Windows XP Hacks & Mods for Dummies

Total Page:16

File Type:pdf, Size:1020Kb

Windows XP Hacks & Mods for Dummies 01_748978 ffirs.qxd 8/31/05 12:06 AM Page iii Windows® XP Hacks & Mods FOR DUMmIES‰ by Woody Leonhard 01_748978 ffirs.qxd 8/31/05 12:06 AM Page ii 01_748978 ffirs.qxd 8/31/05 12:06 AM Page i Windows® XP Hacks & Mods FOR DUMmIES‰ 01_748978 ffirs.qxd 8/31/05 12:06 AM Page ii 01_748978 ffirs.qxd 8/31/05 12:06 AM Page iii Windows® XP Hacks & Mods FOR DUMmIES‰ by Woody Leonhard 01_748978 ffirs.qxd 8/31/05 12:06 AM Page iv Windows® XP Hacks & Mods For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2005 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit- ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. Windows XP is a registered trademark of Microsoft Corporation in the United States and/or other countries. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REP- RESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CON- TENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CRE- ATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CON- TAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FUR- THER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFOR- MATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ. For general information on our other products and services, please contact our Customer Care Department within the U.S. at 800-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002. For technical support, please visit www.wiley.com/techsupport. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Control Number: 2005927631 ISBN-13: 978-0-471-74897-7 ISBN-10: 0-471-74897-8 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1O/RZ/QZ/QV/IN 01_748978 ffirs.qxd 8/31/05 12:06 AM Page v About the Author In the past fifteen years, Woody Leonhard has written more than computer books, drawing an unprecedented six Computer Press Association awards and two American Business Press awards. Woody was one of the first Microsoft Consulting Partners and is a charter member of the Microsoft Solutions Provider organization. He’s widely quoted — and reviled — on the Redmond campus. Woody’s Web site, askwoody.com, keeps an eye on the computer industry, covering the latest shenanigans from Microsoft, the best software for your computer, the worst pitfalls (and patches!) to avoid, updates to his books, and all the other information you need to keep your PC chugging away. Woody lives just this side of paradise in Phuket, Thailand, along with his most significant other, Add, and his son, Justin. Most mornings, you can find him jogging on Patong Beach with their beagle, Chronos, or sipping a latte at Khun Woody’s Bakery. Drop by when you get a chance! 01_748978 ffirs.qxd 8/31/05 12:06 AM Page vi 01_748978 ffirs.qxd 8/31/05 12:06 AM Page vii Dedication To Duangkhae Tongthueng (better known as “Add”), and to Justin, the best parts of my life. Forgive me for all the long hours slaving away on this project. Author’s Acknowledgments Justin Leonhard contributed numerous ideas, warnings, and hacks to the sections on gaming and the iPod, in particular, and helped with insightful comments in several other parts of the book. Thanks, Justin! Many thanks, as always, to Claudette Moore and Debbie McKenna at Moore Literary Agency, my guides for nearly 15 years. Thanks, too, to Steve Hayes, Becky Huehls, Colleen Totz, Lee Musick, and all the people at Wiley who made this project work. What a concept: Windows hacking made accessible to regular Windows users. With your help, I think this book succeeds marvelously. 01_748978 ffirs.qxd 8/31/05 12:06 AM Page viii Publisher’s Acknowledgments We’re proud of this book; please send us your comments through our online registration form located at www.dummies.com/register/. Some of the people who helped bring this book to market include the following: Acquisitions, Editorial, and Composition Services Media Development Project Coordinator: Adrienne Martinez Project Editor: Rebecca Huehls Layout and Graphics: Carl Byers, Andrea Dahl, Senior Acquisitions Editor: Steven Hayes Lauren Goddard, Joyce Haughey, Development and Copy Editor: Colleen Totz Julie Trippetti Technical Editor: Lee Musick Proofreaders: TECHBOOKS Production Services, Leeann Harney Editorial Managers: Leah Cameron, Carol Sheehan Indexer: TECHBOOKS Production Services Media Development Manager: Laura VanWinkle Special Help: Andy Hollandbeck Media Development Supervisor: Richard Graves Editorial Assistant: Amanda Foxworth Cartoons: Rich Tennant (www.the5thwave.com) Publishing