Experience reading like never before
Sign in to continue reading.
Discover and read thousands of books from independent authors across India
Visit the bookstore"It was a wonderful experience interacting with you and appreciate the way you have planned and executed the whole publication process within the agreed timelines.”
Subrat SaurabhAuthor of Kuch Woh PalI am Dr. Hidaia Mahmood Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip. I obtained a lot of certified courses in MRead More...
I am Dr. Hidaia Mahmood Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.
I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.
I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator.
I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering.
I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.
I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http://www.anticorruption.000space.com
I am an Author publishing books on kdp.amazon.comand many other book stores such as Google, Apple.com, writinglife.kobo.com, Lulu.com, feiyr.com, blurb.com, bookrix.com, notionpress.com and others .
My personal website: http://www.hidaia-alassouli.000space.com
My Amazon Author Central: https://www.amazon.com/-/e/B07BH5HS7L
Email: hidaia_alassouli@hotmail.com
Read Less...
Achievements
Simple Mail Transfer Protocol (SMTP) is a set of rules used while sending emails. Usually, this protocol is associated with IMAP or POP3. However, SMTP is utilized to deliver messages, while POP3 and IMAP are utilized to receive them.
The SMTP testing tool identifies issues with email security in your server that can hinder your email delivery. It checks the health status of your outgoing email server and notifies you about the detected problems.
Simple Mail Transfer Protocol (SMTP) is a set of rules used while sending emails. Usually, this protocol is associated with IMAP or POP3. However, SMTP is utilized to deliver messages, while POP3 and IMAP are utilized to receive them.
The SMTP testing tool identifies issues with email security in your server that can hinder your email delivery. It checks the health status of your outgoing email server and notifies you about the detected problems.
The SSL Checker tool can verify that the SSL Certificate on your web server is properly installed and trusted.
Mailtrap.io is Email Delivery Platform for individuals and businesses to test, send and control email infrastructure in one place.
The book consists from the following sections:
1. Types of DNS Records.
2. SSL and TLS Certificates:
3. Replacing the Default FortiMail Certificate:
4. Header Analysis:
5. Some Tools for Email Verification.
6. Evaluation of Some SMPT Testing Tools.
7. Microsoft Remote Connectivity Analyzer.
8. Creating Free Domain in https://nic.ua and Linking it to Cloudflare.com.
9. Mailtrap.io Email Delivery Platform.
10. Sending Emails Using Windows Power Shell.
11. Free Web Hosting from infinityfree.com.
12. Installing Different Types of Plugins Related to Mail on the WordPress Website.
13. Setting Up a Business Email and Email Forwarding Through Improvmx.com.
14. SSL Certificates Checkers.
15. References.
Burp Suite is an integrated platform/graphical tool for performing security testing of web applications.
Various examples are outlined in this report for different types of vulnerabilities such as: SQL injection, Cross Site Request Forgery (CSRF), Cross-site scripting, File upload, Local and Remote File Inclusion. I tested various types of penetration testing tools in order to exploit different types of vulnerabilities. The report consists from the fol
Burp Suite is an integrated platform/graphical tool for performing security testing of web applications.
Various examples are outlined in this report for different types of vulnerabilities such as: SQL injection, Cross Site Request Forgery (CSRF), Cross-site scripting, File upload, Local and Remote File Inclusion. I tested various types of penetration testing tools in order to exploit different types of vulnerabilities. The report consists from the following parts:
1. Installing and Configuring BurpSuite
2. BurpSuite Intruder.
3. Installing XMAPP and DVWA App in Windows System.
4. Installing PHP, MySQL, Apache2, Python and DVWA App in Kali Linux.
5. Scanning Kali-Linux and Windows Using .
6. Understanding Netcat, Reverse Shells and Bind Shells.
7. Adding Burps Certificate to Browser.
8. Setting up Target Scope in BurpSuite.
9. Scanning Using BurpSuite.
10. Scan results for SQL Injection Vulnerability with BurpSuite and Using SQLMAP to Exploit the SQL injection.
11. Scan Results for Operating System Command Injection Vulnerability with BurpSuite and Using Commix to Exploit the OS Command Injection.
12. Scan Results for Cross Side Scripting (XSS) Vulnerability with BurpSuite, Using Xserve to exploit XSS Injection and Stealing Web Login Session Cookies through the XSS Injection.
13. Exploiting File Upload Vulnerability.
14: Exploiting Cross Site Request Forgery (CSRF) Vulnerability.
15. Exploiting File Inclusion Vulnerability.
16. References.
In this report I will provide Summary of the difficulties I encountered in electronic money transfer and online shopping due to the financial blockade against the Palestinians. This report consists from the following parts:
1. Summary of the difficulties I encountered in electronic money transfer and online shopping due to the financial blockade against the Palestinians.
2. The problem of Google banning
In this report I will provide Summary of the difficulties I encountered in electronic money transfer and online shopping due to the financial blockade against the Palestinians. This report consists from the following parts:
1. Summary of the difficulties I encountered in electronic money transfer and online shopping due to the financial blockade against the Palestinians.
2. The problem of Google banning the residents of Palestine from Google Payment Service GPAY.
3. Scandals of some websites for publishing books such as Ingramspark.com and other publishing websites that arbitrarily closed my accounts without reasons.
4. My detailed complaint about Ingramspark.com that closed four accounts for publishing for me without the slightest reason:
5. Summary of best bank transfer methods I realized during my evaluations.
6. Transferwise.com.
7. Payoneer.com.
8. Paysera.com.
9. Webmoney.com
10. Paytiz.com - eCurrency Money Exchanger.
11. Airtm.com.
12. Skrill.com.
13. Using WesternUnion.com for money transfer.
14. Using MoneyGram.com for money transfer.
15. Using WorldRemit.com for money transfer.
16. Using Xoom.com for money transfer.
17. Using ACEMoneytransfer.com for money transfer.
18. Examples of some successful tested bank money transfers.
19. Examples of some failed tested bank money transfers.
20. Some of my Arabic articles about the financial blockade against the Palestinians.
The objective of the book is to summarize to the user with main topics in computer networking hacking.
The book consists of the following parts:
Part 1: Lab Setup
Part2: Foot printing and Reconnaissance
Part 3: Scanning Methodology
Part 4: Enumeration
Part 5:System Hacking
Part 6: Trojans and Backdoors and Viruses
Part 7: Sniffer and Phishing Hacking
Part 8: Hacking Web Servers
The objective of the book is to summarize to the user with main topics in computer networking hacking.
The book consists of the following parts:
Part 1: Lab Setup
Part2: Foot printing and Reconnaissance
Part 3: Scanning Methodology
Part 4: Enumeration
Part 5:System Hacking
Part 6: Trojans and Backdoors and Viruses
Part 7: Sniffer and Phishing Hacking
Part 8: Hacking Web Servers
Part 9:Hacking Windows and Linux Systems
Part 10: Wireless Hacking
Part 11: Hacking Mobile Applications
Cloud Platforms provide VM images in the Linux OS as well. Linux has always been operated via terminal or shell through a keyboard and a terminal. Even with GUIs around, Linux continues to be operated from the shell.
Linux VMs are also operated from the command line of your desktop via an SSH (secure shell) connection. They do not have a desktop environment or GUI installed by default. For Windows users migrating to Linux, a desktop environment would b
Cloud Platforms provide VM images in the Linux OS as well. Linux has always been operated via terminal or shell through a keyboard and a terminal. Even with GUIs around, Linux continues to be operated from the shell.
Linux VMs are also operated from the command line of your desktop via an SSH (secure shell) connection. They do not have a desktop environment or GUI installed by default. For Windows users migrating to Linux, a desktop environment would be more convenient to operate. Hence, various desktop environments can be set up on a Linux VM.
Mostly we need to have Graphical User Interface GUI on the Linux Virtual Machine instance and to use Internet browser on it.
