.

    Position of the pool cursor does not change when the FastPoll function is applied. This ensures that mouse coordinates are always evenly distributed in the pool (significant particularly when moving the mouse uninterruptedly).

    Event delta/absolute time will be added modulo 2^32 to the pool at the same position as the event data. (In the previous versions, event delta times were added separately modulo 2^32 to the pool. Delta times provide only a small amount of entropy, particularly when moving the mouse uninterruptedly.)

    For more information see the chapter Technical Details, section Random Number Generator in the documentation.

    Important: That we made these enhancements to the random number generator does NOT mean that volumes created using previous versions of TrueCrypt are insecure.

  • File-hosted volumes are pre-allocated before they are formatted. Therefore, containers are created faster and less fragmented.

  • When TrueCrypt re-encrypts a volume header (for example, when changing a password), the original volume header is first overwritten 35 times with random data to prevent adversaries from using techniques such as magnetic force microscopy to recover the overwritten header.

  • Traveller disk can be created when TrueCrypt is running in traveller mode.

  • TrueCrypt warns if automatic mounting of new volumes is disabled in Windows and informs the user how to enable this functionality.

  • Other minor improvements


Bug fixes:

  • Hidden volume password can now be changed on all types of removable media (e.g., all types of USB memory sticks).

  • When changing a password and an error occurs during the creation of a new volume header, the header will not be written and the error will be reported.

  • FAT file system created by TrueCrypt will have the same properties as FAT file system created by Windows.

  • Drive list will be updated whenever drive letter assignments change.

  • If an error occurs, TrueCrypt returns exit code 1, otherwise it returns 0 (command line usage).

  • Password specified on command line (/p ) now works with '/a devices' as well (command line usage).

  • Other minor bug fixes


Miscellaneous:

  • Size of the random number generator pool increased from 256 to 320 bytes

  • The command line option '/quiet' has been renamed to '/quit'

  • The Serpent routines written in assembly have been replaced with routines written in C, so that the whole source code is more portable.

Install PHP5 on IIS6 - Windows 2003 Server

* Download the PHP5 Zip Package here
* Extract it to C:\PHP
* Add C:\PHP to your PATH Variable
* Open IIS Configuration Panel, WebService Extensions, add C:\PHP\PHP5ISAPI.DLL and set it to allowed
* Click down to Web Sites. Right click the folder and select Properties. From the Home Directory tab click the Configuration button. Click Add to add an Application Extension. Enter C:\PHP\PHP5ISAPI.DLL as Executable and PHP as Extension. Leave the rest as default and click Ok.

Friday, July 13, 2007

DVD, Avi, DivX, XviD Ripping FAQ

FAQs

This is a collection of all FAQs I've written since I started out ripping plus some program specific FAQs which other people have written. Please note that you should also read the entire! respective guide which deals with your way of encoding. I can't vouch for the accuracy of the information provided by external sources.

If you discover an error in one of the FAQs or have an addition to make please contact me. For all FAQs and Q&As in the forum please make the addition directly to the thread in question.

Audio related

Audio FAQ - all about audio encoding
BeSweet FAQ
HeadAC3he FAQ

Capturing related

Capture FAQ
DV FAQ

DVD±R related

DVD-R media list
IfoEdit Q&A
Pioneer DVD-R FAQ
Media Quality test instructions

DivX/XviD related

DivX3 Q&A
DivX4 Q&A
DivX5 Q&A
Codec FAQ - all about various MPEG-4 codecs and their settings - last updated 08/12/01
Fair Use Q&A
General conversion problems - general problems when converting to DivX not covered in the other documents - last updated 08/12
Gknot FAQ - all around GKnot - upated all the time
New A/V formats Q&A
Playback problems - everything about DivX playback - last updated 08/12
VirtualDub FAQ
VirtualDubMod FAQ
Xvid Q&A

S/VCD related

CCE FAQ
DVD2SVCD FAQ - all about DVD2SVCD - updated all the time
SVCD FAQ - all about VCD, SVCD and miniDVD encoding

