Tools / Troubleshooting / Computer Diagnostics ScanUse our list of free web tools to improve your PC's performance. Is your computer an Open Invitation for HACKERS? Download free version of Sparktrust Inspector to identify vulnerabilities and problems on your computer (and even your WEBSITES)! Click the green 'download now' button above for a diagnostic scan of the Windows registry. Computer Diagnostics refer to the state of a computer system's various components including the hardware, software, operating system or network of systems of which the computer is a part. Low Level Bit Hacks You Absolutely Must Know I decided to write an article about a thing that is second nature to embedded systems programmers - low level bit hacks. Bit hacks are ingenious little programming tricks that manipulate integers in a smart and efficient manner. Instead of performing some operation (such as counting the 1 bits in an integer) by looping over individual bits, these programming nuggets do the same with one or two carefully chosen bitwise operations.
Best Firefox Download Manager Integration - Thanks for installing FlashGot! - InformAction New to FlashGot? Learn about its features or read the FAQ! V. 188.8.131.52 Download Anything, Replay Anytime. Looks like you are running an older version (184.108.40.206), probably because addons.mozilla.org did not publish the latest version yet. Optimizing C and C++ Code Embedded software often runs on processors with limited computation power, thus optimizing the code becomes a necessity. In this article we will explore the following optimization techniques for C and C++ code developed for Real-time and Embedded Systems. Many techniques discussed here have roots in the material we covered in the articles dealing with C to Assembly translation. A good understanding of the following articles will help:
How To Format A New Internal Hard Drive Most new external hard drives available in the market are designed to be plug and play. By plug and play, what I mean is that you can just plug in the hard drive and start using it right away. This is because the manufacturers send the disk initialised and ready to work with the most common operating systems. Pointer Basics This document introduces the basics of pointers as they work in several computer languages -- C, C++, Java, and Pascal. This document is the companion document for the Pointer Fun with Binky digital video, or it may be used by itself. This is document 106 in the Stanford CS Education Library. This and other free materials are available at cslibrary.stanford.edu. Some documents that are related to this one include...
Firefox 3: 8 Things You Didn't Know You Could Do - Solutions by PC Magazine Unleash the power of Firefox 3 with the help of these little-known features. The latest version of Mozilla's popular open-source browser enjoyed one of the most successful launches in software history, with a record-setting 8.2 million downloads the first day it was available. With the ability to drastically expand the browser's functions using plug-in extensions and Greasemonkey scripts, many of Firefox 3's built-in features are overlooked.
Free Books A lot of people keep asking about a good list of programming books. Hence, we are building this list to save your time and to spread the knowledge. Some of these books will definitely help us to evolve our coding skills and thought processes for developing better solutions. We will do our best to keep updating this list, hope you find this list useful, here we go. Meta-List RealWorld Cursor Editor - make animated cursors RealWorld Cursor Editor ...simple and efficient... Log-in or register. What can this cursor maker do for you? Cursor editor
Scripting Languages: PHP, Perl, Python, Ruby - Hyperpolyglot a side-by-side reference sheet sheet one: version | grammar and execution | variables and expressions | arithmetic and logic | strings | regexes | dates and time | arrays | dictionaries | functions | execution control | exceptions | threads sheet two: streams | asynchronous events | files | file formats | directories | processes and environment | option parsing | libraries and namespaces | objects | inheritance and polymorphism | reflection | net and web | gui | databases | unit tests | logging | debugging HOW TO BYPASS BIOS PASSWORDS HOW TO BYPASS BIOS PASSWORDS by Elf Qrin ( v2.24 r03Sep2000-13aug2004 First Release: r25Mar2000 The latest version of this document can be found at The aim of this article is to explain how to bypass BIOS passwords. By reading this article you should realize you can't rely on BIOS passwords if you need to secure your computer. Accessing information on the hard disk May be you don't actually need to access the computer, but you only need to access the information contained on the hard disk. In this case it could be more convenient to remove it temporarely from that machine and put it as a secondary hard disk on another machine, that you'll use as a host to retrieve data.