In this report, we will work on installing a desktop environment on a Linux Virtual Machine on different Cloud Platforms. The book consists from the following sections:
1. Generating SSH key for auto log in to Linux server
2. Creating Google Cloud Linux Virtual Machine
3. Logon to the Linux Virtual Machine
4. Installing VNC server
5. Installing XRDP server
6. Installing a Graphical User Interface (GUI) for Linux Google Cloud instance and connecting to the server through VNC or RDP connection
7. Quick guide to create a Linux virtual machine in Cloudsigma
8. Quick guide to create a Linux Virtual Machine in the Microsoft Azure portal
9. Quick guide to create a Linux Virtual Machine in Amazon AWS
This report talks about basic setup of FortiMail Server. This report includes the following sections:
1. Part 1: Basic Concept for Sending Emails.
2. Part 2: Basic Setup of FortiMail.
3. Part 3: Access Control and Policies
4. Part 4: Sessions Management.
5. Part 5: FortiMail Authentication.
6. Part 6: Content Filtering.
7. Part 7: System Maintenance.
8. Part 8: Troubleshooting.
9. Part 9:
This report talks about basic setup of FortiMail Server. This report includes the following sections:
1. Part 1: Basic Concept for Sending Emails.
2. Part 2: Basic Setup of FortiMail.
3. Part 3: Access Control and Policies
4. Part 4: Sessions Management.
5. Part 5: FortiMail Authentication.
6. Part 6: Content Filtering.
7. Part 7: System Maintenance.
8. Part 8: Troubleshooting.
9. Part 9: Data Loss Prevention.
10. Part 10: Email Archiving.
11. Part 11: AntiVirus.
12. Part 12: AntiSpam.
13. Part 13: Personal Quarantine
14. Part 14: Transparent Mode
15. Part 15: Quick Guide for FortiMail Hardware Installation
16. Part 16: Tutorial 1-Registering FortiMail Demo Account
17. Part 17: Tutorial 2-Installing FortiMail in VMWare
18. Part 18: Tutorial 3- Configuring FortiMail Using the Control Panel
19. Part 19: Tutorial 4 - Creating AntiVirus, AntiSpam, Content and Session Profiles
20. Part 20: Tutorial 5-Testing Access Control Rules.
21. Part 21: Tutorial 6- Testing Recipient Policies
22. Part 22: Tutorial 7- Testing IP Policy
23. Part 23: Tutorial 8 - Testing Relay Host.
24. Part 24: Tutorial 9- FortiMail Gateway Mode
25. Part 25: Tutorial 10- FortiMail Transparent Mode.
26. Part 26: Tutorial 11- Authentication.
27. Part 27: Tutorial 12- Creating NFS Server in Linux.
28. Part 28: Tutorial 13-Muting the NFS share from Windows.
30. Part 29: Tutorial 14- Configuration and Mail Backup.
29. Part 30: Tutorial 15- Upgrading the Forti IOS through TFTP Server.
An NFT (non-fungible “non-interchangeable”) token) simply represents ownership of an asset. Before choosing an NFT marketplace, you'll first want to decide the kind of digital asset you're interested in buying, selling, or creating. Just about anything digital -- the written word, videos, video games, art, collectors’ items, etc. -- can be tokenized on a blockchain. Another consideration is the type of tokens supported on a marketplace.
An NFT (non-fungible “non-interchangeable”) token) simply represents ownership of an asset. Before choosing an NFT marketplace, you'll first want to decide the kind of digital asset you're interested in buying, selling, or creating. Just about anything digital -- the written word, videos, video games, art, collectors’ items, etc. -- can be tokenized on a blockchain. Another consideration is the type of tokens supported on a marketplace.
NFT marketplaces are your path to start investing in digital assets, collectibles, and art, but there are lots of options out there. Be sure to choose one that suits your buying and storage needs based on the type of NFT you're after and the crypto you're interested in using for transactions.
Opensea.io is the most common online marketplace for non-fungible tokens.
The report includes the following parts:
1.What is NFT??
2. Can’t just upload the digital assets instead of buying them on NFT???
3. Some NFT marketplaces.
4. Using Opensea.io to sell and buy NFT assets.
5. Creating and minting NFT assets in OpenSea.io.
6. How to create and sell NFT on Binance NFT Marketplace.
7. How to create and sell NFT on Gate.io NFT Marketplace.
8. How to create and sell NFT on FTX.US NFT Marketplace.
9. Example on selling NFT assets on OpeanSea.io.
10. References.
Power system protection systems have three basic components: Instrument transformers, Relays, Circuit breakers
The function of the CT is to reproduce in its secondary winding a current I’ that is proportional to the primary current I. The CT converts primary currents in the kiloamp range to secondary currents in the 0–5 ampere range for convenience of measurement.
The function of the relay is to discriminate between normal operation
Power system protection systems have three basic components: Instrument transformers, Relays, Circuit breakers
The function of the CT is to reproduce in its secondary winding a current I’ that is proportional to the primary current I. The CT converts primary currents in the kiloamp range to secondary currents in the 0–5 ampere range for convenience of measurement.
The function of the relay is to discriminate between normal operation and fault conditions. The OC relay in Figure 2 has an operating coil, which is connected to the CT secondary winding, and a set of contacts. When |I’| exceeds a specified ‘‘pickup’’ value, the operating coil causes the normally open contacts to close. When the relay contacts close, the trip coil of the circuit breaker is energized, which then causes the circuit breaker to open.
The book consists from the following sections:
1. Chapter 1: Power System Faults:
2. Chapter 2: Instrument Transformers.
3. Chapter 3: Overcurrent and Earth Fault Protection Relays.
4. Chapter 4: Radial System Protection.
5. Chapter 5: Zones of Protection.
6. Chapter 6: Differential Relays.
7. Chapter 7: Distance Relays.
8. Chapter 8: Transformer Protection.
9. Chapter 9: Generator Protection.
10. Chapter 10: Busbar Protection.
11. Chapter 11: Circuit Breakers.
12. Chapter 12: Fuses.
13. Chapter 13: References.
When you create a paperback book, you need to format and upload two files: a manuscript file, which is the interior of your book, and a cover file, which is the outside of your book including the front, back, and spine. Here I will provide the steps on how to format both files, plus tools and resources to help you get started.
The report consists from the following sections:
1. Book spine width calculator.
2. Online cover calculators.
When you create a paperback book, you need to format and upload two files: a manuscript file, which is the interior of your book, and a cover file, which is the outside of your book including the front, back, and spine. Here I will provide the steps on how to format both files, plus tools and resources to help you get started.
The report consists from the following sections:
1. Book spine width calculator.
2. Online cover calculators.
3. Creating Barcode for the book ISBN.
4. Interior and cover files specifications for publishing at KDP amazon and using the cover creator at KDP amazon.
5. Interior and cover files specifications for publishing at Lulu.com and using the cover creator at Lulu.com.
6. Quick guideline for creating a bleed for your publication on Microsoft Word.
7. Quick guideline for creating a bleed for your publication on Adobe and other applications.
8. Configuring Word so that it doesn't compress images.
9. Streetlib.com Paperback book specifications.
10. Feiyr.com cover templates for print on demand books.
11. Creating paper cover using Canva.com.
12. Creating paper cover using Adobe Illustrator.
13. Creating paperback cover using Paint.net Application.
14. Creating paperback cover using Adobe Photoshop Application.
15. Creating paperback cover using Adobe InDesign Application.
16. Creating paperback interior document using Adobe InDesign Application.
17. Creating paperback interior and cover using Adobe InDesign blurb book creator.
18. References.
A smartphone is a portable device that combines mobile telephone and computing functions into one unit. It is a cellular telephone with an integrated computer and other features not originally associated with telephones such as an operating system, web browsing, multimedia functionality, the ability to run software applications, along with core phone functions such as voice calls and text messaging.