AviSynth Q&A

Ripping FAQ - all about descrambling DVDs

VFP FAQ - covers everything around AviUtl, DVD2AVI and TMPG projects and the VFAPI converter - last updated 08/12

This document was last updated on August 9, 2005

Portable Network Graphics (PNG)

An Open, Extensible Image Format with Lossless Compression

(Not Related to Papua New Guinea, the Pawnee National Grassland,
the Professional Numismatists Guild or the "Pack 'N' Go" format)

Welcome to the PNG Home Site, maintained by Greg Roelofs. Our hero likes to speak of himself in the third person, but don't let that put you off; this is intended to be a mostly serious set of reference pages for locating information, applications and programming code related to the twelve-year-old PNG image format.



What It Be (An Informal History)

So what is PNG, and why is it worthy of its own home site? PNG (pronounced "ping") is the Portable Network Graphics format, a format for storing bitmapped (raster) images on computers. Unofficially its acronym stands for [ ] "PNG's Not GIF." PNG was designed to be the successor to the once-popular GIF format, which became decidedly less popular right around New Year's Day 1995 when Unisys and CompuServe suddenly announced that programs implementing GIF would require royalties, because of Unisys' patent on the LZW compression method used in GIF. Since GIF had been showing its age in a number of ways even prior to that, the announcement only catalyzed the development of a new and much-improved replacement format. PNG is the result.

(By the way, despite the implications in some of CompuServe's old press releases and in occasional trade-press articles, PNG's development was not instigated by either CompuServe or the World Wide Web Consortium, nor was it led by them. Individuals from both organizations contributed to the effort, but the PNG development group exists as a separate, Internet-based entity.)

That's only half the story, however; PNG would deserve a home page even if all that had not taken place, just because it's so darned nifty. Yes, it's not every day you come across an image format and say, "Outraaageous!" In fact, you may never say that in your entire lifetime (truly a pity), but PNG is still cool. Some of its spiffier features include:

* unambiguous pronunciation (ooo, baby!)
* multiple CRCs so that file integrity can be checked without viewing
* ultra-clever magic signature that can detect the most common types of file corruption
* better compression than GIF, typically 5% to 25% (but often 40% or 50% better on tiny images)
* non-patented (you betcha!), completely lossless compression
* majorly gnarly two-dimensional interlacing scheme
* 1-, 2-, 4- and 8-bit palette support (like GIF)
* 1-, 2-, 4-, 8- and 16-bit grayscale support
* 8- and 16-bit-per-sample (that is, 24- and 48-bit) truecolor support
* full alpha transparency in 8- and 16-bit modes, not just simple on-off transparency like GIF
* "palette-alpha" mode, effectively transforming normal RGB palette into RGBA
* gamma correction for cross-platform "brightness" control
* color correction for cross-platform, precision color
* both compressed and uncompressed text chunks for copyright and other info
* full Year 2000 (Y2K) support, and then some (good for at least 63 millenia! yowza!)
* free and complete reference implementation with full source code

Not exactly spiffy, but worth mentioning anyway:

* officially registered Internet media ("MIME") type: image/png

PNG also supports things like suggested quantization, "smart" extensibility, a standard color space and lots of other excellent stuff, but let us leave all that aside for now. Those who want a quick explanation of the main features can check out Greg's Basic Introduction to PNG Features. Those who want all of the gory details can either find a library with the July 1995 issue of Dr. Dobb's Journal and read Lee Crocker's PNG article; read a copy of Greg's O'Reilly book, PNG: The Definitive Guide; or else go read the full Portable Network Graphics Specification, a reasonably concise W3C Recommendation (the very first one!) that is amazingly well written and understandable. (Greg had no part in the actual writing of it, so he can say things like that.) See the PNG documentation page for links to plain ASCII, PostScript (US letter-size) and PDF versions, and see the W3C's PNG page and official press release for links to related documentation on gamma and color correction.

