إعلان

  • Hard Drive Data Recovery & RAID Data Recovery Since

    Hard Drive Data Recovery & RAID Data Recovery Since 1995

    Data Recovery For Laptop, Desktop and External Hard Drives, PCs and Mac:
    RAID Data Recovery Restores Vital Business Data From Offline & Failed Servers...

    • Nationwide Locations: ADR has a data recovery center near you!
    • FREE Diagnosis! We guarantee we'll recover your data or there's no charge.
    • All Hard Drives & RAID: Laptop, desktop, external hard drives and RAID.
    • Emergency & Onsite RAID Recovery: For offline and failed RAID servers.

  • Data Recovery Services in Denver Colorado

    Featured Hard Drive Data Recovery Services in Denver:


    Secure Data Recovery of Denver specialize in: Raid Recovery, Laptop Data Retrieval, Hard Drive Data Recovery, Mac Data Recovery, Email/File Data Recovery, SQL Data Recovery and Tape Recovery Services.

    We have been operating in the data recovery and hard drive repair industry since 1997 and offer world-class data recovery and repair services and support at our Denver lab location. Our Secure Data Recovery team of professionals are hard disk data recovery experts in providing advanced disc data recovery solutions. Secure Data Recovery Services in Denver hard drive data recovery specialists provide: fast, friendly, accurate and reliable data recovery service.

    Hard Drive Data Recovery Denver Raid Data Recovery Denver Mac Data Recovery Denver
    Hard Drive Data Recovery RAID Data Recovery Services Apple Mac Data Recovery

    Tape Data Recovery Denver SQL Data Recovery Denver Flash Data Recovery Denver
    Tape Data Recovery Services Database Recovery Services USB & Digital Media Recovery



    We at Secure Data Recovery Denver Services have worked on data recovery software and services for many years. Secure Data Recovery Services of Denver can recover deleted files and deleted data from all kinds of Operating Systems: Windows OS, Novell (Traditional and NSS volumes), Linux (SuSe / RedHat / Mandrake / Ubuntu / Turbo / Debian / ), Mac (Apple Mac OS X /Apple Mac OS 10.x and higher) as well as Solaris (Sparc and Intel), Unix (SCO Open Server, BSD).

    We also provide Expedited Emergency data recovery services for all RAID configurations, SAN, NAS, multi disk server configurations and removable disk cartridges, diskettes, tape, CD, DVD, magneto-optical cartridges, USB flash, digital media data storage. Secure Data Recovery Denver offer the highest level of expertise to all of our customers while we maintain the most competitive prices in the data recovery field.

    Area Served by this location: Denver City, Alamo Placita, Athmar Park, Auraria, Baker, Barnum, Barnum West, Bear Valley, Belcaro, Berkeley, Burns Brentwood, Byers, Capitol Hill, Central Business District, Chaffee Park, Cheesman Park, Cherry Creek, City Park, City Park West, Civic Center, Clayton, Cole, College View, Congress Park, Cory-Merrill, Country Club, Crestmoor, Curtis Park, Denver International Airport, East Colfax, East Highlands, Elyria-Swansea, Five Points, Fort Logan, Gateway, Globeville, Golden Triangle, Goldsmith, Green Valley Ranch, Hale, Hampden, Hampden Heights, Hampden South, Harvey Park, Harvey Park South, Highland, Hilltop, Indian Creek, Jefferson Park, Kennedy, Lincoln Park, LoDo, Lowry, Mar Lee, Marston, Mayfair, Montbello, Montclair, North Capitol Hill, North Park Hill, Northeast Park Hill, Overland, Park Hill, Parkfield, Platt Park, Regis, Rosedale, Ruby Hill, Skyland, Sloan's Lake, South Park Hill, South Platte, Southmoor Park, Speer, Stapleton, Sun Valley, Sunnyside, Union Station, University, University Hills, University Park, Valverde, Villa Park, Virginia Village, Washington Park, Washington Park West, Washington-Virginia Vale, Wellshire, West Colfax, West Highlands, Westwood, Whittier, Windsor.

    Providing Hard Drive, Raid Server data recovery services in the following zip codes: 80201-80212, 80214-80239, 80241, 80243-80244, 80246-80252, 80256-80266, 80271, 80273-80274, 80279-80281, 80290-80291, 80293-80295, 80299, 80012, 80014, 80022, 80033, 80123, 80127 and area codes: 303 / 720.

  • DENVER DATA RECOVERY

    Few things before you start:

    • Please call our technician 720.222.0110 ext 2 to setup Free Data Recovery Evaluation.
    • You can setup drop off time online using this online case management system.
    • Fill out online data recovery quote, you will receive confirmation email with further instructions.
    • If you would like to ship your media and monitor your case online please visit following section.
    • Free Evaluation usually takes 2-4 hours depending on Lab load. We will generate report and available quotes for you.
    • We usually provide 2 quotes: Priority and Economy services, cost and amount based on clean room load, parts availability.
    • Emergency data recovery services available, for emergency data recovery services evaluation fee applies.
    • After evaluation completed and quotes provided, client can decide if data recovery cost worth lost data.
    • After quote approved, we can start data recovery attempt. (Average turnaround for priority cases – 3 to 7 business days, economy – 10-21 business days)
    • Your recovered files will be saved on our secure servers, you will receive files / folders list with recovered data.
    • No Files – No Charge: Charges are only applicable when you have agreed with our quotation and we have made a full recovery or you accept the recovery results as presented. If there are no files recovered, no recovery fee is charged.
    • If there is a partial recovery, you decide to either accept the recovery as presented for the quoted price or decline the recovery with no recovery fee charged.
    • We will setup remote connection or schedule time in our office for real time data files review / accessibility / readability, prior to your final decision and full satisfaction with recovery results.
    • Screenshots of recovered data will be also posted online for your review and comments. Critical random files can be delivered over email / FTP before final approval.
    • Please remember – each case is unique and required engineering time, parts, in some cases several sets of parts, clean room fee and cost for recovery can be provided after evaluation.
    • Average cost for logical failures : $200 – $400  Hardware failures, when clean room required, parts and device “surgery” from $600 and up.
    • Data can be delivered via FTP, Email, External Drive, DVDs depending on data size and capacity, we recommend use or drop off extra external drive for data transfer. We stock external drives as well for competitive prices. With any PRIORITY Services we will provide free external drive.
    Denver Data Recovery Services by Eboxlab, provide professional, fast, economical data recovery caused by hard drive crash, software corruption, a computer virus, human error, or a natural disaster. With many years in the data recovery business, our engineers are experts at hard drive recovery, RAID recovery, Exchange & Mail recovery, Windows NT / Windows XP / Windows Vista / Windows 7 recovery, UNIX recovery, MAC recovery, tape recovery, disk recovery, database recovery, password retrieval and much more. No matter how the data loss occurred, Eboxlab Data Recovery Services has the ability to recover it for you.

