History : Why drive on the left ?

<p>
  The papal system prevailed until the late 1700s, when teamsters in the United States and France began hauling farm products in big wagons pulled by several pairs of horses. These wagons had no driver&#8217;s seat. Instead the driver sat on the left rear horse, so he could keep his right arm free to lash the team. Since you were sitting on the left, naturally you wanted everybody to pass on the left so you could look down and make sure you kept clear of the other guy&#8217;s wheels. Ergo, you kept to the right side of the road. The first known keep-right law in the U.S. was enacted in Pennsylvania in 1792, and in the ensuing years many states and Canadian provinces followed suit.
</p>

Telepathy. Is it real ?

XP Game hacks

The All-In-One Card

<p>
  AIO card is a thin client. It is like a remote display on a card over wireless. It means all its processing, and storage remains on a powerful server. It uses the same thin client technology found in Sun Rays. It only needs a small processor that does nothing but send the touch and other inputs to a server, and the server sends the display and sound back. Since all the storage is on a server, it gives you virtually unlimited storage for your data, pictures and songs. (unlikes iPods and mp3 players which have a limited memory)
</p>

NewScientist’s top 10 stories of 2005

  1. 13 things that do not make sense

Our most clicked story of 2005. The placebo effect, cold fusion, dark energy, the “wow” signal and bizarre homeopathy results – these were just a few of the mysteries that fascinated you.

  1. Pentagon reveals rejected chemical weapons

The chemical “sex-bomb” designed to make enemy soldiers sexually irresistible to each other, thus destroying an enemy’s morale.

  1. 11 steps to a better brain

Like a personal trainer for the brain, without the strain. We expect the IQ of our readers to be much greater now than at the start of 2005.

  1. US military sets laser PHASRs to stun

The PHASR is an impressive looking beast, larger than Captain Kirk’s trusted phaser, but the risk of blinding innocent bystanders shrouded this prototype weapon in controversy.

  1. Details of US microwave-weapon tests revealed

The US military raised temperatures further in 2005 by trying their new microwave weapons on a test crowd – with mixed results.

  1. Failing ocean current raises fears of mini ice age

In a year dominated by climate-change fear and greenhouse gas emissions targets, the news of a 30% reduction in the warm currents that carry water north from the Gulf Stream sounded a loud note of alarm.

  1. Antarctic ice sheet is an ‘awakened giant’

A slumbering giant, the massive west Antarctic ice sheet, previously assumed to be stable, started to collapse noticeably in 2005, adding extra heat to the climate debate.

  1. Bionic suit offers wearers super-strength

Many kids dream of growing into a bionic adult, able to perform superhuman deeds. This dream moved one mechanical step closer to reality this year.

  1. Out-of-this-world sex could jeopardise missions

Sex and romantic entanglements among astronauts could derail missions to Mars, said a top-level panel of US researchers. Their recommendation for NASA – more study of the issue.

  1. Centrifugal weapon could deliver stealth firepower

Another weapon, this time a gun that spits out ball bearings after spinning them to extreme speeds – and there’s a video of the beast in action.

— My 2 cents : Do not miss to read each of the stories. All of them are very interesting. After all, they did make it to the top 10 stories of the year !

Link

The Windows XP PC Boot Process

  <td>
    Power supply switched on.
  </td>
  
  <td>
    <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
  </td>
  
  <td>
    The power supply performs a self-test &#8211; When all voltages and current levels are acceptable, the supply indicates that the power is stable and sends the Power Good signal to the processor. The time from switch-on to Power Good is usually between .1 and .5 seconds.
  </td>
</tr>

<tr>
  <td>
    &nbsp;
  </td>
  
  <td align="center">
    <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
  </td>
  
  <td>
    &nbsp;
  </td>
  
  <td>
    &nbsp;
  </td>
</tr>

<tr>
  <td>
    &nbsp;
  </td>
  
  <td>
    The microprocessor timer chip receives the Power Good signal.
  </td>
  
  <td>
    <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
  </td>
  
  <td>
    With the arrival of the Power Good signal the timer chip stops sending reset signals to the processor allowing the CPU to begin operations.
  </td>
</tr>

<tr>
  <td>
    &nbsp;
  </td>
  
  <td align="center">
    <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
  </td>
  