Note that the PNG specification was updated to version 1.1 on New Year's Eve 1998 (that is, 31 December 1998). It included new chunks for cross-platform color correction (sRGB and iCCP), a revised and much more sensible description of gamma correction, and a number of other minor improvements and clarifications (all fully backward compatible, of course!). A second, more minor update (version 1.2) was released in August 1999; its only change was the addition of the iTXt chunk (international text).

In addition, PNG began the long process of international standardization* in 1999 (see the 10 May 1999 news item for details), thanks largely to its inclusion in VRML97. It finally completed that process and became the joint ISO/IEC standard 15948:2004 nearly five years later (see the 3 March 2004 news item), a few months after it was also rereleased by the W3C (with identical content) as their "PNG Second Edition" Recommendation.

*PNG was already part of the UK profile for MHEG-5 on digital terrestrial television; MHEG-5 is the international standard for a next-generation teletext system that shares a number of features with HTML. PNG is also used in MHP, the Java-based Multimedia Home Platform for digital video systems, and was included in HAVi, the somewhat defunct Home Audio-Video Interoperability standard for 1394-based home networking.

And the design of the multi-image extension to PNG known as MNG is officially complete (version 1.0 of the MNG specification was released on 31 January 2001), with quite a number of applications available and a free reference library, too.

By now you're undoubtedly drooling over such an incredibly well-designed image format and wondering where you can find applications or programming tools that support it. Well, wonder no further! Greg aims to please.

AspTear Component - free

What about a simple and cheap (=totally free) component for "tearing" web pages from a server? If you have searched for such a solution, then you are right here: AspTear allows you to retrieve web pages from servers easily with a bunch of features.

Here's a list of the component's main features:

  • Supports GET and POST
  • Send query strings and POST data to the server
  • Access HTTP and HTTPS resources
  • Log in to secured sites with username/password

Basics

So how does it work? Currently, the component is really very simple as it supports only one method (server-side VBScript pseudocode given here):

Const Request_POST = 1
Const Request_GET = 2
Set xObj = Server.CreateObject("SOFTWING.AspTear")
strRetVal = xObj.Retrieve(strUrl, nRequestType, strQueryString|strPostData, _
strUsername, strPassword)
The file retrieved is returned as method return value (strRetVal; errors are returned with exceptions - see the samples). If you don't need to supply Username and Password, leave them empty (""). Thus, the simplest request looks like this:
strRetVal = xObj.Retrieve("http://www.alphasierrapapa.com/iisdev/",2,"","","")
Notice that I did not supply a document - the component supports redirects! Now let's get a little bit more sophisticated: POST a form to the server with form data. How is this form data formatted? It needs to have the following form,
variable1=value1&variable2=value2...
where value1 to n need to be URL-encoded. To URL-encode a string value, use Server.URLEncode (this is also mandatory for querystrings):
strPostData = "Name=" & Server.URLEncode("Christoph Wille") & _
"&goto=" & Server.URLEncode("http://www.alphasierrapapa.com/")
The call to Retrieve now looks like this:
strRetVal = xObj.Retrieve("http://www.alphasierrapapa.com/",1,strPostData,"","")
The last thing to discuss is how to access SSL-secured items - it is as simple as replacing http:// with https:// in the strUrl parameter!

Thursday, July 12, 2007

GD Graphics Library


The web site programmer's dynamic graphics generation tool

What is the GD library? GD is an open source code library for the dynamic creation of images by programmers. GD is written in C, and "wrappers" are available for Perl, PHP and other languages. GD creates PNG, JPEG and GIF images, among other formats. GD is commonly used to generate charts, graphics, thumbnails, and most anything else, on the fly. While not restricted to use on the web, the most common applications of GD involve web site development.

GD has moved!

The GD library has moved to libgd.org, thanks to the hard work of Pierre Joye of the PHP project. The project is now headed by Pierre Joye, a well-known PHP developer. Pierre welcomes the contributions of distribution maintainers and other developers.