    Here are a few things you need to keep in mind, on taking your first steps in such a situation:

    • Do not use automatic data recovery tools.
    • Do not use any application / program that accesses (alters) the problem media in any way.
    • Shut down any system / device that makes unusual grinding and clicking noises when operated.
    • Do not open the hard disk or any such physical media device and try to repair it on your own.
    • Call our representative for initial consultation for data recovery.
    • Wrap the defective units in anti-static envelop if possible, bubble wrap it, and seal package securely and ship to our facility.
    • Use a shipping carrier that provides you tracking and proof of delivery when shipping the product to us.

  • Hard Drive Recovery Services
    SalvageData Recovery offers Certified hard drive recovery service and solutions for all types of hard disk drive crash and data loss types. We don't just recover hard drive data, but also offer more service options and hard drive recovery tools to salvage data than most in the industry. Hard drive data recovery is at the core of our expertise, thefore we maintain the highest industry hard disk recovery success rate and are often able to recover data most of today's "recovery" shops simply call unrecoverable.
    Salvage the unRecoverable:SalvageData is a leading expert, specializing in professional hard drive recovery. We support and recover data from all disk drives makes, models and sizes, from the latest quarter-sized mirco-drives to the oldest Bigfoot ATA hard drives. SalvageData hard drive recovery engineers use the latest technical expertise and methods combined with years of industry experience to produce first-rate results you can count on. So whether you're a home user or an IT professional, trust that SalvageData is the leading knowledgeable source and choice for salvaging your hard drive data recovery needs. Our facilities host a class 100 clean room to facilitate hard drive recovery and other data recovery service options such as RAID, RAID0, RAID5 and other forms of data recovery.
    Hard Drive Data Recovery for all  causes of data loss:
    At SalvageData we've found that mechanical and electrical failure, along with software corruption and human error, often play a major role in data loss, however
    regardless the cause of failure, you can trust the experts at SalvageData to successfully salvage and recover your lost hard drive data.
    http://gregscs.com/images/DataBackup.jpg

  • Hard Disk Recovery Services

    Hard Disk Recovery Services

    Have you experienced a hard drive crash? Is your hard disk inaccessible to your Operating System or is it making buzzing or clicking noises? All of these may be symptoms of physical hard disk failure, which can put your data at risk. But, be assured that your data is likely still very recoverable.

    Before you make any potentially dangerous recovery attempts, why not contact us here for a free, no obligation data recovery consultation?

    Our data recovery technicians are available 24 hours per day to provide you with free support and determine whether or not you have a serious hard drive issue. We are experts in not only Windows and Mac hard disk technologies, but also server applications such as RAID data recovery and Exchange recovery.

    Business Hard Drive Recovery Specialists

    In today's world, computers are integral for the survival of any company, large or small. We at Hard Disk Recovery Services (HDRS) understand that the loss of valuable computer data results in a parallel loss of revenue, and our disk recovery service has helped many companies halt the drain on resources this causes. From our beginnings over 16 years ago as a hard disk repair facility, we have gathered the experience necessary to make us uniquely qualified in the retrieval of lost electronic information.

    Strong Hard Disk Recovery Experience

    At Hard Disk Recovery Services our experience enables us to provide you with the peace of mind that your data is safe, and recoverable in almost all instances. Our findings have revealed that in the great majority of circumstances, important data is never completely lost.
    This is the case not only in common user errors, such as accidentally deleted files or formatted drives, but also in the case of:
    • Power surges and outages
    • Lightning strikes
    • Fires, flood and other natural disasters
    • Viruses and sabotage
    • Equipment malfunctions
    • Static electricity

    Never Assume You Cannot Recover Data

    Never assume your valuable data can't be recovered, or that hard drive recovery is impossible. Many people who experience data loss, even many experts, often initially consider that data irretrievable. Many of these experts have contradictory theories about data loss, which makes this issue especially unclear to the average user. The insight and experience possessed by the technicians at Hard Disk Data Recovery sheds new light on the confusing and frustrating problem of Data loss. Data loss need not be a major crisis - with our help, we can have you back on track within 4-6 days.

    In the 20+ years that HDRS has offered these hard disk data recovery services, we have developed extensive knowledge covering hard drive infrastructure and electronic circuitry, and we have continually trained our technicians to develop expertise all software and file structures as well. Our experience, our commitment, as well as all our satisfied customers, have made us a

    Looking for a hard disk data recovery quote? Click here.

  • Mesothelioma Attorney San Diego
    Contrary to what you may believe, there is as yet no evidence to suggest that there is any singular cause of mesothelioma, a disease which is extremely debilitating, crippling, and disturbingly enough, fatal. With that said, it has been determined beyond all doubt that asbestos fiber is a common denominator in all cases of the disease. In other words, all patients who have the disease have at some point in their lives been exposed to asbestos fibers. Because asbestos is essentially a compound made up of fine microscopic fibers, these fibers are released into the air when the material is processed or worked with in certain ways. In the past, asbestos was commonly used in the building trade because of its outstanding ability to inhibit fire, but of course it was also used for the same reason in several different industries, such as the ship building industry for example. As a result, many thousands of employees were exposed to the material, with many of them having spent several years inhaling the fine microscopic fibers. This of course means that employers failed to provide their employees with a safe working environment, hence the reason why someone may require the services of a mesothelioma attorney San Diego.