and Editorial for Technology Dummies Richard Swadley, Vice President and Executive Group Publisher Andy Cummings, Vice President and Publisher Mary Bednarek, Executive Acquisitions Director Mary C. Corder, Editorial Director Publishing for Consumer Dummies Diane Graves Steele, Vice President and Publisher Joyce Pepple, Acquisitions Director Composition Services Gerry Fahey, Vice President of Production Services Debbie Stailey, Director of Composition Services 02_748978 ftoc.qxd 8/31/05 12:06 AM Page ix Contents at a Glance Introduction ................................................................1 Part I: The Nuts & Bolts of Hacks & Mods .....................7 Chapter 1: Windows XP: What’s Not to Love? ...............................................................9 Chapter 2: Tools of the Hacking Trade .........................................................................17 Chapter 3: A Quick XP Makeover ..................................................................................25 Part II: Controlling the Look and Feel of Windows XP ...45 Chapter 4: TweakUI, the Power User’s PowerToy .......................................................47 Chapter 5: Pinning Down the Start Menu .....................................................................57 Chapter 6: Taking On the Taskbar .................................................................................85 Chapter 7: Decking Out the Desktop .............................................................................97 Part III: Adjusting Everyday Activities ......................113 Chapter 8: Reining In Windows Explorer ....................................................................115 Chapter 9: Cool Keyboard Hacks and Menu Mods ....................................................129 Chapter 10: Searching on the Desktop .......................................................................139 Chapter 11: Switching to Better Online Software ......................................................151 Chapter 12: Pulling Off Pictures ...................................................................................173 Part IV: Modding to Monitor and Manage ..................191 Chapter 13: Seeing What’s Happening ........................................................................193 Chapter 14: Decoding IDs, Accounts, and Passwords ..............................................209 Chapter 15: Using Remote Assistance ........................................................................225 Chapter 16: Retooling Disks .........................................................................................237 Part V: Protecting Yourself (And Your PC) ................247 Chapter 17: Changing (In)Security Settings ...............................................................249
Recommended publications
  • Text File Converted with Freeware Acropad
    XP Tips & Tweaks These tips and tweaks have come from hundreds of individuals across the internet. I have included some of web sites links (below) that cover this popular topic. I have not tried most of these tips, so let me know if some don't work or have mistakes. Tips & Tweaks Links TipsDr Paul Thurrott's Supersite for Windows - XP Tips & Tricks Microsoft WinXP Support Center Microsoft WinXP Professional Microsoft WinXP Home Microsoft WinXP Knowledge Base Articles Microsoft Power Toys for Windows XP Microsoft Windows XP Tips Microsoft Windows XP User Tips Archive Microsoft Windows XP Professional Tips Microsoft Windows XP Home Edition Tips Microsoft Tips & Tricks for Windows XP Professional Microsoft Tips for Techies Stop Jerky Graphics If you are connected to a LAN and have problems with jerky graphics, this might be the solution: ·Right-click "My Computer". ·Select "Manage". ·Click on "Device Manager". ·Double-click on your NIC under "Network Adapters". ·In the new window, select the "Advanced" tab. ·Select "Connection Type" and manually set the value of your NIC. (Not "Auto Sense" which is default.). ·You should reboot. Shutdown XP Faster Like previous versions of windows, it takes long time to restart or shutdown windows XP when the "Exit Windows" sound is enabled. To solve this problem you must disable this useless sound. ·Click Start button. ·Go to settings > Control Panel > Sound, Speech and Audio devices > Sounds and Audio Devices > Sounds. ·Then under program events and windows menu click on "Exit Windows" sub-menu and highlight it. Now from sounds you can select, choose "none" and then click Apply and OK.
