Tuesday, March 30, 2004

DBMS - ORACLE

Oracle Manual

SQL*Plus user's guide and reference

Application developer's guide object relational features

PL/SQL Site

Info from Yuen:
http://oracle.com , you need to go to Technology link and you will see the Oracle Technology
Net (OTN) or you can use http://otn.oracle.com/index.html

DMU Final Year Projects

DMU 1
DMU 2

FUZZY LOGIC
Aladdin Ayesh


Writing fuzzy rules in CLIPS


Fuzzy Sets and Pattern Recognition

Fuzzy Sets & Fuzzy Set Operations

Monday, March 29, 2004

PALM OS PROGRAMMING GUIDE
http://www.xpinneret.com/course.html

TCP/IP

1) http://www.cpe.ku.ac.th/~nguan/resource/slide/network/download/tcp1.pdf

The main page of the site is http://www.cpe.ku.ac.th/~nguan/resource/slide/network.html

2) Presentation layer protocol (ASN.1 & XDR approach)
http://www.cs.wpi.edu/~cs513/f99cew/week12-presentation/week12-presentation.html

3) TCP/IP tutorial & technical overview
http://www.auggy.mlnet.com/ibm/3376fm.html


http://archive.corewebprogramming.com/Chapter17.html


http://notes.corewebprogramming.com/instructor/Network-Programming-Clients.pdf

Referencing using Havard System (we need to use this in our assignment and project when record references)

Citing Reference
http://www.bournemouth.ac.uk/academic_services/documents/Library/Citing_References.pdf

References - The Harvard System
http://www.uwe.ac.uk/library/resources/general/info_study_skills/harvard2.htm

FUZZY CLIPS

CLIPS User's Guide Version 6.20 March 31st 2002 by Joseph C Giarrantano Ph D (172 pages)
http://www.ghg.net/clips/download/documentation/usrguide.pdf

Fuzzy CLIPS Version 6.04A User's Guide Oct 1998 R.A.Orchard (96 pages)
http://www.cs.strath.ac.uk/~fabioc/02-ai/docs/fuzzyclips-usrguide.pdf

Fuzzy Logic Toolbox For Use with MATLAB User's Guide Version 2 (235 pages)
http://hydra.postech.ac.kr/~dkim/course/sc/fuzzy_tb.pdf

HONOURS DEGREE

Taking into account the double weighting of level 3 modules, the total percentages required to achieve each Honours Degree classification is as follows:
From % To %
First 70 100
Upper Second 60 69
Lower Second 50 59
Third 40 49


HOW TO DO TECHNICAL REPORT

http://www.kevinboone.com/howto_report.html

Java Bean
http://java.sun.com/j2ee/tutorial/1_3-fcs/doc/JSPIntro.html

http://java.sun.com/j2ee/tutorial/1_3-fcs/doc/JSPBeans.html

http://java.sun.com/j2ee/tutorial/1_3-fcs/doc/Servlets.html

JSP and JSTL related web sites

1) Developing Custom tags for JSP
www.taglib.com/blokware/presentations/ css2002/CustomTags.ppt
- 48 Powerpoint slides to tell what is JSP custom tag and how to they work.

2) Java Server page standard
http://java.sun.com/webservices/docs/1.0/tutorial/doc/JSTL.html

3) Taglib
http://jakarta.apache.org/taglibs/tutorial.html

4) Web application
http://java.sun.com/webservices/docs/1.0/tutorial/doc/WebApp.html

5) JSP technology
http://java.sun.com/webservices/docs/1.0/tutorial/doc/JSPIntro.html

6) Custom tag in JSP
http://java.sun.com/webservices/docs/1.0/tutorial/doc/JSPTags.html

7) creating JSP and Servlet
http://developer.java.sun.com/developer/Books/javaserverpages/cservletsjsp/chapter14.pdf

8)
http://www.orionserver.com/taglibtut/1.html

9) javax.serlvet.jsp.targext
http://java.sun.com/j2ee/1.4/docs/api/

JSP and JavaBean, hope it will help.

1) How Java works?
http://www.howstuffworks.com/program.htm

2) Calling JavaBeans from a JSP page- simple explaination
http://www.stardeveloper.com/articles/display.html?article=2001072001&page=1

3) What are JavaBeans?
http://www.stardeveloper.com/articles/display.html?article=2001071901&page=1

4) JavaServer pages and JavaBean Components, part 1
http://www.developer.com/tech/print.php/628721

5) jSP Overview
http://www.onjava.com/lpt/a/2556

some web sites on Telnet and some useful UNIX
commands.