    San Diego has a reputation of being one of the cleanest and healthiest cities in America because of its air quality. With plenty of sunshine and such clean air, San Diego's population tends to spend more time outdoors than people living in other cities. Ironically however, San Diego also has one of the highest numbers of mesothelioma cases in America, so is hardly surprising that there's a demand for a mesothelioma attorney San Diego. If you or one of your loved ones have been diagnosed with the disease then it is advisable for you to contact a mesothelioma attorney as soon as possible.
    Generally speaking, if a person has been employed to work in conditions where they were exposed to asbestos, then there's every chance that they would have been inhaling the fine asbestos particles. When these are inhaled they end up becoming lodged in the protective mucous membranes which surround the lungs. Unfortunately, the human body is simply unable to dislodge these fine fibers, and as a result, new mucous membranes begin to form around the fibers. This eventually leads to the formation of tumors, which ultimately means the person has developed terminal cancer. Shocking enough, an estimated two and a half thousand people die from the disease every year in the United States, and it is generally accepted that death occurs within two years after having been diagnosed with the disease. Considering the bleak reality and seriousness of the condition, those with the disease certainly do require the services of a mesothelioma attorney San Diego.
    Even though things may not look to promising from a medical point of view, patients need to realize that studies and research in the field is ongoing, and new forms of treatment are continuously being developed. However, such research requires vast amounts of money, and as a result, the various types of treatment are usually quite costly. If you or anyone you know has the disease, then you need to consult with a mesothelioma attorney San Diego, in that they may be able to secure financial compensation from a past employer in order for you to be able to afford the best available form of treatment.

  • Mesothelioma Attorney San Diego
    Contrary to what you may believe, there is as yet no evidence to suggest that there is any singular cause of mesothelioma, a disease which is extremely debilitating, crippling, and disturbingly enough, fatal. With that said, it has been determined beyond all doubt that asbestos fiber is a common denominator in all cases of the disease. In other words, all patients who have the disease have at some point in their lives been exposed to asbestos fibers. Because asbestos is essentially a compound made up of fine microscopic fibers, these fibers are released into the air when the material is processed or worked with in certain ways. In the past, asbestos was commonly used in the building trade because of its outstanding ability to inhibit fire, but of course it was also used for the same reason in several different industries, such as the ship building industry for example. As a result, many thousands of employees were exposed to the material, with many of them having spent several years inhaling the fine microscopic fibers. This of course means that employers failed to provide their employees with a safe working environment, hence the reason why someone may require the services of a mesothelioma attorney San Diego.

    San Diego has a reputation of being one of the cleanest and healthiest cities in America because of its air quality. With plenty of sunshine and such clean air, San Diego's population tends to spend more time outdoors than people living in other cities. Ironically however, San Diego also has one of the highest numbers of mesothelioma cases in America, so is hardly surprising that there's a demand for a mesothelioma attorney San Diego. If you or one of your loved ones have been diagnosed with the disease then it is advisable for you to contact a mesothelioma attorney as soon as possible.
    Generally speaking, if a person has been employed to work in conditions where they were exposed to asbestos, then there's every chance that they would have been inhaling the fine asbestos particles. When these are inhaled they end up becoming lodged in the protective mucous membranes which surround the lungs. Unfortunately, the human body is simply unable to dislodge these fine fibers, and as a result, new mucous membranes begin to form around the fibers. This eventually leads to the formation of tumors, which ultimately means the person has developed terminal cancer. Shocking enough, an estimated two and a half thousand people die from the disease every year in the United States, and it is generally accepted that death occurs within two years after having been diagnosed with the disease. Considering the bleak reality and seriousness of the condition, those with the disease certainly do require the services of a mesothelioma attorney San Diego.
    Even though things may not look to promising from a medical point of view, patients need to realize that studies and research in the field is ongoing, and new forms of treatment are continuously being developed. However, such research requires vast amounts of money, and as a result, the various types of treatment are usually quite costly. If you or anyone you know has the disease, then you need to consult with a mesothelioma attorney San Diego, in that they may be able to secure financial compensation from a past employer in order for you to be able to afford the best available form of treatment.

  • Russian President Medvedev asked to fund Windows clone
     http://news.bbcimg.co.uk/media/images/55341000/jpg/_55341482_reactos.jpg
    free, open-source Windows "clone" - ReactOS - that has been in development for over a decade has caught the eye of Russian President Dmitry Medvedev.
    A student at a Russian high school the president visited recently gave Mr Medvedev a brief overview of the project - and asked him for 1m euros.
    The system's developers say it runs all Windows programs, but is much faster than its Microsoft equivalent.
    If it gets a financial boost, it could be usable in the near future, they add.
    Contrary to Linux and other non-Windows operating systems, ReactOS is a community-driven international initiative that is said to be fully compatible with all Windows-based applications, programs and services.
    The venture's project coordinator, Moscow-based Aleksey Bragin, said that the system was almost ready to go from the experimental to the available-to-all stage.
    And a recent unexpected conversation between a high school student and the Russian leader Dmitry Medvedev could help obtain the much-needed funding to apply the final touches.
    "Mr Medvedev visited a high school in the Stavropol region, and as a coincidence, one of our developers, Marat Karatov, studies there," said Mr Bragin.
    "So Marat decided to use this chance and tell the president about our free, non-commercial initiative, and he also quite unexpectedly said that for the project to make it to the finish line we would need 1 mln euros ($1,370,184, £865,578).

