A crypto faucet is a website that will give you satoshis in exchange for viewing ads or completing simple tasks. Crypto currency mining is the process in which transactions between users are verified and added into the block chain. The process of mining is also responsible for introducing new coins into the existing circulating supply and is one of the key elements that allow cryptocurrencies to work as a peer-to-peer decentralized network, without the need for a third party central authority.
Cloud mining happens in the "cloud." That basically means that the hardware used for mining is not physically located at your premises, but it is accessed remotely through the internet.
An airdrop, in the cryptocurrency business, is a marketing stunt that involves sending free coins or tokens to wallet addresses in order to promote awareness of a new virtual currency.
In Bounty programs, participants get cryptocurrencies in exchange for promotion.
A cryptocurrency exchange is any system that operates on the basis of trading cryptocurrencies with other assets.
There are also some on-line service designed for those who wants to exchange electronic currencies quickly, safely and at a favorable rate, such as: Webmoney, Perfect Money, AdvCash, Payeer, Skrill, Neteller, Epay, Payza, PayPal, Visa/Master Card, Western uniоn, MoneyGram, Bitcoin, Ethereum, Litecoin.
This work will guide the user to a list of online sources to earn money in the internet through crypto faucets, mining, cloud mining, airdrops and bounties. Then I will list some of the best online crypto currency exchanges and electronic currencies exchangers that can be used.
The book consists from the following parts:
1. Some sources for crypto faucets
2. Definition of cryptocurrrency mining and cloud minining
3. Some useful websites for cryptocurrency mining and cloud minining
4. Airdrop and Bounty definitions
5. Some online sources to look for airdrops and bounties events
6. Some Youtube channels to fellow up latest airdrops, faucets and mining websites
7. Some websites to get information about cryptocurrency prices and market capitalization
8. Some trusted cryptocurrency exchanges
9. Some exchanger monitoring platforms
10. Some electronic currencies exchangers
Автор: Al-Assouli Hedaia Mahmood Название: Signal, Audio and Image Processing ISBN: 1716729475 ISBN-13(EAN): 9781716729478 Издательство: Неизвестно Рейтинг: Цена: 3276.00 р. Наличие на складе: Нет в наличии.
Описание:
This project shows some selected signal techniques, including image and audio processing, using the Matlab digital signal processing and image processing toolboxes. The project is divided to 3 parts.
Part I includes design and implementation of different types of filters for filtering signal that has different sinusoidal frequency components or noise. The comparison was made between FIR low pass flter, butterworth filter, Chebycheve Type I low pass filter and Chebycheve Type II low pass filter. Then different types of IIR Butterworth filters were designed and implemented to filter a signal that has many harmonics components, including low pass filter, high pass filter, stop band filter and band pass filter.
Part II examined audio filtering in the sense of specific frequency suppression and extraction. There are many different types of filters available for the construction of filters. We will specifically use the Butterworth filter. An audio signal was read and different types of filters, including low pass filter, high pass filter, stop band filter and band pass filter, were designed and implemented in order to filter the audio signal from some frequency bands. Then the discrete cosine transform compression examined on the audio signal at different compression rates: 50%, 75%, 87.5%
Part III deals with image processing; the project shows examples in smoothing, sharpening, and edge detection. Other useful operations on the image were tested, including image cropping, image resizing, image, histogram equalization and altering image brightness
As videos are so much important todays, I believe that everyone must have some knowledge on creating and editing videos for of common tasks required by his personal or business use.
This book has mainly an objective to evaluate some text to speech converters, voice changers, video editors, cartoon animators and video recording and live streaming programs.
As I am Arabic, I gave special importance to look for the best tools that can convert Arabic text to voice with good quality because of the lack of these tools. And I also gave special importance to look for the best tools that can change the voice tune as a lot of people don't like to make videos with their voice for special reasons. Then I gave quick guide on how to use the two important video editors, VSDC Free Video Editor and Camtasia Studio. Then I gave quick guide on how to use two websites that enable people to create cartoon animation videos in a simple way, https: //www.animaker.com/ website and https: //www.powtoon.com website. Then I gave quick guide on how to us one of the best animator programs, which is Reallusion Cartoon Animator 4. I explained also how it is possible to make face mockup through Cartoon Animator 4Motion Live 2D Plugin. Then I introduced Adobe Character Animator as alternative program to make face mockup. Finally I explained about one of the video recording and live streaming programs, which is OBS Studio. I mentioned briefly how to setup OBS studio to create livestream video on Youtube and Facebook. At the end, I showed how to use Voki website to create customizable speaking avatars
This work is divided to the following sections.
