Powered by Blogger.

Total Pageviews

I m on Twitter!

Tuesday, April 10, 2012

Bitdefender Sphere 2012 Build 15.0.38.1604



Bitdefender Sphere is an all-around security software solution that enables households running any combination of PCs, Macs and Android-based Smartphones or Tablets to protect an unlimited number of devices from e-threats. The package includes protection from online fraud and identity theft, hackers and viruses, with file encryption software and auto-scanning technology updating automatically at least every hour. Yet it avoids slowing down the Windows PC or interrupting game play. Defend Yourself With The #1 Ranked Antivirus Protection! Bitdefender capitalizes on live and virtualized behavior-based detection, in addition to cloud-based services, to stop emerging e-threats that other products miss. This product can cover up to 3 users and is intended for home use only! Each user can protect an unlimited number of devices.


Key-Features:
• Protects all your PCs, Macs and Android devices (Smartphones or Tablets) for 1 year
• Safeguards privacy, counters e-threats on an unlimited number of devices
• No slowdown – superior performance
• Blocks e-threats on Twitter and Facebook
• Shop, bank, play and work securely wherever you are
• Parental Control, Online Backup & Tune-Up included (PC only)


PC Security
PC users benefit from Bitdefender Total Security 2012's award-winning protection* against malware infections, while they are also being kept safe from the loss of personal files, identity theft, and slow system performance. Plus, they can also take advantage of online backup, parental control, and social networking safeguards.
• Blocks viruses, spyware & spam
• Halts ID theft attempts
• Blocks social-networking specific e-threats
• Keeps kids safe with cutting-edge parental controls
• Protects your data with Online Backup
• Tunes up your PC for optimal speed & performance
• 24/7 credit monitoring with real-time alerts (U.S. only)


MAC Security
Mac users will benefit from Bitdefender Antivirus for MAC’s proactive protection against the newest breed of Mac viruses. This cutting-edge security software also destroys Windows viruses (which don’t affect Macs), preventing users from unknowingly passing them on to their family, friends, and colleagues who use Windows PCs.

• Protects your valuable files and documents from all Mac viruses
• Blocks webpages that attempt to steal your credit card data
• Prevents you from passing viruses along to your friends working on Windows machines
• Uses minimal system resources – won’t slow you down


Smartphone and Tablet Security
Android-based smartphone and tablet users will benefit from Bitdefender Mobile Security’s cloud-based threat detection and top-of-the-line anti-theft services to secure their browsing experience, prevent installation of malicious applications, and ensure remote tracking and control in case of theft or loss—all with little or no impact on battery life!
• Uses in-the-cloud services to defend your Android device against viruses and spyware
• Helps users remotely find their mobile device
• Remotely lock, send message to, or wipe device, in case of loss or theft of the smartphone or tablet
• Gives advance warning of risky websites when browsing on your mobile device

Homepage – http://www.bitdefender.com/solutions/sphere.html

Homepage – http://www.bitdefender.com

Size: 849 KB

For your PC – Download your Bitdefender Total Security 2012

For your Mac – Download Bitdefender Antivirus for Mac

For your Android-based mobile devices:
Step 1 – Remove all antimalware software installed on your mobile device, even if it is an older Bitdefender version.
Step 2 – Bitdefender Mobile Security is available on the Android Market
Step 3 – Activate Your Software by entering your MyBitdefender or Google credentials at the login screen and upgrade to Premium features in the Registration screen by in-app purchase or a valid key.