  <td>
    &nbsp;
  </td>
  
  <td>
    &nbsp;
  </td>
</tr>

<tr>
  <td>
    &nbsp;
  </td>
  
  <td>
    The CPU starts executing the ROM BIOS code.
  </td>
  
  <td>
    <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
  </td>
  
  <td>
    The CPU loads the ROM BIOS starting at ROM memory address FFFF:0000 which is only 16 bytes from the top of ROM memory. As such it contains only a JMP (jump) instruction that points to the actual address of the ROM BIOS code.
  </td>
</tr>

<tr>
  <td>
    &nbsp;
  </td>
  
  <td align="center">
    <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
  </td>
  
  <td>
    &nbsp;
  </td>
  
  <td>
    &nbsp;
  </td>
</tr>

<tr>
  <td>
    &nbsp;
  </td>
  
  <td>
    The ROM BIOS performs a basic test of central hardware to verify basic functionality.
  </td>
  
  <td>
    <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
  </td>
  
  <td>
    Any errors that occur at this point in the boot process will be reported by means of &#8216;beep-codes&#8217; because the video subsystem has not yet been initialized.
  </td>
</tr>

<tr>
  <td>
    &nbsp;
  </td>
  
  <td align="center">
    <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
  </td>
  
  <td>
    &nbsp;
  </td>
  
  <td>
    &nbsp;
  </td>
</tr>

<tr>
  <td>
    &nbsp;
  </td>
  
  <td>
    The BIOS searches for adapters that may need to load their own ROM BIOS routines.
  </td>
  
  <td>
    <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
  </td>
  
  <td>
    Video adapters provide the most common source of adapter ROM BIOS. The start-up BIOS routines scan memory addresses C000:0000 through C780:0000 to find video ROM. An error loading any adapter ROM generates an error such as:</p> 
    
    <p>
      XXXX ROM Error
    </p>
    
    <p>
      where XXXX represents the segment address of the failed module.</td> </tr> 
      
      <tr>
        <td>
          &nbsp;
        </td>
        
        <td align="center">
          <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
        </td>
        
        <td>
          &nbsp;
        </td>
        
        <td>
          &nbsp;
        </td>
      </tr>
      
      <tr>
        <td>
          &nbsp;
        </td>
        
        <td>
          The ROM BIOS checks to see if this is a &#8216;cold-start&#8217; or a &#8216;warm-start&#8217;
        </td>
        
        <td>
          <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
        </td>
        
        <td>
          To determine whether this is a warm-start or a cold start the ROM BIOS startup routines check the value of two bytes located at memory location 0000:0472. Any value other than 1234h indicates that this is a cold-start.
        </td>
      </tr>
      
      <tr>
        <td>
          &nbsp;
        </td>
        
        <td align="center">
          <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
        </td>
        
        <td>
          &nbsp;
        </td>
        
        <td>
          &nbsp;
        </td>
      </tr>
      
      <tr>
        <td>
          &nbsp;
        </td>
        
        <td>
          If this is a cold-start the ROM BIOS executes a full POST (Power On Self Test). If this is a warm-start the memory test portion of the POST is switched off.
        </td>
        
        <td>
          <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
        </td>
        
        <td>
          The POST can be broken down into three components:<br /> The Video Test initializes the video adapter, tests the video card and video memory, and displays configuration information or any errors.<br /> The BIOS Identification displays the BIOS version, manufacturer, and date. The Memory Test tests the memory chips and displays a running sum of installed memory.
        </td>
      </tr>
      
      <tr>
        <td>
          &nbsp;
        </td>
        
        <td align="center">
          <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
        </td>
        
        <td>
          &nbsp;
        </td>
        
        <td>
          Errors the occur during the POST can be classified as either &#8216;fatal&#8217; or &#8216;non-fatal&#8217;. A non-fatal error will typically display an error message on screen and allow the system to continue the boot process. A fatal error, on the other hand, stops the process of booting the computer and is generally signaled by a series of beep-codes.
        </td>
      </tr>
      
      <tr>
        <td>
          &nbsp;
        </td>
        
        <td>
          The BIOS locates and reads the configuration information stored in CMOS.
        </td>
        
        <td>
          <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
        </td>
        