1) http://oregonstate.edu/aw/tutorials/telnet/
A Telnet Tutorial

2)
http://www.nmsu.edu/~CandN/DOCS/UNIX/DOCS.Unix_commands.html
Basic unix Commands

3)
http://oregonstate.edu/aw/tutorials/telnet/pctelnet.html
A Telnet Tutorial: PC Information

4)
http://ece.oregonstate.edu/comp/doc/unix/commands.html
Useful UNIX commands

5) http://unix.about.com/gi/dynamic/offsite.htm?site=http://www.mhpcc.edu/training/vitecbids/UnixIntro/UnixIntro.html
Introduction to UNIX

Tuesday, March 09, 2004

Tweak Your Way to a Faster PC

Upgrade your system for free with Black Viper's XP tweaks.

By Black Viper


At some point you've probably wondered whether your system's performance can be improved without spending any money on hardware or software upgrades. In almost all circumstances the answer is yes.

On tonight's episode of "The Screen Savers" I give you some tips to help determine whether the default Windows installation is giving you the best bang for your buck.


Read on for some great tweaks that will let you get the most out of your system. Make sure you're logged in as "Administrator" or have administrator rights before performing these steps.


Reclaim your RAM


Reducing overhead associated with the new themes in XP Home and XP Pro can save you between 4MB and 12MB of RAM.


Here's how to optimize your system if you're using the default Category Control Panel in XP.



Click the Start menu.
Select Control Panel.
Select Performance and Maintenance.
Select System.
Select Advanced Tab.
Under Performance, select the Settings button.
Select the Visual Effects tab.
Select "Adjust for best performance."
Click OK.

If you're using the Classic Control Panel, follow these steps instead.



Click the Start menu.
Select Control Panel.
Select System.
Select the Advanced tab.
Under Performance, select the Settings button.
Select the Visual Effects tab.
Select "Adjust for best performance."
Click OK.
Select Disable and Stop the Themes Service.

You can also shut off XP's themes a different way.


If you're using the default Category Control Panel, follow these steps.



Click the Start menu.
Select Control Panel.
Select Performance and Maintenance.
Select Administrator Tools.
Select Services.
Scroll down and double-click "Themes" in the right menu.
Select the General tab.
Select Disabled under "Startup type."
Click OK to close the panel.

If you're using the Classic Control Panel, follow these steps.



Click the Start menu.
Select Control Panel.
Select Administrator Tools.
Select Services.
Scroll down and double-click "Themes" in the right menu.
Select the General tab.
Under "Startup type" select Disabled.
Click OK to close the panel.

You can also adjust your system further by disabling additional unneeded services. Visit my site for in-depth guides related to computer background processes and services. I've got guides for Windows 2000 and Windows XP.


Speed Up Boot Times With Msconfig

It's not a good idea to adjust your service configurations using Msconfig. When used correctly, however, Msconfig is a powerful tool that reduces the amount of memory Windows uses at boot time.


You can keep several programs from automatically launching by removing them from the startup tab in Msconfig. Launching these programs at startup delays when you can begin using the system, as well as your PC's overall responsiveness.


Use Msconfig to keep programs from automatically loading by following these steps.



Click the Start menu.
Select Run.
Type "msconfig" (without the quotes).
Click OK or press Enter.
Under the "Startup" tab you'll find programs that automatically start when the system boots.
Uncheck the box next to a program to disable it as a startup item.

The best way to determine if you need a particular program is to figure out what installed the item. Then you can make an educated guess as to the program's importance.


Most often, the unneeded programs are listed under the "Locations" column as "SOFTWARE/Microsoft/Windows/CurrentVersion/Run." Unfortunately, there's no hard-and-fast rule for determining in Msconfig if you need a startup item.


Virtual-Memory Tweaks Aren't for Everyone

This procedure is valid for Windows XP Home and Pro. However, every Windows OS to date uses some form of virtual memory or page file.


Shrinking the size of your virtual memory or page file can increase your system's performance. However, depending on your particular usage patterns and installed applications, it can also decrease performance.


Can you get rid of the page file altogether? Yes and no.


If you have a boatload of memory (greater than 1GB), you may be able to function just fine without it. However, some applications and games require a certain amount of swap space to run, no matter how much RAM is available.


Also, some hardware (a sound card, for example) could malfunction in applications and games without a swap file. If you decide to test your luck with no swap space or page file, be careful. Every person uses a system differently. I recommend keeping the virtual memory settings on your system at the default values unless you really feel like experimenting.