Choosing a smartphone for yourself not easy task. Fac
A smartphone is a portable device that combines mobile telephone and computing functions into one unit. It is a cellular telephone with an integrated computer and other features not originally associated with telephones such as an operating system, web browsing, multimedia functionality, the ability to run software applications, along with core phone functions such as voice calls and text messaging.
Choosing a smartphone for yourself not easy task. Factors that affect your choices are:price,features,the operating system, specs.
To help you to pick the best smartphone for you, I provide here briefer review for the specifications of different types of smartphones along with some helpful customer reviews in order to see ow the customers evaluate the product.
This report consists of the following sections:
1. Price comparison of different budget smartphone models.
2. The differences between 2G, 3G, 4G LTE, 5G networks and WIFI.
3. The differences between NFC and Bluetooth.
4. The differences Android and iOS.
5. How to choose a smartphone by brand, carrier, or features.
6. How to keep your phone from overheating.
7. Security issues according to Check Point.
8. Samsung.
9. Xiaomi Redmi.
10. Xiaomi Poco.
11. Apple.
12. Nokia.
13. Huawei.
14. Google Pixel.
15. Microsoft.
16. Realme.
17. Sony.
18. Others mobile brands: HTC, Asus, LG, Alcatel, Infinix, Panasonic, BlackBerry, Tecno, TCL, Gionee, ZTE, Oppo, Vivo, Lava, Lenovo, Motorola, Meizu, Honor, OnePlus.
19. References.
Twilio.com is an American cloud communications platform. Twilio allows software developers to programmatically make and receive phone calls, send and receive text messages, and perform other communication functions using its web service APIs.
Twilio uses Amazon Web Services to host telephony infrastructure and provide connectivity between HTTP and the public switched telephone network through APIs.
Twilio has very complicated system to understa
Twilio.com is an American cloud communications platform. Twilio allows software developers to programmatically make and receive phone calls, send and receive text messages, and perform other communication functions using its web service APIs.
Twilio uses Amazon Web Services to host telephony infrastructure and provide connectivity between HTTP and the public switched telephone network through APIs.
Twilio has very complicated system to understand and use. But in this report, I will provide introductory guideline for using the Twilio Programmable Messages and Programmable Voices services for simple use without the need to have deep knowledge in Programming. The report consists from the following sections:
1. Opening a Twilio Account and get a Twilio Trial Number
2. Upgrading the Twilio account
3. Twilio guideline for sending and receiving SMS
4. TwiML™ for Programmable SMS
5. TwiML™ for Programmable Voice
6. Basic steps to build Programmable Voice
7. Using TwiML Bins functions
8. Xampp and Ngrok web server setup for Twilio development
9. Sending messages from the dashboard of the Twilio account
10. Auto Dialer for Twilio Platform
11. Summary of testing Programmable Voice using different options
12. Summary of testing Programmable Messaging through different options
13. Creating free website to save the files on it
14. Making voice call using Twilio in browser
An Android emulator is an Android Virtual Device (AVD) that represents a specific Android device. You can use an Android emulator as a target platform to run and test your Android applications on your PC. The Android Emulator runs the Android operating system in a virtual machine called an Android Virtual Device (AVD). The AVD contains the full Android software stack, and it runs as if it were on a physical device.
You can also install Android on VMwar
An Android emulator is an Android Virtual Device (AVD) that represents a specific Android device. You can use an Android emulator as a target platform to run and test your Android applications on your PC. The Android Emulator runs the Android operating system in a virtual machine called an Android Virtual Device (AVD). The AVD contains the full Android software stack, and it runs as if it were on a physical device.
You can also install Android on VMware Workstation, VMware Player, VMware ESXi, and Virtualbox. Once you install Android on VMware Workstation or ESXi, you will get all features available for Android installed on a smartphone.
This report covers the evaluation of some Android Emulators and Installation of Android OS on Virtualbox and VMware. The report contains the following sections:
1. Enabling Hardware Virtualization
2. General guideline for installing OpenGL and running OpenGL programs on Microsoft Windows
3. Apk Downloader from Google Play Store to PC
4. How to install Xapk applications
5. Smart GaGa Android Emulator
6. NoxPlayer Android Emulator
7. Other Types of Gaming Android Emulators
8. Genymotion Android Emulator
9. Installing Android x86 ISO using Virtualbox
10. Installing Android x86 ISO using VMware
11. Running Android Apps on Google Chrome using ARC Welder extension
Phone number apps are software that enables you to send messages, Wi-Fi, and cellular calling. Phone number apps are used to make a call, record, and transfer a call, and send customize the greetings. They also are used to send unlimited SMS and MMS.
Second Phone Number apps enable you to select a custom phone number and pace phone calls. This ideal when you do not want to share your real number.
The objective of this book is to eva
Phone number apps are software that enables you to send messages, Wi-Fi, and cellular calling. Phone number apps are used to make a call, record, and transfer a call, and send customize the greetings. They also are used to send unlimited SMS and MMS.
Second Phone Number apps enable you to select a custom phone number and pace phone calls. This ideal when you do not want to share your real number.
The objective of this book is to evaluate some phone number apps. The book consists from the following parts:
1. Overview about the Phone Number Apps:
2. Quick comparison between some Second Phone Number Apps covered in the book:
3. How to solve the problem that the Google Play Store Application not supported in your country:
4. List of some good Virtual Private Network Services VPN :
5. How to install Google Pay mobile App:
6. How to install PayPal Mobile App:
7. How to install Mobile ID changer App:
8. Installing Multiple Accounts Apps
9. Evaluation of some Virtual Phone Number Services that can provide USA and Canada Phone Numbers only such as.
10. Evaluation of some Virtual Phone Number Services that can provide Phone Number Services on certain countries.
11. Evaluation of some Virtual Phone Number Services that did not work under my country Palestine using VPN or did not work properly because of un identified reason.
This project shows some selected signal techniques, including image and audio processing, using the Matlab digital signal processing and image processing toolboxes. The project is divided to 3 parts.
Part I includes design and implementation of different types of filters for filtering signal that has different sinusoidal frequency components or noise. The comparison was made between FIR low pass flter, butterworth filter, Chebycheve Type I low pass fil
This project shows some selected signal techniques, including image and audio processing, using the Matlab digital signal processing and image processing toolboxes. The project is divided to 3 parts.
Part I includes design and implementation of different types of filters for filtering signal that has different sinusoidal frequency components or noise. The comparison was made between FIR low pass flter, butterworth filter, Chebycheve Type I low pass filter and Chebycheve Type II low pass filter. Then different types of IIR Butterworth filters were designed and implemented to filter a signal that has many harmonics components, including low pass filter, high pass filter, stop band filter and band pass filter.
Part II examined audio filtering in the sense of specific frequency suppression and extraction. There are many different types of filters available for the construction of filters. We will specifically use the Butterworth filter. An audio signal was read and different types of filters, including low pass filter, high pass filter, stop band filter and band pass filter, were designed and implemented in order to filter the audio signal from some frequency bands. Then the discrete cosine transform compression examined on the audio signal at different compression rates: 50%, 75% , 87.5%
Part III deals with image processing; the project shows examples in smoothing, sharpening, and edge detection. Other useful operations on the image were tested.
A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.
A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus. Computer viru
A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.
A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus. Computer viruses generally require a host program.
System hacking is defined as the compromise of computer systems and software to access the target computer and steal or misuse their sensitive information. Here the malicious hacker exploits the weaknesses in a computer system or network to gain unauthorized access to its data or take illegal advantage.
Web content is generated in real time by a software application running at server-side. So hackers attack on the web server to steal credential information, passwords, and business information by using DoS (DDos) attacks, SYN flood, ping flood, port scan, sniffing attacks, and social engineering attacks.