        <td>
          CMOS (which stands for Complementary Metal-Oxide Semiconductor) is a small area of memory (64 bytes) which is maintained by the current of a small battery attached to the motherboard. Most importantly for the ROM BIOS startup routines CMOS indicates the order in which drives should be examined for an operating systems &#8211; floppy first, CD-Rom first, or fixed disk first.
        </td>
      </tr>
      
      <tr>
        <td>
          <strong>Fixed Disk</strong>
        </td>
        
        <td align="center">
          <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
        </td>
        
        <td>
          &nbsp;
        </td>
        
        <td>
          &nbsp;
        </td>
      </tr>
      
      <tr>
        <td>
          &nbsp;
        </td>
        
        <td>
          If the first bootable disk is a fixed disk the BIOS examines the very first sector of the disk for a Master Boot Record (MBR). For a floppy the BIOS looks for a Boot Record in the very first sector.
        </td>
        
        <td>
          <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
        </td>
        
        <td>
          On a fixed disk the Master Boot Record occupies the very first sector at cylinder 0, head 0, sector 1. It is 512 bytes in size. If this sector is found it is loaded into memory at address 0000:7C00 and tested for a valid signature. A valid signature would be the value 55AAh in the last two bytes. Lacking an MBR or a valid signature the boot process halts with an error message which might read:</p> 
          
          <p>
            NO ROM BASIC &#8211; SYSTEM HALTED
          </p>
          
          <p>
            A Master Boot Record is made up of two parts &#8211; the partition table which describes the layout of the fixed disk and the partition loader code which includes instructions for continuing the boot process.</td> </tr> 
            
            <tr>
              <td>
                &nbsp;
              </td>
              
              <td align="center">
                <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
              </td>
              
              <td>
                &nbsp;
              </td>
              
              <td>
                &nbsp;
              </td>
            </tr>
            
            <tr>
              <td>
                <strong>MBR</strong>
              </td>
              
              <td>
                With a valid MBR loaded into memory the BIOS transfers control of the boot process to the partition loader code that takes up most of the 512 bytes of the MBR.
              </td>
              
              <td>
                <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
              </td>
              
              <td>
                The process of installing multiple operating systems on a single PC usually involves replacing the original partition loader code with a Boot Loader program that allows the user to select the specific fixed disk to load in the next step of the process
              </td>
            </tr>
            
            <tr>
              <td>
                &nbsp;
              </td>
              
              <td align="center">
                <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
              </td>
              
              <td>
                &nbsp;
              </td>
              
              <td>
                &nbsp;
              </td>
            </tr>
            
            <tr>
              <td>
                <strong>Partition Table</strong>
              </td>
              
              <td>
                The partition loader (or Boot Loader) examines the partition table for a partition marked as active. The partition loader then searches the very first sector of that partition for a Boot Record.
              </td>
              
              <td>
                <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
              </td>
              
              <td>
                The Boot Record is also 512 bytes and contains a table that describes the characteristics of the partition (number of bytes per sectors, number of sectors per cluster, etc.) and also the jump code that locates the first of the operating system files (IO.SYS in DOS).
              </td>
            </tr>
            
            <tr>
              <td>
                <strong>Operating System</strong>
              </td>
              
              <td align="center">
                <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
              </td>
              
              <td>
                &nbsp;
              </td>
              
              <td>
                &nbsp;
              </td>
            </tr>
            
            <tr>
              <td>
                <strong>Boot Record</strong>
              </td>
              
              <td>
                The active partition&#8217;s boot record is checked for a valid boot signature and if found the boot sector code is executed as a program.
              </td>
              
              <td>
                <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
              </td>
              
              <td>
                The loading of Windows XP is controlled by the file NTLDR which is a hidden, system file that resides in the root directory of the system partition. NTLDR will load XP in four stages:</p> 
                
                <p>
                  1) Initial Boot Loader Phase<br /> 2) Operating System selection<br /> 3) Hardware Detection<br /> 4) Configuration Selection</td> </tr> 
                  
                  <tr>
                    <td>
                      &nbsp;
                    </td>
                    
                    <td align="center">
                      <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      <strong>NTLDR<br /> Initial Phase</strong>
                    </td>
                    
                    <td>
                      During the initial phase NTLDR switches the processor from real-mode to protected mode which places the processor in 32-bit memory mode and turns memory paging on. It then loads the appropriate mini-file system drivers to allow NTLDR to load files from a partition formatted with any of the files systems supported by XP.
                    </td>
                    