VHDL code for Odd Parity Generator

library ieee;
use ieee.std_logic_1164.all;

entity bejoy_op is
port(x,y,z:in std_logic;
p:out std_logic);
end bejoy_op;

architecture a of bejoy_op is
begin
p<=((x xor y) xor z);
end a;

Monday, April 9, 2012

McAfee Total Protection 2012 5.0.259





McAfee Total Protection 2012 – Ultimate, the most effective protection against virus, online and network threats. McAfee Total Protection provides you with our full suite of products, giving you the best defense against viruses, spyware, and other threats. The McAfee Total Protection package was designed to provide comprehensive, proactive 12-in-1 security that guards what you value and with McAfee SiteAdvisor Plus, actively shields your PC from interaction with dangerous Web sites. Continuously and automatically updating, McAfee service helps prevent online hacker attacks with the latest protection. Also, it features a back-up and restore capability for computer crashes and environmental mishaps. McAfee Total Protection includes multi-user Parental Controls, protection from identity theft, spam, and scams. With McAfee’s security service you always have the latest enhancements and threat updates that block viruses and spyware. Also, it includes a firewall to detect hacking.
With thousands of new viruses created every day, relying on traditional security updates isn’t enough anymore. Unlike the competition, exclusive McAfee Active Protection™ technology instantly analyzes and blocks new and emerging threats in milliseconds so there’s virtually no gap in your protection.
The Home Screen gives you all the information you need at a glance. And you’re never more than one click away from it, which eliminates popup windows and makes for easy navigation. Simplified alerts and scan results make it easier than ever to protect your PC.

Features and  Benefits:
• Complete Anti-virus, Anti-spyware, and Anti-malware. Relentless security software scans and blocks dangerous emails, risky web content, and online threats like viruses, Trojans, spyware, and rootkits.
• Real-time Safeguards. Cybercriminals are masters of disguise. McAfee Active ProtectionT immediately looks at suspicious material and determines its risk to help keep your computer secure.
• Two-way Firewall. Extra layers of Internet security software block bad guys breaking in or sneaking out with your personal information. This traffic cop patrols nonstop to prevent malicious software from gaining access to your PC.
• Safe Searching and Shopping. Color-coded icons next to your search results let you know before you click which sites are safe and which may install malicious code, phish for your identity, or send you spam.
• Fast Start-Up and Scan Times. We invest in performance to help you enjoy your digital life to the limit-surfing, shopping, and socializing with minimal interruptions.
• Digital Data Shredder. Permanently destroy sensitive files to be sure they cannot be retrieved by other users when you donate, recycle, lend or upgrade your PC.
• PC Tune-up. Unused applications, cached browser files, and other junk slow down your PC. McAfee QuickCleanT software removes the clutter so your computer can keep up with your digital life.
• NEW! Exclusive Anti-bot Protection. McAfee now blocks stealthy botnet software by denying its attempts to connect your PC to web addresses that belong to crooks. This extra defense helps prevent your computer from sending out your personal information to Internet crime networks.
• NEW! USB and Removable Drive Scan. Portable storage devices can be infected in their travels, spreading malicious code from system to system. McAfee scans and blocks this portable payload of viruses, Trojans, and worms before it can wriggle into your PC and your network.
• NEW! Pre-install Scan. Many people get McAfee protection because they are already infected. To help you salvage your system, McAfee works to remove infections as our software installs.
• Anti-Spam. The majority of emails are spam, and much of that spam is dangerous, offensive, or both. McAfee spam filters constantly protect you from exposure to this shady side of the Internet.
• Parental Controls. Free your kids to learn and explore online. McAfee lets parents use age-based rules and adjustable categories to block inappropriate sites and limit online time.
• NEW! Surfing Report. When you need to know what is happening online, this report shows login times, attempts to access forbidden sites, and total online time. You can also see who is online when.
• 2GB Online Backup. Some memories can’t be replaced-unless you have them backed up online. Save your most important photos, music, as well as personal and financial files automatically to a password-protected, encrypted safe deposit box in the cloud. You can recover them whenever you need them.
• Wireless Network Protection. Wireless access allows online convenience, but don’t let it go too far. McAfee Home Network Defense can block data thieves from seeing passwords and personal files on your PC when you share a wireless network.
• Anti-phishing Software. Advanced McAfee SiteAdvisor® LIVE software checks and alerts you to risky websites you receive in social media, email, and instant messages and blocks online phishing, when a scammer attempts to steal your personal or confidential information.
• NEW! Safe URL Sharing. Now you can safely and easily share interesting and entertaining content with your social networks, providing web links that your friends can click with confidence. If your link becomes risky before they click, your friends will be warned and protected.
• NEW! URL Shortener. Make your updates and tweets short, sweet, and safe with our new integrated URL shortening service. You can embed brief, trustworthy URLs that spread the news without spam or malware.