    Start Quote

    Microsoft has an absolute monopoly and no real rivals, and there's nothing good about it”
    End Quote Aleksandr Rechitsky ReactOS
    "And Mr Medvedev replied that he'll think about it, adding that the project was indeed very interesting."
    Microsoft's monopoly According to a ReactOS developer Aleksandr Rechitsky, once the operating system is installed on a PC, the end user should not notice any difference from Windows.
    "Microsoft has an absolute monopoly and no real rivals, and there's nothing good about it," he said.
    "There's absolutely nothing to replace Windows with, and if you decide to switch to a different operating system, you then have to change all the programs as well.
    "But in this case you can change the system but leave all the programs intact."
    The developers added that ReactOS was much faster, too - if on a standard PC Windows takes about a minute to load, ReactOS will only take about 10 seconds.
    If there was sufficient funding, it would take about a year for the project to make it to the real world, said Mr Rechitsky.
    For now, most desktop computers still use Windows, but other operating systems available include Apple's Mac OS X and Linux.
    Microsoft has recently shown off early releases of the next version of Windows - Windows 8 - that will run on tablets, phones and desktop computers.
    It is expected to be available before October 2012.



  • "واكوم" تطلق رساماً إلكترونياً بتقنية عرض "LCD"
     http://images.alarabiya.net/c2/20/436x328_89349_166831.jpg
    أصدرت شركة "واكوم" وهي من أكبر الشركات المنتجة لأجهزة الرسم الإلكتروني في العالم جهاز رسم إلكتروني جديد بحلة إبداعية مذهلة تحت اسم "Wacom Cintiq 24HD" صمم خصيصا للاستخدام المهني.
    ويأتي الجهاز الجديد بشاشة عرض قياسها 24 بوصة وبدرجة وضوح غاية في الدقة والجودة 1920x1200 بيكسل، وبزاوية عرض أقصاها 178 درجة ونسبة تباين 550:1، وتستند نوعية الشاشة على تكنولوجيا "IPS" وهي تقنية عرض "LCD" التي تقدم أفضل زوايا مشاهدة، وهي نفس التكنولوجيا المستخدمة في "الآي باد".

    كما أنه مزود بقلم ضغط للتفاعل مع الشاشة بدون كابل أو بطارية لدعم 2048 من مستويات حساسية الضغط، وبدرجة ميل 40 درجة.

    ويتسم القلم أيضا بأنه وضع وفق أسس ومعايير جديدة غاية في الدقة والجودة للمصممين في مجال الرسوم ثلاثية الأبعاد، والتصاميم المعمارية والصناعية والتأثيرات البصرية والرسوم المتحركة ومطوري ألعاب الفيديو، فضلا عن وجود ممحاة رقمية في نهاية القلم للقيام بأية تعديلات أو تغييرات سريعة في الرسومات أو التصميمات.

    بالإضافة إلى أن الجهاز يدعم 92% من مستوى الألوان "Adobe-RGB" ومستوى الإضاءة "190 nit" وهي وحدة تعادل واحد كانديلا لكل متر مربع وتبلغ زمن الاستجابة 13 جزءا من الثانية فقط.

    ويتميز الجهاز أيضا بقدرته على التحكم في زاوية وارتفاع الشاشة، حيث يستطيع المستخدم ضبط الجهاز في الوضع المثالي له ليصل إلى حافة مقعده أو فوق ركبتيه، مما يسهل على الرسام القيام بعمله وكأنه يستخدم الطرق التقليدية بالقلم والورقة.

    والجهاز الجديد مزود بـ10 مفاتيح قابلة للبرمجة تسمح من خلالها للرسامين المحترفين القيام بالعمليات السريعة والاختصارات وبعض المهام المشتركة والعمل لفترات طويلة بدون كلل أو تعب في حالة عدم استخدام القلم، فضلا عن وجود مجموعة من المفاتيح متمركزة على جانبي الجهاز للقيام بوظائف مثل التكبير والتمرير وتغيير حجم الفرشاة، كما أنه مزود بمستشعر "واكوم" الجديد الذي يتمتع بقدرة فائقة على التقاط أية ضغطة من قلم الرسم الخاص به.

    ويوجد في أعلى الجهاز 3 مفاتيح جديدة، أحدهما خاص بإظهار شاشة مساعدة في حال نسيان وظيفة كل مفتاح على حدة في بعض البرامج، والثاني يتيح فتح لوحة التحكم الخاصة بالجهاز مباشرة، أما الثالث وهو أكثر المفاتيح استخداما وهو المختص بإظهار لوحة المفاتيح على الشاشة.

    ويوجد بشاشة الجهاز منفذ أو وصلة بحيث يمكن توصيله بالكمبيوتر، وبذلك يوفر للمستخدم أيضا القيام بالمهام الأخرى مثل متابعة البريد الإلكتروني أو تصفح شبكة الإنترنت.

    وتخطط الشركة لطرح منتجها الجديد في شهر أكتوبر القادم بسعر 2500 دولار أمريكي.

  • مايكروسوفت تكشف عن نظام التشغيل الجديد ويندوز8
    كشفت شركة مايكروسوفت عن نظام التشغيل الجديد "ويندوز8" الذي صمم لكي يعمل في أجهزة الكمبيوتر اللوحية وأجهزة سطح المكتب وأجهزة الكمبيوتر المحمول.
    وسيعمل هذا البرنامج الذي من المقرر طرحه في الأسواق في عام 2012 لأول مرة على معالجات النصوص منخفضة الطاقة المصممة وفق نظام ARM .
    وقال مدير قطاع وندوز في الشركة، ستيفن سينوفسكي، عند الترويج لوندوز8 "لقد أعدنا تصميم نظام وندوز".
    وسيعمل هذا النظام من خلال واجهتين: الواجهة الأولى تتمثل في سطح المكتب التقليدي الذي يشبه سطوح نسخ أخرى من وندوز والواجهة الثانية قرص الإصدار المعروف باسم "مترو".

