Tuesday, October 4, 2011

drawing-anime-eyes


drawing anime eyes
drawing anime eyes step 1

STEP 1.

 A member said that they would appreciate if I would include a snapshot of what I use to draw with. For this lesson I used four tools, a high polyester eraser, and three different pencils used for drawing and shading as well as creating darkened lines in certain areas.
 
drawing anime eyes step 2

STEP 2.

 This sketched diagram or tip shows you how the angle of a common anime eye should look from top to bottom. As you can see the eye slants a bit inward for added expression.
 
drawing anime eyes step 3

STEP 3.

 For this type of anime eye, the character is most likely feeling strain, confusion, sadness, or pain. The ends of the eyes squeeze in a pinched fashion to give off this type of expression.
 
drawing anime eyes step 4

STEP 4.

 When drawing or coloring in the eyes, you will almost always have to leave a spot or two uncolored. This is to add the shine or glare factor for the anime eye as I point out to you here in this example.
 
drawing anime eyes step 5

STEP 5.

 For a less intense glare effect, shade in the area to be whitened out but keep some of the color inside of the eye. This will end up looking like a faded part of the eye glare or shine.
 
drawing anime eyes step 6

STEP 6.

 Let's begin drawing anime eyes shall we? Since there is more than six eyes, you will need to make ten different top lid lines. Each one is different in shape, size, and thickness.
 
drawing anime eyes step 7

STEP 7.

 You will now sketch out or draw the shape of each anime eye like you see here. Some of the eyes have eyebrows and lids exposed as you see here depending on the expression that are giving off.
 
drawing anime eyes step 8

STEP 8.

 Lastly, draw in the pupils, glare shape, and color or shade in the eyes the way you see them here. You can choose to draw one or two eyes, or the whole set it all depends on the type of anime or manga eye you are looking for.
 
drawing anime eyes step 9

STEP 9.

 And this is the finished hand sketched sheet of sketching paper that I drew my anime eyes on. Did you enjoy this lesson or what? I hope so because I know I had a blast teaching you all the secrets to drawing anime eyes.
 

how-to-draw-a-doll-face,-porcelain-doll


how to draw a doll face, porcelain doll
how to draw a doll face, porcelain doll step 1

STEP 1.

 Begin this step like all the other face tutorials you have followed in the past. Begin with a circle and then add the facial guidelines.
 
how to draw a doll face, porcelain doll step 2

STEP 2.

 Sketch out the actual shape of the doll's face and then draw in the chin and fat along the cheeks.
 
how to draw a doll face, porcelain doll step 3

STEP 3.

 Using the facial guidelines you will begin drawing out the shapes of the dolls eyes. Be sure to add the crease above the left eye, and draw in the bold or thick lashes on the closed right eye.
 
how to draw a doll face, porcelain doll step 4

STEP 4.

 Sketch out the nose which is in a triangular shape, and draw in the long crack lines, as well as the nostril holes, and eye lashes.
 
how to draw a doll face, porcelain doll step 5

STEP 5.

 For the last step, draw out the doll's mouth and or lips which are small and kind of full. You will also need to sketch out the creases, frown lines, and chin dimple too. Lastly color in the empty eye hole and start cleaning up the drawing by erasing mistakes and guides.
 
how to draw a doll face, porcelain doll step 6

STEP 6.

 This is the finished doll face when you are done. Color it in using the shades like I did, and you have yourself one heck of a drawing.
 

how-to-draw-an-easy-pegasus


how to draw an easy pegasus
how to draw an easy pegasus step 1

STEP 1.

 Start by making a circle for the head, and then add a connecting shape for the body like you see here. Lastly, draw in some facial guidelines.
 
how to draw an easy pegasus step 2

STEP 2.

 Now you will start sketching out the shape of this easy Pegasus face, and head like so. When that is done start drawing out the body, and then draw the tail like so.
 
how to draw an easy pegasus step 3

STEP 3.

 Here is where you will start sketching in the horses mane, and notice how I drew it hanging over the forehead for added cuteness. When that is done, you can go ahead and draw in the ears, eyes, and nostril holes. Lastly, draw out all the legs and include the hooves.
 
how to draw an easy pegasus step 4

STEP 4.

 Yes, you have made it to the last drawing step. All you need to do is finish drawing the eyes and mane, and then add some detailing on the hooves, and then draw out the flying wings like so. Once that is done erase the lines and shapes you drew in step one to clean up the drawing, and to add last minute detailing to the tail.
 
how to draw an easy pegasus step 5

STEP 5.

