Tuesday, February 8, 2011

Use Picasa to Create a Quick Slide Show for your DVD Player Using a CD of JPG Images

Picasa, slide show, filecopy, copy files, jpg cd, jpg slide show, quick slide show, photography tip, adobe replacement, simple slide show, picasa tip, picasa file naming, digital image CD
 
 
Article Body:
As a photographer, I like easy ways of storing, editing and producing digital pictures. As a moderate user of Adobe Photoshop, I have now discovered Picasa, Free Software from Google that allows you to simply catalogue, store and perform some post production enhancements to your digital pictures.
 
Like many Digital Photographers, you may want duplicates (multiple versions) of your digital pictures, to which you apply various enhancements - cropping, B&W, softening, etc. If you are using Picasa, then you will need to apply some file renaming to ensure your pictures are grouped together: picture original, picture copy1, picture copy2,,,picture copyn. Currently, duplicating a digital picture within Picasa does not produce a filename which preserves the desired filename sequence (ascending sort - alphabetic order) - "Original, OriginalCopy, OriginalCopy (2),,OriginalCopy (n)"
 
Do not despair. Here is a simple fix that will ensure that your 'CD of JPG images' will playback properly on an inexpensive DVD player ($29.95 at Walmart), which is capable of playing back (like a Slide Show) stored JPG images.
 
A little background on how Picasa creates JPG file copies on your computer. When you copy/duplicate a file in Picasa it creates the copied file with the following prefix - ?Copy of IMAGEnnnn.jpg?. Since alphabetic sequencing has "C" coming before "I", this means that all of the prefixed files with ?Copy of? are saved in your computer [picture] directory ahead of the original JPG images, which all start with ?IMG? or ?IMAGE? - Ouch! But you want all your JPG picture files to start with "IMG" or "IMAGE", just like they were originally created on your digital camera.
 
Apply a simple and consistent renaming of these "Copy of" JPG files and you will get the desired playback sequence. Rename these ?Copy of? files so that the original filename prefix is preserved - ?IMG? or?IMAGE?. Just remove the ?Copy of? prefix and add an appropriate ascending numeric sequence suffix to each of the copied files.
For example, IF your original JPG file and the Picasa two copies were:
IMG_2787, Copy of IMG_2787, Copy (2) of IMG_2787
THEN you would rename the TWO Copy files to get this grouped sequence:
IMG_2787, IMG_2787-2, IMG_2787-3
 
Now you will be sure that the filename sequence will match your desired Slide Show sequence.
 
You can submit an enhancement request to Picasa to fix the way they name copied files (Adobe has is right!). You can submit your request to: Picasa Help Ticket Submission. The more requests the sooner they fix this inconvenience.


SQL Server Triggers

Triggers are stored procedures which are fired when data is modified in an underlying table. They can evaluate data being added to a table for validation purposes, or can make changes in that or other fields depending on the value of that data. You can use them even to execute a separate stored procedure, or to roll back a data modification or an entire transaction.
 
In earlier versions of SQL Server, triggers were used to maintain referential integrity. In current versions, constraints and foreign keys are used to accomplish much of those tasks, but triggers are still used to accomplish more complex tasks than that are available to the built in newer tools, such as complex column constraints, evaluation of tables in other databases, complicated defaults, or cascading routines involving multiple changes in multiple tables.
 
Triggers are created in the Enterprise Manager, or in the Query Analyzer through the object browser. There are also templates for triggers in the Query Analyzer (Edit|Insert Trigger). Triggers can be created with the following syntax:
 
CREATE TRIGGER trigger_name
ON table
[ WITH ENCRYPTION ]
 
 AFTER [ INSERT ] [ , ] [ UPDATE ]
 [ WITH APPEND ]
 [ NOT FOR REPLICATION ]
 AS
 [ IF UPDATE ( column )
 [ OR UPDATE ( column ) ]
 [ ... n ]
 ]
 sql_statement [ ... n ]
 
 
 
There are two types of triggers: AFTER and INSTEAD OF. After triggers AFTER TRIGGERS fire after the data is changed, either by insert, delete, or update. If the data is inappropriate, as defined in the trigger, the modification can be rolled back to where it was before the data was modified. After triggers AFTER TRIGGERS cannot be placed on views, and cannot be used on more than one table. Also, the text, ntext, and image columns cannot be referenced in an after trigger. AFTER TRIGGERS.
 
