Archive for the ‘Tech-Talk’ Category

Sculptures of electronics are embedded into our lives(both known and unknown to us). Electronics has fascinated everyone; even the illiterate! Hobby electronics is a fun to some people (like me) and so much of them out there are still typing in Google “getting started in electronics”. So, below I produce a synopsis for giving a “kick” in hobby electronics.

What are the things you require?

-Some money (Of course)

Hmm yes you read it correctly and there are only three requisites in getting started with electronics!

First comes interest. I hope that you have interest towards electronics, else you wouldn’t have came reading this far 🙂 . Never get discouraged when anything gets messy and gets spoiled. Always hope that you can fix anything that you’ve messed with. Playing with electrons is a fun and imagine that you are playing with an invisible partner! There are many definitions for electronics around the web. But the rule of thumb is that, in electronics, you instruct the electrons what to do and how to do…that’s it.. its very simple, is it not?

Of course, spare some time for it. Never try any project in a hurry and spend a ample time for your project to get it running. And money comes third. Nowadays, electronic components are cheaper that anyone can easily afford to buy the bare minimum things to get started! Alternative ways are simulating the circuits designed by you in any of the software available out there.

Getting started:

I know you are now asking where to get started.
Sincerely, you don’t need a much knowledge to become a hobbyist in electronics! Of course, the geniuses in electronics are once amateur hobbyists. Simply saying, all you have to do is try out lots of circuits out there. So, go ahead and get some working circuits. For example, here you will get enough circuits to get yourself started and moving. And also you can consider A simple trick is, when you search Google images for any circuit, it return s many versions of the circuits from many websites. Circuitstoday offers a excellent support in answering your queries. Get a simple circuit form these websites and list out the components needed, then go out and buy them in a radio house or electronics shop, and try out the circuits. Always it is better that you first try it on a solder-less breadboard. And if the circuit is really useful or you like it, then go ahead and solder it in a general purpose perforated board or a strip board. If you don’t like going out and buying components, there are many websites selling electronic components online. But you have to pay for the shipping too.

Then after trying some circuits and all those soldering stuff, try etching your own PCB. There are many tutorials online teaching how to make your own PCB,and making your own circuits… May be they wont work for the first time. But keep trying and join any forum such as edaboard or circuitstoday, people out there will help you build circuits. Then catchup with micro-controllers and advanced electronics. Good Luck!

Resources for basics and getting started:

Book: “Fundamentals of Electrical Engineering and Electronics” by B.L.Thereja
Book: “Practical Electronics for Inventors” by Paul Scherz
Online components store:
Online components store:

What is RAID:

RAID stands for Redundant Array of Independant Disks previously known to be Redundant Array of Inexpensive Disks. First to explain RAID – what is it and what is it used for, let me clear you what does physical and logical drives in a computer system means.

A physical drive signifies the hard disk inside the computer cabinet. The physical part of the computer. It may be one or two in number.i.e., the physical drive is the real one as you see it inside the computer as a part of it.

In contrast, a logical drive is that which is a virtual representation of your physical drive. It is the drive(s), as seen by the operating system of your computer system.

An example might clear the cloudy thoughts about the physical and logical stuff concerning drives. Consider an  example, of a laptop, it has only one hard disk inside it, but when you partition it, such as C:, D: etc., now, the original drive inside the laptop is the physical disk and the C:, D: are called logical disks. I mean if you have four partitions, and one hard disk, you have one physical disk, which is divided into four logical disk… Now i think it will be clear that the logical disk is nothing but the physical disk as seen by the operating system.

Comming to RAID, it is the technology used to deploy the hard disks for increased storage and or or redundancy. Here R signifies redundant which means backup or duplicating. Here in RAID, we use two or more physical drives, and use RAID configuration to make the operating system believe that there is only one hard disk.(i.e., logical drive) many configurations are available in RAID such as RAID 0, RAID 1, RAID 2, RAID 3, RAID 5 etc… let me introduce RAID 0 and RAID 1 which will suffice the basic knowledge to RAID.. if you want more info on RAID, head to wikipedia and google is also there to help you.


In this configuration, two hard disks are used. Here, data is split and written on both harddisks simultaneously. i.e., for example, take a file, if it is split up into 4 parts A,B,C and D, A and C go on one hard disk and B and D go in other hard disk. As data is written paralley, great speed is achieved. If it is to be stored on a normal hard disk(written in serial fashion), the data takes 4 seconds to record( assuming that each part takes one second to be written[though its fairly a too large time]). But in RAID 0 configuration of two disks, it takes only 2 seconds.. wow, how fast!. The advantages are fast and inexpensive. But the disadvantages are its not reliable.. because, if one hard disk fails, then total data is useless and lost. RAID 0 is illustrated below.