    [Show full text]
  • Windows 7 Operating Guide
    Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access
    [Show full text]
  • Laptop Service Guide
    Windows Operating System 3 Turn off visual effects 3 Turn off Windows Search Indexing Feature 4 Defragging Hard Drive 5 Step 1: Locating the Defragment Wizard 5 Step 2: Using Defragment Wizard 6 Checking your hard drive 8 Checking your memory 8 Ensure Windows Defender is enabled 9 Perform Disk cleanup to remove clutter 12 Disable Programs that you do not use frequently from starting when system boots 14 14 Perform regular Windows Defender scans on system 15 Uninstall programs that you do not use anymore 17 Regularly turn off your system when not in use 18 How to shut down your windows machine 19 Perform check disk on hard drive regularly 21 Turn Off Windows Tips and Tricks 23 Turn Off Search Indexing 24 Regularly perform backups as well as create restore points 27 Use Powershell to fix corrupt files: 32 Enable fast start-up: 34 Effect of ram on the system 35 2 Windows Operating System Turn off visual effects I. Open the start menu by pressing the Windows key on your keyboard or by clicking on the icon shown below. a. Type “Advanced System Settings” and click on it when it appears in the Menu. b. Navigate to the “Advanced” tab at the top. c. Click on “Settings” in the “Performance” block d. Select “Adjust for best performance”. e. Click “Ok” to finish the setup. 3 Turn off Windows Search Indexing Feature I. Open the start menu by pressing the Windows key on your keyboard or by clicking on the icon shown below. II. Search for “Index” and choose “Indexing Options” when it appears.
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • Windows Messenger Live Msn Download
    Windows messenger live msn download Windows Live Messenger latest version: See. Hear. Share. Instantly.. Windows Live Messenger previously known as MSN Messenger, was renamed as part of. MSN Messenger is an instant messaging program that lets you send instant messages to your friends, and much more. Previously known as MSN Messenger, Windows Live Messenger is Microsoft's answer to instant messaging. While largely the same as its predecessor. Windows Live Messenger free download. on their MSN or Hotmail account, as the integration with the email accounts can be. Mobile and web: Using a public computer without Messenger? No problem! You can chat on the web from Windows Live Hotmail or use. Share photos: Look at photos together, right in the conversation window and Messenger tells you when people you know post new photos on Windows Live. Microsoft Windows live messenger free Download Link: Latest Version. Old Version of MSN (Live) Messenger. Website. Developer. Microsoft Corporation. Latest Version. Windows. Messenger, which offers the user the same functionalities as Windows Live Messenger. Windows Live Messenger Final Deutsch: Der Windows Live Messenger, Nachfolger des MSN Messenger, in der Version​: ​ - vom How to Download and Install Windows Live Messenger. Windows Live Messenger is a great way to talk to people online. You can now have a personal picture. Windows 7 by default is installed without Windows Live Messenger. So to get it, we will need to download and install it. select, like setting Bing as the default search provider and setting MSN as your browser home page. is a free, personal email service from Microsoft.
    [Show full text]
  • The Most Common Blunder People Make When the Topic of a Computer Virus Arises Is to Refer to a Worm Or Trojan Horse As a Virus
    Trojan And Email Forging 1) Introduction To Trojan&viruses: A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.[1][2][3][4][5] A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6] While Trojans and backdoors are not easily detectable by themselves, computers may appear to run slower due to heavy processor or network usage. Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files (computer virus) or otherwise propagate themselves (worm).[7] A computer may host a Trojan via a malicious program a user is duped into executing (often an e-mail attachment disguised to be unsuspicious, e.g., a routine form to be filled in) or by drive-by download. The Difference Between a Computer Virus, Worm and Trojan Horse The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus.