                    <td>
                      <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      Windows XP supports partitions formatted with either the FAT-16, FAT-32, or NTFS file system.
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      &nbsp;
                    </td>
                    
                    <td align="center">
                      <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      <strong>NTLDR<br /> OS Selection<br /> BOOT.INI</strong>
                    </td>
                    
                    <td>
                      If the file BOOT.INI is located in the root directory NTLDR will read it&#8217;s contents into<br /> memory. If BOOT.INI contains entries for more than one operating system NTLDR will stop the boot sequence at this point, display a menu of choices, and wait for a specified period of time for the user to make a selection.
                    </td>
                    
                    <td>
                      <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      If the file BOOT.INI is not found in the root directory NTLDR will continue the boot<br /> sequence and attempt to load XP from the first partition of the first disk, typically C:.
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      &nbsp;
                    </td>
                    
                    <td align="center">
                      <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      <strong>F8</strong>
                    </td>
                    
                    <td>
                      Assuming that the operating system being loaded is Windows NT, 2000, or XP pressing F8 at this stage of the boot sequence to display various boot options including &#8220;Safe Mode&#8221; and &#8220;Last Known Good Configuration&#8221;
                    </td>
                    
                    <td>
                      <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      After each successful boot sequence XP makes a copy of the current combination of driver and system settings and stores it as the Last Known Good Configuration. This collection of settings can be used to boot the system subsequently if the installation of some new device has caused a boot failure.
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      &nbsp;
                    </td>
                    
                    <td align="center">
                      <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      <strong>NTLDR<br /> Hardware Detection</strong>
                    </td>
                    
                    <td>
                      If the selected operating system is XP, NTLDR will continue the boot process by locating and loading the DOS based NTDETECT.COM program to perform hardware detection.
                    </td>
                    
                    <td>
                      <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      NTDETECT.COM collects a list of currently installed hardware components and returns this list for later inclusion in the registry under the HKEY_LOCAL_MACHINEHARDWARE key.
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      &nbsp;
                    </td>
                    
                    <td align="center">
                      <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      <strong>NTLDR<br /> Configuration Selection</strong>
                    </td>
                    
                    <td>
                      If this computer has<br /> more than one defined Hardware Profile the NTLDR program will stop at<br /> this point and display the Hardware Profiles/Configuration Recovery<br /> menu.
                    </td>
                    
                    <td>
                      <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      Lacking more than one Hardware Profile NTLDR will skip this step and not display this menu.
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      &nbsp;
                    </td>
                    
                    <td align="center">
                      <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      <strong>Kernel Load</strong>
                    </td>
                    
                    <td>
                      After selecting a hardware configuration (if necessary) NTLDR begins loading the XP kernel (NTOSKRNL.EXE).
                    </td>
                    
                    <td>
                      <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      During the loading of the kernel (but before it is initialized) NTLDR remains in control of the computer. The screen is cleared and a series of white rectangles progress across the bottom of the screen. NTLDR also loads the Hardware Abstraction Layer (HAL.DLL) at this time which will insulate the kernel from hardware. Both files are located in the system32 directory.
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      &nbsp;
                    </td>
                    
                    <td align="center">
                      <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      <strong>NTLDR<br /> Boot<br /> Device Drivers</strong>
                    </td>
                    
                    <td>
                      NTLDR now loads device drivers that are marked as boot devices. With the loading of these drivers NTLDR relinquishes control of the computer.
                    </td>
                    
                    <td>
                      <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      Every driver has a registry subkey entry under HKEY_LOCAL_MACHINE<br /> SYSTEMServices. Any driver that has a Start value of SERVICE_BOOT_START is considered a device to start at boot up. A period is printed to the screen for each loaded file (unless the /SOS switch is used in which case file names are printed.
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      &nbsp;
                    </td>
                    
                    <td align="center">
                      <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                    
                    <td>
                      &nbsp;
                    </td>
                  </tr>
                  
                  <tr>
                    <td>
                      <strong>Kernel Initialization</strong>
                    </td>
                    
                    <td>
                      NTOSKRNL goes through two phases in its boot process &#8211; phase 0 and phase 1. Phase 0 initializes just enough of the microkernel and Executive subsystems so that basic services required for the completion of initialization become available.. At this point, the system display a graphical screen with a status bar indicating load status.
                    </td>
                    
                    <td>
                      <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                    </td>
                    
                    <td>
                      XP disables interrupts during phase 0 and enables them before phase 1. The HAL is called to prepare the interrupt controller; the Memory Manager, Object Manager, Security Reference Monitor, and Process Manager are initialized.</p> 
                      
                      <p>
                        Phase 1 begins when the HAL is called to prepare the system to accept interrupts from devices. If more than one processor is present the additional processors are initialized at this point. All Executive subsystems are reinitialized in the following order:
                      </p>
                      
                      <p>
                        1) Object Manager<br /> 2) Executive<br /> 3) Microkernel<br /> 4) Security Reference Monitor<br /> 5) Memory Manager<br /> 6) Cache Manager<br /> 7) LPCS<br /> 8) I/O Manager<br /> 9) Process Manager</td> </tr> 
                        
                        <tr>
                          <td>
                            &nbsp;
                          </td>
                          
                          <td align="center">
                            <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                          </td>
                          
                          <td>
                            &nbsp;
                          </td>
                          
                          <td>
                            &nbsp;
                          </td>
                        </tr>
                        
                        <tr>
                          <td>
                            <strong>I/O Manager</strong>
                          </td>
                          
                          <td>
                            The initialization of I/O Manager begins the process of loading all the systems driver files. Picking up where NTLDR left off, it first finishes the loading of boot<br /> devices. Next it assembles a prioritized list of drivers and attempts to load each in turn.
                          </td>
                          
                          <td>
                            <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                          </td>
                          
                          <td>
                            The failure of a driver to load may prompt NT to reboot and try to start the system using the values stored in the Last Known Good Configuration.
                          </td>
                        </tr>
                        
                        <tr>
                          <td>
                            &nbsp;
                          </td>
                          
                          <td align="center">
                            <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                          </td>
                          
                          <td>
                            &nbsp;
                          </td>
                          
                          <td>
                            &nbsp;
                          </td>
                        </tr>
                        
                        <tr>
                          <td>
                            <strong>SMSS</strong>
                          </td>
                          
                          <td>
                            The last task for phase 1 initialization of the kernel is to launch the Session Manager Subsystem (SMSS). SMSS is responsible for creating the user-mode environment that provides the visible interface to NT.
                          </td>
                          
                          <td>
                            <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                          </td>
                          
                          <td>
                            SMSS runs in user-mode but unlike other user-mode applications SMSS is considered a trusted part of the operating system and is also a native application (it uses only core Executive functions). These two features allow SMSS to start the graphics subsystem and login processes.
                          </td>
                        </tr>
                        
                        <tr>
                          <td>
                            &nbsp;
                          </td>
                          
                          <td align="center">
                            <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                          </td>
                          
                          <td>
                            &nbsp;
                          </td>
                          
                          <td>
                            &nbsp;
                          </td>
                        </tr>
                        
                        <tr>
                          <td>
                            <strong>win32k.sys</strong>
                          </td>
                          
                          <td>
                            SMSS loads the win32k.sys device driver which implements the Win32 graphics subsystem.
                          </td>
                          
                          <td>
                            <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                          </td>
                          
                          <td>
                            Shortly after win32k.sys starts it switches the screen into graphics mode. The Services Subsystem now starts all services mark as Auto Start. Once all devices and services are started the boot is deemed successful and this configuration is saved as the Last Known Good Configuration.
                          </td>
                        </tr>
                        
                        <tr>
                          <td>
                            &nbsp;
                          </td>
                          
                          <td align="center">
                            <img loading="lazy" src="https://i1.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/darrow.gif?resize=16%2C16" alt="darrow" title="darrow" width="16" height="16" class="aligncenter size-full wp-image-876" data-recalc-dims="1" />
                          </td>
                          
                          <td>
                            &nbsp;
                          </td>
                          
                          <td>
                            &nbsp;
                          </td>
                        </tr>
                        
                        <tr>
                          <td>
                            <strong>Logon</strong>
                          </td>
                          
                          <td>
                            The XP boot process is not considered complete until a user has successfully logged onto the system. The process is begun by the WINLOGON.EXE file which is loaded as a service by the kernel and continued by the Local Security Authority (LSASS.EXE) which displays the logon dialog box.
                          </td>
                          