After triggers AFTER TRIGGERS can be nested to 32 levels deep, and can be called recursively, again to 32 levels.
 
Instead of INSTEAD OF triggers make the validation before the modification. However, Instead of INSTEAD OF triggers CAN can be used on views. They do not allow recursion, and you can only have one Instead of INSTEAD OF trigger per table. And you cannot use an Instead of INSTEAD OF trigger with a cascade.
 
Resources
 
? Information on Constraints and Triggers
 
This resource discusses about constraints and triggers in detail.
 
? Information: Create Trigger
 
This resource is useful in understanding the workings of triggers in detail.
Metro NY / NJ SQL Server Consultants
We specialize is custom database software. Call us for a free consultation (973) 635 0080 or email us at paladn.com


SIF1

Up to date video codec SIF is widely used by the customers. Despite of its ?youth? it has proved itself in the best way during tests. Codec with the SIF-converting algorithm was created in 2000 and afterwards was named SIF1 codec. This codec is being continuously improved and currently there are no errors in video compression programs. It is available in all programs for video operations and it can be easily installed in such software environment as DivX. Such parameter as decision value is extremely important for the video codec. The more is the value of this parameter the lower is the image quality due to high level of compression. That?s why the best value for this parameter is 30. Regarding the shots, the codec fixes the grounds automatically and inserts key shots exactly as needed. According to the test results with the decision value of 30 the codec is compressing 798kb of video in 4:29 min:sec under the processor upload <100% during the viewing.
 
The peculiarities of this codec are as follows:
 
- low sensitivity to noise of incoming image;
- low rate of decompression artifacts;
- high flexibility of compression algorithms, in addition there is an opportunity to choose the compression parameter even for the image size of 2x2pcs;
- there are special requirements to the processor, advisable frequency for the comfortable viewing of the films coded by this codec is more that 1500 MHz;
- the basic set of commands MMX is set in the codec;
- the size of compressed image has to be 16-fold horizontally and vertically.
 
One of the lacks of SIF- converting is high requirement to the capacity of system memory and to the processor cash size. Continuously improving methods of algorithm optimization still are not able to eliminate this problem.
 
Each updated SIF1 version underscores the efficiency of the dissective part of Core6. The algorithm of the digitizer operation is being changed all the time. The vividness of the decoded image and total efficiency of the compression are being improved, and the operation in low resolution is getting better. Psycho-visual model is greatly improved in the latest version. In the course of time the developer will implement SSE2 support, which affects the processing speed. SIF1 and its improved converting algorithm can easily take the lead among the other programs, and moreover it can displace DivX and XVid in the nearest future.


Understanding core of .NET framework

With the release of the .NET Framework, Microsoft is taking the most significant risk in its history. Microsoft has spent billions of dollars, representing over 80 percent of its R&amp;D budget, on designing and constructing this fundamental shift in its development tools in order to build a framework for the future of application development. Microsoft has effectively realized its vision of Windows in every PC and a PC on every desktop. Its current problem is that the desktop represents only a portion of the new Internet universe. With the huge shift brought on by the Internet and its pervasiveness into everything from watches to cell phones to cars, Microsoft must now shift its view of the future from a PC-centric orientation to a service-centric orientation.
 
So what is the future? From Microsoft's point of view, the future is delivering software as a service. Instead of purchasing a shrink-wrapped installable solution, you will instead rent, borrow, or purchase application logic across a distributed network. Software will of course still be sold on store shelves. However, most, if not all of the business logic and power of these applications will reside across a set of distributed applications using open Internetbased standards such as XML and HTTP. This framework will open extensive new possibilities for you in the process of designing, constructing, delivering, licensing, and collecting fees for your software.
 