    خصائص

    وتتميز خصائص مترو بأنها أكبر حجما وتتضمن أدوات تحكم مضغوطة من النوع الذي يناسب الشاشات التي تعمل باللمس. وغياب هذه التقنية يفسر قلة توافر أقراص وندوز7.
    وقالت مايكروسوفت إنها ستخصص موقعا إلكترونيا لبيع وندوز8 على الإنترنت عن طريق السماح للمشترين بتنزيل النسخة الإلكترونية منه.
    ومن ضمن الخصائص البارزة التي ينطوي عليها وندوز8 هو توافقه مع المعالجات المصممة وفق تقنية ARM
    ويُذكر أن الرقائق المصممة وفق تقنية ARM عادة ما تستهلك كمية محدودة من الطاقة ونتيجة لذلك فإنها مستخدمة في الهواتف الذكية والأقراص المتوفرة حاليا.
    وتتطلب الأجهزة التي تعمل بنظام وندوز اليوم إنتل أو الأنظمة المتوافقة مع إنتل.
    ومن المرجح استخدام رقائق ARM في الأجهزة التي تعمل بنظام وندوز8 مترو.
    ولم تقدم الشركة تفاصيل بشأن الرقائق التي ستدمج في أجهزة سطح المكتب أو الأجهزة المحمولة.

    منافسة

    وندوز
    تواجه الشركة منافسة متزايدة في قطاع الهواتف المحمولة
    وتواجه الشركة منافسة متزايدة في قطاع الهواتف المحمولة.
    وينظر إلى ولوج هذا السوق على أنه حيوي بالنسبة إلى مصممي برامج التشغيل والأجهزة الصلبة (مكونات الكمبيوتر الأساسية).
    وتوقع محللو القطاع في أبريل/نيسان الماضي أن يصل مستخدمو سوق الأقراص على الصعيد العالمي إلى 70 مليون على أن ينمو ليصل إلى 300 مليون مستخدم بحلول عام 2015.
    ومن المتوقع استمرار مبيعات أجهزة سطح المكتب والأجهزة المحمولة في النمو.

  • خيانة الفيس بوك لبيانات اعضاءها - نقاش وتحليل-- Traitor facbook
    الكثير ما نسمع عن التحذيرات من الفيس بوك وبعد عمليه طويله وفضائح انتشرت تبين ان البيانات يتم الوصول عليها عن طريق الاستخبارات الأوربية والإسرائيلية و أمريكيا

    وهل تعلمون تم الوصول عليها عربيه ؟؟؟؟؟؟؟؟؟


    في مصر أيام حركه الفيس بوك للشباب طالبت الاستخبارات المصرية إدارة الفيس بوك في استفسار عن بيانات عدت ناشطين وعن طريق الجهود السياسية وما سمي الانتر بول حصلوا على هذه البيانات


    وسبب هذا الشيء أيامها انزعاج كبير بعد فضح مجموعات عن هذه العملية من هكرز وغيرها

    واسقط الفيس بوك الذي لازم الجميع لم يبقى احد فينا ما سجل وسلم نفسه للموقع المزعوم

    كما أنا نفسي لدي حسابين للموقع ولي الشخصي وبإذن الله راح اغلق الشخصي عند تدشين خدمة بلاس من قوقل بشكل رسمي حيث أنها إلى الآن تجريبيه .

    السلطة السورية كنظيرتها المصرية طالبت في بيانات عدت صفحات ومرتاد ينها

    لاكن رفضت أدارة الفيس بوك هذا الطلب والسبب للرفض حللوه بعض متصدرين هذه الأخبار أن العيون كلها على الفيس بوك من مجموعات تهتم لحقوق الآنسان واخرى حقوقيه حتى الهكرز لم تسلم منهم

    وكتابتي لهذا الموضوع تحذير السياسيين من دمج الحسابات في أيميلك الشخصي اجعل أيميل خاص وشخصيه مختلفه ولا تربط بينهما ويفضل وحده في بروكسي والثانية من غير بروكسي أو حتى لو تفرق بينهم في المتصفحات مثل موزيلا وكروم وغيره

    والحذر واجب شيء مزعج أذا عرفت انك مباح ولا توجد سريه لديك.

    طبعا المصدر نحن بعد عدت دراسات ومتابعه أشخاص حقوقيه توصلنا لهذه النتيجة ولله الحمد والدراسة تمت في الخفاء
    وصح ينقص الموضوع المصدر واحب أوضخ المصدر هم مجموعة
    Anonymous

  • computing Laptops & Netbook PCs
    New Product

    HP 2000z series

    5.0 out of 5  5.0 out of 5 stars (1 reviews)
    For everyday tasks, this 15" (diagonal) laptop delivers classic style and great features at a budget-friendly price
    • Genuine Windows 7 Home Premium 64-bit
    • AMD Dual-Core C-50 (1.0GHz, 1MB L2 Cache) + AMD Radeon(TM) HD 6250M Discrete-Class Graphics
    • 2GB DDR3 System Memory (1 Dimm)
    • FREE Upgrade to 320GB 5400RPM Hard Drive
    • 802.11b/g/n WLAN
    • Up to 5.50 hours of battery life (6 cell)+++

  • Microsoft BlueHat Prize

    WHY ARE WE DOING THIS?

    The Microsoft BlueHat Prize contest is designed to generate new ideas for defensive approaches to support computer security. As part of our commitment to a more secure computing experience, we hope to inspire security researchers to develop innovative solutions intended to address serious security threats.
    bar

    WHAT IS THE CONTEST?

    The inaugural Microsoft BlueHat Prize contest challenges security researchers to design a novel runtime mitigation technology designed to prevent the exploitation of memory safety vulnerabilities. The solution considered to be the most innovative by the Microsoft BlueHat Prize board will be presented the grand prize of US $200,000. Important information:
    • Entries will be accepted and must be received by email to bluehatprize@microsoft.com between August 3, 2011 to midnight Pacific Time on April 1, 2012.
    • The winning entry will be announced at Black Hat USA 2012.
    • Submitters retain all rights to the intellectual property in the content they submit and Microsoft has the right to license that content.
    • For full details, see rules and regulations.
    bar

    YOU COULD WIN

    First prize: $200,000 (USD)
    Second prize: $50,000 (USD)
    Third prize: MSDN Universal subscription valued at $10,000 (USD)
    bar

    HOW TO ENTER?

    To enter, send an email to bluehatprize@microsoft.com
    include your technical description and prototype as outlined in the official rules.
    The Microsoft BlueHat Prize board will reply with additional information applicants will need to submit a complete entry

    http://www.microsoft.com/security/bluehatprize/.