Yes, gd will continue to support other languages as well as PHP. After all, the larger the community fixing bugs, the better gd is for everyone.

Version 2.0.34 has been released by Pierre, incorporating many important fixes. Major feature changes will appear in a forthcoming gd 2.1.x series.

The latest bleeding-edge GD code can be obtained via CVS - and you're welcome to join the team!

Visit www.libgd.org for more information.

XML

The Extensible Markup Language (XML) is a general-purpose markup language.[1] It is classified as an extensible language because it allows its users to define their own tags. Its primary purpose is to facilitate the sharing of data across different information systems, particularly via the Internet.[2]

It is a simplified subset of the Standard Generalized Markup Language (SGML), and is designed to be relatively human-legible. By adding semantic constraints, application languages can be implemented in XML. These include XHTML,[3] RSS, MathML, GraphML, Scalable Vector Graphics, MusicXML, and thousands of others. Moreover, XML is sometimes used as the specification language for such application languages.

XML is recommended by the World Wide Web Consortium. It is a fee-free open standard. The W3C recommendation specifies both the lexical grammar, and the requirements for parsing.

K-Lite Mega Codec Pack

About the K-Lite Mega Codec Pack

K-Lite Codec Pack is a collection of VFW/ACM codecs, DirectShow filters and tools. Codecs and DirectShow filters are needed for encoding and decoding (playing) audio and video formats. The K-Lite Codec Pack is designed as a user-friendly solution for playing all your movie files. With the K-Lite Codec Pack you should be able to play all the popular audio and video formats and even several less common formats.


The K-Lite Codec Pack has a couple of major advantages compared to other codec packs:

  • It it always very up-to-date with the newest and/or best components.
  • All components have been carefully selected. It is not just a random bunch of stuff thrown together.
  • It is very user-friendly and easy to use.
  • The installation is fully customizable, meaning that you are able to only install those components that you really want.
  • For some formats a choice can be made during installation between different filters. This allows you to tweak the pack to your own specific needs and preferences.
  • Uninstallation removes everything that was installed by the pack. Including all registry keys.
  • It is extremely easy to make a fully customized unattended installation with the integrated wizard.
  • It has been very well tested. The pack doesn't contain any conflicting or buggy codecs.
  • It tries to avoid potential conflicts with other codecs already installed on your computer.
  • The pack is able to detect broken codecs and filters on your system, and helps you to removes them.
  • It is a very complete package, containing everything you need to play your movies.
  • This pack has a huge user base. This means that problems are found and resolved quickly.
  • Suitable for both novice and expert users.

Vietnamese GPS - Intelligent on the go

Vietnamese GPS - VGPS is The World's First and Only GPS application runs on any cell phone that can install java J2ME application.

VGPS was designed to Make Your Ordinary Cell Phone Do More. You can use City street map on your ordinary cell phone without the need of having GPS receiver or internet connection.

VGPS does not require internal or external GPS receiver so you can use VGPS everywhere (indoor and outdoor). However, if you have internal GPS receiver or external bluetooth GPS receiver, VGPS can work with your GPS receiver as well.

VGPS does not require internet connection so you no need to worry about connection charge.