This report covers the common techniques and tools used for System, Windows, Linux and Web Server Hacking. The report contains from the following sections:
· Part A: Setup Lab:
· Part B: Trojens and Backdoors and Viruses
· Part C: System Hacking
· Part D: Hacking Web Servers
· Part E: Windows and Linux Hacking
The paper aim is to configure Apache Server to support ASP. Two methods were tested. The first, by installing Bundle::Apache::ASP, and the second, by installing SUN ONE ASP Server. Two possible options for connecting to a Microsoft Access database with Sun ONE ASP for UNIX or Linux, using the using SequeLink, and using the Sun ONE ASP Database Publisher tool to migrate an Access database to MySQL, were studied. The paper is composed from the following parts,
The paper aim is to configure Apache Server to support ASP. Two methods were tested. The first, by installing Bundle::Apache::ASP, and the second, by installing SUN ONE ASP Server. Two possible options for connecting to a Microsoft Access database with Sun ONE ASP for UNIX or Linux, using the using SequeLink, and using the Sun ONE ASP Database Publisher tool to migrate an Access database to MySQL, were studied. The paper is composed from the following parts,
1. Setting up working environment when working with CodeCharge Studio program, software for building web applications.
2. Connecting to databases in ASP.
3. ASP program example.
4. Configuring apache server to support ASP by installing Bundle::Apacahe::ASP.
5. Configuring apache server to support ASP by installing Sun ONE ASP.
This book provides brief survey of the some Voice Over IP (VOIP) providers, including the providers that offers free calls to some countries. Then, I will mention some websites that offer virtual phone numbers from around the world to receive activation codes and SMS confirmations online.
.The report consists from the following parts:
1. How does VOIP work?
2. Getting free phone number in US or Canada and other countries
3. Beta
This book provides brief survey of the some Voice Over IP (VOIP) providers, including the providers that offers free calls to some countries. Then, I will mention some websites that offer virtual phone numbers from around the world to receive activation codes and SMS confirmations online.
.The report consists from the following parts:
1. How does VOIP work?
2. Getting free phone number in US or Canada and other countries
3. Betamax (Dellmont sarl) VOIP Service Provider.
4. Some free websites that can be used to receive SMS online using numbers from some countries.
5. Best websites that offer SMS verification, sending SMS and renting number services.
6. Inphonex VOIP Provider.
7. eFax
8. VOIP Frequently asked questions.
This work provides starting guide for simple Postfix mail server configuration. Then I configured the Postfix mail server to support Anti-Spam and Anti-Virus, using two methods.
Method 1: With Postfix, SpamAssassin, ClamAV and Amavis-new
Method 2: With Postfix, SpamAssassin, ClamAV and Procmail
The report includes the following sections
1. How Postfix receives mail:
2. How Postfix delivers mail
3. Starting guid
This work provides starting guide for simple Postfix mail server configuration. Then I configured the Postfix mail server to support Anti-Spam and Anti-Virus, using two methods.
Method 1: With Postfix, SpamAssassin, ClamAV and Amavis-new
Method 2: With Postfix, SpamAssassin, ClamAV and Procmail
The report includes the following sections
1. How Postfix receives mail:
2. How Postfix delivers mail
3. Starting guide for quick Postfix configuration
4. Postfix mail server and Dovecot configuration
5. Installing ClamAV and SpamAssassin
6. Installing and configuring Squirrelmail:
7. Method 1 to support Antivirus and Antispam: Using Postfix, Amavis-new, ClamAV, SpamAssassin
8. Method 2 to support Antivirus and Antispam: Using Postfix, Procmail, ClamAV, SpamAssassin
Faults studies form an important part of power system analysis. The problem consists of determining bus voltages and line currents during various types of faults. If the fault location is known the problem can be easily solved. But if the fault location is unkown, it is difficult to solve the problem. If the fault location is known the problem can be easily solved. But if the fault location is unkown, it is difficult to solve the problem. There were attempts t
Faults studies form an important part of power system analysis. The problem consists of determining bus voltages and line currents during various types of faults. If the fault location is known the problem can be easily solved. But if the fault location is unkown, it is difficult to solve the problem. If the fault location is known the problem can be easily solved. But if the fault location is unkown, it is difficult to solve the problem. There were attempts to find the critical distance of a fault that will cause certain pre-defined voltage dip at certain bus, and the problem was easy to be solved in radial systems, but yet non of the existing researches could provide proper solution for finding the crtical distance of the fault at certain line that will cause predefined voltage dip magnitude at certain bus.in meshed power system. The paper provided proper solution based in Gauess Seidal to find the critcal distance in meshed power system
Zoom is a video telephony software program developed by Zoom Video Communications.
Zoom is a free (plus paid-for options) video conferencing tool that can be used on PCs, Macs and mobile devices.The free plan provides a video chatting service that allows up to 100 participants concurrently, with a 40-minute time restriction, and there are lots of features to support collaborative working..
In this report, I’ll just give quick guide
Zoom is a video telephony software program developed by Zoom Video Communications.
Zoom is a free (plus paid-for options) video conferencing tool that can be used on PCs, Macs and mobile devices.The free plan provides a video chatting service that allows up to 100 participants concurrently, with a 40-minute time restriction, and there are lots of features to support collaborative working..
In this report, I’ll just give quick guide on how to sign up and use the Zoom application. The report contains the following sections:
1. Downloading and installing the Zoom application:
2. Starting new immediate meeting:
3. Joining a meeting:
4. Scheduling a meeting:
Current-limiting fuses are widely used to protect the thyristors in dc drive systems. In the event of the commutation failure when regenerating (inverting), the fuses need to interrupt in loop supplied by the ac and dc voltages acting in series which is the most difficult case for protection by fuse.
In this paper, a detailed study of the complete interruption process has been investigated by modeling of arcing process of the fuse. The effect varying t
Current-limiting fuses are widely used to protect the thyristors in dc drive systems. In the event of the commutation failure when regenerating (inverting), the fuses need to interrupt in loop supplied by the ac and dc voltages acting in series which is the most difficult case for protection by fuse.
In this paper, a detailed study of the complete interruption process has been investigated by modeling of arcing process of the fuse. The effect varying the motor time constant, supply impedance, number of fuses used to clear the fault and dc machine rating to the total response for fuses protecting against the regenerative circuit internal commutation fault has been studied. The model of 200A fuse is employed in this study and fuses in series with the semiconductor devices (F1) and fuses in ac line (F2) are both considered.
FACTS devices are one aspect of power electronics revolution that is taking place in all areas of electrical energy. A variable of powerful semiconductor devices not only offer the advantage of high speed and reliability of switching but, more importantly, the opportunity offered by a variety of innovative circuit concepts based on these power devices enhance the value of electric energy.
Most of the control schemes of FACTS devices introduced in the e
FACTS devices are one aspect of power electronics revolution that is taking place in all areas of electrical energy. A variable of powerful semiconductor devices not only offer the advantage of high speed and reliability of switching but, more importantly, the opportunity offered by a variety of innovative circuit concepts based on these power devices enhance the value of electric energy.
Most of the control schemes of FACTS devices introduced in the existing papers were designed either for eliminating current harmonics or eliminating voltage flickers or for load flow control. So, this work is devoted to find a proper optimal control schemes for a system with series or shunt or series and shunt converters that can provide all functions together.
Various optimal control schemes will be designed for systems with series, shunt and series-shunt converters with the objective to control the load flow through a lines and to eliminate current harmonics and voltage flickers with different strategies for tracking.
· Part 1: Gives the description of optimal control design.
· Part 2: Case studies to design different optimal control schemes for system with UPFC unit to control the power flow, eliminate voltage flicker and eliminate current harmonics. The case studies were repeated for system with only series or shunt converters.
Internet faxing uses the same principles as facsimile transmission, but it uses a Web interface instead of a fax machine. It can be a flexible, inexpensive option for transmitting documents.
Internet fax services usually assign a fax number to each person who signs up for the service. people can send faxes to this number, and customers can send faxes via e-mail without using a fax machine.
