Custom Search

News World

Oct 30, 2008

AUTOCAD 2007 >> 04. How to Understand Coordinate System in 3D Model

To make sure that you work in 3D model, please change your model drawing area with 3D modeling
Command : Vpoint
Current view direction: VIEWDIR=0.0000,0.0000,1.0000
Specify a view point or [Rotate] : 1,1,1
Regenerating model.

1. Cartesius CoordinateCommand : X, Y, ZExample :Command : lineLINE Specify first point: 1,2,4Specify next point or [Undo] : Specify next point or [Undo]: 3,2,6
2. Polar CoordinateCommand : @X < degree (x,y) < degree (z) : heightExample :Command :line Line Specify first point : 1,2,4specify next point or [Undo] : @5<120<60

3. Vector Coordinate
Command : @dX, dY, dZ
Example :
Command :line
Line Specify first point : 1,2,4
specify next point or [Undo] : @5,8,6

4. Other
Command: line
LINE Specify first point: 2,2,0
Specify next point or [Undo]: 4,6,0
Specify next point or [Undo]:
Command: line
LINE Specify first point:
Specify next point or [Undo]: .xy
of 4,6
(need Z): 2


more : web.solusi@gmail.com

AUTOCAD 2007 >> 03. How to Create Glass With Standing Position


In this case, the designer must be understand about the UCS coordinat system.



Command: vpoint

Current view direction: VIEWDIR=0.0000,0.0000,1.0000

Specify a view point or [Rotate] : 1,1,1

Regenerating model.



Command: ucs

Current ucs name: *WORLD*

Specify origin of UCS or [Face/NAmed/OBject/Previous/View/World/X/Y/Z/ZAxis]

: y

Specify rotation angle about Y axis <90>: -90



Command: l

LINE Specify first point: 2,2

Specify next point or [Undo]: @2<90 mode =" TRIM," radius =" 0.0000">: 0.05


Select first object or [Undo/Polyline/Radius/Trim/Multiple]:

Select second object or shift-select to apply corner:


Command:

FILLET

Current settings: Mode = TRIM, Radius = 0.0500

Select first object or [Undo/Polyline/Radius/Trim/Multiple]:

Select second object or shift-select to apply corner:


Command:

FILLET

Current settings: Mode = TRIM, Radius = 0.0500

Select first object or [Undo/Polyline/Radius/Trim/Multiple]:

Select second object or shift-select to apply corner:

Radius is too large

*Invalid*



Command:

FILLET

Current settings: Mode = TRIM, Radius = 0.0500

Select first object or [Undo/Polyline/Radius/Trim/Multiple]:

Select second object or shift-select to apply corner:

Radius is too large

*Invalid*


Command: fillet


Current settings: Mode = TRIM, Radius = 0.0500

Select first object or [Undo/Polyline/Radius/Trim/Multiple]: r

Specify fillet radius <0.0500>: 0.025


Select first object or [Undo/Polyline/Radius/Trim/Multiple]:

Select second object or shift-select to apply corner:

Command:

FILLET

Current settings: Mode = TRIM, Radius = 0.0250

Select first object or [Undo/Polyline/Radius/Trim/Multiple]:

Select second object or shift-select to apply corner:

Radius is too large

*Invalid*



Command: fillet

Current settings: Mode = TRIM, Radius = 0.0250

Select first object or [Undo/Polyline/Radius/Trim/Multiple]: r

Specify fillet radius <0.0250>: 0.1

Select first object or [Undo/Polyline/Radius/Trim/Multiple]: *Cancel*

Command: fillet

Current settings: Mode = TRIM, Radius = 0.1000

Select first object or [Undo/Polyline/Radius/Trim/Multiple]: r

Specify fillet radius <0.1000>: 0.01

Select first object or [Undo/Polyline/Radius/Trim/Multiple]:

Select second object or shift-select to apply corner:



Command: region

Select objects: Specify opposite corner: 10 found

Select objects:

1 loop extracted.


1 Region created.



Command: l

LINE Specify first point:

Specify next point or [Undo]: @7<0 isolines="4">

more : web.solusi@gmail.com

Oct 29, 2008

AUTOCAD 2007 >> 02. How to Create Simple Glass

Current view direction: VIEWDIR=0.0000,0.0000,1.0000
Specify a view point or [Rotate] : 1,1,1
Regenerating model.