Here, same as RAID 0, two hard disks are used. But instead of splitting and recording the data, the same data is written twice in the two hard disks i.e., one hard disk is exact duplicate of the original one. This provides redundancy, i.e., when one hard disk fails, no data is lost and thus data saftey is provided. The advantages here is mainly redundancy.. it is safe i.e, you wont loose your data till atleat one of the hard disk is alive and runnig up fine. The main disadvantage is the very slow writing speed coz, the data is written two times,and also cost of the drive matters. The below pic gives a clear view of RAID 1 config

Playing with images has fascinated everyone from professional photographers to a noob.
Now I will share some of the stuff I know in creating a photographic mosaic images using software called Andrea Mosaic (thanks to the developer)

Features of Andrea Mosaic:
1. Flexible options
2. Great UI
3. Ease of use
4. Its free

Download it from here.

Now I will explain you to create a basic photographic mosaic in few easy steps…

Step 1:
Download and install the software from the above link provided.

Step 2:
Open Andrea Mosaic and the application window.
Every option is self explanatory when you move your cursor over it and wait like shown below.

Now pass your cursor on to everything to view detail of each of the options.

Step 3:
Time for some fun!!!
Now you have to select the tiles (small images used to make the big one) Click the “select tile” option button and it opens a tile select window, in that click the add folder window and select the folder containing images for your tiles…

And then,

And now add the folder containing the images(the smaller ones to incorporate into the bigger one).

Step 4:
Save the tile by clicking the “save archive” button, now your tile will be saved by default name or any name you choose. Saving the archive is similar to saving a playlist for media players.

Step 5:
Now add the original image to be processed by clicking the “+” symbol button at the top of the window space. After adding, the image appears in the workspace provided with some grid lines as shown below…

Step 6:
You are almost done!!
Now, you can customize the image appearance..
Set Size parameters and tile duplication options (options are self explanatory when cursor is moved over).
Here “tile size” determines how many tiles to fit in to the image… Don’t worry if you have less amount of tile images, you can select the duplicate option to duplicate and fit the tiles to the size which you specify.
Under “color change” option, you can set the percentage of the color to which the tile should change with respect to the image to be processed (i.e.), The more percentage you set, the more the tiles are converted to the color of the image to be processed, The less percentage you set, the more the originality of the tile is kept.
The tradeoff between low and high percentage is the tile clarity and the final image mosaic clarity respectively.
The tile variants option lets you modify the alignment and orientation of the tiles within the image to be processed.
Finally, the “mosaic information” lists the information and customization of the work ready to be processed.

Step 7:
Now click the “more options” button to open the extra options to adjust image quality, output file format, save locations, setting borders etcetera. You can modify any setting or simply leave it to the default setting.

Step 8:
Now click the create mosaic option and wait….
Blimey!!!!! The image is ready…

This image is set with A4 mosaic size with 10000 tiles and a color change of 70%

Note: 1. To process a image with the same tile, create at least 30 duplicates of the tile in a folder and save it as an archive.
2. Use only JPEG images

Comments are welcome….

[Credits to the developer of the software]

Survival of the "Bit"test

Posted: January 23, 2011 in Tech-Talk, torrents
Working of torrents explained

Unlike HTTP (Hyper Text Transfer Protocol) downloads, the torrent files are downloaded by a peer-to-peer file sharing network. You may came across the terms like leecher, seed, peer, tracker etcetera while dealing with torrents… You may wonder what the hell these terms mean[I did!!!]. There are many web resources explaining this in detail but not all of them are convenient for the master inside your cranium to understand…here I prepared my best to explain each term concerning torrents and how they work. Let us start…. (Assuming you know basic surfing stuff)

Our conventional downloads are by HTTP (Hyper Text Transfer Protocol) or FTP (File Transfer Protocol). Here there will be a central server from which a connection is established through a series of routers and switches by any shortest path algorithm. For example consider that you are downloading Google earth, your browser sends request to Google server located in the USA. The Google server responds by setting up connection to your computer and sends the file to your computer through the wireless and wired connection through routers and switches as said above…

Now let us tear into torrents to examine them…

First of all let us see what is peer-to-peer sharing… the method used to download torrent files. Peer-to-peer sharing connects your computer into a network of computers that are connected together and have the file (that you want) completely or a part of it. Now you become one of the computers in that network and can receive file from the computers in that network and other computers connecting to that network can also receive file from you if you have downloaded the file or a part of the file. Here I illustrate how peer-to-peer network looks like….

Now don’t confuse with the connections, but imagine how it is connected…. each and every computer is connected with every computer on the network that contains that file. Here each box represents a computer like yours. In this network each computer is called a peer, hence the name peer-to-peer.