1. Some tools to reshape the Arabic letters so they can be converted to voice in other tools.
2. Some tools to convert English text to speech TTS.
3. Some tools to convert Arabic text to speech TTS.
4. Evaluation of some voice changers
5. Creating video of audio file with list of images (slideshow) using VSDC Free Video Editor.:
6. Screen capture using VSDC Free Video Editor.
7. Video capture using VSDC Free Video Editor.
8. Using https: //www.animaker.com/ website to create simple cartoon animation video.
9. Using https: //www.powtoon.com website to create animation video.
10. Using Camtasia Studio Video Editor
11. Using Camtasia Studio Recorder
12. Using Reallusion Cartoon Animator 4:
13. Making Face Mockup on Cartoon Animator 4 through Motion Live 2D Plugin
14. Introduction to Adobe Character Animator
15. Setting OBS Studio for live stream:
16. Creating live stream video on Youtube with OBS studio:
17. Creating Live stream video on Facebook with OBS studio:
18. Using Voki website https: //www.voki.com/ to create customizable speaking avatars.
Автор: Al-Assouli Hedaia Mahmood Название: Zoom Video Conferencing Beginner`s Guide ISBN: 1008988464 ISBN-13(EAN): 9781008988460 Издательство: Неизвестно Рейтинг: Цена: 1310.00 р. Наличие на складе: Нет в наличии.
Описание:
Zoom is a video telephony software program developed by Zoom Video Communications.
Zoom is a free (plus paid-for options) video conferencing tool that can be used on PCs, Macs and mobile devices.The free plan provides a video chatting service that allows up to 100 participants concurrently, with a 40-minute time restriction, and there are lots of features to support collaborative working..
In this report, I'll just give quick guide on how to sign up and use the Zoom application. The report contains the following sections:
1. Downloading and installing the Zoom application:
2. Starting new immediate meeting:
3. Joining a meeting:
4. Scheduling a meeting:
Автор: Al-Assouli Hedaia Mahmood Название: Wireless and Mobile Hacking and Sniffing Techniques ISBN: 1008982849 ISBN-13(EAN): 9781008982840 Издательство: Неизвестно Рейтинг: Цена: 2621.00 р. Наличие на складе: Нет в наличии.
Описание:
Sniffing is the process of monitoring and capturing all the packets passing through a given network using sniffing tools. It is a form of "tapping phone wires" and get to know about the conversation. It is also called wiretapping applied to the computer networks.
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
There are several ways how hackers can gain access to a public WiFi network and infiltrate connected devices to steal data. The most common practice that hackers use is called sniffing. This method allows hackers to hijack any packet of data that is being transmitted between a device and a router.
The mobile device has become an inseparable part of life today. The attackers are easily able to compromise the mobile network because of various vulnerabilities, the majority of the attacks are because of the untrusted apps. SMS is another way the attackers are gaining access to the mobile devices by sending phishing messages/spam messages to user
This report covers the main Wireless and Mobile Hacking and Sniffing Techniques. The report contains the following pars:
The aim from this book to provide a quick guide for creating wordpress online store and online magazine, creating epub e-books using epub editors and converters, and an overview of some internet fax, voice over ip calls and sms verifications services providers. The book id divided into four parts:
- I.Part A: Creating Wordpress Online Store and Wordpress Online Magazine
- II. Part B: Comparison between Internet Fax Services
- III. Part C: Overview of Some Voice Over IP Calls and SMS Verifications Services Providers
- IV. Part D: Creating EPUB E-books Using EPUB Editors and Converters
I.Part A: Creating Wordpress Online Store and Wordpress Online Magazine
The objective of this work is to develop a Word Press Online Store with Different Ecommerce Plugins and Themes and Word Press Online Magazine with MH Magazine Theme.The work consists of three parts:
- 1. Building Personal Websie with online shop the sell Ebooks:
- 2. Building Ecomerce website with mystile theme and woocommerce plugin
- 3. Building Online magazine website with MH-Magazine theme
II. Part B: Comparison between Internet Fax Services
As getting cheap internet fax service is important, I tried to look for cheap internet fax service that can fax to any country worldwide and can also use PayPal as it is safe payment than credit card. Unfortunately, I could not find cheap fax service for international destination. All internet fax services offer only cheap services to the free zones countries such as USA and Canada. I could not find cheap service to international destinations
III. Part C: Overview of Some Voice Over IP Calls and SMS Verifications Services Providers
This part provides brief survey of the some Voice Over IP (VOIP) providers, including the providers that offers free calls to some countries. Then, I will mention some websites that offer virtual phone numbers from around the world to receive activation codes and SMS confirmations online.
IV. Part D: Creating EPUB E-books Using EPUB Editors and Converters
I devoted this part of the book to evaluate some tools that can be used for creating, validating and editing E-books to be in proper Epub format without errors.
- Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server
- Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools
- Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two Methods
I. Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server.
Part A concerns about basic Microsoft ISA server and Linux Squid Server configuration As a lot of technicians switch between ISA server and Squid server, I decided to write this paper to present some reference when configuring ISA and Squid. There a lot of issues that not covered, and you can go to the manual of ISA server and Squid server for detailed configuration of ISA and Squid. The paper is composed from two parts
Microsoft ISA server 2004 Configuration
Linux Squid Server Configuration
II. Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools
Part B evaluates some the security tools. Top security tools can be found in http: //sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:
III. Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two Methods
In Part C, I configured the Postfix mail server that support the Anti-Spam and Anti-Virus, using two methods, for sake of evaluation and realizing which method can be considered to be the best,
- Method 1: With Postfix, SpamAssassin, ClamAV and Amavis-new
- Method 2: With Postfix, SpamAssassin, ClamAV and Procmail
As we all know, there are many Android phones are facing low internal memory issue when installing games and apps. This problem is especially serious in budget phones because most of these phones have little memory; for example, some Android phones only have 4G memory.