If you're an experimenter, here's how to tweak your virtual memory settings.


If you're using the default Category Control Panel in XP, do the following.



Click the Start menu.
Select Control Panel.
Select Performance and Maintenance.
Select System.
Select the Advanced tab.
Under Performance, select the Settings button.
Select the Advanced tab.
Under Virtual Memory, select the Change button.
Adjust as needed or select "No paging File." Then select the Set button.
Click OK to apply the settings. You must reboot for the changes to take effect.

If you're using the Classic Control Panel, do the following.



Click the Start menu.
Select Control Panel.
Select System.
Select the Advanced tab.
Under Performance, select the Settings button.
Select Advanced Tab.
Under Virtual Memory, select the Change button.
Adjust as needed, or select "No paging File." Then select the Set button.
Click OK to apply the settings. You must reboot for the changes to take effect.

Create a swap space of a constant size, preferably on a separate partition. For example, select Custom Size, type 1000 in "Initial Size" and 1000 in "Maximum Size," and then click the Set button. This will reduce the amount of work needed to dynamically resize the page file.


From fastest to slowest, these are the configurations you can try.



No swap file at all. Some software may fail. You also need a lot of memory to do this (more than 1GB of RAM).
A static swap file on a separate hard drive (and preferably a separate controller) from Windows and frequently accessed data.
A dynamic swap file on a separate hard drive (and preferably a separate controller) from Windows and frequently accessed data.
A static swap file on a separate partition, but on the same physical hard drive as Windows.
A dynamic swap file on a separate partition, but on the same physical hard drive as Windows.
The default: A dynamic swap file on the same partition and physical hard drive (usually C:) as Windows.
Defragment Your Way to Paradise

Defragmenting the files on your hard drive speeds up the overall responsiveness of applications and games. Even if your defragmentation program reports it doesn't need to be run, run it anyway. After all, if it were really efficient, you wouldn't be reading this page.


The location of your system's defragmentation tool varies from version to version. More often than not, it can be found by following these steps.



Click the Start menu.
Select Programs.
Select Accessories.
Select System Tools.
Select Disk Defragmenter.
After defragmenting a hard drive, you shouldn't need to do it again for a while -- unless you delete, uninstall, or reinstall a lot of stuff.


This is only the tip of the iceberg when it comes to tweaking an operating system for better performance. You can find many more tips and much more info for various operating systems on BlackViper.com.


Originally posted December 16, 2003

Computing Clusters
Use multiple computers to process heavy data loads.

By Leo Laporte and Roman Loyola


High-end graphics and animation programs often use distributive processing clusters to handle heavy data loads. In a distributive-processing cluster, CPU-intensive tasks are divided over several networked computers. In essence, multiple computers are doing the job of a single computer, and that means shorter times to finish a task.

On today's show, Matt Olander of Offmyserver shows how to create a processing cluster using old computers. The cluster Olander assembles is called a Beowulf cluster. Olander also talks about using FreeBSD for clusters. Take a look at the Offmyserver cluster built for today's show.


OS support


Linux offers operating system level support for linking independent PCs. This technology is called "clustering." It's usually implemented for one of three reasons: parallel processing, load balancing, or fault tolerance.


Clustering is supported in Windows Server 2003.


Mac OS X Server supports clustering. Read how Carnegie Mellon University implemented its Mac OS X clusters.


Cluster links


Learn more about clusters by clicking on the links below.



FreeBSD cluster forum
Mailing list for technical discussions related to creating clusters of FreeBSD computers.

Beowulf.org
Comprehensive resource for Linux clustering.

Beowulf cluster mini-how-to
Written by Ole H. Nielsen at the Technical University of Denmark

Guide to Creating and Configuring a Server Cluster under Windows Server 2003
White paper with step-by-step instructions for creating and configuring a typical single quorum device multi-node server cluster.

Deploying Mac OS X in Clusters
Carnegie Mellon University's deployment plan.

PS2 Supercomputer
How PlayStation 2 devices are linked together to create a cluster.