Homepage – http://us.mcafee.com

Size: 2.99 MB

Download Online Installer

Buy Now McAfee Antivirus Plus 2012 with built-in subscription for 6 months (from promotional page)

VHDL code for 3x8 Decoder

library ieee;
use ieee.std_logic_1164.all;

entity bejoy_3x8 is
port(a,b,c:in std_logic;
d0,d1,d2,d3,d4,d5,d6,d7:out std_logic);
end bejoy_3x8;

architecture arc of bejoy_3x8 is
begin
d0<= (not a) and (not b) and (not c);
d1<= (not a) and (not b) and c;
d2<= (not a) and b and (not c);
d3<= (not a) and b and c;
d4<= a and (not b) and (not c);
d5<= a and (not b) and c;
d6<= a and b and (not c);
d7<= a and b and c;
end arc;

VIPRE Antivirus 2012 5.0.1135



VIPRE Antivirus 2012 - an easy and very effective anti-virus program that does not slow down your PC. Using next generation technology, VIPRE protects your computer from all types of malware threats including viruses, adware, spyware, worms, rootkits and other malicious software.

VIPRE Antivirus 2012 - an easy and very effective anti-virus program that does not slow down your PC. Using next generation technology, VIPRE protects your computer from all types of malware threats including viruses, adware, spyware, worms, rootkits and other malicious software.
VIPRE Active Protection monitors real-time protection from known and as new as yet unknown malicious programs.

VIPRE Antivirus includes comprehensive protection against email viruses, with direct support of Outlook, Outlook Express and Windows Mail, as well as support for any email program that uses POP3 and SMTP (Thunderbird, IncrediMail, Eudora, etc.).


Homepage – http://www.vipreantivirus.com/

Size: 10.8 MB

Download VIPRE Antivirus Trial


Instructions on how to activate VIPRE Antivirus Premium, VIPRE Antivirus or CounterSpy to get a lifetime subscription:
1 - Click on Help and Registration ... Help and registration ...
2 - Fill out the form with a special key code:
00000-00000-00000-00000-00000 and press enter.
3 - a popup window will ask you to enter a password registration
4 - Select and enter (only 4 digits) year end (example, 2154)
5 - Generate a password in the Crack-Tonyblair.
6 - Copy and paste the password in the pop-up box and click OK
Enjoy!

VHDL code for JK Flip Flop

library ieee;
use ieee.std_logic_1164.all;

entity bejoy_jkff is
port(j,k,clk:in std_logic;q,q1,z:inout std_logic);
end bejoy_jkff;

architecture arc of bejoy_jkff is
begin
process(clk)
begin

if clk='1' then
z<=(j and (not q)) or ((not k) and q);
q<=z after 5ns;
q1<=not z after 5ns;

end if;
end process;
end arc;

Kaspersky Anti-Virus 2013 13.0.0.3011 Technical Preview





Kaspersky Anti-Virus 2013 – the backbone of your PC’s security system, offering protection from a range of IT threats. Kaspersky Anti-Virus 2013 provides the basic tools needed to protect your PC.
Kaspersky Internet Security 2013 – the all-in-one security solution that offers a worry-free computing environment for you and your family. Kaspersky Internet Security 2013 has everything you need for a safe and secure Internet experience. Kaspersky Internet Security 13.0 – is a new line of Kaspersky Labs products, which is designed for the multi-tiered protection of personal computers. This product is based on in-house protection components, which are based on variety of technologies for maximum levels of user protection regardless of technical competencies. This product utilizes several technologies, which were jointly developed by Kaspersky Labs and other companies; part of them is implemented via online-services. Our products for home and home office are specifically designed to provide hassle-free and quality protection against viruses, worms and other malicious programs, as well as hacker attacks, spam and spyware.
During product preparation several competitor offerings were considered and analyzed – firewalls, security suites systems, which position themselves as proactive in defence and HIPS systems. Combination of in-hosue innovative developments and results from analysis gathered through the industry allowed to jump onto a new level of protection for personal users, whereby offering even more hardened and less annoying computer protection from all types of electronic threats – malicious programs of different types, hacker attacks, spam mailings, program-root kits, phishing emails, advertisement popup windows etc.