As getting cheap internet fax service is important, I
Internet faxing uses the same principles as facsimile transmission, but it uses a Web interface instead of a fax machine. It can be a flexible, inexpensive option for transmitting documents.
Internet fax services usually assign a fax number to each person who signs up for the service. people can send faxes to this number, and customers can send faxes via e-mail without using a fax machine.
As getting cheap internet fax service is important, I tried to look for cheap internet fax service that can fax to any country worldwide and can also use PayPal as it is safe payment than credit card. Unfortunately, I could not find cheap fax service for international destination. All internet fax services offer only cheap services to the free zones countries such as usa and Canada. I could not find cheap service to international destinations.
I will divide web sites that I had look to their internet fax services in the following groups
1-Part1: Websites that accepts paypal payments and supports faxing to international countries. Some of these are:
2-Part2: Websites that accepts only credit/debit card payments and supports faxing to international countries
3-Part3: Websites that supports faxing to usa and Canada only
In this report, I will compare the internet fax services according to the cost for sending fax to United Arab Emirate. I will assume that I have three pages to be sent to any fax number in UAE.
This book is divided to three parts related to case Studies for optimal control schemes of power system with FACTS devices, and power system fault analysis, and some stories of academic corruptions on my life.
· Part A: Optimal Control Schemes for Power System with FACTS Devices
· Part B. Calculation of Critical Distance in Faulted Meshed Power System
· &
This book is divided to three parts related to case Studies for optimal control schemes of power system with FACTS devices, and power system fault analysis, and some stories of academic corruptions on my life.
· Part A: Optimal Control Schemes for Power System with FACTS Devices
· Part B. Calculation of Critical Distance in Faulted Meshed Power System
· Part C: Real Stories of Academic Corruption in My Life
This is a push-to-on, and auto-OFF circuit. User needs to push the button only ones: to turn the light on. The light will turn automatically OFF after some time, since the switching OFF mechanism is timer based. The "push to on" switch is used here; this should be momentarily pushed to turn the light on. When "push to on" switch is pushed, pin-2 gets a negative pulse, and the timer gets triggered. and the IC1 555 output voltage at pin 3 will be high for certai
This is a push-to-on, and auto-OFF circuit. User needs to push the button only ones: to turn the light on. The light will turn automatically OFF after some time, since the switching OFF mechanism is timer based. The "push to on" switch is used here; this should be momentarily pushed to turn the light on. When "push to on" switch is pushed, pin-2 gets a negative pulse, and the timer gets triggered. and the IC1 555 output voltage at pin 3 will be high for certain time period, T=1.1RC, energizing the relay and so closing its contact to provide supply to illuminate the lights for that period. At the end of the time period the IC1 555 output voltage at pin 3 will be low, and so de-energizing the relay and so its contact will open cutting the supply and turning off the lamps
The book consists from the following parts:
1. Introduction
2. Circuit components: 555 and 556 Timer Circuits, Relays and Transistors
3. Description of the Project: Main circuit components, circuit description, selection of R and C according to required time period, settings, designed Circuit
4. Conclusion
5. References
In this book, I tried to outline in this report the most important topics as reference guide to assist the user to create and manage virtual computers and networks in Azure for remote access connection in simplified and clear way. This report will include the following parts:
1. Getting free Azure subscription through Sandbox Microsoft Learn subscription (No credit card needed)
2. Free 12 months, th
In this book, I tried to outline in this report the most important topics as reference guide to assist the user to create and manage virtual computers and networks in Azure for remote access connection in simplified and clear way. This report will include the following parts:
1. Getting free Azure subscription through Sandbox Microsoft Learn subscription (No credit card needed)
2. Free 12 months, then pay-as-you-go Azure account subscription (Credit card needed)
3. Student subscription (No debit/credit cards needed)
4. How to get university email
5. Virtual networks and virtual machines in Azure
6. Quick start for PowerShell in Azure Cloud Shell
7. Quick start with Azure PowerShell
8. Installing Azure CLI on Windows and creating virtual machine
9. Creating a Windows virtual machine in Azure
10. Quick start to create a Linux virtual machine in the Azure portal
11. Tutorial to create a NAT Gateway using the Azure portal and test the NAT service
12. What is Azure Network Watcher?
13. Network Watcher Agent
14. Troubleshoot connections with Azure Network Watcher using the Azure portal
15. Troubleshoot Azure VM connectivity problems
16. Quick start to configure Load Balancer
17. Quick start to configure VPN Gateway using Azure portal
18. Tutorial to connect to a virtual machine using Azure Bastion
19. Exercise to create Window Virtual Machine
20. Exercise to create Ubuntu Virtual Machine
The book consists from two parts:
· Part A: Earning Money through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges
· Part B: Earning Money through Online Advertising
I. Part A: Earning Money through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges
Part A will guide the user to a list of o
The book consists from two parts:
· Part A: Earning Money through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges
· Part B: Earning Money through Online Advertising
I. Part A: Earning Money through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges
Part A will guide the user to a list of online sources to earn money in the internet through crypto faucets, mining, cloud mining, airdrops and bounties. Then I will list some of the best online crypto currency exchanges and electronic currencies exchangers that can be used.
II. Part B: Earning Money through Online Advertising
Part B explains some easy ways for earning money from internet form advertisement websites. This part covers common methods used to earn money from internet and to increase the number of visitors in your website.
The book consists from two parts:
· Lecture Notes of Generation of Electrical Power Course
· Lecture Notes of Electric Power Transmission Course
1. Part A: Lecture Notes of Generation of Electrical Power Course
Part A includes my lecture notes for electrical power generation course. The layout, main components, and characteristics of common electrical power gene
The book consists from two parts:
· Lecture Notes of Generation of Electrical Power Course
· Lecture Notes of Electric Power Transmission Course
1. Part A: Lecture Notes of Generation of Electrical Power Course
Part A includes my lecture notes for electrical power generation course. The layout, main components, and characteristics of common electrical power generation plants are described with application to various thermal power plants. Part A is divided to different learning outcomes
· LO 1- Describe the layout of common electrical power generation plants.
· LO 2- Describe the main components and characteristics of thermal power plants.
2. Part B: Lecture Notes of Electrical Power Transmission Course
Part B includes my lecture notes for electrical power transmission course. The power transmission process, from generation to distribution is described and expressions for resistance, inductance and capacitance of high-voltage power transmission lines are developed used to determine the equivalent circuit of a three-phase transmission line. Part B is divided to different learning outcomes
· LO1- Describe the power transmission process, from generation to distribution.
· LO2- Develop expressions for resistance, inductance and capacitance of high-voltage power transmission lines and determine the equivalent circuit of a three-phase transmission line.
The book consists from two parts:
I. Part A: Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services
Part A will investigate the possible ways to get free RDP server account or RDP server account at lowest cost.
II. Part B: Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications
First, I will menti
The book consists from two parts:
I. Part A: Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services
Part A will investigate the possible ways to get free RDP server account or RDP server account at lowest cost.
II. Part B: Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications
First, I will mention the best websites that offer virtual phone numbers from around the world to receive activation codes and SMS confirmations online. Then the book will guide you to how to obtain virtual debit/credit cards for sake of online accounts verification. There are bulk numbers of banks and debit/credit cards issuers that offer virtual or physical debit/credit card. But I will not go through any of them as I covered them in a book I published previously. I will only concentrate on some quick methods to obtain debit/credit cards for sake of online account verification. I will briefly talk about generating virtual debit/credit cards namso gold CC BIN generator for verification of some online services. Then I will talk about paypalvccs.com website that offers Virtual Visa Card for sake of online accounts verification. At the end I will mention how to get USA shipment address through Viabox.com website, and I will list some of the free VPN Services I commonly use.