 Here it is guys, your finished drawing in an easy Pegasus. I hope you had fun as much as I did. Now you can color in your fantasy creature so you can proceed onto a new drawing challenge.
 

how-to-draw-michael-jackson


how to draw michael jackson
how to draw michael jackson step 1

STEP 1.

 Draw the basic guidelines and shapes for the frame of Michael Jackson the way you see them here. A circle for his head and then the facial guidelines. Next draw the circle shape for his torso and then add the arm, and leg limb guidelines as you see them here.
 
how to draw michael jackson step 2

STEP 2.

 Start sketching out the shape and style of his hat and the side view of his face which will be mostly hidden.
 
how to draw michael jackson step 3

STEP 3.

 Begin detailing and defining his hat as well as sketching out his long curly hair style that he was famous for. When that is done you can then draw out and detail his ear.
 
how to draw michael jackson step 4

STEP 4.

 Remember guys you can enlarge the steps to see exactly what I am drawing so keep that in mind. What you will do now is sketch out the hair on the back of Jacksons head and then begin sketching out the white t-shirt he is wearing under his black jacket. Be sure to add the wrinkle and crease line to make his clothes ook alive and loose.
 
how to draw michael jackson step 5

STEP 5.

 Sketch out the rest of his jacket as you see it done here and them draw out teh left hand. Detail and define the coat around the shoulders as well as the front part of the blazer.
 
how to draw michael jackson step 6

STEP 6.

 You will now begin sketching out the pants and notice that he is grabbing his crotch which is another famous move of his. Be sure to wrinkle up the pants as they are loose fitting.
 
how to draw michael jackson step 7

STEP 7.

 For your last drawing step you will complete the shape and style of his pants which includes the shapes of his legs, and then draw out the other hand which is the hand he wears his glove on. I will fix the hand later on today because I know it looks a little funky. Draw the shoes and then start erasing all the guidelines and shapes that you drew in step one.
 
how to draw michael jackson step 8

STEP 8.

 Your sketch should come out looking like the one you see here. When it is cleaned up you can color him in and you have yourself a finished tutorial on "how to draw Michael Jackson" step by step.
 

Monday, September 26, 2011

How to put LOGO In URL of WEBSITE

Have you ever noticed that when you visit some web site, there is an icon small (little) image that shows (appears) at the top of your browser?

If you have, today you are going to learn how to install an icon picture for your web site, so when users visit your website, you can put your logo. Even better when a visitor bookmarks your url, the browser automatically saves in their favorites to identify your site. 



Here is how to do this: 

1. If you have windows, open paint. You can find it in:
Start > Programs > Accessories
2. Set the dimensions to 24x24 pixels: in Image > Attributes (Control - E) 

3. Set Width to 24 and Height to 24 and Click Ok.
post picture 



4. To help you create and edit your image better, zoom paint to the highest zoom which is 800%.
To do this, go to View > Zoom > Custom and Select 800% 



5. Create your logo or whatever you want your icon to look like: 


6. After you have created your image, save as "favicon.ico" 




7. Now all you have to do is upload the favicon.ico image to your website root directory. The root directory is the main folder where all your files reside at, like your main index page. Some hosting companies will provide a directory called "html" or "public" or "web" "public_html". You MUST upload to your website root directory, otherwise, your browser will look for the favicon.ico image, will not find it and it will not display it on your browser.

put the following HTML code in between your <head> tags with the follwowing code:



   Code:
<link rel="shortcut icon" href="favicon.ico" />

8. Now that you have uploaded to your root directory, you are done. 


DEMO: http://www.ctechdept.co.in/favicon.ico 

Wednesday, September 14, 2011

When and why do we celebrate Engineer's Day?


September 15 is celebrated every year in India as Engineer's Day to commemorate the birthday of the legendary engineer Sir M. Visvesvaraya (1861-1962).

Internationally recognised for his genius in harnessing water resources, he was responsible for successful design and construction of several river dams, bridges and implementing irrigation and drinking water schemes all over India.

He served as the dewan of Mysore State and was considered to be the architect of the all-round development of Karnataka.

Among his most successful projects are the design and construction of the K.R. Sagar dam and its adjoining Brindavan Gardens, turn-around of the Bhadravati Iron and Steel Works, setting up of the Mysore Sandalwood Oil Factory and the founding of the Bank of Mysore.

Thursday, July 28, 2011

Increase your RAM and so system speed -SBX


1). Start any application, say Word. Open some large documents.

2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.

3). Now switch to Word and simply minimize it. (Don’t use the Minimize All Windows option of the task bar).

4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.

5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM.

In any multitasking system, minimizing an application means that it won’t be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM.

