Welcome! My name is Daniel Lim Jhao Jian. Here is where I share my experience, knowledge and ideas. You are welcome to leave comments and follow my blog. You are free to copy anything from this blog. Please recommend this blog to your friends.

Wednesday, 16 December 2009

Convert a Casio fx-350MS Calculator into fx-570MS

In secondary school, the scientific calculator usually used by students include Casio fx-350MS and fx-570MS. Casio fx-570MS has more functions than fx-350MS. Students who had bought Casio fx-350MS may regret. However, it is possible to convert a Casio fx-350MS into fx-570MS.

After the conversation, however, not all fx-570MS functions will be available. The keys layout will change, some following fx-350MS, some following fx-570MS and some different from both 350MS and 570MS. You have to test it out by yourself. These are the functions added to the fx-350MS calculator after conversation.

COMP, SD and REG mode: Added CONST and CONV function only. Other fx-570MS functions are still unavailable.
CMPLX and EQN mode: All functions will be available.
BASE-N mode: All functions will be available except some LOGIC functions.
MAT and VCT mode: No function available. Matrix and vector cannot be used.

To convert, follow these steps:

1. Press [MODE] and select 2 (SD).
2. Press 1.
3. Press [M+] eighty-two times until it displays "EditOFF ESC"
4. Select 2 (ESC).
5. Press ^ (REPLAY UP).
6. Press 131313131... until no more numbers could be entered.
7. Press [=] two times. It should display "EditOFF ESC"
8. Press [0] followed by [1]. Note that you must press [0].
9. It should display "1          _". Press [AC].
10. Press [MODE] and you will notice that your calculator has the fx-570MS functions. Well done.

To cancel and return to fx-350MS, just press [ON]. Start over from step 1 to convert again. So if you want to remain in fx-570MS, you can only press [AC].

1. The method above may not work for some older or non-original versions of fx-350MS calculators. For those calculators, you may not be able to press [MODE] at step 10, or the screen may show some strange displays. In that case, it is not possible to convert the 350MS calculator into 570MS.
2. The method above will not work for fx-350ES (Natural Display) calculators.
3. As I stated above, after converting your fx-350MS calculator into fx-570MS, only some but not all fx-570MS functions will be available. Also, the keys layout will change.

Monday, 14 December 2009

The girl that I hate

In school, I have many friends. But do you know that actually I have an enemy too? Yes, I have. I am not going to mention her name, but just to let you know the reason I hate her.

I hated her since I was in primary school in standard two. At that time, there are 49 students in my class. However the seats in my class have 8 columns and 6 rows which in enough for 48 students only. Therefore there is an extra table behind the class. She sat in that table. Then at May, someone transfered to another school. The teacher rearranged the tables in the classroom. She sat beside me. I started to know her at that time.

At first, I am willing to be friend with her. Instead, she always disturb me but she often tell the teachers that I disturb her. The teachers were very unfair. I was always wrong when she made any report about me. But when I make a report about her, she is not wrong. The Chinese teacher punish me without allowing me to explain. The Malay teacher force me to admit by saying she won't tell the principal. While the English teacher says that no one will make a report if I didn't do something.

At standard three, a teacher came to our school to teach us Chinese for three months. During that period, the teacher carried out group activities. I am in the same group with her. She was a bad group member. She wasn't the leader but she always make all decisions for our group. She often thinks I am incooperative and often reports to the teacher. The teacher was also unfair. The teacher don't allow me to make small reports but she can. At last our group got the second last.

However, at standard four and five, we became good friends. This is because we have common friends. She stopped disturbing me and make reports to the teacher. Our houses are also quite close to each other.

At standard six, her mother asked my grandmother to take her home everyday because we were friends and our houses are close. At first I agreed with that and hope our friendship can become better. However, she became a "blackmailer" . She is in the same class as me so she knew exactly what I did in class. She often threaten to report my wrongdoings to my grandparents if I don't follow her instructions. For a few times I was scolded by my grandparents because of her reports. My grandparents believe her very much. Because of that, I began to hate her again.

At form one, she came to the same school as me. I immediately rejected her mother's request to let my grandparents take her home again. In school, a few Chinese students liked to disturb me for no reason. I was often bullied then at last I took revenge by destroying someone's bottle. They were her friends so she reported that to my grandfather. My grandparents did not believe my explaination and scolded me badly.

Since then, she became my enemy until now. I would never friend her again and cannot forgive her. Besides me, many people also hated her because of her attitude.

Saturday, 8 August 2009

Be Alert On The Internet

I am sure most people enjoy surfing the internet. The invention of internet does bring many advantages to us, but it can also be dangerous if you are not careful enough. There are several things that you have to beware of.

1. Malware:
Malware is the short form for 'malicious software'. Malware are softwares that can harm your computer. Malware threats usually infect your computer through infected e-mails, websites, programs, files, pendrives, memory cards and diskettes. There are many different types of malware, different types of malware harms your computer in different ways.
a) Virus: Viruses can damage your computer and destroy files stored in the computer. It can even format your hard drive and cause you unable to start your computer.
b) Spyware: Spywares can spy on what you are doing on your computer and steal personal information. It can even see you through your webcam.
c) Adware: Adwares display unwanted advertisements on your computer. It can ruin the appearance of your computer. The contents of the displayed advertisements are usually inappropriate.
d) Worm: Worms can cause your computer to have problems. It can cause your computer to slow down and often hangs. It can even cause programs and Windows features to stop working properly.
e) Trojan: Trojans can control over your computer. It secretly makes harmful changes to your computer and also steal personal informations.
f) Hijacker: Hijackers change the home page of your internet browser. It can even force your internet browser to enter a specific web page. The web page usually contains viruses.
g) Dialler: Diallers secretly connect your computer to the internet, causing you to be charged for the internet connection fee.
h) Enabler: Enabler does not harm your computer, but it is used by other malware threats to harm your computer. Enablers cannot function by itself without other malware threats.
i) Rootkit: Rootkits are hidden threats in your computer that can provide other malware threats with administrative access to your computer. It is difficult to be detected by ordinary security programs.
j) Hacker/Hack tool: Hackers can bypass a password protection and steal the password. It can even attack security programs on your computer in order to deliver malware threats.
k) Scareware/Fake Antivirus: Scarewares are fake security programs. It tricks you by saying that your computer is infected with malware and wants you to purchase it in order to remove the detected malware threats.