Command: line
LINE Specify first point: 5,5
Specify next point or [Undo]: @0.5<90
Specify next point or [Undo]: @4<0
Specify next point or [Close/Undo]: @0.075<-90
Specify next point or [Close/Undo]: @3.925<180
Specify next point or [Close/Undo]: @0.425<-90
Specify next point or [Close/Undo]: c
Command: z
ZOOM
Specify corner of window, enter a scale factor (nX or nXP), or [All/Center/Dynamic/Extents/Previous/Scale/Window/Object] : w

Command: fillet
Current settings: Mode = TRIM, Radius = 0.0000
Select first object or [Undo/Polyline/Radius/Trim/Multiple]: r
Specify fillet radius <0.0000>: 0.05

Select first object or [Undo/Polyline/Radius/Trim/Multiple]:
Select second object or shift-select to apply corner:
Command: [Enter --- ::: will be process the last command]
FILLET
Current settings: Mode = TRIM, Radius = 0.0500
Select first object or [Undo/Polyline/Radius/Trim/Multiple]:
Select second object or shift-select to apply corner:
[Use the fllet comment to all of the coorner that you need to smooth]

Command: l
LINE Specify first point:
Specify next point or [Undo]: @5<0
Specify next point or [Undo]:

Command: region [to make the area]
Select objects: 1 found
Select objects: Specify opposite corner: 2 found, 3 total
Select objects: 1 found, 4 total
Select objects: Specify opposite corner: 6 found (2 duplicate), 8 total
Select objects: Specify opposite corner: 1 found, 9 total
Select objects:
1 loop extracted.
1 Region created.


Select objects to revolve:
Specify axis start point or define axis by [Object/X/Y/Z] object: o
Select an object:
Specify angle of revolution or [STart angle] <360>:

[Finished]
more :
web.solusi@gmail.com

AUTOCAD 2007 >> 01. Introduction


AutoCAD 2007 Help provides complete information for using AutoCAD. Click the links on the right or use the Contents tab on the left to browse Help topics.

View the New Features Workshop
The New Features Workshop introduces you to what's new in AutoCAD. To access the New Features Workshop, click the link under General Information on the right. You can also access the New Features Workshop from the Help menu.

View Animations in the Help System
"Show Me" animations are available in several Help topics. To access a list of these animations, click the link under General Information on the right.

View or Print PDF Files
PDF files of all the Help system components, printed manuals, and Quick Reference cards are available on your installation disk. Insert your product CD and click the Documentation tab in the Media Browser window.


Coordinate 2D (Two Dimmension) in AotoCAD

1. Coordinate Cartesius
command entry : X, Y
example
command :line
Line specify first point : 2,1
Specify next point (Undo) : 5,6
Specify next point (Close/ Undo) : -10, 3

2. Coordinate Polar
command entry : @X < degree
example
command :line
Line specify first point : 2,-5
Specify next point (Undo) : @6<10
Specify next point (Close/ Undo) : @3<45


3. Coordinate Vector
command entry : @X, Y
example
command :line
Line specify first point : -9,12
Specify next point (Undo) : @4,5
Specify next point (Close/ Undo) : @2,1
Specify next point (Close/ Undo) : @3,-4


more : web.solusi@gmail.com

Oct 28, 2008

PHP Script : Section 14 : How to create new directory tree file in browser by PHP Script?



// Crete New Directory

//**********************************************

$d = dir("./$drr");

if($_POST[cmdcdir]!=''){

mkdir ($drr."/".$_POST[txtcname], 0700);?>

}
//**********************************************


//echo "Handle: ".$d->handle."
\n";
echo "Path: ".$d->path."
\n";
while (false !== ($entry = $d->read())) {
if (!is_dir($entry)){
echo " - ".$entry."
\n";
}else{
echo "[+] a href="'?drr="">".$entry." /a
\n";
}
}
$d->close();
?>

more : web.solusi@gmail.com

PHP Script : Section 13 : How to make simple tree file in browser by PHP Scritp?