How 2 detect HIDDEN CAMERA


How 2 detect HIDDEN CAMERA in trial rooms
in malls ,showrooms etc.
In front of d trial room , take Ur mob & make
sure that d mob can make call.
Then enter into d trial room & make a call . If
u can't make a call , there is HIDDEN CAMERA .
This is due 2 interference of FIBER OPTIC
during signal transfer .
Plz tell 2 all girls 2 save them & even 2 boys 2
save their sis/frndz/family..As a Human , I hv
done my part..

Wednesday, July 27, 2011

Facebook Top Spot In U.S. Display


Facebook's U.S. advertising revenue will total roughly $2.2 billion in 2011, displacing Yahoo Inc to collect the biggest slice of online display advertising dollars, according to a new study.
Facebook's U.S. advertising revenue will give it a 17.7 percent share of the market for graphical display ads that appear on websites, according to a report released on Monday by research firm eMarketer.
Last year Facebook had 12.2 percent share of the U.S. market.
The figures underscore the growing clout of Facebook, the world's No.1 Internet social network. It has seen its valuation soar to roughly $80 billion in recent transactions for its shares on the private markets and some investors anticipate it could have an initial public offering next year.
While Facebook has grabbed the top ranking, eMarketer analyst David Hallerman said the overall market for display ads, which include banner ads, video ads and Web page sponsorships, is growing robustly enough that it is benefiting numerous companies.
"It's not a zero sum game," said Hallerman, noting that the display advertising market is experiencing rapid growth as both big international brands and small, local businesses increasingly turn to the Web to reach consumers.
Internet companies such as Yahoo, Google Inc and Microsoft Corp are competing for those advertising budgets, while new players such as online coupon company Groupon are offering marketers alternatives to traditional online display ads.
Web portal Yahoo will grow its online display business in the U.S. by 13.6 percent this year, eMarketer said. But that will lag the overall U.S. display market's growth rate of 24.5 percent.
Google's revenue from U.S. display ads will total $1.15 billion in 2011, up 34.4 percent year-over-year.

Samsung Launches New Galaxy iPad

South Korea's Samsung Electronics Co launched an upgraded version of its Galaxy tablet in its lucrative home market on Wednesday, seeking to stem the runaway success of Apple Inc's iPad.
The Galaxy Tab 10.1, the sequel of the 7-inch Tab introduced in October, is the latest push by the company to challenge the iPad. Apple's iPad sold 14 million units in the first half of this year, compared with analysts' sales estimates of about 7.5 million for the Tab for 2011, the iPad's biggest competitor.
"As our smartphone business grew very fast within a very short period of time, I believe it's just a matter of time for our tablet business to improve," J.K. Shin, head of Samsung' mobile division, told reporters.
Samsung has emerged as Apple's nearest rival in the booming mobile device industry as it leverages its cost competitiveness and access to chips and core tablet components.
It has sharply narrowed the gap with Apple in the smartphone market, but however remains a distant second in the tablet market, which Garner forecasts will surge to 108 million devices next year from an estimated 70 million in 2011.
The sale of the Tab in Korea is Samsung's fifth global launch after its U.S. debut a month ago and its sales kickoff in Indonesia, where the company says it commands a 65 percent market share. It has also launched the device in Italy and Sweden.
Pricing for the new product, slightly thinner and lighter than iPad 2, starts from $500 in the U.S. market, the same price as the iPad 2.
Blockbuster sales of the iPhone, iPad and strong Asian business again helped Apple crush Wall Street's expectations for its third-quarter results on Tuesday. Apple said concern over iPad 2 supply constraints eased and demand was still overstripping supply in some markets.
Samsung reiterated on Wednesday it aimed to boost tablet sales by more than five fold this year. It didn't provide specific numbers but analysts expect the company to have sold about 1.5 million units last year.



Monday, July 25, 2011

Certified Professional Hacker NxG


Certified Professional Hacker NxG
The Certified Professional Hacker NxG is a revolution in the field of information security training. It goes far beyond the usual courses that talk about the same old port scanning and vulnerability assessments. It goes deep down into the depths of networking, systems, web applications and actual exploitation. Here are top 5 reasons why the CPH NxG is the ideal choice in comparison to other ethical hacking courses.
  1. Training executed completely by practitioners and led by our Principal Consultant and well-renowned information security expert – K. K. Mookhey
  2. Coverage of the latest trends in information security – Advanced Persistent Threats, SCADA Hacking(analysis of Stuxnet), and Mobile Hacking
  3. Heavy focus on practical aspects and usage of tools and toolkits such as Backtrack, Metasploit, Burp Suite, Kismet, Air-crack Ng,
  4. Case studies and real-life examples to explain key concepts
  5. The entire training program is designed by our Principal Consultant Mr. K K Mookhey, and we can assure you that it is aimed specifically to make you an expert in ethical hacking and a much sought-after security analyst.
Why should you attend this course?
You've heard of courses that claim to make you an ethical hacker, but what's the definition of a 'hacker'? A 'hacker' is someone who goes into the depths of any system, and tries to understand how things actually work, not just someone who runs a bunch of scripts from the Internet to try and break into systems.