2. Spam and Junk Mail:
Spam and junk mails are unwanted emails that contains unwanted advertisement. It may even contain viruses and fraud. Some companies send spam to people's email address in order to earn a profit. They get the email addresses by searching for them on the internet and by tricking people to give them their email address. Spam and junk mails can use up the storage space of your email inbox and can be very irritating.

3. Fraud and Phishing Sites:
Fraud and phishing sites are fake websites. It looks the same like a particular website but actually it is not. The purpose of people creating fraud and phishing sites is to steal passwords. When other people arrive on the fraud or phishing site, they may not be aware of that, so they will just sign in to that website with their user name and password. If this happens, their password had been stolen by the creator of the fraud or phishing sites. Fraud and phishing sites are commonly used to steal passwords from social networking website like Facebook, but some even steal passwords of bank accounts.

4. Bad People:
Bad people is everywhere on the internet, especially in social networking and chat programs such as Facebook, Friendster, Twitter, Tagged, MSN, Yahoo Messenger and Skype. They uses fake identities like name, gender, age, address and photo. For example, a 30 year old man may say that he is a 15 year old girl, and uses a 15 year old girl photo. They use the fake identities to interact with other users on the internet, mainly children and teenagers. They will trick the other person to give them their personal information like address and telephone. After that, they will disturb the other person and the family through calls and visits. Some bad people even trick a person to go alone to a particular place to meet each other, then use that change to kidnap that person.

Above are all the dangers on the internet. So, how to stay safe on the internet? There are several things that you have to do in order to keep yourself safe on the internet. These are the ways:

1. Install Anti-virus Program:
Anti-virus program protects your computer from viruses, worms, trojans and other malware threats. A good anti-virus program is able to scan your computer for viruses, remove detected viruses, prevent virus attacks and update virus definitions. If you do not have a good anti-virus on your computer, or if the trial version of the anti-virus had expired, you should download and install one of the free anti-viruses below.
a) Microsoft Security Essentials:
b) AVG Anti-virus:
c) Avira Anti-virus:
d) Avast Anti-virus:
If you already have a anti-virus program on your computer, you should uninstall it before installing the anti-virus program above. Using two anti-virus program at the same time can slow down your computer. You should update your anti-virus and scan your computer at least once in a week for maximum safety. If a virus is detected, you should remove it.

2. Install Anti-spyware Program:
Anti-spyware program protects your computer from spyware, adware and other malware threats. A good anti-spyware program is able to scan your computer for threats, remove detected threats, prevent malware infections and update definitions. Windows Vista and Windows 7 computers come with Windows Defender, which is a good anti-spyware program. If you are not using Windows Vista or 7, and you do not have a good anti-spyware on your computer, or if the trial version of the anti-spyware had expired, you should download and install one of the free anti-spywares below.
a) Windows Defender:
b) Spyware Doctor with Anti-virus:
c) Ad-Aware:
d) Spyware Terminator:
If you already have a anti-spyware program on your computer, you should uninstall it before installing the anti-spyware program above. Using two anti-spyware program at the same time can slow down your computer. You should update the anti-spyware and scan your computer at least once in a week for maximum safety. If a malware threat is detected, you should remove it.

3. Install Firewall Program:
Firewall program protects your computer from hackers and other malware threats. A good firewall program is able to block hacker attacks and unauthorised access to your computer. Windows XP, Windows Vista and Windows 7 computers come with Windows Firewall, which is a good firewall program.
To turn on Windows Firewall, go to Start > All Programs > Control Panel > Windows Firewall . Select 'On (Recommended)' and click 'OK'. If a hacker attack or unauthorised access to your computer is detected, you should block it.

4. Install Netcraft Toobar:
Netcraft toolbar protects you against frauds and phishing sites. It displays the risk rating of every website that you are visiting. If the risk rating is high, that means the possibility that the website is a phishing site is high. To download and install Netcraft Toolbar, go to .

5. Install McAfee Site Advisor:
McAfee Site Advisor tells you whether the website you are visiting is safe to visit. It blocks a website if the website is dangerous to visit. To download and install McAfee Site Advisor, go to .

6. Turn On Automatic Updates:
Automatic Updates is a Windows feature that can automatically download and install updates for your computer. The updates can fix Windows loopholes and correct errors, which can reduce the risk of hacker attacks. To turn on Automatic Updates, go to Start > Control Panel > Automatic Updates . Select 'Automatic (Recommended)' and click 'OK'. When new updates are available, Automatic Updates will automatically download and install it on your computer.
Note: If your Windows is not genuine, you will be periodically informed of that after you turn on Automatic Updates. Also, you can only get access to some of the updates, but not all.

7. Good Internet Surfing Habits:
You should have good habits while surfing the internet. First, do not give your personal informations such as telephone number, address and photo to anyone else on the internet. Next, never meet with your internet friend alone. Besides that, don't simply click on any link given by your friend on the internet. Also,you should scan a download file or program for viruses and malware before opening it. In addition, scan an email attachment for viruses and malware before downloading it.

Monday, 29 June 2009

First blog post

Welcome! I have just created my blog, and this is the first post on this blog. I will write new posts from time to time.