    [Show full text]
  • Program Name Run Command About Windows Winver Add a Device
    List of Run Commands in Win7/8 to Windows Managment By Shree Krishna Maharjan in some commands need to use .msc Program Name Run Command About Windows winver Add a Device devicepairingwizard Add Hardware Wizard hdwwiz Advanced User Accounts netplwiz Authorization Manager azman Backup and Restore sdclt Bluetooth File Transfer fsquirt Calculator calc Certificates certmgr Change Computer Performance Settings systempropertiesperformance Change Data Execution Prevention Settings systempropertiesdataexecutionprevention Change Printer Settings printui Character Map charmap ClearType Tuner cttune Color Management colorcpl Command Prompt cmd Component Services comexp Component Services dcomcnfg Computer Management compmgmt.msc Computer Management compmgmtlauncher Connect to a Network Projector netproj Connect to a Projector displayswitch Control Panel control Create A Shared Folder Wizard shrpubw Create a System Repair Disc recdisc Credential Backup and Restore Wizard credwiz Data Execution Prevention systempropertiesdataexecutionprevention Default Location locationnotifications Device Manager devmgmt.msc Device Pairing Wizard devicepairingwizard Diagnostics Troubleshooting Wizard msdt Digitizer Calibration Tool tabcal DirectX Diagnostic Tool dxdiag Disk Cleanup cleanmgr Disk Defragmenter dfrgui Disk Management diskmgmt.msc Display dpiscaling Display Color Calibration dccw Display Switch displayswitch DPAPI Key Migration Wizard dpapimig Driver Verifier Manager verifier Ease of Access Center utilman EFS REKEY Wizard rekeywiz Encrypting File System
    [Show full text]
  • Yahoo Messenger Error Code 7 Softpedia
    Yahoo Messenger Error Code 7 Softpedia Available now for Linux, Mac OS X, and Microsoft Windows. Mozilla Thunderbird 38.0 Arrives with GMail OAuth2 and Yahoo Messenger Support. DESKTOP Windows Messenger, Google Talk, ICQ, Skype), but it can also directly access social with red highlights), or change font to code style (which is especially useful if you're trying There are tons of emoticons you can play with (smiley faces, objects and symbols), and some of them are compatible with Yahoo! Clear Yahoo Messenger cache in Windows. Caution: These steps apply to 32-bit and 64-bit versions of Windows XP, Windows Vista, Windows 7, and Windows. ManyCam also allows you to broadcast four video windows simultaneously or picture in picture video. wont finish downloading, gets stuck everytime and Im on an i7 the exe file runs (and I assume pulls more code down from web) Norton says Trojan. Operating Systems, Windows XP/Vista/7/8 Yahoo Messenger. Yahoo! Messenger can be run on various versions of the Windows operating Download Skype 7.1 Offline Installer Latest Version 2015 Download Skype. -Softpedia.com can add not only keystrokes and mouse actions to your scripts but also manage windows, Facebook, Yahoo, AOL, Hotmail So im using this for a game and it works great but theres one issue it doesnt June 19 at 7:32am. Yahoo Messenger Error Code 7 Softpedia >>>CLICK HERE<<< Telegram Desktop is a powerful, cross-platform messenger app that enables iOS (known as Telegram Messenger) and Windows Phone, but also desktop a valid mobile phone number, which is used for generating a security code.
    [Show full text]
  • Multiple Logs Analysis for Detecting Zero-Day Backdoor Trojans
    Cleveland State University EngagedScholarship@CSU ETD Archive 2008 Multiple Logs Analysis for Detecting Zero-Day Backdoor Trojans Sinchai Caravut Cleveland State University Follow this and additional works at: https://engagedscholarship.csuohio.edu/etdarchive Part of the Computer Sciences Commons How does access to this work benefit ou?y Let us know! Recommended Citation Caravut, Sinchai, "Multiple Logs Analysis for Detecting Zero-Day Backdoor Trojans" (2008). ETD Archive. 546. https://engagedscholarship.csuohio.edu/etdarchive/546 This Thesis is brought to you for free and open access by EngagedScholarship@CSU. It has been accepted for inclusion in ETD Archive by an authorized administrator of EngagedScholarship@CSU. For more information, please contact [email protected]. MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS SINCHAI CARAVUT Bachelor of Engineering in Computer Engineering King Mongkut’s Institute of Technology Ladkrabang May, 2001 submitted in partial fulfillment of requirement for degree MASTER OF COMPUTER AND INFORMATION SCIENCE at the CLEVELAND STATE UNIVERSITY May, 2008 This thesis has been approved for the Department of Computer and Information Science and the College of Graduate Studies by ______________________________________ Dr. Chien-Hua (Mike) Lin _______________________ Department & Date ______________________________________ Dr. Barbara A. Benander _______________________ Department & Date ______________________________________ Dr. Victor Matos _______________________ Department & Date MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS SINCHAI CARAVUT ABSTRACT Trojan horses commonly known as “Trojans” are the computer threats that have been recently causing trouble on the internet because of their new propagation techniques. Social engineering has become a popular strategy to deceive people to run the attacker’s malicious programs. Trojans use this technique to propagate themselves from a computer or a network to others, thus making them hard to prevent.