  • Comment faire reduire le Ping dans Cs 1.6 ?

    Comment faire reduire le Ping dans Cs 1.6 ?

    Bonjour les Amis ! :P

    la , je vais vous informer , comment faire éliminer le problém d Ping dans Cs !

    1- Créer un Fichier Text  utilisant NOTEPAD !
    2- Ouvre le , et tapez les code ci-dessu !

    fps_max 100

    fps_modem 100
    cl_cmdrate 100
    cl_updaterate 100
    rate 15000

    3- enregitrez le fichier sous " ping.cfg " , dans le dossier "cstrike" !

    entrer dans le jeux , en ouvrant le console par " ² " , et tapez le code ci dessu !

    exec ping.cfg


    --------------
    et voila , c fini ! :D

  • Introduction à PHP

    Introduction à PHP

    PHP est un langage interprété (un langage de script) exécuté du côté serveur (comme les scripts CGI, ASP, ...) et non du côté client (un script écrit en Javascript ou une applet Java s'exécute sur votre ordinateur...). La syntaxe du langage provient de celles du langage C, du Perl et de Java. Ses principaux atouts sont :
    • Une grande communauté de développeurs partageant des centaines de milliers d'exemples de script PHP ;
    • La gratuité et la disponibilité du code source (PHP est distribué sous licence GNU GPL) ;
    • La simplicité d'écriture de scripts ;
    • La possibilité d'inclure le script PHP au sein d'une page HTML (contrairement aux scripts CGi, pour lesquels il faut écrire des lignes de code pour afficher chaque ligne en langage HTML) ;
    • La simplicité d'interfaçage avec des bases de données (de nombreux SGBD sont supportés, mais le plus utilisé avec ce langage est MySQL, un SGBD gratuit disponible sur de nombreuses plateformes : Unix, Linux, Windows, MacOs X, Solaris, etc...) ;
    • L'intégration au sein de nombreux serveurs web (Apache, Microsoft IIS, etc.).

  • APOCALYPSE !

    APOCALYPSE !


    L’Apocalypse est le dernier livre de la Bible. Une tradition, discutée depuis le iie siècle, attribue sa composition à saint Jean l'Évangéliste.
    Étymologiquement, le mot « apocalypse » est la transcription d’un terme grec (ἀποκάλυψις / apokalupsis) signifiant mise à nuenlèvement du voile ou révélation. Le livre commence en effet par les mots « Révélation de Jésus-Christ » (Ap 1,1). C'est en ce sens que le texte présentera la personne de Jésus-Christ à son retour sur terre et les événements l'entourant.
    Le livre décrit une vision allégorique qui prophétise sur ce qui doit arriver à la fin des Temps : « Écris donc ce que tu as vu, ce qui est, et ce qui doit arriver ensuite » (Apocalypse chapitre 1, verset 19).

  • La Langue C++

    La Langue C++

    Le C++ est un langage de programmation permettant la programmation sous de multiples paradigmes comme la programmation procédurale, la programmation orientée objet et la programmation générique. C++ est actuellement le 3e langage le plus utilisé au monde2. Le langage C++ n'appartient à personne et par conséquent n'importe qui peut l'utiliser sans besoin d'une autorisation ou obligation de payer pour avoir le droit d'utilisation.

  • A DELPHI PROGRAM LAUNCHPAD

    A DELPHI PROGRAM LAUNCHPAD


    A DELPHI PROGRAM LAUNCHPAD #1
    Sick of the Windows Start menu? Follow Huw Collingbourne’s directions to create an alternative application launchpad.
    Requirements: Borland's Delphi 7 or Delphi 2005 (tested); or earlier versions of Delphi (untested)
    Download The Source Code:
    lpad1.zip

    See also Part Two
    There are many times when you may need to find and run some external application from one of your programs. That’s easy to do. But what if you want to display the icons associated with programs, or documents, and launch them by clicking a button? This would give you the ability to create your own ‘program manager’ tool or, with a bit more effort, an alternative to the Windows Start Menu. This month I’ll show you the basic techniques you’ll need to do these tasks. In the months ahead, I shall be developing more powerful variations of this program to show you how you might create all kinds of other file handling applications.