Originally posted December 17, 2003

van Eck phreaking

Van Eck phreaking is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring and picking up the electromagnetic fields (EM fields) that are produced by the signals or movement of the data. This electromagnetic radiation is present in, and with the proper equipment, can be captured from computer displays that use cathode ray tubes (CRTs), from printers, and from other devices.
Here is an example: The image on a CRT is created by electron beams that scan across the screen in a series of horizontal lines from left-to-right and top-to-bottom, in the same way you read a page of text (except much faster). This occurs at a specific frequency for each individual monitor; there are only a few standard frequencies in existence, and every monitor uses one of them. The intensity of the electron beams determines the relative red, blue, and green brightness for each pixel (picture element) on the screen. As a result, the CRT produces a modulated EM field that contains all the information in the image displayed on the screen at any moment. This information looks like a meaningless, irregular waveform if viewed directly on an oscilloscope. But, like a television (TV) signal, it can be demodulated with special equipment, and the image on the screen thereby retrieved, from some distance away.

This term combines the name of Wim van Eck, who in 1985 authored an academic paper that described this form of electronic eavesdropping, with the term phreaking, the earlier practice of using special equipment to make phone calls without paying. Van Eck phreaking is identified in the U.S. government project known as Tempest and, although some information remains classified, has probably been used to spy on suspected criminals and in espionage. The Tempest project has also led to advice and some standards development for how to shield devices so that eavesdropping is not possible. However, the cost of shielding means that many commercial devices are still vulnerable and, for this and other reasons, some of the details about what equipment is required to do van Eck phreaking remains classified. Susceptibility to eavesdropping can also be minimized by designing equipment that generates little EM energy.

Depending on the type of CRT used, the sensitivity of the detection equipment, and the general level of EM energy in the area, Van Eck phreaking can be done over distances ranging from a few meters up to several hundred meters

Monday, March 01, 2004

Build a Wireless Access Point

With some open-source software, some hardware, and a lot of handiwork, you can make your own WAP.

By William Arbaugh


Before I tell you how to build your own wireless access point, I need to set one thing straight: You're not going to save money doing it yourself (although you won't pay much more than the price of an off-the-shelf WAP). But that's not going to stop me from showing you how to build a WAP on today's show.

Here are a few reasons why you should build your own WAP.


You can highly customize how your WAP behaves.
You'll learn how a WAP works.
You can impress your friends with your skills.
It's fun to put something together.

I use a small, inexpensive, commercial-embedded system board from Soekris Engineering. There are several software packages you can use, but I use an open-source application called m0n0wall. It provides a firewall and a Web-based configuration interface. And since it's open source, you can change it.


Wireless architecture and security


Treat all WAPs just as you do an Internet connection. They need to be protected from unauthorized use by your neighbors and passersby. The level of protection depends on what you're doing on the network, as well as the threat to your network. My how-to provides protection for most ordinary users, but I'll also tell you how you can easily increase your protection without much additional effort.


This project builds a combination firewall and WAP. If you're going to use the WAP in this how-to you can get rid of your current network address translation/firewall box, if you already have one. See the basic architecture where m0n0wall is the firewall and WAP.


M0n0wall will be set up to use WEP (wired equivalent privacy). WPA (Wi-Fi protected access) provides the best protection, but it hasn't been incorporated into any open-source projects. WEP has problems, but several mitigation strategies make it difficult (but not impossible) to successfully exploit a network using WEP with IV filtering.


If network security is of utmost importance, use IPsec in addition to WEP.


William Arbaugh is co-author of "Real 802.11 Security: Wi-Fi Protected Access and 802.11i."


Parts and Tools

The Soekris 4521 uses an AMD ElanSC520 processor with 16 to 64MB of SDRAM. It has a pair of 10/100 Ethernet ports (RJ-45), one serial port (DB9), a mini-PCI type III socket, and a CompactFlash type I/II socket. The board uses 10 watts of power and runs on 7 to 56 volts DC. Power-over Ethernet is provided using the 802.3af standard.


The boards are widely used by researchers and hobbyists around the world, and they have proven to be very dependable.


Bill of materials


One Soekris 4521-30 with case and 64MB RAM or Soekris 4511, $235 (part no. 10452131)
One kit with PCMCIA card, MMCX-RP-TNC pigtail, and rubber duck antenna, $114 (part no. KIT-EXT1-5-SOEKRIS)
One SanDisk CompactFlash Card (32 or 64MB), about $30
M0m0wall image for the Net45XX

Tools


Phillips screwdriver
USB CompactFlash reader
Computer running UNIX or Windows NT/2000/XP with a USB port
Female DB9 to Female DB9 null modem serial cable

Instructions for Building Your WAP


Remove the four black screws from the bottom of the 4521 case. Open the case.

Remove the screw post from in front of the CompactFlash socket.



Connect the pigtail to the leftmost antenna opening on the case (ant 1) with the two screws provided in your kit.