<b>Why Microsoft .NET?</b>
Why would you as a developer invest in learning and understanding this new foundation of products and services? Those of you who are practicing solution developers already probably have a code base of Windows- and Internet-based applications written in Visual Basic, ASP, C , or a combination of all three. If you have to address Windows API calls from C and Visual Basic and then integrate those calls as a COM component called by an ASP page, you will be amazed at how the .NET Framework?based classes provide a common approach and object model to accessing Windows services and resources. You will be further impressed at how the choice of development languages is no longer dependent upon power, flexibility, or support of OOP best practices. Now all languages compile to a Microsoft Intermediate Language (MSIL) and execute against a Common Language Runtime (CLR).


Monday, February 7, 2011

Google Earth News - Another Beta to Take Your Breath Away

What's google earth.com
Google Earth.com is stunning, it is another great package from the kings who can do no wrong. Simply follow 2 steps to take advantage of this great free download from Google for any holiday traveler. Google Earth.com is going to take some processing power, so firstly make sure you meet the minimum spec on your machine by checking the following before you download it:
 
- Windows 2000, or XP
- Pentium 3, 500Mhz
- 128M RAM
- 400MB disk space
- Network speed: 128Kbits/sec
- 3D-capable video card with 16Mbytes of VRAM
- 1024x768, "16-bit High Color" screen
 
- "Google Earth" is a free product and shares an installer with "Google Earth Plus". You can upgrade your Google Earth to Plus via the Help menu.
 
- "Google Earth Plus" This version is for non-commercial use only
 
- This version supports Windows 2000 and Windows XP.
- It does run on Windows Server 2003 and XP-x64.
 
- It does not run on Windows 95, Windows 98, Windows 98SE, or Windows ME.
 
- There are known issues with "Windows XP for tablet PCs" and Windows XP Media Center.
 
- It has also been tested successfully with Windows XP Service Pack 2 (SP2) with this exception:
 
- A minimum screen size of 1024x768 pixels is required. Also, "True Color (32-bit)" resolution and a sufficient graphics card are required for clamped filled polygons; otherwise, they will be displayed
as outlines only.
 
- The default OpenGL graphics rendering engine is the usually the best from both a performance and visual quality perspective for Google eart.
 
- The DirectX version of Google Earth.com can be selected in the Preferences panel. If there is a problem at startup, you can also change it from the Start Menu item. Use it on older machines and laptop computers that have trouble with the default OpenGL version.
 
- The DirectX version of Google Earth.com requires DirectX 8.1 or newer.
 
I would suggest you try it now. It really is an incredible tool from Google and will prove to be great from a educational and useful viewpoint , especially when they start adding Google Maps and Google Local to it.
You can soon see whats around the corner.
A 9 out of 10 from the Google Talks Team


Sunday, February 6, 2011

SAMInside

SAMInside program is designated to recover Windows NT/2000/XP/2003/Vista users' log on passwords.
 
Program supports import of hashes (i.e. encoded users' passwords) from the following files:
- Windows registry (SAM and System files);
- PWDUMP program format text files;
- L0phtCrack program files (*.LC files);
- LC4 and LC5 program files (*.LCS files);
- LC 4 and LC 5 program files (*.LCP files);
- Proactive Windows Security Explorer and Proactive Password Auditor program files (*.HDT files);
- etc. (10 types of hash import in total).
 
Program also supports import of user hashes from local computer (program shall be run with Administrator account privileges). For this purpose program uses the following methods of local hashes import:
- hashes import using connection to LSASS process;
- hashes import using system utility Scheduler.
 