    The finished launchpad is shown towards the top of the screen here. I have populated it with buttons simply by dragging programs and documents straight out of the Windows Explorer and dropping them onto the Launchpad itself. A new button is created for each item dropped and an appropriate icon is added automatically. Clicking a button launches the associated file. Here I have clicked a button for a JPeg graphic and the file is immediately loaded into the associated application - which, on my PC, happens to be the Microsoft Office Picture Manager
    Out To Launch
    First I’ll need to write some functions to return the paths to various important subdirectories. Open theFileInfo.dpr project (or FileInfo.bdsproj) and view the filestuff unit. My functions are simple Delphi wrappers around Windows API routines. By making use of these functions, any code will be able to avoid the need to declare variables such as the character arrays and the strings needed by the API functions. For example, this is my windir() function:
    function windir : string;
    var
      winpath : CHARARRAY;
    begin
        GetWindowsDirectory(winpath,MAX_PATH);
        result := winpath;
    end;
    It supplies the  character array variable, winpath, to the API’s GetWindowsDirectory(). The second argument defines the size of the directory buffer. Here, MAX_PATH is a constant in Windows.pas and it is currently defined to be 260. The winpath array of characters is assigned by theGetWindowsDirectory() function and it is returned by my windir() function as a string. If the Windows directory is \WINNT on the C:\ drive, the string returned by this function will be ‘C:\WINNT’.
    Directory Enquiries
    My currdir() function is similar, but uses the API’s GetCurrentDirectory() routine. This returns the path of the currently active subdirectory. When you run the program, you can change the current directory by clicking the ‘Browse’ button to open a file in another directory. Finally, my appdir() function returns the home directory of the FileInfo application itself. This function does not use an API routine. Instead it uses the Application object’s ExeName property to retrieve a fully qualified path to theFileInfo.exe program file. This might be, for example, ‘C:\Delphi\Test\FileInfo.exe’. It then removes the file name itself using Delphi’s ExtractFileDir() function, which returns‘C:\Delphi\Test\’.
    The ExecuteFile() function wraps up the complexities of the API’s ShellExecute() function which you will find documented in Delphi’s Windows SDK help system. It lets you run a program or launch a file into its associated application. This is the ShellExecute() function as documented in the help system:
    HINSTANCE ShellExecute(
        HWND hwnd,
        LPCTSTR lpOperation,
        LPCTSTR lpFile,
        LPCTSTR lpParameters,
        LPCTSTR lpDirectory,
        INT nShowCmd
       );
    Now compare this with the code of my ExecuteFile() function:
    Result :=
      ShellExecute(Application.MainForm.Handle, // hwnd
      nil,                                      // lpOperation
      StrPCopy(ntFileName, FileName),           // lpFile
      nil,                                      // lpParameters
      StrPCopy(ntDir,Dir),                      // lpDirectory
      LAUNCHSTYLE);                             // nShowCmd
    Note that the ShellExecute() function returns something called a HINSTANCE or ‘instance handle’. This is a 32-bit value that identifies a Windows resource. If this function succeeds, it returns a handle to the application that was run. The first argument to the function is the handle of the window that calls the function. In my code this will be the handle of the main form of the FileInfo program. You can use the MainForm property of Delphi’s Application object in order to access this handle:
    Application.MainForm.Handle
    The ShellExecute() function now takes four LPCTSTR arguments. These are pointers to null-terminated strings. A null-terminated string is equivalent to Delphi’s PChar data type or an array of chars. Notice that, in my ExecuteFile() function I declare two variables, ntFileName and ntDir of the type CHARARRAY. This is required since you can’t use Delphi’s native string type when calling Windows API functions. This is because API functions work with C-style null-terminated strings.
    null-terminated string is, in essence, an array of characters with a null character stuck on the end. This type of string is accessed by the address of the start of the array. The PChar (pointer to char) data type is equivalent in Delphi and you can also create a compatible data type as an array of char. This is how I have defined the CHARARRAY type:
        CHARARRAY = array[0..MAX_PATH] of char;
    You can convert ordinary Delphi strings to PChars using the StrPCopy() function. A string is passed as the second argument to StrPCopy(), a PChar variable is passed as the first argument. The StrPCopy() function returns a pointer to the PChar which is what we need for the LPCTSTR arguments in ShellExecute().
    The first of the four LPCTSTR arguments required by ShellExecute() is lpOperation. This points to a string that specifies the operation to perform and this can be “open”, “print”, “explore” or NULL (nil in Delphi). If it is NULL, then the default operation, to Open the file, is performed. This is why my code usesnil. Next, lpFile points to the file name. The lpParameters argument optionally specifies one or more parameters to be passed to the application. Again, I leave this as nil. Next lpDirectoryspecifies the default directory. Finally, the INT argument, nShowCmd, specifies how the application is shown when it is opened. The API defines numerous constants that can be used here to display the application in a normal, maximised or minimised window amongst other possibilities.
    To see how my ExecuteFile() function can be called, turn to the Fileinfo unit and locate theLaunchBtnClick() method. This contains this piece of code:
    ExecuteFile( FNAME, DIRNAME, LAUNCHSTYLE );
    Here, FNAME is defined at the top of the unit as 'Notepad.exe'. DIRNAME is assigned in theFormCreate() method as windir+'\' where windir is the name of my function, described earlier, which returns the path to the Windows directory. Finally, LAUNCHSTYLE is one of the possible pre-defined API constants: SW_SHOWMAXIMIZEDSW_SHOWMINIMIZED or SW_SHOW.
    Anything Icon Do
    Another thing we’ll want to do is to display the appropriate icon for each application or document on its launch button. The DrawIcon() procedure in the filestuff unit does this. This takes two arguments, the icon and the glyph. The Glyph is a bitmap and it will be supplied by a BitBtn control. The icon is a TIcon object. The size of the Glyph is defined to be a 32 pixel square and the Icon is displayed on the Glyph’s drawing area or Canvas, using the Draw() method.
    To see how to use the DrawIcon() procedure turn to the Fileinfo unit and find theTForm1.BitBtnClick() method. This obtains a TSHFileInfo record (which matches the SHFILEINFOstructure documented in the SDK help) by calling GetFileInfo() in the filestuff unit. It uses a combination of predefined constants to obtain the icon associated with the specified file. The available constants are listed in the SHGetFileInfo entry of the SDK help. An icon handle is obtained and this is passed, with the BitBtn’s glyph to my DrawIcon() procedure:
    fi := GetFileInfo(DIRNAME+FNAME, SHGFI_ICON or SHGFI_LARGEICON);
    Icon.Handle := fi.hIcon;
    DrawIcon( icon, BitBtn.glyph );
    Displaying Icons, Launching Files...

    Our FileInfo program demonstrates how to dispay the large or small icon of an application and launch it in a normal, maximized or minimized window. Notepad.exe is the default application...

    Use the Browse button to select a different application or document. Here I've checked the Small Icon box and clicked More Info to display information on the type of the file which is selected.
    Now let’s see how we can put some of these features to good effect in a real-world application - namely, a drag and drop launchpad. This contains a set of buttons that are used to run programs. Each button contains the name of the source file and an appropriate icon. The buttons can be created on the fly by dragging programs or documents out of the Windows Explorer and dropping them onto the launchpad. It also lets the user delete selected buttons.
    Parental Responsibilities
    Before explaining how it works, take time to try it out. Run the LPad.dpr (or LPad.bdsproj) program. A message will tell you that no configuration file was found. This is because this is the first time you have used the program so no configuration details have yet been saved to disk. Close the dialog.

    On launching, the launchpad is not much more than an empty form...
    Now let’s add some buttons. Open the Windows Explorer and browse to find some programs or documents to add. For example, you might find Notepad.exe in the Windows directory. Select it in the Explorer then drag it and drop it onto the launchpad. If the launchpad is not visible, drag onto its button in the Windows taskbar until the launchpad pops up, then drag onto the launchpad.