This report will investigate the possible ways to get free RDP server account or RDP server account at lowest cost. The report will consist from the following parts:
1. Some RDP Services Providers with free trials
2. Some RDP servers providers that sell RDP with Credit Card, Debit Card, Bitcoin, PayPal or other E-wallets
3. Getting free RDP from freerdps
This report will investigate the possible ways to get free RDP server account or RDP server account at lowest cost. The report will consist from the following parts:
1. Some RDP Services Providers with free trials
2. Some RDP servers providers that sell RDP with Credit Card, Debit Card, Bitcoin, PayPal or other E-wallets
3. Getting free RDP from freerdpserver.com
4. Getting free RDP from Google Cloud
5. Getting Google Cloud RDP/VPS for free for one month through Qwiklabs.com
6. Creating RDP through Alibabacloud.com
7. Getting free RDP/VPS for seven days from CloudSigma.com
8. Getting RDP/VPS through Microsoft Azure
9. Getting Microsoft Azure RDP/VPS for free through Sandbox subscription
10. How to get university email
11. How to get RDP service for free through Microsoft Azure for students
12. Getting free RDP from AWS Amazon
13. How to get free RDP service with Amazon AWS Educate
14. Some free websites that can be used to receive SMS online using numbers from some countries
15. Generating virtual debit/credit cards using namso gold CC BIN generator for verification of some online services accounts
In this report I will investigate the possible methods that can be used to increase the internal storage of Android device.The report includes the following parts:
1. Turning to cloud storage.
2. Using USB OTG storage.
3. Deleting unwanted Apps and clean all the history and cache.
4. How to root an android device.
5. Using external memory card to increase internal storage space of Android device.
6. Using Apps2SD
In this report I will investigate the possible methods that can be used to increase the internal storage of Android device.The report includes the following parts:
1. Turning to cloud storage.
2. Using USB OTG storage.
3. Deleting unwanted Apps and clean all the history and cache.
4. How to root an android device.
5. Using external memory card to increase internal storage space of Android device.
6. Using Apps2SD App.
7. How to partition and format disks in windows using Diskpart tool.
8. Using Terminal Emulator App
9. How to transfer your Google Authenticator 2FA to a new phone.
10. How to install the ADB Driver on your Windows PC to communicate with an android device.
11. Installing Init.d, Busybox and mound2SD Apps on an Android device to increase the internal memory.
12. How to unlock the boot loader via fastboot on Android.
13. Installing TWRP custom recovery on an android device.
14. Installing ClockworkMod CWM recovery on an android phone.
15. Installing GOM Saver to increase storage space on Android device.
16. Installing Root External 2 Internal SD APK.
17. Installing Custom Rom.
18. How to recover your deleted Whatsapp messages.
19. How to backup Android devices personal data.
20. How to root the Samsung GT-S5310 using Odin flash tool:
21. How to root the Samsung Galaxy A7 (SM-A700FD)
22. How to flash the Samsung Galaxy A7 (SM-A700FD) with firmware file.
23. How to root Galaxy A7 [A700FD] and install TWRP Recovery
In the first part of the book I will mention the best websites that offer virtual phone numbers from around the world to receive activation codes and SMS confirmations online.
The second part of the book will guide you to how to obtain virtual debit/credit cards for sake of online accounts verification.
At the end I will mention how to get USA shipment address through Viabox.com website, and I will list some of the free VPN Services I com
In the first part of the book I will mention the best websites that offer virtual phone numbers from around the world to receive activation codes and SMS confirmations online.
The second part of the book will guide you to how to obtain virtual debit/credit cards for sake of online accounts verification.
At the end I will mention how to get USA shipment address through Viabox.com website, and I will list some of the free VPN Services I commonly use.
The book consists from the following parts:
1. Some free websites that can be used to receive SMS online using numbers from some countries.
2. Some paid (not free) websites that can be used to receive SMS online using numbers from some countries.
3. Getting free phone number in US or Canada and Other Countries:
4. Best websites that offer SMS verification, sending SMS and renting number services.
5. Generating some virtual debit/credit cards through BIN Codes for verification of some online services.
6. Paypalvccs.com website that offer Virtual Visa Card for sake of account verifications.
7. Getting USA shipment address through Viabox.com.
8. Some of the free VPN Services I commonly use.
The report consists of the following parts:
1. How to get a Visa/Master Card worldwide online
2. Quick comparison of the bank transfer and visa card / master card withdraw fees for most commonly used E-wallets
3. Paypal.com and the problems they cr
The report consists of the following parts:
1. How to get a Visa/Master Card worldwide online
2. Quick comparison of the bank transfer and visa card / master card withdraw fees for most commonly used E-wallets
3. Paypal.com and the problems they create for users by closing their account without reasons:
4. Transferwise.com -Advantages and Disadvantages-
5. AdvCash.com
6. Payoneer.com –Advantages and Disadvantages-
7. Payeer.com
8. Skrill.com
9. Neteller.com
10. PerfectMoney.com
11. Ecopayz.com
12. Paxum.com
13. Epay.com
14. ePayments.com
15. Paytiz.com eCurrency Money Exchanger:
16. Airtm.com eCurrency Money Exchanger:
17. Worldremit.com:
18. Pingpongx.com
19. Dukascopy.com
20. Money.yandex.ru
21. Blackcatcard.com
22. Cashu.com
23. Webmoney,com
24. Spectrocoin.com
25. Paysend.com
26. Paysera.com
27. Bankera.com/
28. How to get ITIN:
29. Getting USA shipment address through Viabox.com:
30. Getting free phone number in US or Canada and other countries
31. Other online banks and Visa / Master card issuers
This report covers some topics in immigration, refugees and exchange programs applications as it is important topic nowadays and people needs more clear idea among all confusing information published in internet.
The report is composed from the following sections:
1. The UN refugee agency UNHCR offices
2. Refugee Application to European Countries
3. Green Card lottery application in https://www.dvlottery.state.gov
4. Travel
This report covers some topics in immigration, refugees and exchange programs applications as it is important topic nowadays and people needs more clear idea among all confusing information published in internet.
The report is composed from the following sections:
1. The UN refugee agency UNHCR offices
2. Refugee Application to European Countries
3. Green Card lottery application in https://www.dvlottery.state.gov
4. Travelling to United State in easy ways
5. Refugee application in United State
6. Scholarship programs in some countries
7. Visa information for any country
8. . Some job search websites to look for work contract
9. Getting visa online to turkey
10. .Refugee Application to Canada
11. .Immigration to Canada
12. . Immigration to Australia through skilled independent immigration visa
13. Information about seeking asylum outside of Australia
14. Refugee application to Australia
15. Some Australian lawyers answers to my queries about immigration process in Australia
16. Immegration to Newzealand
17. Visa information for South Korea
18. Website to look for conferences
19. Websites to look for study opportunity in France and Czech Republic and Germany
In this report, I will speak about the academic corruption I noted in some universities and academic institutions according to my experience with them. I will review also the abusive practices against me by some book publishing websites such as Ingramspark that arbitrarily closed my publishing accounts without reasons.I will provide also a summary of the difficulties I encountered in electronic money transfer due to the financial blockade against Palestin
In this report, I will speak about the academic corruption I noted in some universities and academic institutions according to my experience with them. I will review also the abusive practices against me by some book publishing websites such as Ingramspark that arbitrarily closed my publishing accounts without reasons.I will provide also a summary of the difficulties I encountered in electronic money transfer due to the financial blockade against Palestinians.
The report will consist from the following parts
1. Academic Corruption in Higher Colleges of Technology in Dubai
2. Academic Corruption in University of Swaziland.
3. Some stories of corruption I met in Gaza Strip institutions.
4. General profile about my education and experiences with some stories of corruption I met.
5. Academic Corruption in Palestinian Universities.
6. The corruption in Palestinian Energy and Natural Resources Authority – PENRA and Electrical Companies.
7. Scandals of some websites for publishing books such as Ingramspark.com and other publishing websites that closed my accounts without reasons.
