Category

General

Category

Poweroff Timer is a windows universal application(UWP) in Microsoft Store written in C#. This application enables you to set a timer to shutdown your PC at a specific time. It makes your power management much easier and more convenient. When you assign the timer, PowerOff Timer will minimize in the system tray and run silently in the background. if you right-click on its icon, the menu that appears will allow you to immediately cancel or…

J-Lock Encryption Tool is a windows application dedicated to securely encrypt your files. The encryption algorithm that is utilized in this software is well know AES. For the most of the security, this application does not store any password (beware that there is no recovery of the file(s) in case you loose you password). For more information please contact us at: apps[at]devcoons.com. The full version of this application is available in Microsoft Store:  https://www.microsoft.com/en-us/store/p/j-lock-encryption/9nddldh0fz1g Below are…

KWP2000/UDS devices are essential tools for anyone who wants to tinker with a vehicle’s onboard computer system. Whether you’ll use yours for chip tuning a hobby-racing vehicle or you need to equip your auto-shop business with better on-board vehicle diagnostics (OBD) programming tools. KWP2000 actually stands for Keyword Protocol 2000, which is the name of a set of communications codes employed by vehicle computers and systems that meet the OBDII regulatory standard. Diagnostic scanners and…

Data Preparation is the core of data science and it is crucial for any data analysis. It involves data cleansing and feature engineering. Usually, this takes 60 to 80 percent of the whole analytical pipeline. However, it is a mandatory task in order to get the best accuracy from machine learning algorithms on your data-sets [1]. The first part of this process is the Data Cleansing is the process of altering data in a given…

In our times, there has been a tremendous evolution of technology that among others has extended human capabilities. One of the latest adapted concepts with a significant impact in various sectors is the Blockchain technology. This term was first coined in 2008 by an individual (or group) under the name of Satoshi Nakamoto in a white-paper entitled Bitcoin: A Peer-To-Peer Electronic Cash System.. This paper represents a decentralized peer-to-peer version of the electronic cash that…

Warnings about bitcoins and other cryptocurrencies are coming from all directions. Concerns about the security of the cryptocurrency have continued to shadow it. Last year, almost 120,000 bitcoin worth around $78m (£58m)were stolen from Hong Kong-based Bitfinex, one of the most popular cryptocurrency exchanges, which resulted in a 20% drop in the value of the currency at the time. Moreover, there is also a high risk of fraud. There is still a good deal of misinformation and lack…

The 3020 CNC router is a popular Chinese machine for a good reason. For around 500EUR, you can have a simple CNC with a rigid all-aluminum frame, three decent stepper motors, and pretty good resolution. However, a major disadvantage of this CNC is the out-of-date electronic parts. The motor controller is using a parallel port which is not available in any new computer(PC). For that reason, it is recommended to upgrade the motor controller to…

In short, the algorithms are trying to accomplish different goals. K-nearest neighbor is a subset of supervised learning classification (or regression) algorithms (it takes a bunch of labeled points and uses them to learn how to label other points). It is supervised because you are trying to classify a point based on the known classification of other points. In contrast, K-means is a subset of unsupervised learning clustering algorithms (it takes a bunch of unlabeled…

In this post we will introduce how to install MiKTeX plus TeXstudio on windows. This is very easy! You simply have to accept just about all the default settings. Step 1: To begin with you have to go to the MikTeX website and navigate at the downloading page. From there you could pick the appropriate installer (32bits or 64bits) based on your system. [ Link ] Step 2: Just start the installation process and accept…

An obfuscation technique (also called Polymorphism) is a way of constructing a malware that make it more difficult to detect. If a malware is hard to detect, it is likely to spread more widely. The following are commonly used obfuscation techniques: Self-Encryption and Self-Decryption. Some viruses can encrypt and decrypt their virus code bodies, concealing them from direct examination. Viruses that employ encryption might use multiple layers of encryption or randomcryptographic keys, which make each instance of the…