    Here I've found Notepad.exe in the Windows Explorer and dragged it right onto the launchpad with my mouse. This causes a new button to be added to the launchpad, displaying both the application's name and icon
    Carry on adding more application or document files. If you want you can even mark off several files at once in Explorer and drop them simultaneously onto the launchpad.

    Note that a scrollbar appears when there are more buttons than can be displayed all at once
    Each time you drop a file a button should appear containing the file name and an icon. To launch a file, click its button on the launchpad. To display information about a file, right-click its button and click ‘File Info’. To remove the launch button, right-click and selected ‘Delete’. To save an icon bar for later use, click File, Save Current IconBar. To clear the launchpad, select File, Clear All. To reload the saved bar, select File, Reload Saved IconBar. The saved configuration will be automatically loaded when you next run this application.

    Use the File menu to save the buttons and reload them later
    I won’t go into the inner details of the drag-and-drop mechanism here. If this is of interest, you can examine the code at your leisure. Look at TForm1.FormCreate () where I use the API functionDragAcceptFiles() and I delegate message-handling to my RespondToMessage() method. You will find the essential drop-handling code in RespondToMessage().
    At the moment, the line that interests us is the call to the AddBtn() method. Find that method now. As you can see this makes use of routines in my filestuff unit to get and draw the icon based on the filename argument that’s passed to the method. It creates a graphic TBitBtn button and adds it to a TStringList object called ButtonList (you will find this declared in the private section of the Form definition). This is the internal, non-visual structure, that maintains the list of buttons. To make the button visible on the form, I have to make the Form1 object its Parent:
    Parent := Form1;
    Now I need to delegate the button’s OnClick event-handling to a specific method so that each button is assigned this event-handler when it is created. I also want to assign a popup menu to each button. This is how I do this:
    OnClick := BtnClick;   
    PopupMenu := PopupMenu1;
    This covers all the techniques needed to create a drag-and-drop program (or document) launching tool. There is, of course, no reason why you should use such a plain user interface in your own programs. You might prefer, for example, to add program-launch icons to a menu system, similar to the Windows Start Menu or to a drop-down combo box. You could even create a nested windows system similar to the good old Program Manager from Windows 3.1. I’ll be considering some of these possibilities in the months ahead. Whichever user interface you choose, however, you are going to need to create controls, with their own OnClick event-handlers, on the fly. The essential details of this process are given below…

    Creating Controls At Runtime
    Simple techniques for adding, deleting and maintaining controls on the fly.
    In my launchpad application, I use a TStringList called ButtonList to maintain the list of TBitBtn objects. At first sight it might seem odd to use a TStringList for this purpose. If you look up its help entry you’ll see that a TStringList stores and manipulates a list of strings, not buttons! In fact, each item in a string list can also store a reference to an object of any type. The items in my ButtonList are pairs of strings and TBitBtn objects. The string is the fully qualified file name, the object is the button that will be used to run that file. So, in the AddBtn() method, this is how I add a new file name and TBitBtn to ButtonList:
    ButtonList.AddObject(fname, TBitBtn.Create(Self));
    Since the buttons are created anonymously, with no variables to identify them, I must subsequently access each by its index in ButtonList. The most recently added button is at positionButtonList.Count-1 and is referenced thus:
    TBitBtn(ButtonList.Objects[ButtonList.Count-1])
    I can iterate through all the objects from 0 to ButtonList.Count-1, using an array indexer into the Objects property. You will find an example of this in the SetLargeIcons() and SetSmallIcons()methods which apply large and small icons to each button:
    TBitBtn(ButtonList.Objects[i])
    When I use the popup menu, I need to know which of the buttons is currently active. For example, look at the DeleteMIClick() event-handler which responds to the Delete item of the popup menu. This method is executed for every button on the form. The Sender parameter is no help as this identifies the menu item, not the active button. In order to find which button the popup menu belongs to, I need to use the menu’s PopupComponent property like this:
    ButtonList.Delete(ButtonList.IndexOfObject(PopupMenu1.PopupComponent));
    Remember that this only deletes the button from the non-visual ButtonList object. You must always be sure to remove its visual display from the form by setting its Parent property to nil. If you forget to do this the button will still appear on a form and an error will occur if you click it.
    Creating Menus At Runtime
    You can also add items to a menu at runtime. Try this, for example. Create a new application (VCL Forms for Win32) and drop a PopupMenu onto the form. Use the Object Inspector to set the Form1 PopupMenu property to PopupMenu1.

    With the Form selected, use the Object Inspector to set the PopupMenu property to the popup menu control, PopupMenu1
    Now double-click the form and edit the FormCreate() method to match the following:
    procedure TForm1.FormCreate(Sender: TObject);
    var
      i : Integer;
      MI : TMenuItem;
    begin
      for i := 0 to 10 do
      begin
        MI := TMenuItem.Create(PopupMenu1);
        PopupMenu1.Items.Add(MI);
        MI.Caption := 'Menu Item ' + IntToStr(i);
        MI.Tag := i;
        MI.OnClick := PopupClick; // assign an event-handler method
      end;
    end;
    Note that if the references to menu items are underlined in red in the Delphi editor, you will need to add a refernce to the Menus unit in the uses section at the top of the file. Just add it at the end, like this:
    uses
       Windows, Messages, SysUtils, Variants, Classes, Graphics,
      Controls, Forms, Dialogs, Menus;

    Notice that each menu item has been assigned a method called PopupClick() as its OnClick event-handler. We need to define this method. Add this code just above TForm1.FormCreate():
    procedure TForm1.PopupClick(Sender: TObject);
    // the event-handler method we assigned to the menu items
    begin
      ShowMessage('Item: ' + IntToStr(TMenuItem(Sender).Tag));
    end;
    Finally, in the public section of the TForm1 type definition at the top of the unit, add this:
    procedure PopupClick(Sender: TObject);
    Now run the program, right-click the form and select a menu item. It’s as simple as that!

افتتاحية

صورة اليوم