One of the greatest USPs of the CPH course is that it is built by experts who do penetration testing on a regular basis. Led by K. K. Mookhey, who is the founder of one of India's leading information security firms - Network Intelligence. He has authored books on Linux Security and Metasploit Framework, and numerous articles on securityfocus.com, and other sites. He has presented at prestigious conferences such as Blackhat USA, Interop, IT Underground, and others. Read hisfull profile here.
Also, since it is built by practitioners in the field, it also happens to be regularly updated with the latest tools, techniques, and real-world scenarios.

In fact, the lab setup for the course itself is the single-most important reason to attend the course. Where else can you actually launch attacks, see the packet flows, analyze them, tweak your attacks, and get to break into systems that have been set up to create levels of challenges and hone your skills.
Who should attend this course?
Anyone looking to build a career in information security, or if you're someone who's already in this field, but want to learn the professional concepts of hacking, then this is the course for you. It simply will not get more practical and more hands-on than this. Instead of burdening you with a huge amount of courseware, and hundreds of tools, the CPH course focuses on the real-world practical tools and techniques of hacking.
What is the CPH NxG Mailing List?
The CPH Mailing List is a members-only, by-invitation mailing list, where all Certified Professional Hackers discuss the latest happenings in the information security world, and exchange news about tools and techniques. Membership to this list is available only to those members who successfully complete the CPH course and clear the test.
How do I get certified?
On the 5th day of the training, there will be a 60 question multiple-choice test. You may refer to the notes during the test. Scoring more than 60% on the test and practical exam assures you of the CPH NxG certificate.

Course Contents
Session One: Getting the basics right
  • Module 1: TCP/IP Fundamentals
  • Module 2: Operating System Fundamentals
  • Module 3: Web Application & Database Fundamentals
  • Module 4: Introduction to Ethical Hacking
  • Module 5: Advanced Persistent Threats
Session Two - Network Cartography
  • Module 6: Footprinting
  • Module 7: Advanced Google Hacking
  • Module 8: Nmapping the network
  • Module 9: Fingerprinting
Session Three - Exploitation
  • Module 10: Hacking networks
  • Module 11: Hacking servers
  • Module 12: Hacking databases
  • Module 13: Password Cracking – Online, Offline Attacks
Session Four - Advanced Exploitation
  • Module 14: Hacking WLANs
  • Module 15: Evading IDS, Firewalls
  • Module 16: Web Application Hacking
  • Module 17: Advanced Web Hacking
  • Module 18: Hacking Web Browsers (Firefox, IE)
Session Five - Black-belt Hacking
  • Module 19: Buffer overflows
  • Module 20: Metasploiting the universe
  • Module 21: Reverse Engineering
  • Module 22: Covert Hacking
Session Six - Social Engineering
  • Module 23: What is Social Engineering?
  • Module 24: Common Types of Attacks
  • Module 25: Online Social Engineering
Session Seven - Cryptography

  • Module 26: Introduction to Cryptography
  • Module 27: Encryption and Decryption
  • Module 28: Cryptographic Algorithms
  • Module 29: Digital Signature
  • Module 30: Cryptography Tools
  • Module 31: Cryptography Attacks
Session Eight - Honeypots
  • Module 32: What is a Honeypot?
  • Module 33: The Honeynet Project
  • Module 34: Types of Honeypots
  • Module 35: Detecting Honey Pots
Session Nine - Esoteric Hacking
  • Module 36: Hacking Mobile Phones, PDA and Handheld Devices
  • Module 37: SCADA Hacking – Stuxnet Analysis
  • Module 38: Cloud Security Hacking
  • Module 39: VoIP Hacking
  • Module 40: Botnets & Backdooring
Session Ten - Real World Hacking
  • Module 41: Web-Shell Upload
  • Module 42: Pass-The-Hash
  • Module 43: Token Impersonation
  • Module 44: Xp_cmdshell
  • Module 45: BlindSQL version enumeration
  • Module 46: LFI to RCE attacks
Session Eleven - Introduction to Digital Forensics