Some of the key features of VGPS are:
  • Manage routes and waypoints. Route appears on the map with highlight colour, waypoint appears on the map as a flag. User can define and manage routes and waypoints within VGPS application.
  • Support Standard Location API JSR179. VGPS can work with any phone that has internal GPS receiver.
  • Support Standard NMEA Sentence. VGPS can work with any external bluetooth GPS receiver.
  • Can load huge map data into phone limited memory. VGPS can load a map with 50,126 streets and 11,112 points of interest into a phone which has only 500KB memory by using special zip and unzip on the fly algorithm.
  • Zoom in/Zoom out/Pan.
  • Incremental search for point label, street label. VGPS will progressively find up to 10 nearest matches for the search string as each character is typed.
  • Search for shortest way between 2 given points on the map. User can define waypoint-start and waypoint-end anywhere on the map then VGPS will search for shortest way from waypoint-start to waypoint-end.
  • Can move pointer freely to touch any object on the screen. Use arrow keys to move the pointer and when you are moving it, the label of nearest object to the pointer will be shown on top-left corner of the screen. You can also scroll the map around by moving pointer to reach the screen's borders.
  • Auto adjust street's name according to the length of street on the screen. If the length of street is long enough to display street's name on it, the street's name will be displayed, otherwise it will not. The more level you zoom in, the more street's name will be displayed on the screen.
  • Auto adjust the width of street according to zoom level. The more level you zoom in, the more wider street will be displayed on the screen.
  • Display direction arrow on one-way street.
  • Support touch screen. If your phone support touch screen, you can use stylus to move the pointer instead of using arrow keys. Just tap on any object (point or street) on the screen, VGPS will show the label of that object!
  • Support Garmin's map. Garmin is a leader in Global Positioning System (GPS) technology. You can buy Garmin map from Garmin or find Garmin map from GPS Maps section.
  • Support OpenStreetMap. OpenStreetMap is a project aimed squarely at creating and providing free geographic data such as street map for the whole world.
  • VGPS supports a lot of city maps around the world. Click here to see the list of cities supported by VGPS.

Bookmark to IE

Here is a simple example of how to add a bookmark Internet Explorer via Flash and JavaScript.

on (release) {
getURL ("javascript:window.external.AddFavorite(
'http://www.actionscript.org/','Knowledge Article');"
);
}

Wednesday, July 11, 2007

Anfy Call Filter

Call Filter is a utility application realised under the concept “Simple Yet Efficient” for your Symbian devices. It allows you to hang-up any incoming calls from contacts selected as a filter rule in rules screen...

- Blocks unwanted calls
- Allows block/unblock calls on the go ..
- Maintains a log of rejected calls .. and allows to send an sms or make a call to the rejected caller immidiately !
- The best of all .... its all at no cost ...

visit: http://www.anfymobile.com/callfilter/index.html

Virtual Magnifying Glass 3.3

A free, open source, screen magnifier, for Windows, Linux and FreeBSD.

Virtual Magnifying Glass is a free, open source, screen magnification tool for Windows and Linux. It is simple, customizable, and easy-to-use.

System requirements:
  • Microsoft® Windows® XP, 2000, NT, ME, 98 or 95
  • or any Linux Distribution
  • or FreeBSD
  • or other UNIX systems running X11
  • 800x600 or higher screen resolution and at least 16-bit colors recommended
  • A good display adapter and CPU recommended for smooth performance
  • Multiple-display systems are supported on Windows 98/ME, Windows NT4/2000/XP
  • Multiple-display systems are not supported on Windows 95 (Magnifying Glass will be run in the primary display only)
  • On multiple-display systems, the magnifying glass may not display at the correct location if the monitors have a vertical offset between them.

visit: http://magnifier.sourceforge.net/

fckeditor

This HTML text editor brings to the web much of the power of desktop editors like MS Word. It's lightweight and doesn't require any kind of installation on the client computer.

Features

* Multi browser compatibility
* Outputs XHTML 1.0
* CSS support for better integration with your web site
* Font formatting: type, size, color, style, bold, italic, etc
* Text formatting: alignment, indentation, bullets list, etc
* Cut, Paste, and Paste as Plain Text, Undo and Redo
* Paste from Word cleanup with auto detection
* Link and anchors support
* Image insertion, with upload and server browsing support
* Table creation and editing (add, delete rows, etc) - one of the best systems on the market.
* Table cells editing (size, colors, etc)
* Form fields
* Right click context menus support



* Complete toolbar customization
* Skins support
* Plugins support
* Spell checker
* Multi-language support with automatic user language detection. Including Right to Left scripting.
* Complete page editing (from to ) or just contents.
* Lightweight and fast
* Automatic browser detection and customization
* Integration with ASP, ASP.NET, Java, ColdFusion, Perl, PHP, Javascript and more.
* Image and file links upload and server repository browser.
* For web developers it is easy to install and customize
* For web users it's simple and easy to use!

visit: http://www.fckeditor.net/

Blog-zilla, MyBlogzilla, Blogzilla

Web-based software for the serious, professional blogger that desires to personalize their hand-crafted content to their readership.