8. My detailed complaint about Ingramspark.com that closed my four publishing accounts.
9. Brief description of my complaint about Ingramspark.com that closed my four publishing accounts.
10. Summary of the difficulties I encountered in electronic money transfer and online shopping due to the financial blockade against the Palestinians.
This book explains some easy ways for earning money from internet form advertisement websites. The book covers the following ways to earn money from internet and to increase the number of visitors in your website.
1. Introduction
2. Earning money through shortening the url of your website in the advertisement sites
3. Getting traffic to your website using Bot
This book explains some easy ways for earning money from internet form advertisement websites. The book covers the following ways to earn money from internet and to increase the number of visitors in your website.
1. Introduction
2. Earning money through shortening the url of your website in the advertisement sites
3. Getting traffic to your website using Bot traffic tool.
4. Using “iView Fur U v3!” tool to bring traffic to your website.
5. Using “TBN Best Tuber” tool to bring traffic to your website.
6. Using “Adf.ly Bot 3.1.0” tool to bring traffic to your website.
7. Using “traffic sprite” tool to bring traffic to your website
8. Using “Hit leap” tool to bring traffic to your website
9. Using “otohits.net” tool to bring traffic to your website.
10. Online Ad Models: CPM, CPC, CPL, CPA
11. Top 15 Advertisement Network s
12. Best 6 Advertisement Networks
13. Creating blog website for advertisements in blogger.com
14. Creating word press website for advertisements in wordpress.com
15. Creating word press website for advertisements in free webhosting 000webhost.com:
16. Creating advertisement links in Propeller Ads and using them in the blogger website:
17. Creating advertisement links in Propeller Ads and using them in the wordpress website.
18. Creating advertisement links in revenue hits.
19. Earning money from advertisement links in CPAlead and using them in the word press website
The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:
LANguard
Nessus
Snort
BASE
ACID
Rman
SnortCenter.
OSSEC
Sguil
The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:
LANguard
Nessus
Snort
BASE
ACID
Rman
SnortCenter.
OSSEC
Sguil
The paper concerns about basic Microsoft ISA server and Linux Squid Server configuration As a lot of technicians switch between ISA server and Squid server, I decided to write this paper to present some reference when configuring ISA and Squid. There a lot of issues that not covered, and you can go to the manual of ISA server and Squid server for detailed configuration of ISA and Squid. The paper is composed from two parts
1. &
The paper concerns about basic Microsoft ISA server and Linux Squid Server configuration As a lot of technicians switch between ISA server and Squid server, I decided to write this paper to present some reference when configuring ISA and Squid. There a lot of issues that not covered, and you can go to the manual of ISA server and Squid server for detailed configuration of ISA and Squid. The paper is composed from two parts
1. Microsoft ISA server 2004 Configuration
2. Linux Squid Server Configuration
Note that, this work was done without proper simulation, because of the lack of resources, as testing firewall configuration requires many computers, with one of them should have many network cards. Also the ISA server is not used in the computer center now.
The ultimate goal of this paper is to control the angular speed, in a model of a DC motor driving an inertial load has the angular speed, as the output and applied voltage, as the input, by varying the applied voltage using different control strategies for comparison purpose. The comparison is made between the proportional controller, integral controller, proportional and integral controller, phase lag compensator, derivative controller, lead integ
The ultimate goal of this paper is to control the angular speed, in a model of a DC motor driving an inertial load has the angular speed, as the output and applied voltage, as the input, by varying the applied voltage using different control strategies for comparison purpose. The comparison is made between the proportional controller, integral controller, proportional and integral controller, phase lag compensator, derivative controller, lead integral compensator, lead lag compensator, PID controller and the linear quadratic tracker design based on the optimal control theory. It has been realized that the design based on the linear quadratic tracker will give the best steady state and transient system behavior, mainly because, the other compensator designs are mostly based on trial and error while the linear quadratic tracker design is based on the optimal control theory which can give best dynamic performance for the controlled system.
The objective of this work is to develop a Word Press Online Store with Different Ecommerce Plugins and Themes and Word Press Online Magazine with MH Magazine Theme
The work consists of three parts:
i. Part I: Building Personal Websie with online shop the sell Ebooks:
ii. Part II: Building Ecomerce website with mystile theme and woocommerce plugin
iii. Part III: Building Online magazine website with MH-Magazine
The objective of this work is to develop a Word Press Online Store with Different Ecommerce Plugins and Themes and Word Press Online Magazine with MH Magazine Theme
The work consists of three parts:
i. Part I: Building Personal Websie with online shop the sell Ebooks:
ii. Part II: Building Ecomerce website with mystile theme and woocommerce plugin
iii. Part III: Building Online magazine website with MH-Magazine theme
The objective of this work is to provide some quick tutorials in computer networking hacking.
The objective of this work is to provide some quick tutorials in computer networking hacking.
Power Quality can be defined as the characteristics of the electricity at a given point on an electrical system, evaluated against a set of reference technical parameters. These parameters might relate to the compatibility between electricity supplied on a network and the loads connected to that network.
The voltage waveform is normally distorted, and we have the so called Power Quality disturbances such as; voltage dips/swells, transients, harmonics a
Power Quality can be defined as the characteristics of the electricity at a given point on an electrical system, evaluated against a set of reference technical parameters. These parameters might relate to the compatibility between electricity supplied on a network and the loads connected to that network.
The voltage waveform is normally distorted, and we have the so called Power Quality disturbances such as; voltage dips/swells, transients, harmonics and voltage unbalance amongst others. The study of Power Quality encompasses the Power Quality disturbances, as well as Power Quality standards, and Power Quality Monitoring.
This project will tackle the subject of Power Quality, Power Quality Disturbances, Power Quality Standards as well as Power Quality Monitoring. A general description of each of the disturbances will be given, and the basic techniques which are used to mitigate that disturbance so as to improve the quality of the supply are presented.
This book includes my lecture notes for electrical power generation course. The layout, main components, and characteristics of common electrical power generation plants are described with application to various thermal power plants.
The book is divided to different learning outcomes
• CLO 1- Describe the layout of common electrical power generation plants.
• CLO 2- Describe the main components and characteristics of thermal power
This book includes my lecture notes for electrical power generation course. The layout, main components, and characteristics of common electrical power generation plants are described with application to various thermal power plants.
The book is divided to different learning outcomes
• CLO 1- Describe the layout of common electrical power generation plants.
• CLO 2- Describe the main components and characteristics of thermal power plants.
a) CLO1 Describe the layout of common electrical power generation plants.
• Explain the demand of base - power stations, intermediate - power stations, and peak- generation power stations.
• Describe the layout of thermal, hydropower, nuclear, solar and wind power generation plants.
• Identify the size, efficiency, availability and capital of generation for electrical power generation plants.
• Eexplain the main principle of operation of the transformer and the generator.
b) CLO2: Describe the main components and characteristics of thermal power plants.
• Identify the structure and the main components of thermal power plants.
• Describe various types of boilers and combustion process.
• List types of turbines, explain the efficiency of turbines, impulse turbines, reaction turbines, operation and maintenance, and speed regulation, and describe turbo generator.
• Explain the condenser cooling - water loop.
• Discuss thermal power plants and the impact on the environment.
This book includes my lecture notes for power electronics course course. The characteristics and operation of electronic power devices, firing circuits, and driving circuits for power converters are described and implemented practically in the laboratory. Uncontrolled and controlled, single phase rectifiers are used in various electrical power applications. DC to DC power conversion circuits are investigated. Circuit simulation and practical laboratories are u
This book includes my lecture notes for power electronics course course. The characteristics and operation of electronic power devices, firing circuits, and driving circuits for power converters are described and implemented practically in the laboratory. Uncontrolled and controlled, single phase rectifiers are used in various electrical power applications. DC to DC power conversion circuits are investigated. Circuit simulation and practical laboratories are utilized to reinforce concepts.