Kaspersky Internet Security All Features:
Essential Protection:
* Protects from viruses, Trojans and worms
* Blocks spyware and adware
* Scans files in real time (on access) and on demand
* Scans email messages (regardless of email client)
* Scans Internet traffic (regardless of browser)
* Protects instant messengers (ICQ, MSN)
* Provides proactive protection from unknown threats
* Scans Java and Visual Basic scripts
Extended Protection:
* Two-way personal firewall
* Safe Wi-Fi and VPN connections
* Intrusion prevention system
* Intelligent application management and control
o automatically configured application rules
o security rating is assigned to unknown applications
o access to the user’s resources and data is restricted for unknown applications
Preventive Protection:
* Scans operating system and installed applications for vulnerabilities
* Analyzes and closes Internet Explorer vulnerabilities
* Disables links to malware sites
* Detects viruses based on the packers used to compress code
* Global threat monitoring (Kaspersky Security Network)
Advanced Protection & Recovery:
* The program can be installed on infected computers
* Self-protection from being disabled or stopped
* Restores correct system settings after removing malicious software
* Tools for creating a rescue disk
Data & Identity Theft Protection:
* Disables links to fake (phishing) websites
* Blocks all types of keyloggers
* Virtual keyboard is provided for safely entering logins and passwords
* Prevents the theft of data exchanged via secure connections (HTTPS / SSL)
* Blocks unauthorized dial-up connections
* Cleans up any traces of user activity (deletes temporary files, cookies etc.)
Content Filtering:
* Parental control
* Improved antispam protection (plugins for Microsoft Outlook, Microsoft Outlook Express, The Bat!, Thunderbird)
* Blocks banners on web pages
Usability:
* Automatic configuration during installation
* Wizards for common tasks
* Visual reports with charts and diagrams
* Alerts provide all the information necessary for informed user decisions
* Automatic or interactive mode
* Round-the-clock technical support
* Automatic database updates

Homepage – http://www.kaspersky.com

Size: 146 MB

Download Kaspersky Anti-Virus 2013 Beta

Serial Kaspersky Internet Security 2013 Beta

Sunday, April 8, 2012

VHDL code for Full Adder using structural style

library IEEE;
use IEEE.std_logic_1164.all;

entity bejoy_fa is
port(In1,In2,c_in : in std_logic;
sum, c_out : out std_logic);
end bejoy_fa;

architecture arc of bejoy_fa is

component half_adder
port(a,b : in std_logic;
sum, carry : out std_logic);
end component;

component or_2
port(a,b : in std_logic;
c : out std_logic);
end component;

signal s1, s2, s3 : std_logic;

begin

H1: half_adder port map(a=>In1, b=>In2, sum=>s1, carry=>s3);

H2: half_adder port map(a=>s1, b=>c_in, sum=>sum, carry=>s2);

O1: or_2 port map(a=> s2, b=>s3, c=>c_out);

end arc;

entity half_adder is

port (a,b : in bit ;
sum,carry : out bit);

end half_adder;

architecture arc of half_adder is

begin

sum<= a xor b;
carry <= a and b;

end arc;

entity or_2 is

port (a,b : in bit ;
c : out bit);

end or_2;

architecture arc of or_2 is

begin

c<= a or b;

end arc;

100 Watt Audio Power Amplifier





This is an exceptionally well designed amplifier, with a lot of power reserve, high fidelity, low distortion, good S/N ratio, high sensitivity, low consumption and full protection. Having all these almost ideal characteristics this amplifier is likely to become the basic building block of your future high fidelity system, or it can also become the element that will upgrade your existing system.