Torrents use this kind of sharing technique to download files.. But how do they implement it… How do you get connected… Who connects and disconnects you from the network… read on…

When you download a torrent file from a torrent search engine or torrent server such as the pirate bay or isohunt, the torrent file(Remember!!!! A torrent file is different from the actual file you want to download. A torrent file is like the index of the actual file you want) is loaded in your torrent downloader program such as utorrent or bitlord. This torrent downloader sends request to the parent server from where the torrent is downloaded… for instance take the pirate bay. Now here thepiratebay server is called the TRACKER. This tracker does the job of finding the network of computers having the file completely or partly… and joins you into that network. The computer having the complete copy of the file you want is called a SEED. The other computers having parts of the file are called PEERS. The computer that disconnects from the network after downloading the file is called a LEECHER. The more the seeds, the faster the download of the file will be. Here the tracker(here does a wonderful job of monitoring the peer-to-peer networks… There will be many such networks on the internet that are monitored by the tracker. The tracker keeps record of the computers on the network and works on the principle of tit for tat!!!!!. That is if you always download a file and never seed… i.e. you are a leecher, or you disconnect from the network after downloading the file and never make let other users to download it from you… the tracker reduces the speed of your download next time you download a file from the tracker.. The more you seed, the faster the downloads will be…

Hope this helps… There are many tweaks in the internet for speeding utorrent… but for me none of them worked… believe me… if you set your upload rate to 10kbps and seed some 4 to 5 files, you can easily get a download speed of 200kbps… for a basic broadband connection.

Here are some nice trackers…

Happy torrent downloads……….

HACKing for noobs

Posted: January 2, 2011 in hacking, Tech-Talk
What is hacking? answer in my perspective:

Everyone who is familiar with the internet would have come across the weird terms HACKER and HACKING.

By the way the term hacker is very much misunderstood by the human community…

In most of their minds, a hacker is a dark bad guy who would steal their passwords, rob their bank accounts or do any sort of displeasing activities to them via online.

The term “hacking” and “hacker” gained much importance among the Homo sapiens only during the computer era. Much of the folks were not aware even such kind of word exists till the computer age.

The literal meaning of the term Hacking goes as,

“Modifying any material from its original form to suit your needs or to please you”

Carefully note the last part of the above mentioned sentence “suit your needs” and “please you”, this confirms that hacking skills varies from individual to individual. It’s the outcome of the extraordinary intelligence and imagination power of humans which are not equally used by everyone.

Surprisingly, hacking has become one of the hottest topics in the world of international network of computers.

Hacking is good.

I am sure that the above lines may disturb some folks. Why the hell hacking is good when the hacker is intended to steal and rob off our accounts?

For the above question, the answer is indeed very simple… it’s all the intentions of our mind.

Those whose intentions are to destroy things with their knowledge were never termed as hackers. They themselves called them hackers and they were actually crackers disrespected by the hacker community.

Hacking is just an art. Using it for bad or good purpose depends on you. I indeed bet that hacking is responsible for the very survival of this modern technology we are enjoying today. Surprising? But this is a damn truth.

Since the term hacking and hackers were widespread as a loathly term, and it meant both good and bad fellows, nowadays, hacking is broadly classified into two divisions namely black hat and white hat hackers. Yes, you may have guessed. Black hat hackers are those men who use their knowledge for destruction, and on the contradiction, white hat hackers are the builders of today’s technology.

Another group has arisen called the grey hat hackers and their intentions are bit of both as stated above. Basically, a grey hat hacker enjoys breaking into a secure system without authorization with no intentions of bad idea, just to show that that any type of security can be breached.

Okay, by the way, I have come across many people who wonder what is hacking and how to hack. When they surf on that topic, most of them are misguided to cracking websites.

As mentioned above hacking is any sort of work that modifies the originality of a thing, a thing means, anything not particularly software. Many people thing that hacking is a term concerned with software.

This is an unacceptable statement. For example a simple hacking is just connecting a potentiometer ( a variable resistor)  to your headset by which you can control its volume. Here in the above example, it is assumed that volume control is not provided in the headset and that you are just “hacking” it by connecting a potentiometer to control the volume.

Here lies the answer to the previously mentioned question “How to hack?”

For this question, let us analyze the above example, just to connect the potentiometer to the headset for volume control, you have to know how to rip of the headset wire, where to connect the potentiometer and how to use the potentiometer (of course) and finally, what is a potentiometer.

Without knowing these details, you cannot modify or “hack” the headset for manual volume adjustment.

Now I think you must be clear about the term hacking. To begin hacking, you must first do the following steps whether it a hardware or software hacking,

  1. Determine the object which you are going to hack. In the above example it’s our headset.

  2. Determine your modification. In our example, we want to make arrangements for manual volume control.

  3. Study the object carefully and know its entire anatomy and working mechanism. In our example, it about knowing where to connect the potentiometer and working mechanism of the headset.

  4. Then apply your modification. In our example, it’s connecting the potentiometer.

From the above steps, it’s very obvious that for hacking, you must have a in-depth and vast knowledge about the thing you want to hack…

Considering this, you must be strong in electronics if you want to be a hardware hacker. And you must be strong in at least 3 programming languages if you want to become one of those weird software hackers.

And finally hats off those hackers such as Steven Paul Jobs, William Henry Gates, Paul Allen and Linus Torvalds, without whom we cannot imaging today’s technology.

So, if you want to hack, first consider learning some basics of the subject that interests you and then happy hacking.