With Blog-zilla you can...

1. Post and manage your content in a tailored fashion across 5 to 100 blogs.
2. Add unique articles written and personalized by you to every blog you are running.
3. Take any original content or article and have Blog-zilla target it; based on your rules and your intended readership.
4. Add topic-related RSS feeds as a supplement to content you've written.
5. Blend content, articles and RSS into perfectly matched topical blog entries.
6. Forget those "stretch-pants" one size fits all blogs, get personal with your readers and target your content.
7. Never steal content, instead write your own and let Blog-zilla personalize each post to your intended target audience.
8. Save hours of time.
9. Maintain dozens of high quality blogs.
10. Address your readership personally and intelligently.
11. Blow fire in the face of your competition :-)
12. and have visitors enjoying your blog because of the personalized nature of your writtings and posts.
13. ... oh, did we mention you might increase revenues from sales, affiliate programs and contextual ads?


visit : http://www.blog-zilla.com/

Tuesday, July 10, 2007

#develop (SharpDevelop)


#develop (short for SharpDevelop) is a free IDE for C#, VB.NET and Boo projects on Microsoft's .NET platform. It is open-source, and you can download both sourcecode and executables from this site. In addition, you can find the latest information and changes on #develop, as well as get in touch with the team in the forum.

We are going to add more content (and new releases) over the coming months, so sign up for our announcement list! Also, we want to invite you to participate in the forums, discussing SharpDevelop - its features, feature requests and of course bugs.

FavIcon from Pics

the first web tool for creating still / animated favicons from regular images
http://www.html-kit.com/favicon/


What's a Favicon?
Favicon (short for Favorites Icon) is a feature that makes it possible to associate a special logo or other small graphic with a web page.

The favicon is usually displayed next to the web site address. Much like the way shortcut icons are used on the computer desktop to distinguish computer programs and files, favicons can be used to personalize or brand your web sites.
What's FavIcon from Pics?
FavIcon from Pics is an online tool that can generate a favicon from a picture, logo or other graphic of any size/resolution. It was also the first online tool that simplified the creation of favicons using a regular image without requiring manual edits.

How do I create a favicon for my page?
To create a favicon using FavIcon from Pics, select a picture, logo or other graphic for the "Source Image" and click "Generate FavIcon.ico" Within a few seconds, you'll get a favicon file that's based on the selected image and instructions on how to add it to your web page.


How do I view the favicon in my browser?
There are some minor differences in the way browsers display favicons. For example, Firefox 1+ (Mozilla-based) browsers display the favicon on the address bar and browser tabs. Internet Explorer 5/6+ browsers display the favicon on the Favorites menu and on the address bar.

Mozilla/Firefox and most other supported browsers will start displaying the favicon on the browser address bar, the very first time you visit a web page that has a favicon (specified using the favicon HTML tag).

FavIcon in Mozilla based browsers
FavIcon ( Sample favicon ) on the address bar and page tabs of Mozilla based browsers.


Internet Explorer browsers (as of version 6.x) associate favicons with bookmarks. So you must first bookmark the web page. The favicon will appear on the browser address bar and on the Favorites menu, the second time you visit the bookmarked page. If the favicon doesn't appear even after bookmarking and revisiting the web page, restarting the browser may help.

FavIcon in Internet Explorer
FavIcon ( Sample favicon ) on Internet Explorer's Favorites menu and the address bar.