How it Works



The circuit works from a symmetrical ñ 40 VDC power supply and draws a maximum current of 2.6 A. The input circuit of the amplifier is a differential amplifier built around Q4 and Q5 that employ DC feedback thus preventing any DC voltage from appearing across the speaker with the usual destructive results. Q11 acts as a current source and ensures that the input stage draws a constant current of 1 mA.

The signal which appears as a voltage drop across the resistor connected in series with the collector of Q4 is used to drive the DARLINGTON pair Q3, Q2 which together with the constant current source of 7 mA that is Q10, form the driver stage. This stage operates in class A and is driving the complementary output stage Q1, Q9. The transistor Q7 is used to balance the circuit at different temperatures and must be mounted on the heatsink between the out put transistors. The feedback loop which consists of R8, R9, C2, C3 provides AC stability to the circuit. The circuit also incorporates a protection stage that makes it virtually indestructible. This protection circuit is built around Q6, Q8. If for whatever reason the output remains connected on one supply rail and the common the output is also protected from high DC voltages that could burn the speakers. The supply rails should be protected by 2 A fuses for the 8 ohm version and 3 A for the 4 ohm.





Technical Specifications - Characteristics



Output power (f=1 KHz, d=0.5 %): 100 W in 8 ohm

Supply voltage: ................  40 V

Quiescent current: ............. 50 mA

Maximum current: ............... 2.6 A

Sensitivity: . 600 mV

Frequency response: ............ 10-35000 Hz (-1 dB)

Distortion HD: ................. 0.01 %

Intermodulation dist.: ......... 0.02 %

Signal/noise: 83 dBConstruction


PLEASE READ THIS BEFORE YOU START CONSTRUCTION



To cater for those who wish to use 4 ohm speakers with this amplifier the Kit includes the necessary components for both versions. The components that differ are R3,4,17 and 23. If you build the 8 ohm version then you must also include in the circuit R28 and D7, D8 which are not used in the 4 ohm version. As you see all the components are already marked on the component side of the p.c. board.

The construction is made this way much simpler. Start the construction from the pins and the jumper connections, continue with the resistors and the capacitors and last solder in place the semiconductors. Check each resistor before soldering it, to see if its colours match those in the component list. Be careful with the electrolytic capacitors because their polarity should be respected. The polarity of those capacitors is marked on their bodies and on the component side of the p.c. board.

NOTE: On the p.c. board next to R2, R16 are marked two other resistors which do not appear in the circuit diagram but are included in the components. They are of 1 ohm 2 W (brown, black, gold) and must be included in the circuit. Take care when you are soldering the semiconductors because if you overheat them they can be damaged.

The output transistors should be mounted on the heatsink that is included in the kit. Take care not to short circuit them with the heatsink and we recommend that you use some HTC between the transistor body and the sink in order to improve heat dissipation. Follow the diagram for the mounting of the power transistors as it shows clearly how to insert the insulators and the screws. Q7 should be made to touch the heatsink and is a good idea to use a bit of HTC between its casing and the surface of the heatsink.

When you finish the construction of your project clean the board thoroughly with a solvent to remove all flux residues and make a careful visual inspection to make sure there are no mistakes, components missing and short circuits across adjacent tracks on the board. If everything is OK you can make the following connections: Input: 3 (signal), 5 (common) Output: 7 (signal), 6 (common) Supply: 1 (-40 VDC), 2 (+40 VDC) 5 (0 VDC)



Connect a milliammeter in series with the power supply, short the input of the amplifier, turn the power ON and adjust the trimmer P1 so that the quiescent current is about 50 mA. When you finish this adjustment remove the shunt from the input and connect the output of a preamplifier to it. Connect the pre amplifier to a suitable source and turn everything ON.