If you are running insufficient storage space on your Android phone, you can expand and increase internal memory through several different methods.
The common methods that can help to increase internal storage space of android.
- Method 1. Turn to cloud storage
- Method 2. Use USB OTG storage
- Method 3. Delete unwanted Apps and clean all the history and cache
- Method 4. Use Memory card to increase internal storage space of Android device.
- Method 5. Use Terminal Emulator App
- Method 6. Use Mounts2SD App
- Methods 7: Install and Run GOM Saver to Increase Storage Space on Android Phone
In this report I will investigate the possible methods that can be used to increase the internal storage of Android device. I will also show how to troubleshoot and solve certain problem that we get when having Android devices. The report consists from the following parts:
1. Turning to cloud storage.
2. Using USB OTG storage.
3. Deleting unwanted Apps and clean all the history and cache.
4. How to root an android device.
5. Using external memory card to increase internal storage space of Android device.
6. Using Apps2SD App.
7. How to partition and format disks in windows using Diskpart tool.
8. Using Terminal Emulator App
9. How to transfer your Google Authenticator 2FA to a new phone.
10. How to install the ADB Driver on your Windows PC to communicate with an android device.
11. Installing Init.d, Busybox and mound2SD Apps on an Android device to increase the internal memory.
12. How to unlock the boot loader via fastboot on Android.
13. Installing TWRP custom recovery on an android device.
14. Installing ClockworkMod CWM recovery on an android phone.
15. Installing GOM Saver to increase storage space on Android device.
16. Installing Root External 2 Internal SD APK.
17. Installing Custom Rom.
18. How to recover your deleted Whatsapp messages.
19. How to backup Android devices personal data.
20. How to root the Samsung GT-S5310 using Odin flash tool:
21. How to root the Samsung Galaxy A7 (SM-A700FD)
22. How to flash the Samsung Galaxy A7 (SM-A700FD) with firmware file.
23. How to root Galaxy A7 A700FD] and install TWRP Recovery
24. How to root the Android device using Magisk
25. How to use Magisk to hide the root for Apps that can't accept to be installed in rooted devices
Автор: Al-Assouli Hedaia Mahamood Название: Power Electronics ISBN: 1648998577 ISBN-13(EAN): 9781648998577 Издательство: Неизвестно Рейтинг: Цена: 2917.00 р. Наличие на складе: Поставка под заказ.
Описание:
This book includes my lecture notes for power electronics course course. The characteristics and operation of electronic power devices, firing circuits, and driving circuits for power converters are described and implemented practically in the laboratory. Uncontrolled and controlled, single phase rectifiers are used in various electrical power applications. DC to DC power conversion circuits are investigated. Circuit simulation and practical laboratories are utilized to reinforce concepts.
The book is divided to different learning parts
- Part1- Describe the characteristics and operation of electronic power devices.
- Part2- Describe firing and driving circuits for power electronic converters.
- Part3- Analyse the use of uncontrolled and controlled single-phase rectifiers in various electrical power applications.
- Part4- Investigate the DC-to-DC power conversion circuits used in power applications.
Part1: Describe the characteristics and operation of electronic power devices.
1. Describe diode characteristics, types (power diode, general-purpose, and fast recovery), and connections (series, parallel and freewheeling).
2. Describe thyristor characteristics, two-transistor model, and purpose of di/dt and dv/dt protection.
3. Describe the power MOSFET and IGBT characteristics.
4.Compare electronic power devices in terms of various power converter applications, frequency of operation (switching speed), rating, and switching power losses.
Part 2: Describe firing and driving circuits for power electronic converters.
1. Describe ideal and non-ideal properties of operational amplifiers. Determine the operation of various related circuits (inverting and non-inverting amplifiers, buffer amplifier, summing amplifier)
2. Describe the use of an operational amplifier for PWM generation, for triangular and sine wave generation, as a comparator, and its integration into a 555 timer.
3. Explore other basic firing and driving circuits by focusing on requirements and control features such as based on specific power devices and operational amplifier.
Part 3: Analyse the use of uncontrolled and controlled single-phase rectifiers in various electrical power applications.
1. Determine the performance characteristics of uncontrolled single-phase, half-wave and full-wave rectifiers, with resistive and inductive loads.
2. Determine the performance characteristics of controlled single-phase, half-wave and full-wave rectifiers with resistive and inductive loads.
3. Determine the change in power factor when using uncontrolled and controlled rectifiers. Define input distortion and displacement factor.
4. Describe how power inversion may be achieved by varying the firing angle in controlled rectifiers.
Part 4: Investigate the DC-to-DC power conversion circuits used in power applications.
1. State the principle of step-down and step-up operations.
2. Explain the DC chopper classification and describe switch-mode regulators
3. Explain the operation of buck, boost
4. Explain the operation buck-boost regulators.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru