Endsems..
I had been not able to post here as my semester end exams are going on....
So will be back when these are over.....
I had been not able to post here as my semester end exams are going on....
So will be back when these are over.....
David Sifry posted Sifry's Alerts: State of the Blogosphere, April 2006 Part 1: On Blogosphere Growth at technorati weblog:
The State of the Blogosphere is strong. The blogosphere is over 60 times bigger than it was only 3 years ago.
The Facts:
Gnuplot is a free, command-driven, interactive, function and data plotting program.
Here i' m providing a quick reference guide for plotting graphs (as many of us don't bother to go in detailed documentation).
On Unix/Linux systems start Gnuplot by simply typing:
gnuplot
first the formal syntax :
set xlabel "x-axis data" | # will set a label "x-axis data" in graph | |
set ylabel "y-axis data" | ||
set title "x vs y" | # will set title for graph | |
set xrange [0.001:0.005] | # Change the x-axis range: | |
set yrange [20:500] | # Change the y-axis range: | |
set logscale | # plot using log scale | |
set autoscale | #let gnuplot determine ranges | |
plot "file.data" with lines | #will join data points with lines | |
plot "file.data" smooth csplines with lines | #will join plot graph using smooth curves |
Labels:
tutorial
Add to:
Typing DOS commands on the Windows Command Line prompt is a most efficient and faster way of doing things in Windows XP. Here's a run-down of the most useful DOS commands available in Windows XP. Some of these DOS commands even do not have an visual alternative. Digital Inspiration has a nice roundup of 10 very useful commands and tricks that can help you get things done quickly from the command line.
Useful Windows XP DOS Commands & Tricks [Digital Inspiration]
Related resources on Microsoft Website:
List of DOS Commands with Examples
Now a days, phishing cases had increased so here is brief writeup to give insight a about phishing . Read Wikipedia to know about phising examples.
Phishing is a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail, instant messages that appear to come from legitimate site. These authentic-looking messages are designed to fool recipients into divulging personal data such as account numbers and passwords, credit card numbers and Social Security numbers.
why phishing works :
Labels:
web
Add to:
Here are some quick tips and links which you can find useful when writing some report, article in latex.
Firstly here is an nice article explaining why latex is good .
Here are some editors available for latex:
For Linux :