Everybody that have experience to use the computer, as generally know what the meaning with tree file.

Tree file is the structure of file that have in folders as operating system, whatever operating system type.

With this I make a simple sample for that tree file in browser (netscape, firefox, eudora, internet explorer, etc).


Important : I'm not recommend you to put this script on your web site in internet.
Better if youuse this script to implementation on your "intranet" only.

$d = dir("./$drr");
echo "Path: ".$d->path."
\n";
while (false !== ($entry = $d->read())) {
if (!is_dir($entry)){
echo " - ".$entry."
\n";
}else{
echo "[+] a href="'?drr="">".$entry." /a
\n";
}}
$d->close();
?>


more : web.solusi@gmail.com

Oct 27, 2008

PHP Script : Section 12 : How to create and use function with PHP

Sample 1
function computer ($type = "Lenovo Notebook")
{
return "Make sure that your notebook is $type";
}
echo computer ();
echo "
";
echo computer (" not other then Lenovo");
?>

Result :
Make sure that your notebook is Lenovo Notebook
Make sure that your notebook is not other then Lenovo



Sample 2
function newdate($dt,$mn,$yr){
if(($dt<=31)&&($mn<=12)&strlen($yr)==4){
echo "It is the true date concept
";
echo $dt."-".$mn."-".$yr;
}else{
echo "It is the wrong date concept
";
echo $dt."-".$mn."-".$yr;
}
}
$dt1 = "40";
$mn1 = "11";
$yr1 = "2001";
echo newdate($dt1, $mn1, $yr1)."
";
$dt2 = "22";
$mn2 = "09";
$yr2 = "2003";
echo newdate($dt2, $mn2, $yr2);
?>

Result
It is the wrong date concept
40-11-2001
It is the true date concept
22-09-2003


more : web.solusi@gmail.com

PHP Script : Section 11 : PHP Need Taxonomy Folder


Taxonomies are usually hierarchical where categories (nodes) in the hierarchy progress from general to specific. Each subsequent node is a subset of the higher level node. There are three basic types of hierarchical taxonomies: Subject, Business-Unit and Functional.


If you do choose to use a taxonomy, make sure to use a hierarchy with multiple accesspoints, so those Frisbee pictures can be in multiple “bins.”


Consider relying on process consulting to create an initial hierarchy, so that it accurately reflects your business and how you expect it to grow. And make sure your taxonomy includes synonyms, so that finding the correct terms is not a guessing game.Finally, keep migration issues clearly in mind – eventually, taxonomies will disappear,and you will want to be able to keep supporting your users’ searches, so they can findwhat they need and do their work.


Example :
Taxonomy File in Intranet
Especially in intranet application so verry better if all of data have the good structure.So with this, please see this structure.
Description
[ ] : Main Folder
( ) : Folder in Main Folder
# : File name


[ ] images
( ) images-mechanical
#img-mec-printer-samsung-xxx.jpg
#img-mec-copy-canon-xxx.jpg
#img-mec-camera-dig-xxx-canon.jpg
...
( ) images-game
( ) images-electrical
( ) images-template
[ ] include
[ ] config
[ ] functionaly
[ ] pages
[ ] style
#style-xxx.ccs
[ ] encryption-xxxxxx -- make sure this folder more specific
...

Make sure that your sub folder not too inside in to the inside folder


Example
Taxonomy File in Internet

In internet, make sure your folder not too much, but - better if you make sure thatyour folder is specfic and not general folder name.

Description
[ ] : Main Folder
( ) : Folder in Main Folder
# : File name

[ ] imgs
( ) imgs-tmp -- images for template page
#img-tmp-xxx.jpg
#img-tmp-xxx.jpg
...
( ) imgs-pgs -- images for input in to the web page
#img-pgs-xxx.jpg
#img-pgs-xxx.jpg
...
[ ] incl-fl
#incl-fl-xxx.php
#incl-fl-xxx.inc
[ ] cnfg-fl
[ ] func-fl
[ ] pg
[ ] styl
#styl-xxx.ccs


more : web.solusi@gmail.com

Oct 26, 2008

PHP Script : Section 10 : HTML Support PHP : Print Page

more : web.solusi@gmail.com

PHP Script : Section 09 : How to Update Record in the Table with PHP Script



if($vid!=''){
?>
}
// Create table : c_user
// create field : idcu, cname, cstatus
// coreate content
// idcu, cname, cstatus
// 1, eric lee, 1
// 2, janet, 0
// 3, jean van, 1
// 4, hendry, 0
require('./config/config.inc.php');
$tbusr_sql = mysql_query("select * from c_user");
$rtbusr_sql = mysql_num_rows($tbusr_sql);
echo "Total record : ".$rtbusr_sql;
for ($i=1;$i<=$rtbusr_sql;$i++){
$dt_tbusr_sql = mysql_fetch_array($tbusr_sql);
echo "[a title="Delete" href="?vna="" vst=".$dt_tbusr_sql[cstatus]." vid=".$dt_tbusr_sql[idcu].">update /a ] ";
echo "User : ".$i." : ".$dt_tbusr_sql[cname]."
";
}

if ($_POST[cmdupdate]!=''){
mysql_query("update c_user set cstatus='".$_POST[txtstatus]."' where cname='".$_POST[txtcname]."'");
?>

}
?>

more : web.solusi@gmail.com

Oct 25, 2008

PHP Script : Section 08 : How to Add New Record in to the Table with PHP Script







require('./config/config.inc.php');
if ($_POST[cmdinput]){
// field : idcu, cname, cstatus
mysql_query("insert into c_user SET cname='".$_POST[txtcname]."',cstatus='".$_POST[txtstatus]."'");
?>

}
?>

more : web.solusi@gmail.com

PHP Script : Section 07 : How to Delete Record From Table with PHP Script

// create field : idcu, cname, cstatus
// coreate content
// idcu, cname, cstatus
// 1, eric lee, open
// 2, janet, close
// 3, jean van, open
// 4, hendry, open



require('./config/config.inc.php');
$tbusr_sql = mysql_query("select * from c_user");
$rtbusr_sql = mysql_num_rows($tbusr_sql);
echo "Total record : ".$rtbusr_sql;
for ($i=1;$i<=$rtbusr_sql;$i++){
$dt_tbusr_sql = mysql_fetch_array($tbusr_sql);
echo "[a title="Delete" href="?vna="" vst=".$dt_tbusr_sql[cstatus]." vid=".$dt_tbusr_sql[idcu]."> delete /a] "; echo "User : ".$i." : ".$dt_tbusr_sql[cname]."
";
}
if($vna!=''){
mysql_query("delete from c_user where cname='".$vna."' and idcu='".$vid."'");
?>

}
?>


more : web.solusi@gmail.com

Oct 24, 2008

PHP Script : Section 06 : How to connect to table in database MySQL with PHP Script

PHP Script : Section 06 : How to connect to table in database MySQL with PHP Script

Step 1. Create database file in MySQL with name : phplesson

Step 2. Create simple table on your MySQL with name : tbl-category-01


Field :
idc >> id category
prdcatecory >> product category
Input your data on your table
idp; prdcategory
1; mouse
2; keyboard
3; hdd
4; usb
5; wap
6; switch
7; router
8; modem
9; power supply
10; monitor
12; memory
13; printer
14; other


Step 3. Create config.inc file (like the sample on page : PHP Script : Section 05 : How to Connect Database MySQL with PHP Script)


Step 4. Create file product-category-list.php
Content:
include 'config/config.inc.php';
$tblprdcat_sql=mysql_query("SELECT * FROM tbl-category-01 ORDER BY idc ASC"); // connect to tbl-category-01
$r_tblprdcat_sql = mysql_num_rows($tblprdcat_sql)); // totaly record/ item table
for($ic=1;$ic<=$r_tblprdcat_sql;$ic++){
$dt_tblprdcat_sql = mysql_fetch_array($tblprdcat_sql); // contents table
echo "record : ".$ic." is : ".$dt_tblprdcat_sql[prdcategory]."/n";//print record
}
?>

Step 5. Run product-category-list.php file

more : web.solusi@gmail.com

PHP Script : Section 05 : How to Connect Database MySQL with PHP Script

Follow this script and save with name config.inc (general file name).


$dbname = "php-learn";
$dbuser = "";
$dbpass = "";
$dbhname = "localhost";
$db = mysql_connect($dbhname, $dbuser, $dbpass) or die("unable to connect to database server");
mysql_select_db($dbname,$db) or die ("Unable to connect to SQL Server");
?>

more : web.solusi@gmail.com

Oct 23, 2008

PHP Script : Section 04 : How to Combine file in PHP

It's so very different with HTML language to combine file.
In PHP, is easier.
Folow this step.

Step 1. Create file intro-01.php
Content :
Welcome
This is page intro-01

Step 2. Create file intro-02.php
Content:
Welcome
This is page intro-02

Step 3. Create file combine-01.php
Content :
include 'intro-01.php';
include 'intro-02.php';
//This symbol is script for note, not execute
?>
or
require('intro-01.php');
require('intro-02.php');
//This symbol is script for note, not execute
?>
Step 4. Run combine-01.php file with browser
more : web.solusi@gmail.com

PHP Script : Section 03 : How to Install php.ini file?

How to install this file on your Operating System (This case : Windows XP).

Step 1. Copy that file to the folder : C:\Windows
Step 2. Restart your computer, to make sure that ini file work.



As generally, the contents of php.ini file is :
highlight.string=#CC0000
highlight.comment=#FF9900
highlight.keyword=#006600
highlight.bg=#FFFFFF
highlight.default=#0000CC
highlight.html=#000000
expose_php=On
max_execution_time=30 ; Maximum execution time of each script, in seconds
memory_limit=8M ; Maximum amount of memory a script may consume (8MB)
error_reporting=E_ALL & ~E_NOTICE
display_errors=On
display_startup_errors=Off
log_errors=Off
track_errors=Off
warn_plus_overloading=Off
variables_order="EGPCS"
register_globals=On
register_argc_argv=On
post_max_size=8M
gpc_order="GPC"
magic_quotes_gpc=On
magic_quotes_runtime=Off
magic_quotes_sybase=Off
auto_prepend_file=
auto_append_file=
default_mimetype="text/html"
doc_root=
user_dir=
extension_dir= c:\php\dlls
enable_dl=On
cgi.force_redirect=0
file_uploads=On
upload_max_filesize=2M
allow_url_fopen=On


[Syslog]
define_syslog_variables=Off

[mail function]
SMTP=localhost
[Logging]
[Java]
[SQL]
sql.safe_mode=Off
[ODBC]
odbc.allow_persistent=On
odbc.check_persistent=On
odbc.max_persistent=-1
odbc.max_links=-1
odbc.defaultlrl=4096
odbc.defaultbinmode=1
[MySQL]
mysql.allow_persistent=On
mysql.max_persistent=-1
mysql.max_links=-1
mysql.default_port=
mysql.default_socket=
mysql.default_host=
mysql.default_user=
mysql.default_password=

[mSQL]
msql.allow_persistent=On
msql.max_persistent=-1
msql.max_links=-1

[PostgresSQL]
pgsql.allow_persistent=On
pgsql.max_persistent=-1
pgsql.max_links=-1

[Sybase]
sybase.allow_persistent=On
sybase.max_persistent=-1
sybase.max_links=-1
sybase.min_error_severity=10
sybase.min_message_severity=10
sybase.compatability_mode=Off
[Sybase-CT]
sybct.allow_persistent=On
sybct.max_persistent=-1
sybct.max_links=-1
sybct.min_server_severity=10
sybct.min_client_severity=10

[bcmath]
bcmath.scale=0

[browscap]
[Informix]
ifx.default_host=
ifx.default_user=
ifx.default_password=
ifx.allow_persistent=On
ifx.max_persistent=-1
ifx.max_links=-1
ifx.textasvarchar=0
ifx.byteasvarchar=0
ifx.charasvarchar=0
ifx.blobinfile=0
ifx.nullformat=0

[Session]
session.save_handler=files
session.save_path=/tmp
session.use_cookies=1
session.name=PHPSESSID
session.auto_start=0
session.cookie_lifetime=0
session.cookie_path=/
session.cookie_domain=
session.serialize_handler=php
session.gc_probability=1
session.gc_maxlifetime=1440
session.referer_check=
session.entropy_length=0
session.entropy_file=
session.cache_limiter=nocache
session.cache_expire=180
session.use_trans_sid=1
url_rewriter.tags="a=href,area=href,frame=src,input=src,form=fakeentry"

[MSSQL]
mssql.allow_persistent=On
mssql.max_persistent=-1
mssql.max_links=-1
mssql.min_error_severity=10
mssql.min_message_severity=10
mssql.compatability_mode=Off
[Assertion]
[Ingres II]
ingres.allow_persistent=On
ingres.max_persistent=-1
ingres.max_links=-1
ingres.default_database=
ingres.default_user=
ingres.default_password=

[Verisign Payflow Pro]
pfpro.defaulthost="test-payflow.verisign.com"
pfpro.defaultport=443
pfpro.defaulttimeout=30
[Sockets]
sockets.use_system_read=On
[com]
[Printer]
[mbstring]
[FrontBase]

more : web.solusi@gmail.com

PHP Script : Section 02 : How to Install my.ini file?

As generally, the contents of my.ini file is :


[WinMySQLAdmin]
Server=C:/FoxServ/mysql/bin/mysqld-nt.exe
user=phpscr
password=opening
[mysqld]
basedir=C:/FoxServ/mysql
#bind-address=192.168.1.22
datadir=C:/FoxServ/mysql/data
#language=C:/FoxServ/mysql/share/your language directory
#slow query log#=
#tmpdir#=tmp
#port=3306
#set-variable=key_buffer=16M

How to install this file on your Operating System (This case : Windows XP).

Step 1. Copy that file to the folder : C:\Windows

Step 2. Restart your computer, to make sure that ini file work.

more : web.solusi@gmail.com

PHP Script : Section 01 : Introduction


PHP is an HTML-embedded scripting language. Much of its syntax is borrowed from C, Java and Perl with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly.

What can PHP do? Anything. PHP is mainly focused on server-side scripting, so you can do anything any other CGI program can do, such as collect form data, generate dynamic page content, or send and receive cookies. But PHP can do much more.


What that you need to run the php script on your computer?
1. You must have PWS (Personal Web Server) with Apache
2. You must have MySQL server to support your database
3. You must install the php.ini file
4. You must install the my.ini file

Example
Type - 01
---------
html
head
title Example /title
/head
body

/body
/html


Type - 02
---------
html
head
title Example /title
/head
body

/body
/html

more : web.solusi@gmail.com

Oct 17, 2008

Level One - FBR-1418TX Broadband Router Details



Model : FBR-1418TX


Brand : Level One


Functionalities : VPN Pass-Thru,Firewall, DHCP Server


Type : Router


Wireless Access Points : Access Points


Wireless : Wireless


Connectivity : Wired


Built-In : 4-port Built-In Switch LAN Interfaces : 10/100 Base-T


WAN Interfaces : 1 x RJ-11 for DSL


Protocols : PPTP, IPSec, PPPoE


Standards : Ethernet (802.3), Fast Ethernet (802.3u)


Firewall Features : DoS Prevention, MAC Address Filtering, NAT

Oct 14, 2008

Encryption - RSA Encrypt and Decrypt Strings

RSA Encrypt and Decrypt Strings
Dim rsa As New Chilkat.Rsa()
Dim success As Boolean
success = rsa.UnlockComponent("Anything for 30-day trial")
If (success <> true) Then
MsgBox("RSA component unlock failed")
Exit Sub
End If

' This example also generates the public and private
' keys to be used in the RSA encryption.
' Normally, you would generate a key pair once,
' and distribute the public key to your partner.
' Anything encrypted with the public key can be
' decrypted with the private key. The reverse is
' also true: anything encrypted using the private
' key can be decrypted using the public key.
' Generate a 1024-bit key. Chilkat RSA supports
' key sizes ranging from 512 bits to 16384 bits.

success = rsa.GenerateKey(1024)

If (success <> true) Then
MsgBox(rsa.LastErrorText)
Exit Sub
End If

' Keys are exported in XML format:
Dim publicKey As String
publicKey = rsa.ExportPublicKey()
Dim privateKey As String
privateKey = rsa.ExportPrivateKey()


Dim plainText As String
plainText = "Encrypting and decrypting should be easy!"