                          <td>
                            <img loading="lazy" src="https://i0.wp.com/chaoticneutron.com/blog/wp-content/uploads/2005/12/rarrow.gif?resize=16%2C16" alt="rarrow" title="rarrow" width="16" height="16" class="aligncenter size-full wp-image-874" data-recalc-dims="1" />
                          </td>
                          
                          <td>
                            This dialog box appears at approximately the time that the Services Subsystem starts the network service.
                          </td>
                        </tr></table> </div> 
                        
                        <p>
                        </p>

Choosing good passwords

<p>
  Remember security starts at the keyboard in front of you:
</p>

<p>
  A 6 character password has about fifty six billion (56,800,235,584) possibilities and the average computer (the G5 is even faster) can try all combinations (crack them) in 2.5 hours.
</p>

<p>
  A 7 character password has about three and a half trillion (3,521,614,606,208) possibilities and a computer can try all combinations in about 1 week.
</p>

<p>
  An 8 character password has about two hundred trillion (218,340,105,584,896) possibilities and a computer can try all its combinations in about a year.
</p>

<p>
  A 9 character password would take about 70 years for a computer to try all combinations.
</p>

<p>
  They say the chips coming in about a year could half these times! Now if you do not want to wait for next year&#8217;s chip, you can always put 2 computers in parallel and half the time. In theory you could put 365 computers in parallel and break 8 character passwords in just over a day (Virginia Tech just put 1100 G5s in parallel). Do you think hackers have friends?
</p>

<p>
  Computers have a lot more time on their hands than we do and most of the bad guys don&#8217;t have jobs. The next person asking for your social security number could be just a few clicks away from your stock options.
</p>

<p>
  If you just got a chill down your back or just got a little paranoid; good, my work is done.
</p>

<p>
  Use an 8 character password (9 characters is better)&#8230; You would make this security professional very happy if you would change your passwords after you read this e-mail : )
</p>

Logic and math riddles

<p>
  The king sits in his central room and the n prisoners are all locked in their sound proof cells. In the king&#8217;s central chamber is a table with a single chalice sitting atop it. Now, the king opens up a door to one of the prisoners&#8217; rooms and lets him into the room, but always only one prisoner at a time! So he lets in just one of the prisoners, any one he chooses, and then asks him a question, &#8220;Since I first locked you and the other prisoners into your rooms, have all of you been in this room yet?&#8221; The prisoner only has two possible answers. &#8220;Yes,&#8221; or, &#8220;I&#8217;m not sure.&#8221; If any prisoner answers &#8220;yes&#8221; but is wrong, they all will be beheaded. If a prisoner answers &#8220;yes,&#8221; however, and is correct, all prisoners are granted full pardons and freed. After being asked that question and answering, the prisoner is then given an opportunity to turn the chalice upside down or right side up. If when he enters the room it is right side up, he can choose to leave it right side up or to turn it upside down, it&#8217;s his choice. The same thing goes for if it is upside down when he enters the room. He can either choose to turn it upright or to leave it upside down. After the prisoner manipulates the chalice (or not, by his choice), he is sent back to his own cell and securely locked in.
</p>

<p>
  The king will call the prisoners in any order he pleases, and he can call and recall each prisoner as many times as he wants, as many times in a row as he wants. The only rule the king has to obey is that eventually he has to call every prisoner in an arbitrary number of times. So maybe he will call the first prisoner in a million times before ever calling in the second prisoner twice, we just don&#8217;t know. But eventually we may be certain that each prisoner will be called in ten times, or twenty times, or any number you choose.
</p>

<p>
  Here&#8217;s one last monkey wrench to toss in the gears, though. The king is allowed to manipulate the cup himself, k times, out of the view of any of the prisoners. That means the king may turn an upright cup upside down or vice versa up to k times, as he chooses, without the prisoners knowing about it. This does not mean the king must manipulate the cup any number of times at all, only that he may.
</p>
<p>
</p>

4D Cube

A very interesting, perspective invoking picture of a 4D cube. Well ironically, its name is still a Cube in 4D.

Here’s a 4-D visualization of the cube in a raytraced Povray version of the picture.

Check out this site for more interesting trivia, facts and pictures related to math !

Star Wars – ASCIIfied

<center>
  <br /><img src="/blog/wp-images/StarWarsASCII.jpg" /><br />
</center>

<br />Good old ASCII never ceases to surprise !
<p>
</p>