    [Show full text]
  • Directx 11 Extended to the Implementation of Compute Shader
    DirectX 1 DirectX About the Tutorial Microsoft DirectX is considered as a collection of application programming interfaces (APIs) for managing tasks related to multimedia, especially with respect to game programming and video which are designed on Microsoft platforms. Direct3D which is a renowned product of DirectX is also used by other software applications for visualization and graphics tasks such as CAD/CAM engineering. Audience This tutorial has been prepared for developers and programmers in multimedia industry who are interested to pursue their career in DirectX. Prerequisites Before proceeding with this tutorial, it is expected that reader should have knowledge of multimedia, graphics and game programming basics. This includes mathematical foundations as well. Copyright & Disclaimer Copyright 2019 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our website or its contents including this tutorial. If you discover any errors on our website or in this tutorial, please notify us at [email protected]
    [Show full text]
  • A Cross-Platform Programmer's Calculator
    – Independent Work Report Fall, 2015 – A Cross-Platform Programmer’s Calculator Brian Rosenfeld Advisor: Robert Dondero Abstract This paper details the development of the first cross-platform programmer’s calculator. As users of programmer’s calculators, we wanted to address limitations of existing, platform-specific options in order to make a new, better calculator for us and others. And rather than develop for only one- platform, we wanted to make an application that could run on multiple ones, maximizing its reach and utility. From the start, we emphasized software-engineering and human-computer-interaction best practices, prioritizing portability, robustness, and usability. In this paper, we explain the decision to build a Google Chrome Application and illustrate how using the developer-preview Chrome Apps for Mobile Toolchain enabled us to build an application that could also run as native iOS and Android applications [18]. We discuss how we achieved support of signed and unsigned 8, 16, 32, and 64-bit integral types in JavaScript, a language with only one numerical type [15], and we demonstrate how we adapted the user interface for different devices. Lastly, we describe our usability testing and explain how we addressed learnability concerns in a second version. The end result is a user-friendly and versatile calculator that offers value to programmers, students, and educators alike. 1. Introduction This project originated from a conversation with Dr. Dondero in which I expressed an interest in software engineering, and he mentioned a need for a good programmer’s calculator. Dr. Dondero uses a programmer’s calculator while teaching Introduction to Programming Systems at Princeton (COS 217), and he had found that the pre-installed Mac OS X calculator did not handle all of his use cases.
    [Show full text]
  • Microsoft® C#® .NET Crash Course
    .NET Club University Of Cyprus presents: Microsoft ® C# ® .NET Crash Course Creating Windows Applications Introduction to C# .NET (Copyright © 2005-2011 Panayiotis Andreou) Course contents Overview of the Microsoft .NET Platform • Lesson 1: Creating a new Windows Application • Lesson 2: Introduction to Windows Forms • Lesson 3: Adding Controls to a Form • Lesson 4: Working with Controls • Lesson 5: Creating MDI Applications • Lesson 6: Introduction to Visual Basic • Lesson 7: Building Mobile Applications • Lesson 8: Deploying Applications 06/10/2011 C# .NET Crash Course 2 Course goals • Create a new Windows application • Create Windows Forms and add controls to them • Learn about different types of controls • Organize controls on a form • Create MDI (Multiple Document Interface) applications 06/10/2011 C# .NET Crash Course 3 Overview of the Microsoft .NET Platform What is the Microsoft .NET Platform Developer Clients Tools ASP.NET Web Databases Applications XML Web User .NET Services Experiences Framework 06/10/2011 C# .NET Crash Course 5 Core Technologies in the .NET Platform • .NET Framework • .NET Building Block Services • Visual Studio .NET • .NET Enterprise Servers 06/10/2011 C# .NET Crash Course 6 Components του .NET Framework Visual Basic ® C++ C# JScript ® … Common Language Specification ASP.NET: Web Services Windows and Web Forms Forms ADO.NET: Data and XML Base Class Library Common Language Runtime 06/10/2011 C# .NET Crash Course 7 Overview of C# .NET Syntax Comments Single-line comments are marked with (//) at the start //These are single-line comments Multiple-line comments are marked with /* * These are * multi-line comments */ 06/10/2011 C# .NET Crash Course 9 Variables Access Modifiers public The type or member can be accessed by any other code in the same assembly or another assembly that references it.
    [Show full text]