The signal should be heard from the speakers clear and undistorted. First of all let us consider a few basics in building electronic circuits on a printed circuit board. The board is made of a thin insulating



material clad with a thin layer of conductive copper that is shaped in such a way as to form the necessary conductors between the various components of the circuit. The use of a properly designed printed circuit board is very desirable as it speeds construction up considerably and reduces the possibility of making errors. Smart Kit boards also come pre-drilled and with the outline of the components and their identification printed on the component side to make construction easier. To protect the board during storage from oxidation and assure it gets to you in perfect condition the copper is tinned during manufacturing and covered with a special varnish that protects it from getting oxidised and makes soldering easier. Soldering the components to the board is the only way to build your circuit and from the way you do it depends greatly your success or failure. This work is not very difficult and if you stick to a few rules you should have no problems. The soldering iron that you use must be light and its power should not exceed the 25 Watts. The tip should be fine and must be kept clean at all times. For this purpose come very handy specially made sponges that are kept wet and from time to time you can wipe the hot tip on them to remove all the residues that tend to accumulate on it.

 DO NOT file or sandpaper a dirty or worn out tip. If the tip cannot be cleaned, replace it. There are many different types of solder in the market and you should choose a good quality one that contains the necessary flux in its core, to assure a perfect joint every time.

DO NOT use soldering flux apart from that which is already included in your solder. Too much flux can cause many problems and is one of the main causes of circuit malfunction. If nevertheless you have to use extra flux, as it is the case when you have to tin copper wires, clean it very thoroughly after you finish your work. In order to solder a component correctly you should do the following:




  • Clean the component leads with a small piece of emery paper. - Bend them at the correct distance from the component body and insert the component in its place on the board.



  • You may find sometimes a component with heavier gauge leads than usual, that are too thick to enter in the holes of the p.c. board. In this case use a mini drill to enlarge the holes slightly. Do not make the holes too large as this is going to make soldering difficult afterwards.



  • Take the hot iron and place its tip on the component lead while holding the end of the solder wire at the point where the lead emerges from the board. The iron tip must touch the lead slightly above the p.c. board.



  • When the solder starts to melt and flow, wait till it covers evenly the area around the hole and the flux boils and gets out from underneath the solder. The whole operation should not take more than 5 seconds. Remove the iron and leave the solder to cool naturally without blowing on it or moving the component. If everything was done properly the surface of the joint must have a bright metallic finish and its edges should be smoothly ended on the component lead and the board track. If the solder looks dull, cracked, or has the shape of a blob then you have made a dry joint and you should remove the solder (with a pump, or a solder wick) and redo it.



  • Take care not to overheat the tracks as it is very easy to lift them from the board and break them.



  • When you are soldering a sensitive component it is good practice to hold the lead from the component side of the board with a pair of long-nose pliers to divert any heat that could possibly damage the component.



  • Make sure that you do not use more solder than it is necessary as you are running the risk of short-circuiting adjacent tracks on the board, especially if they are very close together.



  • When you finish your work cut off the excess of the component leads and clean the board thoroughly with a suitable solvent to remove all flux residues that still remain on it.

If it does not work



Check your work for possible dry joints, bridges across adjacent tracks or soldering flux residues that usually cause problems. Check again all the external connections to and from the circuit to see if there is a mistake there.






  • See that there are no components missing or inserted in the wrong places.




  • Make sure that all the polarised components have been soldered the right way round. - Make sure the supply has the correct voltage and is connected the right way round to your circuit.




  • Check your project for faulty or damaged components. If everything checks and your project still fails to work, please contact your retailer and the Smart Kit Service will repair it for you.















L1 : 10 turns with wire 0,5mm turned on a restistor of 1W



If you use a 4Ohm speaker you will place R3,4,17,23 at the board.



If you use a 8Ohm speaker you will place D7 D8 and R28.



For R2 and R16 if you don't find a 0,47Ohm place two of 1 Ohm parallel.



R16 must be 0,47Ohm...the 1Ohm must be a typographical error, take care of this, i haven't tested it.

VHDL code for Half Adder

library ieee;
use ieee.std_logic_1164.all;

entity bejoy_ha is

port (a,b : in bit ;

s,c : out bit);

end bejoy_ha;

architecture arc of bejoy_ha is

begin

s<= a xor b;
c <= a and b;

end arc;

Ads By Sponsers