 
Program provides 6 types of attack to recover users' passwords:
- full brute-force attack;
- distributed attack;
- mask attack;
- dictionary attack;
- hybrid attack;
- pre-calculated Rainbow tables attack (tables for both LM and NT hashes supported).
All attack settings allow fine adjustment of required type of attack to achieve maximal effectiveness of users' passwords recovery.
 
 
Forcing program code is written completely on Assembler what lets to get very high speed of password forcing procedure. SAMInside program currently shows the highest speed abroad of single LM-hash (or NT-hash)! For example, computer based on Athlon 64 3000 processor provides forcing speed for single LM-hash about ~8300000 passwords per second, and 15100000 passwords per second for single NT-hash.
 
The program has compact size, doesn't require installation and can be run from floppy disk, CD/DVD or external USB disk. It works under any versions of Windows, requires no additional modules and doesn't state any special system requirements so can be run on any computer.
One more advantage of the program is correct import of Windows user names and passwords in local symbol encoding.
 
SAMInside program is Shareware.
Single license price is $40.
To learn more about variants of license key purchase please visit this page.
Once purchased key grants you right to use all future versions of the program for free.


Remove Blackworm Virus

Blackworm is a nasty internet worm which can delete DOC, XLS, MDE, MDB, PPT, PPS, RAR, PDF, PSD, DMP, and ZIP files. In addition to Blackworm, the worm has been named Kama Sutra, Blackmal, MyWife and Nyxem. This worm started on the 3rd of February and has been programmed to attack an infected computer on the 3rd of every month thereafter. So far it has been estimated that over 300,000 computers all over the world have been infected. Besides destroying those types of files, the worm also tries to disable anti-virus software so that it stops updating. It can also disable the keyboard and mouse of infected computers. Some Internet users have already lost important files after becoming infected by the Blackworm mainly because the clock time on their computer was wrong.
 
Like many Internet worms, Blackworm attempts to spread by mailing itself to contacts in a user's address book. The e-mails containing the worm can have a wide variety of subject fields and attachment names. The worm also tries to add itself to the auto-start programs in the Windows registy. Once a computer in a network has been infected, Blackworm will try to infect all other systems in the network.
 
To prevent getting infected by Blackworm you shouldn't open attachments or click on Web links within these e-mails, especially if these e-mails have a porn-related subject line. Use caution before opening any e-mail attachments, even if you know the sender. You should also backup any important files that you want to preserve. Most antivirus products will detect Blackworm assuming the worm hasn't disabled the antivirus software. Because of this, it is important to frequently update your antivirus software. It is also recommended to scan your computer for viruses and use a firewall. To prevent the worm from spreading to other computers in a network, you should use strong passwords on all the users accounts.


Is there spyware and adware on your computer

The Shocking Facts are that 85% to 90% of computers that are connected to the internet today are infected by some type of adware and spyware!- Source CNN
 
These malicious software programs Invade your privacy and send personal and private data to third parties and also take up hard drive space and slow down your PC.
 
Spyware tracks your on line internet browsing and surfing habits. It moniters each location you visit and what you have looked up on that site. Spyware programs can even track every keystroke you make on your keyboard and record every bit of data you add to a online form, such as name, location and credit card data when you make a purchase. This can lead to identity hijacking and theft of personal and private credit card information. Your PC surfing habits and personal and private information is then sold to third parties.
 
Adware is another kind of spyware. It doesn't work by tracking your information as spyware does, but what it can do is literally switch your browser settings without your permission. It can cause pop up ads to appear on your PC. A toolbar can also be installed on your computer without your knowledge. Most of us are unaware of the presence of adware programs installed on our computer untill it starts to slow down, crash, blue screen or programs stop working properly.
 
The spyware business is a billion dollar a year industry with people getting very rich selling the information they steal about you.
 
Downloading and installing anti-spyware software will remove and protect your computer from spyware, adware, keyloggers, pop ups, trojans and worms.
 
You can if you wish go to http://www.adwareremoval4you.com and download an excellent anti-spyware program that will scan, remove and protect your computer from all these hidden parasites.