Monday, July 24, 2017

Photography for Beginner : Doing It the Right Way

Once in a while, you may thinking that : "I take picture with my phone and it looks fine, why photographer being paid so much for taking a photo ?"
 
It is obvious that better education and experience, could changes a person's hobby into great masterpiece. 

As a beginner, we could also create our own masterpiece by remembering 5 fundamental things as professional would suggest :



Moment

 

A strong moment is more needed than highlighting a particular subject because a great piece of photograph, is the one who tells a story.

Not every photo will be able to have special moments where all the parts come together perfectly, but again we should be thinking about this when shooting so we can try to include more elements that create a stronger moment.

If we are capturing living subject such as people, it is important to blend in, make them get used to you, and then keep a distance while letting them get back to their work.
Creating a moment in a photograph should be about having all the elements in a frame come together as to tell a captivating story.


Light

 

Light considered as the very fundamental element of all photographs. To get the best quality photographs, first we need to decide the angle of light. 

The angle of light refers to the location of the original source of light in the photograph and determines the distribution of shadows in the photograph. 

After that, we need to adjust the level of light needed because if the camera is exposed to a high level of light, shaded areas will seem darker.

Natural light mixes with smoke in the image below will create a number of highlights and shadows which results in giving some depth and texture to the photo.

Color

 

Like light, color helps to set the mood of an image and can play a significant role in touching the viewer on an emotional level.

Color is one of the main factors responsible for making a photo feel mysterious, exciting, sad, or gloomy. By using appropriate colors in our images we can better convey different emotions and make a stronger impact on the viewer.

For example : a blue sky color will gives a peaceful, tranquil feeling that we wanted to let our viewers feel.


Composition

 

In essence, composition is about how you arrange an objects in your frame in such a way, to emphasize the parts you want to, and make them stand out in a particular way.

The most widely recognized of these is the "Rule of thirds". Rule of thirds involves dividing the rectangular frame using two imaginary vertical lines and two imaginary horizontal lines, so it will become nine-equality sized sections.

After that, the photographer tries to align the main objects of the photograph along the lines or at their points of intersection. This is believed to create a balanced and aesthetically pleasing composition.


Vantage Point

 

The vantage point is the position from which the photograph was taken, to create point of view of the viewer of the photograph. 

Different vantage points can convey different relationships with the objects depicted in the photograph :
  • Viewed from a low vantage point looking up at an object conveys dominance, power and authority.
  • Viewing from a level vantage point conveys neutrality and objectivity.
  • A vantage point above and looking down on the object suggests vulnerability and weakness.
A vantage point is closely related to distance, which distance will determine what focal length you need to shoot at in order to get all of the important parts of the photo into the frame.

The selection of distance will decide how final image looks.

 
By being close to the subject it gives the sense that the viewer is also on the boat and in the scene with the wild seal. 



 


By using a longer lens we get the feeling that we are on the outside of the frame looking in.











Citation :

https://www.lightstalking.com/5-fundamental-elements-of-great-photographs/
https://www.techwalla.com/articles/7-basic-elements-of-photography

Monday, September 7, 2015

Gateway

A gateway acts as a portal between two programs allowing them to share information by communicating between protocols on a computer or between dissimilar computers.

In enterprises, the gateway node often acts as a proxy server and a firewall. The gateway is also associated with both a router, which use headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway.

Types of gateways :
  1. LAN Gateways. LAN gateways are used when joining networks that use different protocols, such as when a backbone network provides an interconnection for all the networks attached to it.
  2. Electronic Mail Gateways. Electronic mail gateways translate messages from one vendor's messaging application to another's so that users with different e-mail applications can share messages over a network.
  3. Firewall. A firewall is a device that allows internal network users to access the Internet while blocking Internet users from accessing the internal network. A full-featured firewall provides advanced screening, authentication, and proxy services to keep hackers and attackers from reaching vulnerable internal systems.
  4. Proxy service. With a proxy service, the packet generated by an internal user never goes out over the Internet. Instead, the proxy service reads the packet and creates its own to send out over the network. Incoming packets are handled in the same way. They are never allowed through the proxy server as is.
  5. NAT (Network Address Translation). An NAT translates between internal and external IP addresses because internal network may have its own internal IP addressing scheme that does not comply with the Internet addressing scheme or is hidden for security reasons.
  6. Caching services. caches information that users have obtained from the Internet or external networks and keeps it available in case other users need that same information.
  7. Voice/Media Gateways. Voice is a streaming technology, while data is typically packetized. Media gateways, which are part of the softswitch architecture, provide an interface between the circuit-based PSTN and the packet-based Internet.

Friday, December 31, 2010

Caution ! Personal Shield Pro dreading your computer !!


Personal shield pro is a malicious application which claiming to be an antivirus program. Most of the time, computers are infected when you are presented with a fake security warning that indicate your computer suddenly infected by viruses,spyware, or other malicious software from nowhere and then, they asked to install free malware removal tool to remove the virus.

And once you installed it, personal shield pro pretends to scan your computer for viruses and displays fake security alerts to make you think that your computer is infected. The false positive and fake security alerts are primary method used to compromised computer to purchase that rogue product. Also, this product will significantly slow your computer performance, change your background image, and download additional malware to your computer.

Personal Shield Pro will blocks certain application on your computer, usually : task manager,registry editor, system utilities, and legitimate anti-malware software.

If your computer already infected, follow the removal guide steps :
  1. Reboot your computer, and press "F8 key" until it brings you to the menu which offer "Run in Safe Mode"
  2. After that, find the personal shield pro files with clicking start, run, then type C:\ProgramData\
  3. In that folder you will find a numeric and alphabetic folder with random order. Open that folder, and you wil find the personal shield pro icon with ".exe" format. Rename the program inside the folder with ".vir' in the back, example : psp.vir.
    Then, Reboot your computer and go to the normal windows.
  4. Then, fix your registry with FreeWindowsRegPair
  5. Open your browser and download SuperAntiSpyware
    *) If the personal shield pro blocks your SuperAntiSpyware, rename it to winlogn.exe / iexplore.exe
  6. Run a FULL COMPLETE SCAN

Saturday, December 25, 2010

HDD Scan

       HDD Scan is actually a check tool for your disk. It will scan only the surface, 
but the information gathered may be very useful.
       When launched, the application automatically detects all the hard disks installed on your computer & even USB keys. The commands that can be run for any storage unit on your computer are versification of the disk, checking the reading speed & erase speed.
       These commands can be executed on the whole hard disk or on specific user defined blocks by basically typing in the beginning of LBA (logical block addressing) & an finish location. On the vertical axis the speed reached by the tool is represented while on the horizontal there is the LBA (logical block address).The user can also specify the block size for faster processing of the whole disk. A map of the whole processed disk is displayed in the lower part of the interface. In the right hand HDD Scan shows the number of sectors processed & their speed. These are color coded according to the time it takes to method (from 500ms). Bad sectors on the disk are also displayed.
       Cautious with the erase option as it will delete all the files in the coursework of the check. With USB keys you will be prompted to format them in order to make use of immediately after re-injecting them in to the computer.

The application is known to support IDE/SATA/SCSI hard disk drives, RAID arrays, flash cards, outside hard disks (USB & Firewire). The S.M.A.R.T. attributes include RAW Read Error Rate, Spin Up Time, Start/Stop Count, Reallocation Sector Count, Seek Error Rate, PowerOn Hours Count, Spin Retry, Recalibration Retries, Tool Power Cycle, HDA Temperature, UltraDMA CRC Error Count, Write Error Count, etc. In case you know what these are you can take all the precautions before a catastrophe happens.