' Start with a new RSA object to demonstrate that all we' need are the keys previously exported:
Dim rsaEncryptor As New Chilkat.Rsa()

' Encrypted output is always binary. In this case, we want
' to encode the encrypted bytes in a printable string.
' Our choices are "hex", "base64", "url", "quoted-printable".

rsaEncryptor.EncodingMode = "hex"

' We'll encrypt with the public key and decrypt with the private
' key. It's also possible to do the reverse.
rsaEncryptor.ImportPublicKey(publicKey)
Dim usePrivateKey As Boolean
usePrivateKey = false
Dim encryptedStr As String
encryptedStr = rsaEncryptor.EncryptStringENC(plainText,usePrivateKey)
TextBox1.Text = TextBox1.Text & encryptedStr & vbCrLf
TextBox1.Refresh()

' Now decrypt:
Dim rsaDecryptor As New Chilkat.Rsa()
rsaDecryptor.EncodingMode = "hex"
rsaDecryptor.ImportPrivateKey(privateKey)
usePrivateKey = true
Dim decryptedStr As String
decryptedStr = rsaDecryptor.DecryptStringENC(encryptedStr,usePrivateKey)
TextBox1.Text = TextBox1.Text & decryptedStr & vbCrLf
TextBox1.Refresh()



http://www.example-code.com/vbdotnet/rsa_encryptStrings.asp

Encryption and Smart Card Technology Leaders Develop Identifier-Based Encryption for Portable Formats

Researchers from HP Laboratories and STMicroelectronics have collaborated with card manufacturer Incard to develop technology for the implementation of Identifier-Based Encryption (IBE) on smart cards. A demonstration of this technology will be presented on the Hewlett-Packard booth at ‘Infosecurity 2005’ from April 26-28, 2005, in London.


Smart cards are not only powerful and convenient; they are proven as outstanding carriers for confidential information such as private keys. By implementing IBE on a smart card, developers can create more practical and cost-effective online and offline secure business communication applications. Applications for the technology are in the areas of e-government, e- and m-commerce, wireless management of secure documents, access control, and personal-authorization tokens.
IBE has certain advantages over public-key infrastructure (PKI) security schemes. In classical PKI schemes, the public key is a randomly calculated number that has to be linked to the identity of the user by a certificate. With IBE the public key can be chosen freely and can be linked directly to the user’s identity or role without the need to exchange certificates and the costly infrastructure that comes with it.


The three partners have implemented IBE on a smart card by using elliptic-curve pairing functions, which are important cryptographic primitives. IBE uses bilinear mapping on elliptic curves to obtain an algorithm that can be used to turn a simple, well recognized identity or role into a public/private key pair. This role-based encryption allows for one party in the communication (e.g. the receiver) to dynamically change the link between the identity and the role of the user without impacting the other party (e.g. the sender).


HP Labs Bristol has one of the world’s leading research groups in IBE, which has the advantage of being more easily scalable than other PKI technologies. As a result it has numerous possible applications, including smart card security.


The algorithmic calculations were developed by HP Labs and ST and implemented by Incard R&D on JsEC, an Incard smart card JavaCard 2.2.1 platform, based on ST’s ST22L128 chip. JsEC decrypts an IBE message in a few seconds. Incard has already integrated a JsEC smart card into a software application to show how IBE can complement the security offering of PKI schemes in business applications and environments.


“HP Labs has been investigating IBE cryptography for some years and are impressed with its potential,” said Keith Harrison, senior cryptographic researcher at HP Labs Bristol. “We are developing a number of applications, including a new HP ProtectTools security product, which would be difficult to implement with alternate forms of public-key cryptography. Working with our colleagues at STMicroelectronics on this prototype smart card solution has emphasized the complementary strengths of both research groups.”


”Incard’s eSecurity product ‘JsEC’ aims to conquer a highly specialized market that is expected to expand quickly,” said Alessandro Scognamiglio, Incard’s Strategic Marketing Manager. “JsEC is the right solution to guarantee secure Internet transactions and communications. It clearly and easily manages different operations such as authentications, certifications, e-signatures, and other functions able to guarantee net and local security. Through a dynamic integration with the Windows operating system, JsEC enables the user to provide their signature and authenticate themselves simply by clicking the mouse.”