Is there a way to test the favicon on my web page?
You can check the favicon and the favicon link tags on your web page using the Favicon Validator. In addition to validating the favicon files and tags, it can also provide suggestions on how to improve compatibility with older and upcoming browser versions.
How many browsers support favicons?
All current versions of the major browsers support favicons, including Internet Explorer 5/6+, Firefox 1+, Mozilla 1+, Netscape 7+, Opera 7+, Konqueror 3+, Safari and more.

If a particular browser doesn't have support for the favicon feature, it'll simply ignore the favicon and the presence of a favicon won't affect that browser.
Can I show FavIcon from Pics on my site?
Yes, you can display the FavIcon from Pics control panel on your site and make it easier for visitors to create favicons. Simply copy and paste the following HTML tags in your page:

Or, you can add a link to the FavIcon from Pics homepage:
FavIcon from Pics
Will my favicon automatically appear in the public gallery?
No, you have to explicitly submit each favicon that you'd like to add to the FavIcon from Pics Gallery. Favicons you create using FavIcon from Pics are automatically deleted once your session ends. If you'd like to add your favicons to the Gallery, please use the form that appears once you generate the favicon.
Do I need HTML-Kit to use this tool?
Not at all, HTML-Kit is not required.

It's hosted on the HTML-Kit site because the first version was written for HTML-Kit users, but now it's open to everyone.
What do I do if I have more questions?
If you have a question that's not answered here, feel free to post it on the support forum.

What is UIQ3

UIQ is a Graphical User Interface for the Symbian operating system, a popular OS for "smartphones" (mobile phones typically equipped with office applications, multimedia capabilities, and other programmable PDA-like features).

UIQ stands for "User Interface Quartz", and the name is derived from the codename of "Quartz" given to the first touchscreen interface developed for Symbian.

UIQ3, as the name suggests, is the third iteration of UIQ. UIQ1 was a test system and never commercially released, whilst UIQ2 was used to great success in Sony Ericsson's original "P series" of smartphones - the P800, P900, and P910 - in addition to a handful of Motorola and BenQ handsets.
On which devices do I find it?

UIQ3 is used in the Sony Ericsson P990i , M600i , W950i And New Upcoming P1i and W960i.

In February 2007 Motorola introduced the MotoRizr Z8 which also features UIQ3. Release is scheduled for April 2007.

Like Nokia's Series 60, UIQ3 is a User Interface (or front end) for Symbian OS v9.1. Originally, the key difference between the two was the use of a touchscreen in UIQ, as opposed to entirely keypad-based input in Series 60, but this distinction is now blurred as UIQ3 is also appearing in phones without touchscreens (such as the MOTORIZR mentioned above). The intention with UIQ3 is to have a single, binary-compatible UI that can be deployed across a range of very different handsets and form factors.

Create .htpasswd on win32 & linux

on win32 use cmd
C:\Apache2\bin\htpasswd -nb Username Password


on linux
/usr/local/sbin/htpasswd -nb Username Password

(XFN) Xhtml Friends Network

XFNTM (XHTML Friends Network) is a simple way to represent human relationships using hyperlinks. In recent years, blogs and blogrolls have become the fastest growing area of the Web. XFN enables web authors to indicate their relationship(s) to the people in their blogrolls simply by adding a rel attribute to their tags, e.g.:

More Info: http://gmpg.org/xfn/

XFN Creator
http://gmpg.org/xfn/creator
http://accessify.com/tools-and-wizards/developer-tools/xfn/

XFN Search Engine
http://www.xhtmlfriends.net/

Disable Services (Windows XP)

XP Pro runs a lot of services by default that are pointless if your not on a corporate network, the following services are ones that I safely disable thereby freeing up memory but check what each one does first to make sure your not using it for something:

Go to Run and type services.msc, right click on each service, properties and choose disable.