The book is divided to different learning parts
· Part1- Describe the characteristics and operation of electronic power devices.
· Part2- Describe firing and driving circuits for power electronic converters.
· Part3- Analyse the use of uncontrolled and controlled single-phase rectifiers in various electrical power applications.
· Part4- Investigate the DC-to-DC power conversion circuits used in power applications.
This book includes my lecture notes for electrical power transmission course. The power transmission process, from generation to distribution is described and expressions for resistance, inductance and capacitance of high-voltage power transmission lines are developed used to determine the equivalent circuit of a three-phase transmission line.
The book is divided to different learning outcomes
Part 1- Describe the power transmission process, fr
This book includes my lecture notes for electrical power transmission course. The power transmission process, from generation to distribution is described and expressions for resistance, inductance and capacitance of high-voltage power transmission lines are developed used to determine the equivalent circuit of a three-phase transmission line.
The book is divided to different learning outcomes
Part 1- Describe the power transmission process, from generation to distribution.
Part 2- Develop expressions for resistance, inductance and capacitance of high-voltage power transmission lines and determine the equivalent circuit of a three-phase transmission line.
This book includes my lecture notes for electrical machines course.
The book is divided to different learning parts
· Part 1- Apply basic physical concepts to explain the operation and solve problems related to electrical machines.
· Part 2- Explain the principles underlying the performance of three-phase electrical machines.
· Part 3- Anal
This book includes my lecture notes for electrical machines course.
The book is divided to different learning parts
· Part 1- Apply basic physical concepts to explain the operation and solve problems related to electrical machines.
· Part 2- Explain the principles underlying the performance of three-phase electrical machines.
· Part 3- Analyse, operate and test three-phase induction machines.
· Part 4- Investigate the performance, design, operation, and testing of the three-phase synchronous machine.
his book includes my lecture notes for electrical power distribution book. The fundamentals of electrical power distribution are applied to various distribution system layouts and the function of common distribution system substations and equipment. The book introduces the design procedures and protection methods for power distribution systems of consumer installations. Circuit simulation and practical laboratories are utilised to reinforce concepts.
T
his book includes my lecture notes for electrical power distribution book. The fundamentals of electrical power distribution are applied to various distribution system layouts and the function of common distribution system substations and equipment. The book introduces the design procedures and protection methods for power distribution systems of consumer installations. Circuit simulation and practical laboratories are utilised to reinforce concepts.
The book is divided to different learning outcomes
• CLO 1- Discuss the fundamental concepts related to electrical distribution systems.
• CLO 2- Explain the role of distribution substations and related equipment.
• CLO 3- Outline standard methods for power distribution to consumer installations.
• CLO 4- Apply short-circuit and over-load protection principles for electrical installations
As videos are so much important todays, I believe that everyone must have some knowledge on creating and editing videos for of common tasks required by his personal or business use.
This book has mainly an objective to evaluate some text to speech converters, voice changers, video editors, cartoon animators and video recording and live streaming programs.
The contents
1. Some tools to reshape the Arabic l
As videos are so much important todays, I believe that everyone must have some knowledge on creating and editing videos for of common tasks required by his personal or business use.
This book has mainly an objective to evaluate some text to speech converters, voice changers, video editors, cartoon animators and video recording and live streaming programs.
The contents
1. Some tools to reshape the Arabic letters.
2. Some tools to convert English text to speech TTS.
3. Some tools to convert Arabic text to speech TTS.
4. Evaluation of some voice changers
5. Creating video of audio file with list of images (slideshow) using VSDC Free Video Editor.:
6. Screen capture using VSDC Free Video Editor.
7. Video capture using VSDC Free Video Editor.
8. Using https://www.animaker.com/ website to create simple cartoon animation video.
9. Using https://www.powtoon.com website to create animation video.
10. Using Camtasia Studio Video Editor
11. Using Camtasia Studio Recorder
12. Using Reallusion Cartoon Animator 4:
13. Making Face Mockup on Cartoon Animator 4 through Motion Live 2D Plugin
14. Introduction to Adobe Character Animator
15. Setting OBS Studio for live stream:
16. Creating live stream video on Youtube with OBS studio:
17. Creating Live stream video on Facebook with OBS studio:
18. Using Voki website https://www.voki.com/ to create customizable speaking avatars.
The thesis will try to summarise the major power system problems and the important role of the FACTS devices to enhance the power system quality. Then, it will give a brief description for various FACTS and Active Filters controllers as mentioned on the existing publications.
Most of the control schemes introduced in the existing papers were designed either for eliminating current harmonics or eliminating voltage flickers or for load flow control
The thesis will try to summarise the major power system problems and the important role of the FACTS devices to enhance the power system quality. Then, it will give a brief description for various FACTS and Active Filters controllers as mentioned on the existing publications.
Most of the control schemes introduced in the existing papers were designed either for eliminating current harmonics or eliminating voltage flickers or for load flow control. So, this work is devoted to find a proper optimal control schemes for a system with series or shunt or series and shunt converters that can provide all functions together.
Various optimal control schemes will be designed for systems with series, shunt and series-shunt converters with the objective to control the load flow through a lines and to eliminate current harmonics and voltage flickers with different strategies for tracking.
Power systems have two components of apparent power: active and reactive power.
Active power is the one that is converted to other forms of energy in the load yet reactive power is only responsible for magnetizing purposes. Power factor is a ratio depicting how much of the power supplied is real. The reactive current contribute in the value of the overall magnitude of current in transmission lines causing unnecessarily high line currents and low
Power systems have two components of apparent power: active and reactive power.
Active power is the one that is converted to other forms of energy in the load yet reactive power is only responsible for magnetizing purposes. Power factor is a ratio depicting how much of the power supplied is real. The reactive current contribute in the value of the overall magnitude of current in transmission lines causing unnecessarily high line currents and low power factor.
Since a low power factor means higher amount of apparent power need to be supplied by the utility company, thus the company must also use bigger generators, large transformers and thicker transmission/distribution lines. This requires a higher capital expenditure and operational cost which usually result in the cost being passed to the consumer.
In this research, we seek to identify the effects of a low power factor on Swaziland Electricity Company’s power supply system and recommend possible solutions to the problem. The results are useful in determining how to optimally deliver power to a load at a power factor that is reasonably close to unity, thus reducing the utility’s operational costs while increasing the quality of the service being supplied.
It is common these days for a single system to host many domains, for example uniswa.com and mtn.com or acme .com may run on a single host machine, but behave as if they were on three different hosts. A system usually has a canonical domain, it has its usual or local domain name, and additional domains are configured as virtual domains.
The purpose behind this work is to create a mail server solution based on Postfix that is based on virtual users and
It is common these days for a single system to host many domains, for example uniswa.com and mtn.com or acme .com may run on a single host machine, but behave as if they were on three different hosts. A system usually has a canonical domain, it has its usual or local domain name, and additional domains are configured as virtual domains.
The purpose behind this work is to create a mail server solution based on Postfix that is based on virtual users and domains, i..e. users and domains that are in a MySQL database.
It will also demonstrate the installation and configuration of Courier-Imap (IMAP/POP3), so it can authenticate against the same MySQL database Postfix uses. The resulting postfix server is capable of quota which is not built into Postfix by default; the project will demonstrate how to patch postfix appropriately. Passwords are stored in encrypted form in the database. The work also covers the installation of Mail Scanner, SpamAssassin and ClamAv so that emails will be scanned for spams and viruses. The administration of MySQL database can be done through a web based tool Postfixadmin or can be done manually in the MySQL shell. Postfixadmin is a web based management tool created for Postfix that handles Postfix style virtual domains and users that are stored in MySQL. The squirrelmail web based email client is installed, in order to check emails from anywhere in world via internet. All installations were done in Fedora 5 Linux machine.
Are you sure you want to close this?
You might lose all unsaved changes.
The items in your Cart will be deleted, click ok to proceed.