“STMicroelectronics has a long history of devoting enormous efforts to its R&D to ensure that new technologies can be exploited in commercial products as quickly as possible; this cooperation between HPLabs and ST researchers is an excellent example of that tradition,” said Alessandro Cremonesi, Vice President, Advanced System Technology, STMicroelectronics. “ST believes that making security implementations that are significantly cheaper, faster, more convenient, and more reliable is absolutely vital to meet the needs of the market. Additionally, this implementation by Incard, based on ST’s advanced and innovative ST22 SmartJTM silicon platform, demonstrates that the 32-bit ST22 range of smart card ICs provides a perfect medium to carry any encryption algorithms.”


more : http://www.physorg.com/news3872.html

SmartCard - RFID SmartCard encryption cracked by researchers

New research that shows smart cards with encrypted RFID chips might not be as secure as previously thought is raising concerns in Boston, where the subway CharlieCards use just such technology. The research raises the specter of thieves with $1,000 worth of equipment cracking smart card encryption and making counterfeit cards to do everything from swipe fares to gain access to high-security areas.
Although University of Virginia student Karsen Nohl and colleagues revealed their findings in December at a conference, a couple of Boston-area media outlets (Boston Herald, Boston Globe ) picked up on the story this week, breathing new life into it. The MBTA, the outfit running the Boston subway system, declined to discuss its security technologies with the Boston newspapers.
The particular RFID chip in question – the Mifare Classic, of which a billion-plus have been sold – is made by Philips spinoff NXP Semiconductors, which has been widely quoted saying that only a portion of the cryptographic algorithm has been obtained by the researchers. (The researchers have not fully disclosed their method in an effort to keep those with bad intentions from copying them.) Security experts have known all along that such chips, which generally cost less than a dollar, were crackable, but didn’t realize it could be so economically feasible.


"People have and will, as we have, taken security expertise from the world of computers and applied it to RFIDs, whose designers had been operating under the assumption that their world was apart from such scrutiny," Nohl said in a statement .


Nohl and colleagues were able to listen to data broadcast by the chips using readily available RFID readers and then dissected the layers of the chip via custom optical recognition software to deduce the algorithm and encryption keys.



By Alpha Doggs on Thu, 03/06/2008 - 12:30pm. http://www.networkworld.com/community/node/25754

Lamp - Arrowslim T5

Arrowslim has evolved to offer a T5 version with an enhanced aesthetic appearance and many new additions to the range


· Now available in single and twin lamp variants, extending application possibilities
· Arrowslim T5 (T16) connect version available for fast continuous mounting installation
· Three-position rotating lampholder provides maximum mounting flexibility for single lamp versions
· Diffuser and reflector attachments available to enhance lighting performance
· Suitable for industrial, retail, commercial office and education applications
· Also available in Connect versions providing a quick simple and effective solution for interconnecting a number of battens



Installation/Mounting

Suitable for walls, ceilings or in the recessed areas. Three position rotating lampholders allows lamp to be located either side of the spine. Suitable for normal interiors with temperature range -15°C to 25°C High Frequency. For easy installation use BESA box brackets. For Connect version: Fix and connect first luminaire then simply plug in and fix subsequent luminaries. Use intermediate connectors to feed other rows up to 10A maximum.
Cover plates and reflector attachments retained by plastic spring latches.


Specification

Slim single or twin lamp fluorescent batten for 14/21/28/ 35/49/54/80W, T5 (T16) linear fluorescent lamps, with connect
version and optional diffuser and attachments.
As Thorn Arrowslim T5.



Materials/Finish

Spine: steel, white enamel finish (RAL 9010) Lampholder: polycarbonate, white finish Diffuser: clear reeded polycarbonate, clear reeded acrylic and satin polycarbonate Reflector: steel, white enamel finish (RAL 9010)

more : www.thorn.com.hk

IT Conversations

Moneycontrol Latest News

Latest new pages on Computer Hope

Latest from Infoworld

Door Lock

Door Lock Import Top Door Lock from China Contact Quality Manufacturers Now