Alerter
Application Management
Automatic Updates
Background Intelligent Transfer
Clipbook
Distributed Link Tracking Client
Distributed Transaction Coordinater
Error Reporting Service
Fast User Switching Compatibility
IMAPI CD-Burning
Indexing Service
IPSEC Services
Messenger
Net Logon
Net Meeting
Remote Desktop Sharing
Network DDE
Network DDE DSDM
Portable Media Serial Number
Remote Desktop Help Session Manager
Remote Registry
Secondary Logon
Smartcard
SSDP Discovery Service
Telnet Themes
Uninterruptible Power Supply
Universal Plug and Play Device Host
Upload Manager
Webclient
Wireless Zero Configuration
WMI Performance Adaptor

Speed Up The File System (Windows XP)

NTFS is a great file system, but its feature-set comes at a slight cost in performance. You can negate this a little with the following tips:

* By default NTFS will automatically update timestamps whenever a directory is traversed. This isn’t a necessary feature, and it slows down large volumes. Disable it by going to Run and type regedit:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\FileSystem and set ‘DisableNTFSLastAccessUpdate’ to 1.

* NTFS uses disparate master file control tables to store filesystem information about your drives. Over time these core MFT files grow and become fragmented, slowing down all accesses to the drive. By setting aside a little space, MFT’s can grow without becoming fragmented.

In the same key where you disabled the last access feature creat a new DWORD value called ‘NtfsMftZoneReservation‘ and set it to 2.

Disable DLL Caching (Windows XP)

Windows Explorer caches DLLs (Dynamic-Link Libraries) in memory for a period of time after the application using them has been closed. This can be an inefficient use of memory.

1. Find the key [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer]
2. Create a new DWORD sub-key named ‘AlwaysUnloadDLL‘ and set the default value to equal ‘1‘ to disable Windows caching the DLL in memory.
3. Restart Windows for the change to take effect.

Tweak The Prefetch (Windows XP)

1. Run “Regedit
2. Goto [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet \Control\Session Manager\Memory Management\PrefetchParameters\EnablePrefetcher]
3. Set the value to either 0-Disable, 1-App launch prefetch, 2-Boot Prefetch, 3-Both (”3″ is recommended).
4. Reboot.

It will decrease the boot time but double and increase the performance of your XP.

SpeedUp Your Connection By 20% (Cable/DSL Users Only) (Windows XP)

1. Log on as “Administrator“.
2. Run - gpedit.msc
3. Expand the “Local Computer Policy” branch.
4. Then expand the “Administrative Templates” branch.
5. Expand the “Network” branch.
6. Highlight the “QoS Packet Scheduler” in left pane.
7. In the right window pane double-click the “Limit Reservable Bandwidth” setting.
8. On the settings tab check the “Enabled” item.
9. Change “Bandwidth limit %” to read 0.
10. Then go to your Network connections Start > Control Panel > Network & Internet connections > Network Connections and right-click on your connection. Then under the General or the Networking tab, (where it lists your protocols) make sure QoS packet scheduler is enabled.

It may take effect immediately on some systems. To be sure, just re-boot.
Hope everyone finds these useful.

Xpdf

What is Xpdf?
Xpdf is an open source viewer for Portable Document Format (PDF) files. (These are also sometimes also called ‘Acrobat’ files, from the name of Adobe’s PDF software.) The Xpdf project also includes a PDF text extractor, PDF-to-PostScript converter, and various other utilities.

Xpdf runs under the X Window System on UNIX, VMS, and OS/2. The non-X components (pdftops, pdftotext, etc.) also run on Win32 systems and should run on pretty much any system with a decent C++ compiler.

Xpdf is designed to be small and efficient. It can use Type 1, TrueType, or standard X fonts.

Xpdf should work on pretty much any system which runs X11 and has Unix-like (POSIX) libraries. You’ll need ANSI C++ and C compilers to compile it. If you compile it for a system not listed on the xpdf web page, please let me know. If you can’t get it to compile on your system, I’ll try to help.

Download
http://www.foolabs.com/xpdf/download.html


Support Language


Simple Command for convert
%/usr/X11R6/bin/pdftotext -enc TIS-620 01.pdf

eXTReMe Tracker