Hold the PCMCIA card so you can read the writing on the front of the card. The bottom connector is the main antenna connection for the card. This is where you will be connecting the pigtail. (Connecting the pigtail in the wrong place significantly reduces the signal strength.)

Insert the PCMCIA card into the rightmost socket on the Net4521 circuit board (J4).



Install the m0n0wall image onto the CompactFlash card following the instructions. If you are not completely comfortable with Unix, I highly recommend using Manuel's physwrite (found on the m0n0wall site) program under Windows NT/2000/XP with a USB CF reader. The program will determine the appropriate disk parameters for a successful write.

Insert the CF card into the socket and reinsert the screw post.



Attach the antenna to the connector.

Configure m0n0wall via the configuration instructions for a Net 45XX.

Once you've successfully configured m0n0wall and you're sure everything is working, reassemble the case with the four black screws.


Configure the M0m0wall Software



Attach the null-modem cable to the WAP and your computer's serial port. (Check the BIOS to see if your serial port is enabled. The serial ports on IBM Thinkpads are disabled by default.)

Open your favorite terminal application and set the baud rate to 19200 (the Soekris default).

Power up your WAP.

Once you see the boot counter, hit Ctrl + P on your keyboard to stop the comBIOS boot process and enter the monitor command prompt.

Type "set conSpeed=9600" (without quotes) to set the console speed to 9600 baud. See an example.

Turn off the WAP and unplug it.

Set the baud rate for your terminal application to 9600 baud.

Reapply power to the WAP, and you should see the boot process begin again.

You should see the m0n0wall serial configuration prompt. Here's what it looks like.

Assign the wireless device to the m0n0 configuration. Press 1 to assign interfaces. Now enter sis0 for the LAN interface, sis1 for the WAN interface, and wi0 as the optional interface, as shown here. Finally, hit Return. The system will now reboot.


Use the Web interface


After completing the above steps, you're going to use the Web interface to configure the WAP.



Connect the Ethernet port on the WAP to a switch, hub, or to your computer with a cross-over cable.

Open your Web browser, enter "http://192.168.1.1" (without quotes) in the URL box, and hit Return.

A dialog box should appear.
User name: admin
Password: mono
You should see the main webGUI configuration window.

Click on the OPT1 entry under Interfaces. This will take you to the wireless configuration page.

You want to select the "Enable Optional 1 Interface" box, and enter a name in the description text box. I used the name WiFi.

Under IP Configuration, you want to select LAN from the pull-down menu where it says "Bridge with." This will create a bridge between your wireless network and LAN so all of your computers share the same LAN segment.

Now set a name, or SSID, for your network and leave everything else the same. We're not setting the WEP key here because we want to make sure things work. If you desire additional protection, you'll need to look into using the IPsec support provided with m0n0wall.

Click Save and wait for the page to update itself.

Now we need to add a firewall rule so traffic from the LAN interface is forwarded onto the WiFi interface. Select Rules under the Firewall column. You should see this screen with one default rule listed.

Click on the rightmost + sign to add the new rule. Then modify the following settings.
Action: Pass
Interface: WiFi
Source: LAN subnet
Destination type: Any
Description: Enter a name so you can recognize the rule
.

Save the rule. On the next screen click Apply changes. Your changes won't go into effect until you click this button.

There is only one more thing to configure: the password. In the gray column on the left, click General Setup.

You should be at the System: General setup page. Under the Password setting, enter your new password in the provided spaces.

Under Time Zone, pick the zone closest to you.

Click Save.


Final steps



Assuming your ISP provides you with an address via DHCP, take a network cable and connect the Eth1 port of the WAP to your cable/DSL modem. The Eth0 port is your local area network; connect that one to a switch or hub. If you want to make a direct connection to your computer without a switch or hub, then you need a cross-over cable.

Now reboot your wireless AP/firewall, and it should obtain an address from your ISP. Once the system has rebooted, you can connect your computer to the switch/hub or wireless network. The system contains a DHCP server so you shouldn't have to do any configuration on your computers as long as they're set up to use DHCP which most are.

Now from a terminal window on your computer, enter the command ping 192.168.1.1. This will test your WAP. If you get a response, then try and ping a host on the Internet such as ping www.techtv.com.

Go back and set a WEP key for the Wi-Fi interface as well as on all of your wireless computers. Not using WEP will leave your network wide open for anyone who cares to use (or abuse) it. WEP was not turned on initially here only to make initial testing easier.

After you set the WEP keys, turn WEP on and you're done.